Mind Control in the 21st Century


Part I of this series suggests that a hidden science and technology of “mind control,” far surpassing that available in the public domain, may well exist.

Part II begins an exploration of some of the most advanced public research in mind control, and also looks at statements of scientists who have spent time working and conducting research within the military-industrial-intelligence-media complex.

Mind Control in the 21st Century

Electromagnetic Mind Control

Because mind control technology is in large part classified, statements and official documents from “higher authority” as to the state of the art are lacking.

However, despite this limitation, one can perhaps arrive at a reasonable understanding of approximate covert capabilities by examining the most sophisticated public research, such as that of Michael Persinger, cognitive neuroscience researcher and professor at Laurentian University in Ontario.1

Significant aspects of Persinger’s work relate directly to the feasibility of “electromagnetic” mind control directed at targeted individuals or populations, and are thus a continuation of research that went dark in the 1970s — research suggesting that remote electromagnetic energy fields could be used to “influence” the brain.2

Electric “High”

According to Persinger, the brain can be influenced with very weak magnetic fields, “… the electromagnetic fields associated with consciousness, which are very, very weak.”3 These electromagnetic fields can even “mimic” the effects associated with taking various drugs.

This is possible because the brain works by electromagnetic patterns — brainwaves — not just chemistry, and for every drug there is “an appropriate temporal pattern” of electromagnetic radiation “equivalent to the molecular structure” of the drug.4

Thus, by introducing the electromagnetic equivalent of a drug into the brain, the individual should experience “the drug,” as if it had actually been ingested – In other words, “…you don’t have to have a chemical.5 This is especially significant when one considers that many compounds, both legal and “illicit,” alter consciousness, modifying, sometimes significantly, one’s experience of the world.

Imagine, for example, “electromagnetic LSD,” or “electromagnetic valium” delivered via satellite to a targeted individual or population.

Hacking the human brain is not difficult

Hacking the human brain is not difficult

Hallucination Creation

Electromagnetic patterns may also be capable of creating artificial “sensory” experiences.6 This is because sense experience is not a perception of a thing “in itself,” but an interpretation by the brain of electrical patterns produced by a given stimulus.

For example, the perception of a rose is the brain experiencing a particular electromagnetic resonance pattern produced by the interaction of the rose with the senses, not an experience of the rose “itself.”

By introducing the electromagnetic resonance pattern normally produced by a given stimulus directly into the brain, the need for the actual stimulus (for example, a real rose), “…can be circumvented….”7 The idea, in other words, is that vivid hallucinations can be created via the introduction of precisely patterned electromagnetic radiation into the brain.

Synthetic Reality

Such possibilities do not appear to be merely “theoretical.” In a 2000 article in US News & World Report, John Norseen, neural weapons designer for Lockheed Martin, is quoted as saying that electromagnetic pulses could be used to create what he termed “synthetic reality.”8 Norseen elaborated in a series of emails with artist Duncan Laurie, posted at Laurie’s web-site (Norseen died in 2007).9

In one such discussion Norseen referenced a technology for creating hallucinations. The topic arose when Laurie mentioned a news story reporting a Mexican police officer’s encounter with a “flying witch.”10 According to the officer’s account, the witch fell from a tree and floated above the ground before flying at the officer and “trying to grab him with her hands right through the car’s windshield.”11

While the officer perceived the witch as an actual being, Norseen suggested that the witch was not a living entity, but was instead a technologically induced hallucination that “ripped into (the officer’s) perceptual apparatus from inside his thought structures….”12

In other words, Norseen’s suspicion was that the officer did not have a real sensory experience, but instead experienced a virtual reality sequence, a vividly realistic, complex “sensory” experience produced entirely in his brain. Accordingly, for Norseen the “real story” was “whether this type of … hallucination is now available in the psyop inventory…eh eh.”13 Norseen explains that the witch could have been the product of an “orbiting satellite that mistakenly beamed … (the) Mexican village with a powerful entraining downlink….”14

Information Injection

The “witch” is an example of what Norseen calls a “semiotic.” For current purposes, suffice it to say that “neural information” encoded in “carrier waves,” and then decoded by an individual’s brain, is a semiotic. Norseen was particularly interested in semiotics, like the “witch,” that could “reflexively control” an individual.15

Norseen discusses an experiment with rats in which a rat would press a button and an electromagnetic field would stimulate a part of the rat’s brain, inducing (apparent) feelings of ecstasy in the rat. The rat would continue to press the button, discharging the “pleasure semiotic” (Laurie’s term) until it died.16

According to Laurie, “Norseen’s point was that if you could trigger that part of the brain remotely, via a transmission of some kind, the receiver would be all but powerless” to stop his brain from responding in a determined, stimulus-response manner to the semiotic.17

John Norseen

Norseen later describes semiotics

Norseen suggested to Laurie that one way to transmit a semiotic would be to encrypt commands, which could be “…buried within unrelated visual and auditory information, to be broadcast to the general public.”18

In other words, a semiotic message encoded within, for example, a television or internet broadcast, could be transmitted directly to the unconscious mind of a person, in essence programming the person for some future action – “Norseen strongly suggested these techniques were connected to the Columbine murders….”19

Moreover, as Norseen suggests in his discussion of a satellite downlink producing the witch hallucination, semiotics do not even need to be encoded within a sensory medium, such as a television program or internet broadcast, but can instead be transmitted directly into the brain via electromagnetic radiation or ultrasound.

As Norseen put it, the human brain has an “extremely keen sensitivity to both internal and external signals, from sight, sound, smell, touch, memory, ultrasound, EMF (electromagnetic frequency), etc.” (emphasis added), which can make “…the human brain … in essence, a sex, violence, religious pump”20:

My database of Semiotics, Signs and Symbols, when presented by various media to the human brain cause tremendously strong circuits to fire in the Nucleus Accumbens (Sex), Amygdala (Violence), and Anterior Cingulate/right temporal axis (Religion.)

So even if a person wouldn’t do something based on his personality, the key is to reset or disengage the person’s personality (free will), and then repeatedly train either consciously or non-cognitively the person’s brain to fire relentlessly … to the point where you insert a new personality that acts upon the impulses emanating from the sex/ violence/ religious circuits (emphasis added).

You end up with a sex offender, a serial killer, a religious zealot wherein suicide is an option…or any combination (of) the three.” … [S]omewhere, somehow, the result of culture at large, or highly refined and focused cultural inputs, is turning out just such PERSONALITIES…

The Question is, is this just the natural results of five billion people on earth interacting with modern information and EM (electromagnetic) signals…or maybe, just maybe…somewhere, SOME PEOPLE ARE USING TECHNICAL MEANS FOR PSYOP????”21

“Semiotics” can be transmitted from an external source directly into a human brain, “training” the brain through constant repetition, into new beliefs, new motivations, even, perhaps, a new personality. Further, this conditioning process can occur below the level of conscious awareness, presumably further enhancing its value as a tool for plausibly deniable covert action.

Thought Control

Norseen describes a technology that can literally control one’s thoughts. As he explains in the US News & World Report article, one could possibly even “…begin to manipulate what someone is thinking … before they know it.”22

Robert Duncan, a scientist who worked on projects for the Department of Defense and the CIA, likens this “thought filtering and suppression” capacity to the automated spell check in Microsoft Word, which corrects spelling errors as one types.23 According to Duncan, “…even new thoughts can be suppressed”; moreover, memories can be faded or erased.24

Brain Prints

The most invasive form of mind control may require analysis of the unique characteristics of an individual’s electromagnetic output, what Norseen called “brain prints.” “Think of your hand touching a mirror,” explains Norseen. “It leaves a fingerprint.” … “Just like you can find one person in a million through fingerprints,” he says, “you can find one thought in a million.”25

A person’s “brain prints” leak into the environment in unique “energy dispersion pattern(s),” which if “monitored by mixed electromagnetic sensors…,”26 could potentially be used to identify and track the person. Moreover, brain prints could even be transmitted “…back into the brain…”27 (“intact or rearranged—to the individual or someone else….”28) with the brain acting upon the information “as if it were a real signal from the environment.”29

[ An aside: Much of what Norseen told Duncan Laurie may have actually already been “old hat.” Norseen had security clearances and had signed “70+” year non-disclosure agreements.30 He explained that while he could not discuss more recent developments, “at least” he could “edify” regarding the years 1995-2002.31]

EEG Cloning

Copying one person’s brainwaves onto the brain of another person is a technology sometimes referred to as “EEG cloning.”32 Researcher Tim Rifat explains that emotions and states such as anger and aggressiveness, apathy, lust, psychopathy, suicidal depression, mania, paranoia and psychosis have distinctive frequencies which can be entrained into the brain “remotely by use of extremely low frequency broadcast carried by pulse modulated microwave beams (ELF pulse modulated microwave remote mind control technology).”33

As physicist Richard Alan Miller put it:   By using … computer-enhanced EEGs, scientists can identify and isolate the brain’s …”emotion signature clusters,” synthesize them and store them on another computer. In other words, by studying the subtle characteristic brainwave patterns that occur when a subject experiences a particular emotion, scientists have been able to identify the concomitant brainwave pattern and can now duplicate it.34   These stored “emotion signature clusters” can then be entrained into human beings to trigger the emotion.35  

More than mere emotions, even another “personality” can be “cloned” onto an individual. This “cerebral cortex cloning” has been likened to “having an enemy within one’s own mind.”36

Of note, Tamerlan Tsarnaev, alleged Boston bomber (most likely a patsy), was subject to what he called “majestic mind control,” and told his mother that it felt as though another person was inside him, telling him things to do.37

Making “Connections”

John Norseen suggested that the brain, which has been described as a “biological computer,”38 could be connected wirelessly (without a brain-computer interface) to a technological computer, explaining that a person could possibly be “ping[ed]” with a “light sequence or with an [extremely low frequency] … radiation sequence” causing “…something to be fired off in the brain….”39 Of course, one computer “pings” another to test connectivity between the two “devices.”

If multiple brains were connected to the same “system,” the same brain signals could be routed to (“cloned” onto) multiple brains. “Broadcast messages” could even be sent, inducing similar thoughts, feelings, behaviors, and even beliefs in all people on the network.40

One could thus imagine hive mind cells or even a large hive in which “participants” would share neural information (brainwaves). In such a scenario, complex group behaviors could perhaps be coordinated from an external “control center,” a situation reminiscent of some accounts of individuals claiming to have been “gang stalked.”41

Robert Duncan

Robert Duncan

Mind Hacking

“Mind hacking” is Robert Duncan’s term for the process by which a brain is remotely mapped, and through which some degree of operational control over the brain becomes possible.

A mind hack establishes the full capability of wireless interaction between a brain and a computer. To “hack” a brain, the brain prints or overall “brain signature” of the person must be deciphered, a mechanical, deterministic process requiring only “time” and the target’s “coordinates” to be effectual.42

Given “time and coordinates” anyone’s brain can be hacked: “Precise timing of pulses is how the trick is done … The timing of the pulses must exactly coincide with the end of a neuron’s depolarization,” which is “specific to each individual and their microcircuits … This bit stream acts like an encrypted message that only a single unique human brain with the exact physical patterns can interpret …

In order to create any significant amplification, thousands of neurons if not more need to be exactly pulsed without a single one off alignment before the electromagnetic signal can gain enough influence in the brain for entrainment.

In other circuits or brains, it merely adds noise that is filtered out …Radar pulses using the bit stream key (are) sent to the target brain, and if it hits just right along with the others, a few microseconds later an evoked potential should be detected. This indicates that the brain key is being accepted … These bit stream keys are categorized and sub-categorized.

Each one represents a “brain-resonance” or a state that was achieved. They are templates that can be replayed into the target mind. As the brain mapping [process proceeds] other bit streams fall into place into the whole cognitive model faster and faster [as when one gets] closer to completing a jigsaw puzzle.”43

A signal “tailored” to a person’s unique brain signature will not affect other brains exposed to the signal. Thus, people standing even in close proximity to a targeted person would not notice anything unusual, other than perhaps the target’s behavior.

According to Duncan, that someone could be remotely besieged by “invisible waves,” while others, even in close proximity, remain unaffected and unaware of the intrusion, tends to “baffle the common citizen who has yet to experience the electromagnetic virtual reality.”44 However, the concept becomes more intuitive when one considers that the targeted individual’s nervous system has been “tuned into like a cellular phone.”45

And, of course, only a “phone” whose number has been dialed is going to “ring.”46 Mind hacking enables feats of grotesque invasiveness, making it possible to actually “listen through the subject’s ears, and see through the subject’s eyes.”47 An unanswered question is how much time is required to hack into a brain – Minutes? Days? Weeks? In any case, however long the process does take, one might suppose that mind hacking has become more efficient with time.

Scanning For Brains – MASINT

According to John Norseen, the brains of individuals in a given population can be surveyed and unusual brain signatures (“brain prints”) identified from afar. This would appear to be an aspect of MASINT—measurement and signature intelligence—the “newest, most encompassing, and technically complex” of the intelligence gathering methods.48

Norseen writes that “multiple sensors can detect and measure what you think…” and that “hyper spectral analysis across the electromagnetic spectrum, within which brain function occurs” can be used “to correlate and pinpoint with more accurate detail the specific … regions of the brain engaged in mental processing of the target activity.”49

Further, these mind reading capabilities are “much more robust” than traditional diagnostic technologies such as EEG or FMRI, and “involve … more remote sensor analysis using interferometer techniques…,” such that “information about underlying neural activity can be collected … (and) displays … (can be) generated of ongoing and anticipated future mental behavioral patterns, normal, pathologic, or trained”: Neural circuits that reflect normal, pathological or trained brain patterns can be discerned.

Therefore, a complex system of internetted, hyperspectral brain analysis sensors, exchanging database information packages of representative mathematical equations and biophysical state spaces, would be able to survey a particular area and determine the brain activities of the constituent elements of the surveillance area.

A person with normal brain patterns would have characteristic brain prints that would be different than another person suffering from some pathological or trained pattern of behavior.50 It might also be added that non-conforming brains, for example, brains with non-deferential attitudes towards authority or unsanctioned beliefs, could also presumably be identified and singled out for additional “investigation” or “targeting.”

Michael Persinger

Michael Persinger


We are faced with a world in which dystopian science fiction is fast becoming reality. Indeed, for some, the dystopia may have already arrived. World-wide, thousands of “targeted individuals” claim to have had experiences consistent with what Robert Duncan calls “mind hacking.”

As these are only self-identified targets, the actual number of targeted individuals could be significantly greater. Meanwhile “whistleblower” Edward Snowden goes about “revealing” NSA surveillance abuses, abuses largely disclosed by others in prior years, but without the consternation and media fanfare.

While Snowden’s “revelations” are certainly not trivial, it is apparent that the American and world populations now exist in a bubble of “unreality,” entirely unaware of the “science fiction” technologies arrayed against them. Consider then the possibility that the true extent of “surveillance operations” remains very much “undisclosed.”

Editing:  Jim W. Dean and Erica P. Wissinger



A ten minute segment featuring Robert Duncan, from an episode of Jesse Ventura’s program “Conspiracy Theory” entitled “Brain Invaders”.



2See Steven DiBasio, Mind Control in the 21st Century—Science Fiction & Beyond, Veterans Today, Jan. 13, 2014, http://www.veteranstoday.com/2014/01/13/mind-control-in-the-21st-century-science-fiction-beyond/.
3 Michael Persinger, “Psychotropic Drugs and The Nature Of Reality,” YouTube (at 5:00), http://www.youtube.com/watch?v=1b6-Pe278HA (Last visited 2/15/14).
4Id. at 45:00.
5Id. at 14:00.
6 M.A. Persinger, On The Possibility Of Directly Accessing Every Human Brain By Electromagnetic Induction Of Fundamental Algorithms, Perceptual and MotorSkills, 1995, at 792, available at
8 Douglas Pasternak, Reading your mind—and injecting smart thoughts, U.S. News & World Report, Jan. 03, 2000, http://www.usnews.com/usnews/culture/articles/000103/archive_033992.htm. Note: This article has recently been removed from the archives of U.S. News & World Report. An apparently accurate reproduction is available at http://acsa2000.net/JohnNorseenUSNews.html (Last accessed 2/15/14).
9 Duncan Laurie, “John Norseen passes Sept 27,” http://www.duncanlaurie.com/artists/john-norseen-passes-sept-27. Laurie writes that he and Norseen engaged in a “lengthy correspondence” prior to Norseen’s death, and that Norseen’s “many emails became the source material for a manuscript, Outlaw Technology, which remains unpublished…” though portions appear at Laurie’s website. Id.
10 Duncan Laurie, Outlaw Technology (unpublished manuscript), “08 HAARP,” http://www.duncanlaurie.com/writing/outlaw_technology/08_haarp.
11 Santiago Yturria, Mexican Policeman Attacked By A Flying Humanoid Entity, http://www.rense.com/general48/entity.htm.
12 Laurie, supra note 10.
15 Duncan Laurie, Outlaw Technology (unpublished manuscript), “01 Reflexive Control,” http://www.duncanlaurie.com/writing/outlaw_technology/01_reflexive_control.
22 Pasternak, supra note 8. Relatedly, it seems that the brain actually makes a choice before the individual is consciously aware that he has chosen. See V.S. Ramachandran, A Brief Tour Of Human Consciousness 86, 87 (PI Press, 2004).
23 Robert Duncan, Project: Soul Catcher Volume Two 73 (Higher Order Thinkers Publishing, 2010).
24Id. at 72, 73. The process for erasing memory is called “electronic dissolution of memory, aka EDOM. Some form of EDOM has been around for many decades. See, for example, Walter Bowart, Operation Mind Control 261-263 (Dell Publishing Co. Inc., USA 1978) (describing a process for controlling people – “…somewhat like a mechanical toy” – and then erasing their memory, referred to as RHIC-EDOM (Radio Hypnotic Intra-Cerebral Control-Electronic Dissolution of Memory)).
25 Pasternak, supra note 8.
26 Duncan Laurie, Outlaw Technology (unpublished manuscript), “02 Radionics and Semiotics,” http://www.duncanlaurie.com/writing/outlaw_technology/02_radionics_and_semiotics.
28 Sharon Berry, Decoding Minds, Foiling Adversaries, SIGNAL Magazine, Oct. 2001, at 55, available at http://cartome.org/brainmap.htm. SIGNAL Magazine is the official publication of AFCEA, an organization “…serving government and military since 1946….” See http://www.afcea.org/content/?q=aboutsignal. AFCEA bills itself as the “world’s largest association dedicated to intelligence professionals.” See http://www.afcea.org/mission/intel/.
29 Laurie, supra note 26.
30 Duncan Laurie, Outlaw Technology (unpublished manuscript), “15 Semiotics and The Flow Of Capital,” http://www.duncanlaurie.com/writing/outlaw_technology/15_semiotics_and_the_flow_of_capital.
31 Duncan Laurie, Outlaw Technology (unpublished manuscript), “14 Death Semiotics,” http://www.duncanlaurie.com/writing/outlaw_technology/14_death_semiotics.
32 Robert Duncan, The Matrix Deciphered 8 (Higher Order Thinkers Publishing, 2006), available at http://www.freedomfchs.com/thematrixdeciph.pdf.
33 Tim Rifat, Mind Control In The UK, The Truth Campaign Magazine, Spring 1999, available at http://www.whale.to/b/rifat4.html. Rifat claims that these microwave weapons were fully operational in the UK by the late 1980s. Id.See also Duncan, supra note 23, at 99 (“Aggression signals, torture, psychopathic, and terrorist brain print personality profiles are the general mix that create the desired violent individual or group of people…”).
34Richard Alan Miller, Synthetic Telepathy And The Early Mind Wars 6 (2001), available athttp://www.earthpulse.com/epulseuploads/articles/SynTelepathy.pdf.
36 Duncan, supra note 23, at 251. Duncan states that B.F. Skinner “leaked to a class” that the CIA maintains a “personality database” of “raw cognitive models” located in Colorado. These are “brain prints” or personalities that can be induced into targets. Duncan further states that “[t]he effects of having a personality overlay induced on a person often causes what appears to be multiple personality disorder. If the external brain signals are highly bio-amplified, that personality overlay can completely take over the character of the host.” Id. at 49, 50. This database of “mind architectures” is very large, with estimates of “over 30,000,000 minds” contained in it. Id. at 89; see also Duncan supra note 32, at 34 (“The CIA has been cataloguing the variations of brains for decades for the personality profile database that I was told by B.F. Skinner … was kept in Colorado”); see also id. at 8 (At the extreme, another person’s brainwaves can be cloned onto a target, overriding the target’s native brain patterns, a process “symbolized in … [t]he ‘Matrix’ [movies] where the agents take over random citizen’s bodies…”).
37 Max Benwell, Alleged Boston Marathon bomber Tamerlan Tsarnaev believed in ‘majestic mind control’, The Independent, Dec. 16, 2013, http://www.independent.co.uk/news/world/americas/alleged-boston-marathon-bomber-tamerlan-tsarnaev-believed-in-majestic-mind-control-9007493.html.
38 Duncan, supra note 23, at 1.
39Berry, supra note 28.
40 See supra note 36.
41See, for example, http://www.youtube.com/watch?v=K2k4KESfCNY YouTube (Last visited 2/18/14) (“Cheryl Welsh … says she’s … a victim of street theater, an experiment in which the government controls the minds of everyone around her”). Id. Cheryl Welsh is a lawyer and founder of Mind Justice, a nonprofit “…human rights group working for the rights and protections of mental integrity and freedom from new technologies and weapons which target the mind and nervous system.” See http://mindjustice.org.
42 Duncan, supra note 23, at 14.
43Id. at 9, 11-12.
44Id. at 8.
45Id. at 69.
46Id. at 70.
47Id. at 88.
48 Laurie, supra note 31.
49 Duncan Laurie, Outlaw Technology (unpublished manuscript), “03 Krylov Space,” http://www.duncanlaurie.com/writing/outlaw_technology/03_krylov_space.
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Leave a Reply

© 2014 Pakalert Press. All rights reserved.