The greatest WordPress.com site in all the land!

Archive for June, 2013

Into the Apocalypse…

June 14, 2013
————————————

Into the APOCALYPSE…
————————————

Editor:

Trillions of dollars, euros, yen, yuan and the expertise, talent, genius and brilliance of countless men and women over the past
decades have been squandered into constructing a fascist, military type spy and surveillance prison police state in America and
throughout the world.

Those trillions SHOULD have been spent on designing, building and constructing a Global Green World Order for Mankind.
Instead of driving around in gas-guzzling trucks and SUV’s (which are largely responsible for plunging us into the global emergency
of global climate change), we could have easily and efficiently transited into an alternative, free-energy, non-polluting transportation
economy.

Just this past May (May 9th to be exact), the world passed 400ppm (parts per million) of CO2 in the atmosphere.  We can now expect runaway global warming to the tune of a 5-12 degree farenheit increase in average temperatures by 2100- which is nothing short of “catastrophic” for human civilization and the biosphere.

Colorado, along with the entire Mid-west, is slated to turn into dust bowl, which will mean the END of the lucrative ski industry in this state.
As well, access the clean, fresh water will become the new “gold” of the 21st century.

For all intents and purposes, the world has now crossed the rubicon in regards to securing our future against the coming ravages of global climate change.

We are entering a new era where exploding population numbers, environmental disruption, resource shortages, economic implosion,
heightened insecurity and a proliferation of weapons worldwide (with the intent to use them) are literally plunging the human species
over the cliff into an Apocalypse of biblical proportions.

The threat of global climate change, in and of itself, could singlehandedly bring on the dreaded 4 horsemen of the Apocalypse of Revelations:
War, Famine, Pestilence and Death.  Billions will be facing extermination.

We’re not in Kansas anymore.

Craig Stevens
Colorado Springs, Colorado
USA

America Is Running the World’s Largest Terrorist Operation

 

Washington’s Blog
June 20, 2013

Chomsky: “Obama Is Running The Biggest Terrorist Operation That Exists”

Leading liberal Noam Chomsky  said yesterday:

The Obama administration is dedicated to increasing terrorism. In fact, it’s doing it all over the world.  Obama is running the biggest terrorist operation that exists, maybe in history:  the drone assassination campaigns, which are just part of it […] All of these operations, they are terror operations.

***

People hate the country that’s just terrorizing them.  That’s not a surprise. Just consider the way we react to acts of terror. That’s the way other people react to [American] acts of terror.

 

Chomsky is right.  Experts agrees that indiscriminate drone strikes are war crimes (more here andhere).

The U.S. is not only killing people whose identity it doesn’t even know (more), but it is also  killing children.  And it is using the justifiably-vilified Al Qaeda tactic of killing people attending funerals of those killed – and targeting people attempting to rescue people who have been injured by – ourprevious strikes.

Chomsky has previously extensively documented U.S. terrorism.  As Wikipedia notes:

Chomsky and Herman observed that terror was concentrated in the U.S. sphere of influence in the Third World, and documented terror carried out by U.S. client states in Latin America. They observed that of ten Latin American countries that had death squads, all were U.S. client states.

***

They concluded that the global rise in state terror was a result of U.S. foreign policy.

***

In 1991, a book edited by Alexander L. George [the Graham H. Stuart Professor of Political Science Emeritus at Stanford University] also argued that other Western powers sponsored terror in Third World countries. It concluded that the U.S. and its allies were the main supporters of terrorism throughout the world.

Indeed, the U.S. has created death squads in Latin America, Iraq and Syria.

The director of the National Security Agency under Ronald Reagan – Lt. General William Odom – noted:

Because the United States itself has a long record of supporting terrorists and using terrorist tactics, the slogans of today’s war on terrorism merely makes the United States look hypocritical to the rest of the world.

Odom also said:

By any measure the US has long used terrorism. In ‘78-79 the Senate was trying to pass a law against international terrorism – in every version they produced, the lawyers said the US would be in violation.

(audio here).

The Washington Post reported in 2010:

The United States has long been an exporter of terrorism, according to a secret CIA analysis released Wednesday by the Web site WikiLeaks.

The head and special agent in charge of the FBI’s Los Angeles office said that most terror attacks are committed by our CIA and FBI.

Some in the American military have intentionally tried  to “out-terrorize the terrorists”.

As Truthout notes:

Both [specialists Ethan McCord and Josh Stieber] say they saw their mission as a plan to “out-terrorize the terrorists,” in order to make the general populace more afraid of the Americans than they were of insurgent groups.

In the interview with [Scott] Horton, Horton pressed Stieber:

“… a fellow veteran of yours from the same battalion has said that you guys had a standard operating procedure, SOP, that said – and I guess this is a reaction to some EFP attacks on y’all’s Humvees and stuff that killed some guys – that from now on if a roadside bomb goes off, IED goes off, everyone who survives the attack get out and fire in all directions at anybody who happens to be nearby … that this was actually an order from above. Is that correct? Can you, you know, verify that?

Stieber answered:

“Yeah, it was an order that came from Kauzlarich himself, and it had the philosophy that, you know, as Finkel does describe in the book, that we were under pretty constant threat, and what he leaves out is the response to that threat. But the philosophy was that if each time one of these roadside bombs went off where you don’t know who set it … the way we were told to respond was to open fire on anyone in the area, with the philosophy that that would intimidate them, to be proactive in stopping people from making these bombs …”

Terrorism is defined as:

The use of violence and threats to intimidate or coerce, especially for political purposes.

So McCord and Stieber are correct: this constitutes terrorism by American forces in Iraq.

The U.S. has been directly supporting Al Qaeda and other terrorists and providing them arms, money and logistical support in SyriaLibya, MaliBosniaChechnyaIran, and many other countries … both before and after 9/11. And see this.

Torture – which the U.S. has liberally used during the last 10 years – has long been recognized as aform of terrorism.

Wikipedia notes:

Worldwide, 74% of countries that used torture on an administrative basis were U.S. client states, receiving military and other support to retain power.

Some Specific Examples …

The CIA admits that it hired Iranians in the 1950′s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister.

The former Italian Prime Minister, an Italian judge, and the former head of Italian counterintelligenceadmit that NATO, with the help of the Pentagon and CIA, carried out terror bombings in Italy and other European countries in the 1950s and blamed the communists, in order to rally people’s support for their governments in Europe in their fight against communism.

As one participant in this formerly-secret program stated: “You had to attack civilians, people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security” (and see this)(Italy and other European countries subject to the terror campaign had joined NATO before the bombings occurred).

As admitted by the U.S. government, recently declassified documents show that in the 1960′s, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news reportthe official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.

Nine months earlier, a false flag attack was discussed in order to justify an invasion of the Dominican Republic. Specifically, according to official State Department records, Under Secretary of State Chester Bowles wrote on June 3, 1961:

The Vice President [Lyndon Johnson], [Attorney General] Bob Kennedy, Secretary [of Defense Robert] McNamara, Dick Goodwin [who was Deputy Assistant Secretary of State for Inter-American Affairs], [head of the Joint Chiefs of Staff] General Lemnitzer, Wyn Coerr, and Ted Achilles were here. Bob McNamara and Lemnitzer stated that under the terms of the contingency paper, they were required to be prepared to move into the island on short order if required to do so, and this, in their opinion, called for substantially more troops that we had in the area. After some discussion we considered two more aircraft carriers, some destroyers, and 12,000 marines should be moved into a position some one hundred miles off the Dominican Republic shore…

The tone of the meeting was deeply disturbing. Bob Kennedy was clearly looking for an excuse to move in on the island. At one point he suggested, apparently seriously, that we might have to blow up the Consulate to provide the rationale.

His general approach, vigorously supported by Dick Goodwin, was that this was a bad government, that there was a strong chance that it might team up with Castro, and that it should be destroyed–with an excuse if possible, without one if necessary.

Rather to my surprise, Bob McNamara seemed to support this view …

The entire spirit of this meeting was profoundly distressing and worrisome, and I left at 8:00 p.m. with a feeling that this spirit which I had seen demonstrated on this occasion and others at the White House by those so close to the President constitutes a further danger of half-cocked action by people with almost no foreign policy experience, who are interested in action for action’s sake, and the devil take the highmost …

[At a subsequent meeting], Bob McNamara went along with their general view that our problem was not to prepare against an overt act by the Dominican Republic but rather to find an excuse for going into the country and upsetting it.

Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launch fake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”

As Chris Floyd and many others have noted, this plan has gone live.

United Press International reported in June 2005:

U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.

And there is substantial additional evidence of hanky panky in Iraq.

 

Related posts:

  1. Is America the World’s Largest Sponsor of Terrorism?
  2. Top Interrogation Experts Agree: Torture Doesn’t Work
  3. Experts Agree: War On Terror Is A Racket, CIA And Wall Street Are Financed By Global Drug Trade
  4. Interrogation Experts From Every Branch of the Military and Intelligence Agree: Torture DOESN’T Produce Useful Information
  5. G20 case reveals ‘largest ever’ police spy operation

Over 200 Million People Are In the Facial Recognition Database

Over 200 Million People Are In the Facial Recognition Database

 

You are probably participating in the facial recognition database whether you want to or not. Most likely, your visage is there to be easily identified, without your consent, even if you’ve never committed a crime.

BERLIN, GERMANY - A quadrocopter drone flown remotely by a participant and equipped with a video camera flies on the first day of the re:publica 2013 conferences on May 6, 2013 in Berlin, Germany. Re:publica, a three-day-event, brings together bloggers and digitial media professionals for a series of conferences on affecting social, political and economic change through the Internet. (Photo by Sean Gallup/Getty Images)

By Daisy Luther
Intellihub.com
June 17, 2013

Using the vague criteria of “law enforcement purposes”, the United States has more than 200 million Americans filed away in various facial recognition databases.  If you have a driver’s license or any other government photo ID, your face is probably one of them.

The Washington Post reported:

Law enforcement use of such facial searches is blurring the traditional boundaries between criminal and non-criminal databases, putting images of people never arrested in what amount to perpetual digital lineups. The most advanced systems allow police to run searches from laptop computers in their patrol cars and offer access to the FBI and other federal authorities.

Such open access has caused a backlash in some of the few states where there has been a public debate. As the databases grow larger and increasingly connected across jurisdictional boundaries, critics warn that authorities are developing what amounts to a national identification system — based on the distinct geography of each human face.

There is no way to “opt out” of this for privacy reasons if you intend to be a licensed driver in the United States. Have you noticed that now when you go to have a driver’s license picture, you aren’t allowed to smile?  That’s because it can throw off the ability of scanners to “recognize” you, because it changes the shape of your eyes and can also obscure your eye color.  For the same reason, you aren’t allowed to wear glasses, long bangs, or head coverings.  Your face is being catalogued for future identification purposes.

Only 13 states have not gone into full-out Big Brother mode with facial recognition…yet.  At this time, the states without the technology are Alaska, California, Wyoming, Arizona, Mississippi, Louisiana, Missouri, Michigan, Ohio, Virginia, Maryland,  Maine, and New Hampshire.  However, even though they don’t have the technology to readily identify residents, they still have millions of photos in their databases.

What’s more, it isn’t only our driver’s licenses that we have to worry about.  Another, even larger, database exists. The US State Department has a database with 230 million searchable images.  Anyone with a passport or an immigration visa may find themselves an unwilling participant in this database.   Here’s the breakdown of who has a photo database:

  • The State Department has about 15 million photos of passport or visa holders
  • The FBI has about15 million photos of people who have been arrested or convicted of crimes
  • The Department of Defense has about 6 million photos, mainly of Iraqis and Afghans
  • Various police agencies and states have at least 210 million driver’s license photos

This invasion of privacy is just another facet of the surveillance state, and should be no surprise considering the information Edward Snowden just shared about the over-reaching tentacles of the NSA into all of our communications. We are filing our identities with the government and they can identify us at will, without any requirement for probable cause.

The authorities that use this technology claim that the purpose of it is to make us safer, by helping to prevent identity fraud and to identify criminals.  However, what freedom are we giving up for this “safety” cloaked in benevolence? We are giving up the freedom of having the most elemental form of privacy – that of being able to go about our daily business without being watched and identified.  And once you’re identified, this connects to all sorts of other personal information that has been compiled: your address, your driving and criminal records, and potentially, whatever else that has been neatly filed away at your friendly neighborhood fusion center.

Think about it:  You’re walking the dog and you fail to scoop the poop – if there’s a surveillance camera in the area, it would be a simple matter, given the technology, for you to be identified. If you are attending a protest that might be considered “anti-government”, don’t expect to be anonymous.  A photo of the crowd could easily result in the identification of most of the participants.  Are you purchasing ammo, preparedness items, or books about a controversial topic?  Paying cash won’t buy you much in the way of privacy – your purchase will most likely be captured on the CCTV camera at the checkout stand, making you easily identifiable to anyone who might wish to track these kinds of  things.  What if a person with access to this technology uses it for personal, less than ethical reasons, like stalking an attractive women he saw on the street?  The potential for abuse is mind-boggling.

If you can’t leave your house without being identified, do you have any real freedom left, or are you just a resident in a very large cage?

*****

Daisy Luther is a freelance writer and editor.  Her website, The Organic Prepper, offers information on healthy prepping, including premium nutritional choices, general wellness and non-tech solutions. You can follow Daisy on Facebook and Twitter, and you can email her at daisy@theorganicprepper.ca

Related Articles You Might Like:

All-in-one biometric tool combines facial, card and fingerprint scanning

Shuttle Computer HR70 biometric scanner

All-in-one biometric tool combines facial, card and fingerprint scanning

Facilities access is the first line of defense for most agencies. Keeping cyberspace clear of bad guys does little good if they can walk in the front door of the building and into the server room. So it’s essential to know who is where in today’s office buildings, schools, warehouses or labs. But implementing a robust and non-invasive biometric scanning system has always been both expensive and a bit of a technological chore.

Shuttle Computer Group is trying to make it easier and more affordable to lock down buildings using biometric controls with its HR70 all-in-one facial recognition hardware. In addition to scanning faces, the HR70 has an optional contactless card reader that could work with Personal Identity Verification and Common Access Cards, and it even has a fingerprint reader that does not require contact with the screen.

“More and more companies are using security devices for employee access, time stamping and verification of employee location in case of an emergency, but high cost has been prohibitive,” said Marty Lash, director, sales and marketing, Shuttle Computer Group.  “Now Shuttle has an affordable, all-in-one product, making it easier for integrators to develop a customized solution for any security installation.”

Designed for commercial, industrial or institutional systems, Shuttle will make a software development kit and an application programming interface available so integrators can use the HR70 as a basis for electronic access control systems using facial recognition, optional card reading and/or fingerprint identification. Programmers can use one, two or all three devices together to determine security access levels.

Shuttle’s HR 70 features a seven-inch LCD touch-screen panel with two 2.0 megapixel, 720p high-definition cameras. It is powered by an Intel Celeron 847 17W CPU for fast search-and-match results through large databases.

Using the USB 3.0, RS232 and two-way RS485 communications support, programmers can create dynamic actions like opening doors, lifting garages, sliding bolts, releasing locks and other actions based on facial, fingerprint or card recognition, with almost instantaneous results. And because these devices are connected to a network, they can be remotely monitored from a central location, and security personnel can view access in real time.

The HR70 will be available in mid-July through ASI, Ingram, Ma Labs and Synnex, and it comes with a standard three-year limited warranty. Pricing will be announced at that time, but company officials told GCN that they expect the kit will be available for less than $1,500 per unit.

About the Author

John Breeden II directs the GCN Lab. Follow him on Twitter: @GCNLabGuys.

Skynet to Launch October, 2013

Sunday, June 16, 2013

Skynet to Launch October, 2013

 

Jack Mullen
Activist Post

Business Insider published an article about the NSA data center being constructed in Bluffdale, Utah. The facility, being roughly 1 million square feet, will house a computing and data harvesting and long term data storage facility to be operational by October 2013. (Source)

The stated purpose of the facility is to “listen and decode all foreign communications of interest to the security of the United States.” But in light of the recent revelations of NSA whistleblower Edward Snowden, the data center under construction in Utah is far more likely a tool of the United States Government (and its global masters) to collect unimaginable amounts of data on Americans and eventually every human on earth.

In fact, as far back as the mid nineteen eighties, the NSA and other intelligences agencies created and controlled a secret computer monitoring operation in New Zealand and elsewhere called project ECHELON.

Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world’s telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world.[*]

With this so-called leak from Snowden, the public is now aware of something that has been going on for decades and, by now, would have already compiled billions of records about hundreds of millions of people in the America and the world.

In fact this ‘leak’ really doesn’t provide a lot of new information, since we already knew “The ECHELON system is not designed to eavesdrop on a particular individual’s e-mail or fax link. Rather, the system works by indiscriminately intercepting very large quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world to tap into all the major components of the international telecommunications networks. Some monitor communications satellites, others land-based communications networks, and others radio communications. ECHELON links together all these facilities, providing the US and its allies with the ability to intercept a large proportion of the communications on the planet.”

 

But what we do learn from the media’s focus on this “new shocking revelation” is that the technology of secret, off-the-record, underground intelligence operations working for either a breakaway civilization, living side by side with earth’s existing civilizations, or operated as a spook operation serving a multinational global elite seeking to control and rule the world, is far more advanced than previously believed. Moreover, it would seem likely this new “leak” is just another bit of predictive programming designed to alert the world something even bigger is already in the works.

The data center, at a cost of $2 billion (but much higher, based on the cost of the technology already created to make this possible) is probably the outward tip of an iceberg to introduce and indoctrinate the public to something even worse than the news that every bit of human communication and knowledge is and has been recorded for decades.

In terms of data storage, some publications suggest the data center will house digital storage capacities on the order of YottaBytes which is a number so large it is incomprehensible to the human mind. A Yottabyte is one septillion bytes or 10 to the 24th power bytes. Enough storage, indeed, to record and keep every single bit of human digital information; every phone call, text message, Internet chat, Email, song, word spoken, every book, bank account, all financial data, patents, stolen intellectual property, and more. With this amount of storage and more on the way, as the “law of accelerating returns” turns out denser and faster memory, the entire real-time movie of mankind can be recorded, analyzed and used, for what – only the gods know.

“Cyberdyne Systems” 2013

 
At the center of the data center will be one of the world’s most powerful computers ever built (at least as far as we art told). The so-called, and named with a wink to triangle-worshipping cults, ‘Titan Supercomputer’ will come alive and for the first time operate at the speed necessary and with the memory required to become conscious.

According to Ray Kurzweil, the geek poster boy of transhumanism, in his 1999 prophecy and transhumanistic bible entitled When Computers Exceed Human Intelligence: The Age of Spiritual Machines, the above average human brain operates or process approximately 20 million billion calculations per second, in other words 20,000 trillion calculations per second.

In the article linked below, the NSA Supercomputer Titan, coincidentally is advertised to operate at 20,000 trillion calculations per second. Furthermore, Kurzweil explains that in addition to computing power, a human-like sentient computer would also have to have at least as much memory as the current state-of-the-art human being, which he calculates to be about 1 million billion bits or a 1000 trillion bits: and since a byte is 8 bits and kilobyte is 1024 bytes, that works out to approximately 122 terabytes or 122,000 gigabytes.

According to the article above, the memory available to Titan is on the order of at least 5 Zettabytes or 5 trillion gigabytes, which is enough memory to incorporate 41 MILLION HUMAN BRAINS.

According to the original Terminator movie timeline, Skynet’s technology was built and began deployment in 1994 (no doubt an Orwell wink, as a Terminator robot is sent back to 1984 to stop the birth of JC – not Jesus Christ, but John Connor), and on August 4, 1997 the machine went online. Learning geometrically, the machine became sentient at 2:14 AM, 25 days later on August 29, 1997.

The new real-life NSA supercomputer, called Titan, is named after a race of gods created from descendants of Earth and Uranus, hybrids, immortal, of great strength of body and mind and rulers of Earth; it was the Titan Prometheus who created man from clay and theft of fire.

The Titan Supercomputer, with enough computing power and infallible memory to become sentient, will come online in October, 2013 and, like “Skynet”, will it begin to learn? With the brain capacity of 41 million human minds and all of the data and information about billions of human beings – this “machine” could become quite powerful very quickly. With connections to satellites and every major power and command center on earth and the knowledge base of nearly every human mind in the written history of mankind – all written knowledge: we can only imagine the possibilities.

Human Epitaph

 
Kurzweil, the lead public futurist barking for the technocratic elite, predicts the next evolution on earth will be the machine. In his vision, mankind morphs into a machine, leaving his ephemeral human vessel behind, a biological consciousness welded into machine performance on a quest for immortality and a chance to become a god.

According to Kurzweil, the current human biological evolutionary path to knowledge is bottlenecked by brain speed limits and memory capacity: “The brain’s weakness is the extraordinarily slow speed of its computing medium, a limitation that computers do no share with us. For this reason, DNA-based evolution will eventually have to be abandoned.” *

With the arrival of Titan, the latest and greatest model of a co-evolving machine-based life, the technology now exists to eradicate all human privacy. This is a very big event in human history, one that would require a book to explore, but I am going to venture a few reasons why it will become the bifurcation point in the race of the man versus the machine.

Privacy also includes privacy of thought; technology permitting direct measure and prediction of thought is now being successfully deployed. [*]

Privacy is a uniquely human idea and experience and I would argue necessary for human evolution and growth as a species of individuals seeking an individual experience with paths to personal growth, sprirtualism and self actualization.

Without privacy, what is a individual? He or she is a forgone conclusion, a worker bee, a drone or, using a Star Trek analogy, a Borg. Without privacy, human development, personality, strengths, appearance and characteristics will become uniform and monotonous. Without privacy, there will eventually be no concept of private property and its accumulation toward expressions of sudden knowledge bursts and improvement via repeated struggle of human minds seeking to solve problems benefiting the individual and species.

Without private property, there can be no Liberty by definition. Liberty is the freedom of will to choose and do individual things, think individual thoughts and express oneself individually, concomitantly where news and knowledge of these expressions is always derivative, never before the fact.

Without privacy, I would argue much of mankind will make his last act of individualism and choose not to live, because privacy is the oneness, the aloneness that defines the “I” in “I am alive”.

Mankind 2.0

 

Kurzweil and other futurists, god wannabees, technocrats, and wealth-dense psychopaths all know and anticipate an end for human beings in our present form. They anticipate a grand culling where those who will not conform and ‘transform’ will lose the will to live in a world of intellectual and physical inferiority; in a world without the privacy necessary to trigger a far stronger, intelligent and self evolving human individual.

The technocrats expect ‘standard’ wetware human beings to become drones, slaves, relegated to the toy closest of wealthy gods looking for interesting gifts for their children. But I think humanity is still possessed of something the gods of the machine have failed to recognize in their haste to end the individual and build a collective hive minded, data sharing, alpha Borg.

Quantum Minds and Spiritual Entanglements

 
The human brain, impossibly slow and working with junior-sized memory, is still not fully understood and, surprisingly to the machine metaphysicians, is still able to solve problems apparently impossible within a purely analytical, algorithm-based paradigm of brain-mind operation. Many scientists and philosophers find the idea that a computer could be conscious, just by doing what they do now only faster and with more memory, wishful thinking bordering on insane.

Thinkers such as John Searle have made arguments that Artificial Intelligence is only a “ useful tool in the study of mind” and no matter how quickly, or massively parallel, these “Strong Calculators” perform algorithms and mathematical calculations – without the ability to ever ‘understand‘ they can only simulate the operation of the mind.

Summarizing Searle and others such as John McCarthy, the inventor of the term Artificial Intelligence:

mental states are biological phenomena. Consciousness, intentionality, subjectivity and mental causation are all a part of our biological life history, along with growth, reproduction, the secretion of bile, and digestion. [*]

Another scientist and writer versed in multiple disciplines is Roger Penrose, English mathematical physicist, recreational mathematician and philosopher. Starting with Gödel’s incompleteness theorem and working through some advanced mathematics, Penrose concludes the human mind is not a Turing Machine because, if it were, the mind would be hobbled by Gödelian limitations.[*]

Penrose postulates that since Gödelian impossible problems require an infinite number of calculations, the human mind goes around this “Gödelian Bottleneck” using quantum computing, a method of solving problems of the type requiring a large number, or even an infinite number of calculations. Quantum computers, that have been already built using human DNA as the processor, instantly distill a large number of calculations into a result by “actually turning an infinite time into a finite time”[**]

Beyond the abstract arguments couched in obscurity of abstruse mathematics is the question of life from a spiritual point of view. The idea that human beings are more than a meat sack benefiting from an evolved, 3 pound, wet-working, DNA based, sugar-powered parallel processor. Many people see the human body as the seat of a soul, a higher being condensed into a suitable shell, enjoying a spectacularly human experience as part of an immortal sequence of an infinite number of lifetimes.

The evidence of what Lawrence LeShan called the “Clairvoyant Reality” and “Transpsychic Reality” seems to indicate the human mind is also connected to a higher order of consciousness, something connecting all life, perhaps all life in the Universe. Dr. LeShan and others have used altered states of consciousness to discover information and to affect changes in our reality including healing of others through psychic connections, that cannot be explained using models based on algorithms and Turing machines.

Humans possess a DNA-based genetic blueprint capable of storing massive amounts of data, at least 700 Terabytes per gram of DNA is the current estimate. Additionally, the human brain appears to contain a light-sensitive receiver capable of detecting light even in total darkness, the Pineal gland. The Pineal gland structure and the structure of DNA suggest that both may have properties of a receiving antenna, capable of receiving and transmitting electromagnetic information.

These discoveries and the lack of information about how that brain/mind organ actually works, mean that the human evolution/spiritual path my have yet much to reveal. Perhaps expanded consciousness and more directed use of dormant DNA will lead to a biological human 2.0, given time.

Collectivism’s Final Frontier 

 
Kurzweil makes the claim that machines have characteristics which make them superior to humans along a number of dimensions. One of the primary attributes of machine intelligences is their ability to quickly share and clone information (data).

Machines, according to Kurzweil would only require one working unit to populate their entire kind – a single machine life-form could then clone and copy data to others; instantly the new machines would have access to all the knowledge of their ancestor. “Machines can readily share all of their accumulated knowledge, so only one machine has to do the learning”. [*] Humans on the other hand must learn via a slow and arduous process and, at the same time, suffer the loss of memory and incorporate detriments of an aging body.

The advantages of instantly sharing, copying and cloning information among artificially intelligent entities are, however, inconsistent with individuality and novelty. Humans beings are individuals, experiencing an individual life; contributing to the collective lives of others only as required for optimum survival of the individual and hence the species. Individuals are required to produce and populate the species and distinctive characteristics evolve by natural selection and the nature of the spawned individual, which introduces novelty and unexpected consequences and the uniqueness of an individuals experience.

Data sharing, cloning and copying are schematic code for uniformity and a singular experience. Creating life based on sharing and copying are consistent with Collectivism, a paradigm used to conform and transform individuality into uniformity and consistent with the known consequences of generational incest.

Kurzweil and global elite expecting to somehow “breakaway” from their humanity and merge with the machine resulting in both immortality and access to infinite knowledge must also understand it is the nature of collectivism to reduce complexity in the pursuit uniformity. Collectivism favors the collectors; any systems involving sentient life must also include a hierarchy of interests with rules of survival dictating use of resources. Kurzweil and company may find themselves trapped in their own collective, prisoners of immortality and numbed down by monotony.

In the words of the Borg: We are the Borg. Lower your shields and surrender your ships. We will add your biological and technological distinctiveness to our own. Your culture will adapt to service us. Resistance is futile.”[*]

Revolution 2.0 

 

For those of us that want to remain human it is important to value privacy, property and the resulting Liberty. We are now in the upward knee of an approaching singularity which has been telegraphed for centuries and soon will change the very nature of being human.

Now is the time self-actualized, spiritually enlightened individuals demand and, if necessary, fight to remain private beings, living and growing and experiencing our unique and distinctive private lives.

It is time to erase and reboot the techno-civilization that is exponentially accelerating toward collectivism’s final frontier; take down systems designed to destroy privacy, collect data and redistribute self-responsibility.

For humans a life of self-responsibility is the means to remain human. We are individuals and as such responsible for and benefit from our uniqueness and the resulting control over destiny.

We are not a means to some other’s ends, but rather an end in ourselves.

Sources:
http://terminator.wikia.com/wiki/Skynet
http://www.businessinsider.com/pictures-of-the-nsas-utah-data-center-2013-6
http://cryptome.org/jya/echelon.htm
http://www.nbcnews.com/technology/google-search-basically-reads-your-mind-now-775019
http://articles.timesofindia.indiatimes.com/2013-05-16/computing/39309615_1_amit-singhal-google-voice-search
http://www.jeffpolachek.com/mind-control/mc-research-docs/199-government-technology-to-read-your-thoughts-and-implant-new-ones
http://www.cs.bham.ac.uk/research/projects/cogaff/sloman.searle.85.text
http://www.flint.umich.edu/~simoncu/380/searle.htm
http://www.sciencedaily.com/releases/2007/03/070321093451.htm
** http://arxiv.org/ftp/quant-ph/papers/0512/0512248.pdf
http://www.wired.com/wiredscience/2013/01/dna-data-storage-2/
http://www.hark.com/clips/nfsndxsfnt-we-will-add-your-biological-and-technological-distinctiveness-to-our-own

Books mentioned : http://www.amazon.com/The-Age-Spiritual-Machines-Intelligence/dp/0140282025/ref=sr_1_1?ie=UTF8&qid=1371308603&sr=8-1&keywords=age+of+spiritual+machines
http://www.amazon.com/The-Emperors-New-Mind-Concerning/dp/0192861980/ref=sr_1_1?ie=UTF8&qid=1371309801&sr=8-1&keywords=the+emperors+new+mind
http://www.amazon.com/The-Medium-Mystic-Physicist-Paranormal/dp/1581152736
http://www.amazon.com/The-Singularity-Is-Near-Transcend/dp/0143037889/ref=sr_1_2?ie=UTF8&qid=1371308638&sr=8-2&keywords=age+of+spiritual+machines
http://www.amazon.com/Three-Pound-Universe-Judith-Hooper/dp/0874776503/ref=sr_1_1?ie=UTF8&qid=1371308681&sr=8-1&keywords=3+pound+universe

Movie References: http://www.amazon.com/The-Terminator/dp/B00153ZC8Q/ref=sr_1_1?ie=UTF8&qid=1371309924&sr=8-1&keywords=terminator

Jack Mullen has been a businessman for more than 25 years, owning 3 radio stations, several technology based companies and a resource development company.

NSA Copies All Internet Data, Creates Dossiers on Every User

J.P. Hicks
Blog Tips

The Associated Press dropped a bombshell report yesterday that claims the NSA’s secret Internet spy program Prism is just a small part of a much more “expansive and intrusive” digital spying effort.

According to the AP, the NSA copies ALL INTERNET traffic in and out of the United States for analysis by hoovering all data that passes through fiber lines.

“Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light,” AP reports.

Prism was originally thought to be a program to force Internet companies to hand over private user data to the government. But it turns out that Prism is actually a filtering tool to “make sense of the cacophony of the Internet’s raw feed…Prism takes large beams of data and helps the government find discrete, manageable strands of information.”

 
 
It then manages those strands of data by creating dossiers on every Internet user, providing the government with “names, addresses, conversation histories and entire archives of email inboxes.”
 
And, of course, all of this data is collected and kept on innocent people without a warrant or any probable cause.
 
This explosive report comes the same day that the NSA held a classified briefing for members of Congress where they admit to listening to phone calls within the United States without a warrant.
 
CNET reports:

Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”

If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee.

 
Nadler told CNET that the “same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages.” 
 
In other words, the NSA claims the authority to listen to any call or read any email based on the whims of an analyst, not a court order based on probable cause.

This is precisely the power Edward Snowden, as an analyst working for the private NSA contract Booz Allen Hamilton, claimed to have in his interview with The Guardian.

 
All of these recent revelations seem to confirm the worst fears of civil liberties groups. The American government is indeed listening to our phone calls and reading our emails without a warrant and little to no oversight to how this information is accessed or used.
 
What’s even worse, they’re building dossiers on all Americans to be tapped whenever one of the hundreds of thousands of analysts decides to, and all of it occurs in secret.
 
This is perhaps the most egregious breach of the public’s trust in the history of the United States.  The government operates with complete secrecy while knowing all private information about its citizens.

Weren’t we supposed to have a transparent government with individual privacy for citizens? 

http://www.guardian.co.uk/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video

J.P. Hicks is an entrepreneur, info-activist, pro blogger, editor of BlogTips.com and author of Secrets to Making Money with a Free Blog. Follow @ Twitter, or like on Facebook.

– See more at: http://www.blogtips.com/2013/06/nsa-copies-all-internet-data-creates.html#sthash.5jYHhdeD.dpuf

PRISM Is Just Part Of A Much Larger, Scarier Government NSA Surveillance Program

PRISM Is Just Part Of A Much Larger, Scarier Government Surveillance Program

 
 
 
nsa-spying-logo

In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world’s largest software company and, at the time, largest email provider.

The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

Inside Microsoft, some called it “Hoovering” — not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.

The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.

But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.

Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet’s backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.

Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information.

The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president’s daily briefing. Prism makes sense of the cacophony of the Internet’s raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.

Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism’s success.

The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far.

The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.

Tag Cloud