Covert Harassment Conference 2014, Brussels, 20 November 2014

•November 1, 2014 • Leave a Comment

10 October 2014: Magnus Olsson announces NSA whistleblower William Binney speaking at the Covert Harassment Conference!

Title Global mind control and artificial intelligence
Summary Very few people are aware of the actual link between neuroscience, cybernetics, artificial intelligence, neuro-chips, transhumanism, the science cyborg, robotics, somatic surveillance, behavior control, the thought police and human enhancement.
They all go hand in hand, and never in our history before, has this issue been as important as it is now.
One reason is that this technology, that begun to develop in the early 1950s is by now very advanced but the public is unaware of it and it goes completely unregulated. There is also a complete amnesia about its early development, The CIA funded experiments on people without consent through leading universities and by hiring prominent neuroscientists of that time. These experiments have since the 50s been brutal, destroying every aspect of a person’s life, while hiding behind curtains of National Security and secrecy but also behind psychiatry diagnosis.
The second is that its backside –mind reading, thought police, surveillance, pre-crime, behavior modification, control of citizen’s behavior; tastes, dreams, feelings and wishes; identities; personalities and not to mention the ability to torture and kill anyone from a distance — is completely ignored. All the important ethical issues dealing with the most special aspects of being a free human being living a full human life are completely dismissed. The praise of the machine in these discourses dealing with not only transhumanism ideals but also neuroscience today has a cost and that is complete disrespect, despise and underestimation of human beings, at least when it comes to their bodies, abilities and biological functions.
Title Surviving the mind prison, organized stalking and electronic harassment
Summary It is not difficult to accept that are mechanisms in our society that try to suppress the truth. Whistleblowers,investigative journalists, activists are all being watched, and may become targeted for short or long periods. The closer to the truth and to exposing their knowledge to large groups of people, the more they are in danger from being silenced. We read in the news that they got a heart attack, committed suicide. The thought that they probably have been murdered is unacceptable with the way we have been programmed since we were born with democratic values and respect for the rule of law. Let alone we are able to think who may have planned and executed this.

Organized Stalking and Electronic Harassment are methods used to manipulate, incapacitate, torture and murder. They are part of the system that is controlling the population. A small part of the population is attacked with these methods and weapons to keep the system in control, to test new methods and weapon systems. Many are almost random victims, some are unware, most are not understanding what it is that is attacking them, they never learned about this, never read about this. The survivors call themselves Targeted Individuals. Without the internet you would never have heard of them.

Title Relationship analysis
Summary How a person is monitored by the NSA second by second, by logging all possible communication systems data and analyzing this.
Title Scalar Waves used in Mind Control
Summary Research has shown that mind control is technically done with hidden physics: scalar waves. This is a widely unknown type of waves, which have very different qualities compared to electromagnetic waves. Mind control researcher Dr. Henning Witte from Sweden presents a description of scalar waves, how they are used in mind control and how to shield against them.
Title Bright light on black shadows, man is a mind, not a body
Summary Russian general Alexei Savin stated in Pravda that a human being is an information and electrical system, which can be influenced from outside. First attemps to influence human behaviour, attitudes and feelings were attempted already 1874 in Good Smaritan Hospital in Dayton, Ohio, USA when a female patient got electrodes placed in her brain. She died after the operation. In Sweden Dr Alm inserted electrodes into the skull of babyboy Bengt in 1946 without the knowledge of the parents in Saska Childrens Hospital in Stockholm. Later his mother told me of his lifelong suffering as an adult as consequence of this operation.
Today microchips of the size of 2 micromillimeter (hair diameter is 50 micromm) are inserted into general population without their consent e.g. in vaccinations-like the “swineflu” vaccin for their total control. Medical personel working in the field get different information of vaccine content than researchers and “insiders” who follow UN Agenda 21 for depopulation by 85% of the world population with various means.
All medical schools teach that one is mentally ill if you hear voices in your head, feel that you are surveilled (often by neighbours), poisoned, beamed with microwaves and laserattacks, feel that your thoughts and dreams are read and reacted to by strangers and if you experience contact with the energy of a deceiced relative, which according to European values gallup 1984 already 41% of Icelanders do.
Never do medical schools teach the differential diagnose of MK and the fact that this military technology exists and has been used for over half a century in total secrecy. In military mind control is listed as a “nonlethal “weapon but in psychiatry the whole subject is tabu and considered as sign of mental illness to cover up unethical research on humans. UNIDIR, UN institute for disarmament research in Geneva has yr 2002 listed mind control as a weapon of mass destruction along side with atom bombs! Man is a mind, not a body when our body consists of 70% water and our brain 87% water so our energy holds us together. According to Einstein energy never disappears,but only changes form.
He who controls the minds of men controls the world!
Title The Ways to Defeat the Secrecy surrounding the existence of mind control technology
Summary The only reason why the mind control technology can be used on innocent people is that it is classified. The governments are perfectly aware of the fact that once the citizens know that the government is in a possession of technology that can control the thinking and bodily functions of the citizens, the citizens would demand immediate and verifiable ban of those technologies.
For that matter the victims of experimentation with those technologies, the classification of those technologies is the major obstacle on their way back to freedom and good health. Once the classification is defeated, they will be able to demand the verification of the use of those technologies against their persons and reimbursement for the damages caused to their lives by this technology.
Their fight for freedom and good health should be directed at reaching this goal. The major problem is that they are the only group interested in this struggle, and they are small in numbers.
There are several ways to get attention of larger masses of people or lawmakers or government officials: 1) Distributing the information on the existence of mind control technologies via internet with viable evidence.
2) Informing the deputies in parliaments about the existence of those technologies since most of them do not have security clearances to obtain this kind of information.
3) Procurement of evidence of people being exposed to those technologies and presenting it to the media.
(Alfred Lambremont Webre is not present in Brussels but will speak to you via a prerecorded presentation)
Title Using The Law to Prevent Covert Robotization, Torture, & Harassment of Humanity
Summary Over the aeons, humanity has turned to The Law to protect itself against preventable aggression, ranging from genocide to crimes against humanity to aggressive war. New physics principles have facilitated the covert commission of these horrendous war crimes on a mass scale never envisioned before, not detectible to conventional analysis, and able to evade enforcement standards of existing international humanitarian law and criminal law. This presentation will summarize how The Law can be used to ban new physics principles weapons, and prevent covert robotization, torture and harassment of humanity.
Title My story in chronological order
Summary
– Becoming targeted and how I let this harm my life.
– The unanswerable questions I realised I was asking, to which targeted people often mistakenly think that they have authoritative answers.
– Why you should never say, “I know this sounds crazy, but …”.
– The “victory is just around the corner” delusion.
– The madness-sanity continuum – flying on instruments – living with unanswered questions.
– Avoid “gushing”.
– My first publications on Indy Media.
– Christians Against Mental Slavery.
– The secret power of lawlessness.
– Correspondence with the British government, and other officials
– John McMurtrey’s scientific work about voice-to-skull.
– My TV appearance.
– The civil rights rally in Houston in 2004.
– The exhibition at the Labour Party conference.
– My Gender Recognition Act court case.
– The Alliance For Change – fighting Parliamentary Elections.
– The 2005 lobbying of Congress in 2005.
– The Harassment and Torture Charity.
– John’s Less-Legal Weapons Conference (and Janes’ Less-Lethal Weapons Conference).
– World Day.
– Peer-assisted self-deprogramming.
– The Deborah Interviews Show.
– The charity shop I opened.
– The 4th and 5th European Symposiums on Non-lethal Weapons, my paper and Walter Madlinger’s, and Colonel John B Alexander.
– The death of Darrim Daoud and the coroner’s inquest and my court case about it.
– The loophole in the Regulation of Investigatory Powers Act and the test case presently before the UK courts.
– Getting your priorities right.
– Whom can you trust? Saviours, celebrities and whistle-blowers
– The self-help e-books.
– The future of activism.
More to be added …

Emerging Cognitive Neuroscience and Related Technologies ( 2008 )

•September 23, 2014 • Leave a Comment

Emerging Cognitive Neuroscience and Related Technologies

page 1

CONTEXT
The intelligence community (IC) faces the challenging task of analyzing extremely large amounts of information on cognitive neuroscience and neurotechnology, deciding which of that information has national security implications, and then assigning priorities for decision makers.1 It is also challenged to keep pace with rapid scientific advances that can only be understood through close and continuing collaboration with experts from the scientific community, from the corporate world, and from academia. The situation will become more complex as the volume of information continues to grow. The Committee on Military and Intelligence Methodology for Emergent Neurophysiological and Cognitive/Neural Science Research in the Next Two Decades was tasked by the Technology Warning Division of the Defense Intelligence Agency’s (DIA’s) Defense Warning Office to identify areas of cognitive neuroscience and related technologies that will develop over the next two decades and that could have military applications that might also be of interest to the IC. Specifically, the DIA asked the National Research Council (NRC) to perform the following tasks:

Review the current state of today’s work in neurophysiology and cognitive/ neural science, select the manners in which this work could be of interest to

1The intelligence community is made up of approximately 16 entities across the executive branch. A detailed listing of all IC members is found on the United States Intelligence Community Web site at http://www.intelligence.gov/1-members.shtml. Last accessed on March 17, 2008.

page 2

national security professionals, and trends for future warfighting applications that may warrant continued analysis and tracking by the intelligence community,2
Use the technology warning methodology developed in the 2005 National Research Council report Avoiding Surprise in an Era of Global Technology Advances (NRC, 2005) to assess the health, rate of development, and degree of innovation in the neurophysiology and cognitive/neural science research areas of interest, and
Amplify the technology warning methodology to illustrate the ways in which neurophysiological and cognitive/neural research conducted in selected countries may affect committee assessments.

The label “cognitive” in the title and elsewhere in this report is used in a broad sense, unless specifically noted otherwise in the report itself, to refer to psychological and physiological processes underlying human information processing, emotion, motivation, social influence, and development. Hence, it includes contributions from behavioral and social science disciplines as well as contributing disciplines such as philosophy, mathematics, computer science, and linguistics. The label “neuroscience” is also used in a broad sense (unless specified otherwise) and includes the study of the central nervous system (e.g., brain) and somatic, autonomic, and neuroendocrine processes.

This summary includes the committee’s key findings and recommendations, numbered to facilitate access to related text in Chapters 2-5, which also include additional findings.

THE BOTTOM LINE

Cognitive neuroscience and its related technologies are advancing rapidly, but the IC has only a small number of intelligence analysts with the scientific competence needed to fully grasp the significance of the advances. Not only is the pace of progress swift and interest in research high around the world, but the advances are also spreading to new areas of research, including computational biology and distributed Human-Machine systems with potential for military and intelligence applications. Cognitive neuroscience and neurotechnology constitute a multifaceted discipline that is flourishing on many fronts.

Important research is taking place in detection of deception, neuropsychopharmacology, functional neuroimaging, computational biology, and distributed human-machine systems, among other areas. Accompanying this research are the ethical and cultural implications and considerations that will continue to emerge and will require serious thought and actions. The IC also confronts massive amounts of pseudoscientific

2 In negotiation with the sponsor on the statement of task, this item was intentionally left broad in scope to allow the committee to select the areas within the field of cognitive neuroscience that it believed should be of interest to the intelligence community. The selected areas of interest are discussed in Chapters 2 through 4.

page 3

information and journalistic oversimplification related to cognitive neuroscience. Further, important research outside the United States in cognitive neuroscience is only just beginning, making it almost impossible to attempt to accurately assess the research at this point in time.

Key Finding (Finding 5-5). The recommendations in this report to improve technology warning for cognitive neuroscience and related technologies are unlikely to succeed unless the following issues are addressed:

Emphasizing science and technology as a priority for intelligence collection and analysis.
Appointing and retaining accomplished IC professionals with advanced scientific and technical training to aid in the development of S&T collection strategies.

Increasing external collaboration by the IC with the academic community. It should be noted that some components of the IC have made great strides in reaching out to the academic community.

Key Recommendation (Recommendation 5-1). The intelligence community should use a more centralized indication and warning process that involves analysis, requirement generation, and reporting. Engagement with the academic community is required and is good, but it is not now systematically targeted against foreign research.

Challenges to the Detection of Psychological States and Intentions via Neurophysiological Activity

Great progress has been made over the last quarter century, particularly the last 10 to 15 years, in understanding the physiological and neural bases of psychological processes and behavior. More progress is expected as more sophisticated biopsychosocial theoretical models are developed and tested using ever more sophisticated neurophysiological assessment technology. In the applied sector, there will likely be an increased ability to identify valid neurophysiological indicators of performance to exploit affective, cognitive, and motivational states and evaluate the effectiveness of training techniques and the readiness of combat units. The hurdles that must be overcome in order to detect individual psychological states are high: They include a better understanding of neural plasticity and variability as well as real-time measurements of neural function with accurate spatial localization. Continued improvements in technology will facilitate the detection of psychological states. Although technology for assessing the effects of the peripheral nervous system on glandular function has been available for many years, technology for assessing the effects of the central nervous system has been developed more recently. For example, inexpensive, noninvasive endocrine

page 4

assays and noninvasive high-density electroencephalography and functional brain imaging technology have progressed remarkably. Newer brain imaging technologies promising both high spatial and high temporal resolution of brain processes began to appear only in the past decade. It remains to be seen how technology will evolve and how it will aid in the detection of psychological states and lies by neurophysiological means.

Key Finding (Finding 2-2). The committee recognizes the IC’s strong interest in improving its ability to detect deception. Consistent with the 2003 NRC study The Polygraph and Lie Detection, the committee uniformly agreed that, to date, insufficient, high-quality research has been conducted to provide empirical support for the use of any single neurophysiological technology, including functional neuroimaging, to detect deception.

Opinions differed within the committee concerning the near-term contribution of functional neuroimaging to the development of a system to detect deception in a practical or forensic sense. Committee members who conduct neuroimaging research largely agreed that studies published to date are promising and that further research is needed on the potential for neuroimaging to provide a more accurate method to determine deception. Importantly, human institutional review board standards require, at a minimum, that individuals not be put at any greater risk than they would be in their normal everyday lives. The committee believes that certain situations would allow such testing under “normal risk” situations; although the committee strongly endorses the necessity of realistic, but ethical, research in this area, it does not specify the nature of that research in this report.

Key Recommendation (Recommendation 2-1). The committee recommends further research on multimodal methodological approaches for detecting and measuring neurophysiological indicators of psychological states and intentions. This research should combine multiple measures and assessment technologies, such as imaging techniques and the recording of electrophysiological, biochemical, and pharmacological responses.

Resources invested in further cognitive neuroscience research should support programs of research based on scientific principles and that avoid the inferential biases inherent in previous research in polygraphy.

Neuropsychopharmacology

Drugs available today can modulate and even control some aspects of human psychology. New types of psychopharmacological drugs and related delivery systems could increase the ability to harness a drug’s effects to human psychology. Current models of brain and nervous system functioning can help to identify the

page 5

likely psychological effects of known drugs. Changes in models of brain function may, however, create new and surprising ideas about how, when, where, or why drugs produce their effects; about what those effects are; about which chemicals are able to alter human functioning; and about ways to enhance, minimize, or counteract drug effects. It is important to realize that the drugs that changed psychiatry in the mid-twentieth century were not generally predicted by psychological or pharmacological models of their time. Rather, the history of neuropsychopharmacology illustrates how a particular cultural, medical, or research climate may fail to anticipate new drugs, new ways of using drugs, or new drug effects.

Neuropsychopharmacological research shows that drugs can be utilized to achieve or modulate abnormal, diseased, or disordered psychology and can also bring about normal, healthy, or optimal function. One new and important capability of neuropsychopharmacology is cognition enhancement. The United States and other countries are now devoting considerable research to the discovery and development of pharmacological cognition enhancers. Emergent technologies may allow new pathways for drug delivery in addition to new drugs or new uses for existing drugs. Nanotechnologies will allow delivery of drugs across the blood-brain barrier in ways not now possible. Finally, there is broad international interest in this kind of research; specifically, in Asia there is substantial research in drug delivery to the brain.

Research challenges include the identification of new targets for drugs, new methods of altering cell function, new drug delivery systems, strategies to direct or control drug effects, and attempts to achieve targeted psychological effects.

Key Finding (Finding 2-4). Technological advances will affect the types of neuropsychopharmacological drugs available and methods for drug delivery. For the IC, nanotechnologies that allow drugs to cross the blood-brain barrier, increase the precision of delivery, evade immune system defenses, evade metabolism, or prolong actions at cellular or downstream targets will be of particular importance. These technologies will increase the likelihood that various peptides, or other brain proteins, could ultimately be utilized as drugs. Development of antidotes or protective agents against various classes of drugs that could be used by an enemy force will also be important.

Functional Neuroimaging

Functional neuroimaging uses technology to visualize qualitative as well as measure quantitative aspects of brain function, often with the goal of understanding the relationships between activity in a particular portion of the brain and a specific task, stimulus, cognition, behavior, or neural process. Electroencephalography and magnetoencephalography measure localized electrical or magnetic fluctuations in neuronal activity. Positron emission tomography,

page 6

functional magnetic resonance imaging, near-infrared spectroscopic imaging, and functional transcranial Doppler sonography can measure localized changes in cerebral blood flow related to neural activity. Positron emission tomography and magnetic resonance spectroscopy can measure regional modulation of brain metabolism and neurochemistry in response to neural activity or processes. These functional neuroimaging modalities are complementary and offer different windows into complex neural processes. Accordingly, simultaneous multimodal imaging is an emerging area of great interest for research, clinical, commercial, and defense applications.

Functional neuroimaging technologies are commonplace in research and clinical environments and are affecting defense policy. Their continued development and refinement are likely to lead to applications that go well beyond those envisioned by current cognitive neuroscience research and clinical medicine. Some very advanced work will occur outside the United States because some new technologies are first being deployed abroad.

Advanced types of functional neuroimaging technology are likely to be deployed in areas such as business, human performance, risk assessment, legal applications, intelligence, and the military.

Real-time, continuous readouts of neuroimaging results will become increasingly important for the IC and the Department of Defense (DOD), which will evaluate them for temporal sequences that indicate psychological or behavioral states. While predictions about future applications of technology are always speculative, emergent neurotechnology may well help to provide insight into intelligence from captured military combatants, enhance training techniques, enhance cognition and memory of enemy soldiers and intelligence operatives, screen terrorism suspects at checkpoints or ports of entry, and improve the effectiveness of human-machine interfaces in such applications as remotely piloted vehicles and prosthetics.

Key Finding (Finding 2-5). Functional neuroimaging is progressing rapidly and is likely to produce important findings over the next two decades. For the intelligence community and the Department of Defense, two areas in which such progress could be of great interest are enhancing cognition and facilitating training. Additional research is still needed on states of emotion; motivation; psychopathology; language; imaging processing for measuring workload performance; and the differences between Western and non-Western cultures.

Computational Biology Applied to Cognition, Functional Neuroimaging, Genomics, and Proteomics

Computing is used pervasively today in the fields of neuroscience and cognition for analysis and modeling. It is used to analyze the enormous amounts of data from genome sequencing, ribonucleic acid (RNA) expression arrays, proteomics, and neuroimaging and to correlate them with experimental results so

page 7

as to eventually understand the biology of the nervous system and of cognition. In modeling, computing is used to express a hypothesis in concrete mathematical terms. The model is then simulated in an attempt to validate the hypothesis and/or make a prediction. Mathematical models of various dynamical qualities can be constructed and used to make predictions. Mathematical models have been used, for example, to correlate sleep and performance by measuring both and using the relationship to make a prediction. The distinction between modeling and analysis is not always clear because many types of data analysis make basic assumptions about the data fitting a specific model.

The larger issue is whether a cognitive system can be constructed in the next two decades that, while not precisely mimicking a human brain, could perform some similar tasks, especially in a particular environment. Success would be determined not by how closely the system resembled the brain in its mechanisms of action, but by the degree to which the system performed specific cognitive tasks the same way as a typical human operator. This search for what is known as artificial intelligence has for many decades been a goal of computing efforts.

Perhaps most revolutionary would be an intelligent machine that uses the Internet to train itself. Currently, the Internet is by far the closest we have come to a total database of knowledge. One can imagine an intelligent system that continuously monitors and processes not only accumulated knowledge but also public and nonpublic information on current events. Modern search engines do that in a way but serve more to catalog knowledge than to come to intelligent conclusions. However, if a system that reasoned like a human being could be achieved, there would be no limit to augmenting its capabilities. Many efforts, large and small, to reach this goal have not yet succeeded.

Key Finding (Finding 3-6). As high-performance computing becomes less expensive and more available, a country could become a world leader in cognitive neuroscience through sustained investment in the nurture of local talent and the construction of required infrastructure. Key to allowing breakthroughs will be the development of software-based models and algorithms, areas in which much of the world is now on par with or ahead of the United States. Given the proliferation of highly skilled software researchers around the world and the relatively low cost of establishing and sustaining the necessary organizational infrastructure in many other countries, the United States cannot expect to easily maintain its technical superiority.

Key Recommendation (Recommendation 3-1). The intelligence community, in collaboration with outside experts, should develop the capability to monitor international progress and investments in computational neuroscience. Particular attention should be given to countries where software research and development are relatively inexpensive and where there exists a sizeable workforce with the appropriate education and skills.

page 8

Distributed Human-Machine Systems

Advances in neurophysiological and cognitive science research have fueled a surge of research aimed at more effectively combining human and machine capabilities. Results of this research could give human performance an edge at both the individual and group levels. Though much of this research defies being assigned rigid boundaries between disciplines, for the sake of convenience the committee has organized its discussion into four areas:

Brain-machine interfaces. This category includes direct brain-machine interfaces for control of hardware and software systems. Traditional human interface technologies, such as visualization (Thomas and Cook, 2005), are not considered in this report.

Robotic prostheses and orthotics. Included here are replacement body parts (robotic prostheses) and mechanical enhancement devices (robotic orthotics) designed to improve or extend human performance in the physical domain.

Cognitive and sensory prostheses. These technologies are designed to improve or extend human performance in the cognitive domain through sensory substitution and enhancement capabilities or by continually sensing operator state and providing transparent augmentation of operator capabilities.

Software and robotic assistants. These technologies also are designed to improve or extend human performance in the physical and/or cognitive domains. However, unlike the first three areas, they achieve their effect by interacting with the operator(s) rather than as assistants or team members in the manner of a direct prosthetic or orthotic extension of the human body, brain, or senses. Agent-based technologies for social and psychological simulations are not considered in this report.

Research in artificial cognitive systems and distributed human-machine systems has been hampered by unrealistic programs driven by specific, short-term DOD and intelligence objectives. Another problem is the inadequacy of current approaches to research metrics. Resolving this problem would enable meaningful progress. Finally, the study of ethical issues related to the design and deployment of distributed human-machine systems is virtually in its infancy and this is deplorable given the great potential of such systems for doing good or harm.

Key Finding (Finding 3-7). Unlike in the domain of cognitive neurophysiological research, where the topics are constrained by certain aspects of human physiology and brain functioning, progress in the domain of artificial cognitive systems and distributed human-machine systems (DHMS) is limited only by the creative imagination. Accordingly, with sustained scientific leadership there is reason for optimism about the continued development of (1) specialized artificial cognitive systems that emulate specific aspects of human performance and (2) DHMS, whether through approaches that are faithful to cognitive neurophysiology, or

page 9

through some mix of engineering and studies of human intelligence, or by combining the respective strengths of humans and automation working in concert. Researchers are addressing the limitations that made earlier systems brittle by exploring ways to combine human and machine capabilities to solve problems and by modeling coordination and teamwork as an essential aspect of system design.

Cultural Underpinnings of Neuroscience

Basic and applied social science research into various aspects of culture can help the IC to understand the current status of cognitive neuroscience research and anticipate the directions it might take over the next 20 years.3 Using social and cultural modeling and frameworks to predict behavior and intentions in an intelligence and military context will require learning how cultural groups are organized. The IC’s understanding of culture will be enhanced if it takes a pluralist and globalist view of how cultural groups are organized, and how research is conducted and applied in the field of culture studies. For example, research into intercultural management and leadership can warn IC and national security analysts not to assume that Western theories can be universally applied in multicultural situations. Concepts found in cultural research serve as intervening variables in neuroscience research, providing an understanding of how culture impacts human cognition and affect with respect to brain functioning, meaning, and behavior in diverse social and political situations.

Culturally accurate intelligence and strategic analysis have long been of interest to IC and national security analysts. Conventional social science models based primarily on Western ideas may be compromised by invisible biases. The need is growing to understand hearts and minds at a strategic level because of their potential to exacerbate insurgencies and other problems. Deficiencies in cultural knowledge at the operational level can also adversely affect public opinion. Likewise, ignorance of a culture at the tactical level could endanger both civilians and troops. Advances in inferring cross-cultural intention and meaning are possible with a comparative cultural research agenda. Cross-cultural comparative research can be pursued to test whether the brain function and human behavior assumed by European and U.S. psychological models are universal.
Key Finding (Finding 4-1). There is a growing awareness in the U.S. government that effective engagement in a complex world—commercially, militarily, and diplomatically—will increasingly require an unbiased understanding of foreign cultures. Research is enhancing understanding of how culture affects human

3 For purposes of this report, “culture” is defined as a collective identity whose shared membership has distinct values, attitudes, and beliefs. Behavioral norms, practices, and rituals distinguish one cultural group from another. Distinct cultural groups are defined around regional, political, economic, ethnic, social, generational, or religious values.

page 10

cognition, including brain functioning, and is even suggesting a link between culture and brain development. The U.S. military is placing greater emphasis on cultural-awareness training and education as a critical element in its strategy for engaging in current and future conflicts. Military conflicts will increasingly involve prolonged interaction with civilian populations in which cultural awareness will be a matter of life and death and a major factor in outcomes. Similarly, political leaders, diplomats, intelligence officers, corporate executives, and academicians will need a deeper, more sophisticated understanding of foreign cultures to communicate more effectively with their counterparts in non-Western societies in the era of globalization.

Key Recommendation (Recommendation 4-1). The growing U.S. government interest in cultural training and education is well placed, and its investment in related research and development and in practical training should be substantially increased. Training programs, to be most effective, should be developed and implemented on a multidisciplinary basis. Investment should be made particularly in neuroscience research on the effects of culture on human cognition, with special attention to the relationship between culture and brain development.

Ethical Implications of Cognitive Neuroscience and Neurotechnology Evolution

Discussions of neuroethics and human experimentation for national security purposes generate unique concerns. The brain is viewed as the organ most associated with personal identity. There is sure to be enormous societal interest in any prospective manipulation of neural processes. Several internationally accepted documents guide the ethical treatment of human participants in biomedical research. The most authoritative is the World Medical Association’s (WMA’s) Declaration of Helsinki (DoH) (WMA, 1964). Although the international community largely accepts and respects the DoH, data on compliance by individual states are not available. The 1948 Universal Declaration of Human Rights in principle has global authority and is legally compelling, but is not invoked as frequently as the DoH in the context of human subject research despite its clear language about the ethical treatment of human subjects (United Nations, 1948). The oldest document, the 1947 Nuremberg Code,4 is not often cited directly as a reference document but has served as the foundation for other guiding documents, including federal regulations in the United States. More recently, the Council for International Organizations of Medical Sciences issued the International Ethical Guidelines for Biomedical Research Involving Human Subjects (Council for International Organizations of Medical Sciences, 2002). While these guidelines

4 Trials of War Criminals before the Nuremberg Military Tribunals under Control Council Law No. 10, Vol. 2, pp. 181-182. Washington, D.C.: U.S. Government Printing Office, 1949.

page 11

are very detailed, practical, and sensitive to cultural differences between nations, they do not have the same prominence as the DoH. Other documents, both national and international, offer more specific guidance on separate aspects of biomedical research (e.g., clinical trials, drug development).

The various guidelines reflect a consensus on some core beliefs, including that the research must be reviewed from an ethics standpoint before it is conducted; that the research must be justifiable and contribute to the well-being of society in general; that the risk-benefit ratios must be reasonable; that informed consent or voluntariness is needed; that there is a right to privacy; that accurate reporting of data is obligatory; and that inappropriate behaviors must be reported.

Individual nations may have their own, additional, ethical rules and regulations. The committee researched the existence and scope of such documents for two nations, Iran and China, and looked for evidence of research there into cognitive neuroscience and biotechnology, specifically for military uses. In Iran, detailed codes on medical ethics and biomedical research have been officially ratified, and international documents have also been formally endorsed. China states that it complies with the international instruments guiding research ethics. While there has been considerable talk in China about improved and more comprehensive guidelines for biomedical research with human subjects, no new documents have been ratified recently by the government.

Potential Intelligence and Military Applications of Cognitive Neuroscience and Related Technologies

Technology warning in the IC today is hampered by several factors, including the low priority it has among senior leaders; the paucity of resources invested by the community in internal science and technology capability; the continuing inadequate attention of management to the needs of IC analysts; and the need to establish close ongoing collaborations with analysts in other agencies, the scientific community at large, the corporate world, and academia, where the IC can find the most advanced understanding of scientific trends and their implications.

Although there are a handful of excellent joint research programs between the very best of U.S. universities and medical schools and foreign laboratories, programs that contain cognitive neuroscience research components or research programs are largely based on U.S. research and approaches. Relationships with foreign entities exist primarily to make use of low-cost infrastructure outside the United States, not to gain access to non-U.S. approaches and applications. These observations are not intended to impugn the IC’s current programs for cognitive research; however, identifying foreign technology surprise in scientific areas that are not represented in U.S. research is, and will continue to be, extremely difficult.

Key Finding (Finding 5-1). International market forces and global public demand have created an impetus for neuropsychopharmacology and neurotechnology

page 12

research that will lead to new technologies and drugs, particularly in areas of cognition and performance, that will include off-label uses. Off-label drug use can alert intelligence analysts to compounds, methods of administration, or risk factors that may be unknown in civilian or military medicine and can help identify profiles of unanticipated effects.

Key Finding (Finding 5-4). Rapid advances in cognitive neuroscience, as in science and technology in general, represent a major challenge to the IC. The IC does not have the internal capability to warn against scientific developments that could lead to major—even catastrophic—intelligence failures in the years ahead. An effective warning model must depend on continuous input from strong internal science and technology programs, strong interactive networks with outside scientific experts, and government decision makers who engage in the process and take it seriously as a driver of resources. All that remains a work in progress for the IC.

REFERENCES

Council for International Organizations of Medical Sciences. 2002. International Ethical Guidelines for Biomedical Research Involving Human Subjects. Geneva, Switzerland, November 2002. Available from http://www.cioms.ch/guidelines_nov_2002_blurb.htm. Last accessed June 8, 2008.
National Research Council (NRC). 2003. The Polygraph and Lie Detection. Washington, DC: The National Academies Press. Available from http://www.nap.edu/catalog.php?record_id=10420.
NRC. 2005. Avoiding Surprise in an Era of Global Technology Advances. Washington, DC: The National Academies Press. Available from http://www.nap.edu/catalog.php?record_id=11286.
Thomas, J.J., and K.A. Cook. 2005. Illuminating the path: The research and development agenda for visual analytics. Richland, WA: National Visualization and Analytics Center. Available from http://nvac.pnl.gov/agenda.stm#book. Last accessed January 10, 2008.
United Nations. 1948. Universal Declaration of Human Rights. Adopted and proclaimed by General Assembly Resolution 217 A (III) of 10 December 1948. Palais de Chaillot, Paris, December 1948. Available from http://www.un.org/Overview/rights.html.
World Medical Association. 1964. Declaration of Helsinki: Ethical Principles for Medical Research Involving Human Subjects. Adopted by the 18th World Medical Association General Assembly. Helsinki, Finland, June 1964. Available from http://www.wma.net/e/policy/b3.htm.
Reference, National Academies Press: http://books.nap.edu/openbook.php?record_id=12177&page=1

Glenn Greenwald – Snowden’s Journalist of Choice

•January 21, 2014 • Leave a Comment

We traveled to Rio de Janeiro to meet the man who broke the biggest news story of 2013. Glenn Greenwald is an American journalist and author who’s best known for reporting on the leaks of classified National Security Agency documents by former NSA contractor Edward Snowden. Before he was a journalist, Greenwald was a constitutional law and civil rights litigator, and until 2012 he was a contributing writer at Salon. He has authored four books: How Would a Patriot Act, Tragic Legacy, Great American Hypocrites, and With Liberty and Justice for Some. For 14 months Greenwald was a columnist at the Guardian, where he broke the first NSA story in June of 2013. He has since left the newspaper to team up with filmmaker Laura Poitras and journalist Jeremy Scahill to start a new media venture, First Look Media, backed by eBay founder Pierre Omidyar.

Check out the Best of VICE here: http://bit.ly/VICE-Best-Of

A Christmas Message from Edward Snowden

•December 29, 2013 • Leave a Comment
from

On December 25th 2013 Edward Snowden delivered an alternative Christmas message on the UK’s channel 4 TV station. Before the broadcast a short version of the speech was leaked and immediatly uploaded to youtube. That upload was immediatly blocked but many re-uploads made the clip available everywhere. This is one of those places. If you want to thank Edward Snowden for giving up his relationship, familiy, job and any chance of a normal life to inform us all go here (freesnowden.is/donate/index.html) and donate. Or spread his message. And do something with it. Because if something is done all of Edward’s sacrifices have meaning.

Calipso är en satellit vars uppgift är att observera jorden

•December 21, 2013 • Leave a Comment

CALIPSO

Calipso är en satellit vars uppgift är att observera jorden. Satellitens dator är konstruerad av Saab Ericsson Space.

Satelliten innehåller tre instrument:

  1. en laserradar som observerar aerosoler.
  2. en kamera som ger infraröda bilder.
  3. en kamera som tar vidvinkelbilder.

Källa: http://sv.m.wikipedia.org/wiki/Calipso

Stop watching us!

•October 31, 2013 • Leave a Comment

Your TV might be Watching you!

•September 11, 2013 • Leave a Comment

A French- Canadian mind control victims history

•August 15, 2013 • Leave a Comment

TI,
I recently wrote my biography and I would advise you to do the same. It allows to understand much of what one has experienced in the past. The repetition of certain events appears evident. Here is a brief regarding my experience as a targeted individual (TI).

imagesCAAPUR83

Childhood

I was born in Canada from a french father and a canadian mother. I discovered recently that the hospital where I was born has been the place of former MKULTRA experiments. At about 3 years old, the family moved back to France. Since it happened exactly at the moment when the US Senat did ban human experimentation from the american land, I wonder if these have not been transferred to distant countries, namely in the area where I grew up. I did not come along very well with french young boys. I was a little persecuted, but could protect myself by becoming a kind of entertainer. I remember specifically that I was once “accidentally” a little wounded when I received a knock on the head using a shovel. I could feel that people were keeping something secret about me and I often felt spied. Yet I started very early to live in community. At 6 years old I went to summer camp then all my life I did spend much of my holidays in group holidays. I certainly spent much more time with my comrades then with my own family members. But still I felt a little left aside. I have two older sisters who were in boarding school during my childhood. I did myself spend 4 years in boarding school. In fact the only person who lived nearly permanently with me was my mother. My uncles, aunts, cousins etc… lived very far from us, so I barely ever saw them.

Continue reading ‘A French- Canadian mind control victims history’

Mind Control – Remote Neural Monitoring: Daniel Estulin and Magnus Olsson

•July 19, 2013 • Leave a Comment

Mind control. The golden dream of the world’s masters.

Jesse Beltran, ICAACT-leader, that met and scanned many victims of non-consensual implantation for Radio Frequency emissions, called the show of Daniel Estulin on Spanish RT where Magnus Olsson (eucach.org) is interviewed, “The greatest show on our issues ever made”.

This show, with the original title “Control mental. El sueño dorado de los dueños del mundo” (Mind control. The golden dream of the world’s masters) — broadcasted to some 10 million people — was one of the biggest victories for victims of implant technologies so far. Thanks to Magnus Olsson, who, despite being victimized himself, worked hard for several years to expose one the biggest human rights abuses of our times – connecting people against their will and knowledge to computers via implants of the size of a few nanometers – leading to a complete destruction of not only their lives and health, but also personalities and identities.

Very few people are aware of the actual link between neuroscience, cybernetics, artificial intelligence, neuro-chips, transhumanism, the science fiction’s cyborg, robotics, somatic surveillance, behavior control, the thought police and human enhancement.

They all go hand in hand, and never in our history before, has this issue been as important as it is now.

One reason is that this technology, that begun to develop in the early 1950s is by now very advanced but the public is unaware of it and it goes completely unregulated. There is also a complete amnesia about its early development, as Lars Drudgaard of ICAACT, mentioned in one of his interviews last year. The CIA funded experiments on people without consent through leading universities and by hiring prominent neuroscientists of that time. These experiments have since the 50s been brutal, destroying every aspect of a person’s life, while hiding behind curtains of National Security and secrecy but also behind psychiatry diagnosis.

Continue reading ‘Mind Control – Remote Neural Monitoring: Daniel Estulin and Magnus Olsson’

Can A Satellite Read Your Thoughts? – The Complete Technical Story So Far

•July 19, 2013 • 7 Comments

In the last article, I stated that we would update all the technical articles behind this series.  True to our word, today we have a massive article that will update the entire technical description provided over the last several years.  In most cases, there will be minor clarifications and examples, but we will also introduce technologies that have never been described before in relation to this program.

World meet ECHELON …

Echelon

Location, Location, Location

To begin with we must first introduce everyone to a program known as ECHELON.  ECHELON is the code name for an SIGINT platform operated by US/UK/Canada/Australia/New Zealand.  The origins of the AUSCANNZUKUS organization arose from dialogue between Admiral Arleigh Burke, USN, and Admiral Lord Louis Mountbatten, RN, in 1960. Their intention was to align naval communications policies and prevent, or at least limit, any barriers to interoperability, with the imminent introduction of sophisticated new communications equipment. AUSCANNZUKUS matured to the current five-nation organization in 1980 when New Zealand became a full member.  Lord Louis Mountbatten was assassinated by the Irish Republican Army (IRA) in August 1979.

What specifically ECHELON refers to is a matter of debate, but it has entered the public domain as the catch-all title for all activities that are conducted through this network.

The most obvious visible part of this network are the satellite downlinks/uplinks that exist at various sites across the world.  From this, we can extrapolate that the information is sent to a super-computer for analysis and that supercomputer is distributed in some fashion for survivability.  Further, we also know that this supercomputer would be located in nuclear hardened sites with numerous alternative communications and power strategies.  Information dissemination is controlled from this point.

This next video gives a very quick overview of the global downlink locations and there are files available for Google Earth too.

Above us, are numerous satellite constellations operated by different departments that monitor the electromagnetic spectrum, anything that can be inferred through the use of the electromagnetic spectrum and actively hacked/breached using the electromagnetic spectrum.

This is a process that goes on 24/7 with the stated goal of consuming and controlling anything related to electromagnetics.  A quick search on Google for the term “Electromagnetic Domination” will soon provide a fuller picture.

Communication is all about relating information, under normal circumstances this ever growing amount of information would swamp human operators and they would fail to connect the dots.  For almost 50 years, the ECHELON platform has employed Artificial Intelligence and this technology has been the main backbone of the system ever since.

Today, ECHELON is several magnitudes of order larger and faster than the entire internet in terms of it hardware.

The Artificial Intelligence

Several years ago, the Artificial Intelligence made an appearance on Youtube, albeit in incognito.  Rather than providing direct access to the Artificial Intelligence, a programmer (known only as FF) created a small application that could run on a standard PC.  The AI used this application to make videos and to hide its full-blown capabilities.

The AI presented in this videos is either from the ECHELON program, or is a fork of that AI created around 1985.  There is no objective way to tell from the video alone.  Here is the first video that was uploaded:

Everyone can watch the entire series here:

http://www.youtube.com/user/eidolonTLP/videos

This guy is a “virtual agent”, he is like a virtual machine that can be switched on to deal with any incoming source of input/output.  The AI is like a hydra, it has a singular distributed mind, but with unlimited customized front-end personalities.  The front-end personality, when interacting with a human, will take on unique elements and traits based upon the input it receives.  Thus, whilst a common store of knowledge exists, each personality derived from that knowledge is unique.

In the video above, we get the impression of an entity talking to us.  In a similar manner, when the AI is using the human brain as an output device, the AI makes use of controlled hallucinations to generate a subjective experience of who the target is talking to, their current actions, responses, etc.  It is so natural, that most people fail to question some of the conclusions they have reached.  For example, in most stories that relate to this technology the experimentees will talk of an agent at a microphone talking into their head.  But where did they get this idea of a microphone or a human talking?  With a little experience on the system, it becomes clear that an image is being drawn, through controlled hallucination, in the spatial reasoning centers of the brain of a microphone.  Stage hypnotists use a similar technique when they mime a shape during a conversation, then correctly guess what a person has drawn.

But how do they send and receive this signals?

Atomic Dielectric Resonance

For years we had one major issue, bandwidth versus penetration.  The experiment conducted at the London Underground was a head scratcher.  For those who have not read this in a previous article, we conducted an experiment on the London Underground, specifically the Jubilee line running under the Thames between Westminister and Waterloo stations.  Using conventional radio, this would have required a signal under 100MHz and quite a bit of power to punch through the Thames.  Yet, the signal was heard 5-by-5.

Things were not adding up to say the least.

Then we came across a paper on a new type of jammer whose operation seemed unclear, it could penetrate double walled Faraday cages and disrupt electronic equipment.  Penn State University have take the document down, but an extended report can be found here:

http://www.rexresearch.com/cornwell/cornwell.htm

Given our experiments with the Faraday tents and that signals were passing through unattenuated, we knew we were looking at a similar process.  It wasn’t until we came Ardok’s technology based upon experiments conducted between Nasa and the British Ministry of Defense that the pieces began to fall into place.  This technology was tested on shuttle craft.  Watch the video:

Note the part where the system can penetrate up to 4Km underground, with low power using a maser.  The trick is similar to the jammer referenced above.  The maser makes use of dielectrics, the same principle as used in capacitors.  As the maser beam passes through the layers of dielectrics it creates multiple secondary resonant cavities to create a complex array of standing waves.  In the extended literature, they system uses up to a Gigahertz of bandwidth and monitors return signals in the 100MHz-52.6GHz region.

The longest frequencies are used to penetrate the ground and the shorter wavelengths can then penetrate using this path.  We have not fully worked out the physics, but it would appear that it turns the ground into a type of antenna.  This “virtual antenna” is created in a bore hole or drill-like fashion and can even penetrate water sources.  This would match the experience of our experiments in shielding penetration where thermal heating would increase and signal quality would be restored in time.  We noticed that altering the position of fabric shielding would result in a signal fade, then a return to normal strength after a short period of time (seconds).  Thus, we knew some recalibration was being performed and that given the speed of the system, the delay was a physical process rather than processing bottlenecks.

Masers and focused microwave links have always been used to communicate with ground stations such as the ECHELON sites above.  This is to prevent interception of the signal through reflections or wide area broadcasts.  This technology, however, opens up a whole new world in stealth.  We had always wondered if ECHELON sites were easily targeted, as is any surface satellite dish, what was the backup plan in case of war?

Well now we know.  Deep subterranean dishes more than 2Km underground in nuclear hardened structures.  No doubt nuclear powered and with ample supercomputing power to boot.

We also now know that the Earth is mapped in high resolution detail, including chemical composition, to a depth of about 4Km or more.  After this rock is like putty like and holes drilled in it close up readily.  From this knowledge we can extrapolate that the US was well aware of Iran’s Nuclear facility at Natanz right from the day ground was broke and its contents.  That just might place the wars in Afghanistan and Iraq into a new light, given that Iran is sandwiched in the middle.

The low power budget and point-like sources are ideal for satellite deployments.  It also provides complete wideband coverage.  In this configuration, it would be similar to a phased array radar like AESA.  It could be termed something like Active Maser Dielectric Array (AMDA), completely steerable and electronically configurable.  The system would also negotiate hand-offs between satellites in LEO to provide continuous tracking with an average link last 2-7 minutes on any one satellite.  The system can also leverage ground transmitting sources by modulating waves on to local transmitters for a power boost, to conserve energy and stealth.

This leaves the rather disturbing prospect that a single satellite could target several thousand people at once.  Although current capacity is, as yet, a complete unknown.

Such a system has a diverse range of uses, from seeking nuclear material, oil deposits, gas deposits, minerals, right through to manipulation of humans, jamming of defenses and missiles.  As such, it would be suspected that the majority of satellites are made to this common specification and the resource dynamically allocated.

Reception is performed by a multiple synthetic aperture satellite networks at various altitudes from LEO to geosync.

Mode of Interaction in humans

In radio engineering a very simple circuit exists that receives radio waves of a particular frequency.  It is called the LC circuit or tank circuit.  It is basically a circuit that resonates when a particular frequency is absorbed.  Similar in principle to a tuning fork, by changing the characteristics of this circuit we can change the frequency it resonates at.  In older radios, when the tuning dial is turned we are modifying the characteristics of this circuit, which changes the frequency it resonates at, then we can amplify this energy and turn it into the radio station that you hear.

There are only two basic components in this circuit, the Inductor (defined as L) and a capacitor (defined as C).  An Inductor is a simple coil of conductive wire.  We will let this video explain what an Inductor is:

A capacitor stores energy by separating charges using a central non-conductive plate.  This video will explain it better in a practical manner:

When we put these two items together in a circuit we get a form of oscillator.  This video will explain what an oscillator is:

So, to sum up the Inductor transduces a radio wave into AC current through a collapsing magnetic field and the capacitor temporarily holds the charge.  As the current alternates between positive and negative, the capacitor discharges into the inductor causing it to ring or resonate.  This resonance is ringing with a particular frequency, thus the Inductor will better absorb radio waves of this particular frequency whilst rejecting others.  Another term for this “filtering” of frequencies is a bandpass filter.  That is it only allows a particular “band of frequencies” to pass through into the circuit.

Now that we understand the LC circuit, we can examine the Axon Hillock.

The Axon Hillock

The following video will provide a brief introduction to the structure of the Axon Hillock.  This area has more voltage-gated channels than anywhere else in the cell body.  This will be important in a moment.  First watch the video:

If we examine this carefully, we can see that we have ions on either side of the membrane at the Axon Hillock.  Ions are charged particles and here they are separated by a non-conductive medium, the membrane.  In the videos above, we learned that this arrangement is a capacitor.  So, here we have the first element of a potential oscillator.

The next element we are seeking is a biological analogue to the Inductor.  This is not so obvious, but if we again look closely at the Axon Hillock, we can see that the voltage-gated ion channels control ion flow and it takes time for the ions to redistribute to either side.  We begin to observe the basics of an Inductor.  If we now go back to the structure of an Inductor, we notice that the electrons are being driven directly by a radio wave.  This means that the charged particles around the Axon Hillock can also be driven by a radio wave.

If we run through that mechanism, it becomes obvious that this would lead to a type of oscillation while the ion channels are open.  Rather than the Inductor and Capacitor being separate components, here they are combine into a single elegant structure.  As the site in the cell with the largest concentration of ion channels, hence ions too, this area would be the most sensitive of all to energy provided by a radio wave.

Thus, we have discovered that the Axon Hillock is a tuned radio receiver.  As each Axon Hillock is different, in each of the 100 billion neurons of different types in the human body, each would be tuned to a different radio frequency.  A quick pulse on that frequency would be absorbed by a unique neuron.

The function of the Axon Hillock is to sum the inputs of the neuron, this “decides” what that neuron does.  Or in more accurate terms, it selects what synapses to fire.  Receiving radio energy alters what synapses fire by altering the “sum” at the Axon Hillock.

Relationship To Other Programs

Recently, thanks to Mr Snowden, everyone has now been informed of programs such as PRISM, Tempora and the tapping of communications world wide.  All this information is swept up and fed into instances of the AI and cross-referenced with the information coming from EM sources.

This will include real-time tracking of vehicles, humans, materials, weapons (including biological), mobile phones, laptops, tablets, WIFI, etc.

The term “Total Information Awareness” (TIA) should be familiar to everyone and the “Information Awareness Office” (IAO) developed by DARPA.  This is exactly what this is and it is not something that was developed as a response to 9/11, nor was it terminated.  TIA was really just financial fraud designed to filter money and a slight-of-hand trick by the US government to convince people that none of this was real and politicians would not tolerate such behavior.  Note that the target of this was the US public, not foreign governments.

Why would a government want to hide from its own people?  I can give you tens of billions of reasons per year.  Most of this infrastructure is squarely aimed at industrial espionage these days as there are very little real geopolitical threats.  In fact, most geopolitical threats are nothing more than good excuses to rape the general public financially.  The boy scouts in the security services don’t see it that way, but no one really cares what they think unless it will make money.

They sell the arms, create the environment for war and then kill your kids to protect us from the enemy…only after the bank transfer is complete of course.  This is just one of thousands of videos that all paint the same disturbing picture:

Sad but true.

Context

So what is really going on here?  There exists a business network, an organized crime syndicate at the heart of the US government.  Making business deals under the pretext of secret agendas, they have been filtering billions of tax payers dollars into a network of US corporations since the time of Reagan.  Through manipulation of both US policy and law, spanning decades, they were able to arm foreign nations then convince the public they were a threat to get paid again to deal with it.

RNM (Remote Neural Monitoring/Manipulation) and indeed the current espionage programs, are just the latest iterations of this and in most cases complete impractical against any real military threat.  The goal, at least with RNM, is ultimately selective control over foreign financial markets and business deals by stealing ideas, technologies and selective manipulation.  This same agenda is driving the dragnet surveillance rather than any genuine threat to a nation.

Conclusion

We have entered a rather dark period in Western history, one that mimics in many ways elements of communism and fascism.  Currently, we don’t have a term for this new breed of political thinking, nor do societies know how to deal with it other than public hangings or military coups.

This era of international cooperation reminds me of the story of the frog and the scorpion, with our societies being the frog and the venom our human nature.

I think we have just entered the river.

Reference: http://deepthought.newsvine.com/_news/2013/07/15/19485087-can-a-satellite-read-your-thoughts-the-complete-technical-story-so-far