The NSA Was Concerned About Psychic Hackers Within It’s Own Ranks

In a declassified document titled “Parapsychology: The Comsec Threat and SIGINT Capability: Preliminary Concerns”  A briefing within the NSA details a series of ethical concerns regarding the current, functional use of parapsychology within the intelligence agency to obtain information on electronic passcodes and encryption methodology.

It turns out they were  worried about subversion of rank and security clearance through this sort of means. More generally speaking – they didn’t want any classified information to be obtained by staff or otherwise, through psychic techniques being taught within the program. Which the US military has already used within it’s own ranks.

The briefing clearly states that

“Practitioners within the agency are already functioning. The least we can do is do a better job of identifying talent and determining who is using it and how. The best we can do is to see that only those with the highest ethical standards are trained to use such capability”

The NSA described several known ways that cryptographic security may be compromised by either remote viewing or remote influencing. Considering the document was declassified, they likely have already come up with ways to defend against these techniques.

Crypto Security

  1. “Determination of cryptographic capability involved (CI): Remote Viewing, Telepathy, Precognition” Imagine being able to close your eyes and look over the shoulder of a computer programmer (Remote view), Or listen in as they rehearse code internally, or how about write a string of code out “randomly” that happens to predict another sequence (precognition). Similar to “Controlled Remote Viewing” ref. US military Dr Lyn Buchanan.
  2. “Determination of special weapons. Execute Commands, Authenticators and Barrier Lock Codes.”
  3. “Manipulation of Keying Variable: Telekinetic manipulation of keyer, telepathic manipulation of programmer.” The more specific form of remote influencing utilized by the Russian and US military is called “Controlled Remote Influencing” where they claim it does not leave any “traceable residue” that can be sniffed out by other practitioners. Ref. US Vet Dr. Lyn Buchanan

The Briefing continues on with Transmission Security, Emission Security, and Physical Security. One interesting point from the later parts of the briefing is that they were actually concerned with telepathic manipulation of electromagnetic emissions from the device itself, which is not necessarily something you would assume.

Sir Charles Elliot referencing Japanese Bhudism.

“In the heaven of Indra, there is said to be a network of pearls, so arranged that if you look at one you see all the others reflected in it. In the same way each object in the world is not merely itself but involves every other object and in fact is everything else”

Walter Thirring

“Modern theoretical physics has put our thinking about the essense of matter in a different context. It has taken our gaze from the visible – particles to the underlying entity – the field”


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s