The more that I learn about computers, CERN, the WorldWideWeb and Artificial Intelligence, the more convinced I am that demonic entities are behind it, inside it and in control of it. I never believed for one minute that man is so clever he could make a machine that is capable of thinking for itself. Now we are learning that that is exactly what is happening and man is no longer in control of Artificial Intelligence if indeed he ever was.
There are many people who believe that CERN created the Worldwide Web in order to communicate with entities from other dimensions. I am convinced that is true, but in my mind, the demonic entities are driving the mad scientists to create these things in order to gain access and control of the minds of the masses. I don’t believe they need the internet to open portals into our world because I believe that GOD has released them and removed his protective veil because mankind has turned their back on HIM. They are crying for Lucifer and all the gods of the Ancient past… so that is exactly what they are getting.
But I believe the internet is what Satan has devised to gain access into the minds of individuals, where he is required to get permission. He presents these things to mankind as something attractive and even productive when in truth it is a ruse to gain not only permission and information on what we think, hope and desire but to take full control of our thoughts and even change our chemical makeup and DNA to conform to his plan. Once you have viewed everything in this series, you may come to the same conclusion.
These secret worshipers of Satan are desperate to please their god of evil,and they do it by any means necessary,Satan is systematically destoying the earth through his wicked empire,It is vitally important for us to understand how this empire works and what it intends to do to us.See then that you walk…not as fools but as wise,redeeming the time,because the days are evil Ephesians.5:15-16. The Satanic plot lead by Satan himself has throughout history organized Evil powerful groups of men in the form of various Secret Society’s and front organizations, whose goal is to unite the world by any means, and bring it under Satanic rule. The Brotherhood and its network of organizations began working again soon after the Flood, of Noah’s day and throughout history to bring about this Satanic dictatorship.
The Defense Advanced Research Projects Agency (DARPA) is an agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Advanced Research Projects Agency ( ARPA ), the agency was created in February 1958 by President Dwight D. Eisenhower
In character with President Clinton’s emphasis on economic growth, the Department of Defense restored DARPA’s original name, ARPA, to, in the words of a letter distributed by William Perry, then Deputy Secretary of Defense, “to expand the agency’s mission to pursue imaginative and innovative research and development projects having a significant potential for both military and commercial (dual-use) applications.” In 1996, the Agency again would pick up that D, for Defense, and become known once again as DARPA.
The Advanced Research Projects Agency (ARPA) gained a “D” when it was renamed the Defense Advanced Research Projects Agency (DARPA) in 1972. The Agency’s name briefly reverted to ARPA in 1993, only to have the “D” restored in 1996.
In the movie 21 Grams, the idea is presented that upon the moment of death, the human body instantaneously loses exactly 21 grams – supposedly the weight of the soul. Though this is not scientifically proven, there seems to be evidence that our consciousness is indeed a transferable entity – and the ancient Egyptians likely knew exactly how to transfer consciousness, or the soul, from one person to another.
There is a similar aim within DARPA and the Shadow Government’s pricey experiments. The merging of humans and machines is already happening whereupon human consciousness is “uploaded” into AI computers. Mind uploading is expected to be in full force by 2045, but has it been done already, long ago?
Before we examine the ancient history of uploading consciousness, let’s look at a few examples in recent Hollywood history which suggest this is already being done.
In the movie, What Dreams May Come staring the late Robin Williams, his character dies and then traverses gleefully through a place that looks just like the paintings his wife used to create when he was still alive. The film pictorially demonstrates that William’s is in his own eternity developed by his “KA” state – a term I’ll explain momentarily. His wife has a similar, negative experience of a seeming hell, based on her experience of suicide. She enters a dreamlike “hallucination” that she cannot escape based on her own “KA” state.
The ancients understood that consciousness separates from the physical body at death. The life we live in physical form is repeated – perhaps over and over again – in the KA state, with all our wisdom, all our ignorance, our mistakes and triumphs, loves’ lost, and friends won.
Janet Cunningham, a researcher of ancient Egyptian rituals, writes:
“There is a growing view that the King’s Chamber of the Great Pyramid was where the highest initiation took place. Brunton (1984), whose experiences in the Great Pyramid confirm some of the esoteric writers (Hall, Leadbeater, and Haich), says that in the beginning there is terror, uncertainty, wandering and darkness. This terror was described to me by a client who had prayed for two years to have an out-of-body experience; when it actually occurred, it was uncontrolled and horrific to her (Cunningham, 1997).
According to Brunton, that experience is followed by a miraculous and divine light. Again and again, in the Egyptian Book of the Dead (Faulkner, 1994), one reads, I go to Osiris. I am One with Osiris; I am Osiris. This gives support to the theory of guiding the initiate to become a god living eternally with the gods. It becomes evident that, if one views these writings as guidance for the initiate as well as guidance for the deceased after death, the reader is encouraged to become One with the resurrected god, Osiris.”
Among many theories of the purposes of the pyramids, there are those who suggest that these structures acted as a means to transfer “KA” from one pharaoh or king to another as they passed from earthly form. The Egyptians described the soul and the spirit as two separate entities, the BA, and KA, respectively. The BA, or soul, never dies, but simply reincarnates so that it can reach higher levels of conscious evolution. The Egyptians sometimes depicted the BA as a human head with bird’s wings.
The KA is the part of consciousness which stays here on planet earth. It was represented in hieroglyphs as two up-stretched arms reaching toward the sky. The KA, or spirit, is the part of us which can roam illusory creations of the mind such as we witnessed in What Dreams May Come.
The Egyptians also understood, however, that the KA and BA were very significantly intertwined. There were specific practices which were carried out based on their understanding of the physical and non-physical realms of space and time.
KA, according to the ancient Egyptians, included all genetic material and cellular memories from parents and ancestors. That genetic “residue” of their genetic and epigenetic experience helped to form us. This is why homage was paid to ancestors – as they were though to exist in a very real way in our present form. With the right awareness, we are also able to tap into their reserves of knowledge and wisdom.
Another reason that Pharaoh’s tombs were packed with jewels, food, and other personal items was because the Egyptians believed that the KA would carry physical objects acquired in one life along to the next life, as long as they are still in existence in that time. This is also why it is believed that psychics can hold an article of clothing or a personal item of someone to understand more about them without ever having met them. They are simply picking up on traces of KA energy.
The KA and BA needed to be transferred in an unbroken manner at death in order for one King to receive the wisdom of the previous King. The practice of mummification is part of this process. The Egyptians believed that the KA could be preserved if the decay of the body was slowed.
Moreover, the ancients would attempt to stop the BA from falling back into reincarnation, and the KA from reliving a fantasy based on their former state(s) of consciousness. The KA had to be “grounded” and preserved so that an ethereal link between BA and KA was not severed. If this was successfully accomplished, one would become an etheric shaman, capable of directing one’s soul and spirit in a conscious way.
If this sounds strangely like a new tech start-up that wants to transfer your consciousness into an artificial body so that you can live forever, that’s because the technology is no sci-fi fantasy, but more likely a reality. Are modern-day techies simply the wanna-be pharaonic priests of ancient ages? One thing is for certain, the quest for immortality is as old as human history itself.
From 1983 to 1993 DARPA spent over $1 billion on a program called the Strategic Computing Initiative. The agency’s goal was to push the boundaries of computers, artificial intelligence, and robotics to build something that, in hindsight, looks strikingly similar to the dystopian future of the Terminator movies. They wanted to build Skynet.
Much like Ronald Reagan’s Star Wars program, the idea behind Strategic Computing proved too futuristic for its time. But with the stunning advancements we’re witnessing today in military AI and autonomous robots, it’s worth revisiting this nearly forgotten program, and asking ourselves if we’re ready for a world of hyperconnected killing machines. And perhaps a more futile question: Even if we wanted to stop it, is it too late?
“The possibilities are quite startling…”
If the new generation technology evolves as we now expect, there will be unique new opportunities for military applications of computing. For example, instead of fielding simple guided missiles or remotely piloted vehicles, we might launch completely autonomous land, sea, and air vehicles capable of complex, far-ranging reconnaissance and attack missions. The possibilities are quite startling, and suggest that new generation computing could fundamentally change the nature of future conflicts.
That’s from a little-known document presented to Congress in October of 1983 outlining the mission of the new Strategic Computing Initiative (SCI). And like nearly everything DARPA has done before and since, it’s unapologetically ambitious.
The vision for SCI was wrapped up in a completely new system spearheaded by Robert Kahn, then director of Information Processing Techniques Office (IPTO) at DARPA. As it’s explained in the 2002 book Strategic Computing, Kahn wasn’t the first to imagine such a system, but “he was the first to articulate a vision of what SC might be. He launched the project and shaped its early years. SC went on to have a life of its own, run by other people, but it never lost the imprint of Kahn.”
The system was supposed to create a world where autonomous vehicles not only provide intelligence on any enemy worldwide, but could strike with deadly precision from land, sea, and air. It was to be a global network that connected every aspect of the U.S. military’s technological capabilities—capabilities that depended on new, impossibly fast computers.
But the network wasn’t supposed to process information in a cold, matter-of-fact way. No, this new system was supposed to see, hear, act, and react. Most importantly, it was supposed to understand, all without human prompting.
An Economic Arms Race
The origin of Strategic Computing is often associated with the technological competition brewing between the U.S. and Japan in the early 1980s. The Japanese wanted to build a new generation of supercomputers as a foundation for artificial intelligence capabilities. Pairing the economic might of the Japanese government with Japan’s burgeoning microelectronics and computer industry, they embarked on their Fifth Generation Computer System to achieve it.
The goal was to create unbelievably fast computers that would allow Japan to leapfrog other countries (most importantly the United States and its emerging “Silicon Valley”) in the race for technological dominance. They gave themselves a decade to accomplish this task. But much like the United States, no matter how much faster they made their machines, they couldn’t seem to make them “smarter” with strong AI.
“The consumer electronics industry will integrate new-generation computing technology and create a home market for applications of machine intelligence.”
Reaching out to the private sector and the university system would also ensure that the best and brightest were contributing to DARPA’s mission for the program:
Equally important is technology transfer to industry, both to build up a base of engineers and system builders familiar with computer science and machine intelligence technology now resident in leading university laboratories, and to facilitate incorporation of the new technology into corporate product lines. To this end we will make full use of regulations of Government procurement involving protection of proprietary information and trade secrets, patent rights, and licensing and royalty arrangements.
The long and short of it? The government gave assurances to private industry that the technology developed wouldn’t be handed off to competing companies.
But economic competition with the Japanese, while very much a motivator, was almost a sideline concern for many policymakers embroiled in Cold War politics. Military build-up was the prime concern for the more hawkish members of the Republican party. The military threat from the Soviet Union was seen by many of them as the larger issue. And SCI was designed to address that threat head-on.
The Star Wars Connection
The launch of the Strategic Computing program and DARPA’s requests for proposals in 1983 and 1984 set off a heated debate in the academic community—the same community that would ultimately benefit from DARPA funding from this project. Some were skeptical that the ambitious plans for advanced artificial intelligence could ever be accomplished. Others worried that advancing the cause of AI for the military would usher in a terrifying era of autonomous robot armies.
It was a valid concern. If the goal of Star Wars—the popular nickname for Ronald Reagan’s Strategic Defense Initiative (SDI), and a popular political football at the time—was an automated response (or semi-automated response) to any missile threat from the Soviets, it would seem absurd not to tie it into a larger network of truly intelligent machines. The missions of the two projects—-not to mention their originating institutions—overlapped too much to be a coincidence, despite everyone’s insistence that it was just that.
The Star Wars battle manager, probably the most complex and the largest software project ever, is conceptually (though not administratively) a part of [Strategic Computing Initiative]. Making the scientific breakthroughs in computing that the SDI needs is a key goal of the [Strategic Computing Initiative].
If you ask anyone who worked on the SCI at the highest levels (as Roland did for his 2002 book on the project) they’ll insist that SCI had nothing to do with Ronald Reagan’s dream for Star Wars. But right from Strategic Computing’s early days, people were making connections between the SCI and the SDI. The connective tissue came in part simply because the programs shared similar names, and were even named by the same man, DARPA director from 1981 until 1985, Robert Cooper. And perhaps people saw a thread because the interconnecting computing power being developed for SCI just made sense as an application for a space-based strategy of missile defense.
Whether or not you believe SCI was going to function as an arm of the Star Wars mission for space-based defense, there’s no denying that if both had worked out, they would’ve been natural collaborators.
Applying Strategic Computing on Land, Sea and Air
The 1983 chart above outlined the mission of Strategic Computing. The goal was clear: develop a broad base of machine intelligence tech to increase national security and economic strength. But to do that, Congress and the military institutions that would eventually benefit from SCI would need to see it in action.
SCI had three applications that were supposed to prove its potential, though it would acquire many more by the late 1980s. Leading the charge were the Autonomous Land Vehicle, the Pilot’s Associate, and the Aircraft Carrier Battle Management System.
These applications were built on top of the incredibly advanced computers that were being developed at places like BBN, the Cambridge company probably best known for its work on developing the early internet, and would allow for advancements in things like vision systems, language comprehension, and navigation—vital tools for an integrated military force of man and machine.
The Driverless Vehicle of 1985
The most ominous-looking product to emerge from SCI was the Autonomous Land Vehicle. The 8-wheeled unmanned ground vehicle was 10 feet tall and 13.5 feet long, with a camera and sensors mounted on the roof guiding its vision and navigation system.
Martin Marietta, which merged with the Lockheed Corporation in 1995 to become Lockheed Martin, won the bid in the summer of 1984 to create the experimental ALV. They would get $10.6 million in the three and a half years of the program (about $24 million adjusted for inflation) with an optional $6 million after that if the project met certain benchmarks.
The October 1985 issue of Popular Science included a story about the tests that were being conducted at a secret Martin Marietta facility southwest of Denver.
Writer Jim Schefter described the scene at the test facility:
The boxy blue-and-white vehicle crawls sedately along a narrow Colorado valley road, never venturing far from the center line. A single window, set cylcops-like in the vehicle’s slab face, gives no clue about the driver. The tentative trek looks out of character for the massive 10-foot tall eight-wheeled vehicle. Although three on-board diesel engines roar, the wheels creep along at three mph.
After about a half-mile, the hulking vehicle stops. But nobody climbs out. There is no one aboard — just a computer. Using laser and video for eyes, a seminal — yet still advanced — artificial-intelligence program has sent the vehicle down the road without human intervention.
DARPA paired Martin Marietta with the University of Maryland, whose earlier work in vision systems was seen as instrumental to make the autonomous vehicle portion of the program a success.
As it turns out, creating a vision system for an autonomous vehicle is incredibly difficult. The system was fooled by light and shadows, and thus couldn’t work with any degree of consistency. It might be able to detect the edge of the road at noon just fine, only to be thrown off by the shadows cast during the early evening.
Any environmental change (like mud tracked along the road by a different vehicle) also threw the vision system for a loop. This, of course, was unacceptable even in the highly controlled testing area. If it couldn’t handle such seemingly simple obstacles, how would such a vehicle deal with the countless variables it would surely encounter out in the battlefield?
Despite meeting significant milestones by November of 1987, the ALV component of SCI was effectively abandoned by the end of the year. Though the autonomous vehicle was still quite primitive, some people at DARPA thought it was being dumped way too soon.
In the end, it couldn’t overcome its battle unreadiness. As Alex Roland notes in the book Strategic Computing, “One officer, who completely misunderstood the concept of the ALV program, complained that the vehicle was militarily useless: huge slow, and painted white, it would be too easy a target on the battlefield.” DARPA formally cancelled work on the ALV in April of 1988.
In many ways, DARPA (the Defense Advanced Research Projects Agency) is the engine of the military-industrial complex, the heart at the center of the Pentagon that keeps America in constant state of weapons innovation and defense spending. Even before the attacks of September 11, 2001, DARPA kept defense contractors lining their pockets; in our post 9/11 surveillance state, DARPA sits at the nexus of corporate war profits, national security, and military innovation.
Cloaked in clandestine secrecy, DARPA has been called the “Oh God Why” branch of the Department of Defense. In the fiscal year of 2015, their requested budget was $2.91 billion, which doesn’t include classified and black budgets. Even still, through Freedom of Information Act requests and intrepid journalism, some of the historical truths and future plans of this nebulous government agency have come to light in recent years.
15. DARPA was responsible for the creation and weaponization of Agent Orange during the Vietnam War.
Back in 1961, when DARPA was called ARPA, the agency ran a toxicology branch at Fort Detrick, where it spearheaded one of the most controversial weapons programs in U.S. history. Project Agile utilized Agent Orange as a part of their highly classified defoliation and food crop poisoning efforts in the jungles of Vietnam. Their use of Agent Orange, which was manufactured by nine wartime government contractors, including Monsanto, may be responsible for cancer, nervous disorders, and skin cancer in 2.8 million servicemen who returned from Vietnam. The U.S. defoliation program directly killed about 400,000 Vietnamese, caused half a million children to be born with birth defects, and may be the cause of cancer in over 2 million more Vietnamese people.
President John F. Kennedy signed off on DARPA’s costly, deadly and, ultimately, ineffective program.
14. Four nuclear bombs were detonated during the Cuban Missile Crisis
It’s widely believed that nuclear weapons were not used during the Cuban Missile Crisis. Contrarily, with Eisenhower’s test ban failing, the United States actually detonated two nuclear weapons — code-named Checkmate and Bluegill Triple Prime — in space at the height of of tension in October of 1962. Then they tested two more bombs.
ARPA, at the behest of Secretary of Defense Robert McNamara, launched this effort to test an atmospheric nuclear defense shield known as the Christofilos Effect.
13. DARPA ostracized any scientist who discussed ethics or morality with regard to the use of nuclear weapons.
After the horror of witnessing the first hydrogen bomb test, which, in its initial blast had many scientists afraid the atmosphere was catching on fire, Robert Oppenheimer was forced into exile after expressing moral concerns over continued nuclear weapons development. Thereafter, it became official DARPA policy to not discuss ethical issues related to the use of nuclear weapons in warfare.
12. DARPA scientists drew up plans to nuke the Ho Chi Minh Trail during the Vietnam War.
Then Secretary of Defense Robert McNamara called on the JASON scientists — at one time a dominant and prolific division within DARPA — to determine whether it was possible to take out the Ho Chi Minh Trail with nuclear weapons. Military leaders considered the disabling of this important strategic path the preeminent way for the United States to fatally weaken the Viet Cong insurgency.
However, in this rare instance of restraint, the JASON scientists determined it was impractical to use nuclear weapons for this purpose. They stated:
At least one TNW [tactical nuclear weapon] is required for each target, and the targets are mostly small and fleeting. A reasonable guess at the order of magnitude of weapons requirements … would be ten per day or 3000 per year.
11. DARPA developed weapons specifically for the purpose of brutally incapacitating anti-war demonstrators.
At the peak of the anti-Vietnam War fervor in 1968, then-ARPA scientists looked for methods of comprehensively dispersing the crowds that gathered in huge numbers to peacefully protest the war. The research and implementation of these methods included tear gas, phosgene oxide (which can cause temporary blindness), anticholinergics (which block nerve impulses), emetic agents (chemicals that induce vomiting), non-lethal grenades, poisoned tranquilizing darts, lasers, eardrum-shattering loud noises, and tagging (using markings only visible in ultraviolet light) for later apprehension.
“Nonlethal weapons are generally intended to prevent an individual from engaging in undesirable acts,” wrote the authors of a seminal report, which was only recently declassified.
The final crowd control effort, which persists today, sanctioned the upgrading of state police arsenals with military-grade equipment. The Omnibus Crime Control and Safe Streets Act of 1968 created the Law Enforcement Assistance Administration (LEAA), a federal agency whose sole purpose was to militarize local police forces.
(Source: The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency.)
10. In 2008, the NSA and DARPA collaborated for a covert data mining campaign called Project Reynard, which monitored millions of World of Warcraft users.
Project Reynard came at the first peak of MMO gaming and sought to track the online behavior of 10 million monthly subscribers to the World of Warcraft. This program wasn’t revealed to the public until 2013, when Edward Snowden disclosed top secret documents related to governmental abuses of power.
DARPA scientists configured a Video Analysis and Content Extraction tool, as well as something called Knowledge Discovery and Dissemination, so that Reynard was “automatically detecting suspicious behavior and actions in the virtual world.”
9. DARPA’s anti-polio vaccination campaign exposed millions of Americans to the “cryptic human infection” of monkey virus.
In the late 1950s and early 1960s, the JASON scientists were tasked with biological warfare defense. Their research produced a highly classified controversial vaccination campaign that exposed 98 million people to the “cryptic human infection” of monkey virus, known as Simian virus 40 (SV40).
No one was told of the risk and, even today, rancorous debate over the extent of the danger persists. Scientists have reported that the SV40 virus is found in cancerous human tumors.
Writing on the nature of a stealth virus, or ‘silent loads,’ in biological warfare, one Jason microbiologist wrote:
The basic idea behind a stealth virus is to produce a tightly regulated, cryptic viral infection, using a vector that can enter and spread in human cells, remaining resident for lengthy periods without detectable harm … [a population could be] slowly pre-infected with a stealth virus over an extended period, possibly years, and then synchronously triggered.
(Source: The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency.)
8. DARPA’s Defense Sciences Office was controlled by military Transhumanist, Michael Goldblatt, a McDonald’s employee.
Michael Goldblatt, who believes that humans will end up controlling their own evolution with technology, came to DARPA in 1999 with a vision for military-based Transhumanism. His plans included super-soldiers donning exoskeletons and the use of biotech to manufacture pain vaccines and rapid blood clotting for “rapid healing” troops. He also wanted to create the “24/7 soldier,” who requires little to no sleep on the battlefield.
He also happened to have served as chief science officer and vice president of research for McDonald’s.
7. DARPA’S Dark Winter war game simulated a biological terrorist attack and may have contributed to a biowarfare hysteria that paved the way for the Iraq war.
Dark Winter was a fictitious exercise developed by four organizations overseen by DARPA, who wanted to create a hypothetical biological terrorist attack and then assess military reactions to the scenario. The premise, which was pitched to Dick Cheney in 2001, before 9/11, involved a smallpox outbreak in Oklahoma City. The game played out over thirteen days, during which time the disease spread to 25 states and 15 other countries. With no response or vaccine available, a million people died within weeks.
As a result, the Congressional Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism stated,
To date, the U.S. government has invested most of its nonproliferation efforts and diplomatic capital in preventing nuclear terrorism. The commission believes that it should make the more likely threat — bioterrorism — a higher priority.
Since Dark Winter, the government has spent more than $60 billion on biodefense. This number, of course, doesn’t tabulate the cost of the war in Iraq, the justification of which was greatly buoyed by fear-mongering over Saddam Hussein’s fictitious chemical and biological warfare capacities.
6. DARPA sponsored biosurveillance program Bio-ALIRT, which collected the medical records of millions of Americans without their knowledge or consent.
Even before 9/11 sent government agencies into Orwellian overdrive, DARPA had been leveraging a surveillance program known as Bio-ALIRT, for Bio-Event Advanced Leading Indicator Recognition Technology. Supercomputers did the job, scanning all available databases of medical records of American citizens.
5. Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA.
DARPA’s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA’s PRISM. We now know that PRISM culled citizens’ personal data from companies like Microsoft, Google, and Facebook, and was later leaked by whistleblower Edward Snowden. Total Information Awareness programs include:
—Evidence Extraction and Link Discovery program (EELD) – Sole purpose is to gather as much information about both terror suspects and average American citizens as possible, using “phone records, computer searches, credit card receipts, parking receipts, books checked out of the library, films rented, and more.” Goal is to assess megadata on 285 million people a day in real-time.
— Scalable Social Network Analysis (SSNA) – Program “monitors telephone calls, conference calls, and ATM withdrawals … also sought to develop a far more invasive surveillance technology.”
—Activity Recognition and Monitoring (ARM) – With England’s CCTV surveillance cameras as a model, ARM created a massive database of people going about their everyday lives. Using advanced facial recognition software, the program highlighted any behavior that was outside the realm of a preprogrammed “ordinary,” the definition of which remains classified.
—Deep Exploration and Filtering of Text (DEFT) – Operating on a 28 million dollar budget, this program utilizes advanced computer algorithms to analyze text-based messages in all shapes and forms, from text messages to reports, with the aim being to comprehend “implied and hidden meanings through probabilistic inference.” The full use of DEFT in the United States is classified.
—Nexus 7 – With a classified budget, this particularly murky program studies and tracks social network content. First used in Afghanistan in a defense capacity, when aimed at domestic networks the use of the program is a mystery.
(Source: The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency.)
4. DARPA’S “culture-centric warfare” program conscripted social scientists and anthropologists into the Iraq war as mercenaries.
Operating under the idea that anthropologists would facilitate a more humane war effort, DARPA’S Human Terrain System sought to promote “honorable warfare” in its Iraq counterinsurgency efforts. This lead to the gruesome death of at least one social scientist. On the whole, the program seems to have muddled the already arcane purpose of combat forces in Iraq with a ‘hearts and minds’ type of ideology. It reminded some analysts of internal military propaganda from the Vietnam War.
After [Human Terrain System] training,” DARPA stated, “soldiers will be able to approach and engage strangers in unfamiliar social environments, orient to unfamiliar patterns of behavior, recover from social mistakes, de-escalate conflict, rigorously practice transition in and out of force situations and engage in the process of discovering and adapting to previously unknown ‘rules of the game’ encountered in social engagements.
3. DARPA believes the future of war involves animal cyborgs and insect-inspired drone technology.
The Stealthy Insect Sensor Project is part of a long-standing effort to use bees in war, particularly as bomb locators. It started in 1999 and evolved into the development of insect-inspired drones, which are known as micro air vehicles (MAVs). Eventually, DARPA plans for its “biohybrids” to be part animal, part machine cyborgs, which, according to Annie Jacobsen, author of The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency, will “fly, swim, crawl, walk, run, and swarm.”
The science fueling this futuristic vision is nanobiology. Most of the nanobiology applications DARPA is developing are classified. However, in an interview with Coast to Coast AM, Jacobsen said,
DARPA has already succeeded in creating a rat that will be steered by remote control by implanting an electrode in its brain.
And it’s done the same thing with a moth which is really remarkable because the scientists implanted the electrodes in the pupa stage of the moth when it was still a worm! And then it transformed into having wings, and those tiny little micro-sensors transformed with the moth and the DARPA scientists were able to steer that moth.
Imagine following that idea through — DARPA is moving toward engineering humans for war.
2. DARPA’s Narrative Networks program developed classified techniques used to manipulate trust in humans.
For its Narrative Networks (N2) program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind. In an article for phys.org entitled “DARPA looking to master propaganda via Narrative Networks,” the program was described as having two parts: first, to understand what happens in the human mind when someone sees or hears a message; second, to figure out how to control how the brain interprets the message.
One researcher described Narrative Networks as an attempt to “detect narrative influence … [for the] prevention of negative behavioral outcomes … and generation of positive behavioral outcomes, such as building trust.”
The government is already trying to control the message, so why not have the science to do it in a systematic way?
1. Hunter-killer robots, guided by advanced artificial intelligence, will wage the wars of the future.
Despite the grand mystery of exactly what DARPA is currently working on, which of course is deeply classified, there have been relatively unambiguous signals that it involves artificial intelligence and the outsourcing of military operations to machines. The future of war will see the rise of unmanned autonomous drones, referred to as hunter-killer robots.
In 2011, the Defense Department released a document entitled “Unmanned Systems Integrated Roadmap,” which laid out a cursory overview of the next couple decades. It unequivocally states there will be fully self-governing autonomous machines … soon. Currently, DARPA is working on creating an artificial brain.
According to the undersecretary of defense Ashton B. Carter in 2010:
Dramatic progress in supporting technologies suggests that unprecedented, perhaps unimagined degrees of autonomy can be introduced into current and future military systems.
Perhaps the next great space race is taking place right now in top secret labs all across the world. This time the players include the private sector, too, as Google’s Ray Kurzweil is also trying to create an artificial brain.
Another application envisioned early on in the development of the SCI was the Pilot’s Associate. It was imagined as a sort of invisible R2-D2—a smart companion (seen in a ghostly visage as illustrated above) that understood plain language delivered by the pilot. The associate might spot a potential target, for instance, and ask the pilot if it should engage. Top Gun meets Siri.
The pilot would still make the final decisions in this scenario. But the Pilot’s Associate was going to be smart enough not only to know who, what, and how to ask questions. It also understood why.
Pilots in combat are regularly overwhelmed by the quantity of incoming data and communications on which they must base life or death decisions. They can be equally overwhelmed by the dozens of switches, buttons, and knobs that cover their control handles demanding precise activation. While each of the aircraft’s hundreds of components serve legitimate purposes, the technologies which created them have far outpaced our skill at intelligently interfacing the pilot with them.
It’s here that we see DARPA’s case emerge for needing a Skynet of its own. The overwhelming nature of combat—overwhelming, DARPA implies, only because battlefield technology had already advanced so quickly—could only be achieved with new machines. The pilot may still be the one pushing the button, but these computers would do at least half the thinking for him. When mankind can’t keep up, hand it off to the machines.
The Pilot’s Associate application never got the same exposure in the American press that the ALV did, probably because it was harder to visualize than an enormous, driverless tank rolling down the road. But looking at the speech recognition tech of today, it’s easy to see where all that research into a Pilot’s Associate ended up.
The Invisible Robot Advisor
The Battle Management System was the third of the three applications originally planned to prove that SCI was a practical endeavor.
As it’s described in Strategic Computing (2002):
In the naval battle management system envisioned for SC, the expert system would “make inferences about enemy and own force order-of-battle which explicitly include uncertainty, generate strike options, carry out simulations for evaluating these options, generate the [operations plan], and produce explanations.
The Battle Management System was essentially the brain of the entire operation, and for that reason it was kept out of the spotlight more so than grunts like the ALV. Robots rolling down the road without human control is terrifying enough for some people. Invisible robots with their invisible finger on the very real nuclear button? You don’t exactly send press releases out for that one.
The Battle Management System was devised as an application specifically for the Navy (just as the ALV had been designed for the Army, and the Pilot’s Associate for the Air Force) but it was really just a showcase for the broader system. Every one of these technologies was intended to eventually be used wherever it was most needed. The voice recognition software developed for the Pilot’s Associate would need to work for every branch of the military, not just the Air Force. And the Battle Management System would have to play nice with everyone—except the enemy target, of course.
Piecing Together Skynet
All of the various components of the Strategic Computing Initiative were part of a larger hypothetical system that could have radically changed the nature of war in the 21st century.
Imagine a global wireless network overseeing various subnetworks within the U.S. military. Imagine armies of robot tanks on the ground talking to fleets of drones in the sky and unmanned submarines in the sea—all coordinating their activities faster than any human commander ever could. Now imagine it all being that much more complicated, with nukes waiting to be deployed in space.
The vision for the Strategic Computing Initiative was incredibly bold, and yet somehow quaint when we look at just how far it could have gone. The logical extensions of strong AI and a global network of killing machines are not hard to envision, if only because we’ve seen them played out in fiction countless times.
The Future of War and Peace
What finally killed the Strategic Computing Initiative in the early 90s was the acceptance—after nearly a decade of trying—that strong artificial intelligence on the level DARPA had imagined was simply unattainable. But if all of these various technologies developed in the 1980s sound eerily familiar, it’s probably because they’re all making headlines here in the early 21st century.
We see the vision systems that were imagined for ALV emerging in robots like Boston Dynamics’ Atlas, we see the Pilot Associate’s Siri-like understanding of speech being utilized by the US Air Force, and we see autonomous vehicles being tested by Google, among a host of other companies. They’re all the future of war. And if companies like Google are to be believed, they’re the future of peace as well.
Google’s recent purchase of Boston Dynamics has raised quite a few eyebrows among those concerned about a future filled with autonomous robot armies. Google says that Boston Dynamics will honor old contracts with military clients, though they’ll no longer accept any new ones.
But whether or not they continue to accept military contracts (and it’s certainly possible that they could do so under the radar within a secretive black budget) there’s no question that the line between military and civilian technology has always been blurred. If Boston Dynamics never again works for organizations like DARPA, and yet Google benefits from research paid for by the military, then ostensibly the system worked.
The military got what it needed by advancing the science of robotics with a private company. And now lessons from that military tech will show up in our everyday civilian lives—just like countless other technologies, including the internet itself.
In truth, this post barely scratches the surface of DARPA’s aspirations for Strategic Computing. But hopefully, by continuing to explore yesterday’s visions of the future we can gain some historical perspective to better appreciate that these new advancements don’t emerge out of thin air. They’re not even that new. They’re the product of decades of research and billions of dollars being spent by hundreds of organizations—both public and private.
Ultimately, Strategic Computing wasn’t derailed by some fear of what creating such a program would do to our world. The technology to build it—from the advanced AI to the autonomous vehicles—simply wasn’t evolving fast enough. But here we are, two decades after SCI faded away; two decades further into the development of this vision for smart machines.
Our future of super-smart, interconnected robots is nearly here. You don’t have to like it, but you can’t say you weren’t warned.
Images: ALV with laser sight via Lockheed Martin; Strategic Computing logo from the 1983 DARPA planning document; Cover of Fifth Generation scanned from the book cover; PIM/p computer via JipDec; Ronald Reagan and Star Wars screenshot taken from the PBS American Masters program; Black and white ALV outside Denver, scanned from an archival press photo; ALV illustration scanned from the October 1983 issue of Popular Science; Artists’ concept illustration for the Pilot’s Associate found in an early online draft of The Quest for Artificial Intelligence by Nils Nilsson (2009); Black and white Pilot’s Associate illustration scanned from the book Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 by Alex Roland and Philip Shiman (2002); Atlas Robot and Google driverless car taken from WikiCommons; Future autonomous military fighter via the Unmanned Systems Integrated Roadmap FY 2011-2036 published by the U.S. Department of Defense
Imagine being able to see or hear your passed loved one in the spirit world on the radio, via a phone call, on a computer printout or through video images. No need to imagine any longer! Join host Donna Smith-Moncrieffe and Dr. Craig Hogan as they explore the topic of instrumental transcommunication— interdimensional communication where spirit beings use the telephone, videos, television, computers, radios and other electronic devices to share images and messages. Discover the techniques and state-of-the-art research being conducted in this area. This episode includes a sample electronic voice phenomenon (EVP) clip of a 3 year old girl who passed to spirit and shared messages that were recorded so the mother could hear. Photos and transimages are provided as examples of how researchers use electronic equipment to communicate with the other side. Concepts covered include: EVP, ITC, Faraday cage, biometrics, recording techniques, and more. Fact: Did you know that Thomas Edison had ideas about inventing a phone that could communicate in the spirit world? Transimages, photos, and electronic voice phenomenon samples are copyrights and courtesy of Brazilian ITC researcher, Sonia Rinaldi. Host’s websiste: http://medium7.com/ To view more shows click below and “like” our show on Facebook!: http://webtalkradio.net/internet-talk…
This might be one of the most important videos I’ve edited in 2018. After everything that has been going on with the privacy crisis and Facebook CEO Mark Zuckerberg going to Washington to speak with members of Congress, I felt that this video was timely. I think social media can be good but we must be careful with how we use it. Join our website for thoughtful stories www.absolutemotivationblog.com Speakers in the video Cal Newport Mark Zuckerberg Tristan Harris Steven Kotler Chamath Palihapitiya Steve Bartlet
She was HEAD of DARPA and has gone on to head up departments at MOTOROLA, GOOGLE, and FACEBOOK. She has never really LEFT any of those, trust me, she is working for the ELITE, seeing that all their interconnected and interfaced projects come to fruition. She is Regina Dugan.
JANUARY 7, 2014 Google executive also pushes e-tattoo that reads your mind Paul Joseph Watson
Infowars.comJanuary 7, 2014 Former DARPA director and now Google executive Regina Dugan is pushing an edible “authentication microchip” along with an electronic tattoo that can read your mind. No this isn’t a movie script about a futuristic scientific dictatorship, it’s trendy and cool!
Dugan, who is Head of Advanced Technology at (Google-owned) Motorola, told an audience at the All Things D11 Conference that the company was working on a microchip inside a pill that users would swallow daily in order obtain the “superpower” of having their entire body act as a biological authentication system for cellphones, cars, doors and other devices.
“This pill has a small chip inside of it with a switch,” said Dugan. “It also has what amounts to an inside out potato battery. When you swallow it, the acids in your stomach serve as the electrolyte and that powers it up. And the switch goes on and off and creates an 18 bit ECG wide signal in your body and essentially your entire body becomes your authentication token.”
Dugan added that the chip had already been FDA approved and could be taken 30 times a day for someone’s entire life without affecting their health, a seemingly dubious claim.
Proteus Prototype authentication pill
Would you swallow a Google microchip every day simply to access your cellphone?
Privacy advocates will wince at the thought, especially given Dugan’s former role as head of DARPA, the Pentagon agency that many see as being at the top of the pyramid when it comes to the Big Brother technocracy.
Indeed, when host Walt Mossberg asked Dugan, “Does Google now know everything I do and everywhere I go because let’s face it….you’re from Google,” she responded by laughing and saying Mossberg should just swallow the pill.
In addition to the edible microchip, Motorola is also working on a wearable e-tattoo that could also read a user’s mind by detecting the unvocalized words in their throat.
“It has been known for decades that when you speak to yourself in your inner voice, your brain still sends neural spike volleys to your vocal apparatus, in a similar fashion to when you actually speak aloud,” explains Extreme Tech’s John Hewitt, noting that the device could allow covert voice activation as well as being used to detect stress and emotion (because Big Brother cares about your feelings).
During the D11 conference, Dugan predicted that if the e-tattoo was made to look cool with different artistic designs, young people would want to have it fused to their skin, “if only to piss off their parents.”\
“I GOT TO DO SOME EPIC SHIT WHEN I WAS AT DARPA.”
The edible microchip and the wearable e-tattoo are prime examples of how transhumanism is being made “trendy” in an effort to convince the next generation to completely sacrifice whatever privacy they have left in the name of faux rebellion (which is actually cultural conformism) and convenience.
Regina Dugan had been working with Facebook since 2016 where she headed the “Building 8” Division. The article refers to this project as the FACEBOOK “secretive brain-computer interface” division. They call it a “controversial project about which the Media Giant has revealed few details. At it’s unveiling Dugan refers to it as Building 8’s mind-reading project named Silent Voice First. She says their goal is to use optical imaging to scan our brains and read the silent words we speak to ourselves. WHAT? Talk about invasion of PRIVACY!
She says it will enable us to control computers and virtual reality experiences. I say, with the way AI is developing it will only give the AI more control over us! Give them more details they can use to deceive and enslave us.
She stated that she was leaving Facebook to build and lead a new endeavor working with LEADERSHIP to ensure Building 8’s smooth transition 2018. SO you can be sure they are already using this technology.
The article goes on to say the Facebook is not the only entity working on the brain-machine interface. DARPA is also pursuing their plans for a neuro connection which they state will open THE CHANNEL between brain and electronics.
Bill Gates is due to launch his new population control microchip in 2018 [image: Neon Nettle] Bill Gates’ New Population Control Microchip Due for Launch in 2018 / Bill Gates Eugenics & Depopulation Medical & Health Multimedia RFID Chips Science & Technology Sleuth Journal
Bill Gates is due to launch his new population control microchip in 2018 [image: Neon Nettle]
Multi-billionaire Bill Gates has developed a new microchip, along with researchers at MIT, that will allow for adjustments to be made to a person’s hormone levels via remote control, in a bid to reduce the planet’s population.
The Bill and Melinda Gates Foundation has been working in conjunction with a small Massachusetts startup to develop the “digital pill” that will enable women’s fertility to be switched on or off, remotely, with the touch of a button.
The new “digital version of the contraceptive” pill will be tested in Africa this year where the Bill and Melinda Gates Foundation has spent years developing vaccination and family planning programs.
Following testing, the microchips are due to be rolled out globally in 2018 with “every woman in America” replacing their regular contraceptive pill with the new remote-controlled chips, according to Gates.
According to the Guardian, the chip is implanted under the skin and releases small doses of the contraceptive hormone levonorgestrel on a daily basis, with enough capacity to last 16 years.
About the same size as a Scrabble tile, it houses a series of micro-reservoirs covered by an ultra-thin titanium and platinum seal.The hormone is released by passing a small electric current from an internal battery through the seal, which melts it temporarily, allowing a 30 microgram dose of levonorgestrel to seep out each day. And it can be simply switched off by a wireless remote, avoiding the clinical procedures needed to deactivate other contraceptive implants.
“The ability to turn the device on and off provides a certain convenience factor for those who are planning their family,” says MIT’s Dr. Robert Farra, adding that “the idea of using a thin membrane like an electric fuse was the most challenging and the most creative problem we had to solve.”
But just as hackers can spoof wifi remotes to operate neighbors’ garage doors and flip their TV channels, could a remote-controlled contraceptive open the floodgates for a new form of ovarian hacking?“Someone across the room cannot reprogramme your implant,” says Farra.
“Communication with the implant has to occur at skin contact-level distance. Then we have secure encryption. That prevents someone from trying to interpret or intervene between the communications.”
The idea for micro-dispensing chips was first developed in the 1990s by Professor Robert Langer at MIT, the founder of innumerable biotech companies and holder of more than 800 patents, known in the industry as “the most cited engineer in history”. His lab caught the attention of Bill Gates in 2012, during his search for a revolution in birth control (which has already spawned plans for a graphene condom), and Langer subsequently leased the technology to Microchips, a company already working on a micro-dosing implant for osteoporosis.
Langer says that the implant will be available by 2018, once the coming trials are complete, and that the device will be “competitively priced” in a bid to ensure it replaces conventional contraception.
Bill Gates: “The world today has 6.8 billion people…now if we do a really great job on new vaccines, healthcare, reproductive health services, we could lower that (number) by perhaps 10 or 15%.” “Vaccines are something I love”. http://www.HumansAreFree.com spacer
CENSORED ON YOUTUBE REPOSTED ON BITCHUTE SEE BELOW
spacer.
To Watch This Video On Bitchute Click the Title Link Below:
Bill Gates recently caused controversy after he spoke out about the immigration crisis in Europe saying that the continent will be “devastated by African refugees” unless severe and immediate action is taken to reduce the population in Africa.
This has left many questioning Gates’ motives behind his vaccination programs after the Bill and Melinda Gates Foundation had previously been accused of secretly sterilizing millions of women in Africa by doctors in Kenya after abortion drugs were discovered in Tetanus vaccines.
The program, which is funded by Bill Gates, has been accused of conducting a mass depopulation experiment on the people of Kenya without their consent.
“If you have enough Data and Computing power, you can understand a person better than they understand themselves.Then you can control them, manipulate them and make decisions for them. You don’t know yourself, but Facebook Google and the Chinese Government know you better than you know yourself.”
“What is the Authority that answers your big questions in life…GOOGLE!” YOU MUST WATCH THIS WHOLE VIDEO.
“The new Algorithmic Religion which will tell people the source of Authority is big data Algorithm.”
I don’t know what planet this guy lives on, but technology has not solved all the world’s problems and people are dying so are animals and plants and it is not due to global warming. It is due to technology, insane mad scientists and AI. It is about GOD and HE is the Authority. Whether you like it or not, whether you believe it or not. GOD is in control and HE is the one who makes the rules. He is laughing at these buffoons who think that they are smart enough to be GOD. What a joke. Thank GOD that they are not in control.