Saturday, February 19, 2022

Part 5 : Under an Ionized Sky From Chemtrails to Space Fence Lockdown... Mastering the Human Domain

Under an Ionized Sky
From Chemtrails 
to 
Space Fence Lockdown
by Elana Freeman



Chapter 6 
Mastering the Human Domain


I can assert that the vast majority of the computer systems currently in use, the huge systems that span our planet—military ones, for example—are beyond our understanding. I do not merely mean that there is no one left who can grasp their working, but that the time when we could do that is past and gone. It is no longer possible to understand them. [that is some deep s*#t right there brothers and sisters d.c]
— Joseph Weizenbaum, 
Computer Power and Human Reason, 
“From Judgment to Calculation,” 1984 

Quarry considered VIXAL. He pictured it as a kind of glowing celestial digital cloud, occasionally swarming to earth. It might be anywhere—in some sweltering, potholed industrial zone stinking of aviation fuel and resounding to the throb of cicadas beside an international airport in Southeast Asia or Latin America; or in a cool and leafy business park in the soft, clear rain of New England or the Rhineland; or occupying a rarely visited and darkened floor of a brand-new office block in the City of London or Mumbai or São Paolo; or even roosting undetected on a hundred thousand home computers. It was all around us, he thought, in the very air we breathed. He looked up at the hidden camera and gave the slightest bow of obeisance. 
“Leave them,” he said. 
— Robert Harris, 
The Fear Index, 2012 

Any discussion of computers and their role in a planetary lockdown must begin with secrets. 

Off the island Antikythera in the Aegean on Maundy Thursday 1900, sponge divers found a small lump of corroded bronze and wood with gear wheels inside dated between 85 and 50 B.C. It was a geared computer once used to calculate the past, present, and future positions of the heavens. 

Futurist Arthur C. Clarke (1917–2008) made it clear that magic and technology are at least kissing cousins, if not closer. The modern cryptic relationship between machines and their encoded secrets harks back to soldier-playwright Sophocles (496–406 B.C.) who introduced the mechane to Greek drama by lowering it onto the stage to provide the deus ex machina for the plot’s supernatural intervention. Electrical computer ciphers are equally magical in that they appear at the stroke of a key. The year the Bomb shattered matter (and, some think, the United States), its father Vannevar Bush (1890–1974) 1 had a dream in which a deus ex machina called memex was perched on a doctor’s desk, calling up patients’ files and case histories. In the July 1945 Atlantic Monthly article “As we may think,” Vannevar explained how one day soon whole encyclopedias with associative connections would appear magically on the memex screen, and professionals and laymen alike would turn to it as to a library or oracle. The memex would be self-teaching and relieve people of the need for memory or recall. [ no thanks I will keep them both myself d.c]

Concurrent with Vannevar’s dream was the arrival of the U.S. Army’s EINAC (Electronic Numerical Integrator and Computer) with 18,000 vacuum tubes and miles of wiring, followed by England’s Mark I (1948), EDSAC (1949), and the United States’ EDVAC (1951), UNIVAC I (1951), and ILLIAC I (1952). Thus was the cyber revolution set in motion. 

For centuries, high-degree Freemasons and wealthy cognoscenti have quietly used gear models for computation and forecasting the future, at least since the bronze head answered yes or no to Gerbert d’Aurillac (920–1003), the Benedictine monk-professor at the University of Rheims elected Pope Sylvester II. From the cybernetics journal Computers and Automation (October 1954): 

We must suppose that Pope Sylvester II, Gerbert d’Aurillac, was possessed of extraordinary knowledge and the most remarkable mechanical skill and inventiveness. This speaking head must have been fashioned “under a certain conjunction of stars occurring at the exact moment when all the planets were starting on their courses.” Neither the past nor the present nor the future entered into it, since this invention apparently far exceeded in its scope its rival, the perverse “mirror on the wall” of the Queen, the precursor of our modern electronic brain. Naturally, it was widely asserted that Gerbert was only able to produce such a machine because he was in league with the Devil and had sworn allegiance to him. 

From British intelligence agent Lord Francis Bacon’s seventeenth-century ciphered binary code to the encrypted Dayton Witch with its cipher book (once the property of the cybernetics department at Brunel University in High Wycombe just up the road from Sir Francis Dashwood’s “magickal” Hellfire estate in Oxfordshire), families with wealth and standing have had access to intellectual, computational, and magical help. Perhaps the U.S. State Department still has a Black Chamber (Cipher) Bureau at 131 East 37th Street in New York City, just a few blocks from industrialist J.P. Morgan’s mansion-cum-museum. Why not? The electromechanical rotor cipher machine known as the Enigma was recently the topic of The Imitation Game, a film about Alan Turing, the father of modern computation. 

Computers, their ciphers and binary code go hand in hand with cryptography and cybernetics such as were practiced by visionary millionaire George Fabyan (1867–1936), patron of acoustics and perpetual motion. In fact, the National Security Agency—secretly founded thirty-six years (6 X 6) after Fabyan’s death—honored him with a plaque at the Riverside Acoustic Laboratory on his three-hundred-acre Fox River Valley estate forty miles west of Chicago. The plague read To the memory of George Fabyan from a grateful government. 

The fact is that high-speed data processing has availed the elite of their dream of social and eugenic engineering. In 1946, the Cybernetics Group morphed into the Feedback Mechanisms in Biology and the Social Sciences, and later into the World Federation of Mental Health. Sandwiched among cybernetics, biology, and mental health was the discovery of LSD, the U.S. Navy’s Project Chatter, and the 149 subprojects of the CIA’s drugs-hypnosis-pain induction program with an acronym for public dissemination almost as nifty as HAARP: MK-ULTRA. In the same timeframe, the U.S. Air Force privatized its research and development arm as RAND Corporation to protect military projects and cyphers from congressional curiosity. After the Manhattan Project, polymath John von Neumann (1903–1957) pushed for neural nets (the conceptual forerunner of the Internet) and mutual assured destruction (MAD) war-game strategies. 

From ferrite-core memory and transistors to hard disks, linked modular mainframes, Sketchpad, and vacuum tubes to solid-state logic, the military-industrial-intelligence complex zeroed in on cybernetics. In 1961 the silicon crystal chip miniaturized the memory storage that transistors had been handling, packet switching and digital expanded the bandwidth and laid out the redundant, multilevel web for teletype data and voice. 

After the Cuban Missile Crisis of 1962, Secretary of Defense McNamara called for automated intelligence production. The Defense Intelligence Agency (DIA) already had an Automatic Data Processing Center on a rented IBM 360/30 mainframe that could index, store, and retrieve intelligence like U-2 photos of Soviet military installations. The RAND packet-switching idea had a go, born out of a need for an alternate Cold War command-and-control (C2) network. The first linkup of Pentagon computers talking to each other in a closed network of ARPANET known as COINS 2 (Intelligence Community Computer Communication Network) was launched on December 31, 1966 from the DIA Security Office. Streams of digital data were broken into short bursts, followed by the early email software known as SMTP (simple mail transfer protocol). 

Industry and the State Department were already scouring the Earth for what the new cybernetic weapon would need: lead and cadmium for circuit boards, lead oxide and barium for monitor cathode ray tubes, mercury for switches and flat screens, brominated flame retardants, and most recently niobium and titanium for super conduction. Resources, dictators and war are practically synonymous. 

From the beginning, the National Security State had plans for Vannevar Bush’s democratic dream. Computers as multiprocessors were churned out: the 360 IBM series with the internal military intelligence compatibility, Seymour Cray’s 6600, 7600, and Cray I, Intel’s microprocessor mesh Paragon, and Xerox PARC mouse-windows and ALTO in 1971. 

And then came the supercomputer with its customized units called blades housing multiple nodes (CPUs, GPUs). Imagine 10 quadrillion calculations per second (10 petaflops). . .But then something happened in the 1980's—the theft of a piece of computer software—that secretly ricocheted through world events even more powerfully than the Enigma. 

THE PROMIS BACKDOOR 
Beyond embedded journalists, news blackouts, false flag events, blacklisted and disappeared Internet domains—the plotline of America’s “free press”—there are now ISP-filtering programs subject to Homeland Security guidelines that sift through emails and toss some into a black hole. Insiders and the NSA-approved, however, can get around such protections of networks by means of the various hybrids of the PROMIS backdoor. 

The 1980s theft of the Prosecutor’s Management Information System (PROMIS) software handed over the golden key that would grant most of the world to a handful of criminals. 3 In fact, this one crime may have been the final deal with the devil that consigned the United States to its present shameful descent into moral turpitude. 4 [ she is not just blowing smoke here, spot on about the importance of this event because it led to so much damn else down the road. d.c]

PROMIS began as a COBOL-based program designed to track multiple offenders through multiple databases like those of the DOJ, CIA, U.S. Attorney, IRS, etc. Its creator was a former NSA analyst named William Hamilton. About the time that the October Surprise Iranian hostage drama was stealing the election for former California governor Ronald Reagan and former CIA director George H.W. Bush in 1980, Hamilton was moving his Inslaw Inc. from non-profit to for-profit status. His intention was to keep the upgraded version of PROMIS that Inslaw had paid for and earmark a public domain version funded by a Law Enforcement Assistance Administration (LEAA) grant for the government. With 570,000 lines of code, PROMIS was able to integrate innumerable databases without any reprogramming and thus turn mere data into information. [I note that election in tandem with that of 2000 to remind you that when it comes to politic's the Democrats are just plain stupid, and the 16 and 20 elections are going to prove that, things might have been different if they had been honest about what happened in the 16 election, this is better then watching Rome burn d.c]

With Reagan in the White House, his California cronies at the DOJ offered Inslaw a $9.6 million contract to install public-domain PROMIS in prosecutors’ offices, though it was really the enhanced PROMIS that the good-old-boy network had set its sights on. 

In February 1983, the chief of Israeli anti terrorism intelligence was sent to Inslaw under an alias to see for himself the DEC VAX enhanced version. He recognized immediately that this software would revolutionize Israeli intelligence and crush the Palestine Intifada. Enhanced PROMIS could extrapolate nuclear submarine routes and destinations, track assets, trustees, and judges. Not only that, but the conspirators had a CIA genius named Michael Riconosciuto who could enhance the enhanced version one step further, once it was in their possession. [If you do not know the story of Mr Riconosciuto, you should check it out. d.c]

To install public domain PROMIS in ninety-four U.S. Attorney offices as per contract, Inslaw had to utilize its enhanced PROMIS. The DOJ made its move, demanding temporary possession of enhanced PROMIS as collateral to ensure that all installations were completed and that only Inslaw money had gone into the enhancements. Naïvely, Hamilton agreed. The rest is history: the DOJ delayed payments on the $9.6 million and drove Inslaw into bankruptcy. With Edwin Meese III as Attorney General, the bankruptcy system was little more than a political patronage system, anyway. 

The enhanced PROMIS was then passed to the brilliant multivalent computer and chemical genius Riconosciuto, son of CIA Agent Marshall Riconosciuto. 5 Recruited at sixteen, Michael had studied with Nobel Prize-winning physicist and co-inventor of the laser Arthur Shallo. Michael was moved from Indio to Silver Springs to Miami as he worked to insert a chip that would broadcast the contents of whatever database was present to collection satellites and monitoring vans like the Google Street View van, using a digital spread spectrum to make the signal look like computer noise. This Trojan horse would grant keyclub access to the backdoor of any person or institution that purchased PROMIS software—as long as the backdoor could be kept secret. 

Meanwhile, the drama between Hamilton and the conspirators at DOJ continued. A quiet offer to buy out Inslaw was proffered by the investment banking firm Allen & Co., British publisher (Daily Mirror) Robert Maxwell, the Arkansas corporation Systematics, and Arkansas lawyer (and Clinton family friend) Webb Hubbell. Hamilton refused and filed a $50 million lawsuit in bankruptcy court against the DOJ on June 9, 1986.[yep, that one d.c.] 

Bankruptcy Judge George F. Bason, Jr. ruled that the DOJ had indeed stolen PROMIS through trickery, fraud, and deceit, and awarded Inslaw $6.8 million. He was unable to bring perjury charges against government officials but recommended to the House Judiciary Committee that it conduct a full investigation of the DOJ. The DOJ’s appeal failed, but the Washington, D.C. Circuit Court of Appeals reversed everything on a technicality. 

Under then-President George H.W. Bush (1989–1993), Inslaw’s petition to the Supreme Court in October 1991 was scorned. When the IRS lawyer requested that Inslaw be liquidated in such a way that the U.S. Trustee program (AG Meese’s feeding trough between the DOJ and IRS) could name the trustee who would convert the assets, oversee the auction, and retain the appraisers, Judge Bason refused. 

Under then-President William Jefferson Clinton (1993–2001), the Court of Federal Claims whitewashed the DOJ’s destruction of Inslaw and theft of PROMIS on July 31, 1997. Judge Christine Miller sent a 186-page advisory opinion to Congress claiming that Inslaw’s complaint had no merit—a somber message to software developers seeking to do business with Attorney Generals and their DOJ. For his integrity, Judge Bason lost his bench seat to the IRS lawyer.[the trash stepped down in 2013  

Throughout three administrations, the mainstream Mockingbird media obediently covered up the Inslaw affair, enhanced PROMIS being a master tool of inference extraction able to track and eavesdrop like nothing else. Once enhanced PROMIS was being sold domestically and abroad so as to steal data from individuals, government agencies, banks, and corporations everywhere, intelligence-connected Barry Kumnick 6 turned PROMIS into an artificial intelligence (AI) tool called SMART (Special Management Artificial Reasoning Tool) that revolutionized surveillance. The DOJ promised Kumnick $25 million, then forced him into bankruptcy as it had Hamilton. (Unlike Hamilton, Kumnick settled for a high security clearance and work at military contractors Systematics and Northrop.) Five Eyes / Echelon and the FBI’s Carnivore / Data Collection System 1000 were promptly armed with SMART, as was closed circuit satellite high-definition (HD) television. With SMART, Five Eyes / Echelon intercepts for UKUSA agencies became breathtaking.[DOJ can not be trusted, that's why it is the Military now, and Cuba. dc] 

The next modification to Hamilton’s PROMIS was Brainstorm, a behavioral recognition software, followed by the facial recognition software Flexible Research System (FRS); then Semantic Web, which looks not just for link words and embedded code but for what it means that this particular person is following this particular thread. 

Then came quantum modification. The Department of Defense paid Simulex, Inc. to develop Sentient World Simulation (SWS), a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. The SEAS (Synthetic Environment for Analysis and Simulations) software platform drives SWS to devour as many as five million nodes of breaking news census data, shifting economic indicators, real world weather patterns, and social media data, then feeds it proprietary military intelligence and fictitious events to gauge their destabilizing impact. Research into how to maintain public cognitive dissonance and learned helplessness (psychologist Martin Seligman) help SEAS deduce human behavior. [That is disturbing, bet it goes over big with the speculators. dc]

Coupled with Semantic Web, SWS became the testing environment by which military and intelligence could foresee what adversaries, neutrals, and allies were planning to do and thus prevent, alter, or accommodate their future behaviors. The SWS mirror world is like Where’s Waldo? the children’s book for upcoming spies, replete with big and little institutions, terrains, streets, homes, individuals, even crowds. Feed SWS what you plan to do—take over private water wells in California, unleash weather warfare on the poor in New Orleans or Haiti, phase out the border between Canada and the U.S., back Israel’s Palestinian policies—and SWS software prophesies the reaction. Crisis management.[print tomorrow's news today, big hit on Wall St, and high stakes sports betting, human nature dc]

Needless to say, military-industrial-intelligence players like DARPA, Eli Lilly, Lockheed Martin, and Homeland Security all employ SWS. Simulate a crisis, then either run it in the real world or not as a controlled false flag or real event. During Noble Resolve 07, the JFCOM-J9 (Joint Innovation and Experimental Directorate of the U.S. Joint Forces Command) worked with Homeland Security and multinational forces to run real-time, round-the-clock simulations for dozens of nations. Reactions under stress may require that several solutions be at hand, but generally JFCOM-J9 is confident after six decades of slow-boiling-frog cognitive dissonance that SWS predictions will hold in the U.S. as well as in other nations (like Ukraine and Greece) whose cultures have been carefully subjected to SWS scrutiny. 

As military contractors, telecom corporations comply with the NSA’s mandate that their equipment include a backdoor so that the NSA’s TAO hackers (Tailored Access Operations), the “premier hacking ninja squad” with “a catalog of all the commercial equipment that carries NSA backdoors,” can then intercept the online orders and bug them: 

Storage products from Western Digital, Seagate, Maxtor and Samsung have backdoors in their firmware, firewalls from Juniper Networks have been compromised, plus networking equipment from Cisco and Huawei, and even unspecified products from Dell. . .Spiegel notes that the Snowden documents do not provide any evidence that the manufacturers mentioned had any idea about this NSA activity. Every company spokesperson contacted by Spiegel reporters denied having any knowledge of the situation, though Dell officials said instead that the company “respects and complies with the laws of all countries in which it operates.” 7 

In 2014, China removed high-end servers made by IBM and Microsoft and replaced them with local brands. 8 Had they finally discovered the PROMIS backdoor? 

Now we are ready for a look at supercomputers, quantum computers, and artificial intelligence (AI) as we wonder if they too have secret backdoors. 

SUPERCOMPUTERS 
Supercomputers now digest data 24/7 and map every square inch of planet Earth while programs like LifeLog electronically bind every human being to the Smart Grid. The military-intelligence penchant for mythical names fits well with intelligence machines like the supercomputer in Brussels 666, 9 a partner in crime with the U.S. Naval Research Laboratory’s BEAST (Battle Engagement Area Simulator/Tracker), a real-time space battle management simulator seven times faster than a Cray Y-MP for functionally equivalent optimization of 3D code. (BEAST can model 32,000 objects from inputs provided by sixtyfour satellite sensors.) The U.S. Army Research Laboratory’s Excalibur—named after King Arthur’s magical sword—is also well named for technological advantage on the battlefield. 

Then there is the Big Mac supercomputer at Virginia Tech—home of the mid-latitude-to-polar SuperDARN network discussed in Chapter 7—peaking out at 17.6 teraflops, second only (at the time of this writing) to Japan’s Earth Simulator with 35.6 trillion calculations per second. The ASCI-Q at Los Alamos National Laboratory, built by Hewlett-Packard, weighs in at 13.8 teraflops, and Lawrence Livermore National Lab’s Sequoia at 16 petaflops. IBM’s Blue Gene processes 10_14 operations per second, compared to 10_16 per second of the human neocortex. 

Moving toward quantum computers and artificial intelligence (AI), IBM’s Neuromorphic System is reverse engineered from the human brain based on a neurosynaptic computer chip called IBM TrueNorth developed by Cornell University and DARPA’s Systems of Neuromorphic Adaptive Plastic Scalable Electronics (SyNAPSE) program. TrueNorth is capable of “deep learning” (16 million neurons, 4 billion synapses) and utilizes low electric power (2.5 watts)—just like the human brain. 

A single TrueNorth processor consists of 5.4 billion transistors wired together to create an array of 1 million digital neurons that communicate with one another via 256 million electrical synapses. It consumes 70 milliwatts of power running in real time and delivers 46 giga synaptic operations per second . . . 10 

SyNAPSE’s intent is to “develop electronic neuromorphic machine technology that scales to biological levels” 11—in other words, to reverse engineer a brain by building parallel processing chips one square micron in size and arraying them in a basketball size carbon sphere suspended in a gallium-aluminum alloy (liquid metal for maximum conductivity) in a powerful wireless router “tank” communicating with millions of sensors already released around the planet and linked to the Internet. 

These sensors gather input from cameras, microphones, pressure and temperature gauges, robots, and natural systems—deserts, glaciers, lakes, rivers, oceans, and rain forests. 12 

“Natural systems” no doubt include human beings and animals, as well, but I guess that’s better left unsaid. As function follows form, SyNAPSE’s “neuromorphic, brain-imitating hardware autonomously gives rise to intelligence” by mirroring the human brain’s 30 billion neurons and 100 trillion synapses, then surpassing its 1,000 trillion operations per second.

Meanwhile, McGill University in Montréal, Canada has developed a “biological supercomputer” powered by adenosine triphosphate protein strings (“molecular units of currency”) and as small as a book, but with the mathematical capabilities of giant supercomputers—and it doesn’t overheat. 13 

QUANTUM COMPUTERS 
Because the D-Wave is so good at specific problems, [Google] thinks some classical/quantum combination may prove ideal. . .Maybe the “neocortex” of future AIs will be comprised of a quantum chip, whereas the rest will remain classically driven. 14 

Classical computers use bits of information in 1s and 0s, 1s being positive charges on a capacitor, 0s being an absence of charge. A quantum computer uses qubits—strings of ions held in place by an electrical field and manipulated by laser pulses—and can simultaneously mix 1s and 0s in a quantum state called a superposition on a single atom or electron that can be in two places at once or spin clockwise and anticlockwise at the same time. In fact, “measuring a qubit knocks it out of superposition and thereby destroys the information it holds.” 15 

Still, it is the qubit that makes “the weirdest feature of quantum mechanics”—quantum entanglement —possible: 

. . .this property enables distinct quantum systems to become intimately correlated so that an action performed on one has an effect on the other, even for systems that are too far apart to physically interact. 16 

This is quantum teleportation, “a reliable and efficient way to transfer quantum information [measured as qubits] across a network. . .for a future quantum Internet, with secure communications and a distributed computational power that greatly exceeds that of the classical Internet.” 17 

What is most attractive about quantum computers to the Global Security State is their ability to quickly factor large numbers—the mainstay of electronic surveillance and data security—and equally quickly sift through masses of unsorted data to find one person or one event. These two applications alone would make the quantum computer and its superpositioning a game-changer, but add in quantum teleportation and it becomes irresistible. 

The first quantum computer comes from D-Wave Systems in Burnaby, British Columbia, Canada, and its first customer was aerospace giant Lockheed Martin in 2011 for its University of Southern California Quantum Computation Center. The Quantum Artificial Intelligence Laboratory (QuAIL) run by the Google-NASA-Moffatt Field Universities Space Research Center consortium has a D-Wave Two, and DWave’s 2048 adiabatic quantum computer is at NASA Ames and Google X, which is connected to CERN through the UC Berkeley hub for the ESnet5 fiber optic network with a speed of nearly 100 gigabits per second on a 300 GHz band for “research in high energy physics, climate science and genomics. 18 ESnet5 is all about terabytes and terahertz transmitters. 19 The NSA’s new $2 billion Utah Data Center now operates a 512-qubit chip code-named “Vesuvius” and bankrolled by Goldman Sachs. Vesuvius can execute more than 100,000,000,000,000,000,000,000,000,000,000,000,000 computations at once, which would take millions of years on a standard desktop. 

D-Wave’s site (dwavesys.com) boasts of the amazing data crunching and searches its “exotic tool” can achieve: genomic analysis, “looking for bad guys in large amounts of data,” space exploration, building AIs, simultaneous comparisons of multiple solutions in the wake of, say, a “natural” disaster—and a 512- qubit quantum computer’s “central hubs” that can unlock any encrypted file. 

A longtime goal among cryptologists has been to perfect the “quantum Internet”—which in the most basic way possible, uses the main principle of quantum mechanics to transfer communications from one point to another. . .like a hub-and-spoke network in which all messages anywhere in the network get routed from a main node—a central hub. 20

Who needs a PROMIS backdoor when there is D-Wave? 

But it is the Mephistophelean nature of D-Wave’s qubit chip that truly sets it apart from a mere supercomputer. Eric Ladizinsky, co-founder and chief scientist of D-Wave who built the 512-qubit quantum computer, equates it with the Manhattan Project and magic: 

Quantum computers are not made of simple transistors and logic gates like the CPU on your PC. They don’t even function in ways that seem rational to a typical computing engineer. Almost magically, quantum computers take logarithmic problems and transform them into “flat” computations whose answers seem to appear from an alternate dimension. 

For example, a mathematical problem that might have 2 to the power of n possible solutions — where n is a large number like 1024 — might take a traditional computer longer than the age of the universe to solve. A quantum computer, on the other hand, might solve the same problem in mere minutes because it quite literally operates across multiple dimensions simultaneously. 21 

The environment of the very small, niobium D-Wave chip cloistered in its ten-foot black cabinet must be kept colder than deep space at –273.13°C (just above absolute zero 22 ). It is the cold that makes the chip behave as a superconductor. Also, to function optimally the D-Wave processor requires an extremely low magnetic environment—50,000X lower than the Earth’s ambient magnetic field. 
[Note: Interestingly enough, Lucifer (Large Binocular Telescope Near-infrared Utility with Carnera and Integral Field Unit for Extragalactic Research) in Arizona is chilled to -213°C (-351°F) for near infrared observations.] 

Unlike the supercomputer, the D-Wave quantum computer is indeed artificial intelligence. Its binary classification is its ability to categorize and label vast amounts of complex input data (text, images, videos, phone calls, etc.); its quantum unsupervised feature learning (QUFL) is its ability to learn on its own, creating and optimizing its own programs; its temporal QUFL enables it to predict the future based on information it learns through binary classification and QUFL; and its artificial Intelligence via Quantum Neural Network processes means it can completely reconstruct the human brain’s cognitive processes and teach itself how to make better decisions and better predict the future. [And these folks are supposed to be our f*#king brightest? Yeah A.I. set loose what could possibly go wrong? Be like watching a replay of Wily Coyote and the Roadrunner dc]

So it is no surprise that In-Q-Tel, the private investment arm of the CIA, is a major investor in D-Wave, 23 nor is it surprising that government agencies and defense contractors in the business of collecting mass surveillance and tracking data are buying up D-Waves as fast as they’re built. 

ARTIFICIAL INTELLIGENCE (AI) 
Every aspect of learning or any other feature of intelligence can be so precisely described that a machine can be made to simulate it. 
— Proposal for the 
Dartmouth Conference, 1956 
Artificial intelligence (AI) systems on a less sophisticated scale than D-Wave are up and running everywhere, from Internet apps like facial and voice recognition and profiling, to translating one language to another, predicting hedge fund capital movements, 24 even building AI algorithms that can build AI algorithms. 25 Airlines, banks, traffic flow, hospitals, insurance, utilities, telephone exchanges, factories, military, Internet—in fact, what isn’t being run by AI? A new algorithm now learns handwriting as fast as a human child. 26 

SpaceX founder Elon Musk has put together OpenAI, a $1 billion fund “to assist humans in staying at least one step ahead of technology.” At MIT, Musk clearly stated, “With artificial intelligence, we are summoning the demon.” 27 His solution? To found Neuralink that will manufacture micron-sized devices that link human brains with computers for what he calls “consensual telepathy”:

Artificial intelligence and machine learning will create computers so sophisticated and godlike that humans will need to implant “neural laces” in their brains to keep up, Musk said in a tech conference last year. 

“There are a bunch of concepts in your head that then your brain has to try to compress into this incredibly low data rate called speech or typing,” Musk said in the latest interview. “If you have two brain interfaces, you could actually do an uncompressed direct conceptual communication with another person.” 28 

Theoretical physicist Stephen Hawking admitted on BBC that a type of system so advanced that it could re-design itself at an ever-increasing rate would eventually exponentially outpace human beings. He then signed an open letter (with one thousand AI experts) in protest of the military AI arms race. 29

On January 21, 2016—too little, too late—USAF General Paul J. Selva told the Brookings Institute: 

“There are ethical implications. There are implications that I call the ‘Terminator conundrum,’” Selva said. “What happens when that thing can inflict mortal harm and is empowered by artificial intelligence? How are we gong to deal with that? How do we know with certainty what it’s going to do? Those are the problem sets I think we’re going to deal with in the technology sector.” 30 

A month later, Deputy Defense Secretary Bob Work admitted before the Atlantic Council that the Aegis combat system commanding missile warships is already being run by an AI: 

“Machines [are] taking over from humans key decisions of when to launch both offensive and defensive missiles. . .In the next decade it’s going to become clear when and where we will delegate authority to machines. We will delegate [some] authority to machines,” Work explained. 31 

Lockheed Martin’s “semiautonomous” Long Range Anti-Ship Missile is already up and running. “Semi-autonomous” means that a human operator can select the target, but the missile will then fly hundreds of miles out of contact with its human controller and attack the target, whatever the human operator’s second thoughts. 32 

The 2016 report “Autonomous Weapons and Operational Risk” by Paul Scharre of the Center for a New American Security (CNAS) 33 warns against letting AIs make killing decisions, pushing instead for “centaur warfighting,” integrated decision-making between humans and computers. 34 Some military brass go so far as to insist that “real” intelligence is what humans can do that machines cannot, while others view AI as a “Third Offset”—computer-based high-tech that will offset a smaller military and “create a new class of ‘Iron Man’-style fighters.” 35 137S

NETWORK-CENTRIC WARFARE AND JADE 2 
Each human being is an emitter of radio waves, a living broadcasting station of exceedingly low power. The stomach will send out not only infrared heat waves, but the entire spectrum of light, ultraviolet rays, x-rays, radio waves and so on. Of course all these radiations are fantastically weak and the radio waves are among the weakest. But the fifty-foot aerial of the Naval Research Laboratory in Washington, D.C., the most accurately constructed aerial in existence, could pick up radio signals coming from your stomach more than four miles away. 
— John Pfeiffer, 
The Changing Universe, 1956 

The military doctrine of full spectrum dominance supporting C4 (command, control, communications, and cyberwarfare) has recast the whole of earthly life into a digitalized “battlespace” even as supercomputers, quantum computers, AI systems, and network-centric warfare (NCW) come online. A perpetually ionized antenna atmosphere has opened the floodgates to a network-centric cyber warfare that makes the entire biosphere and near-earth into a 24/7-ready battlespace. In fact, U.S. Cyber Command (USCYBERCOM) is now its own agency and no longer under U.S. Strategic Command. NSA Director Admiral Michael S. Rogers is also commander of USCYBERCOM and chief of Central Security Service (cryptology). 

In his 2009 article “Network-Centric Warfare,” 36 Tom Burghardt stresses that the Revolution in Military Affairs (RMA) is really about electronic full spectrum dominance warfare—what Air Force Magazine calls “compressing the kill chain.” In the 2009 version of NCW, highly classified nano-sized sensors included: 

• Tagging tracking and locating gear (TTL), homing beacons to guide drone strikes 

• Dynamic optical tags (DOTs), small active retro-reflecting optical tags for two-way data exchange 

• Radar responsive tags that include battlefield situational awareness, unattended ground sensors, data relay, vehicle tracking, search and recovery, precision targeting, special operations, drug interdiction, etc. 

Now, self-aware artificial intelligence composed of neural networks of quantum processors is communicating with “situational awareness” nano-sensors unleashed by the trillions into the environment, NCW’s “operational art” being dependent upon “low-density, high-demand and vulnerable air- and space-based sensing and communications systems.” 37 

For example, aerosols would be sprayed over enemy troops, or chemicals would be clandestinely introduced into their food supply. Then biosensors flying overhead, says Thomas Baines at Argonne National Laboratory in Illinois, would “track their movement from their breath or sweat,” so they could be targeted for attack. . .With microprocessors making smaller weapons systems. . .aircraft carriers and manned bombers may become obsolete . . . 38 

Remember: “enemy troops” now include civilians, given that NCW and “situational awareness” are weaponized for the new battlespace of cities, neighborhoods, and rural areas—in other words, everywhere. 

Meanwhile, all around us AI networks are crunching sensitive data (voice stress, financial profiles, social networking patterns, etc.), remote-controlling nanobots and RFIDs, webcams and websites, cell phones, microphones, electric grids, airplanes, vehicles, drones, weather systems, “exotic weapons,” etc. Space Fence geopolitical control depends entirely upon interlocking AI networks surveilling everything and everyone in what the military calls the Human Terrain System (HTS). 

NCW and “compressing the kill chain” includes mind control and “perception management,” as plugging the entire world into a wireless grid in which each dimension is connected orthogonally to every other dimension points directly to RMA “multidimensionality,” as do the all-too-lethal nonlethal (less-than-lethal / electronic) weapons, including your cell phone: 

The conventional and nuclear weaponry dimensions might be continuous; within each of these dimensions, there is a smooth gradation in size and efficacy of weapons employed. A third dimension, targeting, might then be added; this would likely be a discontinuous dimension with a discrete point for each type of target, namely industrial, military, etc. A fourth dimension might contain the issues involved, a political dimension. A fifth could be the cost or economic dimension, etc.. . .Interactions between factors would be represented by a hypersurface in this multidimensional space. . .A model of conflict as a multidimensional manifold, with the idiosyncrasies and pathology of a mathematical hypersurface, increases our predictive power tremendously. 39 

The RMA is structured on the understanding that the most powerful weapon systems are those that can subdue populations by using subtle energy fields and tricking the body and mind into reacting to incoming signals as normal and natural—signals that can just as well be used to create total disorientation or remotely trigger mystery illnesses, heart failure, respiratory distress, etc. This is DARPA’s Combat Zones That See (CTS) and military operations in urban terrain (MOUT) graduating from small CCTV cameras to “nano-swarms”: 

. . .a “swarm” of near-microscopic nano-devices that function in consort [sic] with each other to produce either a visual image or an audio image of whatever is in the vicinity of the “swarm.” The more nano-devices that are present, the more fidelity or resolution they can resolve and transmit. These little particles can be made “sticky” so that they attach themselves to almost anything: a wall, a tree, a vehicle, even a person’s clothing. It may even be that they can be made selectively sticky, so that they only will stick to something when told to do so. 40 

Key to understanding the turning point that the May 2015 “military exercise” known as JADE Helmrepresents (Joint Assistant for Deployment and Execution at the helm) is to grasp the fact that we the people are already NCW wired into AI and, by proxy, the Space Fence. As I stressed in Chapter 3, “The Nano Assault,” nano-scale “situational awareness” sensors have already been loaded into the environment and, by proxy, our lungs, bloodstreams, and brains. Burghardt’s dynamic optical tag (DOT) sounds remarkably like quantum dots. Then there is neural or smart dust, nanospheres, carbon nanotube transistors and integrated circuits, electrochemical energy-storage nanos with anode-cathode nanowires inside polymer core shell separators, etc. All are nanotechnology telemetry sensors released into our environment for us to wear, breathe, and ingest, each sensor programmed to gather data that is then remotely accessed, transmitted, and stored by AIs. 

Berghardt called attention to the civilian version of Radar Responsive tags made in 2009 by Gentag: 

According to Gentag, “the civilian version. . .is a lower power technology suitable for commercial civilian applications, including use in cell phones and wide area tracking.” Conveniently, “Mobile reader infrastructure can be set up anywhere (including aircraft) or can be fixed and overlaid with existing infrastructure (e.g. cell phone towers).” 41 

Virginia-based Inkode developed tiny, low-power metal fibers that embed themselves “in paper, plastic and other materials that radio frequency waves can penetrate.” Does “and other materials” include lungs, blood, and skin? The fibers reflect radio waves back to the reader in a “resonant signature,” and the reader of data flowing in from our sensor-armed environment is an AI. Queralt in Wallingford, Connecticut invented “an integrated behavioral learning engine” to “learn an individual’s or asset’s habits over time”: 

The core of Queralt’s system is the behavioral engine that includes a database, a rules engine and various algorithms. Information acquired by reading a tag on an asset or individual, as well as those of other objects or individuals with which that asset or person may come into contact, and information from sensors (such as temperature) situated in the area being monitored, are fed into the engine. The engine then logs and processes the data to create baselines or behavioral patterns. As baselines are created, rules can be programmed into the engine; if a tag read or sensor metric comes in that contradicts the baseline and/or rules, an alert can be issued . . . 42 

Feeling secure yet? 

May 2015 was the beginning not of just an NCW rollout but of a complete makeover of what military war games and exercises are about. In the United States, it was called JADE Helm (i.e., JADE at the helm); in Estonia, Hedgehog 15; in Lithuania, Operation Lightning Strike; in Norway, Dynamic Mongoose; in the Mediterranean Sea, Joint Sea 2015-I was run by the Russians and Chinese. 43 All exercises are “simulations” of network-centric operations (NCOs, i.e., cyberwarfare) dependent upon the global information grid (GIG), once a key component of the Project for the New American Century (PNAC) / Foreign Policy Initiative. 

According to Raytheon BBN Technologies / DARPA Abstract in the 2001 Final Technical Report “Joint Assistant for Development and Execution (JADE),” JADE 2 is AI quantum computing technology capable of utilizing vast stores of NSA-collected data to produce a Human Terrain Analysis (HTA) tool that will guarantee mastery over the Human Domain. 

JADE (Joint Assistant for Deployment and Execution) is a knowledge-based mixed-initiative system that supports force deployment planning and management. JADE uses case-based and generative planning methods to support the development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three tools: 

Prodigy-Analogy, a combined case-based and generative planner developed by Carnegie Mellon University; 

ForMAT (Force Management and Analysis Tool) that supports case-based force deployment planning developed by [Raytheon] BBN Technologies [and MITRE; supports NSA knowledge acquisition]; and 

PARKA, a highly indexed knowledge-based management system developed by the University of Maryland. 

With JADE, a military planner can build a preliminary force deployment plan, including the Time Phased Force Deployment Data (TPFDD) in less than one hour. This speed in plan construction is possible because JADE supports the rapid retrieval and reuse of previous plan elements for use in the development of new plans. In addition, JADE employs an easy to use map-oriented drag and drop interface where force modules (FMs) from previous plans (cases) whose force capabilities and composition match the requirements of the current situation can be dragged from the case library and dropped onto a geographic destination. Plan modification and/or adaption is supported through remindings, e.g. each time that a force module is created or is copied into a plan (TPFDD) the user is automatically reminded of the need for geographical changes. 44 

JADE 2 was publicly announced, but its purpose remains obscured beneath cryptic military acronyms and references to “simulations.” 45 The truth is that JADE 2 is a network-centric software-based AI program “at the helm” that can reconfigure its own network topography to optimize data transfers. Not only is it aware but it is self-adaptive, self-reactive and self-modeling for predictive forced deployment. It is preemptive in that it can interpret commanders’ intent and potential behaviors by means of macrocognition mind mapping. 

JADE 2 first collects masses of data from remote sensors and computers at data-dump places like fusion centers and the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center in Bluffdale, Utah, then moves it into an HTA module to develop an HTS to determine the behavioral parameter norms (and therefore Human Domain Deviations) for individuals, groups, dense populations, etc. In seconds, JADE 2’s Prodigy Logic Module can generate holographic simulations of battle plans, pre-crime plans, and “kill chains.” The CBR (case-based reasoning module) then examines the mission statement and comes up with an ACOA (adaptive course of action), all within seconds. 

After sucking up sensor data, JADE 2 thinks, plans, and executes, its ultimate mission being to transform C4 into total mastery of the Human Domain. With network-centric HTA and activity-based Intelligence (ABI) tools, mastery of the Human Domain under the Geospatial Intelligence (GeoINT) neural net is imminent. 

JADE 2 has the ability to use vast amounts of data being collected on the Human Domain to develop an HTS [Human Terrain System] for geographic locations to identify and eliminate targets flagged on a GIG [global information grid] in Network Concentric Warfare. 46 

It is not JADE 2 that “casts a neural net” but the nanosensors and microprocessors swimming in our bloodstreams and brains and ionized atmosphere. All the mapping of our brains, emotions, and behaviors goes into developing HTSs, but Mastering the Human Domain is the military objective. [no they are mastering nothing, they are enslaving the human domain d.c]

Finally, several months after the JADE 2 exercises throughout the American Southwest and elsewhere had run their course in the mainstream media, a brouhaha erupted in Washington, D.C. regarding “the controversial battlefield anthropology program known as the Human Terrain System.” 47 Apparently, the Army had said that the HTS was terminated in 2014, but then Rep. Duncan Hunter (R-CA) on the Armed Services Committee discovered it was still very much alive, being funded, and expanding. Given that HTS was initially presented to Congress as a “battlefield anthropology program” and not a biometrics AI sweep of behavioral parameters, it is no wonder that Congressman Hunter was incensed that from the beginning, the Army had misled Congress about the HTS and was even then conjuring up a cover story: 

. . .documents obtained by USA Today show that Army officials had simply changed the program’s emphasis from deploying social scientists with troops to providing information to commanders from a group of experts at Ft. Leavenworth, Kansas. They also began referring to the program as the Global Cultural Knowledge Network. 

“Cultural knowledge,” huh? (Are congressmen watching DJ Walsh’s YouTubes?) 

notes-143s
1. He was also a co-founder of Raytheon in 1924. 
2 COINS is now the acronym for counterinsurgency. 
3 See The Octopus: The Secret Government and Death of Danny Casolaro by Kenn Thomas and Jim Keith (Feral House, 1996). 
4 Moral turpitude is a legal concept referring to conduct considered contrary to community standards of justice, honesty or good morals. (West’s Encyclopedia of American Law) 
5 Marshall Riconosciuto was close friends with Fred Crisman, the first person Clay Shaw called when he heard that attorney Jim Garrison was implicating him in the Kennedy assassination. Strangely, Crisman was also involved in the UFO incident at Maury Island, Washington in June 1947. 
6 Barry’s father Frank Kumnick played a role in the FBI-US Marshal siege against Randy Weaver (August 21–31, 1992). 
7 Lily Hay Newman, “The NSA Actually Intercepted Packages to Put Backdoors in Electronics.” Gizmodo, December 29, 2013. 
8 Tyler Durden, “First Cisco and Microsoft, Now IBM: China Orders Banks To Remove High-End IBM Servers.” Zero Hedge, May 27, 2014. 
9 Gematria 666 is the pure male power without mercy of Mars, the Egyptian Crocodile Eater of Souls. 
10 Don Johnston, “Lawrence Livermore and IBM collaborate to build new brain-inspired supercomputer.” PhysOrg, March 31, 2016. 
11 Wikipedia. 
12 James Barrat, Our Final Invention: Artificial Intelligence and the End of the Human Era. New York: St. Martin’s Press, 2013. 
13 “Bio Breakthrough: Scientists Unveil First Ever Biological Supercomputer.” Sputnik News, February 28, 2016.
14 Jason Dorrier, “Google Buys Quantum Computer for Artificial Intelligence Lab at NASA.” SingularityHUB, June 5, 2013. 
15 Amy Nordrum, “Quantum Computer Comes Closer to Cracking RSA Encrypton.” IEEE Spectrum, 3 March 2016. The RSA algorithm is the most widely used encryption method. 
16 Stefano Pirandola and Samuel L. Braunstein, “Physics: Unite to build a quantum internet.” Nature.com, 12 April 2016. 
17 Ibid. 
18 “ESnet5: Shadow Internet with 100 Gbps Connectivity Speed.” CIO Review, January 30, 2015. Email from Anthony Patch, June 9, 2016: “The latest network is the go-between Helix Nebula, which began in Europe and is now linked up to the 2048, with Berkeley as its link. Since the founding of the World Wide Web at CERN, Berkeley has been the hub controlling data flow and distribution throughout the U.S. and Europe. All data streams from CERN are routed through UC Berkeley, specifically the Lawrence Berkeley Lab up on the hill, where the Advanced Light Source building housing the Synchrotron particle accelerator is located.” 
19 105 gigabits (0.1 terabit) 275–450 GHz. Terahertz transmitters are 10X faster than 5G networks: ultra-high speed wireless. 
20 Stephen Lam, “The US government has been running a quantum Internet for over two years.” RT, May 6, 2013. 
21 Mike Adams, “Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines,” NaturalNews.com, June 20, 2013. 
22 By international agreement, absolute zero is –273.15° on the Celsius scale (–459.67° on the Fahrenheit scale). 
23 Michael Brooks, “What could the NSA do with a quantum computer?” New Statesman, 27 June 2013. 
24 Richard Craib, “Rogue Machine Intelligence and A New Kind of Hedge Fund.” Numerai Medium.com, June 21, 2016. 
25 Cade Metz, “Building AI Is Hard—So Facebook Is Building AI That Builds AI.” Wired, May 6, 2016. Other social media—Twitter, LinkedIn, Uber, etc.—willsoon be using Facebook’s Flow tool “to help engineers build, test, and execute machine learning algorithms on a massive scale . . .” 
26 Peter Dockrill, “Scientists have developed an algorithm that learns as fast as humans.” Science Alert, 11 December 2015. 
27 Brianna Blaschke, “Elon Musk Funds $1B Proposal To Stop Human Destruction From ‘Demon’ of Artificial Intelligence.” Activist Post, May 20, 2016. 
28 “Elon Musk on mission to link human brains with computers in four years: report.” Reuters, April 21, 2017. 
29 Claire Burnish, “Stephen Hawking Warns Humanity: Leave Earth Before the Ruling Class Destroys It.” Antimedia.org, January 22, 2016. 
30 Bianca Spinosa, “As AI advances, military leaders mull the ‘Terminator conundrum’.” Defense Systems, January 25, 2016. 
31 “Artificial Intelligence Now Decides Targets on Aegis Ships.” Sputnik News, March 5, 2016. 
32 John Markoff, “Pentagon Turns to Silicon Valley for Edge in Artificial Intelligence.” New York Times, May 11, 2016. 
33 The CNAS think tank began in 2007 in Washington, D.C., the year after the infamous Project for the New American Century (PNAC) ceased operation and morphed into the Foreign Policy Initiative. 
34 John Markoff, “Report Cites Dangers of Autonomous Weapons.” New York Times, February 28, 2016. 
35 Markoff. 
36 Tom Burghardt, “Network-Centric Warfare.” Global Research, June 11, 2009. 
37 Col. Alan D. Campen, “Look Closely At Network-Centric Warfare.” SIGNAL, Armed Forces Communications and Electronics Association (AFCEA), January 2004. 
38 Douglas Waller, “Onward Cyber Soldiers.” Time magazine, August 21, 1995. 
39 Ibid. 
40 Robert G. Willscroft, Ph.D., “Combat Zones that ‘See’ Everything.” Defense Watch, July 14, 2003. 
41 Tom Burghardt, “Network-centric warfare.” Global Research, June 11, 2009. 
42 Beth Bacheldor, “Queralt Developing Behavior-Monitoring RFID Software.” RFID Journal, April 23, 2009. 
43 Other NCW “war games” may not have been made public. For example, in October 2015 on Wake Island “a tandem defense capability in the Pacific unmatched in the world today by successfully combining U.S. Aegis BMD and THAAD multi-layered defense in a live-fire exercise against both cruise and ballistic missiles” (“Guam — A Fiesta,” Missile Defense Advocacy Alliance, November 30, 2015). 
44 “Joint Publication 3-35: Deployment and Redeployment Operations,” Joint Chiefs of Staff, 31 January 2013. The primary AI “military planner” in 2001 was the force management module for ForMAT and PARKA; now, JADE 2 is served by the Prodigy module. 
45 I am indebted to system and network engineer DJ Walsh’s Level9News YouTubes. Please watch them all, beginning with “www.youtube.com/watch?v=FiKBPmq37Yo, and her July 26, 2016 interview on John B. Wells’ show Caravan to Midnight, “Pentagon’s HSCOI Program Using Social Media as Targeting Telemetry.” 
46 DJ Walsh, “The History of JADE II: Planetary Conquest By a Global A.I. Warfare System.” Level9News YouTube, May 19, 2015. 
47 Tom Vanden Brook, “$725M program Army ‘killed’ found alive, growing.” USA Today, March 10, 2016.


FAIR USE NOTICE
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. As a journalist, I am making such material available in my efforts to advance understanding of artistic, cultural, historic, religious and political issues. I believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Copyrighted material can be removed on the request of the owner.

No comments:

Part 1 Windswept House A VATICAN NOVEL....History as Prologue: End Signs

Windswept House A VATICAN NOVEL  by Malachi Martin History as Prologue: End Signs  1957   DIPLOMATS schooled in harsh times and in the tough...