Wikileaks

Neuro-Hacking the Mass Mind (I)

“…brain-hacking through social engineering and other processes is already a reality, and hackers are our brains. This ‘neuro-hacking’ can involve acting on the hardware, that is to say on the biological and genetic substrate of the brain, but it can also involve acting on the software, that is to say, on the communication code that we learn from society.” – Lucien Cerise


One of the breakthroughs in understanding the level of influence of the Deep State and Overworld dynamics has been through the recent revelations from Wikileaks’ Podesta emails. A veritable Pandora’s Box of connections has led to Pizzagate – now Pedogate – blackmail, corruption, child pornography, sex trafficking, black magick rituals and a plethora of other sordid revelations fanning out from the quest for regime change and the battle for resources in the Middle East. After researchers from all political persuasions and beliefs had been highlighting these horrors for years, these leaked emails, now being sat on by the FBI, are the closest yet to offering proof of the mechanisms which are passed from one Establishment/Deep State generation to the next like a dark baton slippery with blood.

Slowly but surely the why, who and how of our Official Culture and the drivers which ensure that humanity remains under the yoke of  World State cartels is being revealed in a way that hasn’t been seen before. Oil/Gas, weapons, drugs, and sex/organ trafficking lie at the top of multi-tiered resource pyramid. The financial architecture that perpetuates these unimaginably toxic channels is achieved through a long tradition of social engineering by Elite factions, the puppets & players of which follow a revolving door of power, irrespective of a President and his administration. This is the facade, the entrenched and inevitable outgrowth of the State that permits a shadow government to remain forever at the control panel of perpetual war and social disruption. As top-level power brokers between the CIA, the NSA and FBI jostle for supremacy let’s not forget that overall, these agencies are primarily engaged in a war for our minds as their primary reason for being.

However, let’s not imagine that the Wikileaks organisation and their poster-child Edward Snowden are somehow working for the greater good, although many in their staff may think so. I suspect that this period of permitted leaks is very probably nothing more than a psychological operation, a limited hangout of the CIA and thus an attempt to acclimatize populations to the ubiquity of surveillance and intelligence that is literally inside your home, phone, T.V. and anything else connected to the internet and the emerging SMART society.  This is one facet of the same social engineering project that we’ll discuss below.

It’s a risky game managing the flow of “leaks.” Allow too much information to seep into public consciousness and a momentum begins to emerge, not enough information and they can’t pursue their time-table of phased objectives. Which is why the hacking of lap-tops, smart phones and T.V.’s merely mirrors the hacking of our minds and beliefs – a potentially far more dangerous state of affairs then data mining. For example, the core roots of progressivism and the left have now been infected by ponerological streams of political correctness and narcissism, working in concert with CoIntelpro agents in much the same way as the New Age or Human potential movement as a whole. Thus, social movements such as LGBT, Black Lives Matter and Soros-led “social justice” organisations such as Moveon.org tune into a genuine desire for social equity and “rights” but are created or hijacked early on, driven by Deep State directives that desire the chaos of tribalism as a default setting for society. The younger generation of Millennials – who should be the hope of the world – appear incapable of exploring this dichotomy because they have already been programmed to embody and act out these inverted social-cultural beliefs, ethics and activism. The rise in an epidemic of narcissism in this demographic further encourages feel-good sensation, and a technology-driven buffer to the acknowledgement of nuance, complexity and attention to objective reality. The ability to think outside the box against ingrained conditioning becomes severely limited because it is perceived as an attack against the collective ego mask of self-entitlement.

Thus, Millennials and older generations of the well-intentioned (and not so well-intentioned) are already falling into the many traps, the escape from which will be extremely difficult since the these info-tainment led emotional hooks of manipulation offer benign moral imperatives to seduce a collective projection of unresolved shadows out into the world, thus turning ideology and justice on its head. Controlled opposition has therefore been easy to manufacture, backed up as it is by fake news of the corporate media. Those that are paying attention can see this formula everywhere you look: whether it is the BBC or CNN that promote the Establishment’s agenda of anti-Russian rhetoric to University Campuses engaging in an Orwellian re-branding of vocabulary in an tragi-comic and painfully ironic stand against racsim and bigotry.  Such tactics focus away from what really matters and into the realm of skin-deep analysis of feeling and sensation. This bio-chemical template that is burned into the young brains of new generations is the neural pathway upon which social engineering functions and thrives. Indeed, it seems much of the left, new age/green and “socially aware” are now the unconscious cultural foot-soldiers of the Deep State. This is why social engineering has been adopted with such pin-pointed skill and precision over the years and why it needs to be confronted and thoroughly explored.

The awakening to the nature of the MSM as a monolithic exercise in propaganda and thought control is gaining ground, thanks largely to the internet. It is becoming less easy to monopolise information and applied knowledge in this age of independent news feeds, FOI requests, forum research, whistle-blowers and leaked documents, despite the signs of psyops constantly filtering the truth. There is a real chance for moderates from the left and right (and many shades inbetween) to turn down the volume of their beliefs and collaborate against a common foe – that of institutionalised psychopathy. Which is why the war is being fought through the inner shadows and unresolved issues that we all have. These weaknesses can be exploited and used by the Elite through suitably prolonged exposure to new forms of social engineering. It is for this reason that lines between awareness, knowledge and apathy and ignorance are being drawn.

And so to neuro-hacking…

(more…)

Technocracy X: Nano-Science (2)

 “We cannot rely on trial-and-error approaches to deal with existential risks… We need to vastly increase our investment in developing specific defensive technologies… We are at the critical stage today for biotechnology, and we will reach the stage where we need to directly implement defensive technologies for nanotechnology during the late teen years of this century… A self-replicating pathogen, whether biological or nanotechnology based, could destroy our civilization in a matter of days or weeks.”

― Ray Kurzweil, The Singularity is Near: When Humans Transcend Biology


dna_nano_tech-wideThe military is the largest investor in the U.S. Nanotechnology Initiative (NNI). The share of the NNI budget given to the Department of Defence (DoD) since the program started has reached $6.6 billion with part of the expenditure going to DARPA and the departmental laboratories of the Navy, Army and Air force, the rest ending up at universities as research grants or as part of the Multi-University Research Initiative (MURI).[1]  Though spending has been fluctuating since 2007, there remains steady interest in nanotech’s military capabilities. Scientists for Global Responsibility (SGR) revealed from their research that: “… government funding for military R&D dwarfs that spent on social and environmental programs across the industrialized world …” with military R&D fixed towards “… a narrow weapons-based security agenda.” [2]  Which means the marginalisation of conflict prevention and analysis of the roots of conflict and its links to poverty, the environment, security and health issues continue to be under-funded. Nanotech advances are being hijacked away from improving civilian life with “game-changing” technology as the culprit.

A fervent need to make these grand visions a reality was given a sturdy platform for realisation back in 2007 from the DoD and their little known advisory body called the Defence Science Board (DSB) whose paper entitled: “DSB 2006 Summer Study on 21st Century Strategic Technology Vectors” laid some important groundwork for the future. In an attempt to place nanotech at the top of the military agenda the paper drew their attention to “synergistic combinations” of all forms of nanotech and their “… truly revolutionary capabilities in human performance enhancement, medical treatment and prophylaxis, miniaturization, life extension, robotics, and machine intelligence …” [3]  It was unabashed in its agenda for clandestine tagging and tracking, where: “A combination of nanotechnology, biology, and chemistry promises to provide significant increases in capability to conduct pervasive surveillance on a global basis.”

spybee

prototype for cyborg-bee © unknown

Some of these other applications currently in R & D or primed and ready for action include the following:

Nano-biotechnology – or miniaturized biotechnology is the recent development of merging biology research with nanotechnology, most notably using biomolecules, bio-membranes and nano-photonics for vaccinations and virus research. Particularly active in medical fields the new science is seeking to generating cures; develop stem cell treatments, creating muscle tissue and artificial proteins. The convergence between computers and biology is of primary interest where eventually computing will be sourced from a biological platform where “Colonies of live neurons can live together on a biochip device.” [4]

Nano-electronics – The development of molecules with useful electronic properties which can then be used in nano-devices. This includes synthetic chemical methods and the creation of synthetic molecular motors. Other forms include carbon nano-tubes which have taken over from silicon-based chips. Now, the race is on to fit billions of these tubes onto computer chips thereby increasing the chip performance to “… run at more than three times the frequency and consuming just a third of the energy.” [5]

DNA nanotechnology – the construction of structures out of DNA and other nucleic acids. This branch has a special relationship to nano-medicine and “SMART drugs” for targeted drug delivery, the development and creation of vaccines and the adjacent field of nano-electronics with real world applications in both fields looming large. [6]

Nano-robotics/weaponryself-sufficient machines operating at the nano-scale. Applying nano-robots in medicine are proving difficult due to a multitude of problems adapting to the biology of organic systems, though progress is there. However, military nano-robotics in combination with cybernetics is moving ahead in leaps and bounds. There are still very little scholarly articles on the nature and pace of advances on military robotics along with only a sluggish attempt at raising the ethical and moral issues inherent in the use of such weaponry. What is clear is that the military is getting very excited by it all due to the unlimited scope of applications. Reduced to the size of perhaps 0.1mm or less, autonomous mini and micro-robots could be deployed on the ground, in water and in air, using the same propulsion principles found in larger electronic and mechanical systems. All forms of movement are mimicked such as human legs, various types of hopping, flapping wings like a bird, flagella, and even side-winding movements of a snake. The multi-purpose nature of robotics means that weapons systems targeting, reconnaissance, communication and surveillance are easily utilized. Insects and small mammals are already being integrated into bio-cyborg hybrids with nervous system and brain interfacing with cybernetics, software and electrodes.

cyborg-mothcyborg moth | © unknown

Returning to our whacky friends down at DARPA and their various sponsored companies and subsidiaries, we find they are still churning out helpful prototypes for new ways to spy, maim and murder. Some of these latest offerings are still prototypes, in the manufacturing stage or on the drawing board. They comprise:

1) Nano-Scouts – real insects and simulated bird-like technologies which act as the eyes and ears of intelligence. Flies and mosquitoes have embedded nanotech capabilities which allow them to determine the presence of certain chemicals, changes in moisture levels or barometric pressure, and be able to sense movements, temperature, and vibration.[7]

2) Nano-Poisons – A variety of toxic substances with nanomolecules carefully tailored to illicit the correct responses. By interfering with neuro-chemical inhibitors and release agents introducing precise “onboard” quantities of synthetic poisons behaviour modification is taken to a whole new level. Almost any type of mind control would be available from encouraging the victim to lie obsessively to provoking suicidal thoughts; stimulating a person to react violently or to kill. And of course, a Brave New World of somatic release could be programmed where the person cannot help but love everyone and where anger and aggression is blocked. Nano-molecules would effectively quadruple the effectiveness of purely psychological methods of mind control.

3) Nano Force Fields –nano-coatings which can hermetically seal a vehicle or building by allowing particles to seek out air gaps and block them.

4) Nano Mind Erasers – Want to take out a politician or spy without fuss or bother of assassination? Then, inducing the equivalent of instant Alzheimer’s is the answer. Wiping the sections of the brain clean using micro fields programmed to flare up as tiny, molecular neutron bombs would do the trick.

5) Nano Needles – With no visible wounds and invisible to the naked eye these weapons represent an up-dated version of the old KGB poison-tipped umbrella. The needles could be shot from a suitably modelled gun to paralyse people. Presumably the lethal nature of the needles would be dependent on their carrier capability.

6) Nano Heart-Stoppers – Nano-blood flow restrictors and Stroke Inducers – Long known to be a part of military-intelligence operations the assassination of sensitive targets such as politicians, heads of state and celebrities. Undetectable in the blood stream, nano-molecules could mimic heart attacks or strokes; restrict the blood flow causing an array of symptoms, even inducing personality disorders.

7) Nano-Naut Swarms These are ‘SMART dust’ particles which act as an information or sensor clouds capable of analysing areas with sharp detail and relying back information to HQ. As reported in the MSM in early February 2013, the British Army has been deploying tiny nano-drones in Afghanistan for over two years. At just 10cm long and weighing only 16 Grams they are used to relay full motion video and still images back to the devices’ handlers. But technology is advancing as fast as weapons can be bought.

8) Cyborg Insects – could be the delivery tool of much of the above allowing viruses and lethal substances to be to their individual or mass target, something that Bill Gates and his forays into mosquito-driven vaccines would no doubt happily welcome. Spying and surveillance capabilities have also been successfully tested and deployed. One of DARPA’s less malevolent offerings, the Nano Hummingbird was named One of Time Magazine’s 50 best inventions of 2011. Shaped like a humming-bird the mini robot is remotely-controlled without an external power source and can fly, hover, move forward and backward in the air while shooting Hi-Resolution video.

9) Programmable Matter – Starting in 2007, with DARPA support, Carnegie Mellon delved into the possibility of creating hardware and software to make material that can programmed to morph into 3-Dimensional shapes – essentially, shape-shifting. Named the Claytronics Project, the brains behind this venture believe that it has the capacity to change every facet of human experience. They consider claytronics to be a platform for a new form of called “Pario” with the reproduction of moving 3-D objects the primary goal. In other words, the quest to program the world around us. Just a few years later in 2010 with a “self-folding origami” robot which can literally fold itself up and crawl away. Meantime, shape-shifting sand made an appearance in 2012 where; “New algorithms enable heaps of ‘smart sand’ that can assume any shape, allowing spontaneous formation of new tools or duplication of broken mechanical parts.” This of course begins to the blur the whole fields of nanotechnology bioengineering, cybernetics, biological-based pharmaceuticals, programmable vaccines and the advance of synthetic biology.

The US Department of Defence is also researching the feasibility and applications of robotic mosquitoes. So far testing has found that they can be remotely controlled with an on-board camera and a microphone. They will be able to land on unsuspecting dissidents or terrorists with the potential to take a DNA sample or leave RFID tracking nanotechnology on your skin. Flying in through a crack in your window or attaching itself to your clothing in passing would prove no problem for these adorables. No doubt law enforcement and Homeland Security are salivating at such a prospect. [8] In fact, sightings of insect-like drones have been occurring for years in the US, most frequently at activist demonstrations and marches. According to a 2006 Flight International report: “… the CIA had been developing micro UAVs as far back as the 1970s and had a mock-up in its Langley headquarters since 2003.”

robot_insectAssuming such machines can fly onto a local protester’s arm and then wing its way back to its controller with a fresh little DNA sample to analyse, this compliments another disturbing scenario as described by authors Andrew Hessel, Marc Goodman, and Steven Kotler who “…outline futuristic human genome work that evolves from the very real GE $100 million breast cancer challenge.” In this scenario: “freelancers receive bids to design personalized virus offering customized cures for the sick.” An individual succumbs to colon cancer and instead of going the route of standard chemotherapy he chooses an immediate payment of $1000 to have his genome decoded over two days. Virologists of the near future will have information about the disease and the exclusive genome sequence. The design cure will be outsourced the winning bid providing the formula to rid your body of the specific cancer. Targeting the US President by criminal cartels or terrorist cells would be relatively easy.

A 2010 release of secret cables by WikiLeaks, Secretary of State Hillary Clinton ordered US embassies “… to surreptitiously collect DNA samples from foreign heads of state and senior United Nations officials.” [9]With that in mind, an article by Atlantic magazine takes the next logical step in personalised bio-weapons and micro-drones.

Picture an African President busy with civil war and child soldiers. Perhaps his DNA had been sampled as part of a UN / US mandate. A drug is tailored to that genome sent to an online bio-marketplace and synthesised into actual genetic material. The authors explain that it is here that “… the future of drones and virology could intersect.”

The article continues:

A few days later tablets are delivered to a group that dissolves them and injects the liquid into a handful of micro-drones. The team releases the drones and infects the people in the African leader’s circle of advisors or family. The infected come down with flu like symptoms, coughs and sneezes that release billions of harmless virus particles — but when they bring their symptoms in the vicinity of the African leader — the particles change. Once the virus particles are exposed to that very specific DNA sequence, a secondary function within their design unlocks.[10]

Perhaps the formula contained a “fast-acting neuro-destructive disease that produced memory loss and, eventually, death.” For the African leader or any other head of state which was proving an obstacle to US hegemony “the symptoms could be tailored an infinite number of ways. Designed to reflect a uniquely local affliction like Dengue Fever, or to appear like symptoms of a genetic condition.” [11]Combined with the inherent nature of the military-coporate-banking complex and with their puppet Obama who sees no problem with murdering American citizens via remote drone attacks discarding any notions of law and democratic due process, then you can be sure that such a scenario will take place in the very near future – if it hasn’t already.

The above scenario set against military nanotechnology and other forms of “non-lethal” warfare is justified due to the threat of terrorism and the belief that we can all bring an end to the world’s violence and crime. It is believed that technology will save the day on the battlefield and in civilian life. If left to these people it would rapidly start to resemble an endless battle in itself, which is the general idea. Convincing people not to act on their “evil” thoughts by allowing nano-dust particles to seep into their brains is bread and butter behaviour modification. For anyone else, it is a step towards a Huxleyian nightmare.

Although many commentators prefer to believe that the fail-safe mechanisms of quantum computing and the intelligence apparatus would be enough to protect mainstream society, they fall into the trap of believing that those of conscience are presently guiding humanity. Once again, you cannot use a juvenile dictionary to explain a psychopathic reality that is operating on an entirely different cognitive and perceptual mainframe.

The fractal nature of the nano-world of military applications means that advances in weaponry would take place exponentially with a modus operandi that would excite any social dominator beyond all measure. Using the premise of the molecular assembler, a device capable of breaking and creating the chemical bonds between atoms and molecules, it means duplication is not only feasible and efficient but a requirement once the technology is up and running. Think of the white Storm-trooper clones in the Star Wars films – very much military-technocratic ambrosia. As nanotech guru Eric Drexler explained: “a state that makes the assembler breakthrough could rapidly create a decisive military force – if not literally overnight, then at least with unprecedented speed.” He further observes: “A nation armed with molecular nanotechnology-based weapons would not require nuclear weapons to annihilate a civilization. In fact, it seems that a rather surgical system of seeking and destroying enemy human beings as cancerous polyps could be developed–leaving the nation’s infrastructure intact to be repopulated.” [12]

irobotStill from ‘I Robot’ (2004) Twentieth Century Fox

A research paper sponsored by the European Commission for a 2004 conference on the military uses of nanotechnology and the hazards to society at large, came to some sobering conclusions. While the benefits in medical and non-military domains was clear and should not be unduly hindered provided regulations and ethical boards were swiftly introduced, there were a number of indirect ways that society could be: “detrimentally affected” through the “diffusion of the technology.” The paper offered some examples, including the temptation for the National Security State and related agencies, corporations and criminals to purloin micro-sensors and robots for spying, as well as: “the use of small autonomous systems for criminal attacks – and in particular terrorism – including attacks on critical infrastructures.” They also included a third possibility, that of:

“… implanted systems and other forms of body manipulation for ‘improving human performance’. Deciding what kinds of body manipulation should be permitted, and under which circumstances is a problem of peacetime civilian life, and should be handled by civilian society. However, military R&D and deployment of such systems could establish a fait accompli before society is able to carry out a thorough debate on the desirability of particular technological developments.”

And there’s the problem.

The last thing psychologically compromised persons enjoying their place at the helm of Official Culture is to see the involvement of local communities and civic society. Genetically modified organisms and foodstuffs went this way as did television, banking, media, warfare and most other socio-political power structures which required either secrecy, perception management or corporate monopolisation to ensure a singular reality. Nanotech will be no different if it is allowed to continue without regulations and in the hands of those who wield power for their own ends. If we have humans behaving in psychopathic ways then it doesn’t require the greatest leap of imagination to realise that military robots will be a reflection of their state of mind and intentions. Pathocratic control systems require global dominance in all domains and nanotech represents a mighty leverage in the race to achieve it. Horizontal proliferation would be nearly unavoidable with small, self-replicating systems where in principle, a single copy would be sufficient for growth in another country or sub-state entity.

The report goes on to state:

Military robots with sizes from nanometres to metres would bring threats on an unknown scale. If they could kill, they could constitute new forms of weapons of mass destruction more potent than known biological warfare agents. With non-lethal effects, such as disruption of personality, mass attacks could lead indirectly to the breakdown of a society and the death of a large portion of its members. Partly as a result of their smallness, but mainly owing to their potential for self-replication and the production of additional weapons on site, nano-robots would create extreme uncertainty. [13]

Given the nature of nanotech, automated decision making would grow based on its tendency for a kind of peak, fractal replication to emerge, once technological thresholds have been reached and surpassed. When this level of technology fuses with the mentality of unlimited growth much like the standard economic mind set currently dominating, then a virtual arms-race at the molecular level could ensue with entirely unforeseen consequences. Military production overlaid with ideological insanity.

C60a

“Buckminsterfullerene C60, also known as the buckyball, is a representative member of the carbon structures known as fullerenes. Members of the fullerene family are a major subject of research falling under the nanotechnology umbrella.” (uploaded by Mstroeck at English Wikipedia Later versions by Bryn C at en.wikipedia)

Alongside the massive drive to foist genetically modified foods on global populations agribusiness is fascinated by the part nanotech can play in making food production and consolidation more efficient. However, using molecular assembly principles “nano scale carriers” will soon be used for delivering fertilizers, pesticides, herbicides and plant growth regulators. A case is being made to reduce environmental impact with nanotech. It is believed that this will improve stability and lessen environmental degradation in terms of chemical runoff and other related problems. An example of these carriers would be the use of clay nanotubes for pesticides which will apparently reduce the amount of pesticide use by 70–80 per cent. Nanoparticles can act to help mollify and transform resistant chemical compounds in to non-toxic ones while waste water treatment and disinfectants have the potential to be markedly improved. Fluorescent labelling by “quantum dots” (QDs) using bio-recognition molecules for anti-bacteria and disease control will be supplemented with an array of rapid detection and enzymatic biosensors. There is even a device called the “E-Nose” inspired by the human nose which, through the use of nanoparticle gas sensors can detect precisely the quality and quantity of gas present. [14]

Socio-economic demands will ensure that wireless nanosensors in crops designed to monitor and collate data on agronomic intelligence processes such as planting and harvesting cycles will become more and more important. Water levels, fertilizers, pesticides, herbicides and other treatments will also be under the nanosensor umbrella in the hope that maximization of crop yields and a reduction in resource input will be the end result. [15]

Biotechnology at the nanoscale is already having some success in the battle against plant resistance and environmental stresses such as drought, salinity and diseases. Nanobarcodes will be used for authentication and tracking in agricultural food and husbandry products. As knowledge grows in the area of plant gene traits and nanotechnology-based gene sequencing it is taken for granted that such process will offer new ways to reduce costs and maximize profits. [16]  With undoubted benefits that nanotechnology can provide, this is still inside the constraints of Official Culture. Farming has already been transformed into a leviathan of corporate efficiency where community, civic and independence has been sacrificed. Nano-farming may increase the overall efficiency and provide intermittent benefits, but will it have the capacity to transform agriculture away from agribusiness corporatism?

If new endeavours are dominated by the matrix of the 4Cs and the 3EM then it will limit the hope for social renewal and become just another tool to increase exploitation still bound by the same lowest common denominator. Consumerism, far from being modified or somehow reduced under this new technology will only intensify mechanisation, commodification and the encoding organic life, this time at the molecular level. Nanotechnology may have a place in improving humanity’s lot but not by being grafted onto a socio-political and economic framework that caused the problems in the first place.

Quite apart from providing new innovative tools for medical advances and the promise of an agricultural revolution, evidence so far in relation to health and environmental concerns doesn’t exactly promote confidence. Some of the latest research results show that:

  • Rats breathing in nanoparticles were found to exhibit inflammation, skin aging and stress responses.
  • DNA and chromosome damage which in turn “linked to all the big killers of man, namely cancer, heart disease, neurological disease and aging”.
  • Carbon nanotubes – the possible replacement for silicon – have shown to have the potential to cause mesothelioma ( a form of cancer).
  • Nanoparticles and nanofibres have shown to cause lung disease in a similar way to asbestos. [17]

Mark Wiesner Professor of Civil and Environmental Engineering at Duke University in Durham N.C., has argued for a rethink as to the way nanoparticles are selected and defined in relation to potential impacts on human health and the environment. His international team of researchers from the federally-funded Centre for the Environmental Implications of Nanotechnology (CEINT), based at Duke University in the United States, have raised a number of issues which need to be addressed if nanotechnology is to prove viable and ethically responsible. He believes there is presently confusion as to what truly constitutes a nanoparticle where “… materials often do not meet full definition of having special properties that make them different from conventional materials.” According to Wiesner, a key question that needs to be answered: “… is whether or not a particular nanoparticle has toxic or hazardous properties that are truly different from identical particles in their bulk form,” and this due to the fact that: “Many nanoparticles smaller than 30 nanometers undergo drastic changes in their crystalline structure that enhance how the atoms on their surface interact with the environment.”

The professor explains further:

“…because of the increased surface-area-to-volume ratio, nanoparticles can be highly reactive with other chemicals in the environment and can also disrupt certain activities within cells. … “While there have been reports of nanoparticle toxicity increasing as the size decreases, it is still uncertain whether this increase in reactivity is harmful to the environment or human safety,” Wiesner said. “To settle this issue, toxicological studies should contrast particles that exhibit novel size-dependant properties, particularly concerning their surface reactivity, and those particles that do not exhibit these properties.” [18]

Perhaps it is not the health and environmental issues which are really the problem. We humans are extraordinarily creative and ingenious. All the above is driven on the assumption of cybernetics and its systems theory as viable working models; the idea of “nested” organic systems and dissipative structures which are interrelated and interconnected by virtue of their functional similarity. *This means that bio-engineers and technocrats look at nanosystems as providing the potential for exponential growth via automatic and autonomous emergent properties. As described previously, this opens up a whole new pandora’s box when matter becomes programmable.

nanotubes_carbone

Carbon Nanotubes Source: tpe-nanotechnologie-cb.e-monsite.com/

According to nano scientists this follows that society and the human condition is about to “reshaped” in very positive ways: cleaning the environment, easing the pressure for natural resources, tackling hunger, curing AIDS and other invasive diseases; giving new life to paraplegics whilst enhancing the human body. However, will these laudable aims be set against a background of unresolved questions which threaten to undermine the human species? What has happened to new advances in technology in the past?

Nanotech advocates display frightening naïveté in this regard and an often ironic binary evaluation of what are highly complex issues, notwithstanding an ignorance of ponerology and psychologically compromised cultures. It is a contradiction to say that strengthening our democratic processes will somehow ensure responsible ethics which will insulate against the darker applications of nanotechnology when overwhelming expenditure is already focused in the hands of those who seek weapons advancement and shareholder profits. A barrier to accountability will remain as tenacious as it has proved to be in narcotics, conventional weapons and trafficking. It benefits the Establishment just as nanotechnology promises to do.

Futurist David Brin’s prescription to cultivate a “transparent society” where privacy is effectively non-existent is dangerous as it opens the backdoor for just about every totalitarian precept going. The self-replicating nature of molecular nanotech has given rise to end time scenarios where machines take over the world replacing humanity and organic life. Eric Drexler coined the term “grey-goo” otherwise known as ‘ecophagy’ to illustrate such a cybernetic apocalypse.[19]Think along the lines of “the Collective” from the Borg in the Star Trek TV series or the “Hive mind” so beloved of humanists and transhumanists. Expansion derives from assimilation and adaptive properties – “group think” in a futurist setting.

transmission-5speed-gears.ai

Corporations will be regulated insofar as it does not impinge on the market value of nanotechnology. This means regulations in medical and consumer arenas where it matters less will be followed. Where it is most needed however, is in domains such as weaponisation and agriculture and which will likely follow the traditional route of lobbyists and cartel economics – the path of least resistance. Meanwhile, legislation will have a very tough time keeping up with the rise of nanotechnology especially when environmental and privacy laws are only applicable to those adhering to the public domain and wholly irrelevant to government /corporate experimentation outside such accountability.

Although the military is driving nanotech advances (as with all things) the testing ground has begun with many “passive” or “first generation” commercial applications finding their way to the market place. As explored in the previous post the list is endless. If sunscreen products in the US contain nanoparticles and thus freely pass through the blood-brain barrier then the background of complex toxicology issues must remain at the forefront. In the same way, as GMOs, Wi-Fi and cell phones all have serious health questions hanging over them and health and environmental concerns of nanomaterials at this early stage have been completely ignored. Issues of privacy and confidentiality are also profoundly important.

The precautionary principle means that it is essential not to jump in feet first with this technology when there is an absence of suitable definitions regarding nanoparticle properties which could help scientists determine what represents a threat to the environment or human health. Despite certain advocacy groups calling for government regulation, the only principle which governs decisions is the one leading to the quickest possible profit. Nanotech forges ahead, in love with itself and its seemingly unlimited potential.

It doesn’t take a genius to see that it will go the same way as GMOs since the focus behind the drive to conquer nature, deny death and embrace immortality is exactly the same. Until regulation, insurance and extensive public discussion is forthcoming it is likely the more negative scenarios surrounding nanotech will play a greater role. After all, once the perceived genie is out of the bottle the consequences of its “magic” are more difficult to manage. This means that with all the wondrous potential for cleanng up the environment patents will arrive forcing us to pay for such ecological magic just as it was with the so-called “Green Revolution” of genetically modified crops. This means an expansion of selective wealth where transformation happens according to your pocket and status thereby replicating the same old divisions and class divides.

To reiterate the immovable direction of technology: it is the military and nano-weaponry which will determine the future of nanotech as a whole not whether a surgeon can provide life-saving operations or the disabled individual can begin to walk again. Altruism is not the primary currency of social exchange in a world shaped by psychopaths. Nanosystems will be nurtured on the same directive until such time we can wrest control.

 


* Dissipative Structure – A system that exits far from thermodynamic equilibrium thus dissipating the heat generated to sustain it. It has the capacity of changing to higher levels of orderliness leading to self-organization. These systems contain sub-systems that continuously fluctuate.


Notes

[1] ‘More soldiers in nanotechnology labs?’ By Michael Berger, nanowerk.com August 22, 2007.
[2] Ibid.
[3] http://www.acq.osd.mil/dsb/reports/2006-02-Summer_Study_Strategic_Tech_Vectors_Vol_I_Web.pdf
[4] NanoMedicine – A Review by K.K. Senthil Kumar, International Journal of Innovative Drug Discovery, Vol. 2 / Issue 1 / 2012 / 40-47 (from International Journal of Biopharmaceutics)
[5] ‘Carbon nanotubes fit by the thousands onto a chip’ By Jason Palmer, BBC News, 29 October 2012.
[6] DNA nanotechnology and transhumanism seem to fit snugly together in terms of their technological vision for humanity. Whether or not most persons working in the field are predisposed to this belief is irrelevant but the belief that vaccinations across the board are absolutely necessary and beyond reproach is a powerful part of the medical establishment. As such, the transhumanist paradigm naturally joins forces with materialism, atheism and corporatism to unfold their agenda accordingly. Journalist Sayer Ji has this to say on the subject:

“Not only have humans strayed from their mammalian roots by creating and promoting infant formula over breast milk, and then promoting synthetic immunity via vaccines over the natural immunity conferred through breastfeeding and sunlight exposure, for instance, but implicit within the dominant medical model is to replace natural immunity with a synthetic one. This is the philosophy of transhumanism, a movement which intends to improve upon and transcend our humanity, and has close affiliation with some aspects of eugenics.
The CDC’s immunization schedule reflects a callous lack of regard for the 3 billion years of evolution that brought us to our present, intact form, without elaborate technologies like vaccination — and likely only because we never had them at our disposal to inflict potentially catastrophic harm to ourselves. The CDC is largely responsible for generating the mass public perception that there is greater harm in not “prophylactically” injecting well over 100 distinct disease-promoting and immune-disruptive substances into the bodies of healthy children. They have been successful in instilling the concept into the masses that Nature failed in her design, and that medical and genetic technologies and interventions can be used to create a superior human being.
In this culture of vaccination, the non-vaccinated child is “inferior,” “dirty,” perhaps even “sub-human” to those who look upon vaccination as the answer to what perfects the human immune system.
Transhumanism participates in a dialectic which requires a simultaneous and systematic dehumanization of those who do not share the same way of thinking and behaving. The eugenic undertones of mass vaccination and the cult of synthetic immunity are now only thinly veiled, as we move closer to the point where a psuedo-scientific medical dictatorship lays claim to our very bodies, and the bodies of our children.
The point of no return (if not already traversed) is only around the corner: the mass introduction of DNA and Recombinant Vector Vaccine technology. Vaccines moved through the following stages (a tortured history of failures and massive “collateral damage”): Live Vaccines > Attenuated Vaccines > Subunit Vaccines > Toxid Vaccines > Conjugate Vaccines, only now reaching towards converting our living tissue into “vaccine-making factories” through the use of DNA and Recombinant Vector Vaccines, which are designed to directly alter cells within the vaccinated person’s body so that they create the antigens normally provided by vaccines themselves.
While not yet in use, clinical trials are now underway to obtain FDA approval. If we do not educate ourselves now and act accordingly, their mass implementation is inevitable, and our very genomes will become the next target of the vaccination/transhumanist agenda.” – ‘The Vaccination Agenda: Implicit Transhumanism’ By Sayer Ji, Contributing editor, Activist Post, January 24, 2012.
[7] Most Innovative Defense Technology’ 2008 Award Nominee – Nano SCOUT AeroVironment Inc.| http://www.defense-update.com/ | ‘The dragonfly built to spy – Tiny flying robots have the military abuzz, says Mark Harris’ http://www.timesonline.co.uk/tech.
[8] A COMBINED EXPERIMENTAL-NUMERICAL STUDY OF THE ROLE OF WING FLEXIBILITY IN INSECT FLIGHT Lingxiao Zheng, Xiaolin Wang, Afzal Khan, R. R. Vallance and Rajat Mittal1 Department of Mechanical & Aerospace Engineering, George Washington University, Washington DC 20052 Tyson L. Hedrick 2009. http://www.me.jhu.edu/fsag/Publications/Papers/AIAA-2009-382-170percent5B1percent5D.pdf
[9] ‘Hacking the President’s DNA’ November 12, The Atlantic Magazine, By Andrew Hessel, Marc Goodman and Steven Kotler.
[10] ‘Micro-Drones Combined With DNA Hacking Could Create A Very Scary Future’ By Robert Johnson, Oct. 28, 2012. Business Insider | http://www.businessinsider.com/
[11] Ibid.
[12] ‘A Glimpse Into China’s Post-Nuclear Super-Weapons: An Interview with Lev Navrozov on Nanoweapons by Ryan Mauro for http://www.worldthreats.com Sept. 26, 2003. | Quotes sourced from Engines of Creation By Eric Drexler (1986).
[13] ‘Military Uses of Nanotechnology – European Commission’ ec.europa.eu/research/conferences/2004/ntw/pdf/soa_en.pdf
[14] ‘How helpful is nanotechnology in agriculture?’ By Allah Ditta 2012 Adv. Nat. Sci: Nanosci. Nanotechnol. 3 033002 doi:10.1088/2043-6262/3/3/033002 Vietnam Academy of Science & Technology, 29 May 2012. IOP Science | http://iopscience.iop.org/2043-6262/3/3/033002/article#ansn431989bib05
[15] Ibid.
[16] ‘The potential and challenges of nanopore sequencing’ Nature Biotechnology 26, 1146 – 1153 (2008) Published online: 9 October 2008 | doi:10.1038/nbt.1495
[17] ‘Tiny Inhaled Particles Take Easy Route from Nose to Brain’ August 3, 2006, University of Rochester Medical Centre. | Wu, J; Liu, W; Xue, C; Zhou, S; Lan, F; Bi, L; Xu, H; Yang, X et al. (2009). ‘Toxicity and penetration of TiO2 nanoparticles in hairless mice and porcine skin after subchronic dermal exposure’. Toxicology letters 191 (1): 1–8. doi:10.1016/j.toxlet.2009.05.020. PMID 19501137. | Jonaitis, TS; Card, JW; Magnuson, B (2010). ‘Concerns regarding nano-sized titanium dioxide dermal penetration and toxicity study’. Toxicology letters 192 (2): 268–9. doi:10.1016/j.toxlet.2009.10.007. PMID 19836437. | Schneider, Andrew, ‘Amid Nanotech’s Dazzling Promise, Health Risks Grow’, March 24, 2010. | ‘ Nanofibres ‘may pose health risk’,’ BBC News, August 24, 2012. | ‘Is Chronic Inflammation the Key to Unlocking the Mysteries of Cancer?’ By Gary Stix, Scientific American, July 2007.
[18] ‘When Nano May Not Be Nano’ Duke University, Depart. Civil & Environmental Engineering September 14 2009.
[19] ‘Some Limits to Global Ecophagy by Biovorous Nanoreplicators, with Public Policy Recommendations’ By Robert A. Freitas Jr. April 2000. | www.rfreitas.com/Nano/Ecophagy.htm

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.