Friday, July 31, 2009

Print page | E-mail page | Download PDF | Add to briefcase

फ्यी--



Print page E-mail page Download PDF Add to briefcase « Previous Release Next Release »
PSS World Medical Reports Results for Fiscal 2008 Third Quarter
Fiscal 2008 Third Quarter Highlights:
Consolidated net sales growth of 1.5% (9.4% excluding last fiscal year's flu sales)
Physician Business net sales declined by 0.8% (10.4% growth excluding last fiscal year's flu sales)
Elder Care Business net sales growth of 7.3%
Consolidated earnings per diluted share increased 38% to $0.22 (net loss on flu of $0.03 per diluted share included in last fiscal year's third quarter)
Operating margin of 7.3% for Physician Business and 4.7% for Elder Care Business
Consolidated cash flow from operations of $13.3 million
Repurchased approximately 700,000 shares for $13.1 million
Agreement finalized with the State of Florida with approximately $1.4 million of additional pedigree-related costs in the third quarter
JACKSONVILLE, Fla., Jan 23, 2008 (BUSINESS WIRE) -- PSS World Medical, Inc. (NASDAQ GS:PSSI) announced today its results for the fiscal 2008 third quarter and nine months ended December 28, 2007.
David A. Smith, Chairman and Chief Executive Officer, commented, "Both businesses grew at two times their respective markets' growth rate with solid operating results and profit growth. Our business model continues to drive increased operating efficiencies, more than offsetting an environment of rising costs. Our customer programs and solutions continue to improve cash flow and efficiency, alleviating the pressures on customer income. We are excited to begin improving pharmaceutical-related services for our Florida-based customers over the next 90-120 days.
"We expect to have a strong finish to this fiscal year, the final year of our three-year strategic plan, and accomplish our goal of $0.81-$0.85 earnings per diluted share for fiscal year 2008. The Company is now in the planning phase for the fiscal years 2009-2011 strategic plan, and we look forward to sharing these plans on May 22 at our annual Investor Day."
Net sales for the three months ended December 28, 2007, were $465.2 million, an increase of 1.5% (9.4% excluding last fiscal year's flu sales), compared with net sales of $458.4 million for the three months ended December 29, 2006. Net sales for the three months ended December 28, 2007, for the Physician Business decreased by 0.8% (10.4% growth excluding last fiscal year's flu sales), while net sales for the Elder Care Business increased by 7.3%. Income from operations for the three months ended December 28, 2007, was $24.1 million compared with income from operations for the three months ended December 29, 2006, of $17.9 million. Net income for the three months ended December 28, 2007, was $14.2 million, or $0.22 per diluted share, compared with net income for the three months ended December 29, 2006, of $11.1 million, or $0.16 per diluted share.
Net sales for the nine months ended December 28, 2007, were $1.4 billion, an increase of 4.9% (9.0% excluding last fiscal year's flu sales), compared with net sales of $1.3 billion for the nine months ended December 29, 2006. Net sales for the nine months ended December 28, 2007, for the Physician Business increased by 4.2% (10.1% excluding last fiscal year's flu sales), while net sales for the Elder Care Business increased by 6.5%. Income from operations for the nine months ended December 28, 2007, was $63.1 million compared with income from operations for the nine months ended December 29, 2006, of $58.2 million. Net income for the nine months ended December 28, 2007, was $37.3 million, or $0.56 per diluted share, compared with net income for the nine months ended December 29, 2006, of $34.8 million, or $0.50 per diluted share.
David M. Bronson, Executive Vice President and Chief Financial Officer, commented, "We continue to see positive traction in our key business strategies, with solid growth in pharmaceutical, equipment and private label sales. Operating margins continued to improve in both businesses, even with increased costs in the quarter related to pedigree compliance. Despite strong revenue growth, we continued to generate cash from operations, which allowed the continuation of our share repurchase program. Over the last three quarters, share repurchases have been an accretive use of capital, adding about $0.01 to our reported earnings per diluted share."
Separately, the Company noted that it has resolved outstanding issues with the Florida Department of Health regarding compliance with new state pharmaceutical pedigree regulations. In fiscal year 2008, costs associated with pedigree law compliance and settlement with the Florida Department of Health were $2.7 million, or $0.03 per diluted share, for the first quarter; $2.1 million, or $0.02 per diluted share, for the second quarter; and $1.4 million, or $0.01 per diluted share, in the third quarter.
The agreement resolves issues regarding interpretation of procedures for documenting the ordering, receipt, storage and shipping of certain products covered by Florida drug pedigree legislation. Products covered by this action include prescription pharmaceutical products used by physicians in their practices, such as vaccines, ointments and creams, anesthetics and topicals used in office procedures. The Company expects to resume sales and shipments of these products from its Florida distribution operations over the next 90-120 days. The Company also reiterated its commitment to full compliance with the spirit and intent of pedigree legislation and will continue to work with state regulators to ensure compliance with these new regulations.
The Company has today filed with the SEC a Form 8-K that includes a copy of this press release and its related Fiscal 2008 Third Quarter Financial Workbook, which contains GAAP and non-GAAP financial measures, and is available on the Company's website, www.pssworldmedical.com.
A listen-only simulcast as well as a 90-day online replay of PSS World Medical's fiscal 2008 third quarter conference call can be found in the Investor Relations/Financial Information sections of the Company's websites, www.pssworldmedical.com or www.pssd.com, respectively, under the heading "Events and Presentations," or at www.opencompany.info, on January 24, 2008, beginning at 8:30 a.m. Eastern time.
PSS World Medical, Inc. is a national distributor of medical products to physicians and elder care providers through its two business units. Since its inception in 1983, PSS has become a leader in the two market segments that it serves with a focused market approach to customer services, a consultative sales force, strategic acquisitions, strong arrangements with product manufacturers and a unique culture of performance.
Additional financial information pertaining to PSS World Medical financial results may be found by visiting the Investor Relations/Financial Information sections of the Company's websites, www.pssworldmedical.com or www.pssd.com, respectively, under the heading "Events and Presentations." If you should need assistance accessing the information, please call Investor Relations at 904-332-3000.
All statements in this release that are not historical facts, including, but not limited to, statements regarding anticipated growth in revenue, gross and operating margins, and earnings, statements regarding the Company's current business strategy, the Company's ability to complete and integrate acquired businesses and generate acceptable rates of return, the Company's projected sources and uses of cash, and the Company's plans for future development and operations, are based upon current expectations. Specifically, forward-looking statements in this Press Release include, without limitation, the Company's expected results in GAAP EPS for the consolidated company; the expected operational cash flow in fiscal year 2008; and the Company's expectation that it will continue to be in compliance with Florida pedigree regulations and other states' pedigree regulations. These statements are forward-looking in nature and involve a number of risks and uncertainties. Actual results may differ materially. Among the factors that could cause results to differ materially are the following: pricing and customer credit quality pressures; the loss of any of our distributorship agreements and our reliance on relationships with our suppliers and vendors; our reliance on a limited number of chain business elder care customers; the availability of sufficient capital to finance the Company's business plans on terms satisfactory to the Company; lower revenue and earnings that may result from competition; the ability of the Company to adequately defend or reach a settlement on outstanding litigation matters and investigations involving the Company or its management; changes in labor, equipment and capital costs; changes in legislation and regulations affecting the Company's business, such as the Medicare cliffs, changes in malpractice insurance rates and tort reform; future acquisitions or strategic partnerships; general business, competitive and economic factors and conditions; and other factors described from time to time in the Company's reports filed with the Securities and Exchange Commission. Many of these factors are outside the control of the Company. The Company wishes to caution readers not to place undue reliance on any such forward looking statements, which statements are made pursuant to the Private Securities Litigation Reform Act of 1995 and, as such, speak only as of the date made. The Company also wishes to caution readers that it undertakes no duty or is under no obligation to update or revise any forward-looking statements. PSS WORLD MEDICAL, INC.
Unaudited Condensed Consolidated Statements of Operations
(In millions, except per share and share data)
Three Months Ended Nine Months Ended
------------------- -------------------
Dec. 28, Dec. 29, Dec. 28, Dec. 29,
2007 2006 2007 2006
--------- --------- --------- ---------
Net sales $ 465.2 $ 458.4 $1,362.0 $1,298.6
Cost of goods sold 330.2 335.2 966.8 931.6
--------- --------- --------- ---------
Gross profit 135.0 123.2 395.2 367.0
General and administrative
expenses 79.4 75.2 240.3 222.3
Selling expenses 31.5 30.1 91.8 86.5
--------- --------- --------- ---------
Income from operations 24.1 17.9 63.1 58.2
--------- --------- --------- ---------
Other (expense) income:
Interest expense (1.8) (1.3) (4.7) (4.1)
Interest and investment
income - 0.4 0.7 0.8
Other income 0.9 0.5 1.9 1.4
--------- --------- --------- ---------
(0.9) (0.4) (2.1) (1.9)
--------- --------- --------- ---------
Income before provision for
income taxes 23.2 17.5 61.0 56.3
Provision for income taxes 9.0 6.4 23.7 21.5
--------- --------- --------- ---------
Net income $ 14.2 $ 11.1 $ 37.3 $ 34.8
========= ========= ========= =========
Earnings per share - basic $ 0.22 $ 0.17 $ 0.57 $ 0.52
========= ========= ========= =========
Earnings per share - diluted $ 0.22 $ 0.16 $ 0.56 $ 0.50
========= ========= ========= =========
Weighted average shares (in
thousands):
Basic 63,999 67,054 65,533 67,272
Diluted 65,756 69,458 67,195 69,294
PSS WORLD MEDICAL, INC.
Condensed Consolidated Balance Sheets
(In millions, except per share and share data)
Dec. 28, March 30,
2007 2007
----------- -----------
(Unaudited)
ASSETS
Current Assets:
Cash and cash equivalents $ 15.0 $ 46.7
Accounts receivable, net 224.3 222.8
Inventories 214.3 174.1
Deferred tax assets, net 9.2 8.8
Prepaid expenses and other 31.6 34.4
----------- -----------
Total current assets 494.4 486.8
Property and equipment, net 89.9 88.6
Other Assets:
Goodwill and intangibles, net 138.5 137.1
Investment in available-for-sale securities 50.2 -
Other 68.6 62.5
----------- -----------
Total assets $ 841.6 $ 775.0
=========== ===========
LIABILITIES AND SHAREHOLDERS' EQUITY
Current Liabilities:
Accounts payable $ 161.7 $ 131.3
Accrued expenses 34.4 37.2
Revolving line of credit and current
portion of long-term debt 33.7 2.2
Other 15.8 11.5
----------- -----------
Total current liabilities 245.6 182.2
Long-term debt, excluding current portion 150.8 150.7
Other noncurrent liabilities 67.2 61.2
----------- -----------
Total liabilities 463.6 394.1
----------- -----------
Shareholders' Equity:
Preferred stock, $0.01 par value; 1,000,000
shares authorized, no shares issued and
outstanding - -
Common stock, $0.01 par value; 150,000,000
shares authorized, 64,664,200 and
67,179,475 shares issued and outstanding
at December 28, 2007, and March 30, 2007,
respectively 0.6 0.7
Additional paid-in capital 243.9 300.0
Retained earnings 117.3 80.2
Accumulated other comprehensive income 16.2 -
----------- -----------
Total shareholders' equity 378.0 380.9
----------- -----------
Total liabilities and shareholders'
equity $ 841.6 $ 775.0
=========== ===========
PSS WORLD MEDICAL, INC.
Unaudited Condensed Consolidated Statements of Cash Flows
(In millions)
Three Months Ended Nine Months Ended
------------------- -------------------
Dec. 28, Dec. 29, Dec. 28, Dec. 29,
2007 2006 2007 2006
--------- --------- --------- ---------
Cash Flows from Operating
Activities:
Net income $ 14.2 $ 11.1 $ 37.3 $ 34.8
Adjustments to reconcile
net income to net cash
provided by operating
activities:
Depreciation 4.7 4.2 14.0 12.5
(Benefit) provision for
deferred income taxes 0.9 (3.7) (1.4) 4.1
Amortization of
intangible assets 1.4 1.5 4.2 4.4
Provision for doubtful
accounts 1.7 2.4 3.5 3.4
Non-cash compensation
expense 1.2 0.7 3.1 1.5
Amortization of debt
issuance costs 0.4 0.4 1.1 1.1
Provision for deferred
compensation (0.5) 0.9 1.2 1.7
Changes in operating assets
and liabilities, net of
effects from business
combination:
Accounts receivable, net 6.3 3.4 (1.9) (14.0)
Inventories (26.2) (14.1) (37.9) (12.7)
Prepaid expenses and
other current assets (6.5) 7.2 (0.9) (1.2)
Other assets 0.5 (1.7) (8.4) (1.4)
Accounts payable 11.9 16.6 25.8 23.1
Accrued expenses and
other liabilities 3.3 (1.9) 6.0 3.6
--------- --------- --------- ---------
Net cash provided by
operating activities 13.3 27.0 45.7 60.9
--------- --------- --------- ---------
Cash Flows from Investing
Activities:
Payments for business
combinations, net of cash
acquired - (2.4) (15.1) (2.5)
Payments for investment in
available-for-sale
securities - - (24.1) -
Capital expenditures (4.2) (2.8) (13.8) (10.6)
Proceeds from note
receivable - - 2.7 -
Payments on non-
solicitation agreements - (0.2) - (1.0)
Other (0.1) - (0.1) -
--------- --------- --------- ---------
Net cash used in
investing activities (4.3) (5.4) (50.4) (14.1)
--------- --------- --------- ---------
Cash Flows from Financing
Activities:
Net proceeds from revolving
line of credit 1.2 - 32.6 -
Proceeds from exercise of
stock options 0.6 2.4 2.3 7.3
Excess tax benefits from
share-based compensation
arrangements 0.5 0.6 1.2 3.2
Proceeds from borrowings - 0.5 - 1.5
Purchase of common stock (13.1) (15.2) (62.5) (27.4)
Payment under capital lease
obligations (0.2) (0.2) (0.6) (0.4)
Other - (0.5) - -
--------- --------- --------- ---------
Net cash used in
financing activities (11.0) (12.4) (27.0) (15.8)
--------- --------- --------- ---------
Net increase (decrease) in
cash and cash equivalents (2.0) 9.2 (31.7) 31.0
Cash and cash equivalents,
beginning of period 17.0 45.7 46.7 23.9
--------- --------- --------- ---------
Cash and cash equivalents, end
of period $ 15.0 $ 54.9 $ 15.0 $ 54.9
========= ========= ========= =========
PSS WORLD MEDICAL, INC.
Net Sales Adjustment for Influenza Vaccine Sales
Proforma Net Sales
(In millions)
For the Three For the Nine
Months Ended Months Ended
------------------------ ------------------------
Dec. 28, Dec. 29, Dec. 28, Dec. 29,
2007 2006 Growth 2007 2006 Growth
-------- -------- ------ -------- -------- ------
Consolidated:
Net sales $ 465.2 $ 458.4 1.5% $1,362.0 $1,298.6 4.9%
Influenza vaccine
sales - 33.3 - 48.7
-------- -------- -------- --------
Net sales adjusted
for influenza
vaccine sales $ 465.2 $ 425.1 9.4% $1,362.0 $1,249.9 9.0%
======== ======== ======== ========
Physician Business:
Net sales $ 326.5 $ 329.2 (0.8%) $ 952.9 $ 914.4 4.2%
Influenza vaccine
sales - 33.3 - 48.7
-------- -------- -------- --------
Net sales adjusted
for influenza
vaccine sales $ 326.5 $ 295.9 10.4% $ 952.9 $ 865.7 10.1%
======== ======== ======== ========
(NASDAQ GS:PSSI) - E
SOURCE: PSS World Medical, Inc.
PSS World Medical, Inc.For investors:Robert C. Weiner, 904-332-3287Vice President, Investor RelationsorFor media:Brian C. Kosoy, 904-332-4175Public Relations
Copyright Business Wire 2008
News Provided by COMTEX
Close window Back to top

Wednesday, July 29, 2009

म्कुल्त्र सिग्नालिंतेल्लिन्गेंस देफेनसे DEPT

FYI--
US MK ULTRA SANCTUARY

You can support Wikipedia by making a tax-deductible donation.The Wikimedia Board of Trustees election has started. Please vote. [Hide]
[Help us with translations!]

Signals intelligence
From Wikipedia, the free encyclopedia
(Redirected from SIGINT)
Jump to: navigation, search
This article is about signals intelligence. For the signal in POSIX-compliant systems, see SIGINT (POSIX). For the fictional Metal Gear character, see List of Metal Gear Solid 3: Snake Eater characters.
This article is a subset article in a series under intelligence collection management. For a hierarchical list of articles, see the intelligence cycle management hierarchy.
Signals intelligence (often contracted to SIGINT) is intelligence-gathering by interception of signals, whether between people (i.e., COMINT or communications intelligence) or between machines (i.e., ELINT or electronic intelligence), or mixtures of the two. As sensitive information is often encrypted, signals intelligence often involves the use of cryptanalysis. However, traffic analysis—the study of who is signalling whom and in what quantity—can often produce valuable information, even when the messages themselves cannot be decrypted. See SIGINT by Alliances, Nations and Industries for the organization of SIGINT activities, and Signals intelligence operational platforms by nation for current collection systems, and SIGINT in Modern History from World War I to the present.

As a means of collecting intelligence, signals intelligence is a subset of intelligence collection management, which, in turn, is a subset of intelligence cycle management.

Intercepting written but encrypted communications, and extracting information, probably did not wait long after the development of writing. A simple encryption system, for example, is the Caesar cipher. Electronic interception appeared as early as 1900, during the Boer War. The Boers had captured some British radios, and, since the British were the only people transmitting at the time, had signals rather obvious to intercept.[1]


Menwith Hill, a large US SIGINT site in England
Unit 8200 (the SIGINT unit of the Israeli Intelligence Corps) base on Mount Avital, Golan Heights
A52 Oste, an Oste class ELINT and reconnaissance ship, of the German NavyContents [hide]
1 More technical definitions of SIGINT and its branches
2 Disciplines shared across the branches
2.1 Targeting
2.2 Need for multiple, coordinated receivers
2.3 Intercept management
2.4 Signal detection
2.4.1 Countermeasures to interception
2.5 Direction-finding
2.6 Traffic analysis
2.7 Electronic Order of Battle
3 COMINT
3.1 Voice interception
3.2 Text interception
3.3 Signaling channel interception
3.4 Monitoring friendly communications
4 ELINT
4.1 Complementary relationship to COMINT
4.2 Role in air warfare
4.3 ELINT and ESM
4.4 ELINT for meaconing
4.5 FISINT
4.6 Counter-ELINT
5 SIGINT versus MASINT
6 Defensive signals intelligence
6.1 Strong and well-managed encryption
6.2 Appropriate transmission security
6.3 Appropriate receiving security
6.4 Protection against compromising emanations
6.4.1 The risk
6.4.2 Mitigation and countermeasures
6.5 Protection against side channel attacks and covert channels
7 See also
8 References
9 Further reading
10 External links



[edit] More technical definitions of SIGINT and its branches
In the United States and other nations involved with NATO, signals intelligence is defined as:[2]

A category of intelligence comprising either individually or in combination all communications intelligence (COMINT), electronic intelligence (ELINT), and Foreign instrumentation signals intelligence, however transmitted.
Intelligence derived from communications, electronic, and foreign instrumentation signals."
The JCS definition may overemphasize "foreign instrumentation signals". That part should be considered in combination with MASINT, which is closely linked to foreign instrumentation such as telemetry or radionavigation. An ELINT sensor may find a radar, and then cue (i.e., guide) a COMINT sensor for listening in on the talk between the radar and its remote users. A nonspecific SIGINT sensor can cue a Frequency Domain MASINT sensor that can help identify the purpose of the signal. If MASINT cannot identify the signal, then the intelligence organization may task an IMINT aircraft or satellite to take a picture of the source, so photo interpreters can try to understand its functions.

Being a broad field, SIGINT has many sub-disciplines. The two main ones are COMmunications INTelligence (COMINT) and ELectronic INTelligence (ELINT). There are, however, some techniques that can apply to either branch, as well as to assist FISINT or MASINT.


[edit] Disciplines shared across the branches
An excellent Australian analysis of how the pieces came together, from targeting to physical destruction of radars, in Desert Storm was written by Carlo Kopp.[3]


[edit] Targeting
A collection system has to know to look for a particular signal. "System", in this context, has several nuances. Targeting is an output of the process of developing collection requirements:

"1. An intelligence need considered in the allocation of intelligence resources. Within the Department of Defense, these collection requirements fulfill the essential elements of information and other intelligence needs of a commander, or an agency.
"2. An established intelligence need, validated against the appropriate allocation of intelligence resources (as a requirement) to fulfill the essential elements of information and other intelligence needs of an intelligence consumer."[2]

[edit] Need for multiple, coordinated receivers
First, atmospheric conditions, sunspots, the target's transmission schedule and antenna characteristics, and other factors create uncertainty that a given signal intercept sensor will be able to "hear" the signal of interest, even with a geographically fixed target and an opponent making no attempt to evade interception. Basic countermeasures against interception include frequent changing of radio frequency, polarization, and other transmission characteristics. An intercept aircraft could not get off the ground if it had to carry antennas and receivers for every possible frequency and signal type to deal with such countermeasures.

Second, locating the transmitter's position is usually part of SIGINT. Triangulation and more sophisticated radio location techniques, such as time of arrival methods, require multiple receiving points at different locations. These receivers send location-relevant information to a central point, or perhaps to a distributed system in which all participate, such that the information can be correlated and a location computed.


[edit] Intercept management
Modern SIGINT systems, therefore, have substantial communications among intercept platforms. Even if some platforms are clandestine, there is a broadcast of information telling them where and how to look for signals.[4] A U.S. targeting system under development in the late 1990s, PSTS, constantly sends out information that helps the interceptors properly aim their antennas and tune their receivers. Larger intercept aircraft, such as the EP-3 or RC-135, have the on-board capability to do some target analysis and planning, but others, such as the RC-12 GUARDRAIL, are completely under ground direction. GUARDRAIL aircraft are fairly small, and usually work in units of three to cover a tactical SIGINT requirement, where the larger aircraft tend to be assigned strategic/national missions.

In other words, before the detailed process of targeting begins, someone has to decide there is a value in collecting information about something. While it would be possible to direct signals intelligence collection at a major sports event, the systems would capture a great deal of noise, news signals, and perhaps announcements in the stadium. If, however, an anti-terrorist organization believed that a small group would be trying to coordinate their efforts, using short-range unlicensed radios, at the event, SIGINT targeting of radios of that type would be reasonable. Targeting would not know where in the stadium the radios might be, or the exact frequency they are using; those are the functions of subsequent steps such as signal detection and direction finding.

Once the decision to target is made, the various interception points need to cooperate, since resources are limited. Knowing what interception equipment to use becomes easier when a target country buys its radars and radios from known manufacturers, or is given them as part of foreign military aid. National intelligence services keep libraries of devices manufactured by their own country and others, and then use a variety of techniques to learn what equipment is acquired by a given country.

See "The Target - The Iraqi IADS" for a discussion on how the Iraqi air defense system was targeted in 1991.[3] Note the different requirement for search radar and for the different area defense and point defense missile systems, and how these guided the Suppression of Enemy Air Defense (SEAD) attacks on the radars, command centers, and missiles.

Knowledge of physics and electronic engineering further narrows the problem of what types of equipment might be in use. An intelligence aircraft flying well outside the borders of another country will listen for long-range search radars, not short-range fire control radars that would be used by a mobile air defense. Soldiers scouting the front lines of another army know that the other side will be using radios that must be portable and not have huge antennas.


[edit] Signal detection
Even if a signal is human communications (e.g., a radio), the intelligence collection specialists have to know it exists. If the targeting function described above learns that a country has a radar that operates in a certain frequency range, the first step is to use a sensitive receiver, with one or more antennas that listen in every direction, to find an area where such a radar is operating. Once the radar is known to be in the area, the next step is to find its location.


Simplified spectrum analyzer display of superheterodyned, amplitude modulated signals.If operators know the probable frequencies of transmissions of interest, they may use a set of receivers, preset to the frequencies of interest. These are the frequency (horizontal axis) versus power (vertical axis) produced at the transmitter, before any filtering of signals that do not add to the information being transmitted. Received energy on a particular frequency may start a recorder, and alert a human to listen to the signals if they are intelligible (i.e., COMINT). If the frequency is not known, the operators may look for power on primary or sideband frequencies using a spectrum analyzer. Information from the spectrum analyzer is then used to tune receivers to signals of interest. For example, in this simplified spectrum, the actual information is at 800 kHz and 1.2 MHz.


Hypothetical displays from four spectrum analyzers connected to directional antennas. The transmitter is at bearing 090 degrees.Real-world transmitters and receivers usually are directional. In the figure to the left, assume that each display is connected to a spectrum analyzer connected to a directional antenna aimed in the indicated direction.


[edit] Countermeasures to interception
Spread-spectrum communications is an electronic counter-countermeasures (ECCM) technique to defeat looking for particular frequencies. Spectrum analysis can be used in a different ECCM way to identify frequencies not being jammed or not in use.


[edit] Direction-finding
Main article: Radio direction finding
The earliest, and still common, means of direction finding is to use directional antennas as goniometers, so that a line can be drawn from the receiver through the position of the signal of interest. See HF/DF. Knowing the compass bearing, from a single point, to the transmitter does not locate it. Where the bearings from multiple points, using goniometry, are plotted on a map, the transmitter will be located at the point where the bearings intersect. This is the simplest case; a target may try to confuse listeners by having multiple transmitters, giving the same signal from different locations, switching on and off in a pattern known to their user but apparently random to the listener.

Individual directional antennas have to be manually or automatically turned to find the signal direction, which may be too slow when the signal is of short duration. One alternative is the Wullenweber array technique.


AN/FLR-9 Wullenweber antenna array of the Bundesnachrichtendienst near Augsburg, GermanyIn this method, several concentric rings of antenna elements simultaneously receive the signal, so that the best bearing will ideally be clearly on a single antenna or a small set. Wullenweber arrays for high-frequency signals are enormous, referred to as "elephant cages" by their users.

An alternative to tunable directional antennas, or large omnidirectional arrays such as the Wullenweber, is to measure the time of arrival of the signal at multiple points, using GPS or a similar method to have precise time synchronization. Receivers can be on ground stations, ships, aircraft, or satellites, giving great flexibility.

Modern anti-radiation missiles can home in on and attack transmitters; military antennas are rarely a safe distance from the user of the transmitter.


[edit] Traffic analysis
Main article: Traffic analysis
When locations are known, usage patterns may emerge, and inferences drawn. Traffic analysis is the discipline of drawing patterns from information flow among a set of senders and receivers, whether those senders and receivers are designated by location determined through direction finding, by addressee and sender identifications in the message, or even MASINT techniques for "fingerprinting" transmitters or operators. Message content, other than the sender and receiver, is not necessary to do traffic analysis, although more information can be helpful.

For example, if a certain type of radio is known to be used only by tank units, even if the position is not precisely determined by direction finding, it may be assumed that a tank unit is in the general area of the signal. Of course, the owner of the transmitter can assume someone is listening, so might set up tank radios in an area where he wants the other side to believe he has actual tanks. As part of Operation Quicksilver, part of the deception plan for the invasion of Europe at the Battle of Normandy, radio transmissions simulated the headquarters and subordinate units of the fictitious First United States Army Group (FUSAG), commanded by George S. Patton, to make the German defense think that the main invasion was to come at another location. In like manner, fake radio transmissions from Japanese aircraft carriers, before the Battle of Pearl Harbor, were made from Japanese local waters, while the attacking ships moved under strict radio silence.

Traffic analysis need not focus on human communications. For example, if the sequence of a radar signal, followed by an exchange of targeting data and a confirmation, followed by observation of artillery fire, this may identify an automated counterbattery system. A radio signal that triggers navigational beacons could be a landing aid system for an airstrip or helicopter pad that is intended to be low-profile.

Patterns do emerge. Knowing a radio signal, with certain characteristics, originating from a fixed headquarters may be strongly suggestive that a particular unit will soon move out of its regular base. The contents of the message need not be known to infer the movement.

There is an art as well as science of traffic analysis. Expert analysts develop a sense for what is real and what is deceptive. Harry Kidder, for example, was one of the star cryptanalysts of World War II, a star hidden behind the secret curtain of SIGINT.[5]


[edit] Electronic Order of Battle
Generating an Electronic order of battle (EOB) requires identifying SIGINT emitters in an area of interest, determining their geographic location or range of mobility, characterizing their signals, and, where possible, determining their role in the broader organizational order of battle. EOB covers both COMINT and ELINT.[6] The Defense Intelligence Agency maintains an EOB by location. The Joint Spectrum Center (JSC) of the Defense Information Systems Agency supplements this location database with five more technical databases:

FRRS: Frequency Resource Record System
BEI: Background Environment Information
SCS: Spectrum Certification System
EC/S: Equipment Characteristics/Space
TACDB: platform lists, sorted by nomenclature, which contain links to the C-E equipment complement of each platform, with links to the parametric data for each piece of equipment, mlitary unit lists and their subordinate units with equipment used by each unit.

EOB and related data flowFor example, several voice transmitters might be identified as the command net (i.e., top commander and direct reports) in a tank battalion or tank-heavy task force. Another set of transmitters might identify the logistic net for that same unit. An inventory of ELINT sources might identify the medium- and long-range counter-artillery radars in a given area,

Signals intelligence units will identify changes in the EOB, which might indicate enemy unit movement, changes in command relationships, and increases or decreases in capability.

Using the COMINT gathering method enables the intelligence officer to produce an electronic order of battle by traffic analysis and content analysis among several enemy units. For example, if the following messages were intercepted:

U1 from U2, requesting permission to proceed to checkpoint X.
U2 from U1, approved. please report at arrival.
(20 minutes later) U1 from U2, all vehicles have arrived to checkpoint X.
This sequence shows that there are two units in the battlefield, unit 1 is mobile, while unit 2 is in a higher hierarchical level, perhaps a command post. One can also understand that unit 1 moved from one point to another which are distant from each 20 minutes with a vehicle. If these are regular reports over a period of time, they might reveal a patrol pattern. Direction-finding and Radiofrequency MASINT could help confirm that the traffic is not deception.

The EOB buildup process is divided as following:

Signal separation
Measurements optimization
Data Fusion
Networks build-up
Separation of the intercepted spectrum and the signals intercepted from each sensors must take place in an extremely small period of time, in order to separate the deferent signals to different transmitters in the battlefield. The complexity of the separation process depends on the complexity of the transmission methods (e.g., hopping or Time division multiple access (TDMA)).

By gathering and clustering data from each sensor, the measurements of the direction of signals can be optimized and get much more accurate then the basic measurements of a standard direction finding sensor.[7] By calculating larger samples of the sensor's output data in near real-time, together with historical information of signals, better results are achieved.

Data fusion correlates data samples from different frequencies from the same sensor, "same" being confirmed by direction finding or radiofrequency MASINT. If an emitter is mobile, direction finding, other than discovering a repetitive pattern of movement, is of limited value in determining if a sensor is unique. MASINT then becomes more informative, as individual transmitters and antennas may have unique side lobes, unintentional radiation, pulse timing, etc.

Network build-up among between each emitter (communication transmitter) to another enables creation of the communications flows of a battlefield.[8]


[edit] COMINT
COMINT (Communications Intelligence) is a sub-category of signals intelligence that engages in dealing with messages or voice information derived from the interception of foreign communications. It should be noted that COMINT is commonly referred to as SIGINT, which can cause confusion when talking about the broader intelligence disciplines. The US Joint Chiefs of Staff defines it as "Technical information and intelligence derived from foreign communications by other than the intended recipients".[2]

COMINT, which is defined to be communications among people, will reveal some or all of the following:

Who is transmitting
Where they are located, and, if the transmitter is moving, the report may give a plot of the signal against location
If known, the organizational function of the transmitter
The time and duration of transmission, and the schedule if it is a periodic transmission
The frequencies and other technical characteristics of their transmission
If the transmission is encrypted or not, and if it can be decrypted. If it is possible to intercept either an originally transmitted cleartext or obtain it through cryptanalysis, the language of the communication and a translation (when needed).
The addresses, if the signal is not a general broadcast and if addresses are retrievable from the message. These stations may also be COMINT (e.g., a confirmation of the message or a response message), ELINT (e.g., a navigation beacon being activated) or both. Rather than, or in addition to, an address or other identifier, there may be information on the location and signal characteristics of the responder.

[edit] Voice interception
A basic COMINT technique is to listen for voice communications, usually over radio but possibly "leaking" from telephones or from wiretaps. If the voice communications are encrypted, the encryption first must be solved through a process of introelectric diagram in order to listen to the conversation, although traffic analysis (q.v.) may give information simply because one station is sending to another in a radial pattern. It is important to check for various cross sections of conversation. It is equally important to make sure that you have the correct x pattern in relation to the a2 pattern.[clarification needed] These can be found by using the signals intelligence set given to all Naval communications officers and enlisted personnel with direct access to signals intelligence communications.[clarification needed][citation needed]

Obviously, the interceptor must understand the language being spoken. In the Second World War, the United States used volunteer communicators known as code talkers, who used languages such as Navajo, Comanche and Choctaw, which would be understood by few people, even in the U.S., who did not grow up speaking the language. Even within these uncommon languages, the code talkers used specialized codes, so a "butterfly" might be a specific Japanese aircraft. British forces made more limited use of Welsh speakers for the additional protection.

While modern electronic encryption does away with the need for armies to use obscure languages, it is certainly possible that guerrilla groups might use rare dialects that few outside their ethnic group would understand.


[edit] Text interception
Not all communication is in voice. Morse code interception was once very important, but Morse code telegraphy is now obsolescent in the western world, although possibly used by special operations forces. Such forces, however, now have portable cryptographic equipment. Morse code is still used by military forces of former Soviet Union countries.

Specialists scan radio frequencies for character sequences (e.g., electronic mail) and facsimile.


[edit] Signaling channel interception
A given digital communications link can carry thousands or millions of voice communications, especially in developed countries. Without addressing the legality of such actions, the problem of identifying which channel contains which conversation becomes much simpler when the first thing intercepted is the signaling channel that carries information to set up telephone calls. In civilian and many military use, this channel will carry messages in Signaling System 7 protocols.

Retrospective analysis of telephone calls can be made from call detail records (CDR) used for billing the calls.


[edit] Monitoring friendly communications
More a part of communications security than true intelligence collection, SIGINT units still may have the responsibility of monitoring one's own communications or other electronic emissions, to avoid providing intelligence to the enemy. For example, a security monitor may hear an individual transmitting inappropriate information over an unencrypted radio network, or simply one that is not authorized for the type of information being given. If immediately calling attention to the violation would not create an even greater security risk, the monitor will call out one of the BEADWINDOW codes[9] used by Australia, Canada, New Zealand, the United Kingdom, the United States, and other nations working under their procedures. Standard BEADWINDOW codes (e.g., "BEADWINDOW 2") include:

Position: (e.g., disclosing, in an insecure or inappropriate way, "Friendly or enemy position, movement or intended movement, position, course, speed, altitude or destination or any air, sea or ground element, unit or force.
Capabilities: "Friendly or enemy capabilities or limitations. Force compositions or significant casualties to special equipment, weapons systems, sensors, units or personnel. Percentages of fuel or ammunition remaining."
Operations: "Friendly or enemy operation – intentions progress, or results. Operational or logistic intentions; mission participants flying programmes; mission situation reports; results of friendly or enemy operations; assault objectives."
Electronic warfare (EW): "Friendly or enemy electronic warfare (EW) or emanations control (EMCON) intentions, progress, or results. Intention to employ electronic countermeasures (ECM); results of friendly or enemy ECM; ECM objectives; results of friendly or enemy electronic counter-countermeasures (ECCM); results of electronic support measures/tactical SIGINT (ESM); present or intended EMCON policy; equipment affected by EMCON policy."
Friendly or enemy key personnel: "Movement or identity of friendly or enemy officers, visitors, commanders; movement of key maintenance personnel indicating equipment limitations."
Communications security (COMSEC): "Friendly or enemy COMSEC breaches. Linkage of codes or codewords with plain language; compromise of changing frequencies or linkage with line number/circuit designators; linkage of changing call signs with previous call signs or units; compromise of encrypted/classified call signs; incorrect authentication procedure."
Wrong circuit: "Inappropriate transmission. Information requested, transmitted or about to be transmitted which should not be passed on the subject circuit because it either requires greater security protection or it is not appropriate to the purpose for which the circuit is provided."
Other codes as appropriate for the situation may be defined by the commander.
In WWII, for example, the Japanese Navy made possible the interception and death of the Combined Fleet commander, Admiral Isoroku Yamamoto, by BEADWINDOW 5 and 7 violations. They identified a key person's movement over a low-security cryptosystem.


[edit] ELINT
ELINT stands for ELectronic Signals INTelligence, and refers to intelligence-gathering by use of electronic sensors. Its primary focus lies on non-communications signals intelligence. The Joint Chiefs of Staff define it as "Technical and geolocation intelligence derived from foreign noncommunications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources."[2]

Signal identification is performed by analyzing the collected parameters of a specific signal, and either matching it to known criteria, or recording it as a possible new emitter. ELINT data are usually highly classified, and are protected as such.

The data gathered are typically pertinent to the electronics of an opponent's defense network, especially the electronic parts such as radars, surface-to-air missile systems, aircraft, etc. ELINT can be used to detect ships and aircraft by their radar and other electromagnetic radiation; commanders have to make choices between not using radar (EMCON), intermittently using it, or using it and expecting to avoid defenses. ELINT can be collected from ground stations near the opponent's territory, ships off their coast, aircraft near or in their airspace, or by satellite.


[edit] Complementary relationship to COMINT
Combining other sources of information and ELINT allows traffic analysis to be performed on electronic emissions which contain human encoded messages. The method of analysis differs from SIGINT in that any human encoded message which is in the electronic transmission is not analyzed during ELINT. What is of interest is the type of electronic transmission and its location. For example, during the Battle of the Atlantic in World War II, Ultra COMINT was not always available because Bletchley Park was not always able to read the U-Boat Enigma traffic. But "Huff-Duff" (High Frequency Direction Finder) was still able to find where the U-Boats were by analysis of radio transmissions and the positions through triangulation from the direction located by two or more Huff-Duff systems. The Admiralty was able to use this information to plot courses which took convoys away from high concentrations of U-Boats.

Yet other ELINT disciplines include intercepting and analyzing enemy weapons control signals, or the Identification, friend or foe responses from transponders in aircraft used to distinguish enemy craft from friendly ones.


[edit] Role in air warfare
A very common area of ELINT is intercepting radars and learning their locations and operating procedures. Attacking forces may be able to avoid the coverage of certain radars, or, knowing their characteristics, electronic warfare units may jam radars or send them deceptive signals. Confusing a radar electronically is called a "soft kill", but military units will also send specialized missiles at radars, or bomb them, to get a "hard kill".

Knowing where each surface-to-air missile and anti-aircraft artillery system is and its type means that air raids can be plotted to avoid the most heavily defended areas and to fly on a flight profile which will give the aircraft the best chance of evading ground fire and fighter patrols. It also allows for the jamming or spoofing of the enemy's defense network (see electronic warfare). Good electronic intelligence can be very important to stealth operations; stealth aircraft are not totally undetectable and need to know which areas to avoid. Similarly, conventional aircraft need to know where fixed or semi-mobile air defense systems are so that they can shut them down or fly around them.


[edit] ELINT and ESM
Electronic Support Measures (ESM) are really ELINT techniques, but the term is used in the specific context of tactical warfare. ESM give the information needed for Electronic Attack (EA) such as jamming. EA is also called Electronic Counter-Measures. ESM provides information needed for Electronic Counter-Counter Measures (ECCM), such as understanding a spoofing or jamming mode so one can change one's radar characteristics to avoid them.


[edit] ELINT for meaconing
Meaconing[10] is the combined intelligence and electronic warfare of learning the characteristics of enemy navigation aids, such as radio beacons, and retransmitting them with incorrect information. There are tales, perhaps apocryphal, that the meaconing was so confusing that an enemy aircraft landed, quite smoothly, at an airport of the other side.


[edit] FISINT
Main article: FISINT
FISINT (Foreign instrumentation signals intelligence) is a sub-category of SIGINT, monitoring primarily non-human communication. Foreign instrumentation signals include (but not limited to) telemetry (TELINT), tracking systems, and video data links. TELINT is an important part of national means of technical verification for arms control.


[edit] Counter-ELINT
Still at the research level are techniques that can only be described as counter-ELINT, which would be part of a SEAD campaign. It may be informative to compare and contrast counter-ELINT with ECCM.


[edit] SIGINT versus MASINT
Main article: MASINT
Signals intelligence and Measurement and Signature Intelligence (MASINT) are closely, and sometimes confusingly, related.[11] The signals intelligence disciplines of communications and electronic intelligence focus on the information in those signals themselves, as with COMINT detecting the speech in a voice communication or ELINT measuring the frequency, pulse repetition rate, and other characteristics of a radar.

MASINT also works with collected signals, but is more of an analysis discipline. There are, however, unique MASINT sensors, typically working in different regions or domains of the electromagnetic spectrum, such as infrared or magnetic fields. While NSA and other agencies have MASINT groups, the Central MASINT Office is in the Defense Intelligence Agency (DIA).

Where COMINT and ELINT focus on the intentionally transmitted part of the signal, MASINT focuses on unintentionally transmitted information. For example, a given radar antenna will have sidelobes emanating from other than the direction in which the main antenna is aimed. The RADINT (radar intelligence) discipline involves learning to recognize a radar both by its primary signal, captured by ELINT, and its sidelobes, perhaps captured by the main ELINT sensor, or, more likely, a sensor aimed at the sides of the radio antenna.

MASINT associated with COMINT might involve the detection of common background sounds expected with human voice communications. For example, if a given radio signal comes from a radio used in a tank, if the interceptor does not hear engine noise or higher voice frequency than the voice modulation usually uses, even though the voice conversation is meaningful, MASINT might suggest it is a deception, not coming from a real tank.

See HF/DF for a discussion of SIGINT-captured information with a MASINT flavor, such as determining the frequency to which a receiver is tuned, from detecting the frequency of the beat frequency oscillator of the superheterodyne receiver.


[edit] Defensive signals intelligence
This article contains instructions, advice, or how-to content. The purpose of Wikipedia is to present facts, not to train. Please help improve this article either by rewriting the how-to content or by moving it to Wikiversity or Wikibooks.

There are a number of ways that a person or organization can defend against signals intelligence. There is a delicate balance between the level of protection and the actual threat, as expressed in the clichés about "tinfoil hats".

One must begin by defining the threat. It is considerably more difficult to defend against detection that one is signaling, as opposed to defending against an opponent discovering the content of the transmitted message. Appropriate encryption can protect against content interception, but protecting against signal detection, especially with a capable opponent, requires measures to make the signal hard to detect – which can also make it difficult for the intended recipient to receive the signal. Any defensive program needs to consider the nature of the threat and the capabilities of the opponent.


[edit] Strong and well-managed encryption
While encryption is discussed at length in other articles, it should not be forgotten that if one wants to protect messages and files, encryption is central to the defense. As important as the encryption process itself may be, it is vulnerable if the cryptographic keys are not strong and protected, and, on computers, that the cleartext is deleted when not needed. Seemingly obvious, but too often neglected, is making a practice of having as little cleartext hard copy as possible.


[edit] Appropriate transmission security
When using radio transmitters, use directional antennas that have as little "spillover" into sidelobes as possible. If it is most important to hide the location of a transmitter, the minimum is to cable the antennas as far as possible away from the transmitter proper. In many circumstances, aiming the antenna upward to a satellite will help hide its location.

The amount of total transmission power needs to be minimized, and the power preferably should be split into multiple and changing frequencies using spread spectrum techniques. If possible, avoid transmitting when hostile SIGINT satellites or monitoring aircraft are overhead.

If in an urban area, avoid using regular commercial power to transmit. There are ways in which the signal can "leak" into power and ground lines. The adversary may turn off power to an area, which will tell him there is a line-operated transmitter if the transmission stops, and that there is a battery-powered transmitter if it continues.

Use highly variable transmission schedules and vary frequencies if technically possible. Also see low probability of intercept.


[edit] Appropriate receiving security
If Operation RAFTER-style intercept is a threat, protect against this form of unintentional radiation MASINT by using optoisolators or other shielded techniques (e.g., waveguides) to bring in the radio frequency received signal, and shield the local oscillator and intermediate frequency stages in the superheterodyne receiver. This technique should be far less effective against the new generation of software-defined radio.

Unintentional radiation on power or ground circuits is a threat here as well; use appropriate TEMPEST or other techniques.


[edit] Protection against compromising emanations
There are risks that electronic, acoustic, or other information could "leak" from a computer system or other electronic communications devices.


[edit] The risk
Understanding details of the risks requires a substantial knowledge of electronics, but a simple example might serve. Many people have put a radio receiver near a computer, to listen to music as they work, and discovered that the radio suffered clicks, squeals, and other interference. These interfering signals are radiating from various parts of the computer, especially its display but often also from the power and grounding system. TEMPEST is the name for one family of protective measures against an opponent intercepting these emanations and extracting sensitive information from them.

While not strictly within the scope of protecting against "leakage", a place where sensitive information is processed or discussed needs protection against hidden microphones, wiretaps, and other "bugging". Sometimes, an electronic sweep to verify TEMPEST compliance reveals the presence of hidden transmitters. Again, there is probably more suspicion than reality in most cases. A member of a crime organization, in the middle of a nasty divorce, or a foreign intelligence agent might have reason to worry, but, even with the serious questions about warrantless surveillance in the US and other countries, there is little reason for someone to go to the risk and expense of illegal surveillance on an ordinary citizen. TEMPEST is usually associated with direct electromagnetic radiation from the device, either free-space or through power and ground lines. TEMPEST generically talks about acoustic isolation, but that is fairly easily solved through physical security and noise damping, as well as searches for microphones.

There are several threats that have not been officially defined in the unclassified literature. Nevertheless, there are some informed guesses:[12]

NONSTOP is a threat that involves some type of coupling of compromising RF energy from a classified system, which "leaks" into an independent RF-transmitting or -recording device such as cell phones, PDAs, pager, alarm systems. Commercial AM/FM radios are not considered a risk.
HIJACK is a similar threat of coupling, but to some type of digital computer or related equipment.
TEAPOT is a very different vulnerability, which appears to apply to incidental audio modulation of the backscatter from an RF, typically microwave, directed into the secure area. A passive resonant cavity bug of this type was discovered in a Great Seal of the United States presented by the USSR, but containing a resonant cavity with a wall that moved with sound in the room, thus imposing frequency modulation onto the backscattered signal.

[edit] Mitigation and countermeasures
The word TEMPEST itself, and its meaning, are unclassified. Some of the techniques for measuring the compliance of a piece of equipment, or whether it is actually emitting compromising emanations, are classified. A good deal of the information has come into public view either through Freedom of Information Act queries,[13] books talking about interception techniques, inferences drawn from partially released documents, and straightforward thinking by electronic engineers. Some documents released fully or partially under FOIA:

Red/Black Installation Guidance[14]
Specification for Shielded Enclosures[15]
Specification for Shielded Enclosures (partially redacted)[16]
A number of individuals have made a hobby of ferreting out TEMPEST and related information,[17] and firms in the broader-than-TEMPEST business of Technical Surveillance Countermeasures TSCM also reveal concepts.[18]


[edit] Protection against side channel attacks and covert channels
A side channel attack is an unintentional vulnerability of an encryption device, not related to the encryption algorithm.[19] Potential vulnerabilities include different processing and thus transmission speeds for blocks of plaintext with certain statistical characteristics, changes in power consumption, or compromising emanations.

Covert channels are deliberate means to elude communications security.[20] They send out an unauthorized signal by stealing bandwidth from a legitimate, often encrypted channel. One low-bandwidth method would be to send information by varying the inter-block transmission times. A steganographic covert channel might use the low-order bit of pixels in a graphic image, perhaps not even consecutive pixels, in a manner that would not be obvious to a person looking at the graphic.


[edit] See also
Canadian Forces Intelligence Branch
Central Intelligence Agency Directorate of Science & Technology
Communications security (COMSEC)
ELINT Electronic intelligence
GEOINT Geospatial Intelligence
HUMINT Human intelligence
IMINT Imagery intelligence
List of intelligence gathering disciplines
MASINT Measurement and Signature Intelligence
Millimeter wave
Narus SIGINT hardware manufacturer referred to in Hepting vs. AT&T
National Security Agency
OSINT Open Source Intelligence
Quantum teleportation
Radio Reconnaissance Platoon
RAF Intelligence
SIGINT by Alliances, Nations and Industries
SIGINT in Modern History
Signals intelligence operational platforms by nation
Traffic analysis

[edit] References
^ Lee, Bartholomew. "Radio Spies – Episodes in the Ether Wars". http://www.trft.org/TRFTPix/spies9eR2006.pdf. Retrieved on 2007-10-08.
^ a b c d US Department of Defense (12 July 2007) (PDF), Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms, http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf, retrieved on 2007-10-01
^ a b Kopp, Carlo (June/July/August, 1993). "Desert Storm: The Electronic Battle". Australian Aviation. http://www.ausairpower.net/Analysis-ODS-EW.html. Retrieved on 2007-09-30.
^ "Precision SIGINT Targeting System (PSTS)", Intelligence Research Program (Federation of American Scientists), http://www.fas.org/irp/program/process/psts.htm
^ Whitlock, Duane (Autumn 1995). "The Silent War against the Japanese Navy". http://www.ibiblio.org/pha/ultra/nwc-01.html. Retrieved on 2007-09-30.
^ 743d Military Intelligence (MI) Battalion (August 1999). "Warfighter Guide to Intelligence 2000". Joint Spectrum Center, (US) Defense Information Services Agency. http://www.gordon.army.mil/AC/Fall/Fall%2001/JSCmtrc.htm. Retrieved on 2007-10-26.
^ Kessler, Otto, "SIGINT Change Detection Approach" (PDF), Dynamic Database: Efficiently convert massive quantities of sensor data into actionable information for tactical commanders (Defense Advanced Research Projects Agency), http://www.darpa.mil/DARPATech2000/Presentations/tto_pdf/6KesslerDDBB&WRev1.pdf
^ Terry, I. (2003), "US Naval Research Laboratory - Networked Specific Emitter Identification in Fleet Battle Experiment Juliet", NRL Review, http://www.nrl.navy.mil/content.php?P=03REVIEW207, retrieved on 2007-10-26
^ Combined Communications-Electronics Board (CCEB) (January 1987). "ACP 124(D) Communications Instructions: Radio Telegraph Procedure" (PDF). http://www.nor.com.au/community/sarc/acp124~1.pdf. Retrieved on 2007-10-02.
^ US Army (17 July 1990), "Chapter 4: Meaconing, Intrusion, Jamming, and Interference Reporting", Field Manual 23-33, Communications Techniques: Electronic Counter-Countermeasures, FM 23-33, http://www.fas.org/irp/doddir/army/fm24-33/fm243_5.htm, retrieved on 2007-10-01
^ Interagency OPSEC Support Staff (IOSS) (May 1996). "Operations Security Intelligence Threat Handbook: Section 2, Intelligence Collection Activities and Disciplines". http://www.fas.org/irp/nsa/ioss/threat96/part03.htm. Retrieved on 2007-10-03.
^ McNamara, Joel (2002). "The Complete, Unofficial TEMPEST Information Page". http://www.eskimo.com/~joelm/tempest.html.
^ "Cryptome: various TEMPEST and related documents". 2003. http://cryptome.org/nacsim-5000.htm. Retrieved on 2007-10-16.
^ National Security Agency (2 December 1995). "NSTISSAM TEMPEST/2-95, Red/Black Installation Guidance". http://www.eskimo.com/~joelm/tempest.html. Retrieved on 2007-10-16.
^ National Security Agency (24 October 1994). "Specification NSA No. 94-106, Red/Black Installation Guidance". http://cryptome.org/nsa-94-106.htm. Retrieved on 2007-10-16.
^ National Security Agency (29 September 1993). "NSTISSI No. 7000, Tempest Countermeasures for Facilitiea". http://cryptome.org/nstissi-7000.htm. Retrieved on 2007-10-16.
^ McNamara, Joel (2004). "The Complete, Unofficial TEMPEST Information Page". http://www.eskimo.com/~joelm/tempest.html. Retrieved on 2007-10-16.
^ Granite Island Group (2005). "Technical Surveillance Countermeasures". http://tscm.com/. Retrieved on 2007-10-16.
^ Bar-El, Hagai, What are side channel attacks?, http://www.hbarel.com/Misc/side_channel_attacks.html
^ National Computer Security Center (November 1993). "NCSC-TG-030 VERSION-1 A Guide to Understanding Covert Channel Analysis of Trusted Systems ("Light Pink Book")". http://www.fas.org/irp/nsa/rainbow/tg030.htm.

[edit] Further reading
Bamford, James, Body of Secrets: How America's NSA and Britain's GCHQ eavesdrop on the world (Century, London, 2001)
West, Nigel, The SIGINT Secrets: The Signals Intelligence War, 1900 to Today (William Morrow, New York, 1988)
J.A. Biyd, D.B. Harris, D.D. King & H.W. Welch, Jr. (Editors) (1979). Electronic Countermeasures. Los Altos, CA: Peninsula Publishing (1961). ISBN 0-932146-00-7.

[edit] External links
NSA's overview of SIGINT
USAF Pamphlet on sources of intelligence
German WWII SIGINT/COMINT
Intelligence Programs and Systems
The U.S. Intelligence Community by Jeffrey T. Richelson
Secrets of Signals Intelligence During the Cold War and Beyond by Matthew Aid et. al.
Maritime SIGINT Architecture Technical Standards Handbook
[show] Links to related articles

[show]v • d • eIntelligence cycle management

Intelligence
collection
management HUMINT/
Human Intelligence Clandestine HUMINT (recruiting · operational techniques · Covert action · Direct action · Clandestine cell system)
Special reconnaissance (organizations)
Espionage (Agent handling · Black bag operation · Concealment device · Cryptography · Cut-out · Dead drop · Eavesdropping · False flag operations · Honeypot · Non-official cover · Interrogation · Numbers messaging · One-way voice link · Steganography · Surveillance)

SIGINT/
Signals Intelligence SIGINT by Alliances, Nations and Industries · SIGINT Operational Platforms by Nation · SIGINT in Modern History · TEMPEST · Direction finding · Traffic analysis

MASINT/
Measurement and
Signature Intelligence Electro-optical · Nuclear · Geophysical · Radar · Radiofrequency · Materials · Casualty estimation

Others OSINT/Open Source Intelligence · IMINT/Imagery Intelligence · FININT/Financial Intelligence · TECHINT/Technical intelligence


Intelligence
analysis
management Intelligence analysis · Cognitive traps for intelligence analysis · Words of Estimative Probability · Analysis of Competing Hypotheses · Intelligence cycle (target-centric approach)

Intelligence
dissemination
management Intelligence cycle security · Counter-intelligence · Counter-intelligence and counter-terrorism organizations · List of counterintelligence organizations · Counterintelligence failures

[show]v • d • eSignals intelligence agencies

DSD
CSE
NSEI
FIRE

DGSE
BND
JCB
DIH

AIVD
GCSB
GRU
NCC

FRA
SIS
GCHQ
NSA







Retrieved from "http://en.wikipedia.org/wiki/Signals_intelligence"
Categories: Cryptography | Military acronyms | Military intelligence | Intelligence gathering disciplines | Signals intelligence | Intelligence (information gathering)
Hidden categories: All pages needing cleanup | Wikipedia articles needing clarification from March 2008 | All articles with unsourced statements | Articles with unsourced statements from February 2008 | Articles containing how-to sectionsViewsArticle Discussion Edit this page History Personal toolsLog in / create account Navigation
Main page
Contents
Featured content
Current events
Random article
Search
Interaction
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
Donate to Wikipedia
Help
Toolbox
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Cite this page
Languages
Deutsch
Español
Français
Italiano
Magyar
Nederlands
日本語
‪Norsk (bokmål)‬
Português
Slovenščina
Suomi
Svenska
Türkçe

This page was last modified on 1 July 2009 at 21:00. Text is available under the Creative Commons Attribution/Share-Alike License; additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization. Privacy policy About Wikipedia Disclaimers

Tuesday, July 28, 2009

fyi--

Sign up | Log inJoin the Copyfight. Support isoHunt's legal defense from MPAA and CRIA.You can use boolean operators (-, |, OR), wildcards (*, ?), and phrase search (") in your query
For BitTorrent: Type in a 40 characters info_hash, to search for that particular torrent and browse all trackers tracking it
BitTorrent|Releases|Tickets

Browse|Add this search and API to your site
Site
News
Toolbar, Widgets, API
T-Shirts
Read Me
Copyrights
IRC chat
Translate
Advertise
Forum
Index
Search
New posts
Active posts
Latest
Torrent files
Torrent sites
Directory
Zeitgeist
Releases
All
Video
TV
Audio
Music Video
Games
Apps
Pictures
Anime
Comics
Books
Post new release




Active torrents indexed from websites and trackers across the internet Sites: 499 • Trackers: 99624 • Active Torrents: 2067316 • Files: 54.24 mil • Size: 1713.41 TB • Peers: 21.13 mil
» Browse All Torrents » "Dylan Encyclopedia" » The Mind Control And Manipulation CD-ROM » Summary







Last updated: 402.4 hours agoIndexed tags: Articles
Torrents on isoHunt are indexed and cached from hundreds of sites, and enhanced by aggregating identical torrents from multiple sites to give you torrents that are always updated with the latest active trackers, so your BitTorrent client can find the most peers to download with.

Tip: On dead torrents you find elsewhere, you can search for its info_hash here (40 characters string), which gives you the same torrent with oftentimes more trackers and peers to bring your torrent back to life. Download .torrent (You need Vuze or uTorrent software for this link to start P2P download)
or download .torrent from: www.mininova.org and find comments elsewhere

(?)



Summary (1) Comments (1) More On Usenet Web Comments elsewhereGametabTrackers: (aggregated from BitTorrent sites everywhere for reliability and speed)
Tracker up, last checked 1.3 hours ago
16 seeds, 7 leechers, 3 downloads
http://open.tracker.thepiratebay.org:80/announceopen.tracker.thepiratebay.org:80/announc...: 16 seeds
Tracker up, last checked 1.1 hours ago
15 seeds, 5 leechers, 12 downloads
http://91.191.138.2:80/announce91.191.138.2:80/announce: 15 seeds
Tracker down, last changed 17.6 hours ago
6 seeds, 3 leechers, 35 downloads
http://tracker.mightynova.com:4315/announcetracker.mightynova.com:4315/announce: 6 seeds
Tracker down, last changed - hours ago
? seeds, ? leechers, ? downloads
Original, primary tracker
http://conspiracycentral.net:6969/announceconspiracycentral.net:6969/announce: ? seeds

Uploader's Comments:
The Mind Control and Manipulation CD-ROM
Document Archives

This CD-ROM is meant to be a comprehensive research archive for documents and articles related to mind control... Subjects include
Psychiatry and Psychology, Eugenics, Depopulation, Project Paperclip, CIA Mind Control, MK-Ultra, Biological Warfare and
Depopulation, Electromagnetics, Nanotechnology, Neuro Linguistic Programing, Hypnosis, Implants, Satanic Ritual Abuse,
Psychological Operations, Neuroscience, and many other related topics. There are 8 Main Sections, each containing books, articles,
web archives and image scans, all of which are compressed into RAR containers. Highly recommended research for all conspiracy
researchers...

Document Files Include:


Anti-Psychiatry
------------------

Citizen's Commission on Human Rights and Freedom - 26 Issues

Analyzing and Deconstructing Psychopathology.pdf
Anti-Psychiatry and The Search for Autonomy.mht
Anti-Psychiatry's Journal - MindFreedom.mht
Cultures of Psychiatry and Mental Health Care.htm
Freedom Magazine - The Hand Of Violence.pdf
Hervey Cleckley - The Mask of Sanity.pdf
How to Treat Postpartum Depression.mht
Madness, Heresy & The Rumor of Angels.pdf
Mindless Psychiatry and Dubious Ethics.pdf
Psychiatric Slavery - Thomas Szasz.djvu
Psychiatric Torment - Chapter 4.pdf
Psychiatry and Confession - Color.pdf
Saxzy Pridmore - Madness of Psychiatry.pdf
The American Journal Of Psychiatry - Schizophrenia.pdf
The Theology of Medicine - Thomas Szasz.djvu
TOC - Anti-psychiatry Reading Room.mht


Artificial Intelligence
------------------------

Ben Görtzel - The Structure of Intelligence
Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms
IDEA - Artificial Neural Networks in Real life Applications - 2005 Nov
Neural Nets by Kevin Gurney (Easy) - Bio-Computer Science

(ANN) Neural Nets Intro(Frohlich).pdf
AI Application Programming 2003.chm
Artificial Intelligence and Software Engineering.pdf
Artificial Neural Network Technologies.pdf
Basic Neural Mechanisms in Behavior.pdf
C Neural Networks and Fuzzy Logic[1995].chm
CRC Press - Artificial Intelligence and Expert Systems for Engineers.pdf
Derek Partridge - Neural Networks and Software Engineering.pdf
Foundations of Neural Networks, Fuzy Logic and Knowledge Engineering.pdf
Gerhard Weisse - Multi Agent Systems.pdf
Kalman Filtering and Neural Networks.pdf
Mathematics - A Tutorial on Learning Bayesian Networks.pdf
Mathematics-An.Introduction.to.Neural.Networks-1996.pdf
MIT - Multiagent Systems - A Modern Approach to Distributed Artificial Intelligence.pdf
Neural Networks - Algorithms, Applications, and Programming Techniques.pdf
Springer-Verlag Genetic Programming Theory and Practice II.pdf
Stuart Russell & Peter Norvig - Artificial Intelligence - A Modern Approach.pdf
The MIT Press An Introduction to Genetic Algorithms.pdf
The.Handbook.of.Brain.Theory.and.Neural.Networks.SE-2003.pdf


Bio-Electromagnetics
-------------------------

Bioelectricmagnetism
Electromagnetics Handbook

About Electronic Weapons Technology.pdf
Covert War Weapons Industry in the USA.pdf
Decoding Minds, Foiling Adversaries - Sheron Barron.htm
Definitions - Electronic Waves - Extremely Low Frequency.mht
DeepBlackLies - ASPECTS OF ANTI PERSONNEL ELECTROMAGNETIC.htm
Digital Signal Processing to Audio and Acoustics.pdf
Electromagnetic Radiation Spectrum (Definitions, Symptoms, Testing).htm
FM Modulated Power Implants - Low Power Transmitters.mht
Government Mind Control - Electromagnetic Radiation.htm
History of Electronic Mind Control - Chemtrails, HAARP, EMR.htm
How The NSA Harasses Thousands Of Law Abiding Americans.mht
Human Perception Of Illumination - Ultrahigh-Frequency Electromagnetic Energy.htm
Illustrated Electromagnetic Spectrum - X-Rays, Gamma Rays, UV Rays.mht
Implant Technology - Hippocampus Electrical Stimulation - Clinical Research.pdf
Invisible Warfare - Maxwell's Silver Hamme - By Dr. Robert Beckerr.htm
Laws Against The Illegal Use of Electromagnetic Weapons.pdf
Mechanising the Mind - Brave New World of ESB.htm
Medical Study on Effects of ELF - Article.pdf
Microwave Congruence - Induced Schizophrenia.pdf
Microwave Harassment and Mind Control Experimentation.mht
Microwave Harassment and Mind-Control Experimentation pt_ 2.mht
Microwave Transistor Amplifiers - Analysis And Design.pdf
Microwaves and Behavior - DON R. JUSTESEN.htm
Mind Control - Frequency Weapons Are Real.pdf
Modern Antenna Design SE - Thomas Milligan 2005.pdf
Modulated Electromagnetic Energy.htm
New World Order - ELF Psychotronic Tyranny.htm
New Tesla Electromagnetics and the Secrets of Electrical Free Energy.pdf
Non-Lethal Weapons - Contributing To Psychological Effects.pdf
Non-Lethal Weapons - Council on Foreign Relations CFR.pdf
Orion Technology and Other Secret Projects.htm
Philadelphia Experiment.htm
Practical RF Circuit Design - Volume 2.pdf
Project L.U.C.I.D. by Texe Marrs.htm
Proof of Remote Mind Control by William Cooper.htm
Radio Waves and Life - Full Article by Tom Jaski.htm
Remote Mind Control Technology - by Anna Keeler.htm
RF Design Guide - Systems, Circuits and Equations.pdf
Remote Control Electronic Brain Punishment.htm
Remote Mind Control Technology.htm
Sensation Of Hearing In EM Field - Clyde E Ingalls.htm
Technology, Mind Control, and Free Will.pdf
Tesla Electromagnetics and the Secrets of Electrical Free Energy.pdf
The Body Electric - Electromagnetism and the Foundation of Life.pdf
The Brainwashing Manual - By L. Ron Hubbard.pdf
The Philadelphia Experiment, The Montauk Project.htm
Unclassified and Commercial Mind Control Technology.htm
US Patent 5,159,703 - Subliminal Presentation System.mht
Whats On Your Mind - by M Pilkington 02-01-2000.htm


Bio-Ethics and Eugenics
-----------------------------

Charles Darwin - Origin of The Species
Charles Darwin - The Descent of Man
Chrales Darwin - The Autobiography
The Autobiography of Charles Darwin
The American Journal of Bioethics
The Report From Iron Mountain

AIDS As Biological & Psychological Warfare.mht
AIDS, MURDER OR MYSTERY - Article and Documents.htm
California Connection - Eugenics in Germany and The US.mht
Charles Darwin - The Origin of Species - The Descent of Man.pdf
Denver International Airport - Infanticide Murals.htm
Depopulation Plan - Unedited UN Document.pdf
Dr Gary Null and Others - Death by Medicine, Part I.html
Eugenics, US Congress Logo 1921 (propaganda).png
False Science - EUGENICS WATCH - Online Webpage.mht
Francis Galton - Wikipedia, The Online Encyclopedia.doc
German National Socialism and Eugenics - History of Genocide.mht
Hepatitis B Vaccine Experiment - Government AIDS Source.mht
HOUSE OF REPRESENTATIVES AIDS BILL 15090.pdf
In the Name of Science - Biologists in Nazi Atrocities.mht
International Farben Cartel - The Devil’s Chemists P1.pdf
International Farben Cartel - The Devil’s Chemists P2.pdf
Josef Mengele, Nazi doctor - The Crime Library.mht
Kissinger and Rockefeller - The Origins of AIDS and Ebola.doc
McDonaldization Of Society - with George Ritzer.htm
The Medical Mafia - Ghislaine Lanctot.pdf
Meeting Doctor Doom - The Citizen Scientist.mht
Post World War II - Eugenic Science.mht
Post-World War II - Reccruitment of German Scientists.txt
Racial Degeneration - Huxley and Wells.mht
Richard Dawkins - Blind Watchmaker.pdf
Selective Impairment of Reasoning.pdf
The Center for Evolutionary Psychology.mht
The Depopulation of a Planet - 1995.pdf
The Depopulation of Planet Earth.mht
The History of Eugenic Science.mht
The Population Control Agenda.pdf
The History of Eugenic Science.mht


MK-Ultra and Trauma Based
----------------------------------

CKLN-FM Mind Control Series
Dr. Ewen Cameron
Fritz Springmeier
John Rappoport
Johnny Gosch
Mindnet Journals
Proect Paperclip
Satanic Ritual Abuse
The Bohemian Grove
The Montauk Project
Walter Bowart

1977 Senate Hearing on MKULTRA.pdf
Biography - Doctor Josef Mengele.mht
Brice Taylor - Thanks For The Memories
CIA Mind Control - Project Monarch History.txt
Charles Stone - Beyond Mind Control
DID - What is Disassociative Identity Disorder.htm
Donald Kalsched - The Inner World of Trauma.html
Excerpts From Operation Mind Control - WH Bowart.htm
Free Thinking - Radio Free Michigan Newsletter.doc
Fundamentals of Trauma Based Mind Control.mht
Government Mind Control Techniques - Forum Archive.htm
History Of Mind Control - Walter Bowart Interview.htm
IG Farben, Floridation - Mind Control for the Masses.pdf
In Your Head - Experiments into Remote Mind Control Technology.pdf
Interview with Alex Christopher By Dave Allan - Pandoras Box 1 and 2.htm
Jim Keith - Mind Control, World Control - The Encyclopedia of Mind Control.pdf
Johnny Gosch's Kidnapping Back in the News - conspiracy.research.org.mht
Jonestown Massacre - CIA Mind Control Run Amok.pdf
Journey Into Madness - Mind Control and Medical Abuse.htm
Mind Control - By Harry V. Martin and David Caul.htm
Mind Control - Covert Operations of the NSA.pdf
Mind Control and MK-ULTRA - Richard G Gall.htm
Mind Control Articles - Totse.com.mht
Mind Control Forums - Complete Book List.mht
Mind Control Forums - Web Archives 1993-2004.pdf
Mind Control Operations at Stanford Research Institute.htm
Mind Control REFERENCE Archives - Radio Free Michigan.doc
Mind Control Slavery and the New World Order - Uri Dowbenko.mht
Mind Control Using Holography and Disassociation - 2005.pdf
MK-ULTRA Materials and Methods - CIA Documents 1955.pdf
MK-ULTRA Program and Government Electronic Mind Control.mht
NEXUS Mind Control - Brave New World - Part One - Nick Begich.htm
Operation Monarch - Where have all the Children Gone - Mark Philips.htm
Persuasion and Brainwashing Techniques - The Battle For Your Mind.doc
Project Mk-Ultra, The CIAs Program of Research In Behavioral Modification.pdf
Project Superman - The Andy Pero Story - Nazi Mind Control At Montauk.pdf
PsychoPolitics - Synthesis Of The Russian Art Of Brainwashing - Part 1.htm
PsychoPolitics - Synthesis Of The Russian Art Of Brainwashing - Part 2.htm
Secret Government Mind Control Project - Super Warrior Gone Rogue.htm
Sex, Lies, and Mind Control - Cathy O'Brien - On Anti-Shyster.htm
Such Things Are Known - CIA Mind Control - Dorothy Burdick.htm
Terror and Chaos - Citizen's Commission on Human Rights and Freedom.pdf
Terrorism - Defusing the Ticking Time Bomb - Arguments Against Torture.pdf
The Aviary - Psychic Warfare and Non-Lethal Attacks Background.htm
The Controllers - Martin Cannon - Mind Control And The UFO Phenomenon.doc
The Government Psychiatric Torture Site - MK-Ultra, The CIA and Radiation.mht
The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave.pdf
The Invisible Third World War - WH Bowart and Richard Sutton.htm
The Mind Has No Firewall - Foreign Military Studies Office 1998.mht
The Psychology of Torture - Sam Vaknin Article 1995.mht
The Search For The Manchurian Candidate 1978 - John Marks.rtf
Thomas Porter - Mind Control and the Secret State 1996.htm
Trance-Formation of America - Mark Philips and Cathy O'Brien.pdf
Underground Nazi Invasion of the United States - Brantonia.htm
Walter Bowart - Operation Mind Control - Chapter Four.mht
War Against The Mind - by Colin Ross - PsychicAssault.org.htm


Nanotechnology
-------------------

Morgellons Special
Images Archive

An Overview Of Recent Developments In Nanotechnology.pdf
Bacteria & Virus Nanofibres.pdf
Biomaterials Project 2006_05_15.pdf
Carbon Nanotube Sensors.pdf
Carbon Nanotuibes 6_20_001.pdf
Considering Military and Ethical Implications of Nanofactory Level Nanotechnology.htm
CRC Press - An Introduction To Micro And Nanotechnology.pdf
Essays on Nanotechnology Implications.htm
From The Enlightenment to N-Lightenment.htm
Global Research.ca - The Militarization of Neuroscience.mht
Journal of Nanobiotechnology.pdf
Nanotechnology White Paper Final - February - 2007.pdf
Nano7_19_195103 Intracellular.pdf
Nano 7_17_175101 Thermal Heating of Tumors.pdf
Nano 7_17_175103 CT Nanoparticles.pdf
Nano Patterned Titanium Ortho Abstract.pdf
Nano Sbir 2003 Grants.pdf
NanoBiotech Bionic Ear 1982 Australia.pdf
Nanoparticle Toxicity Tests.pdf
Nanotech Basics - KurzweilAI.net.htm
Nanotechnology Dangers and Defenses.htm
Nanotech Nanotech Biomaterials.pdf
Nanowire Transistors.pdf
Organic Optoelectronic Devices.pdf
Self Assembled Nanotube Transistors.pdf


Neuroscience
----------------

Jose Delgado - Physical Control Of The Mind 1971
Principles of Neurology 8th - 2005 Adams and Victor's
Theoretical Neuroscience Textbook - December 2001

A Color Atlas of Neurology.pdf
An Introduction to Brain and Behavior SE.pdf
Atlas of Neuranatomy and Neurophysiology.pdf
Brain Computer Interface - Melody Moore.pdf
Brain Implants - Kurzeillian Future.mht
Brain, Vision, Memory - Charles G. Gross.pdf
Brain Transmitters - What They Are.htm
Computational Explorations In Cognitive Neuroscience.PDF
Consciousness In Four Dimensions - Biological Relativity and the Origins of Thought.pdf
Digital Signal Processing to Audio and Acoustics.pdf
Elektor Electronics - February 2007.pdf
Elements of Molecular Neurobiology 3d ed - C. U. M. Smith.pdf
Essential Sources in the Scientific Study of Consciousness.pdf
From NEUROSCIENCE To NEUROLOGY.pdf
Gale Encyclopedia of Psychology 2nd ed., 2001.pdf
Implant Technology - Hippocampus Electrical Stimulation.pdf
Injectable Chip Opens Door to Human Bar Code - By Charles J Murray.htm
Jose Delgado - Hypothesis - Toward a Psychocivilized Society.htm
Mechanising the Mind - The Brave New World of ESB.htm
Microwave Transistor Amplifiers - Analysis And Design.pdf
Modern Antenna Design SE - Thomas Milligan 2005.pdf
Neurological Foundations of Cognitive Neuroscience - Mark D'Esposito.pdf
O_A_K_ New Physics-Sythetic Telepathy and the Early Mind Wars.mht
Practical RF Circuit Design - Volume 2 - Active Circuits and Systems.pdf
Radio Waves and Life - by Tom Jaski.htm
Remote Control Electronic Brain Punishment.htm
The Race for Consciousness - John Taylor 2001.pdf
Theoretical Neuroscience Computational and Mathematical Modeling of Neural Systems.pdf
Visions Of Mind - Architectures For Cognition And Affect.pdf


Neuro Linguistic Programming
-----------------------------------

Adavanced Language Programming.doc
Body Language, by Allan Pease.pdf
Confusion Inducing Questions.doc
Don Mottin - Advanced Hypnotic Techniques.pdf
Four New Hypnotic Language Patterns.doc
How to Make Anyone Fall in Love with You.pdf
Hypnosis for Beginners - Dylan Morgan.pdf
Hypnotism - How To Hypnotise People.pdf
Jedi Mind Control For Dummies.pdf
Maxwell Maltz - Psycho-Cybernetics.pdf
NLP Essential Skills Handbook.pdf
NLP Master Notes - A Better World.doc
Paper - Accelerating NLP Using Meta-States.doc
Rex Sikes - Ultimate NLP Home Study Course.pdf
Richard Bandler - The Facts on NLP.doc
The Battle For Your Mind by Dick Sutphen.doc
The Non-Verbal Dictionary.pdf

3,500 Files, PDF, MHT, HTML, DOC, ZIP, RAR

650MB

Enjoy and Copy Freely!

http://conspiracycentral.net:6969
http://conspiracycentral.info/

Directory: The Mind Control And Manipulation CD-ROM

Files:
Anti-Psychiatry.rar 48.4 MB
Artificial Intelligence.rar 115.4 MB
Bio-Electromagnetics.rar 90.1 MB
Bioethics and Eugenics.rar 30.1 MB
Experimental Neuroscience.rar 253.2 MB
MK-Ultra and Trauma-Based.rar 81 MB
Nanotechnology.rar 24.4 MB
Neuro Linguistic Programming.rar 7.6 MB


650.17 MB in 8 files. Torrent created 98.7 weeks ago.

info_hash: ace0195c29edee9841c7d39fed8987ec59e56702 (?) | BTID: 94424161 | Permalink

F



-ADVERTISEMENT-



Donations for last day: $23.03
Thanks!







Stats
isoHunt has 26095 users online, 943187 members registered. Sign up now to comment!
Welcome to our newest member: KINGHAIL
Top Searches (last day)
axxo
fxg
true blood
entourage
fxm
harry potter
transformers
bruno
ice age 3
public enemies
the hangover
the ugly truth
the proposal
top gear
star trek
2009
drag me to hell
weeds
year one
michael jackson
>> More...

Add this to your site

Shout Box
You have to login to post. Use your common sense.
For debates, go to the forum.
Post or ask for site invites and you get banned.
For real-time chat, come to irc.isohunt.com, #isoHuntREAD! | Smileys

Your Message

or chat with others live on IRC

Friends
• TorrentBox
• Podtropolis

$100 coupon off server hosting
TorrentFreak
Torrents.to

FAC, CMCC
Defend Fair Use
Neutrality.ca



This site features search engines on metadata only. It is a service independent of the IRC and BitTorrent networks. Use at your own risk. FF Plugins and Widgets
Page generation: 0.03s (0% in 0 SQLs) on b03, loadavg: 6.48 © isoHunt Inc. | Privacy & Copyright Policies

Monday, July 27, 2009

मिक्रोचिप्मिंद कंट्रोल, इम्प्लान्ट्स एंड CYBERNETICS

FYI--

--------------------------------------------------------------------------------
Rense.com
--------------------------------------------------------------------------------



Microchip Mind Control,
Implants And Cybernetics

12-6-1

Actual 1974 Congressional Testimony of Dr. Jose Delgado -

"We need a program of PSYCHOSURGERY for POLITICAL CONTROL of our society. The purpose is PHISICAL CONTROL OF THE MIND. Everyone who deviates from the given norm can be SURGICALLY MUTILATED.

"The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective.

"Man does NOT HAVE THE RIGHT to develop his own mind. This kind of liberal orientation has great appeal. We must ELECTRICALLY CONTROL THE BRAIN. Some day armies and generals will be controlled by electric stimulation of the brain."

Dr. Jose M.R. Delgado Director of Neuropsychiatry Yale University Medical School Congressional Record, No. 26, Vol. 118 February 24, 1974

(Author of "PHYSICAL CONTROL OF THE MIND" 1969)


The following article was originally published in the 36th-year edition of the Finnish-language journal, SPEKULA (3rd Quarter, 1999). SPEKULA is a publication of Northern Finland medical students and doctors of Oulu University OLK (OULUN LAAKETIETEELLINEN KILTA).


MICROCHIP IMPLANTS, MINDCONTROL AND CYBERNETICS

By Rauni-Leena Luukanen-Kilde, MD Former Chief Medical Officer of Finland

In 1948 Norbert Weiner published a book, CYBERNETICS, defined as a neurological communication and control theory already in use in small circles at that time. Yoneji Masuda, "Father of Information Society," stated his concern in 1980 that our liberty is threatened Orwellian-style by cybernetic technology totally unknown to most people. This technology links the brains of people via implanted microchips to satellites controlled by ground-based super-computers.

The first brain implants were surgically inserted in 1874 in the state of Ohio, U.S.A., and also in Stockholm, Sweden. Brain electrodes were inserted into the skulls of babies in 1946 without the knowledge of their parents. In the 50's and 60's, electrical implants were inserted into the brains of animals and humans, especially in the U.S., during research into behavior modification, and brain and body functioning. Mind control (MC) methods were used in attempt to change human behavior and attitudes. Influencing brain functions became an important goal of military and intelligence services.

Thirty years ago brain implants showed up in xrays the size of one centimeter. Subsequent implants shrunk to the size of a grain of rice. They were made of silicon, later still of gallium arsenide. Today they are small enough to be inserted into the neck or back, and also intraven-ously in different parts of the body during surgical operations, with or without the consent of the subject. It is now almost impossible to detect or remove them.

It is technically possible for every newborn to be injected with a micro-chip, which could then function to identify the person for the rest of his or her life. Such plans are secretly being discussed in the U.S. without any public airing of the privacy issues involved. In Sweden, Prime Minister Olof Palme gave permission in 1973 to implant prisoners, and Data Inspection's ex-Director General Jan Freese revealed that nursing-home patients were implanted in the mid- 1980's. The technology is revealed in the 1972:47 Swedish state report, STATENS OFFICIELLA UTRADNINGER (SOU).

Implanted human beings can be followed anywhere. Their brain functions can then be remotely monitored by supercomputers and even altered through the changing of frequencies. Guinea-pigs in secret experiments have in-cluded prisoners, soldiers, mental patients, handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children and any group of people considered "marginal" by the elite experimenters. The published experiences of prisoners in Utah State Prison, for example, are shocking to the conscience.

Today's microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. Such a technique was among a number tested in the Iraq war, according to Dr. Carl Sanders, who invented the intell-igence-manned interface (IMI) biotic, which is injected into people. (Earlier during the Vietnam War, soldiers were injected with the Rambo chip, designed to increase adrenaline flow into the bloodstream.) The U.S. National Security Agency's (NSA) 20 billion bits/second supercomputers could now "see and hear" what soldiers experience in the battlefield with a remote monitoring system (RMS).

When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person's brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target's performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads.

Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its elect- romagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person's brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.

The NSA's electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical reson- ance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24 hours a day.

The Washington Post reported in in May 1995 that Prince William of Great Britain was implanted at the age of 12. Thus, if he were ever kidnapped, a radiowave with a specific frequency could be targeted to his microchip. The chips signal would be routed through a satellite to the computer screen of police headquarters, where the Princes movements could be followed. He could actually be located anywhere on the globe.

The mass media have not reported that an implanted person's privacy van- ishes for the rest of his or her life. S/he can be manipulated in many ways. Using different frequencies, the secret controller of this equip- ment can even change a person's emotional life. S/he can be made aggress- ive or lethargic. Sexuality can be artificially influenced. Thought sig-nals and subconscious thinking can be read, dreams affected and even induced, all without the knowledge or consent of the implanted person.

A perfect cyber-soldier can thus be created. This secret technology has been used by military forces in certain NATO countries since the 1980's without civilian and academic populations having heard anything about it. Thus, little information about such invasive mind-control systems is available in professional and academic journals.

The NSA's Signals Intelligence can remotely monitor information from human brains by decoding the evoked potentials (3.50HZ, 5 milliwatt) emitted by the brain. Prisoner experimentees in both Gothenburg, Sweden and Vienna, Austria have been found to have [missing word] brain lesions. Diminished blood circulation and lack of oxygen in the right temporal frontal lobes result where brain implants are usually operative. A Finnish experimentee experienced brain atrophy and intermittent attacks of unconsciousness due to lack of oxygen.

Mind control techniques can be used for political purposes. The goal of mind controllers today is to induce the targeted persons or groups to act against his or her own convictions and best interests. Zombified individ-uals can even be programmed to murder and remember nothing of their crime afterward. Alarming examples of this phenomenon can be found in the U.S.

This silent war is being conducted against unknowing civilians and sold-iers by military and intelligence agencies. Since 1980 electronic stim- ulation of the brain (ESB) has been secretly used to control people tar-geted without their knowledge or consent. All international human rights agreements forbid nonconsensual manipulation of human beings even in pri-sons, not to speak of civilian populations. Under an initiative of U.S. Senator John Glenn, discussions commenced in January 1997 about the dan-gers of radiating civilian populations. Targeting peoples brain functions with electromagnetic fields and beams (from helicopters and airplanes, satellites, from parked white vans, neighboring houses, telephone poles, electrical appliances, mobil phones, TV, radio, etc.), is part of the radiation problem that should be addressed in democratically elected government bodies.

In addition to electronic MC, chemical methods have also been developed. Mind-altering drugs and different smelling gasses affecting brain function negatively can be injected into air ducts or water pipes. Also, bacteria and viruses have been tested this way in several countries.

Today's supertechnology, connecting our brain functions via microchips (or even without them, according to the latest technology) to computers via satellites in the U.S. or Israel, poses the gravest threat to human-ity. The latest supercomputers are powerful enough to monitor the whole worlds population. What will happen when people are tempted by false premises to allow microchips into their bodies? One lure will be a micro-chip identity card. Compulsory legislation has even been secretly pro-posed in the U.S. to criminalize removal of an ID implant.

Are we ready for the robotization of mankind and the total elimination of privacy, including freedom of thought? How many of us would want to cede our entire life, including our most secret thoughts, to Big Brother? Yet the technology exists to create a totalitarian "New World Order." Covert neurological communication systems are in place to counteract independent thinking and to control social and political activity on behalf of self-serving private and military interests.

When our brain functions are already is connected to supercomputers by means of radio implants and microchips, it will be too late for protest. This threat can be defeated only by educating the public, using available literature on biotelemetry and information exchanged at international congresses.

One reason this technology has remained a state secret is the widespread prestige of the psychiatric DIAGNOSTIC STATISTICAL MANUAL IV produced by the U.S. American Psychiatric Association (APA), and printed in 18 lan-guages. Psychiatrists working for U.S. intelligence agencies no doubt participated in writing and revising this manual. This psychiatric "bible" covers up the secret development of MC technologies by labelling some of their effects as symptoms of paranoid schizophrenia.

Victims of mind control experimentation are thus routinely diagnosed, knee-jerk fashion, as mentally ill by doctors who learned the DSM symptom list in medical school. Physicians have not been schooled that patients may be telling the truth when they report being targeted against their will or being used as guinea pigs for electronic, chemical and bacteriological forms of psychological warfare.

Time is running out for changing the direction of military medicine, and ensuring the future of human freedom. -- Rauni Kilde, MD December 6, 2000 ___


MICROWAVE MIND CONTROL: MODERN TORTURE AND CONTROL MECHANISMS ELIMINATING HUMAN RIGHTS AND PRIVACY

By Dr. Rauni Leena Kilde, MD
September 25, 1999

Helsingin Sanomat, the largest newspaper in Scandinavia, wrote in the September 9, 1999 issue that Scientific American magazine estimates that after the Millenium perhaps ALL people will be implanted with a "DNA microchip".

How many people realize what it actually means? Total loss of privacy and total outside control of the person's physical body functions, men-tal, emotional and thought processes, including the implanted person's subconscious and dreams! For the rest of his life!

It sounds like science fiction but it is secret military and intelligence agencies' mind control technology, which has been experimented with for almost half a century. Totally without the knowledge of the general public and even the general academic population.

Supercomputers in Maryland, Israel and elsewhere with a speed of over 20 BILLION bits/sec can monitor millions of people simultaneously. In fact, the whole world population can be totally controlled by these secret brain-computer interactions, however unbelievable it sounds for the uninformed.

Human thought has a speed of 5,000 bits/sec and everyone understands that our brain cannot compete with supercomputers acting via satellites, implants, local facilities, scalar or other forms of biotelemetry.

Each brain has a unique set of bioelectric resonance/entrainment characteristics. Remote neural monitoring systems with supercomputers can send messages through an implanted person's nervous system and affect their performance in any way desired. They can of course be tracked and identified anywhere.

Neuro-electromagnetic involuntary human experimentation has been going on with the so-called "vulnerable population" for about 50 years, in the name of "science" or "national security" in the worst Nazi-type testing, contrary to all human rights. Physical and psychological torture of mind control victims today is like the worst horror movies. Only, unlike the horror movies, it is true.

It happens today in the USA, Japan, and Europe. With few exceptions, the mass media suppresses all information about the entire topic.

Mind control technology in the USA is classified under "non-lethal" weaponry. The name is totally misleading because the technology used IS lethal, but death comes slowly in the form of "normal" illnesses, like cancer, leukemia, heart attacks, Alzheimer's disease with loss of short term memory first. No wonder these illnesses have increased all over the world.

When the use of electromagnetic fields, extra-low (ELF) and ultra-low (ULF) frequencies and microwaves aimed deliberately at certain individ-uals, groups, and even the general population to cause diseases, disori-entation, chaos and physical and emotional pain breaks into the awareness of the general population, a public outcry is inevitable.

[Eleanor White comment: ELF/ULF frequencies on their own cannot be focussed and are practically impossible to transmit in the usual manner of radio transmissions. ELF/ULF cannot carry voice.

ELF/ULF CAN be carried on radio and ultrasound carrier signals, however, and are effective in things like setting up a target to be more receptive to hypnosis, force a target to be unable to sleep, and force a target to fall asleep daytime. This is like the reverse process of reading the brain's natural ELF/ULF electrical activity using biofeedback.]

Who is behind a sinister plan to microchip and control and torture the general population?

[Eleanor White's comment: Reports from persons targetted by neuro- electromagnetic experimentation show that not everyone is implanted. The fact that those few victims who have had implants removed cannot get custody of the implants means someone has a keen interest in controlling the use of covert implants and preventing the publication of this practice.]

The Patent Office of the U.S.A. has granted patents for purposes of mental monitoring and mind alteration.

Apparatus and method for remotely monitoring and altering brainwaves, methods for inducing mental, emotional and physical states of conscious- ness, in human beings. Method of and apparatus for desired states of consciousness are among some of them.

People who have been implanted, involuntarily or through deception vol- untarily have become bilogical robots and guinea pigs for this activity under the guise of national security.

The real consequences of microchip implantation (or with today's advanced hidden technology, using only microwave radiation for mind control,) are totally hidden from the public. How many know the real dangers of mic- rowaves through mobile phones?

How many believe the disinformation that microwave radiation is not causing health problems? The economic issues in the mobile phone industry are enormous. Therefore health issues are deliberately brushed aside.

However, the same thing is inevitable in the future as with the tobacco industry. When economic compensation for health damages becomes big enough, as in the tobacco industry, health hazards will be admitted and users are then responsible for their tobacco-related illnesses.

Today, already about 50% of Finns, Swedes and Norwegians use mobile phones, especially the young population.

Mobile phones used in mind control was a brilliant idea. Military and police agencies can follow every user, influence their thoughts through microwaves, cause healthy people to hear voices in their heads and if needed burn their brains in a second by increasing the current 20,000 times.

That probably happened to Chechnyan leader General Dudayev who died talking to a mobile phone.

Heating effect of tissues with the speed of light is a known effect of high power microwave and electromagnetic pulse weapons.

According to Navy studies they also cause fatigue states, depression, insomnia, aggressiveness, long and especially short term memory loss, short catatonic states, cataracts, leukemia, cancer, heart attacks, brain tumors and so forth.

Alteration of behavior and attitudes hs been demonstrated as well.

Dr. Ross Adey has found out that by using 0.75 milliwatts per square centimeter intensity of pulse modulated microwave at a frequency of 450 MHz it is possible to control ALL aspects of human behaviour!

Microwave radiation excites the hydrogen bond in the cells and can interfere with meiosis, which leads to tumors.

All our emotions, moods, and thoughts have a specific brain frequency which has been catalogued. If these records fall into the wrong hands, our behaviour and attitudes can be manipulated by persons whose ethics and morals are not in our best interest.

Both military and intelligence agencies have been infiltrated with such persons. The Director of the Swiss Secret Service had to resign in September 1999 because of his agency's involvement in illegal arms deals and a plan to create an ORGANIZATION within the legal Secret Service.

This globally infiltrated organization has "octopus type" activities in all major intelligence services in the world, working together with the Mafia and terrorists. It has recruited people from all important government institutions, state and local administrations.

It owns Star Wars technology which is used against military and civilian populations, claiming it is "non-lethal" weaponry.

"Down and out" people, jobless, freed prisoners, mental outpatients, students and orphans are trained by this organization to harass, follow, and torture innocent people, who for whatever reason have been put on the organization's hit list. They are ALREADY in every apartment block!

[Eleanor White comment: This gang-like colour-coding is not reported in all areas. Dr. Kilde's experience is with northern Europe.]

Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated. They have a military order and get rewarded for their evil actions, which include Satanism, and symbols and yellow-orange-black colors. However, fresh recruits must wear pink - and the highest elite wears yellow ties with dark suits.

Even dashes of yellow or orange in their ties may signal their recruitment as well as yellow shirts or other objects with that color for signalling.

Too many world leaders fit into this signalling. However, it is quite possible they are only used as fronts for this global organization without any knowledge of it's criminal activity in the field against innocent people. Mass media and big industry are also infiltrated.

Who are the targets? Experimentation with soldiers and prisoners may continue, as well as handicapped children, mental patients, homosexuals and single women. They are still experimental guinea pigs for electronic and chemical warfare. But today ANYONE can become a target, even those who invented the system.

Researchers who find out about this secret radiation of the population become targets themselves.

The U.S. Senate discussed the issue on January 22, 1997. The U.S. Air Force's "Commando Solo" aircraft have been used to send subliminal radio frequency messages to manipulate even the minds of foreign nations in their elections. Haiti and Bosnia are a couple of recent examples.

In July 1994 the U.S. Department of Defense proposed the use of "non-lethal" weapons against anyone engaged in activities the DoD opposes. Thus opposing political views, economic competitors, counterculture individuals and so forth can be beamed to sickness or death.

The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders has been a brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies' actions towards their targets. THE MANUAL LISTS ALL MIND CONTROL ACTIONS AS SIGNS OF PARANOID SCHIZOPHRENIA.

If a target is under surveillance with modern technology via TV, radio, telephone, loudspeakers, lasers, microwaves, poisoned with mind altering drugs via airducts, giving familiar smells which cause headache, nausea and so forth, if he claims his clothes are poisoned, his food or tap water as well --- all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all.

Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets. Thus, victims of mind control are falsely considered mentally ill and get no help since they are not believed and their suffering is doubled by ignorant health professionals.

The unethical abuses of power by individuals in charge of biomedical telemetry are incomprehensible to normal people.

The goal of mind control is to program an individual to carry out any mission of espionage or assassination even against their will and self- preservation instict and to control the absolute behavior and thought patterns of the individual. The purpose of mind control is to disrupt memory, discredit people through aberrant behavior, to make them insane or to commit suicide or murder.

How is it possible that this technology is not stopped by political top authorities? They themselves will also be targets someday, a fact they have not always realized. How much are they involved?

This year the 1999 European Parliament in "Resolution on Environment, Security, and Forein Policy", in paragraphs 23, 24, and 27 calls for "non-lethal" weapons technology and development of new arms strategies to be covered and regulated by international conventions.

Also, it calls for an international convention introducing a GLOBAL BAN on all developments and deployments of weapons which might enable ANY FORM OF MANIPULATION OF HUMAN BEINGS.

Project HAARP in Alaska is a global concern, and calls for it's legal, ecological, and ethical implications to be examined by an international independent body before any further research and testing.

It is possible that the USA will ignore those resolutions. The dangers of non-lethal mind control weapons were already revealed in an expert meeting of the International Committee of the Red Cross in Geneva, in July 1994.

Only increased public awareness of the microchip implants, their frightful consequences to privacy by influencing of individuals' thoughts and actions, causing people to become biological robots with physical and emotional pain whenever the supercomputer technician so wishes, is enough reason to refuse to take the chip into your body for whatever reason.

It is the biggest threat to humanity and the most sinister plan to enslave the human race forever.

If you have a choice and want to remain a normal human being with privacy, do not have your children nor yourself implanted with a DNA microchip. Otherwise your vision, hearing, sensing, thoughts, dreams and subconscious will be influenced by an outsider, who does not have your best interests in mind.

MICROWAVE MIND CONTROL WITH "NON-LETHAL" WEAPONS IS THE BIGGEST CRIME IN THE HISTORY OF MANKIND AGAINST THE POPULATION OF PLANET EARTH. IT MUST BE STOPPED BY ALL PEOPLES OF THIS GLOBE.

Recommended reading: Mind Controllers, Dr. Armen Victorian, 1999, UK Mind Control, World Control, Jim Keith, 1997, USA Microwave Mind Control, Tim Rifat, The Truth Campaign, winter 1998, UK




MainPage
http://www.rense.com


This Site Served by TheHostPros