Microchip

Technocracy XIV: Psycho-Civilised

“Technological progress has merely provided us with more efficient means for going backwards”

Aldous Huxley


Note: A re-read of ‘Satan’s Little Helpers VII: Mind War’ is advised.

monitors1

The SMART-Surveillance Grid allows improvements in telecommunications, electricity provision and home functionality. It offers an exciting integration of eco-economics and energy saving technology along with the “Internet of Things” (IoT) and “Network of Things” (NoT) which is offering to revolutionise transport, communications and urban infrastructure as a whole. With embedded surveillance it permits advertisers, marketeers to access human minds as never before. Authorities can also tap in and use this consumerist techtopia to trap criminals and would-be “terrorists”. It requires that the State and Official Culture become so integrated through technology that the line will be blurred. Security and collectivism will be encouraged to a degree that compliance will be seen as good citizenship insofar as it maintains the urban environment and social provision. A new social contract will be loaded in favour of the State through a form of satiated servitude. (The Illuminist-Enlightenment thinkers would be well pleased).

So-called terrorists, dissidents/activists, protestors and ordinary citizens will need to be very concerned indeed on the road to SMART society as true individual thinking outside the box will slowly become frowned upon since it will not be conforming to the precept of a “psycho-civilised” society. The path of access to this dystopian view starts with ubiquitous surveillance.

As one short example illustrates, Britain’s Leeds-based Metropolitan Police Force is using a surveillance system procured from Datong plc., past customers of which have been the US Secret Service, the Ministry of Defence and unsavory regimes in the Middle East. The system is disguised as a mobile phone network which transmits a signal allowing the police or any other authority: “… to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area,” … “Strictly classified under government protocol as “Listed X”, it can emit a signal over an area of up to an estimated 10 sq.km, forcing hundreds of mobile phones per minute to release their unique IMSI and IMEI identity codes, which can be used to track a person’s movements in real time.” [1]

This is just one regional police force.

While the online company Amazon will track you via your Kindle reader for targeted advertising pathway prediction, the authorities will do the same based on the accumulated data to which it has access. It will not be for what you might buy, rather it will access what you may be thinking and your likely course of action on the “threat assessment” scale. There is precious little happening to prevent Google and other information technology companies from rolling out the SMART Internet of Things infrastructure which has enormous implications for a privacy and collective freedoms. Wi-Fi is destined to play a huge role.

militarysmartcityUrban law enforcement and Telephone towers with technology which allows multiple receive-transmit capability 

The social benefits of providing free access to Wi-Fi hot spots for those in low-income brackets and incentives for business travellers are shielding plans by the U.S. Department of Defence: “… to build robots that configure themselves into ad hoc wireless networks within urban areas” which were already well underway in 2007. Seizing control of internet communications and tracking individuals in urban areas is a necessary by-product of the technocratic SMART society. If that fails, the military are well placed to set up these Wi-Fi networks in a matter of hours or less. The Department of Defence (DOD) Homeland Security, Canadian, Israeli and NATO forces regularly conduct war-game exercises with Wi-Fi networks at the heart of operations. A DOD announcement for contractors as described by journalist Mark Baard discloses operations whereby:

“… soldiers will be able to drop robots, called LANdroids … when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network…The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of individual computers and mobile phones…where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail. The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the DOD believe.” [2]

As people become more accustomed to SMART technology and RFID tagging this will lead to the acceptance of our “need” to ensure greater technological “freedom.” As well as the technological capabilities of HAARP lying in the background in some form or another and married to these advances in technology, is it such a huge leap of imagination to think that once we are fully enmeshed in this SMART society where everything is habitually integrated that it would not be easy to begin directly assessing, monitoring and “downloading” material directly into the mass mind? Television has already served this purpose well, albeit in a more indirect fashion. With this in mind, though some have since expired and at least one is no longer listed (as of 1990) the US patent office listed the following successful registrations dating back to 1992:

U.S. Patent 5159703: Silent Subliminal Presentation System. (issued 1992) U.S. Patent 5507291: Method and an associated apparatus for remotely determining information as to a person’s emotional state. (issued 1996) U.S. Patent 5629678: Implantable transceiver – apparatus for Tracking and Recovering Humans. (issued 1997) U.S. Patent 6014080: Body worn active and passive tracking device (issued 2000) U.S. Patent 5868100: Fenceless Animal control system using GPS (Global Positioning Satellite) Location information. (issued 1999) [3]

US patent No. 5507291 filed on April 5, 1994 shows the level advancement at the public level. What goes on beyond top secret levels of the National Security State is anyone’s guess. The patent’s “abstract” is described as follows:

“In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured and compared with reference values to provide information utilizable in evaluating interviewee’s responses or possibly criminal intent in security sensitive areas.” [4] [Emphasis mine]

And US patent No. 5159703, filed on December 28, 1989:

“A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic or optical media for delayed or repeated transmission to the listener.” [5] [Emphasis mine]

In the late Lt. Colonel Michael Aquino’s book: Mind War he explores psychological operations in combination with emerging technologies such as EM waves, Silent Sound and ionospheric mind control. Let’s not underestimate the power inherent within the human body /mind complex. After all, the electrical energy that powers each cell in our bodies works out at 30 million volts per metre, the equivalent voltage of a bolt of lightning. [6]Power within can be, as it were, reverse-engineered. From a footnote in the same chapter if you didn’t catch the first time, read it again in this context:

“… the NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24hrs a day. […]

“When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”

Citizens Against Human Rights Abuse (CAHRA) supports many of the claims of systematic surveillance stalking and virtual torture from electromagnetic waves and interference. According to one researcher amongst many, Dr. Armen Victoria’s  1998 essay regarding ‘The Military Use of Electromagnetic Microwave and Mind Control Technologystates the capability of cloning human EEGs for targeted mind control purposes where a variety of emotional responses and instinctive reactions: “… have been identified and isolated from the EEG, as ’emotion signature clusters’. Their relevant frequencies and amplitudes have been measured, then the very frequency/amplitude cluster is synthesised and stored on another computer, each one of these negative emotions properly and separately tagged. ‘They are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being.” [7]

It appears that The Tri-Service Electromagnetic Advisory Panel (TERP) represents the interests of all three military services in the US. It is still conducting some of the most advanced research in the world which in turn, stems from the investigations made by the Russian pioneers in mind control technology during the early 1960s and 1970s. The U.S. Air Force has been researching ocular injury by exposure to millimetre wave system, bio-effects of High Power Microwave in low microwave regions (S band) and Radio Frequency Radiation (RFR). The use of High Power Microwave (HMP), by each of the military services seems to be commonplace. Judging by the wealth of research on the subject the US Navy is also getting extremely excited at the prospect of utilising electro-magnetic waves as a psychotronic weapon. We may then understand that the invasion of Iraq not only represented an opportunity to plunder a nation for resources and stake claim to a long held geopolitical prize, but to test out new developments in microwave weaponry and experiment with the latest PSYOPS.
As Guardian columnist John Sutherland put it: “The battlefield will be the testing ground for the US samurai. No more rhesus monkeys or pigs but real, live Iraqis.” [8]

According to Dr. Oliver Lowry who has had the dubious honour of working for the US military on several classified projects, Iraqi soldiers were the latest unwitting guinea pigs to further such advances, one of those being Silent Sound Spread Spectrum (SSSS), sometimes called SQUAD:

… According to statements made by captured and deserting Iraqi soldiers, however, the most devastating and demoralizing programming was the first known military use of the new, high-tech, type of subliminal messages referred to as ultra-high-frequency “Silent Sounds” or “Silent Subliminals”. Although completely silent to the human ear, the negative voice messages placed on the tapes alongside the audible programming by PSYOPS psychologists were clearly perceived by subconscious minds of the Iraqi soldiers and the silent messages completely demoralized them and instilled a perpetual feeling of fear and hopelessness in their minds. [9]

Humans are highly sensitive and susceptible to a variety of electromagnetic frequencies – natural or artificial. The human body is a highly sensitive package of water, bio-chemicals, and electromagnetic energies. The introduction and exposure to various kinds of external micro or EM waves of any kind whether from mobile phones RFIDs or even wind-farm infra-sound does and will have an effect on the human being in ways we do not understand. Consider also that the geo-magnetic sensitivity in animals and other living organisms concentrations of ferromagnetic material – most notably magnetite. The same levels of magnetite conductor / receptor bio-mineralization were discovered to exist in the human brain in the early 1990s. The authors of one paper say that the presence of the particles may account … for a variety of biological effects of low-frequency magnetic fields.” [10]

0117x

Electric field of the heart on the surface of the thorax, recorded by Augustus Waller (1887).

Weapons which target the mind and nervous system of selected individuals also has a long tradition. Reports of systematic mind stalking, harassment of individuals, testing and deployment of electronic and electromagentic devices (EMF) by government/outsourced agencies have been surfacing in the United States, North/South Korea and various countries in Europe. This has eroded human rights comprehensively with the added bonus for the persecutors that it is almost impossible to confirm and verify that which is literally “all in the mind”.

Though information in electronic/electromagentic or “non lethal Weaponry” is largely classified there is sufficient evidence from modern history and individual reports to reach the conclusion in a court of law that the targeted, micro-social use of behaviour modification technology is being used against individuals and activist groupings.

Interest in a variety of EMF weaponry had already begun at the beginning of the 20th Century with the genuis of Nikola Tesla and his experiments with radar and electrical energy. Concentrating and directing a beam of electromagnetic energy over a certain distance took hold of Tesla’s mind until his death in 1943. It seems the military-industrial complex heavily saturated in Nazi philosophy and science simply subverted Tesla’s genius and extended his advances in the field.

DARPA have been on the case since the Cold War with their 1958 research into combating Soviet advances in electromagnetic weapons and defenses. The capability to disrupt human emotions, inflict pain and fragment the personality was already well underway during pre and post-war experimentation under Operation MK-ULTRA, Project MONARCH, Project PANDORA and the development of PSYOPS and CoIntelpro emerging against the background of the civil rights movement of the 60s and 70s; behaviour modification had a new platform to play with.

Since that time with the enormous advances in “new concept” warfare there is every likelihood that a fusion of this military-intel science is not only being used as form of macro-social engineering and a monopoly of media-led propaganda, but the use of mass mind, ionosphere technology (fomerly labelled HAARP) to influence whole regions, even countries. It is therefore not a huge leap of imagination to recognise that the precision use of psychotronic weaponry to target selected individuals by the National Security State apparatus is in existence and heavily funded by black budgets.

Well in advance of the war on terror hoopla, Neo-Conservative regime change and the sky-rocketing increase in human/drug trafficking, mind control technologies were telegraphed to the military-intelligence faithful as the tool of choice to keep the world in line. The Strategic Studies Institute of the U.S. Army War College, published in 1994: ‘The Revolution in Military Affairs and Conflict Short of War’ by LTC James Kievit, Dr. Steven Metz. In the paper, the authors state the following drawn from their “hypothetical future scenario”:

The president was thus amenable to the use of the sort of psychotechnology which formed the core of the RMA (revolution in military affairs)… it was necessary to rethink our ethical prohibitions on manipulating the minds of enemies (and potential enemies) both international and domestic… Through persistent efforts and very sophisticated domestic ”consciousness raising”, old-fashioned notions of personal privacy and national sovereignty changed. As technology changed the way force was applied, things such as personal courage, face-to-face leadership, and the ‘warfighter’ mentality became irrelevant. […] Potential or possible supporters of the insurgency around the world were identified using the comprehensive Interagency Integrated Database. These were categorized as ‘potential’ or ‘active’, with sophisticated personality simulations used to develop, tailor and focus psychological campaigns for each“. So the Institute of Strategic Studies supposed that in the year 2000 those technologies would be that advanced that it will be possible to deprive human being of his freedom and adjust his personality to the needs of ruling elite. Most probably those technologies were at this level already in 1994.

Put this together with Synthetic Environments for Analysis and Simulation (SEAS), the SMART grid, MAIN CORE, biological and PSYOPS warfare and you begin to get the idea that the technology of assymetric warfare isn’t just about geostrategy to dis-empower traditional enemies such as Iran, Russia and China. It is about war against domestic population by stealth and in plain sight. According to Project Censored’s 2006 paper titled: ‘US Electromagnetic Weapons and Human Rights’ offers a broad brush synthesis of the field and confirms the black budget capabilities available since the Zio-Conservative false-flag coup of 9/11:

“Michael Vickers, senior adviser to the Secretary of Defensefor the 2005 Quadrennial Defense Review and principal strategist for the largest covert action program in the CIA’s history, recently testified on the importance of black operations: “US Special Operations Command’s (SOCOM) emphasis after 9/11 has been to make white SpecialOperations Forces (SOF) more gray and black SOF more black. It is imperative, however, that white and black SOF be integrated fully from a strategic perspective.” [11]

CongnitiveMappingSource: Petri Ticklen at http://alicefish.net/MindAttack.htm Original source: Against Electronic Mind-Control International /http://againstmindcontrol.tripod.com/liber.html

Since the war on terror propaganda has now made sure that activists, dissidents and indeed anyone overtly successful in criticising government policy is shut down, detained or harassed it is hardly shocking to discover that some of these covert programs have been targeting people for experimentation in CIA rendition centres, prisons, psychiatric wards and across the general public with immunity. Project Censored authors state:

“…Hundreds of people continue to assert that a person or persons, whom they do not know,have been targeting them with electromagnetic weapons in a widespread campaign of either illegal experimentation or outright persecution. These experiences involved a number of discrete phenomena:

  • Hearing voices when no one was present.
  • Feeling sensations of burning, itching, tickling, or pressure with no apparent physical cause.
  • Sleeplessness and anxiety as a result of “humming” or “buzzing”.
  • Loss of bodily control, such as twitching or jerking of an arm or leg suddenly and without control.
  • Unexpected emotional states, such as a sudden overwhelming feeling of dread, rage, lust or sorrow that passes as quickly as it arises. [12]

And the industry of non-lethal weaponry (NLW) is steadily increasing playing a dominant role in asymmetric warfare abroad as well as crowd control closer to home. The market for NLW will apparently double by 2020. [13] That means big money. Almost ten years ago:

“…the Air Force issued $24 million in contracts for “Electro Magnetic Effects Research and Development” to Northrup Gruman, Voss Scientific, Lockheed Martin, ElectroMagnetic Applications, and SAIC among others. The DOD viewed electromagnetic research and development as a key component in future wars as early as the 1990s. Emmett Paige Jr., Assistant Secretary of Defense for Command, Control, Communications and Intelligence declared in 1996 that, ‘Well over a decade ago, a Soviet general reportedly said something like ‘to prevail in the next conflict, one must control the electromagnetic spectrum.’ That statement proved true in the Bacca Valley and on deserts in Iraq. The Department of Defense is committed to ensuring that ‘in the next conflict it is we who will control the spectrum. We know its value’. Increasingly, the value of non lethal weapons continues to rise as they produce fewer images of death in the media than traditional weapons.’

In addition to DOD contractors, the realm of non-lethal weapons extends into the universities with millions of dollars in scholarships and research fellowships. Pennsylvania State University, sponsors the Institute for Non-Lethal Defense Technologies (INLDT), the University of Medicine and Dentistry of New Jersey has the Stress and Motivated Behavior Institute, University of New Hampshire houses the Non-lethal Technology Innovation Center, and many US military schools have classes directly related to non-lethal weapons technology. There are also numerous conferences each year hosted by the Department of Defense, contractors and universities. The business of non-lethal weapons is expanding and will continue to grow. In 2006, the Joint Non-Lethal Weapons Directorate received $43.9 million compared to $25.8 million in 2000. [14]

By 2011, this had increased to $138 million, reaching $140 million in 2013. [15] If we read the US Department of Defence’s Annual Non-Lethal Weapons Program Annual reports, it would leave you feeling suitably humbled and sentimental, beaming with national pride that Uncle Sam and its numerous military bases are making the world a less lethal. Apart from such delusions, what is more interesting is how such NLW advances are leaking into law enforcement and perceived “National Security.” A passage from Project’s Censored’s report concerning one Eldon Byrd a medical engineer, underscores this point:

“After working on the Polaris submarine, which carried long-range nuclear weapons, Byrd developed non-lethal weapons with reversible effects. He regarded this as a humanitarian alternative to ‘punching holesin people and having their blood leak out’ in battle. His inventions used magnetic fields at biologically active wave frequencies to affect brain function. Byrd could put animals to sleep at a distance and influence their movements. When the success of his research became evident, suddenly he was pulled off the project and it went “black.” He believes the electromagnetic resonance weapons he developed have been used for psychological control of civilians rather than for exigencies in battle. That is, to ensure his participation, he was uninformed about the true nature of the project. Byrd’s case also illustrates how morally tolerable operations may transition to morally intolerable operations, or at least rise above the atrocity line.” [16]

It is this intentional compartmentalisation and factional nature of operations and directives within military and  intelligence agencies which allows pathological leadership to develop.

Back in 2006, Congress and George W. Bush signed the Military Commission Act of 2006. which allowed torture and suspension of due process as acceptable. Since that time, torture apologists from law, academia and the military have come out to justify such actions as necessary for the “greater good” once again, trashing the very concept of the Universal Declaration of Human Rights and basic notions of conscience. The Anglo-American-Zionist Establishment is perfectly happy to use all and everything in its means to achieve its ends including the use of technology that cannot be detected nor recognised by Official Culture.

The somewhat infamous Dr. José Delgado Director of Neuropsychiatry at Yale University Medical School in the 1960s and 70s, and later Professor of Neurobiology in Madrid, Spain, had gained quite an internet following of shock and revulsion based around his similar pathological view of the capabilities of psychosurgery. He urged the U.S. government to make “control of the mind” a national goal. [17] He cheerily – and perhaps ill-advisedly – voiced his opinion and those of his superiors regarding the future:

“We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Someday, armies and generals will be controlled by electric stimulation of the brain”. [18]

Dr. José Delgado was nothing if not thorough in his research. In 1965, The New York Times reported on Delgado’s successful experiment in the use of electronic implants connected to the motor nervous system of a bull – the unfortunate animal was stopped from charging by remote radio-control. The bizarre capabilities of surveillance was demonstrated when he surgically implanted a cat with an electronic implant which transmitted everything the poor moggy was seeing and hearing to a TV monitor.

The Doctor’s foray into publishing produced Physical Control of the Mind: Toward a Psycho-civilized Society (1969) which helped to confirm his Dr. Evil status on the net – not without justification. The doc is messianic in his belief that humans will undergo “psycho-civilization” by uploading the contents of their brains directly to machines and vice versa. With statements like that it is unlikely that he limited his experiments to animals. According to a 2001 interview for Cabinet magazine conducted by artists and writers Magnus Bärtås and Fredrik Ekman there are still many of Delgado’s descriptions in his own articles and reports of how he moved from animals to humans in contemporary American medical libraries. The reporters relate how Delgado, Dr. Mark, and other colleagues: “describe what was the first clinical use of Intracerebral Radio Stimulation (IRS) on a human being. The stimoceiver itself only weighed 70 grams and was held fast by a bandage.”

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (1986)

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (Third Edition: 1986)

In an article called “Radio Control Behavior” in the February 1969 issue of The Journal of Nervous and Mental Disease there are descriptions of patients who had undergone procedures to attach the device to their brains.

Case studies include:

… A black fourteen-year-old girl on the border of developmental disability who grew up in a foster home suddenly goes into a fury that leads to the death of her two stepsisters. A thirty-five-year old white industrial designer who ends up killing his wife and children flies into a rage when other motorists try to overtake him and he chases them and tries to run them off the road. Their aggressive behavior is supposed to be registered by the stimoceiver in the way a seismograph registers the earth’s tremors and the same stimoceiver is then to “turn them off” via the FM transmitter. [19]

In the interview Delgado admits that as far as he was aware nothing came of the IRS device due to the complexity of the brain and the unreliability of the mapping: “We never knew which parts of the brain we were stimulating with the stimoceiver. We didn’t even manage to prevent epileptic attacks, which we thought would be the simplest of things. We never found the area where epilepsy attacks originate.” [20]

The authors reveal their surprise at his: “casual attitude towards the stimoceiver which was heralded as a great contribution to science.” Although Delgado’s attitude conforms to later developments regarding the brains plasticity and almost holographic nature, normal practice for radar experiments in psychological control were to appropriate and integrate into covert programs. After all, mind control operations were/are still continuing. It was at the congressional hearings on the CIA sponsored MK-ULTRA operations that Delgado made his famous declaration of psychosurgery. It seems highly improbable that such experiments were ignored especially when they often yielded startling results.

To illustrate the effectiveness of electro-stimulation Delgado and his colleagues: “… orchestrated violent scenes in the lab” descriptions of which were captured in the book: The Brain Changers: Scientists and the New Mind Control (1973) by Maya Pine who relates one incident typical of the research in question:

As the film opens, the patient, a rather attractive young woman, is seen playing the guitar and singing “Puff, the Magic Dragon.” A psychiatrist sits a few feet away. She seems undisturbed by the bandages that cover her head like a tight hood, from her forehead to the back of her neck. Then a mild electric current is sent from another room, stimulating one of the electrodes in her right amygdala. Immediately, she stops singing, the brainwave tracings from her amygdala begin to show spikes, a sign of seizure activity. She stares blankly ahead. Suddenly she grabs her guitar and smashes it against the wall, narrowly missing the psychiatrist’s head. [21]

As the authors delved deeper into the experiments on people Delgado became suspicious and tense. He terminated the interview not long after. Rather than regretting his time of psychosurgery innovation it is likely that Delgado was feeling petulant about being left out of the loop after his data was integrated into the continuing experimentation. He may have had considerable lack of success with the vagaries of brain plasticity but his work on animals was highly valued during the parallel mind control work of MK-ULTRA and other operations. Though unconfirmed, it is thought that Delgado worked on Project PANDORA as part of the CIA’s experiments into electromagnetic modulation with particular attention to scrambling the minds of soldiers on the battlefield. It was at exactly the same time that the CIA began to conduct radiation experiments on the US population, just prior to Delgado starting his research on electro-magnetic radiation and its capacity for influencing people’s consciousness.

After the 1974 congressional hearings the Doctor continued his animal research managing to link his brain implants with computers. This was documented in “Two-Way Transdermal Communication with the Brain” published in 1975 where he stated:

“The most interesting aspect of the transdermal stimoceivers is the ability to perform simultaneous recording and stimulation of brain functions, thereby permitting the establishment of feedbacks and ‘on-demand’ programs of excitation with the aid of the computer. With the increasing sophistication and miniaturization of electronics, it may be possible to compress the necessary circuitry for a small computer into a chip that is implantable subcutaneously. In this way, a new self-contained instrument could be devised, capable of receiving, analyzing, and sending back information to the brain, establishing artificial links between unrelated cerebral areas, functional feedbacks, and programs of stimulation contingent on the appearance of pre-determined patterns” [22]

In true “mad professor” fashion, Delgado continued his experimentation  on an island in Bermuda, where a group of gibbons were placed at his disposal. Naturally, the doctor had them all fixed with electronic brain implants which led him to discover how to build and destroy social orders using electrical brain boosts. [23] This would have been right up the technocratic street that was emerging in the warfare-ridden 1970s. So, this begs the question: after over thirty years of electronic implant tinkering what has the Pentagon, DARPA, NSA and unknown agencies come up with besides the RFID tagging systems? Our old friend the Nazi-tainted IBM needs to be brought in here.

Reflect on this confidential memo covertly obtained all the way back from October, 1995 from INTELLI-CONNECTION, a Security Division of IBM. In the form of an office memo, it reveals some interesting information. An edited extract follows:


 THE I.B.M. 2020 NEURAL IMPLANT

CONFIDENTIAL, LIMITED DISTRIBUTION ONLY, LEVEL 9 COMMUNICATION, 2020 NEURAL CHIP IMPLANT

   “Federal regulations do not yet permit testing of implants on prisoners, but we have entered into contractual testing of our product. We have also had major successes in privately owned sanitariums with implant technology… In California, several prisoners were identified as members of a security threat group, EME, or Mexican Mafia.

   They were brought to the health services unit at Pelican Bay and tranquilized with advanced sedatives developed by our Cambridge, Massachusetts laboratories.

   The implant procedure takes about 60-90 minutes depending on the experience of the technician. We are working on a device that will reduce that time by as much as 60 per cent. The results of implants on 8 prisoners yielded the following:

   Implants served as surveillance monitoring devices for threat group activity. Implants disabled two subjects during an assault on correctional staff. Universal side effects in all 8 test subjects revealed that when the implant was set to 116 Mhz all subjects became lethargic and slept an average of 18-22 hours per day. All subjects refused recreation periods for 14 days during the 116 Mhz test evaluation…”

   Each subject was monitored for aggressive activity during the test period and the findings are conclusive that 7 out of 8 test subjects exhibited no aggression, even when provoked. Each subject experienced only minor bleeding from the nose and ears 48 hours after the implant due to initial adjustment.

   Each subject had no knowledge of the implant for the test period and each implant was retrieved under the guise of medical treatment. The security windfall from the brief test period was tremendous. Security officials now know several strategies employed by the EME that facilitate the transmission of illegal drugs and weapons into their correctional facilities … In Massachusetts, the Department of Corrections had already entered into high level discussions about releasing certain offenders to the community with the 2020 neural chip implants.” [24]


What is the probability that such technology has been way in advance of anything we see from outsourced DOD departments which are overt and relatively open to public discourse? What of deep black projects far away from any oversight? Might we assume that such R & D may be in development, the results of which could be used on the potential activist, dissident or “terrorist” when the SMART-Surveillance society (SSS) is fully integrated into a comfortable, consumerist paradise?

If we take the infestation of Satanic Ritual Abuse networks which appear to be seated in most centres of power and seeping into the waiting SSS managed by mind control technology both overt and covert, this is surely worse than any science-fiction novel we can imagine. If we are to give credence to Zbigniew Brzezinski’s visions, which in any case, may simply be explanatory notes to his fellow comrades signalling what will happen, the technology may already be in place and operational.

In his 1970 book Between Two Ages Brzezinski writes:

“… of a future at most only decades away,” upon which he related the opinion of an experimenter in intelligence control who asserted: ‘I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.” [25]

This is the darker side of the transhumanism crowd and which permeates social network corporations, military-intelligence and the DARPA inspired National Surveillance state. The music emanating from SMART grid technology is that of the Pied Piper lulling his followers into a false dawn. Saturating ourselves in W-Fi and locking ourselves into a EMF grid; making our gadgets indispensable for our most basic daily needs is exactly what this mainframe seduction is all about.

Part of being psycho-civilised is that we become seduced by the promise of more and more access, increasing efficiency and the ever smaller distance between “want” and “have.” The problem is, it appears to be an illusion, engineered with great precision, doffing it’s hat to ecological principles and economic alternatives whilst retaining a core-machine centralisation.

If we do not see the Magician behind these pretty lights and virtual enticements, these amenities offering a New Order of efficiency and ease, we will end up exactly as Henry David Thoreau wrote about his fellow man whom he believed had become : “… as tools of their tools.” When that happens and in combination with our illustrious pathocratic leaders, there may be very few choices to think freely, let alone act. We will be quite literally lost in the “simulation and simulacra”.

That is the antithesis of SMART.

See also: Satan’s Little Helpers VI: Sleepers and Electro-Shocks

 


Notes

[1] ‘Met police using surveillance system to monitor mobile phones’ The Guardian October 3, 2011.
[2] ‘Urban Wireless to Serve Intel and PSYOP forces’ by Mark Baard parallelnormal.com, July 19, 2007.
[3] http://www.patft.uspto.gov/
[4] ‘Method and an associated apparatus for remotely determining information as to person’s emotional state’ Inventors: Stirbl; Robert C. (New York, NY), Wilk; Peter J. (New York, NY) Appl. No.: 08/222,835 Filed: April 5, 1994 / 5,507,291 Stirbl et al. April 16, 1996. www. patft.uspto.gov/
[5] ‘Silent subliminal presentation system’ Inventors: Lowery; Oliver M. (Norcross, GA) Appl. No.: 07/458,339 Filed: December 28, 1989, issued as United States Patent 5,159,703, October 27, 1992. www. patft.uspto.gov/
[6] Utility Services in India’ | http://www.indiaonline.in/About/utilities/index.html
[7] The Military Use of Electromagnetic Microwave and Mind Control Technology’ by Dr Armen Victorian Lobster Magazine 1998. [8] ‘Horrifying US Secret Weapon Unleashed In Baghdad’ By Bill Dash, rense.com August 25, 2003.
[9] .‘Ariel Mind Control’ by Judy Wall, Editor/Publisher Resonance Newsletter of the MENSA Bioelectromagnetics Special Interest Group http://www.raven1.net/commsolo.htm
[10] ‘Magnetite Biomineralization in the Human Brain’ by Joseph L. Kirschvink, Atsuko Kobayashi-Kirschvink and Barbara J. Woodford, National Academy of Sciences. | Vol. 89. Biophysics, 1992.
[11]’US Electromagnetic Weapons and Human Rights’ By Peter Phillips, Lew Brown and Bridget Thornton, As Study of the History of US In telligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University, Project Censored Media Freedom Foundation.http://www.projectcensored.org/wp-content/uploads/2010/05/ElectromegnaticWeapons.pdf
[12] Ibid.
[13] ‘Non-Lethal Weapons (NLW): Industry, Technologies & Global Market’ 2014-2020 Aug 19, 2014 |http://www.marketwatch.com/story/non-lethal-weapons-nlw-industry-technologies-global-market-2014-2020-2014-08-19
[14] Ibid.
[15] http://jnlwp.defense.gov/Portals/50/Documents/Press_Room/Annual_Reviews_Reports/2013/DoD_Non-Lethal_Weapons_Program_Annual_Review_11.19.2012_HTML_format_v1.pdf
[16] Many accounts on psychotronic abuse are available to read in books and online. Some links: http://mindjustice.org/ | http://freedomfightersforamerica.com/victims_statements_pg1 [16] op.cit Philips, Brown, Thornton.
[17]The People Shapers by Vance Packard, published by Little, Brown & Co., 1977, (p.4).
[18] Joseph Delgado February 24, 1974 edition of the CONGRESSIONAL RECORD (MKULTRA hearings) No. 26, Vol.118.
[19] ‘Psychocivilization and Its Discontents: An Interview with José Delgado’ by Magnus Bärtås and Fredrik Ekman, Cabinet magazine, Issue 2 Mapping Conversations Spring 2001.
[20] Ibid.
[21] Ibid.
[22] ‘Two-Way Transdermal Communication with the Brain,’ Delgado, Lipponen, Weiss, del Pozo, Monteagudo, and McMahon, a co-operative publication of the Medical University of Madrid, Spain, and Yale University Medical School, 1975.
[23] Mass Control: Engineering Human Consciousness Jim Keith, IllumiNet Press, 1999. (p.99)
[24] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997. See also: (http://www.trufax.org/reports/2020.html)
[25] op. cit. Brzezinski (p.15) (Between Two Ages)

Advertisements

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 

Update: See also: Data is the New Oil

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

Technocracy X: Nano-Science (2)

 “We cannot rely on trial-and-error approaches to deal with existential risks… We need to vastly increase our investment in developing specific defensive technologies… We are at the critical stage today for biotechnology, and we will reach the stage where we need to directly implement defensive technologies for nanotechnology during the late teen years of this century… A self-replicating pathogen, whether biological or nanotechnology based, could destroy our civilization in a matter of days or weeks.”

― Ray Kurzweil, The Singularity is Near: When Humans Transcend Biology


dna_nano_tech-wideThe military is the largest investor in the U.S. Nanotechnology Initiative (NNI). The share of the NNI budget given to the Department of Defence (DoD) since the program started has reached $6.6 billion with part of the expenditure going to DARPA and the departmental laboratories of the Navy, Army and Air force, the rest ending up at universities as research grants or as part of the Multi-University Research Initiative (MURI).[1]  Though spending has been fluctuating since 2007, there remains steady interest in nanotech’s military capabilities. Scientists for Global Responsibility (SGR) revealed from their research that: “… government funding for military R&D dwarfs that spent on social and environmental programs across the industrialized world …” with military R&D fixed towards “… a narrow weapons-based security agenda.” [2]  Which means the marginalisation of conflict prevention and analysis of the roots of conflict and its links to poverty, the environment, security and health issues continue to be under-funded. Nanotech advances are being hijacked away from improving civilian life with “game-changing” technology as the culprit.

A fervent need to make these grand visions a reality was given a sturdy platform for realisation back in 2007 from the DoD and their little known advisory body called the Defence Science Board (DSB) whose paper entitled: “DSB 2006 Summer Study on 21st Century Strategic Technology Vectors” laid some important groundwork for the future. In an attempt to place nanotech at the top of the military agenda the paper drew their attention to “synergistic combinations” of all forms of nanotech and their “… truly revolutionary capabilities in human performance enhancement, medical treatment and prophylaxis, miniaturization, life extension, robotics, and machine intelligence …” [3]  It was unabashed in its agenda for clandestine tagging and tracking, where: “A combination of nanotechnology, biology, and chemistry promises to provide significant increases in capability to conduct pervasive surveillance on a global basis.”

spybee

prototype for cyborg-bee © unknown

Some of these other applications currently in R & D or primed and ready for action include the following:

Nano-biotechnology – or miniaturized biotechnology is the recent development of merging biology research with nanotechnology, most notably using biomolecules, bio-membranes and nano-photonics for vaccinations and virus research. Particularly active in medical fields the new science is seeking to generating cures; develop stem cell treatments, creating muscle tissue and artificial proteins. The convergence between computers and biology is of primary interest where eventually computing will be sourced from a biological platform where “Colonies of live neurons can live together on a biochip device.” [4]

Nano-electronics – The development of molecules with useful electronic properties which can then be used in nano-devices. This includes synthetic chemical methods and the creation of synthetic molecular motors. Other forms include carbon nano-tubes which have taken over from silicon-based chips. Now, the race is on to fit billions of these tubes onto computer chips thereby increasing the chip performance to “… run at more than three times the frequency and consuming just a third of the energy.” [5]

DNA nanotechnology – the construction of structures out of DNA and other nucleic acids. This branch has a special relationship to nano-medicine and “SMART drugs” for targeted drug delivery, the development and creation of vaccines and the adjacent field of nano-electronics with real world applications in both fields looming large. [6]

Nano-robotics/weaponryself-sufficient machines operating at the nano-scale. Applying nano-robots in medicine are proving difficult due to a multitude of problems adapting to the biology of organic systems, though progress is there. However, military nano-robotics in combination with cybernetics is moving ahead in leaps and bounds. There are still very little scholarly articles on the nature and pace of advances on military robotics along with only a sluggish attempt at raising the ethical and moral issues inherent in the use of such weaponry. What is clear is that the military is getting very excited by it all due to the unlimited scope of applications. Reduced to the size of perhaps 0.1mm or less, autonomous mini and micro-robots could be deployed on the ground, in water and in air, using the same propulsion principles found in larger electronic and mechanical systems. All forms of movement are mimicked such as human legs, various types of hopping, flapping wings like a bird, flagella, and even side-winding movements of a snake. The multi-purpose nature of robotics means that weapons systems targeting, reconnaissance, communication and surveillance are easily utilized. Insects and small mammals are already being integrated into bio-cyborg hybrids with nervous system and brain interfacing with cybernetics, software and electrodes.

cyborg-mothcyborg moth | © unknown

Returning to our whacky friends down at DARPA and their various sponsored companies and subsidiaries, we find they are still churning out helpful prototypes for new ways to spy, maim and murder. Some of these latest offerings are still prototypes, in the manufacturing stage or on the drawing board. They comprise:

1) Nano-Scouts – real insects and simulated bird-like technologies which act as the eyes and ears of intelligence. Flies and mosquitoes have embedded nanotech capabilities which allow them to determine the presence of certain chemicals, changes in moisture levels or barometric pressure, and be able to sense movements, temperature, and vibration.[7]

2) Nano-Poisons – A variety of toxic substances with nanomolecules carefully tailored to illicit the correct responses. By interfering with neuro-chemical inhibitors and release agents introducing precise “onboard” quantities of synthetic poisons behaviour modification is taken to a whole new level. Almost any type of mind control would be available from encouraging the victim to lie obsessively to provoking suicidal thoughts; stimulating a person to react violently or to kill. And of course, a Brave New World of somatic release could be programmed where the person cannot help but love everyone and where anger and aggression is blocked. Nano-molecules would effectively quadruple the effectiveness of purely psychological methods of mind control.

3) Nano Force Fields –nano-coatings which can hermetically seal a vehicle or building by allowing particles to seek out air gaps and block them.

4) Nano Mind Erasers – Want to take out a politician or spy without fuss or bother of assassination? Then, inducing the equivalent of instant Alzheimer’s is the answer. Wiping the sections of the brain clean using micro fields programmed to flare up as tiny, molecular neutron bombs would do the trick.

5) Nano Needles – With no visible wounds and invisible to the naked eye these weapons represent an up-dated version of the old KGB poison-tipped umbrella. The needles could be shot from a suitably modelled gun to paralyse people. Presumably the lethal nature of the needles would be dependent on their carrier capability.

6) Nano Heart-Stoppers – Nano-blood flow restrictors and Stroke Inducers – Long known to be a part of military-intelligence operations the assassination of sensitive targets such as politicians, heads of state and celebrities. Undetectable in the blood stream, nano-molecules could mimic heart attacks or strokes; restrict the blood flow causing an array of symptoms, even inducing personality disorders.

7) Nano-Naut Swarms These are ‘SMART dust’ particles which act as an information or sensor clouds capable of analysing areas with sharp detail and relying back information to HQ. As reported in the MSM in early February 2013, the British Army has been deploying tiny nano-drones in Afghanistan for over two years. At just 10cm long and weighing only 16 Grams they are used to relay full motion video and still images back to the devices’ handlers. But technology is advancing as fast as weapons can be bought.

8) Cyborg Insects – could be the delivery tool of much of the above allowing viruses and lethal substances to be to their individual or mass target, something that Bill Gates and his forays into mosquito-driven vaccines would no doubt happily welcome. Spying and surveillance capabilities have also been successfully tested and deployed. One of DARPA’s less malevolent offerings, the Nano Hummingbird was named One of Time Magazine’s 50 best inventions of 2011. Shaped like a humming-bird the mini robot is remotely-controlled without an external power source and can fly, hover, move forward and backward in the air while shooting Hi-Resolution video.

9) Programmable Matter – Starting in 2007, with DARPA support, Carnegie Mellon delved into the possibility of creating hardware and software to make material that can programmed to morph into 3-Dimensional shapes – essentially, shape-shifting. Named the Claytronics Project, the brains behind this venture believe that it has the capacity to change every facet of human experience. They consider claytronics to be a platform for a new form of called “Pario” with the reproduction of moving 3-D objects the primary goal. In other words, the quest to program the world around us. Just a few years later in 2010 with a “self-folding origami” robot which can literally fold itself up and crawl away. Meantime, shape-shifting sand made an appearance in 2012 where; “New algorithms enable heaps of ‘smart sand’ that can assume any shape, allowing spontaneous formation of new tools or duplication of broken mechanical parts.” This of course begins to the blur the whole fields of nanotechnology bioengineering, cybernetics, biological-based pharmaceuticals, programmable vaccines and the advance of synthetic biology.

The US Department of Defence is also researching the feasibility and applications of robotic mosquitoes. So far testing has found that they can be remotely controlled with an on-board camera and a microphone. They will be able to land on unsuspecting dissidents or terrorists with the potential to take a DNA sample or leave RFID tracking nanotechnology on your skin. Flying in through a crack in your window or attaching itself to your clothing in passing would prove no problem for these adorables. No doubt law enforcement and Homeland Security are salivating at such a prospect. [8] In fact, sightings of insect-like drones have been occurring for years in the US, most frequently at activist demonstrations and marches. According to a 2006 Flight International report: “… the CIA had been developing micro UAVs as far back as the 1970s and had a mock-up in its Langley headquarters since 2003.”

robot_insectAssuming such machines can fly onto a local protester’s arm and then wing its way back to its controller with a fresh little DNA sample to analyse, this compliments another disturbing scenario as described by authors Andrew Hessel, Marc Goodman, and Steven Kotler who “…outline futuristic human genome work that evolves from the very real GE $100 million breast cancer challenge.” In this scenario: “freelancers receive bids to design personalized virus offering customized cures for the sick.” An individual succumbs to colon cancer and instead of going the route of standard chemotherapy he chooses an immediate payment of $1000 to have his genome decoded over two days. Virologists of the near future will have information about the disease and the exclusive genome sequence. The design cure will be outsourced the winning bid providing the formula to rid your body of the specific cancer. Targeting the US President by criminal cartels or terrorist cells would be relatively easy.

A 2010 release of secret cables by WikiLeaks, Secretary of State Hillary Clinton ordered US embassies “… to surreptitiously collect DNA samples from foreign heads of state and senior United Nations officials.” [9]With that in mind, an article by Atlantic magazine takes the next logical step in personalised bio-weapons and micro-drones.

Picture an African President busy with civil war and child soldiers. Perhaps his DNA had been sampled as part of a UN / US mandate. A drug is tailored to that genome sent to an online bio-marketplace and synthesised into actual genetic material. The authors explain that it is here that “… the future of drones and virology could intersect.”

The article continues:

A few days later tablets are delivered to a group that dissolves them and injects the liquid into a handful of micro-drones. The team releases the drones and infects the people in the African leader’s circle of advisors or family. The infected come down with flu like symptoms, coughs and sneezes that release billions of harmless virus particles — but when they bring their symptoms in the vicinity of the African leader — the particles change. Once the virus particles are exposed to that very specific DNA sequence, a secondary function within their design unlocks.[10]

Perhaps the formula contained a “fast-acting neuro-destructive disease that produced memory loss and, eventually, death.” For the African leader or any other head of state which was proving an obstacle to US hegemony “the symptoms could be tailored an infinite number of ways. Designed to reflect a uniquely local affliction like Dengue Fever, or to appear like symptoms of a genetic condition.” [11]Combined with the inherent nature of the military-coporate-banking complex and with their puppet Obama who sees no problem with murdering American citizens via remote drone attacks discarding any notions of law and democratic due process, then you can be sure that such a scenario will take place in the very near future – if it hasn’t already.

The above scenario set against military nanotechnology and other forms of “non-lethal” warfare is justified due to the threat of terrorism and the belief that we can all bring an end to the world’s violence and crime. It is believed that technology will save the day on the battlefield and in civilian life. If left to these people it would rapidly start to resemble an endless battle in itself, which is the general idea. Convincing people not to act on their “evil” thoughts by allowing nano-dust particles to seep into their brains is bread and butter behaviour modification. For anyone else, it is a step towards a Huxleyian nightmare.

Although many commentators prefer to believe that the fail-safe mechanisms of quantum computing and the intelligence apparatus would be enough to protect mainstream society, they fall into the trap of believing that those of conscience are presently guiding humanity. Once again, you cannot use a juvenile dictionary to explain a psychopathic reality that is operating on an entirely different cognitive and perceptual mainframe.

The fractal nature of the nano-world of military applications means that advances in weaponry would take place exponentially with a modus operandi that would excite any social dominator beyond all measure. Using the premise of the molecular assembler, a device capable of breaking and creating the chemical bonds between atoms and molecules, it means duplication is not only feasible and efficient but a requirement once the technology is up and running. Think of the white Storm-trooper clones in the Star Wars films – very much military-technocratic ambrosia. As nanotech guru Eric Drexler explained: “a state that makes the assembler breakthrough could rapidly create a decisive military force – if not literally overnight, then at least with unprecedented speed.” He further observes: “A nation armed with molecular nanotechnology-based weapons would not require nuclear weapons to annihilate a civilization. In fact, it seems that a rather surgical system of seeking and destroying enemy human beings as cancerous polyps could be developed–leaving the nation’s infrastructure intact to be repopulated.” [12]

irobotStill from ‘I Robot’ (2004) Twentieth Century Fox

A research paper sponsored by the European Commission for a 2004 conference on the military uses of nanotechnology and the hazards to society at large, came to some sobering conclusions. While the benefits in medical and non-military domains was clear and should not be unduly hindered provided regulations and ethical boards were swiftly introduced, there were a number of indirect ways that society could be: “detrimentally affected” through the “diffusion of the technology.” The paper offered some examples, including the temptation for the National Security State and related agencies, corporations and criminals to purloin micro-sensors and robots for spying, as well as: “the use of small autonomous systems for criminal attacks – and in particular terrorism – including attacks on critical infrastructures.” They also included a third possibility, that of:

“… implanted systems and other forms of body manipulation for ‘improving human performance’. Deciding what kinds of body manipulation should be permitted, and under which circumstances is a problem of peacetime civilian life, and should be handled by civilian society. However, military R&D and deployment of such systems could establish a fait accompli before society is able to carry out a thorough debate on the desirability of particular technological developments.”

And there’s the problem.

The last thing psychologically compromised persons enjoying their place at the helm of Official Culture is to see the involvement of local communities and civic society. Genetically modified organisms and foodstuffs went this way as did television, banking, media, warfare and most other socio-political power structures which required either secrecy, perception management or corporate monopolisation to ensure a singular reality. Nanotech will be no different if it is allowed to continue without regulations and in the hands of those who wield power for their own ends. If we have humans behaving in psychopathic ways then it doesn’t require the greatest leap of imagination to realise that military robots will be a reflection of their state of mind and intentions. Pathocratic control systems require global dominance in all domains and nanotech represents a mighty leverage in the race to achieve it. Horizontal proliferation would be nearly unavoidable with small, self-replicating systems where in principle, a single copy would be sufficient for growth in another country or sub-state entity.

The report goes on to state:

Military robots with sizes from nanometres to metres would bring threats on an unknown scale. If they could kill, they could constitute new forms of weapons of mass destruction more potent than known biological warfare agents. With non-lethal effects, such as disruption of personality, mass attacks could lead indirectly to the breakdown of a society and the death of a large portion of its members. Partly as a result of their smallness, but mainly owing to their potential for self-replication and the production of additional weapons on site, nano-robots would create extreme uncertainty. [13]

Given the nature of nanotech, automated decision making would grow based on its tendency for a kind of peak, fractal replication to emerge, once technological thresholds have been reached and surpassed. When this level of technology fuses with the mentality of unlimited growth much like the standard economic mind set currently dominating, then a virtual arms-race at the molecular level could ensue with entirely unforeseen consequences. Military production overlaid with ideological insanity.

C60a

“Buckminsterfullerene C60, also known as the buckyball, is a representative member of the carbon structures known as fullerenes. Members of the fullerene family are a major subject of research falling under the nanotechnology umbrella.” (uploaded by Mstroeck at English Wikipedia Later versions by Bryn C at en.wikipedia)

Alongside the massive drive to foist genetically modified foods on global populations agribusiness is fascinated by the part nanotech can play in making food production and consolidation more efficient. However, using molecular assembly principles “nano scale carriers” will soon be used for delivering fertilizers, pesticides, herbicides and plant growth regulators. A case is being made to reduce environmental impact with nanotech. It is believed that this will improve stability and lessen environmental degradation in terms of chemical runoff and other related problems. An example of these carriers would be the use of clay nanotubes for pesticides which will apparently reduce the amount of pesticide use by 70–80 per cent. Nanoparticles can act to help mollify and transform resistant chemical compounds in to non-toxic ones while waste water treatment and disinfectants have the potential to be markedly improved. Fluorescent labelling by “quantum dots” (QDs) using bio-recognition molecules for anti-bacteria and disease control will be supplemented with an array of rapid detection and enzymatic biosensors. There is even a device called the “E-Nose” inspired by the human nose which, through the use of nanoparticle gas sensors can detect precisely the quality and quantity of gas present. [14]

Socio-economic demands will ensure that wireless nanosensors in crops designed to monitor and collate data on agronomic intelligence processes such as planting and harvesting cycles will become more and more important. Water levels, fertilizers, pesticides, herbicides and other treatments will also be under the nanosensor umbrella in the hope that maximization of crop yields and a reduction in resource input will be the end result. [15]

Biotechnology at the nanoscale is already having some success in the battle against plant resistance and environmental stresses such as drought, salinity and diseases. Nanobarcodes will be used for authentication and tracking in agricultural food and husbandry products. As knowledge grows in the area of plant gene traits and nanotechnology-based gene sequencing it is taken for granted that such process will offer new ways to reduce costs and maximize profits. [16]  With undoubted benefits that nanotechnology can provide, this is still inside the constraints of Official Culture. Farming has already been transformed into a leviathan of corporate efficiency where community, civic and independence has been sacrificed. Nano-farming may increase the overall efficiency and provide intermittent benefits, but will it have the capacity to transform agriculture away from agribusiness corporatism?

If new endeavours are dominated by the matrix of the 4Cs and the 3EM then it will limit the hope for social renewal and become just another tool to increase exploitation still bound by the same lowest common denominator. Consumerism, far from being modified or somehow reduced under this new technology will only intensify mechanisation, commodification and the encoding organic life, this time at the molecular level. Nanotechnology may have a place in improving humanity’s lot but not by being grafted onto a socio-political and economic framework that caused the problems in the first place.

Quite apart from providing new innovative tools for medical advances and the promise of an agricultural revolution, evidence so far in relation to health and environmental concerns doesn’t exactly promote confidence. Some of the latest research results show that:

  • Rats breathing in nanoparticles were found to exhibit inflammation, skin aging and stress responses.
  • DNA and chromosome damage which in turn “linked to all the big killers of man, namely cancer, heart disease, neurological disease and aging”.
  • Carbon nanotubes – the possible replacement for silicon – have shown to have the potential to cause mesothelioma ( a form of cancer).
  • Nanoparticles and nanofibres have shown to cause lung disease in a similar way to asbestos. [17]

Mark Wiesner Professor of Civil and Environmental Engineering at Duke University in Durham N.C., has argued for a rethink as to the way nanoparticles are selected and defined in relation to potential impacts on human health and the environment. His international team of researchers from the federally-funded Centre for the Environmental Implications of Nanotechnology (CEINT), based at Duke University in the United States, have raised a number of issues which need to be addressed if nanotechnology is to prove viable and ethically responsible. He believes there is presently confusion as to what truly constitutes a nanoparticle where “… materials often do not meet full definition of having special properties that make them different from conventional materials.” According to Wiesner, a key question that needs to be answered: “… is whether or not a particular nanoparticle has toxic or hazardous properties that are truly different from identical particles in their bulk form,” and this due to the fact that: “Many nanoparticles smaller than 30 nanometers undergo drastic changes in their crystalline structure that enhance how the atoms on their surface interact with the environment.”

The professor explains further:

“…because of the increased surface-area-to-volume ratio, nanoparticles can be highly reactive with other chemicals in the environment and can also disrupt certain activities within cells. … “While there have been reports of nanoparticle toxicity increasing as the size decreases, it is still uncertain whether this increase in reactivity is harmful to the environment or human safety,” Wiesner said. “To settle this issue, toxicological studies should contrast particles that exhibit novel size-dependant properties, particularly concerning their surface reactivity, and those particles that do not exhibit these properties.” [18]

Perhaps it is not the health and environmental issues which are really the problem. We humans are extraordinarily creative and ingenious. All the above is driven on the assumption of cybernetics and its systems theory as viable working models; the idea of “nested” organic systems and dissipative structures which are interrelated and interconnected by virtue of their functional similarity. *This means that bio-engineers and technocrats look at nanosystems as providing the potential for exponential growth via automatic and autonomous emergent properties. As described previously, this opens up a whole new pandora’s box when matter becomes programmable.

nanotubes_carbone

Carbon Nanotubes Source: tpe-nanotechnologie-cb.e-monsite.com/

According to nano scientists this follows that society and the human condition is about to “reshaped” in very positive ways: cleaning the environment, easing the pressure for natural resources, tackling hunger, curing AIDS and other invasive diseases; giving new life to paraplegics whilst enhancing the human body. However, will these laudable aims be set against a background of unresolved questions which threaten to undermine the human species? What has happened to new advances in technology in the past?

Nanotech advocates display frightening naïveté in this regard and an often ironic binary evaluation of what are highly complex issues, notwithstanding an ignorance of ponerology and psychologically compromised cultures. It is a contradiction to say that strengthening our democratic processes will somehow ensure responsible ethics which will insulate against the darker applications of nanotechnology when overwhelming expenditure is already focused in the hands of those who seek weapons advancement and shareholder profits. A barrier to accountability will remain as tenacious as it has proved to be in narcotics, conventional weapons and trafficking. It benefits the Establishment just as nanotechnology promises to do.

Futurist David Brin’s prescription to cultivate a “transparent society” where privacy is effectively non-existent is dangerous as it opens the backdoor for just about every totalitarian precept going. The self-replicating nature of molecular nanotech has given rise to end time scenarios where machines take over the world replacing humanity and organic life. Eric Drexler coined the term “grey-goo” otherwise known as ‘ecophagy’ to illustrate such a cybernetic apocalypse.[19]Think along the lines of “the Collective” from the Borg in the Star Trek TV series or the “Hive mind” so beloved of humanists and transhumanists. Expansion derives from assimilation and adaptive properties – “group think” in a futurist setting.

transmission-5speed-gears.ai

Corporations will be regulated insofar as it does not impinge on the market value of nanotechnology. This means regulations in medical and consumer arenas where it matters less will be followed. Where it is most needed however, is in domains such as weaponisation and agriculture and which will likely follow the traditional route of lobbyists and cartel economics – the path of least resistance. Meanwhile, legislation will have a very tough time keeping up with the rise of nanotechnology especially when environmental and privacy laws are only applicable to those adhering to the public domain and wholly irrelevant to government /corporate experimentation outside such accountability.

Although the military is driving nanotech advances (as with all things) the testing ground has begun with many “passive” or “first generation” commercial applications finding their way to the market place. As explored in the previous post the list is endless. If sunscreen products in the US contain nanoparticles and thus freely pass through the blood-brain barrier then the background of complex toxicology issues must remain at the forefront. In the same way, as GMOs, Wi-Fi and cell phones all have serious health questions hanging over them and health and environmental concerns of nanomaterials at this early stage have been completely ignored. Issues of privacy and confidentiality are also profoundly important.

The precautionary principle means that it is essential not to jump in feet first with this technology when there is an absence of suitable definitions regarding nanoparticle properties which could help scientists determine what represents a threat to the environment or human health. Despite certain advocacy groups calling for government regulation, the only principle which governs decisions is the one leading to the quickest possible profit. Nanotech forges ahead, in love with itself and its seemingly unlimited potential.

It doesn’t take a genius to see that it will go the same way as GMOs since the focus behind the drive to conquer nature, deny death and embrace immortality is exactly the same. Until regulation, insurance and extensive public discussion is forthcoming it is likely the more negative scenarios surrounding nanotech will play a greater role. After all, once the perceived genie is out of the bottle the consequences of its “magic” are more difficult to manage. This means that with all the wondrous potential for cleanng up the environment patents will arrive forcing us to pay for such ecological magic just as it was with the so-called “Green Revolution” of genetically modified crops. This means an expansion of selective wealth where transformation happens according to your pocket and status thereby replicating the same old divisions and class divides.

To reiterate the immovable direction of technology: it is the military and nano-weaponry which will determine the future of nanotech as a whole not whether a surgeon can provide life-saving operations or the disabled individual can begin to walk again. Altruism is not the primary currency of social exchange in a world shaped by psychopaths. Nanosystems will be nurtured on the same directive until such time we can wrest control.

 


* Dissipative Structure – A system that exits far from thermodynamic equilibrium thus dissipating the heat generated to sustain it. It has the capacity of changing to higher levels of orderliness leading to self-organization. These systems contain sub-systems that continuously fluctuate.


Notes

[1] ‘More soldiers in nanotechnology labs?’ By Michael Berger, nanowerk.com August 22, 2007.
[2] Ibid.
[3] http://www.acq.osd.mil/dsb/reports/2006-02-Summer_Study_Strategic_Tech_Vectors_Vol_I_Web.pdf
[4] NanoMedicine – A Review by K.K. Senthil Kumar, International Journal of Innovative Drug Discovery, Vol. 2 / Issue 1 / 2012 / 40-47 (from International Journal of Biopharmaceutics)
[5] ‘Carbon nanotubes fit by the thousands onto a chip’ By Jason Palmer, BBC News, 29 October 2012.
[6] DNA nanotechnology and transhumanism seem to fit snugly together in terms of their technological vision for humanity. Whether or not most persons working in the field are predisposed to this belief is irrelevant but the belief that vaccinations across the board are absolutely necessary and beyond reproach is a powerful part of the medical establishment. As such, the transhumanist paradigm naturally joins forces with materialism, atheism and corporatism to unfold their agenda accordingly. Journalist Sayer Ji has this to say on the subject:

“Not only have humans strayed from their mammalian roots by creating and promoting infant formula over breast milk, and then promoting synthetic immunity via vaccines over the natural immunity conferred through breastfeeding and sunlight exposure, for instance, but implicit within the dominant medical model is to replace natural immunity with a synthetic one. This is the philosophy of transhumanism, a movement which intends to improve upon and transcend our humanity, and has close affiliation with some aspects of eugenics.
The CDC’s immunization schedule reflects a callous lack of regard for the 3 billion years of evolution that brought us to our present, intact form, without elaborate technologies like vaccination — and likely only because we never had them at our disposal to inflict potentially catastrophic harm to ourselves. The CDC is largely responsible for generating the mass public perception that there is greater harm in not “prophylactically” injecting well over 100 distinct disease-promoting and immune-disruptive substances into the bodies of healthy children. They have been successful in instilling the concept into the masses that Nature failed in her design, and that medical and genetic technologies and interventions can be used to create a superior human being.
In this culture of vaccination, the non-vaccinated child is “inferior,” “dirty,” perhaps even “sub-human” to those who look upon vaccination as the answer to what perfects the human immune system.
Transhumanism participates in a dialectic which requires a simultaneous and systematic dehumanization of those who do not share the same way of thinking and behaving. The eugenic undertones of mass vaccination and the cult of synthetic immunity are now only thinly veiled, as we move closer to the point where a psuedo-scientific medical dictatorship lays claim to our very bodies, and the bodies of our children.
The point of no return (if not already traversed) is only around the corner: the mass introduction of DNA and Recombinant Vector Vaccine technology. Vaccines moved through the following stages (a tortured history of failures and massive “collateral damage”): Live Vaccines > Attenuated Vaccines > Subunit Vaccines > Toxid Vaccines > Conjugate Vaccines, only now reaching towards converting our living tissue into “vaccine-making factories” through the use of DNA and Recombinant Vector Vaccines, which are designed to directly alter cells within the vaccinated person’s body so that they create the antigens normally provided by vaccines themselves.
While not yet in use, clinical trials are now underway to obtain FDA approval. If we do not educate ourselves now and act accordingly, their mass implementation is inevitable, and our very genomes will become the next target of the vaccination/transhumanist agenda.” – ‘The Vaccination Agenda: Implicit Transhumanism’ By Sayer Ji, Contributing editor, Activist Post, January 24, 2012.
[7] Most Innovative Defense Technology’ 2008 Award Nominee – Nano SCOUT AeroVironment Inc.| http://www.defense-update.com/ | ‘The dragonfly built to spy – Tiny flying robots have the military abuzz, says Mark Harris’ http://www.timesonline.co.uk/tech.
[8] A COMBINED EXPERIMENTAL-NUMERICAL STUDY OF THE ROLE OF WING FLEXIBILITY IN INSECT FLIGHT Lingxiao Zheng, Xiaolin Wang, Afzal Khan, R. R. Vallance and Rajat Mittal1 Department of Mechanical & Aerospace Engineering, George Washington University, Washington DC 20052 Tyson L. Hedrick 2009. http://www.me.jhu.edu/fsag/Publications/Papers/AIAA-2009-382-170percent5B1percent5D.pdf
[9] ‘Hacking the President’s DNA’ November 12, The Atlantic Magazine, By Andrew Hessel, Marc Goodman and Steven Kotler.
[10] ‘Micro-Drones Combined With DNA Hacking Could Create A Very Scary Future’ By Robert Johnson, Oct. 28, 2012. Business Insider | http://www.businessinsider.com/
[11] Ibid.
[12] ‘A Glimpse Into China’s Post-Nuclear Super-Weapons: An Interview with Lev Navrozov on Nanoweapons by Ryan Mauro for http://www.worldthreats.com Sept. 26, 2003. | Quotes sourced from Engines of Creation By Eric Drexler (1986).
[13] ‘Military Uses of Nanotechnology – European Commission’ ec.europa.eu/research/conferences/2004/ntw/pdf/soa_en.pdf
[14] ‘How helpful is nanotechnology in agriculture?’ By Allah Ditta 2012 Adv. Nat. Sci: Nanosci. Nanotechnol. 3 033002 doi:10.1088/2043-6262/3/3/033002 Vietnam Academy of Science & Technology, 29 May 2012. IOP Science | http://iopscience.iop.org/2043-6262/3/3/033002/article#ansn431989bib05
[15] Ibid.
[16] ‘The potential and challenges of nanopore sequencing’ Nature Biotechnology 26, 1146 – 1153 (2008) Published online: 9 October 2008 | doi:10.1038/nbt.1495
[17] ‘Tiny Inhaled Particles Take Easy Route from Nose to Brain’ August 3, 2006, University of Rochester Medical Centre. | Wu, J; Liu, W; Xue, C; Zhou, S; Lan, F; Bi, L; Xu, H; Yang, X et al. (2009). ‘Toxicity and penetration of TiO2 nanoparticles in hairless mice and porcine skin after subchronic dermal exposure’. Toxicology letters 191 (1): 1–8. doi:10.1016/j.toxlet.2009.05.020. PMID 19501137. | Jonaitis, TS; Card, JW; Magnuson, B (2010). ‘Concerns regarding nano-sized titanium dioxide dermal penetration and toxicity study’. Toxicology letters 192 (2): 268–9. doi:10.1016/j.toxlet.2009.10.007. PMID 19836437. | Schneider, Andrew, ‘Amid Nanotech’s Dazzling Promise, Health Risks Grow’, March 24, 2010. | ‘ Nanofibres ‘may pose health risk’,’ BBC News, August 24, 2012. | ‘Is Chronic Inflammation the Key to Unlocking the Mysteries of Cancer?’ By Gary Stix, Scientific American, July 2007.
[18] ‘When Nano May Not Be Nano’ Duke University, Depart. Civil & Environmental Engineering September 14 2009.
[19] ‘Some Limits to Global Ecophagy by Biovorous Nanoreplicators, with Public Policy Recommendations’ By Robert A. Freitas Jr. April 2000. | www.rfreitas.com/Nano/Ecophagy.htm

Technocracy III: Tagged (and Bagged?)

“The lessons learned from the adoption of other technologies suggest that radio frequency identification will be more important than anyone currently imagines.”

– Mark Roberti, founder and editor of RFID Journal


RFIDChip

© infrakshun

As American infrastructure crumbles under the weight of trillions of dollars of debt accumulated from largely illegal and spurious wars abroad, automation is biting further into the human labour market. Parallel advances in data-collection, surveillance and monitoring continue to build a “soft” police state, all of which must be paid for. New ways of fleecing the populace must be found which means we will be seeing more examples of SMART applications roll-out across a broad range of societal domains.

Hot on the heels of issuing digital licence plates in California, a little black box has made an appearance that will fit neatly by the dashboard of your car. An October 2013 Los Angeles Times report: ‘A black box in your car? Some see a source of tax revenue’ Evan Halper tell us: “The devices, which track every mile a motorist drives and transmit that information to bureaucrats, are at the center of a controversial attempt in Washington and state planning offices to overhaul the outdated system for funding America’s major roads.” The idea is to extract more money out of the hapless US citizen by allowing the government to keep track of the miles they drive in order to draw up yet another tax bill.

No doubt when this is integrated into “the internet of things” then every little iota of information about where you go and what you spend your money and who you decide to see will be factored in to the bill with increases, decreases and penalties and pluses accordingly. This initiative has its blessing from libertarians and lobbying from environmental groups. The former has a SMART techtopia informing its idealism while the latter sees Agenda 21 and sustainable development as the medium by which their own complimentary ecotopia can manifest. Despite protestations from the American Civil Liberties Union, both camps are blind to the undercurrents of Pathocracy in this context.

Keen to do its part for the SMART revolution the European Union has proposed a scheme which would see cars fitted with camera systems that ‘read’ the limits displayed on road signs and automatically apply the brakes. Supposedly in a bid to cut the number of deaths in car accidents the scheme labelled ‘Intelligent Speed Adaptation’ would use GPS satellites to transmit data to automatically limit the driver’s speed along with verbal computer commands to slow down. Or, according to The Telegraph’s September 2013 report: ‘EU plans to fit all cars with speed limiters,’ drivers can be given “… a warning of the speed limit, or their speed could be controlled automatically under the new measures.” [1]

RFID-TagsVariety of RFID retail tags

microchip1

The merging of SMART society and surveillance already has a formidable momentum in America. These examples are the tip of an emerging philosophy of data collection and surveillance which is making inroads into every facet of our once relatively free existence. For instance, just in case you were in any doubt that vaccinations are always a gift from God, registry systems have been set up to track your vaccination status so that you can continue to do as you’re told. Or perhaps you’ve come across the biometrics programs currently be tinkered with in US schools which will “… track students’ eye movements, monitor their conversations or even measure their smiles.” Turning the classroom into a tech-lab paradise of attentive drones is easy – and profitable. In the same month, online journal The Future Is Now ran an article entitled: ‘Biometrics Help Teachers Track Students’ Every Move.’ Sheila Dharmarajan writes: “When the student is looking up at the teacher, the teacher score goes up. If she looks down at the computer, the computer score goes up. So we’re tracking facial expressions. If she makes a smile, it might be indicative that is enthusiastic about the topic.” [2]

Ah, the simple world of binary perception …

But it isn’t only in the US. While the UK’s ID scheme has been temporarily jettisoned, other countries are pushing ahead. Journalist Katitza Rodriguez, writing for the Electronic Frontier Foundation on January 10, 2012 highlighted Argentina’s resurrected and mandatory National Registry of Persons (RENAPER) which had lain dormant from the era of military dictatorship. Facial recognition and finger-printing are part of a security-surveillance system which is about to be integrated into the Federal System of Biometric Identification (SIBIOS) used by existing police and military networks. The registration of new-born babies’ biometric information has taken place since 2012 with projections that the SIBOS database will reach over 40 million within the next two years.

In January 2012, all 1.2 billion residents of India were the lucky beneficiaries of a nationwide program overseeing the allocation of a Unique Identification Number (UID). Each number will be fixed to the biometric data of the recipient utilizing using three different modes of information detection: fingerprints, iris scans, and face recognition. The implementation of RFID (radio-frequency identification) is the next stage for India’s flourishing biometric industry.

RFID stands for “Radio Frequency Identification”. With the advent of Wi-Fi and SMART applications the platform for RFID is expanding to include SMART labels for consumer products, assest tracking, secuirity and data retrieval for business. Then we have the more invasive tagging  with computer chips implanted into physical objects, animals, livestock and human beings. The Electronic Product Code that lies within the chip can be “read” when the device emits a radio signal. The chips contain electronically stored information which can be read up to several meters away. Active tags are self-powered and have a long range, particularly useful for surveillance. Passive tags are without battery source and use a local power source, the range being variable.

Some Christians have long been frothing at the mouth at the prospect of micro-chipping and what they consider to be the proverbial “Mark of the Beast” from The Book of Revelations, without which: “no man might buy or sell save he that had the Mark.” To be fair, it does sound remarkably similar. The Association for Automatic Identification and Mobility (AIM) sees biometric identification in true technocratic form where federal, state, local governments, military and commercial applications should join together and embrace the SMART culture without a care in the world. According to AIM, the RFID-chipped “SMART cards” and the biometric revolution “are set to pervade nearly all aspects of the economy and our daily lives.”  [3]The selling pitch goes like this: The tagging of products from razor blades to underwear represents enormous benefits to consumers, protecting us against fraud and theft as well as providing cost reduction and convenience. What could be simpler? And because it is so simple and so convenient given the fast-paced nature of our modern society, doesn’t it make sense to get yourself tagged too? Efficiency, efficiency and more efficiency …

As a precursor to this we have contactless technology being pushed by companies such as Google, with the majority of mobile network companies getting in on the act because data – your data – is king. Disney’s electronic “MagicBand” illustrates why. In the summer of 2013, the Disney corporation announced the use of an electronic wristband for all visitors to its theme parks. First introduced at Disney World in Florida it can be used at rides, hotel doors, stores and allow Disney staff to greet you using your first name. Who needs a wallet when everything is done for you? The downside to this of course, is a marketing coup d’état where Disney will be able to track what you purchased, which stores you visited, which rides you enjoyed and when, at which hotel you stayed and a vast collection of data to provide valuable insights into social psychology of visitors.

So, what’s a little data between friends and theme parks? Quite a lot actually.

RFID_Wristband_braceletmickeyRFID Tracking bracelets for amusement parks, hospitals and children’s playgrounds. It’s all good clean fun kids!

If you really want to take technology to the heights of efficiency in order to go about your business without a care in the world then your very heart might offer the ultimate hub for hands-free, contactless connection to the New Synthetic World. Canadian biometric company Bionym introduced us to the unnerving offer that: ”Your pulse could be your new Password.” Indeed, every number and code that you currently use to live your life could be distant memory if people such as Bionym chief executive officer Karl Martin has his way. “Pulse passwords” could be the new ultra-convenience. [4]

The heart has unique characteristics relating to size, position and physiology so those clever bods at Bionym have developed a wristband which recognises the pattern of an individual pulse. The transmission of information allows the user to carry out all the usual transactions and internet-based activities which require a password. And it also pleases those worried about security as heartbeats cannot be replicated. Furthermore, as every heartbeat is unique, should the wristband become lost or stolen, it would not function for another user. And on the market in 2014 at $100 many will see the benefits of such an appendage.

Tattoos used to be a tribal marking of religious or sacred significance. In Western culture gangs, dockers and truckers were some of the groups who took to marking themselves to tell their peers who they were and what they’d been through. Now, tattoos are big business and a fashion statement for the young. As luck would have it, electronic tattoos are now appearing from telecommunications companies like Motorola who are working on a version that contains a computer chip and an antenna. Just to give us an idea what to expect in the new future to complement these tattoos there is also: “A pill that dissolves and turns the entire body into a transmitter …” If they can be used to replace all those dozens of pesky passwords then there is money to be made and an interaction with the internet of things (IOT).

We will not need to identify ourselves because we will be integrated into the system.

As discussed previously, Mike Orcutt’s March 2013 article for MIT Technology Review explored John Roger’s work as a materials scientist at the University of Illinois at Urbana-Champaign. He is one of those experimenting with “epidermal electronics” where applications can be printed directly onto the skin. Rogers tells us that these new devices will be very useful to the medical industry and explains: “You can use a rubber stamp to just deliver the ultrathin mesh electronics directly to the surface of the skin.” And by using “spray-on bandage” products a thin protective layer acts to “… bond the system to the skin in a ‘very robust way.’”

Smart-skin-1Back in November 2003, The Privacy Rights Clearinghouse – a non-profit, grant-supported advocacy and consultancy organisation for consumer awareness – had already produced the “Position Statement on the Use of RFID on Consumer Products.” In the study, they concluded the following:

  • Hidden placement of tags. RFID tags can be embedded into/onto objects and documents without the knowledge of the individual who obtains those items. As radio waves travel easily and silently through fabric, plastic, and other materials, it is possible to read RFID tags sewn into clothing or affixed to objects contained in purses, shopping bags, suitcases, and more.
  • Unique identifiers for all objects worldwide. The Electronic Product Code potentially enables every object on earth to have its own unique ID. The use of unique ID numbers could lead to the creation of a global item registration system in which every physical object is identified and linked to its purchaser or owner at the point of sale or transfer.
  • Massive data aggregation. RFID deployment requires the creation of massive databases containing unique tag data. These records could be linked with personal identifying data, especially as computer memory and processing capacities expand.
  • Hidden readers. Tags can be read from a distance, not restricted to line of sight, by readers that can be incorporated invisibly into nearly any environment where human beings or items congregate. RFID readers have already been experimentally embedded into floor tiles, woven into carpeting and floor mats, hidden in doorways, and seamlessly incorporated into retail shelving and counters, making it virtually impossible for a consumer to know when or if he or she was being “scanned.”
  • Individual tracking and profiling. If personal identity were linked with unique RFID tag numbers, individuals could be profiled and tracked without their knowledge or consent. For example, a tag embedded in a shoe could serve as a de facto identifier for the person wearing it. Even if item-level information remains generic, identifying items people wear or carry could associate them with, for example, particular events like political rallies. [5]

Not that these warnings have made a whole lot of difference to the momentum of such technology.

American and European governments’ expenditure of billions of taxpayer’s money on creating these new systems “for our protection” is unjustified for a multitude of reasons. One of these shows how particularly ridiculous the whole scenario really is. If someone wishes to read the biometric information from our passport, driving licence or ID card they need only to purchase a reader device and scan the information without the individual ever knowing. Of course, the government and their spooks have been extracting information in a similar fashion from so called “secure” systems of information for decades. As outsourcing of the state to private companies is becomes the norm, it is hardly likely that governments could stem the tide of information theft should they even want to.

In February 2007, the electronics corporation Hitachi proudly revealed the development and successful testing of the world’s smallest and thinnest class of “non-contact RFID Powder IC (integrated circuit) Chip.” It measures just 0.05 x 0.05 millimetres, which is about the size of a pin-head or less. We read on their website in a Research & Development report that their aim is: “… to embed the chip in thin paper, a practice that is already in general use,” informing us that: “These technologies are expected to be seen in a wider range of applications.” [6]

In 2015 this became a reality. The chips have a 128-bit ROM for storing a unique 38 digit number and can indeed be worked into any product at all. Since these chips are “already in use” it begs the question: what other applications are they thinking about? The military surveillance uses are well ahead of the consumer game. As one writer on the chips mused: “… suppose you participated in some sort of protest or other organized activity. If police agencies sprinkled these tags around, every individual could be tracked and later identified at leisure, with powerful enough tag scanners.” [7]

This echoes trans-national corporation IBM and their business relationship with Nazi Germany’s Third Reich in the 1930s and their subsequent collaboration during World War II. Investigative journalist and author Edwin Black explained how IBM’s technology helped facilitate Nazi genocide against Jews and other undesirables through the creation and tabulation of punch cards based upon national census data. Aside from administrative and logistical support, IBM machines were used in concentration camps. Many prisoners had their details passed through the Labour Assignment Office and assigned a characteristic five-digit IBM Hollerith machine number, 44673. This five-digit number in the punch card system was designed to track prisoners in the camps, most notably the slave labour camp at Auschwitz. The number was the precursor to the numerical tattoo stamped upon the arm of an individual and deemed more cost-effective and efficient.

ibmachineIBM Hollerith Card Processing Machine used by the Nazis circa 1940s

There is no doubt that the targeted identification of Jews and other racial groupings for: “… asset confiscation, ghettoisation, deportation, and ultimately extermination” took place in a way that is logistically and insanely ambitious. The Nazis were able to kill as many as they did with the help of IBM’s pioneering computer work which required: “… generations of communal, church, and governmental records all across Germany—and later throughout Europe—[to be cross-indexed] a task so monumental, it called for a computer. But in 1933, no computer existed.” [8] That’s where IBM came in. And its legacy for number crunching computation has remained, the profits of its participation in the logistical side of the holocaust having kept it afloat for all these years.

So, what has IBM been up to recently?

Harking back to their darker history, the corporation has finished patenting their “Identification and Tracking of Persons Using RFID-Tagged Items in Store Environments.” Security and Privacy analyst Katherine Albrecht, founder of the consumer pressure group CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) writes about RFID’s potential for surveillance: “… where networked RFID readers called ‘person tracking units’ would be incorporated virtually everywhere people go – in “shopping malls, airports, train stations, bus stations, elevators, trains, airplanes, restrooms, sports arenas, libraries, theaters, museums, to closely monitor people’s movements.”

You can already see the acclimatisation taking place with i-phone apps scanning capabilities in billboard ads in bus shelters and shopping malls. When RFID tag scanners are located in the required locations, they scan the RIFID tags on a person. Albrecht continues: “As that person moves around the store, different RFID tag scanners located throughout the store can pick up radio signals from the RFID tags carried on that person and the movement of that person is tracked based on these detections … The person tracking unit may keep records of different locations where the person has visited, as well as the visitation times.” What is more, if personal data does not register on the tag, no problem, IBM tells us: “the personal information will be obtained when the person uses his or her credit card, bank card, shopper card or the like.” [9] Which means a person’s unique RFID number and his or her identity will merge into the overall techno-identity of our SMART society.

Although slower than the technocrats would like, the implantation of RFID’s in the global population is making progress. Alongside marketing tattoos a much vaunted fashion statement, another method of gradualism was to implant pets and farmyard animals as part of an agribusiness efficiency and as a prelude to human implantation.

In January 2007 Business Week reported on the Federal mandated National Animal Identification System (NAIS) and their desire to digitally tag “… 40 million farm animals to enable regulators to track and respond quickly to disease, bioterrorism, and other calamities.” The report rightly highlights the fears of the more informed which it summarises thusly: “You test it on the animals first, demonstrating the viability of the radio frequency identification devices (RFIDs) to monitor each and every animal’s movements and health history from birth to death, and then move on to people.”  The report mentions the ambitions of one Scott Silverman who runs a: “… company that sells the rice-size people chips, which are the only ones with Food & Drug Administration (FDA) approval, for implantation in an individual’s right biceps. They carry an identity marker that would be linked to medical records. His goal is to create ‘the first RFID company for people.’” [10] More from Mr. Silverman presently.

cow1© infrakshun

Things have progressed since 2007 and we can now see implementation of Bluetooth, Wi-Fi and RFID chips in a fusion of agribusiness and SMART technology called by French technocrats as “SMART Agrimatics”. A paper hot of the press at the time of writing is about as innovative as you are going to get on the subject of agribusiness and technocracy. The culmination of a pilot project research, it involves the application and use of RFID tags for “ruminants” (cows, sheep and goats to you and me) the studies of which were conducted between 2005 and 2010. This includes discussions on the relevant use of RFID; use of RFID for feeding automates on farm; use of RFID for performances control; use of RFID for animal trade; use of RFID for slaughter chain and supervision for RFID devices.

The paper reads like a machine mind designing for another machine mind, except there are – inconveniently it seems – sentient beings involved. For the farmer scratching his head as to whether he is a human being raising animals or an engineer maintaining “automated consumption units” and keen to make the leap to SMART-Agrimatics, then obviously this dossier would be invaluable for setting his mind straight – one way or another.

With “ear-tag and detection cell” and “fixed readers integrated in the environment” agri-business and GM technology are well placed to maximize their efficiency ratios. Once all cattle have been tagged logged and every aspect of their cellular structure analysed then the collection and transfer of said data can be uploaded to the national database “… the weight linked to the official animal identification number from RFID reading.” [11] Driven by economic incentives and inventory control, larger farms all over Europe and the US are signing on to RFID.

Now, how would that play out for humans?

If we were learn from automated factory farming and now SMART-Agrimatics, the key term here, once again, is efficiency.

How does one maximize the efficiency in automated methods of keeping an awakening population asleep to a minority of psychopaths?  The technocratic, sensual and pharmaceutical amusements of Huxley’s Brave New World should give you some idea. The following picture from the above report might easily apply to the “sheep” in the human population who believe in the authoritarian structures they have grown up with. Wolves come in many disguises.

clip_image002.gif“The Future Sheeple?”

Over in the UK, after a series of well reported dangerous dog attacks new legislation has gone ahead that forces dog owners to pay between £20 – £30 to have a RFID chip injected under the skin of their pooch while still a puppy. As one animal welfare spokesman mentioned: “It’s not so much the dogs that should be targeted, but the owners who train them to be vicious.” (A metaphor for psychopaths and their societies perhaps?) Implantation of RFIDs has predominantly taken place within security firms, the military and various dance clubs in European countries whose clientele find it convenient to speed their entry. These are the voluntary lab-rats.

The Verichip Corporation and their various subsidiaries has been one of the leaders in RFID technology with their flagship product the Verichip ™ manufactured by Digital Angel. PositiveID, a developer of medical technologies for diabetes management, clinical diagnostics and bio-threat detection is the company that uses its patented VeriPay system where the chip can be used like a credit card to authorise financial transactions. It is currently being used by the Baja Beach Club in Spain to the delight of many happy party goers.

PositiveID-logo

The Verichip was initially foreseen as a device for retrieving medical records, having received FDA approval for medical use in 2004. But the vision was never designed to stop there. The size of a grain of rice it is easily implanted just under the skin in the arm or hand so that the device can monitor human biometric functions and transmit the data with GPS technology. Thousands of Mexicans have since been implanted, from law enforcement workers to ordinary citizens. The latter are doing so in increasing numbers due to a 317 per cent rise in kidnappings, 20 per cent of which has involved corrupt police officers. Many US companies are dubious that the chips actually work in combination with GPS devices but payments of up $2000 are being handed over nonetheless. One slight wrinkle in the chip means that confirmation of identity can only be confirmed when the body has been found. [12]

Currently in talks with the Pentagon to implant Verichip into all 1.4 million US soldiers, PositiveID has also been delighted to receive bulk orders from the Israeli military not wishing to be left out of technocratic party. Marc Poulshock, PositiveID’s Vice President of Business Development, said: “We believe there are many important applications for the VeriChip and our associated intellectual property including next-generation identification and bio-sensing capabilities. Our partner is looking to help healthcare organizations, militaries including the IDF, and governments with their disaster preparedness and emergency response needs.” [13]

VeriCorp insists that the Verichip is very difficult to steal despite two hackers showing just how easy it really was to steal a person’s identity via the RFID. Annalee Newitz and Jonathan Westhues gave a special demonstration at the HOPE Number Six conference in New York City in July 2008. Newitz had the VeriChip RFID implanted in her right arm. Westhues then proceeded to clone the chip by reading Newitz’s arm with an RFID reader, scanning it with a homemade antenna connected to his laptop which recorded the signal from the chip. Finally, he used the same RFID reader to obtain the signal from his laptop, which then gave Newitz’s “unique” ID. Verichip had no comment to make other than they had been too busy to look at their evidence.

That hasn’t prevented the idea that new-borns should be protected from nefarious activities of the public. Ronald Kane, Vice President of CUBIC Corp., a major manufacturer of implantable chips, while discussing the profit margins on RFID tags enthusiastically stated: “If we had our way, we’d implant a chip behind everyone’s ear in the maternity ward.” [14]

According to RFID News Student ID cards equipped with RFID chips are becoming more common sight on schools and college campuses. Education officials are “… adopting RFID technology to track everything from student attendance to valuable assets.” [15]It is part of a wide-ranging rollout of SMART technology including Iris recognition software and cameras which monitor the emotional states of students, both of which have caused considerable controversy, not least at the idea of turning schools into virtual prisons.

A similar efficiency-ratio mentality is being employed in business training software offered by online technology company Mindflash. FocusAssist is a new feature designed for i-Pad which tracks the user’s eye movements via the tablet’s on-board camera. When you’ve looked away for several seconds the course is paused. This apparently forces you to pay attention so that you can finish the assignment. One wonders how long it will be before computers are teaching children and adopting a similar attention mechanism.

The contradictions and double-speak that are on display from the Verichip advocates is quite a show. The US Food and Drug Administration (FDA) gave a 2002 ruling that that: “VeriChip is not a regulated device with regard to its security, financial, personal identification/safety applications … VeriChip’s healthcare information applications are subject to regulation by the FDA in the United States.’ As author and journalist Uri Dowbenko mentions: “It’s OK if the VeriChip tracks your credit report history, but not OK if it’s used to inform doctors you’re diabetic? This will undoubtedly be used as an argument to justify the VeriChip as a so-called ‘medical device’ in the future.” [16]

verichipmicrochip / verichip ™

The stages which the RFID tags have followed have moved through: pets = cattle = criminals = military = business workers towards the longer more drawn out process of finally chipping the mass population. Biometric passports, national ID cards and then gracefully having your palm over the supermarket scanner will make things so easy! So easy in fact, that perception management will tell you the next logical step in this New World of SMART design is to be “SMART” yourself and integrate your body into the system, and then you will be “free.” Notwithstanding the potency of such an illusion, there is another problem. Verichip and other companies love to tell us about the medical and community benefits of tagging which include the monitoring of heart troubles, children safety, pet protection and the like, what of the health issues related to RFID tags?

In 2007 the Verichip Corporation and other related companies were dealt a severe blow to their credibility when Katherine Albrecht’s CASPIAN consumer pressure group released a 48-page paper entitled “Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006”. Based on a dense review of academic research on the subject, the causal link between implanted radio-frequency (RFID) microchip transponders and cancer in laboratory rodents and dogs could not be clearer. Dr. Robert Benezra, head of the Cancer Biology Genetics Program at the Memorial Sloan-Kettering Cancer Centre in New York, said: “There’s no way in the world, having read this information, that I would have one of those chips implanted in my skin, or in one of my family members.” Given the preliminary animal data it looks to me that there is definitely cause for concern.” [17]

CEO and Chairman of Verichip Corporation Scott R. Silverman played his part in a disinformation campaign launched by RFID companies in response to the findings. Silverman is quoted in a Time article as saying that in the “… second study, conducted in France in 2006, two years after VeriChip’s FDA application was approved, found that while 4 per cent of the 1,260 mice in the study developed tumors, none of them were malignant.” [18]The truth is a little different. The tumours were indeed malignant sarcomas and most of the animals in question died prematurely as a result of the microchip-associated tumours. Destron Fearing, makers of the HomeAgain pet implant came in a close second when they ignored a finding of fibrosarcoma – a highly lethal cancer – as “benign” in a recent report. Katherine Albrecht stated: “Either VeriChip and the makers of HomeAgain actually don’t understand the difference between a benign fibroma and a malignant fibrosarcoma, or they’re deliberately lying to the public. Either way, it’s clear they can’t be trusted. We hope our new report will set the record straight.” [19]

Despite this, Silverman was correct in that overall, the incidences of cancer in dogs after over 10 million injections is relatively small, which means that this scare is not enough to put off either the medical establishment, security companies and the potential benefits to consumers in a variety of social situations.

russo-nick-rockefellerAaron Russo (left) and Nicholas Rockefeller

“The goal is to get everyone in this world chipped with this RFID chip and have all money and information be on these chips. And if anyone wants to protest what we do or violate what we want, we just turn off their chip.”

From Russo’s film: America: Freedom to Fascism


The above quote is lifted from the late Hollywood producer and film-maker Aaron Russo’s now classic America: Freedom to Fascism (2006) in which he details a conversation he had with also now deceased California Attorney Nicholas Rockefeller. Russo, who was frequently around the elite and their antics and was rather bemused by their beliefs asked Rockefeller:  “… what’s the point of all this,” …“you have all the money in the world you need, you have all the power you need, what’s the point, what’s the end goal?” The answer was the above quote. Does it sound too hackneyed and outrageous? Watch the film to discover more of Russo’s discoveries. Made almost ten years ago, one realises what a warning this film truly was.

This brings us back to the National Security State; the various World State advocates that would like to see the global population “culled” and the war on terror tool that has allowed a technocratic Police State infrastructure to rise up virtually unopposed. When SMART, surveillance society arrives on the back of a few more mini-911-type scenarios, there may come a stage where, if you want to eat, you must acquire a chip. It’s a logical step that once mass acceptance of RFID tagging has gradually taken place anyone that is deemed a “terrorist”, “subversive” or merely suspiciously expressing a “radical” opinion on Facebook can be easily tracked and controlled. (See Police State Amerika I: Facebook Thought Police). The next step from targeting dissidents is the expansion of powers to include a wide range of groups or organisations that come under the vague and nebulous definitions of terrorism. Everything that doesn’t fit into that SMART design will be well … switched off.

Technocracy is essential to the smooth running of the Elite-collectivist model and as we have seen so far in this series, the younger generations are the primary targets for social engineering. With a sizable marketing drive underway headed by the Verichip slogan: “Get chipped,” RFID tags are being marketed as chic and trendy, cool and desirable. If the recent surge in tattoos is anything to go by, the microchip might be the next fashion statement for those too young (or programmed) to have awareness of the implications.

Despite loud mutterings of discontent in the US and the European Union the advances in SMART tech will not be going away. Ideologically driven technology and enormous amounts of money to be made will mean that regulations are unlikely to be enforced. The health hazards of mobile phone use and GMOs are well known but we still use them because society itself is being redesigned to make life unlivable without them. It seems we are no longer human beings but living bar-codes programmed to proffer feedback loops of data in a vast auto-matrix of supply and demand. It should come as no surprise that corporations and their governments are seeking ways to extract more profits from the New Technological Order that is rising up from the shopping mall.

See also: They’re Spending Billions to Chip Our Brains


Notes

[1] ‘EU plans to fit all cars with speed limiters’ By Claire Carter, The Telegraph, Sep 2013.
[2] ‘Biometrics Help Teachers Track Students’ Every Move’ By Sheila Dharmarajan, The Future Is Now,September 17, 2013.
[3] aimglobal.org
[4] http://www.privacyrights.org/
[5] ‘Seen At 11: Getting Personal – Your Pulse Could Be Your New Password’ Pin Numbers, Credit Cards, And Passwords Could Soon Be A Thing Of The Past, CBS News, September 16, 2013.
[6]‘Operation of World’s Smallest Class Noncontact RFID Powder IC Chip Successfully Tested’ hitachi.com 2008/2009 Research & Development paper: http://www.hitachi.com/rev/archive/2008/__icsFiles/afieldfile/2008/07/24/r2008_technology_rd.pdf
[7] ‘RFID ‘Powder’ – World’s Smallest RFID Tag’ by Bill Christensen, technovelgy.com February 14, 2007.
[8] IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America’s Most Powerful Corporation. By Edwin Black, Second paperback edition. Washington, DC: Dialog Press, 2009; (introduction).
[9] ‘How RFID Tags Could Be Used to Track Unsuspecting People’ by Katherine Albrecht, Scientific American, August 21, 2008.
[10] Animal Tags for People? by David E. Gumpert, Business Week, January 11, 2007.
[11] ‘Conclusions from the French pilot projects for the use of RFID for ruminants’ by the Institut de l’élevage-France Louise Marguin, Marion Dang. June 14, 2012. | http://www.smartagrimatics.eu/Portals/66/Smartpercent20AgriMaticspercent205_3_RFID_Paris_2012-MD.pdf
[12] ‘Thousands of Mexicans Implanting Tracking Devices- But experts say they are not likely to work’By Evann Gastaldo, newser.com, Aug 22, 2011.
[13] ‘positiveID Corporation Receives VeriChip Order for Use With Israeli Military’ MarketWatch, October 11, 2011.
[12] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997.
[14] ‘Schools add RFID tagging to student IDs’ RFID News / CR80 News June 18 2012.
[15] ‘VeriChip: RFID Microchip Implants for Humans’ by Uri Dowbenko, conspiracyplanet.com
[16] ‘Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006’ by Katherine Albrecht, Ed.D. November 19, 2007.
[17] ‘Are Microchip Tags Safe?’ By Siobhan Morrissey Time Magazine, http://www.time.com, Oct. 18, 2007.
[18] ‘CASPIAN Releases Microchip Cancer Report’ antichips.com November 19 2007.
[19] op.cit Albrecht