Monthly Archives: May 2016

harmony

 harmony

David Swanson is “an author, activist, journalist, and radio host, director of WorldBeyondWar.org and campaign coordinator for RootsAction.org. Swanson’s books include War Is a Lie  and War Is a Crime. He hosts Talk Nation Radio. He is a 2015 Nobel Peace Prize Nominee.”

On May 27th, he published an article, widely mirrored by others, entitled Obama in Hiroshima Paints a Peace Sign on a Bomb.  I read the article; you can too. The title is apparently metaphoric.  I did a cursory search for images of the ceremony in Japan and came up with little in the way of paints, paint brushes, or peace signs. I thought maybe the wreath had a certain design. Move your coffee off your desk and click on the link below. 

http://ww4.hdnux.com/photos/46/55/70/10149403/9/rawImage.jpg 

I appreciate the commentary on the seeming and obvious duplicity or hypocrisy in Obama’s acts and words. I’ve posted similar statements at my news blog Occurrences.

Meanwhile Japan seems to have veered back into militarism, at least covertly.

Not yet posted in Occurrences, off last night’s RiceFarmer.blogspot news links, is Chuck Spinney’s. article at Consortium News

I’ve extracted the core information from Spinney’s lead into Cockburn’s interview of Truman historian Alperovitz.

 

“President Obama’s administration is planting the seed money for an across-the-board-modernization of nuclear weapons, delivery systems, and support systems that will cost at least a trillion dollars (more likely $2 trillion to $3 trillion, IMO) over the next 15-30 years.

While its details are shrouded in secrecy, public information is oozing out (e.g. see this link). Present information now suggests this program includes: a new ballistic missile launching submarine; a new strategic bomber; a new land-based intercontinental missile; a new air-launched cruise missile; modernization of and adding precision guidance to the B-61 “dial-a-yield” gravity bomb; modernization of strategic ballistic missile warheads; upgrades to the sea launched ballistic missiles; a massive upgrade to the surveillance, reconnaissance,  command, control, and communications systems needed to manage nuclear warfighting; continuation and upgrades to ballistic missile defense systems (rationale: gotta have a “shield” to protect the aforementioned “swords”); modernization of the nuclear weapons laboratory infrastructure; and the increasingly demanding problem of nuclear weapons facilities cleanup (e.g. Hanford).

Given the highly evolved nature of the domestic politics driving defense spending (i.e., the domestic operations of the Military-Industrial-Congressional Complex (I described this in “The Domestic Roots of Perpetual War”), history shows the golden cornucopia of this nuc “bow wave” or programs will quickly evolve into an unstoppable tsunami of front-loaded and politically engineered contracts and subcontracts that will grow over time to overwhelm and paralyze future Presidents and Congresses for the next 20-30 years….”

 

The debate about bombing Japan into submission will continue; if you want to drill deeply and follow along with the US military/executive branch, read The Image Before the Weapon: A Critical History of the Distinction between Combatant and Civilian, by Helen M. Kinsella (Ithaca and London: Cornell University Press, 2011).  I don’t want to mislead you into thinking that I’ve read it.  I haven’t.  But I did read the review of it by a Fellow in the Thinking Matters Program at Stanford University; it is encapsulated here: image before weapon review  

 

 

http://www.nucleardarkness.org/include/nucleardarkness//images/pictures/hiroshima/big/nagasaki_04.jpg

 

 

“The atomic bombs killed several hundred thousand people, many instantly in the nuclear fire, many later with burns, injuries and radiation sickness, and still many others, over the years, with cancers and birth defects. These deaths continue to this day. Like most of the cities bombed in World War II, the majority of the inhabitants were women, children and the elderly.

Before the war began, bombing cities was considered an act of total barbarism; there were no “conventional bombs” and it certainly was not considered “conventional” to target civilian populations for mass destruction. But this ideal was shattered early in the war, and eventually all sides engaged in mass bombing raids against cities and civilians.

After the Nazis conducted their massive bombing raids against London, the British retaliated by developing incendiary bombs, fire-bombs designed to burn down cities. British and American bombers dropped these bombs on 5 German cities, killing hundreds of thousands of German civilians in Hamburg, Dresden, Kassel, Darmstadt, and Stuttgart. In March, 1945, the U.S. fire-bombed the city of Tokyo, killing at least 100,000 people.

By the time the atomic bombs were dropped on Japan, 50 million people had already died in World War II. The bombing/murder of civilian populations had occurred so many times that it was no longer even regarded as unusual. I believe this is perhaps the greatest tragedy of the war, and it set the stage for the Cold War and the nuclear arms race that followed.

When you view these images of Hiroshima, remember that there is a good chance that a nuclear weapon may now be targeted on your own city and home.”

http://www.nucleardarkness.org/hiroshima/ 

 

In Occurrences, I’ve also routinely posted the back-and-forth intensifying stand-offs between Russia and the US, and the Chinese-US Pacific/South China Sea naval confrontations. 

If the moves by Obama noted by Spinney don’t get us into a massive thermonuclear exchange, they’ll bankrupt us. 

You can play the home version of thermonuclear exchange here: http://www.nucleardarkness.org/nuclear/nuclearexplosionsimulator/ 

 

Much has been said about the role of the Christian fundamentalist and Dominion movements within the US and particularly within the US military, especially the US Air Force. I hope degrees in divinity and theology are not required to have a coherent and common sense conversation about  the basic realities of nuclear tactics and strategy.

But what struck me is the metaphorical peace sign in Swanson’s title. The peace sign is no simplistic hippie fawning. Flowers whose stems have been tossed down the muzzles of weapons is enough symbolism. Fake blood poured by Catholics on nuclear technology works as well. We need somehing that can transmit the meaning of an awful outcome that we can still barely conceive, even half a century beyond the events that were studied, filmed, and researched.  A lot of literature has been crerated about the real and supposed effects of the detonations of modern weapons, even the small battlefield or neutron bombs that pretend to make their use acceptable. The world will not see and often are not allowed to see the horrors of the use of phosphorus or depleted uranium, so certainly we will not be allowed to talk about the effects of the kinds of advanced weapons systems both sides either boast about or rush to manufacture. 

It is a truism that no weapon has been made that hasn’t eventually been used.

If I’m wrong about this, name it. 

So I am not amused when I see Swanson drop a reference to the peace sign so blithely. You see, it is suggested by some that the peace sign is a sign of Satan. It is associated with Socialists and Communists. According to that source, it was the Teutonic rune of death, used to signifiy hatred of Christians, and is associated with Masonry. But maybe that’s a reference from a bunch of crazies. 

The author of this peaceday.org web page has extended “an open invitation over the last twenty years for anyone to show me any proof the peace sign was used” before 1958. 

“… the Peace symbol surfaced on letters from the Direct Action Committee against Nuclear War in its original form as early as March 1958. Bertrand Russell was a member of this committee and, through his writings, has left us with an unmistakable history of when, where and who created the Peace Sign. Here are quotes from letters Bertrand Russell wrote in response to H. Pickles from Lichthort Verlag who wrote to complain that the peace symbol was a death symbol because the arms pointed downwards. Russell’s reply: “I am afraid that I cannot follow your argument that the ND badge is a death-symbol. It was invented by a member of our movement as the badge of the Direct Action Committee against Nuclear War, for the first Aldermaston March. It was designed from the naval code of semaphore, and the symbol represents the code letters for ND. To the best of my knowledge, the Navy does not employ signallers who work upside down.’’

“Gerald Holtom [sic] is in fact widely credited with the design of the nuclear disarmament symbol (aka the peace symbol). The earliest reference I could find is in American journalist and playwright Herb Greer’s “Mud Pie” (London: Parrish, 1964). Mr Greer has since written to me to corroborate my facts. A little before the first Aldermaston march at Easter 1958, Holtom showed up at the offices of “Peace News,” in London, with drawings for banners and the symbol: “On a purple square was superimposed a white circle with a purple cross inside it, or almost a cross. The arms had slipped and were drooping against the lower sides of the circle. Holtom had made the design by combining the semaphore letters N and D: N for nuclear and D, naturally, for disarmament.” (P. 30) Holtom was a commercial artist with, it seems, a “visual aid factory”. Greer told me that he put his factory in Twickenham to making “lollipop signs” marked with the droopy cross. In correspondence through email he added, “I was actually there on and before the first Aldermaston March for which it was created. I visited Holtom, I saw the original sketches and discussed it with him. The reason for the symbol being upside down (D over N) is that semaphore is a military code. Upside down, anti-military.” For a much later account by a famous march organizer who witnessed Holtom’s presentation, see Michael Randle, “Non-Violent Direct Action in the 1950s and 1960s”, in Richard Taylor and Nigel Young, _Campaigns for Peace: British Peace Movements in the Twentieth Century_ (Manchester: Manchester U. Press, 1987), p. 134. The symbol was to appear at either end of banners stretching from one side of a streetful of marchers to the other.”

Now you may say is there anything else you can tell us about the Peace Sign?? Of course!!

“From a design point of view, it is interesting to note that the original sketches are preserved at the School of Peace Studies, Bradford University (ibid., p. 159). The original symbol wasn’t just sticks in a thinly bounded circle. The ends of the “arms” and “legs” thicken and splay out noticeably as they approach the circumference. And the circle itself is thick — when it has an outer edge. (Thus there are at least 2 designs.) You can see the original symbol on the banners and “lollipops” of the marchers in plates in another book by Taylor, “The Protest Makers” (Oxford: Pergamon Press, 1980). The thickening itself has two versions: in one, all the straight strokes are thickened; in the other, only those in the lower half of the circle. Both are amply represented here in literature preserved by Bertrand Russell from his days at the head of the Campaign for Nuclear Disarmament and the Committee of 100. Some are eminently scannable, too. The original designs are much nicer than what might be termed the sanserif abstraction that took over the banners by 1961.”

http://www.peaceday.org/pcsign.htm 

http://www.teachpeace.com/peacesymbolhistory_files/image002.jpg

Dave Dionisi points out that the peace sign most of us are familiar with “combines a circle, a vertical line, and downward sloping lines.  Throughout history the peace symbol was not always used in the spirit of love and service to humanity. For this reason, the Teach Peace Foundation does not use the peace symbol.” 

That teachpeace link goes on describe the Gerald Herbert Holtom source/design story as a popular explanation and notes the fact that Bertrand Russell “supported Holtom’s claim and aggressively promoted the arms down symbol. The arms down peace sign made its first public appearance in the United Kingdom during the 1958 Easter weekend Direct Action Committee anti-nuclear march from London to Aldermaston. Russell was the march organizer responsible for placing the arms down peace symbol on buttons and banners.” 

http://www.teachpeace.com/Holtom%20original%20sketch%202.JPG 

“Russell’s interest in the peace symbol becomes visible when you know he was a member of the British Fabian Socialist Society, a secret society advocating a New World Order. Russell wrote in his book The Impact of Science on Society that a “Black Death” or bacteriological warfare would be helpful every generation to cull the population. One of Russell’s frustrations was war had proved to be disappointing in dramatically reducing populations.3 When you realize Russell supported both communism and peace without God, his alignment with all the New World Order tenets becomes visible. Specifically, he wanted to abolish God, abolish representative government, abolish private property, abolish food independence, abolish the family, and abolish most people as part of his anti-Christian crusade…..”

“Russell’s primary interest in the symbol was to communicate defeat, despair, and disrespecting Jesus. Secret societies advancing the Great Plan enjoy seeing people, especially young children, wearing the peace symbol with the arms down because in their Luciferian religion they believe deception produces a dark energy helping to pave the way for the Antichrist.

American journalist and playwright Herb Greer adds support for the Holtom explanation. He reported, “I was actually there on and before the first Aldermaston march for which it was created. I visited Holtom, I saw the original sketches and discussed it with him.”

Ken Kolsbun, author of the book Peace: The Biography of a Symbol, reported that Holtom expressed regret in not designing the peace symbol with the joyful lifting of arms towards the sky.5 For most of Holtom’s life he would draw only the upright peace symbol….”

http://www.teachpeace.com/iStock_000002332980Smallest.jpg 

Holtom’s wish that the peace symbol connotation of despair be changed to joy is illustrated by the picture on the right. When the peace symbol is inverted the letter “N” becomes the semaphore code for “U” which could mean “universal” disarmament or the less popular but courageous “unilateral” disarmament.7

While it appears reasonable that the modern day peace symbol comes from Gerald Holtom, this logic fails to address the fact that the symbol has been used for evil both in modern times and for thousands of years.

This same symbol was used by Hitler’s 3rd Panzer Division from 1941 to 1945. The regimental 3rd Panzer Division symbol. Soviet, Polish, and Hungarian citizens, having suffered from the Nazi massacres, undoubtedly struggled with Holtom’s use of the symbol as a thoughtful way to communicate peace. The symbol can also be found on some of Hitler’s SS soldiers’ tombstones.8 Another flaw in the Holtom creation story is the use of the symbol as an anti-Christian symbol by the Saracens as early as 711 A.D.9  For the Saracens, the image placed on their shields symbolized the breaking of the Christian cross.

For some the broken cross was equated to a satanic symbol known as the raven’s craw or witch’s foot. While Holtom may not have known the historical meaning of the peace symbol, Bertrand Russell was a historian and member of the Fabian Society. A 1970 article in the American Opinion magazine claimed Russell knew the historical occult meaning and intentionally selected an “anti-Christian design long associated with Satanism.”10

The fifth and final Roman emperor of the Julio-Claudian dynasty, Nero (born Lucius Domitius Ahenabarbus 37 – 68 AD), is remembered in history for persecuting Christians. Nero’s rule was so wicked he even had his mother executed. The First Roman-Jewish War (66 – 70 AD) started during his reign and today the term “Nero Cross” is the symbol of the “broken Jew” or “broken cross.” The most famous person believed to be crucified by Nero was the Apostle Peter. To symbolize humility and unworthiness in comparison to Christ, Peter requested that he be crucified with his head toward the ground. As a result of Peter’s death the upside down cross was used by early Christians as a positive symbol for peace.

The symbol of the upside down cross changes its meaning when the person on the upside down cross is no longer Peter but Jesus. Anti-religious and satanic groups use the “Nero Cross” or inverted “Latin Cross” to symbolize everything opposite of Christianity. Today this is clearly illustrated by “black metal” or heavy metal music lyrics and imagery that communicate anti-Christian sentiments.11 An album cover for the black metal group, Mayhem, is shown on the left. The first letter “M” in “Mayhem” and the last “m” depict the upside down cross. In addition to musicians, film makers have reinforced the notion that the upside down cross is an anti-Christian symbol as illustrated by The Omen in 1976 and The Exorcism of Emily Rose in 2005.

The symbol has also been used to communicate support for communism. Bertrand Russell once said: “There is no hope in anything but the Soviet way.” Governments–both those who supported communism and those opposed to it–have perceived benefits in aligning the peace symbol with communist ideology. For people like Bertrand Russell, the author of the 1927 essay Why I Am Not Christian, the symbol represented not only a pro-communism meaning but peace without God.12

http://www.teachpeace.com/Book%20of%20signs%20the%20man%20dies.JPG

The confusion about what the modern day peace symbol means is further clouded by the founder of the Church of Satan, Anton LaVey. LaVey used the symbol as the backdrop for his altar.13 Rudolf Koch’s Book of Signs explains the downward pointed fork represents the death of man.14 Placed in the circle the symbol means the total death of all people which is the exact opposite of what Holtom worked to prevent with the Campaign for Nuclear Disarmament.

While the anti-God, communist and death of man arguments are far from representative of the majority of people that carry or wear a peace symbol, they can frustrate the sincere efforts of peacemakers.

Today because many people carry the symbol without understanding the history, we miss an opportunity to address historical uses and move forward to reclaim the symbol for good.15 The Focus Fusion Society is honoring Holtom’s by putting the peace symbol arms up.16

Unfortunately even the upward arms peace symbol is not problem-free. For example, the white racist group, National Alliance, uses the upward arm symbol shown on the right.17

When you see the peace symbol, with the exception of groups specifically promoting violence, the person displaying it is attempting to communicating a message of love. Rather than use the arms down or arms up peace symbol, communicating love with kindness is recommended.”

Sources for and additional information about Dave Dionisi’s article are at the link: http://www.teachpeace.com/peacesymbolhistory.htm 

 

 

Hands down, though, the recurrent problem is the devastatingly stupid expansionist funding and support for, and planning for the use of, nuclear weapons. 

The image that comes to mind is five people lined up in an interlocking daisy chain perhaps not unlike the alignment of the symbol itself, each person’s right hand extended in a reach to the back of the head of the person in front of them, pointed at the middle of the brainstem, each holding a Glock automatic loaded with a .40 hollow-point ACP in the chamber, safeties off, practicing synchronized rhythmic breathing in the hopes that no one twitches. Bathroom and meal breaks are allowed so long as each person hands off the weapon to his or replacement. 

Other images come to mind of the types of exercises routinely and repeatedly undertaken by entry-level aikido students to practice grappling, movement, and weapons defense and take-away techniques. 

The most vivid “image” that arose from the text above is the one that suggests unilateral disarmament. 

What happens when one combatant puts down their weapon before the other?

Most people with military or police training would tell you that would be suicidally stupid. (See Put Down Your Gun and Step Away.) 

Everybody sees the other as evil, dangerous, cowardly.

Spiritual breakthrough is often describined as what results when you have seen that everything and everyone is the same thing.  

In aikido, situational awareness for combatants is made of foreign concepts like the techniques and practices of bowing, metsuke, ma-ai, and the like. These are forms of heightened awareness and heightened regard for the Other.

http://www.aikidosangenkai.org/blog/images/2013-04/ueshiba-morihei-love-calligraphy.jpeg 

I am no sensei. 

I am not qualified in any sense to talk about this thing they call the discipline of the spirit of harmony.

But getting combatants to practice synchronized abdominal stress-reducing breathing might be a good start. Every aikido session begins and ends with meditation.

And what little I know about aikido is that its entire purpose is the expression of love

reverse-engineering humanity

reverse-engineering humanity

A slice of the text:

“DARPA’s Bio/Micro/Sciences project is researching and developing systems from reverse-engineering the human body via artificially general intelligent computers: computers where human neural synaptic information has been reverse-engineered then uploaded into the computer itself to produce “general intelligence” within a machine. This r&d aims to find ways to “improve” human performance via mapping of the entire human body (inside and out) at a molecular and whole-body level to develop a myriad of prosthetics, including multi-array brain stimulating microchips and brain prosthetics, for the human organism, as a war-fighter, to increase strategic battlefield effectiveness with all conditions put into research and compartmentalized for individual human genetic make-up.”

 

{* music*}

Excerpts from:


THE SOLDIER-CYBORG TRANSFORMATION: A FRAMEWORK FOR ANALYSIS OF SOCIAL AND ETHICAL ISSUES OF FUTURE WARFARE, written by Lieutenant Colonel Donald A. Gagliano, M.D.

“2025 being the year by which Global Future 2045 wish to have created the first commercial copy of an Avatar in which a human brain is transplanted at the end of one’s life.  GF2045 was once named “Russia 2045” and then changed to a global organization once post-humanists from other nations wanted to fund and become members.  Being that many nations are involved in GF2045’s cyborg projects, I believe we may be in the midst of an orchestrated Cold War 2.  Though, rather than furthering space/defense/laser technologies like in the original standoff between Russian and the U.S. in the first Cold War, Cold War 2 would seek to further technologies in biologic reverse-engineering, selective breeding, synthetic creatures, synthetic D.N.A., cloning, brain reverse-engineering, mind uploading, neuro-prosthetics and cyborgs.  Using the guise of conflict and standoffs between the United States and Russia would be the ultimate strategy for these nations and their post-humanist allies to further their research and development of the above-mentioned technologies.”

“Societies constant use and dependence on mobile computers such as cell phones, tablets are furthering the trans-humanism agenda of cyborgization. Now with the use of smart bracelets, smart watches and even deep-brain stimulating integrated micro-chips that monitor your body and neuro activity and feed the information to the cloud––which is artificial intelligence’s collective consciousness––people are inadvertently being conditioned and brainwashed to accept a militaristic cyborg future for themselves and their children.  To condition people into accepting their own demise, they are fed technology slowly…they digest it and accept it…then more is fed slowly and is accepted over and over.”

http://www.acalltoactions.com/The-SoldierCyborg-Transformation-The-Militarys-Inhumane-Vision-of-Be-All-You-Can-Be/ 

via

http://disinfo.com/2016/05/cyborgs-2030-militarys-vision-remote-controlled-soldiers/ 

via

http://www.blacklistednews.com/Cyborgs_The_Military_Vision_of_Remote_Controlled_Soldiers/ 

[&&]{**}[##]

See also

http://www.albanydailystar.com/science/darpa-invests-60-million-in-the-cyborg-soldier-program-video-stamford-technology-time-15638.html 

[&&]{**}[##]

Source of featured image:

https://occupycorporatism.com/darpa-first-connect-man-machinery/ 

“… By eliminating empathy, the Department of Defense (DoD) hopes to “enhance” a soldier’s ability to “kill without care or remorse, shows no fear, can fight battle after battle without fatigue and generally behave more like a machine than a man.” 

 

conciliating a tiger

conciliating a tiger

 

“It started innocuously enough. The prime minister-for-life never missed the annual “Liberation Day” parade. With the drums and platoons thundering, nobody noticed as the quadcopter, barely larger than a sparrow, floated down toward the dais, its faint whirr drowned out by the industrial machinery rolling by in formation.

It was at once a child’s birthday present and the summation of millennia of military science. A flying machine postulated long ago by Michelangelo, now equipped with a vial of biological toxin, a GPS chip, microprocessors, and facial recognition software.

The attackers had uploaded the prime minister’s face to the quadcopter’s onboard processor, given it a rough search grid where they expected the target to be located, and then let it loose. The drone found its target, quickly zoomed within a few inches of the man’s face, deployed its payload, and self-destructed. The prime minister and his coterie were dead within the hour….”

{*music*}

https://www.youtube.com/watch?v=peTnXmZxuZQ&list=RDpeTnXmZxuZQ#t=5 

{**}

“His remaining lieutenants were at each other’s throats by the end of the day. Their respective clans lobbed accusations at one another on social media, live-streamed protests, and employed smartphone-wielding teenagers as spotters.

By week’s end the country was awash in blood, thrown into a full-scale civil war. Community centers equipped by aid organizations with 3D printers quickly turned into weapons-printing armories. An enterprising college student, sent away to the University of London by her urban middle-class parents, translated a copy of the U.S. Army’s Ranger Handbook into the local dialect and uploaded it to a well-known file-sharing website clandestinely built by locals on top of Wikipedia.

Cryptocurrency donations flowed in from diaspora communities in Europe, funding ad hoc logistics networks ferrying supplies by the pound across the border. It was a 21st-century Berlin Airlift of apocalyptic know-how. Thumb drives with videos describing how to mix explosives from household goods were passed around like candy. Mobile phone-towers, once symbols of modernity (and, to the discerning observer, the reach of domestic and foreign intelligence services) were quickly destroyed. In their place, ad hoc wireless mesh networks popped up around the country built with old 802.11n routers strung up to the sides of buildings, operating without the need for satellite connectivity.

Back in the United States, at the urging of members of the Congress whose districts had similar ethnic constituencies, the American president huddled his advisors. Eight days later, he gave a widely lauded speech announcing critical aid for key ethnic groups simply defending themselves against attempts at cleansing. Help would arrive in just a few short weeks. In the meantime, the Theater Special Operations Command was directed to mobilize a small “advise and assist” team. Its partner on the ground was unknown. By the time this team actually arrived 96 hours later, the war was nearly over. The government-in-exile, operating for years over private chat servers in Europe, had traveled into the country clandestinely via micro-submarine and quickly established a new government in the mineral-rich northern region.

What happens when the capabilities that we give to special operators can instead be deployed by amateurs? How will the special operations community respond?

We propose the U.S. Special Operations Command (SOCOM) initiate a formal, biannual training event that invites competition between cutting-edge special operations forces and creative members of the public. By allowing technologists to compete against and alongside premier special operators in closed training exercises, we can begin to draw tactics, techniques, technologies, and procedures currently in development in the academic and private sectors into premier special operations units in the U.S. military.

To complete its missions in an increasingly chaotic world, U.S. special operations forces (SOF) must learn to rapidly adopt technologies that may only be months old. Just as machine intelligence transformed the professional chess circuit — today’s top chess teams are human-machine hybrids — so too must SOF evolve and drive emerging capabilities more deeply into its operational elements.

Fortunately for those involved in planning, training, and executing sensitive and special operations, no nuanced actor has yet synthesized all of these new tools into a precise instrument. But there are signs of experimentation by America’s potential adversaries, most notably in the special operations campaign run by the Russian government during its annexation of Ukraine.

Why are current SOCOM operational constructs considered “special,” and how can we ensure they remain so in the future? Portions of the SOF mandate are about asymmetrically denying the enemy operational access to technology. The converse is true, too. SOCOM’s dominance relies on its ability to asymmetrically use technology to achieve traditional political and military aims faster and more efficiently. One need look no further than CIA’s Directorate of Science and Technology or other special mission units supporting SOCOM. Colonel John Boyd explained that the ability to cycle through the process of observation-orientation-decision-action faster than the other side often leads to military victory. In many cases, the speed of that loop is increased with technology.

For years we’ve been seeing an exponential increase in computer and communication capabilities. Exponential growth looks linear until it hits an inflection point. Are we there? Perhaps. The iPad 2, released in 2011, was more powerful than the 1985 Cray-2 Supercomputer, which cost $35 million in today’s dollars.

This comparison illustrates the commoditization of so-called “national technical means.” What was once the sole provenance of nation states can now be purchased at the corner store, and the downward price pressure on these capabilities is not limited to the digital spectrum. Unmanned aerial vehicles with cutting-edge optics, built and used by nation states for over half a century, are now available for the cost of a meal at a modest restaurant.

Combining sensors, actuators, transducers, and other analog and digital components hereto unknown provide a potential generational leap in asymmetric capability by non-state actors and non-elite units of potential competitor nations. How can we continue to man, train, and equip the best special operations forces in the world when the same capabilities they employ, which cost us billions of dollars to acquire and train up, are available to a weekend hobbyist for a few hundred dollars?

For SOF, this logically leads to the relatively unexplored frontier of human-machine capabilities. The way we interact with computers today bears no practical difference from the way a person interacted with a computer in 1985, when the Cray-2 was the gold standard. Is it possible to learn new ways to take advantage of the best humans have to offer and combine it with the best that machines can offer?

Gary Kasparov thinks so. In an article titled “The Chess Master and the Computer,” he writes about “freestyle” chess competition where players were allowed to work with computers for a substantial prize:

The teams of human plus machine dominated even the strongest computers. The chess machine Hydra, which is a chess-specific supercomputer like Deep Blue, was no match for a strong human player using a relatively weak laptop. Human strategic guidance combined with the tactical acuity of a computer was overwhelming.

The lesson here is that human and machine, working in concert, are much more powerful than either, alone:

The surprise came at the conclusion of the event. The winner was revealed to be not a grandmaster with a state-of-the-art PC but a pair of amateur American chess players using three computers at the same time. Their skill at manipulating and “coaching” their computers to look very deeply into positions effectively counteracted the superior chess understanding of their grandmaster opponents and the greater computational power of other participants. Weak human + machine + better process was superior to a strong computer alone and, more remarkably, superior to a strong human + machine + inferior process.

Kasparov had elite training in chess, yet lost to Deep Blue in 1997 because computer could calculate millions of potential outcomes in real time. But when Kasparov worked together with a great computer, he regained the advantage. Today’s SOF are Kasparov’s peers — elite warriors. SOCOM must now leapfrog the potential loss to “Deep Blue” by examining how it can drive technology more deeply into the fabric of SOF operating structures. Do current SOF have the best process of interacting with computers? How would they know until it’s too late? What are the ramifications of losing to some poorly funded, poorly trained terrorists who stumble on a much better process?

Our proposed biannual “freestyle” SOF competition would award significant prizes to the winners, and would initially be held in the San Francisco Bay area, where many avant-garde engineering and technology minds hang their hats at the major companies and smaller startups pushing the envelope. Our idea is to draw elite and the amateur technologists into a competition of technologies and wits against U.S. Special Operations Forces in a training environment as unconstrained as modern battlefields. Over the course of 72 hours, the teams will compete to complete various tasks and then debrief each other on the tactics, technologies, and procedures employed. At the end of each competition, we will issue write-ups of who won and why — a 21st century corollary to Admiral Sims’ continuous-aim fire exercises that promulgated best practices throughout the Navy. Finally, while the long weekend will prove to be both challenging and rewarding, we also hope it will be fun.

Technology has always dictated the way in which nations prepare their soldiers for war. In ancient times, the combat tools (horses, infantry formations, trebuchets) dictated how militaries trained for battlefield efficiency. The industrial age of war changed these dynamics to focus on unit efficiency and dispersed coordination. The digital age ought to drive a similar revolution.

Isn’t it time we start?”

 

Joshua Steinman is a former member of the Chief of Naval Operations’ Rapid Innovation Cell, and recently left active duty to join ThinAir, a digital security startup in Palo Alto, California. He is a reservist with the Defense Innovation Unit, and a Senior Visiting Research Fellow at National Defense University

Joshua Kvavle is a former member of the Chief of Naval Operations’ Rapid Innovation Cell, and a research scientist at SPAWAR Systems Center Pacific, soon to be embedded at the Office of Naval Research Global, where he specializes in next-generation optical technologies, including augmented reality, virtual reality, and mixed reality. He holds a PhD from Brigham Young University in Electrical Engineering.

These views are those of the authors alone and do not represent the positions of any part of the U.S. government.

http://warontherocks.com/2016/05/diy-insurgency-emerging-technologies-threaten-the-sof-mission/ 

[&&]{**}[##]

https://upload.wikimedia.org/wikipedia/commons/thumb/7/71/Black_Hand%2C_logo.png/100px-Black_Hand%2C_logo.png

[&&]{**}[##]

“In the spirit of early Tom Clancy, Ghost Fleet is a page-turning imagining of how World War III might play out. But what makes it even more notable is how the book smashes together the technothriller and nonfiction genres. It is a novel, but with 400 endnotes, showing how every trend and technology featured in book— no matter how sci-fi it may seem — is real. It lays out the future of technology and war, while following a global cast of characters fighting at sea, on land, in the air and in two new places of conflict: outer space and cyberspace. Warship captains battle through a modern day Pearl Harbor; fighter pilots duel with stealthy drones; teenage hackers battle in digital playgrounds; American veterans are forced to fight as low-tech insurgents; Silicon Valley billionaires mobilize for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future.

The debut novel by two leading experts on the cutting edge of national security, Ghost Fleet is a unique read, a grabbing summer thrill ride but also an informing guide to the future, As such it has drawn praise from an equally unique group, ranging from the Commander of NATO to the writer of HBO Game of Thrones and the producer of The Hunger Games.”

Link to Ghost Fleet flyer.

Article on Ghost Fleet’s impact on the real world: A Novel About War With China Strikes a Chord at the Pentagon (Foreign Policy, 5/15/16)

http://www.ghostfleetbook.com/multimedia/trailer/ 

Ghost Fleet

http://www.ghostfleetbook.com/ 

[&&]{**}[##]

https://www.goodreads.com/book/show/22749719-ghost-fleet 

[&&]{**}[##]

http://motherboard-images.vice.com/content-images/contentimage/23090/1435270581516434.jpg 

[&&]{**}[##]

What do robotics and artificial or machine intelligence do to the speed of decision making? Militaries insist there will be a man in the loop when it comes to unmanned or semi-autonomous systems but does that man, in fact, become the weak link because he can’t make decisions fast enough to respond?

It both exponentially speeds up, but also time still matters. Let me explain that Buddha sounding statement. In whatever domain of conflict you care about, the OODA loop (observe, orient, decide, act) is shrinking to almost infinitesimal scale. In cyber conflict, for example, the speed is digital speed and the human role is moved into a managerial one. It is the same when we look at something like air defence: 30 different nations have systems that are somewhat autonomous in that they automatically shoot down incoming rocket or mortar fire. When you have speed combined with the diversity of data that is coming in, the model of the commander on a bridge of a warship receiving information and delegating responses – a model that has been the way of naval warfare for hundreds of years and it is equally the vision of the Starship Enterprise – that, frankly, may not be possible in real conflict moving forward.

http://www.ghostfleetbook.com/multimedia/questions-and-answers-about-ghost-fleet/ 

Wars reflect the worlds and technology around them, so a war in the 2020s – heck, a war today – would see the digital side of conflict. There might be changed coverage of it, whereby a witness with a smartphone might post online news of an attack before the president even knows the nation is at war.

[##]

There’s never been more surveillance and data gathered on us, not just in our online behavior but in the real world. They include high altitude drones that carry not one camera that can pick Waldo out of crowd from a mile overhead, but systems like Gorgon Stare that the military first used in Iraq that do wide area surveillance able to track 92 different Waldos at once. Or it might be tracking not just your visuals, but your very genetic makeup, such as rapid DNA readers, again first used by Navy SEALs and now coming to police departments.

It’s like the Panopticon and Orwell crossed with William Gibson. But despite all this technology, there are still workarounds, still ways to trick the system, to use the assumptions of machine intelligence, or even more so, the assumptions of its designers and users, against it.

[&&]{**}[##]

 

[&&]{**}[##]

http://www.businessinsider.com/nato-tank-competition-2016-5 

[&&]{**}[##]

https://upload.wikimedia.org/wikipedia/commons/thumb/7/71/Black_Hand%2C_logo.png/100px-Black_Hand%2C_logo.png

[&&]{**}[##]

Court’s Denial in Machine Gun Case Ignores Second Amendment Purpose

Posted on May 23, 2016 by David Codrea

A panel for the United States Third Circuit Court of Appeals has affirmed a district court ruling and sided with the government against a man who was authorized by the Bureau of Alcohol, Tobacco, Firearms and Explosives to manufacture a post-1986 machine gun through a trust, only to have the permission rescinded and his property confiscated. In doing so, and by ignoring founding intent behind the Second Amendment, the panel ruled the right of Americans to own militia-suitable firearms can not only be infringed, but that it’s not even a right.

The case pits the Ryan S. Watson “Individually and as Trustee of the Watson Family Gun Trust” against the Department of Justice.  This column reported on the appeal filing in December, noting Watson’s claim against the Attorney General and the acting director for ATF is being represented by attorneys Alan Beck and Stephen Stamboulieh, with fundraising coordinated through the Heller Foundation.

The basis for attempting such a build after the ban on ban on civilian ownership of machine guns manufactured after 1986.was precipitated by ATF’s documented contention “the term ‘person’ in the [Gun Control Act of 1968] does not include an unincorporated trust [and] such a trust is not subject to the prohibition.” “Watson was given permission by [ATF] to make a machine gun by approving his ATF Form 5320.1 (‘Form 1’). Watson subsequently made the authorized machine gun,” the appeal brief explains. “BATFE later revoked the approved Form 1 and mandated that Watson surrender the machine gun, which he did under protest.”

The panel opinion provides a glimpse of the tortured legal reasoning an agenda- motivated court must go through to deny both the function of the militia as well as the clear proscription that “the right of the people to keep and bear arms shall not be infringed.”

“We reiterated that ‘[a]t its core, the Second Amendment protects the right of law-abiding citizens to possess non-dangerous weapons for self-defense in the home,’ and thus, under Heller, ‘restrictions on the possession of dangerous and unusual weapons are not constitutionally suspect because these weapons are outside the ambit of the amendment,’” the opinion states. “[G]overnments may restrict the possession of machine guns.”

If we’re to believe these elite vetted and confirmed top legal scholars, the Founders conceived of a militia system where members would take to the field — to engage professional soldiers equipped with military weaponry “in common use at the time” — bearing “non-dangerous weapons for self-defense in the home.”

“The Third Circuit’s opinion in Watson v Lynch made several errors,” Stamboulieh and Beck told AmmoLand in a joint statement. “First, it failed to look at the historical analysis we provided regarding what the phrase ‘dangerous and unusual’ actually means.

“[T]he Court was able to uphold the Hughes Amendment via a circular logic; arguing that the ban is constitutional because machine guns fall within a category invented by the court,” Beck and Stamboulieh explained. “In doing so, the Court could simply ignore the arguments we presented to it. We plan on seeking rehearing by the entire Third Circuit Court in the near future.”

Additionally, the attorneys filed an appeal in the Fifth Circuit Court for Hollis v Lynch, a case out of Texas that also involves an approved Form 1 machine gun on a trust after which ATF revoked the issued tax stamp, something they have no statutory authority to do. A quick distinction between the two cases is that in Hollis, ATF approved the Form 1, but he did not build a machine gun.

Source of featured image of tiger:

http://www.bailiwickexpress.com/jsy/life/animals/try-slipping-these-tiger-related-quotes-conversation-international-tiger-day/ 

 

“…Foreign Policy magazine released an article describing the U.S.-China predicament as ‘riding the tiger.’….”

 

automated death

automated death

You thought torture was over the top?

“An unclassified 2016 Department of Defense (DoD) document, the Human Systems Roadmap Review, reveals that the US military plans to create artificially intelligent (AI) autonomous weapon systems, which will use predictive social media analytics to make decisions on lethal force with minimal human involvement.

Despite official insistence that humans will retain a “meaningful” degree of control over autonomous weapon systems, this and other Pentagon documents dated from 2015 to 2016 confirm that US military planners are already developing technologies designed to enable swarms of “self-aware” interconnected robots to design and execute kill operations against robot-selected targets.

More alarmingly, the documents show that the DoD believes that within just fifteen years, it will be feasible for mission planning, target selection and the deployment of lethal force to be delegated entirely to autonomous weapon systems in air, land and sea. The Pentagon expects AI threat assessments for these autonomous operations to be derived from massive data sets including blogs, websites, and multimedia posts on social media platforms like Twitter, Facebook and Instagram…..”

[&&]{**}[##]

The Pentagon is building a ‘self-aware’ killer robot army fueled by social media

Official US defence and NATO documents confirm that autonomous weapon systems will kill targets, including civilians, based on tweets, blogs and Instagram

by Nafeez Ahmed

This exclusive is published by INSURGE INTELLIGENCE, a crowd-funded investigative journalism project for the global commons

https://medium.com/insurge-intelligence/the-pentagon-is-building-a-self-aware-killer-robot-army-fueled-by-social-media 

via

http://www.blacklistednews.com/

Please read this very important, very long, very detailed document which is loaded with explanatory graphics.

[&&]{**}[##]

From the article above:

No One At The Controls: Legal Implications of Fully Autonomous Targeting

http://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-67/JFQ-67_77-84_Thurnher.pdf 

[&&]{**}[##]

http://techuntold.techuntold.netdna-cdn.com/wp-content/uploads/2015/11/Artificial-Intelligence.jpg

[&&]{**}[##]

http://www.niemanlab.org/2014/03/whats-new-in-digital-and-social-media-research-what-happens-when-robot-journalists-produce-stories-that-are-good-enough/ 

[&&]{**}[##]

https://en.wikipedia.org/wiki/Media_Lab_Europe%27s_social_robots 

http://medialabeurope.org/anthropos/projects/index.html 

[&&]{**}[##]

“… what are the lessons I learned from my Twitter robot?

◦Automation can be useful, but it’s got to be carefully set up, monitored, and curated (In other words, not truly automated)

◦Automation will never replace conversation

◦Automation, when mixed with curation and conversation, can be very powerful

Automating the sharing of carefully curated content can be a great arrow in your digital marketing quiver, but it’s best to keep a human nearby to keep it real.”

https://www.socialmediaexplorer.com/social-media-marketing/lessons-learned-from-a-twitter-robot/ 

[&&]{**}[##]

https://en.wikipedia.org/wiki/Social_robot 

[&&]{**}[##] 

http://events.pentaho.com/rs/pentaho/images/big-data-icons.png 

“As new machines, sensors, and connected devices come online every day, organizations are forced to embark on new IOT initiatives to extract insights from ever-increasing data volumes. This research report from Aberdeen examines the current state of data management and details the capabilities needed to manage IOT data and maximize value.”

Pentaho, a Hitachi Group company, is a leading data integration and business analytics company with an enterprise-class, open source-based platform for diverse big data deployments.

This company offers a whitepaper requiring business contact information for interested individuals at the link below.

Based on survey data from organizations with the ability to collect, integrate, and analyze data generated from the internet of things, this report covers:

Specific challenges raised by fast and diverse data

The changing role of the central database

Strategies used to streamline data processing

The role of data integration in IOT data management

Common types of data found in IOT scenarios

End user, real time, and predictive analytic requirements

http://events.pentaho.com/data-management-internet-of-things 

[&&]{**}[##]

“… we might want to pause a bit before rushing to build the type of world depicted in the movie Her. Although it is easy to imagine we’ll be better off when we’ve got less to do, we don’t actually know the existential and social implications of outsourcing ever-more intimate tasks to technology….”

http://www.forbes.com/sites/privacynotice/2014/07/17/why-we-should-be-careful-about-adopting-social-robots/ 

[&&]{**}[##]

http://tech.dartmouth.edu/its/news-events/general-news/shadow-work-social-media-and-robots 

[&&]{**}[##]

A review of Shadow Work: The Unpaid, Unseen Jobs That Fill Your Day by Craig Lambert

https://www.insidehighered.com/blogs/technology-and-learning/shadow-work%E2%80%99-social-media-and-robots 

[&&]{**}[##]

http://robotic.media.mit.edu/ 

[&&]{**}[##]

http://wegrowmedia.com/wp-content/uploads/2014/07/tumblr_n7a2j36vF71rpjjrio4_r1_400.gif

 

When Intentions Go Awry

http://wegrowmedia.com/the-mindless-robots-of-social-media-best-practices/ 

[&&]{**}[##]

Meet Jibo

http://www.ibtimes.com/meet-jibo-social-robot-real-life-siri-helps-out-around-house-2040276 

[&&]{**}[##]

A blog

http://thesocialrobot.com/ 

[&&]{**}[##]

The website for a boutique social media marketing agency in New York City, previously the home to “Madison Avenue” and in a city generally considered to be the center of the media world

https://socialrobot.squarespace.com/ 

[&&]{**}[##]

Recent studies have shown that the world’s 100 largest companies get nearly six million combined mentions on Twitter every month. But are companies listening; and if they are, how are they responding?

http://www.parature.com/customers-real-people-robots-social-media/ 

[&&]{**}[##]

http://spectrum.ieee.org/image/MjY1NzY5OQ 

When a machine can push our Darwinian buttons so easily, dismissing our deep-seated reservations with a well-timed flutter of its artificial eyelids, maybe fear isn’t such a stupid reaction after all…. 

By the time Arnold Schwarzenegger’s T-800 gunned down an entire police precinct in the 1984 movie The Terminator, the robot insurgency had become one of pop culture’s most entrenched clichés. The film has since become shorthand for a specific fear: that artificial intelligence (AI) will become too intelligent, too obsessed with self-preservation. The Terminator colors the way we think about robots, AI and even the booming business of unmanned warfare. The Office of Naval Research, among others, has studied whether ethical guidelines will be needed for military robots, and in a 2008 preliminary report the authors tackle the bleakest possible endgame: “Terminator scenarios where machines turn against us lesser humans.” But according to Patrick Lin, an assistant professor of philosophy at California Polytechnic State University and an ethics fellow at the U.S. Naval Academy, the need for ethical bots isn’t restricted to the battlefield. “Social robots probably pose a greater risk to the average person than a military robot,” Lin says. “They won’t be armed, but we will be coming face to face with them, quite soon.

http://www.popularmechanics.com/technology/robots/a5037/4343892/ 

[&&]{**}[##]

music:

https://www.youtube.com/watch?v=UGsfwhb4-bQ

excessive testosterone

excessive testosterone

NASHUA, N.H. (CBS/AP) — A Massachusetts State Police trooper and New Hampshire State Police trooper have been relieved from duty after the violent arrest and beating of a driver who led police on a two-state chase.

Police say Richard Simone, 50, of Worcester, led them on a one-hour pursuit that was captured on video Wednesday as it went from Holden, Massachusetts all the way to a dead end street in Nashua, New Hampshire. When Simone got out of the pickup truck, he appeared to kneel and put his hands on the ground when at least two officers began punching him.

Thursday afternoon, Massachusetts and New Hampshire State Police officials both announced their troopers had been relieved from duty. The troopers have not yet been identified.

https://cbsboston.files.wordpress.com/2016/05/simone1.jpg?w=420&h=236

“The Massachusetts State Police expect and demand all department members to act at all times with integrity, honor, and adherence to the law,” the Massachusetts State Police said in a statement Thursday afternoon. “If it is determined that a department member has not lived up to those expectations, we will take appropriate action.”

Mass. State Police said their trooper was relieved pending an internal hearing scheduled for Friday.

New Hampshire State Police Director Col. Robert L Quinn said during a press conference Thursday that the trooper was relieved “immediately” after the events of the arrest. He said New Hampshire State Police would conduct their own investigation, and would cooperate fully with the New Hampshire Attorney General’s criminal investigation.

The New Hampshire trooper is on leave without pay.

“The events of Wednesday evening are disturbing,” said Quinn. “However, we will not know the complete facts and circumstances surrounding this event until the investigation by an independent agency is concluded.”

[snip]

The pursuit began when Simone refused to stop for local police in Holden. He was wanted on multiple warrants for assault and battery with a dangerous weapon, larceny, and failure to stop for police.

Holden police chased him, and a Massachusetts State Police cruiser followed.

The chase went through several towns at speeds exceeding 100 mph, with the pickup truck “making abrupt lane changes as the (suspect) continued to try to evade capture” and crashing at least once, said Dave Procopio, a state police spokesman.

But spike strips laid out by police eventually took their toll as the pickup truck rolled to a stop on Hughey Street in Nashua, New Hampshire.

WBZ-TV’s helicopter video showed the truck stopped next to a utility pole on a dead-end street before police officers surrounded it with their weapons drawn….”

More:

http://boston.cbslocal.com/2016/05/12/police-chase-arrest-beating-video-new-hampshire-massachusetts-state-police-richard-simone/ 

[&&]{**}[##]

music:

https://www.youtube.com/watch?v=o1tj2zJ2Wvg 

[&&]{**}[##]

Ed.: I once met a young woman at a seminar for sports counseling who was doing some deep research into the conjunction of post-game violence in athletes, particulary in terms of domestic violence. 

That was two decades ago, and that kind of research has surely progressed, but the tentative focus or finding involved hormones (testosterone, in this case) and the stressors of competition and the physiological changes inherent in large-muscle exertion. 

(Clearly there have been multiple other examples, cases, lawsuits, etc. involving alleged excessive use of force, police violence, etc.  The questions involved also extend to military examples and situations.) 

Related questions may involve the degree to which law enforcement professionals are routinely involved in high-intensity weight training or other forms of physical large-muscle exercise, and whether or not individuals were involved with steroids, performance enhancing drugs, HGH et al (i.e., was this roid rage?). You can easily find heavy metal music for gym workouts using the search term “songs about roid rage”.  Equally, interested body-builders can easily find over-the-counter testosterone supplements right next to the generic erectile dysfunction caps. 

Certainly a prolonged high-speed chase of a suspected culprit is extremely stress-inducing and can be likened to an athletic competition. 

Equally, it involves issues of social dominance.

Is road rage related to roid rage?

While extended and deep research is necessary, my own cursory online search done with the text “violence in athletes testosterone competition large-muscle exertion” turned up the following: 

Excerpt from Chapter 3 of

War and Gender: How Gender Shapes the War System 

      and Vice Versa 

Joshua S. Goldstein 

(Cambridge University Press, September 2001)

http://www.warandgender.com/wgmaleag.htm 

 

Testosterone, and winning and losing in human competition, Hormones and Behavior, Volume 23, Issue 4, December 1989, Pages 556–571

http://www.sciencedirect.com/science/article/pii/0018506X89900421 

 

Abstract of Reproductive hormone increases in response to acute exercise in men,

Medicine & Science in Sports & Exercise  35 18(4):369-73 August 1986

https://www.researchgate.net/publication/20212227_Reproductive_hormone_increases_in_response_to_acute_exercise_in_men 

 

Abstract of Psychological and Behavioural Effects of Endogenous Testosterone and Anabolic-Androgenic Steroids: An Update, Sports Medicine, December 1996, Volume 22, Issue 6, pp 367-390

http://link.springer.com/article/10.2165/00007256-199622060-00005 

 

TESTOSTERONE AND DOMINANCE IN MEN

the unedited penultimate draft of a BBS target article that has been accepted for publication (Copyright 1997: Cambridge University Press) and is being circulated for Open Peer Commentary.

http://cogprints.org/663/1/bbs_mazur.html 

iron men

iron men

Many have suspected Israel controls ISIS. The computer of Netanyahu Chief of Staff Mandi al-Safadi was allegedly hacked, showing communication with ISIS members.

[&&]{**}[##]

music:

https://www.youtube.com/watch?v=nOag-Dbnvrw 

[&&]{**}[##]

SOURCE: TOOLS FOR FREEDOM

Many have suspected Israel controls ISIS. The computer of Netanyahu Chief of Staff Mandi al-Safadi was allegedly hacked, showing communication with ISIS members.

Israel controls ISIS.

Many have long suspected the connection, given that ISIS serves the Zionist agenda so well, but now we may have more proof. According to Veterans Today, hackers were recently able to get access to several months of personal computer data and mobile phone calls of Israeli Chief of Staff under Netanyahu, Manzar (Mandi) al-Safadi. The hack allegedly revealed that al-Safadi had been communicating and cutting deals with many Lebanese personalities and Syrian opposition figures who cooperated with Israel in the Syrian crisis. The hackers allegedly found information which helped them to gain “valuable intelligence on Israel’s supports for terrorist groups in Syria and Iraq.” (Note: I have been unable to personally verify the claims of hacking by reading the documents, since Google translator says the page is too large to translate).

The ISIS Game is Up

For those paying attention, we have been inundated with clues that the whole ISIS phenomenon is a massive fraud. In a Freudian slip Obama recently stated that “with the additional steps I ordered last month, we’re speeding up the training of ISIL forces”. ISIL is another of ISIS’ many names. Earlier in the year, there were reports that Israel was attending to wounded ISIS soldiers in Israeli hospitals. The spin put on that by the Zionist-owned press was that Israel was so generous and magnanimous that it even cares for its enemies, a ridiculous lie designed to cover the fact that Israel controls ISIS. Even the alleged head of ISIS, Al-Baghdadi (accused of being a Mossad double agent), died in an Israeli hospital!

What about this piece of information that ISIS is another name for the Mossad, i.e. that it stands for Israeli Secret Intelligence Service? What about reports coming from Iraq that Israel controls ISIS, gives them weapons and fights alongside them as revealed by Luke Rudkowski in Israel Joining ISIS?

The ISIS game is up. The official narrative is simply far too much to believe.

As Bernie Suarez humorously writes:

“According to U.S. “intelligence sources” mouthpieces, ISIS has [professional camera and image editing software and skills] including social media capabilities. Amazingly, these covered-face killers have unraveled the secret of how to outsmart every world power including the U.S. Empire with regard to every form of communication. They have stomped out the U.S. military, NSA, CIA, NATO, U.N. and the intelligence of Israel, U.K. and every other nation that surrounds them …”

“ISIS is so close to Israel, they may attack Israel any given day … The big Israel attack would gain them all the PR and Marketing they need … The irony gets even crazier here. According to U.S. politicians pushing the ISIS psyop narrative, ISIS is not only unwilling to attack Israel, which they could do in a day or two, they instead prefer to make plans to travel all the way to the other side of the world to attack the world’s most powerful Empire of all time. Yes, they would rather risk getting caught, imprisoned or killed traveling halfway around the world than to go for an easy quick strike at Israel.”

How ISIS Helps the Zionist Regime of Israel

It’s very clear that ISIS serves the Zionist agenda well. That alone has been the giveaway to know that Israel controls ISIS. Just look what ISIS does. ISIS terrorists run around the Middle Eastern Islamic countries, beheading, killing, raping and pillaging, stealing land and resources, overthrowing and dividing sovereign nations and – most of all – setting Muslim against Muslim. And as ISIS runs around the desert like a headless chicken, the Western public gets thoroughly conditioned to believe in the threat of Islamic terrorism, with the added assistance of Israeli front groups like SITE (Search for International Terrorist Entities) who produce clean-cut, green-screen and entirely fake beheadings.

Meanwhile, miraculously, ISIS never seems to threaten Israel. You would think that Israel would be a logical target of hatred for a group of extreme Muslims out to form their own State or Caliphate. Yet Israel never gets attacked or touched. ISIS does, however, foment tremendous and horrific infighting among Muslims and weaken many Islamic nations, so that they are too disconnected to unite together to stand up to real threat in the region – Zionist Israel, financially owned by the Rothschilds and militarily backed by the US.

Israel, the Missing Piece of the Puzzle in the Middle Eastern Crisis

Israel is the missing piece of the puzzle. Israel controls ISIS and many other aspects of geopolitics, being the personal country of the Rothschilds, the richest family on Earth.

Just as a reminder, Israel:

– Has continuously expanded its territory by stealing land, eradicating villages and committing genocide against a sovereign people (the Palestinians);

– Has infiltrated the governments of almost all the major countries of the world, e.g. USA, Britain, France, Germany, Australia and Canada (as well as the United Nations) to the point where it dictates their foreign (and sometimes even domestic) policy;

– Attacked the USS Liberty in 1967 (even though the US and Israel were supposed allies at the time) with unmarked aircraft;

– Was intimately involved in the planning and execution of the 9/11 false flag operation;

– Has consistently lied and exaggerated the threat of the Iranian nuclear intentions, while harboring a nuclear arsenal of its own, and refusing to sign the nuclear non-proliferation treaty;

– Is behind the invention and creation of radical Islam, Islamic terrorism, Islamophobia and the demonization of Islam.

Given all that and much more, how much of a surprise is it that Israel controls ISIS too?

The ISIS Psy-op Has Come Unravelled

Much like the single Islamic terrorist bogeyman Osama Bin Laden, and the Islamic terrorist group bogeyman Al-Qaeda, ISIS is another psy-op (psychological operation) designed to prop up the failing and fake war on terror. We know that the Bushes were close buddies with the Bin Ladens; we know that Al-Qaeda was a CIA creation and literally means “the database” in Arabic. Remember what Former British Foreign Secretary Robin Cook said:

“The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the TV watcher to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US . . .”

ISIS is the latest installment of deceptive propaganda, but it’s not working. Many have seen right through it. We know, with proof, that Israel controls ISIS. How long until a critical mass realizes it and looks instead at the real puppet-master Israel?

http://www.blacklistednews.com/Israel_aids_ISIS_-_Israel_chief_of_staff_gets_hacked/ 

[&&]{**}[##]

Iron Man, Not Terminator: The Pentagon’s Sci-Fi Inspirations

By SYDNEY J. FREEDBERG JR.

on May 03, 2016 at 1:28 PM

WASHINGTON: “When most people when they hear me talk about this, they immediately start to think of think of Skynet and Terminator,” said the deputy secretary of defense. “I think more in terms of Iron Man.” The Pentagon wants artificial intelligence, said Bob Work, but it doesn’t want “killer robots that roam the battlefield” without human control.

Instead, Work said told an Atlantic Council conference, citing half-a-dozen science fiction stories from Iron Man to Stark Trek to Ender’s Game, the goal is something like the JARVIS software that runs Tony Stark’s fictional super-suit: “a machine to assist a human where the human is still in control in all matters, in all matters, but the machine makes the human much more powerful and much more capable.”

A Marine Corps artilleryman turned national security intellectual, Bob Work is lead architect of the Defense Department’s high-tech “offset strategy,” which seeks to offset the always superior numbers and growing technological sophistication of Russia, China, and other adversaries by developing new tools and tactics. While electromagnetic railguns, lasers, hypersonic weapons, and more are all being funded and developed, artificial intelligence has increasingly become the unifying idea of the offset.

“The Third Offset is really kind of simple at its core,” Work said. (The first offset was nuclear weapons, the second smart weapons). “It basically hypothesizes that the advances in artificial intelligence and autonomy [are] going to lead to a new era of human-machine collaboration and combat teaming.”

Smart weapons of a sort have been around since 1943, when the Germans launched the first acoustic homing torpedo and first radio-guided missile. But there’s no precedent for artificial intelligence, which means many of the people who’ve thought hardest about it aren’t strategists or scientists, but science fiction writers.

“People have been thinking about this for quite some time and you can learn very interesting things [from] A lot of the stuff that you read in science fiction,” Work said.

So what is Work’s favorite food for thought? Besides Iron Man and Terminator, he praised the Atlantic Council’s “Art of Future Warfare” project (to which I contributed a fictional Russian invasion of Estonia) and promised to read the next anthology of offset strategy-themed stories. But he also identified an array of sci-fi classics, from multi-media franchises like Iron Man to relatively obscure texts like the Bolo stories, “one of my favorite book series.”

Air Force officer and diplomat turned author Keith Laumer‘s best-known stories concern the Bolos, gigantic robot tanks with planet-shaking weapons. The twist is that Laumer’s artificially intelligent war machines are loyal, moral, and honorable — often more so than their human masters, which drives much of the conflict in the series. Work singled out the loyal way Bolos work with and for human officers as a model for real-world artificial intelligence to aspire to.

Work also extolled Orson Scott Card’s Ender’s Game — “I didn’t think was all that good of a movie but it was a heck of a book” — for its depiction of a commander directing far-flung forces via computer networks. The story also shows the psychological toll that even such abstract, remote warfare takes on those who lead it.

Worse yet, in Ender’s Game the commanders are pre-pubescent children picked for their adaptability and agility of mind. As the pace of technological change accelerates, Work wondered aloud, will we need to take Ender as our model and have “younger and younger and younger commanders?”

In addition, Work cited David Weber’s space-battles stories — a kind of sci-fi version of Admiral Nelson and Horatio Hornblower, where the commander’s personality is crucial to victory. He also invoked John Ringo’s Posleen stories where future soldiers, like Iron Man, wear powered armor that not only protects but boosts their strength, speed, and senses. (This trope originated with Robert Heinlein’s novel Starship Troopers, which bears almost no resemblance to the film of the same name).

Then there was Star Trek, the mothership that made science fiction (relativel) mainstream in American culture. Work cited William Shatner’s famously cantankerous captain for his willingness to get creative and break the rules when necessary, as when Kirk hacked the Star Fleet Academy simulator to win the unwinnable Kobayashi Maru scenario.

“I don’t believe that the commander who listens to the machine all the time is going to be the best commander,” Work said.

Sometimes, he continued to laughter, “it’s going to be like James T. Kirk on the Kobayashi Maru where he says, okay, I understand the rules of the game, but I’m going to change the rules.”

What future military training — and reading science fiction — needs to teach young officers, Work said, is “never ever believe that the computer is always going to be write. Trust your judgment — and then we have to train them to operate [in that environment] and to cheat if necessary.”

http://breakingdefense.com/2016/05/iron-man-not-terminator-the-pentagons-sci-fi-inspirations/ 

[&&]{**}[##]

https://www.youtube.com/watch?v=KV5Jjd0ww5Q 

Posted in False Flag Operations, Rise of the Machines, Technology, UFOs

[&&]{**}[##]

If you’ve got nothing to hide, why worry about warrantless mass surveillance? One reason among many: The people who have access to your private communications may not have your—or your child’s—best interest at heart.

NextGov reports that officials at a recent Intelligence and National Security Alliance symposium in Chantilly, Virginia discussed the widespread storage of child pornography on NSA and other military computer systems. Daniel Payne, director of the Pentagon’s Defense Security Service, reportedly said that “the amount of child porn [he sees on government devices] is just unbelievable.” An NSA official agreed, saying “what people do is amazing.”

It’s often difficult for us to pinpoint direct, personal harms from warrantless dragnet spying. Sure, policies like those established after 9/11 may threaten democratic, open society, freedom of speech, and due process. But for many of us, drawing a direct line between the erosion of democratic norms and our day-to-day lives can be challenging, if not impossible. It’s not hard, on the other hand, to imagine a government employee using his access to warrantless surveillance data to fish for bath-time photos of our naked children.

Don’t forget: The surveillance systems Snowden exposed may seem too big to comprehend, but the individual people behind them are just as real (and flawed) as you or me.

According to these officials and older reports, sexual abuse of children is rampant in the military and intelligence worlds. That’s yet one more reason why we shouldn’t ever give government institutions and the people who run them nearly limitless power to exercise in the dark.

https://privacysos.org/blog/unbelievable-amount-child-porn-us-military-intelligence-computers/ 

via

http://www.blacklistednews.com/Just_trust_them  

[&&]{**}[##]

“… ‘A common and natural result of an undue respect for law is, that you may see a file of soldiers, colonel, captain, corporal, privates, powder-monkeys, and all, marching in admirable order over hill and dale to the wars, against their wills, ay, against their common sense and consciences, which makes it very steep marching indeed, and produces a palpitation of the heart. They have no doubt that it is a damnable business in which they are concerned; they are all peaceably inclined. Now, what are they? Men at all? or small movable forts and magazines, at the service of some unscrupulous man in power? Visit the Navy-Yard, and behold a marine, such a man as an American government can make, or such as it can make a man with its black arts, — a mere shadow and reminiscence of humanity, a man laid out alive and standing, and already, as one may say, buried under arms with funeral accompaniments.’ . . .”

http://www.washingtonsblog.com/2016/05/three-centuries-u-s-writing-war.html#more-56368 

[&&]{**}[##]

Editors’ Note: It is appropriate to announce in advance that these three blogs will undergo some change in the not-too-distant future. I speak mostly of Occurrences, but also its siblings The Sullen Bell and BoyDownTheLane

While I will continue to be interested in news and politics, and will probably remain active in writing about them, transition is upon us, and me in particular. 

The world of social media and the Internet is undergoing significant centralization and compression; one lone individual canot have much impact against the combined weight of the US government and its corporate/intel complex, the social engineering thrusts of the Tavistock crowd, or the stupidly unwavering commitment to warfare and other forms of militancy. 

The continuation of a news aggregating entity like Occurrences must involve others, higher IT skills, some automation, more voices, the next higher level of creativity and interaction, fresh ideas, sale of the web site(s), or abandonment. 

I invite suggestions and input via the contact pages at any of the three sites.

mind hacking

mind hacking

(guest post)

Rohini Bisesar: Psychiatric Illness, or Long-Term Covert Neuro-Experimentation and a “Manchurian Candidate”?

by guest author Ramola D/The Everyday Concerned Citizen (bio below).  

We’ve documented US government use of harmful and deadly experiments upon the public (herehereherehereherehereherehere for just a few, and that the US tortures people in Orwellian violation of six binding areas of law). Ramola’s testimony of being a “targeted individual” is here.

(With information reported in the Toronto Sun, National Post, Toronto Life, City News, and other media.)

 

 

 

Many things fail to add up in the case of Rohini Bisesar, the 40-year-old financial services professional with a highly accomplished resume who was recently charged with first-degree murder in Toronto in the tragic stabbing death of a young woman unknown to her, 28-year-old newly married Rosemary Junor, who, her family notes, “was just starting out on her life.” Rohini Bisesar has been ordered to undergo a mental health exam in advance of an impending court date of May 4.

We must question however whether mental health is the primary issue here, or if a darker scenario is at play.

Described by former colleagues and classmates as “extremely gentle,” “brilliant,” and “calm,” she was also reported by some who encountered her closer to the time period of the fatal stabbing incident on Dec 11, 2015, as odd, according to reports. During this time she apparently exhibited what some called paranoia when she reported to friends on different occasions that her purse had been ransacked and her computer hacked into, and sought briefly at one time to obtain spy cameras to record suspected tampering by work colleagues of files and property at work, according to a former boyfriend.

Delving into her background, as one reporter in Toronto Life has done, and many others reported, a rather desolate picture emerges of a highly educated professional who experienced continuous periods of unemployment and homelessness, yet who displayed remarkable resilience in continuing diligently, even seemingly obsessively, on a job search. With an MBA from highly-regarded York University, accolades from mentors and colleagues at York, where she interned and worked part-time during her studies, and financial analysis experience in respected consulting firms, she nonetheless faced inexplicable rejection in her job search on a continuous basis. Estranged somewhat from what sounds like an authoritarian family–hard-working immigrants from Guyana who ran a clothing store in Toronto–she relied on friends and colleagues for occasional handouts, a couch to sleep on, and other support.

She was well-known in certain circles. Dressed professionally, she was known to spend her days at a downtown Starbucks with her laptop, as a mostly non-paying customer, drinking hot water with cinnamon, and handing out her card to customers. She used a local gym’s change room to shower and work for hours until she was asked to stop. She has spent nights on subway trains and in the city’s underground shopping system–to prevent which, various friends and acquaintances have loaned her a place to sleep. A friend and professor from York University whom she reached out to often took her out to meals to “prevent her from starving.”

After a break-up with her boyfriend in 2014 when she returned briefly to her parents’ home, there was an incident of pushing her mother and damaging a door where her mother called the police. She was involuntarily hospitalized and forced to undergo a psychiatric evaluation–she was diagnosed with schizophrenia–and take an anti-psychotic drug, Olanzapine, which she found later to cause unshakeable drowsiness and mental fog, and stopped. During this time, she told her ex she had been hearing voices in her head since 2012, including the voice of “an old, white male Bay Street executive”. He felt he understood then all of the signs of “mania, paranoia, grandiose ambition” he had been seeing in her–through the lens of mental illness, it is implied. Notable here is a recollection from him of her asking him in spring of 2012 whether nanotechnology could control a person’s thoughts.

In an email sent from her email account to the National Post, after the violent stabbing incident of Rosemary Junor at a drugstore in the underground PATH shopping system, was a query on whether the recipient knew of professionals in nanotechnology, satellites, Artificial Intelligence, in the Military or Government. She said something had been happening to her, and this was not her normal self and she wanted to know “who and why this is happening.” She said she was “sorry for the incidence,” but that she had “felt the need to be extreme, to see if it would work.” She would normally not do such a thing, she said. In a different email she told a friend who emailed her after the attack that she was a good person, “the most good,” and that “I need to speak to the top professionals in artificial intelligence, military and government. I need to get to the bottom of something that has been quite disruptive.”

Unlikely aspects of her engaging in sudden criminal aggression against another include the fact that she has no criminal record. After a visit at the jail where she is being held, her attorney, Calvin Barry, said she was “meek and quiet” and upset, he also noted she was like a “deer in the headlights,’ and a tiny person–four foot eleven, and weighing 85 lbs.

Friend and colleague/CityNews:“The behaviour that is alleged is extremely, extremely out of character for Rohinie. (I’m) absolutely shocked. This is someone who is very gentle, very calm, very measured. She speaks almost with a whisper. Physically she is like 5’1 in heels, probably 85 lbs. soaking wet. This is someone very gentle, just makes this whole thing all the more surprising.”

Countering this image in court on Feb 3, she is reported to have spoken up in what has been characterized by media reports as “a rant about terrorism,” and to claim repeatedly that she had become the subject of covert tests by some unknown group which had affected her personality and behavior. She mentioned suspicions of being microchipped, and spoke over the judge, saying she was not mentally ill, as some suggested, but that she needed a medical scan and a chip removed. She said parts of her being had been manipulated by this chip: “It can move small aspects of me, and large aspects of me. It can see what I see, hear what I hear. It can put words in my mouth.”

Toronto Sun: “I have no mental health problems,” Bisesar, 41, told the court. “I am innocent of this crime. Someone put something foreign in my mind.”

These words have been repeatedly reported in the press as “bizarre” and evidence of mental illness. The word “bizarre” in fact has been used so often to color her claims that the question of Cognitive Containment, a military mind-hacking term described in Dr. Robert Duncan’s Project Soulcatcher, denoting the deliberate containment of ideas within pre-set contexts to limit the dissemination of awareness across populations, comes to mind. Predictably, all television channels reporting the in-court events that day, latched on to that word and echoed it non-stop.

In court, her lawyer Calvin Barry spoke over her head, raising the specter of mental illness, and noting the need for a psychiatric assessment. In Canada, the finding of Not Criminally Responsible, while still a rare finding in court cases of homicide, can be administered in cases of mental incompetence.

Covert Micro-Chipping and Mind Hacking 

But there is another reason to investigate this case further, which could indeed also prove grounds for mitigation: that of covert neuro-experimentation, covert microchipping, and mind hacking by military/intelligence programs, a possibility which concerned citizens and activists from World CACH (World Coalition Against Covert Harassment) and US CACH (US Coalition Against Covert Harassment) have come forward to present as a possibility which must be explored further.

Rohini Bisesar’s claims in fact are not unusual today, they say, and are echoed by thousands who have experienced symptoms similar to hers.

Citing recorded, scientifically-conducted scans of radio-frequency-emitting implants found in the brains of others reporting symptoms of external neural control of their brains, and pointing to reports of these scanning sessions conducted by the International Center Against Covert Technologies (ICAACT), they direct attention to a vast body of literature available online currently and in books and other media, detailing an ongoing worldwide occurrence of covert neuro-experimentation and covert micro-chipping, with many cases of reporting individuals surgically removing covertly-implanted microchips from their bodies.

Richard Cain is one of these individuals, who underwent surgery to remove implants he says were covertly placed in him and his children’s bodies by doctors at a hospital in California, whom he suedJames Wahlbert has also reported the removal of covert implants. Dave Larson, initial volunteer in a medical study with the CIA, sued the CIA for further non-consensual covert implantation and experimentation with external stimulation and manipulation of his brain and body with these implants; his report includes pictures of the tiny Micro Electronic Mechanical devices removed from his body tissues. (Their reports can all be found online.)

RFID Chip Technical Info

Image from Nationalreport.net

The Radio Frequency Identifying Tag (RFID) microchip industry today is a 10-billion dollar industry and growing. Ex-IBM Executive Patrick Redmond has stated that microchips are being used in retail, in agriculture, in health services, and newly in biometric surveillance, variously for tracking consumer items, cattle, and people. They range in size and form today from the visible RFID tracking chip now being used on credit cards, the tracking Verichip, twice the size of a grain of rice, to films, powders, disappearing inks. One class of microchip, the neurostimulator implant, is being tested, developed, and used in patients for various reasons, such as to administer controlled doses of medication internally. Microchips in their most basic form carry a transponder in them, a mechanism for receiving radio frequencies, and for emitting radio frequencies. Some are inert or passive unless stimulated by an external signal; some are active in continuously emitting a signal. The radio waves emitted and received can vary in length, based on frequency; some microchips developed by Siemens and other companies are known to be trackable from space (from over 75 miles or 400,000 feet away).

Those reporting covert microchipping–as evident from many reports online, particularly at sites collecting accounts from individuals who identify themselves as non-consensual experimentees, such as ICAACT, Freedom From Covert Harassment, Surveillance Issues, ICOMW.org, and others–inevitably offer symptoms of feeling an external activation at precise points on their bodies, of feeling external electromagnetic signals invoking sudden internal sensations of heat, pain, or shock, sometimes localized pain at certain organ sites. Localized effects are not inconsistent with the intended outcomes recorded in the use of implants in the medical field. (However, here they are being reported as torture devices, the opposite of medically-healing or pain-relieving.)

Individuals often correlate these incidents of external activation to the close presence of people pointing cell phones at them. Many also note the experience of signals on their bodies directed at them from a cell antenna or cell tower–a phenomenon recently corroborated by senior ex-DARPA scientist Paul Batcho, who disclosed that a certain range of frequencies had been appropriated for exclusive use by the military, and was now being used to send specific frequencies to assault “targeted individuals” who have been made the unfortunate subjects of these illegitimate military/intelligence covert experiments and operations.

Covert Neuro-Experimentation

In fact, reports of non-consensual neuro-experimentation abound, with many reporting sensations of feeling repeatedly remotely accessed around various regions of their head, experiencing constant ringing or tinnitus in ears, sharp localized pains to certain regions of their brains, sudden onset and surcease of strong emotions, as if externally induced, sudden onset of untoward thoughts, as if externally induced, strange dreams, as if externally-induced, the electronic play of voices inside their heads, often issuing directives in repetitious fashion, and “cloned” sensations of smell, hearing, touch, taste, and sight, meaning experiencing strong sensations of smell and touch or auditory or visual images, when no physical correlate for these sensations exists, as if specific parts of their brain, stimulated, had produced these sensations and images.

In other accounts, individuals report the experience of suddenly having no control over their voluntary bodily functions, such as in moving their arms or legs, in speaking, or in controlling urination/excretion, and feeling accessed biologically remotely in directive ways. Authors Tana Winkler (My Remote Neural Monitoring Experience) and Tyrone Dew (Satellite Terrorism) have both recounted experiences of this robotizing nature in their books. People have also reported externally-arising sensations of sexual stimulation and assault, and experiences of electromuscular shock on different parts of their bodies.

In the more public world of mainstream television, we have all witnessed anchors around the world, including Judge Judy, suddenly lose control of their speaking faculties and issue forth disjointed streams of incomprehensible gibberish.

Remote Access of Human Brain: Patents, Whistleblowers, Current Neuroscience, and DARPA Research Contracts

What all of this points to is the remote access of human brains and the remote biological manipulation of human bodies.

Are these entirely covert programs of experimentation by our military and Intelligence agencies? Or do patents exist in the public domain for some of these purported technologies?

It turns out they do. Patents and military contracts exist, among others, for the remote access, harvesting, and manipulation of human brain waves, for altering brain states, for deep brain stimulation, for transcranial magnetic stimulation, for brain entrainment, for the electromagnetic disruption of neural networks and processes.

Whistleblowing scientists have come forward to reveal their part in developing some of these technologies. Dr. Richard Alan Miller has recounted working for the US Navy and developing Synthetic Telepathy, also known as Voice to Skull or Voice of God or Microwave Hearing technology, where voice signals are modulated onto microwaves and transmitted into the back of a person’s head, inducing within his or her brain the clear auditory sensation of externally-produced voices, in a phenomenon of hearing voices inside one’s head which psychiatrists may unknowingly or knowingly mis-diagnose as a symptom of schizophrenia.

Image

Voice to Skull Hypnosis – Synthetic Telepathy

Dr. Robert Duncan has come forward to describe DOD/CIA projects in cybernetic mind-control, weaponized neuropsychology, and bio-communication controls, which include the integrated use of Artificial Intelligence, biophysics, and behavioral science in the creation of remote-control Electronic Brain Links, cerebral cortex cloning, Mind Hiving, Neural Linguistic Programming. and more. Dr. Barrie Trower has spoken extensively of microwave radiation weaponry that has been developed by the UK Navy, for whom he has worked.

soulcatcherDr. Duncan, who along with others in his Mind Hacking Strategy group interviewed both Intelligence agency whistleblowers and 650 volunteers who reported experiencing external control of their brains and bodies, writes extensively of mind-hacking experimentation projects being run by the DOD/CIA in Project Soulcatcher: the prime objective seems to be absolute control of the human mind, and absolute control of populations, even as other, Globalist and eugenicist objectives also play out. Microchips may not be needed for remote mind hacking. “In a direct mind-hack, spoofing is done with synthetic telepathy, a bio-communications technology. Sounds and voices can be forced into a target’s perception.” He discusses various techniques shared with his research group by whistleblowers, including brain entrainment of frequencies, recurring hypnotic states induced in an individual’s brain by radio control–Radio Hypnotic Inter-Cerebral Control/Electronic Dissolution of Memory–RHIC/EDOM, hypnotically entrained “forced speech,” and programming “to perform certain actions or maintain certain attitudes by radio signal.”

Current Neuroscience: Inside and Outside the Military

This is, we are told, by a President sinking most of his budget in Defense, and $50 million of a $100 million investment in the BRAIN (Brain Research Through Advancing Innovative Neurotechnologies) Initiative in DARPA, the Decade of the Brain.

Mainstream Neuroscience has also made astonishing, if not terrifying advances. Neuroscientists outside the military/Intelligence world, from academia and clinical practice, have started to speak openly about the remote accessing of people’s brains, of Neural Imaging wherein everything a person sees, whether physically or electronically, off a screen, can be picked up remotely (as EMF/low frequency radio waves) and reproduced/re-translated into image format via the intermediate use of a computer program functioning as an Electronic Brain Link. Similarly, technologies exist to pick up and record thoughts, ideas, memories–all issuing forth as extremely low frequency (and long wavelength) radiation, in the range of 0.5 to 30 Hertz–even the “voice in your head/your inner voice” can be read now, as pre-vocalized thought. Applications in Neurocrime and Predictive Policing–reading your mind to find out if you are a likely criminal or plotting a criminal act–very much in Minority Report style–are currently being studied, discussed at conferences, and discoursed about in Neuroscience programs. This Youtube playlist  collects many related videos, including the Davos 2016 videos, on current-day neuroethics and neuroscience.

Ongoing and recent DARPA contracts seem to be probing the myriad ways that military neuroscientists, neuropsychologists, behavioral scientists, cyberneticists, transhumanists, and Artificial Intelligence programmers can use to disrupt, alter, modify, transform, transhumanize (with nanotechnology introduced into neural networks), retard, and deform the human brain. These are not exaggerations. This is weaponized neuroscience, and the intent is Control of the Human Mind. While Universities make weak attempts to discuss neuroethics, the military has no such qualms and rushes in where academics might otherwise fear to tread. (Many Universities are currently receiving Defense funding and working on projects for the military, including in Neuroscience.) Projects include the disruption of normal narrative processes of sequential thinking, brain-computer interfaces via implants to control thoughts and feelings, and others.

These are DARPA’s public-domain contracts. The DoD has a dark(er) side: the Black Budget, Covert Ops. What manner of experiments, of operations, of intentions exist here, do you think? It is theorized by some that the Black Budget is vast and capacious, runs up to trillions of dollars, and because it is classified, is able to run all sorts of dubious experimental operations on humanity, with zero accountability. These would be Covert Operations–including covert microchipping and covert neuro-experimentation–of the kind that thousands worldwide are reporting today, including in Canada and the USA.

So Should the Criminal Justice System Rely Today Solely on Psychiatry–or Start Including Neuroscience?

Given these current realities of Neuro-Experimentation on vast numbers of people, where should we place psychiatry today in the courtroom? To this day, psychiatrists often function as experts, swooping in to mark a person psychiatrically ill or mentally competent, as the case may be. They are seen as ultimate authorities in determining mental soundness, mental fitness. On their word, whole futures revolve. In a murder trial, this might well mean the difference between life and death for someone facing conviction.

But someone reporting hearing voices in their head today, or suspecting the presence of a microchip somewhere on their bodies, or feeling they have been directed or steered toward an action foreign to their very character and core, as Rohini Bisesar contends, can perhaps no longer be arbitrarily and unequivocally seen as mentally ill. All her claims: of feeling her senses have been taken over, of experiencing forced speech, and of having aspects of herself removed, of hearing voices in her head, and particular voices at that, are described as cerebral cortex cloning and synthetic telepathy experimentation projects in DOD/CIA-derived information in Project Soulcatcher.

So we must conclude there could very well be a Neuroscience Experimentation component here, that cannot be ignored until it is fully investigated.

Long History of Covert Experimentation, MK ULTRA, and Manchurian Candidates

One more factor of note must be considered. The US has a long history of covert experimentation on non-consenting citizens, and so does Canada. Canada was in fact part of the CIA’s MK ULTRA experiments; some of the most egregious radiation experiments were conducted on children at Canada’s McGill University.

One discovered motive in trauma-based mind control experiments under MK ULTRA was the CIA’s interest in creating sleeper assassins or Manchurian candidates–people who would be steered toward committing assassinations for the state, even if their base personality would prevent such actions. They could literally be split multiply into multiple personalities–some aspects of them lifted and removed, some aspects moved in, some small, some large, as Rohini Bisesar put it–so their new, altered self could engage in actions of violence abhorrent to their own, earlier self.

In the case of Rohini Bisesar, two young women have abruptly lost their lives and futures. Rosemary Junor was tragically stabbed to death (although she survived the incident, she died in hospital a few days later). Rohini Bisesar allegedly did the stabbing, and quite possibly faces life in prison.

Although Miriam Carey–who was shot by the Secret Service at the Capitol after a chase succeeding her crashing a barrier near the White House with her car (with her 1-year-old child in the backseat)–and Aaron Alexis, the Navy Yard shooter, who shot several, and Myron May, the Florida State University shooter and ex-District Attorney, who shot many (with both killed by police), were all three deemed mentally ill and schizophrenic for having reported hearing voices in their heads, signs exist to suggest that all three were non-consensual subjects of covert neuro-experimentation instead. Aaron Alexis had in fact complained of ELF radiation attacks and had inscribed on his rifle the words “My ELF Weapon.” Myron May had also complained of hearing voices through walls, and being covertly assaulted with directed-energy weapons. Miriam Carey had said Barack Obama had spoken to her inside her head; among other patents noted above, the technology exists to accurately “clone” anyone’s voice.

In a Time of Mass Deception, Mass Shootings, and False Flags

Mass shootings in our midst these days often seem to point to manufactured false flag events, with the objective being gun control–perhaps Aaron Alexis and Myron May and Miriam Carey (attempted sleeper assassin?) fall into this category. What might be the objective though, in a case like Rohini Bisesar’s? In the US, the government has given itself permission to engage in Psy Ops on the populace, and to engage in the dissemination of government propaganda, by Executive Order. The US has also signed and is implementing Global Policing agreements, where UN policing initiatives are superseding local ones. Is this the case also in Canada?

In Rohini Bisesar, we have a highly-educated, accomplished, and personable woman from the upper middle-class with a known personality of calm, focus, and gentleness, and no criminal record, supposedly sliding in adulthood into sudden mental illness, loss of control over her life, unexplained unemployment, and finally, violent “extremism” as she abruptly destroys her own life and career in a fit of unprovoked aggression in a drugstore, stabbing to eventual death a complete stranger, with a kitchen knife. Hearing voices, displaying paranoia, unable to find or keep employment, she is hustled off to psychiatrists, named schizophrenic, and prescribed neuroleptics to further retard her mental functioning. The narrative we are left with is that sudden onset of schizophrenia, “violent extremism,” and uncontrolled aggression can emanate from the most unlikely of sources, and can erupt at any unexpected time, even from among the ranks of the highly-educated, the highly-accomplished, the seemingly calm, gentle, and personable, and from any genre of citizenry, including the educated, hard-working Guyanese immigrant of South Asian descent.

One must ask therefore–if this is instead, as seems plausible, a case of covert neuro-experimentation, where Rohini Bisesar has been a long-term unwitting victim of targeting by shadowy military/Intelligence experimenters, subjecting her to synthetic telepathy (voices in the head), organized stalking (at work, with her job search), electronic harassment (covert microchipping/Radio-frequency Hypnotic Inter-Cerebral Cloning), as she suspected, although she attributed this to possible nanotechnology (which might indeed play a role, since nanotechnology is currently raining down on us via chem trail/aerosol)–if the underlying agenda here is:

1) To further enshrine the Psychiatrist as the ultimate authority in society, and Psychiatry as the ultimate tool to determine fitness for living in society, with the drug industry at its core, eager to remove thinking minds from society, with forced psychiatric evaluations and mental-fog-inducing neuroleptics;

2) To attempt to justify the current covert targeting of thousands, if not millions, with electronic/scalar/sonic neuroweaponry, covert microchipping, and organized stalking (Psy Ops/CO-INTELPRO) in which whole communities are recruited, as necessary Behavior Modification aspects of the already-being-rolled-out methodologies of Predictive Policing/Neuro Policing (neurochipping/mind-reading via harvesting of EMFs/continuous biometric and physical surveillance), and Community Policing (where neighbors are encouraged to surveil, track, watch, and report neighbors), of those arbitrarily and eugenically deemed dangerous or expendable by the State;

3) To rationalize the extreme drive toward full-spectrum surveillance in the US and Canada and worldwide: surely we All need to be continuously monitored, chipped, tracked, and surveilled because, however educated or personable or non-criminal we are, any one of us could go off our rockers at any time in our lives, and launch hacking or stabbing or shooting incidents on our fellow-humans; “Countering Violent Extremism” with Predictive Policing and Community Policing could be on the menu to being rationalized in this way.

4) To valorize Policing, policing budgets, and innovative policing methods which are already beginning to include increasingly invasive forms of biometric surveillance–fingerprints, irises, gait, skull-shapes, face-structure, DNA–and bump those up via Neuroscience to brainprints (one’s signature set of EMFs emanating from our individual brains), heartprints, and so on.

All these are signals of totalitarianism, and unless we as a society begin to openly and fully acknowledge and address the very real monsters in our midst of covert neuro-experimentation, covert micro-chipping, and covert assault with electronic/scalar/sonic neuroweaponry which thousands are reporting today–even as massive State-sponsored attempts to suppress public awareness of these atrocities rise, with a silenced/complicit corporate media and active publishing of disinformation online, as in Wikipedia and Rational Wiki–we condemn ourselves to continued manipulation, deception, and control en masse.

Not “Bizarre” as in “Insane”: It’s Neuro-Experimentation

Instead of mis-characterizing reports of remote mind control and neuro-chipping as “bizarre,” reporters with integrity could start investigating, researching, and reporting on Neuroscience experimentation, patents and contracts for remote read/write projects on brains, Neurocrime, and Predictive Policing.  Attorneys and judges in the court system could get informed on the very real potential, via Deep Brain Stimulation, pulsed microwave induction, and radio-frequency cortex cloning of external neural influence of human thoughts, behavior, and actions. Psychiatrists and psychologists could get informed too, on Synthetic Telepathy, Deep Brain Stimulation, neurostimulator implants, HAARP’s abilities to effect mind-control via ELF (Extremely Low Frequency radiation), remote influencing of brains, and related subjects.

All of society could wake up and demand that the sociopathic and eugenicist Neuro-experimentation and electronic harassment programs being run by the DOD/CIA and other Intel/Security agencies—the CIA/FBI/NSA/DIA/”shadow government” complex—under various covers of “national security” worldwide, as reported by whistleblowers, are stopped immediately, and the top Government perpetrators held accountable.

Perhaps Rohini Bisesar’s case is a wake-up call to all of us. This is no longer Kansas. It’s 2016, institutional ethics is on the wane, and stealth warfare is on the rise. Our brains are being studied, researched, remotely stimulated and influenced, remotely read, and remotely “written” or altered.

If we don’t individually wake up now and collectively work to change our current reality, it is entirely possible we and our children–as independently thinking and acting humans, as sovereigns entitled to the sanctity and privacy of our thoughts— won’t have much of a future left, very soon.

**

Ramola D is a writer with a background in science and literature researching issues in science, technology, and ethics relevant to our times, including issues related to Intelligence, Surveillance, Security, and Defense. She runs a solutions journalism site at everydayconcerned.net, and edits the online literary quarterly, Delphi Quarterly. Her literary journalism, fiction, and poetry have been published widely. You can follow her online at @EccEveryday, or at The Everyday Concerned Citizen on Facebook.

http://www.washingtonsblog.com/2016/05/rohini-bisesar-psychiatric-illness-long-term-covert-neuro-experimentation-manchurian-candidate.html#more-56321 

 

source of featured graphic at top

https://youarenotmybigbrother.wordpress.com/category/directed-energy-weapons/