Mind Control World CACH

Published by MindTech (World CACH) Sweden

You are currently browsing the Community & Media category.

FDA approves microchip implant in a pill: Can brain implants be far behind?

FDA approves microchip implant in a pill: Can brain implants be far behind?

  • Science
  • August 4, 2012
  • By: Donna Anderson
FDA approves microchip implant in a pill: Can brain implants be far behind?
Credits:
Wikimedia – Creative Commons
FDA approves microchip implant in a pill:  Can brain implants be far behind?
An August 2, 2012 article at Alex Jones’ website, InfoWars.com, warns that Big Pharma is already working on the technology for microchip brain implants. At the same time, CNNMoney.com reports that the FDA has just granted approval for the first “ingestible sensor”, a microchip inside a pill. So it looks like Jones has been right all along. Prepare yourself. You’re about to be “chipped”.

The InfoWars.com article, “They Really Do Want To Implant Microchips Into Your Brain”, warns readers:

“They (Big Pharma) are pumping millions of dollars into researching ‘cutting edge’ technologies that will enable implantable microchips to greatly ‘enhance’ our health and our lives.”

Of course, the tremendous benefits of these implants will far outweigh the risks, at least in the eyes of the common man, and once these microchips are introduced, everyone will be begging to be implanted.

“Initially, brain implants will be marketed as ‘revolutionary breakthroughs’ that can cure chronic diseases and that can enable the disabled to live normal lives.”

“Just imagine the hype that will surround these implants when people discover that you can get rid of your extra weight in a matter of days or that you can download an entire college course into your memory in just a matter of hours. The possibilities for this kind of technology are endless, and it is just a matter of time before having microchips implanted into your brain is considered to be quite common.”

It all sounds like fodder for a good science fiction novel until you take a look at the headlines over at CNNMoney.com: “‘Digital pill’ with chip inside gets FDA green light.”

Proteus Digital Health scored a big victory this week when the U.S. Food and Drug Administration granted approval for the company’s ‘ingestible sensor’ invention. The 1 square millimeter device, roughly the size of a grain of sand, can relay information about your insides to you, and if you choose, to your doctor or nurse.”

Already, Proteus is hyping the benefits of their ingestible microchip. According to Andrew Thompson, the CEO and cofounder of Proteus, the microchip will be a huge boon for those who forget to take medications or need to monitor an ongoing medical condition. The chip simply resides inside your body and transmits signals, wherever you want those signals to go.

The tiny microchip, encased in a pill, is first taken with your regular medication, just like you’d take any other pill. Then, it transmits information through your skin to a stick-on patch. The patch, in turn, will transmit data to a mobile phone application or any other device you authorize, including a monitoring device in your doctor’s office.

Obviously, we can all see a wide variety of health benefits, and according to Alex Jones, that’s exactly what Big Pharma is counting on and the potential for abuse is alarming. Consider:

  • If the signal from your microchip can be picked up by your doctor’s office, miles and miles away, who else can pick it up?
  • If the microchip can detect what medications you’re taking and when you’re taking them, what other substances can it detect in your bloodstream?
  • If you can choose to download an entire college course directly into your brain, what information can be downloaded to you that you’re not even aware of?

As Jones says on his website:

“If you could download thoughts and feelings directly into the brains of your citizens, you could achieve total control and never have to worry that they would turn on you.”

“In fact, you could potentially program these chips to make your citizens feel good all the time. You could have these chips produce a ‘natural high’ that never ends. That would make your citizens incredibly dependent on the chips and they would never want to give them up.

“This kind of technology has the potential to be one of the greatest threats to liberty and freedom in the history of mankind.”

It’s no secret that Big Pharma, and the US government have close ties. In a May 20 interview, Jonathan Emord, author of “The Rise of Tyranny”, has this to say about Big Pharma and the FDA:

“The FDA is dominated by political managers – not scientists or docs – people who’ve made their career in government based on their ability to protect the interests that control this government.

“The process for FDA drug approval costs the sponsor an estimated $1 billion from the initial development of the drug through the final approval. And that’s a low-ball estimate which doesn’t include the payouts for lobbyists, campaign contributions, and salaries paid to retired FDA officials who get hired by the pharmaceutical companies after they leave office.”

“Of that $1 billion, a portion goes to support the clinical trial, a portion goes to the doctors working the trial, and the balance goes to the FDA.”

Talking about microchips like they’re “the Mark of the Beast” might lead you to click away, thinking that this is just another anti-government, conspiracy theorist’s hyped up version of dystopia. But, remember who’s running the show, here.

The FDA and Big Pharma control every aspect of your health. They tell your physician what drugs he’s allowed to prescribe, and even if there’s an experimental drug that will instantly cure cancer they won’t approve it unless the manufacturer can pay the $1 million plus it takes to pay off all the racketeers.

Now, knowing all of this, are you going to buy into the hype that a microchip implanted somewhere in your body is only for your own benefit? Do you really believe the FDA, Big Pharma and Big Government are just going to ignore the potential for profit and abuse?

Posted 5 years, 3 months ago.

Add a comment

Samsung thinks up mind-reading brain implant

Samsung thinks up mind-reading brain implant

Company files patent application for an implantable medical device that can transmit information. Think of it as a secure Wi-Fi router for yor bodey.

Samsung’s brain implant comes with security to fend off zombie surgeons, and hopefully non-zombie hackers, too.

Samsung has applied for a patent on an implantable medical device that can communicate physiological/pathological information with an “external device.”

At last, an app to tell us when we’re stressed, drunk, or asleep (states that typically occur in that order, at least for me).

Samsung envisions much more than just a pacemaker you connect to. The application includes a number of possible scenarios with sci-fi implications such as a brain implant to keep track of brainwaves (but certainly not embed subliminal messages about the superior quality of Samsung devices) and fingertip implants for motion detection.

There’s even mention of using the brain implant to directly control the system. Cutting through the patent-speak, Samsung is talking about an implant system capable of being controlled through thought.

Also fascinating is the apparent acknowledgment of the scary Orwell-meets-The Matrix potential of such a technology with the inclusion of a security engine in the device that could send alerts to the user whenever someone else is attempting to access the system.

So that scary pre-singularity moment could appear sooner than we thought: the day we have to decide if a chip in the head that could tell us about the stroke we’re about to have is worth the risk of a becoming the target of a brain hack. Suddenly, regular doctor’s check-ups aren’t sounding so bad anymore.

 

Posted 5 years, 3 months ago.

Add a comment

They Really Do Want To Implant Microchips Into Your Brain !

They Really Do Want To Implant Microchips Into Your Brain

 

Michael Snyder American Dream Aug 2, 2012

Are you ready to have a microchip implanted into your brain? That might not sound very appealing to you at this point, but this is exactly what the big pharmaceutical companies and the big technology companies have planned for our future. They are pumping millions of dollars into researching “cutting edge” technologies that will enable implantable microchips to greatly “enhance” our health and our lives.
Of course nobody is going to force you to have a microchip implanted into your brain when they are first introduced. Initially, brain implants will be marketed as “revolutionary breakthroughs” that can cure chronic diseases and that can enable the disabled to live normal lives.
When the “benefits” of such technology are demonstrated to the general public, soon most people will want to become “super-abled”. Just imagine the hype that will surround these implants when people discover that you can get rid of your extra weight in a matter of days or that you can download an entire college course into your memory in just a matter of hours.
The possibilities for this kind of technology are endless, and it is just a matter of time before having microchips implanted into your brain is considered to be quite common. What was once science fiction is rapidly becoming reality, and it is going to change the world forever.

But aren’t there some very serious potential downsides to having microchips implanted into our brains?

Of course there are.

Unfortunately, this technology is not as far off as you might think, and most people are not even talking about what the negative consequences might be.

According to a recent article in the Financial Times, the pharmaceutical company of the future will include a “bioelectronics” business that “treats disease through electrical signalling in the brain and elsewhere.”

Diseases such as diabetes and epilepsy and conditions such as obesity and depression will be will be treated “through electronic implants into the brain rather than pills or injections.”

These implants will send electrical signals to cells and organs that are “malfunctioning”. People will be totally “cured” without ever having to pop a pill or go under the knife.

It sounds too good to be true, right?

Well, the Financial Times says that British pharmaceutical giant GlaxoSmithKline is working very hard to develop these kinds of technologies. Moncef Slaoui, the head of research and development at GlaxoSmithKline, says that the “challenge is to integrate the work – in brain-computer interfaces, materials science, nanotechnology, micro-power generation – to provide therapeutic benefit.”

If a brain implant could cure a disease that you have been suffering from your whole life would you take it?

A lot of people are going to be faced with that kind of a decision in future years.

And this kind of technology is advancing very rapidly. In fact, some researchers have already had success treating certain diseases by implanting microchips into the brains of rats. The following is from a recent Mashable article….

Stroke and Parkinson’s Disease patients may benefit from a controversial experiment that implanted microchips into lab rats. Scientists say the tests produced effective results in brain damage research.

Rats showed motor function in formerly damaged gray matter after a neural microchip was implanted under the rat’s skull and electrodes were transferred to the rat’s brain. Without the microchip, rats with damaged brain tissue did not have motor function. Both strokes and Parkinson’s can cause permanent neurological damage to brain tissue, so this scientific research brings hope.

In addition, the U.S. government has been working on implantable microchips that would monitor the health of our soldiers and enhance their abilities in the field.

So this technology is definitely coming.

But it must be very complicated to get a microchip implanted into your brain, right?

Actually it is fairly simple.

According to an article in the Wall Street Journal, the typical procedure is very quick and it often only requires just an overnight stay in the hospital….

Neural implants, also called brain implants, are medical devices designed to be placed under the skull, on the surface of the brain. Often as small as an aspirin, implants use thin metal electrodes to “listen” to brain activity and in some cases to stimulate activity in the brain. Attuned to the activity between neurons, a neural implant can essentially “listen” to your brain activity and then “talk” directly to your brain.

If that prospect makes you queasy, you may be surprised to learn that the installation of a neural implant is relatively simple and fast. Under anesthesia, an incision is made in the scalp, a hole is drilled in the skull, and the device is placed on the surface of the brain. Diagnostic communication with the device can take place wirelessly. When it is not an outpatient procedure, patients typically require only an overnight stay at the hospital.

But is it really safe to have a device implanted into your head that can “talk” directly to your brain?

Many large corporations are banking on the fact that in a world that is always hungry for new technology that most people will not be bothered by such things.

For example, Intel is working on sensors that will be implanted in the brain that will be able to directly control computers and cell phones. The following is an excerpt from a Computer World UK article….

By the year 2020, you won’t need a keyboard and mouse to control your computer, say Intel researchers. Instead, users will open documents and surf the web using nothing more than their brain waves.

Scientists at Intel’s research lab in Pittsburgh are working to find ways to read and harness human brain waves so they can be used to operate computers, television sets and cell phones. The brain waves would be harnessed with Intel-developed sensors implanted in people’s brains.

The scientists say the plan is not a scene from a sci-fi movie, Big Brother won’t be planting chips in your brain against your will. Researchers expect that consumers will want the freedom they will gain by using the implant.

Once again, this is not something that will be forced on you against your will.

These big corporations are banking on the fact that a lot of people will want to get these brain implants.

Even now, some video game makers are developing headsets that allow users to play games using their brain waves rather than a joystick or a control pad.

Other companies want to make it possible to directly connect your brain to the Internet.

As I have written about previously, IBM is aggressively working to develop this kind of technology. The following is from a recent IBM press release….

IBM scientists are among those researching how to link your brain to your devices, such as a computer or a smartphone. If you just need to think about calling someone, it happens. Or you can control the cursor on a computer screen just by thinking about where you want to move it.

Scientists in the field of bioinformatics have designed headsets with advanced sensors to read electrical brain activity that can recognize facial expressions, excitement and concentration levels, and thoughts of a person without them physically taking any actions.

The potential “benefits” of such technology are almost beyond imagination. An article on the website of the Science Channel put it this way….

If you could pump data directly into your gray matter at, say, 50 mbps — the top speed offered by one major U.S. internet service provider — you’d be able to read a 500-page book in just under two-tenths of a second.

How would the world change if you could download a lifetime of learning directly into your brain in a matter of weeks?

The possibilities are endless.

But so is the potential for abuse.

Implantable microchips that can “talk” directly to the brain would give a tyrannical government the ultimate form of control.

If you could download thoughts and feelings directly into the brains of your citizens, you could achieve total control and never have to worry that they would turn on you.

In fact, you could potentially program these chips to make your citizens feel good all the time. You could have these chips produce a “natural high” that never ends. That would make your citizens incredibly dependent on the chips and they would never want to give them up.

This kind of technology has the potential to be one of the greatest threats to liberty and freedom in the history of mankind.

At first these implantable microchips will be sold to us as one of the greatest “breakthroughs” ever, but in the end they could end up totally enslaving us.

So I will never be taking any kind of a brain implant, and I hope that you will not either.

Similar/Related Articles
  1. Humans ‘will be implanted with microchips’
  2. Scientists Successfully Implant Chip That Controls The Brain
  3. Brain Implant Allows Paralyzed Woman to Control a Robot with Her Thoughts
  4. After The Government Microchips Our Soldiers, How Long Will It Be Before They Want To Put A Microchip In YOU
  5. Microchip Implant to Link Your Health Records, Credit History, Social Security
  6. Animal microchips linked to causing cancer
  7. Are Populations Being Primed For Nano-Microchips Inside Vaccines?
  8. Edible Microchips, Biometric Identity Systems And Mind Reading Computers
  9. New Implantable Microchips to Medicate Patients
  10. Intel Wants Brain Implants in Its Customers’ Heads by 2020
  11. British Court Orders Singer Get “Medical Implant” for Drug Addiction
  12. Hacking The Human Brain

 

Posted 5 years, 3 months ago.

Add a comment

Nano-Chip Brain Implant Allows Users to Instantly Speak Foreign Language,,,

bluered.gif (1041 bytes)

Nano-Chip Brain Implant Allows Users to Instantly Speak Foreign Language,,,

bluered.gif (1041 bytes)

The first-ever nano-chip language translators are rolling off the assembly line and into cosmetic surgeons’ offices quicker than you can say “Se Habla Espanol?” No longer will it be necessary for those wishing to learn a second or even third language to go through the arduous process of weeks and weeks of studying tapes or attending language classes. The product is called “Nano-Second Language” or NSL, and they are expected to sell out within weeks.

bluered.gif (1041 bytes)

The makers of the NSL brain implant first developed the product under a grant by the United States Department of Defense as a solution to the problem servicemen and women were having when being shipped overseas to the Middle East. “No one spoke Arabic which led to some serious misunderstandings between our military and that of the country our servicemen were stationed in,” says Dr. Lewis Lipps, chief engineer on the NSL project. “The NSL Arabic version will immediately resolve that issue and allow certain soldiers to communicate in countries such as Iraq, Afghanistan, even Libya with little to no problem,” said Lipps.

Asked how the nano-chip brain implant works, Lipps explained, “The NSL Arabic version, for instance, has a complete Arabic alphabet and dictionary with over 20,000 common words which are electronically translatable from English literally within nanoseconds. In a simple outpatient procedure, the NSL chip is implanted into the corpus callosum portion of the left side, or the language center, of the brain and activated.”

bluered.gif (1041 bytes)

Dr. Lipps then showed illustrations of the procedure which is done through arthroscopic surgery. “As soon as a soldier thinks out the phrase he wants to say,” he continued, “he pushes a button that is also implanted discretely underneath the skin on the soldier’s upper left side of the head.” Dr. Lipps explained that when the soldier goes to speak, it appears he is tapping his head as if he is thinking of what to say, and voila, his words come out of his mouth in the language he has implanted. In this case, Arabic.

Initial test results indicate a 97.6% success rate on the battlefield and the nano-chip is already being used by many servicemen and women today. Now that the product has been tested and proven to be efficient in Arabic, a Mandarin Chinese model is being tested on businessmen from various industries who find it necessary to communicate in Chinese with their business counterparts in China. The NSL Chinese version should be available to the business world within two to 8-10 months.

bluered.gif (1041 bytes)


Posted by 

Posted 5 years, 9 months ago.

Add a comment

The NSA Behind The Curtain Nano-Brain-Implant

.

.

The NSA Nano-Brain-Implant

.

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.
advertisement
What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.
We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.
I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.
Mr Computer
The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.
The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.
Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.
Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.
Mr Computer’s capabilities and human-like reasoning cannot be understated.
Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.
Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.
The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.
Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.
Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.
The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.
Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.
It knows bull@!$%# when it hears it and will let you know in no uncertain terms.
As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.
Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.
The Pipes Are Calling
First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.
We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.
The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.
This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.
We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.
The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.
Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.
Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.
These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.
So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.
In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.
The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.
Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.
A mixture of ground, air and satellite-based networks are used to deliver this capability.
Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.
With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.
In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.
Input, Input, Input
Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.
The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.
Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.
Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.
Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.
We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.
With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.
Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.
If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.
Ignore any suggestion that this too much data.  The truth is that all the communications happening on the planet right now can be monitored in near real-time.
As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.
As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.
Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.
Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.
These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.
Hardware
This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.
My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems.  With their base costs, they could be running several hundred easily.
In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.
The Thinking Machine
Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.
The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.
A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.
If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:
Eidolon TLP – Mr Computer in incognito
Conclusion
The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.
At some point, it could be your turn.
What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:
81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) months prior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.
91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.
http://cryptome.org/mayer-016.htm
The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.
The NSA is a deeply corrupt organisation, that has little regards for the rights of others.  Never trust a government, even your own, implicitly.  Nations change, opinions change and people change.  It just takes the right catalyst for it to happen.
In most cases, you will find the seeds were always there, you just chose to ignore them.

The NSA Behind The Curtain

Mon Jan 16, 2012 7:54 PM EST

As promised, we will take an in-depth examination of the NSA global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.
What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.
We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.
I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

Mr Computer’s capabilities and human-like reasoning cannot be understated.

Read moore: http://www.mindcontrol.se/?page_id=6776

Mon Jan 16, 2012 7:54 PM EST

Mr Computer

The scope of the NSA infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.
The NSA is built around a super-computer bound Artificial Intelligence to Nano- Brain-Implant known only as Computer in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.
Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.
Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.
Mr Computer capabilities and human-like reasoning cannot be understated.
Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.
Read Moore:http://www.mindcontrol.se/?page_id=6776

Mon Jan 16, 2012 7:54 PM EST

Newsvine

Posted 5 years, 10 months ago.

Add a comment