Monthly Archives: September 2016

Obama JASTA

Obama JASTA

Monday, September 26, 2016

Why Obama Had To Veto JASTA

This mirrors what is regarded by a number of 9/11 activists as an oustanding piece of analysis by James.

http://winterpatriot.blogspot.com/2016/09/why-obama-had-to-veto-jasta.html 

As you probably know, late last Friday afternoon President Obama vetoed a bill which had passed both houses of Congress unanimously, and Congress is now trying to work out whether it has enough clout to override the veto.

I don’t think it does. Behind Obama’s veto lie very powerful reasons, and behind those reasons stand very powerful people.

JASTA, the Justice Against Sponsors of Terrorism Act, would have allowed families of 9/11 victims to sue the government of Saudi Arabia for alleged complicity in the terrorist attacks if Obama had signed it. This could not, and cannot, be allowed to happen.

Therefore, at the behest of the Pentagon and a bipartisan group of national security heavyweights, including

Stephen Hadley, a national security adviser to President George W. Bush; Michael Mukasey, a US attorney general under Bush; William Cohen, a secretary of defense under President Bill Clinton; and Richard Clarke, a national security aide to Bush and Clinton

Obama expressed “deep sympathy” for the families and vetoed the bill.

According to the maintstream media, the families don’t understand why JASTA had to be deep-sixed.

“The president’s rationales to veto JASTA don’t hold weight. They are 100% wrong,” said Terry Strada, whose husband Tom Strada died in World Trade Center collapse. “For us, the 9/11 families and survivors, all we are asking for is an opportunity to have our case heard in a courtroom. Denying us justice is un-American.”

Well, perhaps “the president’s rationales” weren’t the real reasons. Perhaps politicians don’t always say what they mean. And perhaps the mainstream “journalists” can’t tell the difference. But then, neither can the “dissident” journalists.

So the job of explaining it falls to the humblest of bloggers. In other words, the water in this case is so heavy that it can only be carried by a volunteer porter. Nobody who gets paid for carrying water will tell you this:

There are three very good reasons why JASTA cannot become law, but two of them cannot be discussed in public, lest the discussion jeopardize national security and undermine the war on terror.

What goes on behind closed doors is another matter, and the entire House of Representatives is up for re-election in November. We can be sure they will feel all the pressure the bipartisan national security heavyweights can muster, as they consider the ramifications of a vote to override the Presidential veto.

How many of them will stand their ground? I won’t be surprised if we can count them without taking off our socks. But we shall see.

~~~

[1]

The bipartisan national security heavyweights are protesting that JASTA might motivate foreign countries to sue the American government for acts of terrorism committed by Americans against their own citizens on their own soil.

And this would be very bad for America, they say, because it could lead to “spurious lawsuits” against our men and women in and out of uniform, requiring them to take “a less forceful approach in dealing with state sponsors of terrorism” and thereby hindering them from keeping you and your children safe.

According to the New York Times:

“We continue to make a forceful case to members of Congress that overriding the president’s veto means that this country will start pursuing a less forceful approach in dealing with state sponsors of terrorism and potentially opens up U.S. service members, and diplomats and even companies to spurious lawsuits in kangaroo courts around the world,” Josh Earnest, the White House press secretary, said before Mr. Obama vetoed the measure.

What does he mean by “spurious lawsuits”?

Suppose a drone operator made a mistake and accidentally dropped a bomb in the wrong place, killing half a dozen innocent people.

Should he be held responsible for his actions in a foreign court? Should the American government be liable for reparations?

“Of course not!” say the bipartisan national security heavyweights. This is the realm of International Law, after all, where the guiding principle is “Sovereign Immunity.”

If you are new to International Law, you might assume Sovereign Immunity would mean citizens of a sovereign state are immune to violent attacks from foreign powers. But that would be an error.

Sovereign Immunity actually means a sovereign state can do whatever it wants to the citizens of another state, with no legal repercussions whatsoever.

Sovereign Immunity means big fish can eat little fish whenever they get hungry. And the bipartisan national security heavyweights like it this way. So they don’t want JASTA to threaten it.

To the 9/11 families, this is not a problem. The say JASTA is specifically worded to include only acts of terrorism sponsored by foreigners against American citizens on American soil.

But clearly they don’t understand the power of precedent. And precedent here could be devastating…

… because suppose it wasn’t a drone operator, but an administration. And suppose it wasn’t a mistake, but a deliberate act of aggression. And suppose it wasn’t a bomb dropped in the wrong place, but the invasion, occupation, and destruction of a whole country. And suppose it wasn’t half a dozen innocent victims, but half a million. And suppose it didn’t happen just once, but over and over and over, for decade after decade…

What if there were a means for victims to seek reparations? What if there were a legal precedent for this? And what if the precedent were set by the United States?

Do you see the problem?

That’s not the only problem. It’s a big one, but it’s not the biggest. I think it’s the third biggest; clearly it’s the one that the bipartisan national security heavyweights are least unwilling to talk about in public — even if they only hint at it.

The other two reasons are even darker.

~~~

[2]

Aside from the question of Sovereign Immunity, there’s another question, which is finessed more often than it’s answered, and for good reason.

What is terrorism? Or more precisely, Who defines terrorism?

Allowing the definition of terrorism to become a matter for the courts would undermine the war on terrorism, according to the terror warriors themselves, but they only say this when they don’t think anyone else is paying attention.

But Stars and Stripes reports:

The White House […] argued the classification of terrorism should remain an executive authority, not become a question for the courts.

Stars and Stripes also quotes Lt. Col. Pat Testerman, a retired Air Force commander:

“What we define as acts of terrorism or acts of war is up to interpretation,” Testerman said. “And we open ourselves up to significant danger with this.”

Of course they would prefer to keep this fact as quiet as possible, since it’s far too easy for people to put two and two together when they realize that the entire global war on terror is predicated on the notion that the President will both define terrorism and command the world’s response to it.

This may strike you as similar to the popular notion:

“If we do it, it’s Good. If our enemies do it, it’s Evil.”

If so, you’ve been paying attention.

~~~

[3]

The third and officially unspeakable reason why JASTA must get shafted … is an old sweet song, which only conspiracy theorists can sing. And it goes like this:

The official story of 9/11 is not only false but obviously false, indefensible, ludicrous, absurd. It cannot stand serious scrutiny of any kind, and it most certainly cannot stand up in a court of law.

In a courtroom, as opposed to a press briefing room, witnesses are bound to tell the truth, and subject to cross-examination. There is no sure way to control the questions a lawyer might ask, or the answers a witness might give, or the direction in which a cross-examination might go.

In a nation raised on television, in love with litigation and addicted to infotainment, the trial of a former football player accused of killing two people was enough to stop millions in their tracks for weeks.

A generation later, to a population shocked out of its wits with terror, a 9/11 trial would be the spectacle of the century. And just one question, or just one answer, could be enough to bring the rickety official story crashing down on top of the people who built it.

It would only take one sharp defense attorney. But I’d sooner see two.

The first one would say:

PROVE IT!

PROVE the 4 planes in question were scheduled to fly on 9/11.

PROVE the 19 alleged hijackers were in the airports on that day.

PROVE the 19 men boarded the 4 planes.

PROVE they forced their way into the cockpits.

PROVE they took control of the aircraft.

PROVE they flew those incredible flight paths.

PROVE they crashed into these buildings.

and

PROVE the buildings disintegrated because they were hit by airplanes!

THEN we can talk about who was responsible.

This attorney would be very scary, of course, because the government cannot prove any of these things, let alone all of them.

But his partner would be absolutely terrifying, because he would say:

WHY?

Everybody talks about what the Saudis did, but nobody wants to talk about why. Well, I’ll tell you why. They did what they did because they were asked to do it.

This is how things work. Friends do favors for each other. And operatives don’t ask questions.

They had no idea that the people they were helping were going to be used as patsies. They were just following instructions. They didn’t even know they were working for an ally. They just knew what they were supposed to do. This is how things work.

Did the Bush administration know about it? Of course they did. Where do you think the request came from?

Why do you think President Bush and Prince Bandar were so close? Why do you think the White House shut down every single investigation into anything connected to Saudi Arabia?

Why do you think so many important Saudi families were allowed to leave the USA immediately after 9/11? Why do you think they got so much help?

Why do you think the 28 pages were classified for so long? Why do you think the mainstream media keeps trying to make this story go away?

And why do you think the government is so intent on keeping all this quiet that they will do absolutely anything to keep it out of court?

Connect the dots. The 28 pages describe the cutouts who set up the patsies. The “hijackers” are just one part of the story — the part we call “the legend.”

Now: Who created the legend? That’s part of the story, too.

And: What really happened? That’s another part of the story.

What would it take to expose the fraud? Maybe just one court case?

Aha! Now you understand why Obama had to veto JASTA.

http://winterpatriot.blogspot.com/2016/09/why-obama-had-to-veto-jasta.html 

JASTA, 9/11, Obama, national security, spurious lawsuits, Sovereign Immunity, 28 pages

reverse-engineering the panopticon

reverse-engineering the panopticon

[This is a mirror or re-post of an article found at http://cryptome.org/cartome/reverse-panopticon.htm ]

Visiting a town as stocked with symbolic monuments as Washington DC is a reminder of very real and provocative linkages between persuasive political systems and the civil space and edifices they generate. Architects are taught to “read” landscape code, and this is a town of emblematic war memorials and presidential temples loaded up with tantalizing national narratives based on fact, myth and propaganda — all of which are inextricably intertwined with theories of power and ideas about ‘security’, including national security, which are the concern of advanced computing systems specialists and this USENIX symposium.

As readers of Cryptome and Cartome may be aware, John Young and I are not systems architects, but practitioners of architecture of the steel, glass, bricks and mortar kind — and so, as ‘legacy’ architects we tend to project the implications of new technologies and their constitutive politics beyond machine and source code, games and simulations — onto the so-called real spaces they enable: the social space of the street, the city, the national boundary, global space.

Washington DC as a weaver of allegory and myth also reminds us of the ancient link between bricks-and-mortar architecture and the first lines of security and defense. The classical language that drapes many of DC’s federal edifices embraces a mythologic history which credits Daedelus as being the first architect. This attribution is especially intriguing because Daedelus was the guy who designed Crete’s pernicious Labyrinth, an early structure of defense and punishment configured, interestingly, as an algorithm of 3D encryption. The Labyrinth was policed by that infamous bully-of a-bull enforcer, the Minotaur. I like to think of the Minotaur as an early bovine ancestor of the MPAA, RIAA and BXA.

Recently, I’ve become somewhat less impressed by Daedelus’ feat of labyrinthine enciphered design, than the insurgent work of someone we may come to respect as a largely unheralded first reverse-engineer — Ariadne. Ariadne did something as brilliant as it was subversive: she provided the ball of fragile silk thread which allowed the captive Theseus to exploit and defeat both labyrinth and Minotaur. Ariadne’s subtle thread constructed an ethereal reverse pathway back out of the convoluted maze, allowing Theseus to escape to safety.

It appears that reverse-engineering continues to enjoy the ancient taboo status it established early on in Minoan culture, as USENIX attendees who heard the Felten team’s paper on the SDMI Challenge last night are only too aware. It’s work that’s being stripped of its fair-use designation, and being increasingly demonized, even criminalized by our latter-day Minotaurs.

“‘Reversing the Panopticon” is the motif of John Young’s and my remarks today. They allude to Cryptome and, more recently Cryptome’s companion site, Cartome’s, modest ongoing project of reverse-engineering, metaphoric in our case, perhaps, and perhaps as vulnerable as silk thread, too — transacted under the assumption that information is power, involving efforts to reverse-engineer labyrinthine information architectures: encouraging a reversal of restricted one-way information flows, a reversal of one-way transparency, a reversal of the one-way power relation captured through the insidious one-way mirror.

I guess our work also falls within architectural design parameters framed by that notable institution, the library, and its open-source, First Amendment sanctuary. In our case it’s the construction of an archive of salient documents relating to technologies with unambiguous — as well as ambiguous — political repercussions, especially those that impact civil liberties — and in Cartome’s case, technologies that impact the space and landscapes in which civil liberties are deployed or suppressed, as the case may be.

Since the end of August signals our perennial duty to humor friends and family determined to share summer travel adventures, I hope you’ll forgive my imposing a not so dissimilar travelogue today, albeit one where summer peripateticism has been charted as much by Cryptome and Cartome’s interests as the ubiquitous Baedeker or Lonely Planet travel guides. The inquisitive global tourist may find something to track in Cartome’s small but growing collection of spatial / geographic documents that focus on the claims and/or deceptions proffered by state-sponsored imaging systems, particularly those produced in the context of the national security state — geographically informative systems such as government cartography, photography, photogrammetry, steganography, camouflage, maps, images, drawings, charts, diagrams.

In the spirit of such tourism, we found ourselves a few short weeks ago tracking what was once a highly politicized historic space, a Tuscan stretch of what had been a key medieval power infrastructure, the Via Francigena — the Frank’s Road or Road to France — the leading trade and pilgrimage route that linked the capitals of Europe with Rome, a route that, in its day, continued on to sacred Jerusalem.

Hooking up with the Via Francigena happened to bring the idea of the encrypted labyrinth back into view once again. It turns out that labyrinths were etched on the floors of medieval cathedrals as compacted representations of the pilgrimage to the Holy Land, anagrammatic emblems of the ineffable mysteries of the penitent’s extended itinerary. If you couldn’t book a spot on the latest crusade to the Levant, spiritual benefits awaited those willing to walk-the-walk in the privacy of their own home cathedrals.

But we weren’t dealing with pilgrimage codes out there under the hot summer sun — no scaled down, compressed, enciphered mapping of a mystical itinerary — but the Via Francigena itself, at a robustly full-scale of 1:1, as it unfolded in real time and space through the central Tuscan province of Siena, surrounded by fragmented relics of its medieval security apparatus.

At one significant node, our trajectory intersected San Gimignano, the photogenic hill-town whose wealth had derived from its strategic siting along the heavily trafficked network. Those of you who have visited San Gimignano will agree that despite its glut of tourists, it’s a place of architectural interest that more than does justice to its designation by UNESCO as a World Architectural Heritage Site. “San Gimignano delle belle Torri” or “San Gimignano of the beautiful towers” is famous for the impressive stone shafts, some rising almost 50m in height, that still dominate its skyline. 14 of the original 72 structures remain.

The dueling multiplicity of the fortified towers is a clue of the free commune form of government that represented an emerging burgher class grown wealthy in trade, banking and commodities, which had superseded feudal political models in the late 12th century. The multiplicity of towers was an emblem of the newly decentralized, distributed network of commercial interests. The towers broadcast the competitive streak of prominent local families, signifying their owners’ status in the political and commercial calculus allied with nearby Florence’s Guelph and Ghibelline factions.

 

In their day, San Gimignano’s 72 towers had multiple roles in service of the free commune, including surveillance and security. They were strategic optical devices serving their owners’ geospatial agenda, loci of observation that overlooked the built town and strategic panoramas of the Tuscan countryside beyond. Among key targets of inspection and intelligence-gathering: ongoing reconnoitering of the dynamic flows of goods and humanity that coursed along the crucial Via Francigena, thronged with medieval agents on the move: merchants, prelates, soldiers, and pilgrims. When conflicts erupted over control of the Via Francigena’s valuable commodity flows — including the saffron, wine and olive oil for which the hill-town was reknown — the towers became integral to the military apparatus, functioning as launching platforms from which offensive and defensive actions could be deployed.

But in the context of another kind of architecture, the kind of information technology and architecture being tracked by projects like Cryptome.org, Cartome.org, and this USENIX Symposium, San Gimignano is even more intriguing because of historical factors that unexpectedly place it along a timeline that charts the emergence of a more modern kind of politicized space and landscape than either the feudal domain or free commune. I’m referring to the technologies, spaces and landscapes that underpin what we affectionately refer to as our own contemporary surveillance state.

Though San Gimignano’s towers were part of the security apparatus of intelligent observation and defense within the free commune environment, their spatial, social and political function can be distinguished from later architectures and technologies of surveillance and social control that would eventually render obsolete the towers’ massive masonry engineering.

The town’s links to precursors of modern theories of security and surveillance are both tragic and ironic, obliging us to go beyond the era of San Gimignano’s communal wealth and dominance. Instead, we linger on the portentous year 1348, because in 1348, developments in culture, politics and commerce came to a devastating, horrifying standstill, leaving the hill-town’s 72 towers shrouded in cataclysmic death.

The usual medieval scourges of fire, war, earthquake and damnation were not to blame. Instead, San Gimignano had been visited by an exotic agent that had made its way along the Via Francigena swiftly and with a vengeance. It was a tiny, unprepossessing creature, Xenopsylla cheopsis, the Oriental rat flea, bearing neither rich saffron nor opulent silk goods, but the bacterium Yersina pestis, which proceeded to decimate the city’s population, reducing it by ¾, a ruthless epidemiological catastrophe that probably originated in a distant trade partner, China. Notwithstanding the impressive security apparatus afforded by looming towers that had successfully policed the pilgrimage and trade route, The Black Plague proved to be a non-negotiable adversary. San Gimignano — like other powerful Tuscan cities, including nearby Siena — would never really recover from its effects.

In a seminal and controversial work of the late 1970’s “Discipline & Punish: The Birth of the Prison”, the late French philosopher Michel Foucault tracks the origins of modern institutions of discipline and social control, like the prison, and in a much-debated chapter titled “Panopticism” Foucault points out that by the late 17th century, efforts to combat recurring outbreaks of the Plague –such as had savaged San Gimignano and Europe in years following 1348 — would eventually lead to urban protocols and management technologies that unexpectedly provided a structural and administrative prototype associated with the modern surveillance state. Ironically, epidemiological controls would provide the blueprint of what Foucault called: “the utopia of the perfectly governed city”.

 

Let me summarize Foucault’s fascinating description of disciplinary mechanisms applied to towns under threat of Plague pandemic — quarantines that, it turns out, would eventually follow very precise urbanistic, administrative and bureaucratic designs:

Documents of the era describe quarantined towns being divided into distinct quarters, each quarter governed by a so-called intendant, each infected street placed under the authority of a syndic, who would keep it under constant surveillance. Each house would be locked from the outside by the syndic, who then submitted house-keys to the intendant of the quarter. Keys would be returned to owners only after the quarantine was lifted. Only intendants, syndics and guards were permitted to move about the streets and between infected houses, or from one corpse to another. All inhabitants were obliged to appear at their windows daily to be individually inspected and scrutinized in regard to their state of health. Each individual’s status was documented by written registration submitted by syndics to intendants, and then remitted to the central authority, the magistrate.

Thus, Foucault describes how under threat of pandemic Death, we find disciplinary machinery in which “social space is observed at every point… the slightest movement of individuals is supervised and recorded…written documentation links the omnipresent and omniscient hierarchic center with the quarantined periphery”. To paraphrase Foucault: during quarantines, the late 17th century inhabitant became “immobilized in a frozen kind of space… an environment in which inspection functioned ceaselessly… and the authoritarian gaze was alert everywhere”. This, says Foucault, was the “political dream of the plague”. This was “the utopia of the perfectly governed city”.

The reconnaissance capabilities of massive masonry observation towers, with their intelligence-gathering and defensive overview of strategic landscape and crucial traffic, had been supplanted by a more lightweight, mobile structure: a technology of administrative compartmentalization, classification and policing, underpinned by technologies of authoritarian inspection, data collection and databanking.

As some of you are aware, Foucault’s description of late 17th century quarantine protocols is a mere prologue to his more trenchant analysis: how a provocative model prison would be theorized and codified a century later, that effectively built on Plague quarantine protocols. The innovations of the infamous Panopticon cited in our talk’s title signaled a modern shift away from massively fortified security architecture and the punishing brutality of dark dungeons. The Panopticon provided novel machinery for social discipline through an ingenious design based on illumination, transparency and vision.

The Panopticon project was theorized in the mid-1780s by a British social reformer trained in law, Jeremy Bentham, the founder of the doctrine of Utilitarianism, who enlisted Enlightenment reason to draw up a utopian scheme for social reform — one he saw as equally applicable to the penitentiary house, mad-house, house of industry, or school.

Bentham’s Panopticon — the Greek neologism signified ‘all-seeing place’– was all about vision and transparency, but vision and transparency operating one-way only: in the service of power. Bentham specifications called for a concentric building whose periphery was divided into non-communicating cellular enclosures, in which confined inmates would be held in isolation, invisible to each other. At the center of the annular design was a tower, the lodge, which housed the omniscient inspector. The panoptic mechanism’s asymmetric system of lighting and wooden blinds ensured that the individual inmate was constantly visible, identifiable, and classifiable to the inspector — who was a kind of secular version of the allseeing god’s-eye.

But while the inmate is seen by the inspector, he himself cannot see. “He is the object of information, never a subject in communication” Foucault points out. The Panopticon’s power was “visible and unverifiable” — that is, the inmate could not see the inspector, only the looming tower: he would never know when he was actually under surveillance. This uncertainty, along with the inmate’s isolation and loss of privacy, is the means of his compliance and subordination. Uncertainty becomes the principle of his own subjection. It assures that, in Foucault words: “surveillance is permanent in its effects, even if discontinuous in its action”. And thus Foucault draws our attention to our own very modern condition, locked within: “a state of conscious and permanent visibility that assures the automatic functioning of power”.

In retrospect, Bentham’s social reform is recognized for its modern characteristics, achieved through an unprecedented kind of social control, an institutional architecture that provided for an efficient technology of coercive and punitive surveillance. It was a clean, rational, instrumental architecture whose internal mechanisms constructed physical preconditions of asymmetric power relations. Foucault refers to the Panopticon as a “pure figure of political technology”. And so it remains.

Ever-more subtle and sophisticated Panoptic mechanisms continue to reduce the individual’s privacy and integrity. Panopticism continues to limit the space in which civil liberties can be freely deployed. In the face of manipulative technologies, inventive reverse-engineering strategies are necessarily distributed, multiple, simultaneous, hybrid, interdisciplinary, opportunistic. We recall the dazzling efficacy of Ariadne’s fragile silk thread in the face of the Minotaur’s brutality. Last night, panelists reviewing the challenges to civil liberties wrought by SDMI and DMCA underscored the need for resistance through collaborations that reach across disciplinary boundaries and specializations. Institutional and disciplinary isolation — and preaching to the choir — constitute a prison of their own. Unexpected collaborations can offer productive strategies, and it is hoped that Cryptome and Cartome libraries offer useful tools towards the conceptualization of such novel strategies.

This multi-layered, hybrid approach has characterized Cartome’s recent analysis of the Jim Bell case, which explores unexamined terrain surrounding the case, including Homeland Defense, the new national security policy which is ushering in a troubling and unprecedented era of militarization of the domestic, civilian landscape: “So say goodnight to Joshua…Homeland Defense and the Prosecution of Jim Bell”. Be forewarned, if you are a rabblerousing C-punk, your home address has recently been programmed into precision targeting GIS.

At the far terminus of the medieval Via Francigena’s pilgrimage route, “Jerusalem SKY” (scheduled for online publication, Fall 2001) investigates conflict resolution through dual-use technologies — reconciling hardware and software developed in the context of national security with bird migrations that make the skies of the region one of the world’s premier long-distance migratory flyways, linking Europe, Asia, and Africa — with important implications for the military doctrine of “total air supremacy”.

Intriguing conflict resolution strategies have been forced by the reality of avian biogeography and the effects of catastrophic birdstrikes, in which an F-15 worth $45million, along with pilot and navigator, can be brought down like a stone by a migrant stork. Around 170 military aircraft in Europe and Middle East have been destroyed in such birdstrike collisions.

“Jerusalem SKY” continues research initiated with “Parallel Atlas”, a digital cartographic project that explores the Cold War’s last remaining monument and world’s most fortified corridor, the Korean Demilitarized Zone, whose role as a national security landscape has been redefined since the Korean War by its transformation into a unique ecosystem harboring some of Northeast Asia’s most endangered species of endemic and migratory fauna and flora.

Cartome’s interest in hybridity, in the multiple and simultaneous layering of inclusive datasets — including the cartographic superimposition of biogeographic data onto national security landscapes — is reminiscent of the lesson of San Gimignano, whose security firewall of massive masonry towers did little to address a microscopic biological agent.

Hegel and Posthumanism

Hegel and Posthumanism

Transcendent Men: Hegel and Posthumanism

audio in three parts 

by

BRANKO MALIĆ 

Listen to Part 1, Part 2

In the third, final, podcast we sum up the meaning of Hegelian dialectics and it’s analogies to Posthumanism.

While Hegelian philosophy, like all philosophy of Modernity, suffers from unbridgeable gap it digs between humanity and the world, posthumanism revels in the abyss it digs between narcissistic individual and everything else – both humanity and the world.

We demonstrate that posthumanism is an instance of absolute, metaphysical, egoism which, paradoxically, ends up revoking all individual properties of human being in order to render it absolutely free.

Hegel ends up creating a system of absolute knowledge that was supposed to provide humanity with encyclopedic insight into purpose of history and justification for all the ills it created.

This system was, of course, a failure.

Posthumanism, on the other hand, can move only in direction of absolute power of man over the world, but only on condition that both the man and the world be revoked as they are, and transformed into something else.

This approach doesn’t bridge the abyss of alienation but threatens to finally cast humanity into it.

http://21stcenturywire.com/2016/09/22/transcendent-men-hegel-and-posthumanism-pt-3/ 

(If for some reason the Mixcloud presents you with problems, the podcasts are available on Kali Tribune’s Youtube channel. Podcasts can be downloaded via this link )

Author Branko Malić is a Croatian author and owner of Kali Tribune, with the background in classical philosophy. He’s focused on philosophy, media, culture and deep politics analysis.

OODA loops and Cyberwarfare

OODA loops and Cyberwarfare

 

Bruce Schneider is an expert in cyber-security, the Chief Technology Officer of Resilient, an IBM Company, a fellow at Harvard’s Berkman Center, and a board member of Electronic Frontier Foundation — an organization defending our rights in the digital world.

In a blog post, Schneider sounds the alarm that in the past year, the websites of major companies that provide the Internet’s basic services repeatedly have been attacked, each time more sophisticated than the last, which suggests “someone” is practicing how to take down the Internet by learning from the companies’ defensive moves.…

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down…..

Read the whole piece here:

Start with this:

http://jamesfetzer.blogspot.com/2016/09/someone-is-learning-practicing-how-to-take-down-the-Internet.html 

and follow on with at least a cursory scan of these

** ## **

https://cyberwar.nl/d/2012_The_Principle_of_Maneuver_in_Cyber_Operations.pdf 

** ## **

Addressing Simulation Issues Posed by Cyber Warfare Technologies

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.465.7023&rep=rep1&type=pdf 

** ## **

Modelling and Simulation of Electronic Combat

https://www.researchgate.net/publication/235703198_Modelling_and_Simulation_of_Electronic_Combat 

** ## **

 

http://firstmonday.org/ojs/index.php/fm/article/view/3848/3270 

** ## **

CYBER OODA:

TOWARDS A CONCEPTUAL CYBERSPACE FRAMEWORK

http://www.dtic.mil/dtic/tr/fulltext/u2/a536951.pdf 

** ## **

Forensics, Fighter Pilots and the OODA Loop: The Role of Digital Forensics in Cyber Command and Control Heather M.B. Dussault SUNY Institute of Technology

http://pdfsr.com/pdf/forensics-fighter-pilots-and-the-ooda-loop-the-role-of-digital 

** ## **

On Cyber Warfare Command and Control

https://www.researchgate.net/publication/228729291_On_Cyber_Warfare_Command_and_Control 

** ## **

THE IMPACT OF INCREASE IN BROADBAND ACCESS ON SOUTH AFRICAN NATIONAL SECURITY AND THE AVERAGE CITIZEN

https://www.jinfowar.com/tags/cyber-warfare 

** ## **

Cyber Security and the OODA Decision Loop

a course offered at Regis

http://informationassurance.regis.edu/ia-programs/resources/blog/cyber-security-ooda-decision-loop 

** ## **

https://www.oodaloop.com/osint/cyber/2016/06/07/cyberwarfare-the-digital-battlefield/ 

Forty-Caliber Disclosure

Forty-Caliber Disclosure

Recently in response to the events stemming from the high density of naval ships inside an extremely strategic narrow chokepoint, I flippantly re-linked to a long piece I’d written on wargaming but it’s Part Two of that opus that has just come back into focus.

The day before, I’d finished reading Richard Dolan’s short introductory overview The Secret Space Program and Breakaway Civilization.

Writing, like war-gaming, is a strong and effective approach to thinking. War-gaming allows you to try a tactic or a strategy using a method that will do no harm. No one dies; pieces get put back into the box. I’ve saved as many of the pieces as I could from all those war-games I used to play; I’m an INTP, according to the test that the shrink insisted I take, and being an INTP means that I pack away “stuff” on the chance that it will be of some value again. It will be of value very soon as the large empty table in the family room next to my office will become the playground of my kindertotten who just discovered Monopoly, one of whom has re-written the rules of Checkers (with the help of his cousin) such that “king me” has been extended into “Ace me” and “Joker me”.

A Joker is a stack of three checkers topped by a pawn.  These guys are naturally deeply into free play already; imagine what will happen when they discover John Boyd.  But I digressed…

Writing allows you to work something out on paper too, and if it doesn’t work, you simply crumple the paper up or delete and grab a clean screen.

Blogging is like writing. It allows you to gather a lot of information about what’s going on in the world out there and see if you can make something of it.

A lot of people have been trained and taught that one shouldn’t put writing or blog entries out into the world that haven’t been perfected, proven, polished.  Many of us from our own places of perspective, education, training, and self-image tell ourselves and each other that that written output over there is incorrect, lacks critical thinking, or is [insert here you favorite form of pejorative dismissal].

But writing and blogging can be a place where outlandish new ideas are put out into the social milieu in a way that enables further correction, re-construction, more game-playing, re-writing. They get other people to think and say “No, that’s not right because…” or maybe “that might be right; here’s another piece of confirmatory data” or, better yet, “that analysis needs to be re-jumbled and it will tell you this”.

People often don’t know what to make of what I say.  People have not known what to make of me since I was a toddler. I’m used to it.

Such may have been the case when I expounded on topics that have received widespread attention, the topics of Jade Helm ( http://www.thesullenbell.com/2015/06/16/warfare-on-domestic-politics/ ), the militarization of American police agencies, and the extensive work being done by DARPA ( http://www.thesullenbell.com/2016/08/20/engineering-human-evolution/) focused on the development of a SuperSoldier and other radically-ramped-up enhancement of human capacities and capabilities.  See the latest study on physical and cyber Terminators, weapons that do not have a human in the loop. “… Machines and computers can process much more data much more quickly than can humans, ‘enabling the U.S. to act inside an adversary’s operations cycle.’…”  AI meets the OODA Loop.

Add to this the widespread multi-agency governmental acquisition of hundreds of millions of hollow-point forty-caliber ammunition.

http://www.breitbart.com/big-government/2016/09/07/commander-chief-forum-hillary-pushes-gun-control-as-tool-in-war-on-terror 

Are those hundreds of millions forty-caliber hollow-point rounds intended for the forthcoming Earth-based war with extra-terrestrials?

Extra-terrestrials?  Aliens?  You don’t mean to say that you believe in aliens now, do you?

I’ve always been agnostic. I’ve never seen one, nor a unidentified flying anything.  But some pretty smart people are suggesting that the topic deserves our attention.

“When investigating financial fraud you encounter a force field that protects it across the board. It’s a matter of policy, it’s built into the structure. It has had an enormous support from a lot of people.”

Catherine Austin Fitts, Secret Space Program conference 2014

https://secretspaceprogram.org/media/catherine-austin-fitts-4/

Here’s a very long (almost four hours) videotape presentation by Steven M. Greer, M.D., founder of The Disclosure Project, on the deep state and extra-terrestrials. It was filmed at the “workshop held on Nov 21, 2015 in Washington DC. This expose includes: how secrecy is maintained; lists of bases and corporations involved; documents; how the black budget is funded; the connection between drug running and the secret gov’t , how these unacknowledged special access projects work and much more. He discuses disclosure, ufo sightings, EBEs, CIA, NSA, FBI, NSA first contact and more.”

It’s almost four hours long. It’s been left on autoplay; look down to the right for what’s beyond Greer.

https://www.youtube.com/watch?v=CfIetGulZhE

See also:

http://www.earthportals.com/Portal_Messenger/greer.html

http://disclosureproject.org

http://www.siriusdisclosure.com

http://drgreersblog.disclosureproject.org/?page_id=14

****

Secret Space Program Breakaway Civilization Exposed by Leading Researchers

https://www.youtube.com/watch?v=Gbb_-PzPGhI (40:00)

look down to the right

****

Media Payload: Life on Other Planets

August 31st, 2016 by Kevin

I can’t believe that nobody let me know about the clip of Bill Clinton (on Jimmy Kimmel) mimicking Ronald Reagan’s alien threat speeches from the 1980s.

http://www.cryptogon.com/?p=49475  

There are multiple videos at this link, and Kevin asks a question.  Check out the comments too.

****

http://www.dailymail.co.uk/news/peoplesdaily/article-3779848/The-135-million-alien-scanner-Incredible-gallery-shows-Chinese-engineers-turn-remote-area-World-s-largest-radio-telescope.html

****

So…

given what some suggest about the probability/possibility of life off the planet and extra-terrestrial presence (in history and currently) on the plant, a search engine was asked to cough up the highest-ranking items found when asked about extraterrestrials on earth.

Here’s what that search found:

http://www.bibliotecapleyades.net/imagenes_titulos/vidaalien_extraterrestrialbase_top1.gif

by Richard Boylan, Ph.D.

from Boylan Website

“… when official public announcement of the extraterrestrial presence occurs, “they will be the ones introduced to Earthlings; ’Oh, by the way, we want to welcome our neighbors from the Pleiades, who by the way have been here since [the beginning of Earth] time, but [are] actually living in our place, date, space and time.’” “They are the diplomatic corps.”

http://www.bibliotecapleyades.net/vida_alien/extraterrestrialbase.htm

****

http://www.drboylan.com/familyreunion.jpg

http://www.drboylan.com

[loaded with information]

****

 

 –  Electromagnetic Fusion and ET Space Technology

 

 –  Extraterrestrial Technologies and Viable Counter Strategies

 

 –  Extraterrestrial Technology and Edgar Rothschild Fouche

 

 –  Extraterrestrial Technology, The Black Budget, and International Politics

 

 –  Fiber Optics, Supertenacity, and Other Artifacts – from ‘The Day After Roswell’

 

 –  Historic Interview Reveals Government Secrets Learned from Extraterrestrials

Just a very small sampling of what can be found here:

http://www.bibliotecapleyades.net/ciencia/ciencia_extraterrestrialtech.htm#menu 

 

****

 

http://www.bibliotecapleyades.net/extensive_material_on_underground_Alien_Bases 

****

A BRIEF SUMMARY OF EXTRA-TERRESTRIALS

THE GOOD, THE BAD AND THE TOURISTS

by

Robert M. Stone, M.S.

An Edited Version of a Presentation at the 1997 Ozark UFO Convention:

EXTRA-TERRESTRIAL INTERVENTION: HYBRIDS, GENETIC ENGINEERING AND THE SECRET LIFE

http://www.geohanover.com/docs/tourist.htm

 

****

 

Scientists Find Extraterrestrial Genes In Human DNA

Do civilizations of advanced human beings exist scattered in the Galaxy? 

by John Stokes

****

Look around when you open this web site: it is a major portal

http://www.educatinghumanity.com/2014/10/why-ufos-visit-earth.html 

****

The Sirians, The Arcturians, the Pleiadans, and Ashtar Command 

http://siriusascension.com/extraterrestrials.htm

****

ANNOUNCEMENT OF EXTRATERRESTRIAL CONTACT: TALKING POINTS

http://www.siriusdisclosure.com/ce-5-initiative/materials/talking-points/ 

****

With regards to dark and light

http://goldenageofgaia.com/disclosure/negative-alien-races/dark-aliens-longer-approach-earth/ 

****

https://www.quora.com/If-extra-terrestrials-attacked-the-Earth-would-humans-stand-a-chance-of-repelling-them

****

http://www.aliens-everything-you-want-to-know.com/image-files/coverartn.jpg

http://www.aliens-everything-you-want-to-know.com

32 subdivisions or embedded links

****

The Alien Presence on Earth

http://www.greatdreams.com/1953-aliens.htm

****

A Biological Guide To Extraterrestrials

By Gary Pit

A Classification Based On Contact Accounts 

****

Nine Theories about Extraterrestrial Contact (2006)

http://www.metahistory.org/gnostique/archonfiles/NineTheories.php

****

Descriptions and Differentiations among Five Major Types of Alien Beings

http://www.arcturi.com/index.html 

****

332 articles archived since 1845

http://www.scientificamerican.com/extraterrestrial-life/

****

Richard Dolan on what happens after “disclosure”

https://www.youtube.com/watch?v=6ZikgXoewJw&feature=youtu.be

[work down]

****

Richard Dolan – Are ET’s Walking Among Us Right Now? (FULL INTERVIEW – Exclusive!)

https://www.youtube.com/watch?v=JbVyST3W9s0 

Richard Dolan Knowledge of Extraterrestrials [FULL VIDEO]

https://www.youtube.com/watch?v=l12JtcUDZaw 

 

****

European Commission President Says He Spoke to Leaders of Other Planets About Brexit

September 8th, 2016 by Kevin

Via: Exopolitics:

In a speech before the European Parliament discussing the consequences of the Brexit vote, the President of the European Commission, Jean-Claude Juncker, made the stunning comment that he had spoken about it to “leaders of other planets.”

The official transcript released by the European Commission has been edited to remove the reference to “leaders from other planets”. The transcript now reads:

J’ai vu et entendu et écouté plusieurs des dirigeants. Ils sont très inquiets ….

“I saw and heard and listened to several executives. They are very worried …”

Yet, when one listens to an audio loop of what Junker’s actually said, he very clearly includes the phrase “dirigeants d’autres planets,” which translates as “leaders of other planets,” as pointed out by native French speakers discussing Junckers speech, and also by Google Translate.

Research Credit: TB

Posted in [???], Elite, Social Engineering, UFOs

 

battle lessons

battle lessons

Battlefield Lessons Applied to Civilian Life

Someone who spent a lifetime immersed in healthcare leadership, knowing my pastime of military wargaming and simulation, sent me an article which describes a hospital administration “staff ride” across the fields at Gettysburg.  I applaud the thought, having wrung lessons about mass casualty incident response from repeated simulations of the Battle of the Bulge. But I caution against a wholesale rush to mimic these attempts.

The writer of the article assumes that everyone knows about  Confederate General Ewell’s failure to take the Heights. I think it possibly fool-hardy to take a snapshot of a moment in time and think that one can extrapolate from that some bit of wisdom that can be used in any organization because “leadership” retains the same form in any world.  On this particular event involving people from a hospital in Florida, perhaps the fellow conducting the staff ride gave a more complete explanation than did the author who condensed it down to a short article.

The Battle of Gettysburg, by the way, is probably the most intensely study battle in history.  YouTube has hours and hours of staff rides conducted by historians and military experts under the aegis of the US Army War College. Equally, there are many tabletop and electronic simulations of the battle through which you can stick you toe into those waters. Reading military history is tremendously worthwhile. Simulations abound.  Examples on the European continent, as well as from the Revolutionary War, other battles in the Civil War, and more can be found. Be wary of thinking that you learned something.

In the case of Gettysburg and the article for hospital administrators, I can see at least three or four major items that were or are not considered. First is the degree of desperation present among the Confederates.  While it was true that they had just completed a short strong of stunningly successive battles; they were the results of having been out-thought, out-generated and having made fewer critical blunders. Second is that fact that the soldiers were underfed and had marched long distances; that’s in great part why they were in Pennsylvania, the breadbasket of the Union. Third is the fact that their cavalry, their eyes and ears and their most rapid form of advance, was — under Stuart’s direction — absent from the battle. Fourth is the fact that the troops under Ewell’s command who could have taken the Heights had already marched 30 miles to arrive; the early-arriving units suffered significant casualties during massive assaults on Oak Ridge.

Finally, their most audacious leader, the one who units played critical roles in those recent successes, the fellow who led what was known as the foot cavalry, was no longer present to lend and inspirationally direct his men to accomplish those rapid marches.  “Stonewall” Jackson had been mortally wounded just before Lee’s move North and his absence was surely measured on the “morale” scorecard. As has been noted, Jackson and Lee worked well together because they were frequently of the same mind; the subordinate responded well to suggestion, and Jackson’s flank attack at Chancellorsville resulted from spartan discussion and a suggestion.

Leadership cannot be discerned in a single moment.   Gettysburg is well-studied because, in its early moments, it is an example of a “meeting engagement”, “a combat action that occurs when a moving force, incompletely deployed for battle, engages an enemy at an unexpected time and place.”

A meeting engagement is a dynamic event; it is always changing.

Leadership is not tactics, nor strategy, nor even management. If you want to study management, start with “A Passion for Excellence”.  If you want to study strategy, start with a treatise on the art of the indirect approach known simply as “Strategy” and continue on to Sun Tsu and Boyd’s OODA Loop.

If you want to study military leadership, start with this book by this man, in which he described five traits of an effective leader: Will, intellect, courage, presence, and energy.

There is more here,  http://guidestarinc.com/miltary-leadership-skills/, but find a good used copy of the book and spend a companionable day or two with it. Leadership is spelled with a C, he says, and the whole idea of emotional intelligence comes into focus too.

You need not spend a lot of time reading the history of battles past; you are immersed in a massive battle right now.  Look around you, and open your eyes.

****

One’s true capacity for moving,

or being moved, can be achieved

only when one’s commitment to others

is in fact connected to and derived from

his primary commitment to himself.

When we find this kind of alignment of purpose,

there is a harmony of motivation

that can provide the fuel and clarity

to overcome great obstacles

in the pursuit of great challenge.

from The Inner Game of Work, by W. Timothy Gallwey

http://boydownthelane.com/tag/leadership/ 

 

Wood’s book is summarized on pages 21 through 25 in http://boydownthelane.com/wp-content/uploads/2015/06/Tab-N-Leadership.pdf 

See also 

https://cryptome.org/2016/09/game-war-v-game-life.htm

bypassed by reality

bypassed by reality

 

9/11 Truth floundering

Maginot Line strategic thinking/action style bypassed by reality

 

Angry combative egocentric self-promotion, unsubstantiated claims about disinformation and more, and endless years-long debate about minutiae combine get in the way of recognizing that the perps have thus far succeeded in placing themselves beyond the possibility of being brought to justice.  (They run the justice system; they run the information systems; they have established pervasive surveillance; they own and possess most if not all the weapons.)

It should be noted that on the forthcoming anniversary, during a public event in New York City, there will be a “day-long evidentiary hearing on the World Trade Center’s destruction, which will be conducted by a panel of esteemed lawyers.

More info

Tickets

• Daniel Sheehan, litigated cases related to the Pentagon Papers and the Iran/Contra Affair;

• Judge Ferdinando Imposimato, Honorary President of the Supreme Court of Italy;

• Richard Gage, AIA, AE911Truth

• Dr. J. Leroy Hulsey, University of Alaska Fairbanks;

• Wayne Madsen, J. Michael Springmann

• Mark Crispin Miller, professor of Media, Culture, and Communication at NYU

• William Pepper, International Human Rights attorney”

In theory, I’d heard it said, that this group will investigate which legal venue is most appropriate to present whatever they decide is actionable evidence. [The event can be seen by “live stream” and will eventually be encapsulated in a video.] Described as the most exciting event in the 9/11 Truth movement in some time, it might also come to be seen as its last gasp.

(I’m not a lawyer, never played one on TV, and didn’t stay last night in any of the right inns, but I’ve wondered before why, if a case can be formally entered, the legal process of discovery can’t be used as a form of leverage, a can-opener.)

Highly recommended by several respected and persevering truth activists is this 2-hour long Demolition of Truth: Psychologists Examine 9/11 – Broadcast Version:

https://www.youtube.com/watch?v=FXH-TaZEPq0&feature=youtu.be

a video which “presents testimony from highly-credentialed scientists, engineers, and military experts, including Dr. Robert Bowman, Dr. Lynn Margulis, Dr. Niels Harrit, and many more. This expert testimony is interwoven with analyses by social scientists who examine the psychological impact of 9/11 and the phenomena that have kept us blinded to truths too painful to acknowledge, even to ourselves.

The film concludes with steps we can take, individually and collectively, toward healing. An epilogue by actor Ed Asner summarizes these analyses, emphasizing the role played by mainstream media that, lamentably, parrot their government sources rather than question them.”

 

Those highlights aside, the 9/11 Truth movement, hard to find unless you know where to look for it, is splintered and struggling to find methods, tools, techniques, energized volunteers, and a lack of rancor.

It has been out-thought, out-spent by many many orders of magnitude, infiltrated, COINTELPRo’ed, and turned into an utterly confusing jiggly pile of gelatinous goop.

Most recent controversies include the ages-old “plane vs. no plane” theories for the Pentagon site, multiple theories about what if anything actually slammed into the side of the WTC Towers, and the exact nature of the technologies and techniques that were used to bring down three skyscrapers.

http://moonrockbooks.com/wp-content/uploads/2016/07/AmericaNukedOn911Cover.jpg

I don’t care if my first responder rescuer brethren and the victims were blown up or down, by thermite or nukes, with Saudi or Israeli help; I want to see the perps walk to the gallows, and everyone who is or was complicit in the cover-up shunned for life.

One outgrowth of the Bernie Sanders for President campaign is https://brandnewcongress.org/home.

Here’s the Wikipedia entry: https://en.wikipedia.org/wiki/Brand_New_Congress.

It’s certainly interesting that people have faith in campaigning at a time when the major meme is that foreign governments will hack the election, Bernie will campaign for someone backed financially by an individual proven to be working overtime at the insertion of political chaos into sovereign nation (including the US), and the US is actively involved in overturning election results in other nations.

Or maybe thinking of sweeping Congress clean is simply a successful and thriving grassroots effort rebounding in rhizome fashion from having been trampled… time will tell.

Does 9/11 justice emanate from political struggle, legal maneuvering, or transformational thinking?

Has the entire idea of 9/11 awareness been superseded, or OODA-looped?

The OODA loop is a strategic theory created by USAF Lt. Col. John Boyd.  The Wiki article on him will send you off — if you are interested — to Coram’s biography, several compendiums of briefing papers and articles, Boyd’s own “Creation and Destruction” thesis, and more. I’ve written in depth about the possible applications of this theory to the 9/11 event. [It was a multi-part series published as part of my blog at the discussion board CommonGroundCommonSense.org where I was a member and leading 9/11 truth advice. CGCS, as it was known among its members, was an outgrowth of the Kerry For President election campaign, had multiple facilitators (one of whom still blogs as Snuffysmith), and itself was heavily infiltrated by governmental employees, neocons masquerading as progressives, sayanim and others. The discussion board was eventually closed down as members left, and the text evaporated, though you can still find remnants: http://911blogger.com/node/2480.

At 9/11 Blogger, I was known as Mr. Jouet or Magmak1; Magmak1 was my user name at CGCS.

Here’s another: http://angrybearblog.com/2008/01/ooda-loop-applied.html

and a third here in the Prison Planet forum .

My point is that the 9/11 truth movement may well have been “caught responding to situations that have already changed”.

http://3.bp.blogspot.com/_r1AxIJszWSA/Syhp_GMwD6I/AAAAAAAAFeg/TGauKUFr6rI/s400/cannon1.JPG

One of the first 9/11 activists was Catherine Austin Fitts; almost immediately, she said “follow the money”, and she is an expert at tracking money. One example is that her proprietary software, which was seized by the US government (along with her company) as she was hounded by legal attacks that put her in front of Stanley Sporkin, asserted effectively in August 2002 [ https://ratical.org/co-globalize/CAFmrl.html ], that multiple US government agencies “may be in a position to steal literally hundreds of billions of dollars with no one the wiser”.

A sampling of other Fitts articles:

http://www.scoop.co.nz/stories/HL0304/S00228.htm

http://www.whereisthemoney.org/hotseat/condoleezzarice.htm

http://www.dunwalke.com

Fitts was talking about covert or black budgets in 2002, and writing about narco-dollars, money-laundering et al.

Since then, we have learned that the CIA operates its own venture capital company, has been running multiple companies in the US and around the world as extensions of its operational capacities, has run candidates for the Presidency, cultivated the current occupant of the White House, continues to run what used to be called Operation Mockingbird, and much more in the world of covert ops. The informational technology tolls and companies alone would require another article; I’ve already covered Palantir extensively.

Now, you might not believe in little green men, or flying saucers, or a bunch of “conspiracy theories”, and agnostic I may personally be, never having seen any, but Fitts has persevered against personal and corporate assault, and her observations and writings have stood the test of time.  Housing bubbles. privatized prisons and Wall Street shenanigans are now understood. And she has followed her ability to see, find and follow deep state covert budgets into a multi-year and continuing survey of what she calls “space-based economies”, which border on topics like deep underground military bases, “breakaway civilization”, space travel and interstellar transport, occult energy sources, and the world of transhumanism (which has its own Presidential campaign and grass roots politics effort).  It was said recently that we are living in the era of the last members of the human race.

Preposterous? Well, go do the reading. I’ve written about the transitional end-game in engineering human evolution, paying special attention to Genetic, Robotic, Information, and Nanotechnologies which, when merged and meshed with artificial intelligence, will have a high probability of creating a “curve of change unlike anything we humans have ever seen and that each of them, taken individually, are transformative” and “each hold the potential to change human nature itself.”

N_4

Source of image:

http://www.centauri-dreams.org/?p=28833

 

If the goal is the creation of groups of new humans who will be able to think faster and more creatively, have near-photographic memories, read books with total recall and comprehension in minutes, repair their own bodies and maintain peak health, live longer, require less sleep, and communicate more quickly with greater clarity to allow coordinated action in shorter time periods, and if DARPA is well down this path already and there are hundreds of well-funded and expertly-managed corporate enterprises working on these kinds of projects, then I must respectfully submit that the 9/11 Truth movement is still searching for answers in a pile of rubble and dust that was trucked off to landfills by mob-run trucking companies to be re-engineered into something else altogether, and that what they desire, whether through political or judicial means, will soon break off and float into space.

https://www.youtube.com/watch?v=AFks9A9TCF0