{"id":23289,"date":"2020-03-12T17:23:23","date_gmt":"2020-03-12T17:23:23","guid":{"rendered":"http:\/\/dev.yogaesoteric.net\/unmasking-freemasonry-en\/information-control-for-social-manipulation-3480-en\/big-brother-is-watching-you-for-real-3\/"},"modified":"2020-03-12T17:23:23","modified_gmt":"2020-03-12T17:23:23","slug":"big-brother-is-watching-you-for-real-3","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/big-brother-is-watching-you-for-real-3\/","title":{"rendered":"Big Brother is Watching You \u2013 For Real (3)"},"content":{"rendered":"<p><\/p>\n<p>  &#160;<br \/>\n  Read <a href=\"\/moved_content.php?lang=EN&amp;item=22627\" target=\"_blank\" rel=\"noopener\">the second part<\/a> of the article<\/p>\n<p>    <strong>The Brain Project<\/strong> &#8211; This<br \/>\narea of study has received $100 million in funding via Obama&#8217;s ten-year<br \/>\nBRAIN Project, as well as a $1.3 billion commitment from Europe.<br \/>\nConcurrently, there is heavy military funding through agencies such as the Defense<br \/>\nAdvanced Research Projects Agency (DARPA). This raises the question of transparency<br \/>\nwhen a &#8220;black budget&#8221; often justifies total secrecy in the name of<br \/>\nnational security.<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/martie 2020\/12\/22649_1.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>    <strong>Neuroscientists Successfully Plant False<br \/>\nMemories<\/strong> &#8211; MIT neuroscientists have shown that they can plant false<br \/>\nmemories. They also found that many of the neurological traces of these memories are<br \/>\nidentical in nature to those of authentic memories. Most of the research in this<br \/>\narea currently revolves around how to induce and eliminate fear. The study also<br \/>\nprovides further evidence that memories are stored in networks of neurons that form<br \/>\nmemory traces for each experience we have. Scientists already know how to set off an<br \/>\nemotional response in combat veterans by simulating a specific set of frequencies<br \/>\nthat have become associated with wartime experience.<\/p>\n<p><\/p>\n<p>    <strong>Total Information Awareness<\/strong><br \/>\n&#8211; Under the umbrella of a system known as Total Information<br \/>\nAwareness, DARPA spearheaded many of the surveillance programs abused by the<br \/>\nNSA. DARPA&#8217;s Total Information Awareness concept created a veritable<br \/>\nbuffet of advanced surveillance and data mining programs, many of which ultimately<br \/>\nwere folded into NSA&#8217;s PRISM. We now know that PRISM culled citizens&#8217;<br \/>\npersonal data from companies like Microsoft, Google, and Facebook, and was later<br \/>\nleaked by whistleblower Edward Snowden.<\/p>\n<p><\/p>\n<p>    <strong>Evidence Extraction and Link Discovery<br \/>\nprogram (EELD)<\/strong> &#8211; Sole purpose is to gather as much information about<br \/>\nboth terror suspects and average American citizens as possible, using phone records,<br \/>\ncomputer searches, credit card receipts, parking receipts, books checked out of the<br \/>\nlibrary, films rented, and more. Goal is to assess megadata on 285 million people a<br \/>\nday in real-time.<\/p>\n<p><\/p>\n<p>    <strong>Scalable Social Network Analysis (SSNA)<br \/>\n<\/strong> &#8211; Program monitors telephone calls, conference calls, and ATM<br \/>\nwithdrawals&#8230; also sought to develop a far more invasive surveillance<br \/>\ntechnology.<\/p>\n<p><\/p>\n<p>    <strong>Activity Recognition and Monitoring<br \/>\n(ARM)<\/strong> &#8211; With England&#8217;s CCTV surveillance cameras as a model,<br \/>\nARM created a massive database of people going about their everyday lives. Using<br \/>\nadvanced facial recognition software, the program highlighted any behavior that was<br \/>\noutside the realm of a preprogrammed &#8220;ordinary,&#8221; the definition of which<br \/>\nremains classified.<\/p>\n<p><\/p>\n<p>    <strong>Deep Exploration and Filtering of Text<br \/>\n(DEFT)<\/strong> &#8211; Operating on a $28 million dollar budget, this program<br \/>\nutilizes advanced computer algorithms to analyze text-based messages in all shapes<br \/>\nand forms, from text messages to reports, with the aim being to comprehend<br \/>\n&#8220;implied and hidden meanings through probabilistic<br \/>\ninference.&#8221;<\/p>\n<p><\/p>\n<p>    <strong>Nexus 7<\/strong> &#8211; With a<br \/>\nclassified budget, this particularly program studies and tracks social network<br \/>\ncontent. First used in Afghanistan in a defense capacity, when aimed at domestic<br \/>\nnetworks the use of the program is a mystery.<\/p>\n<p><\/p>\n<p>    <strong>Narrative Networks Program<\/strong><br \/>\n&#8211; Developed classified techniques used to manipulate trust in humans. For its<br \/>\nNarrative Networks (N2) program, DARPA collaborated with a CIA agency called the<br \/>\nIntelligence Advanced Research Projects Agency (IARPA) to develop methods of<br \/>\noverwriting messages in the human mind. The program was described as having two<br \/>\nparts: first, to understand what happens in the human mind when someone sees or<br \/>\nhears a message; second, to figure out how to control how the brain interprets the<br \/>\nmessage.<\/p>\n<p><\/p>\n<p>    <strong>In-Q-Tel Projects<\/strong><\/p>\n<p><\/p>\n<p>    <strong>Recorded Future<\/strong> &#8211; Using<br \/>\nwhat they call a &#8220;Temporal Analytics Engine,&#8221; Recorded Future<br \/>\n(RF) provides forecasting and analysis tools to help analysts predict future events<br \/>\nby scanning sources on the Internet, and extracting, measuring, and visualizing the<br \/>\ninformation to show networks and patterns in the past, present, and future. As of<br \/>\n2015 the engine was described as &#8220;Web Intelligence Engine Visible<br \/>\nTechnologies&#8221; &#8211; social media monitoring.<\/p>\n<p><\/p>\n<p>    <strong>Digital Reasoning<\/strong> &#8211; Since<br \/>\n2012, the firm has sold its Synthesys software to banks and hedge funds,<br \/>\nincluding UBS and Point72 Asset Management. Financial institutions use<br \/>\nSynthesys to scan internal e-mails within a given company in search of<br \/>\nunfamiliar patterns between employees, in terms of word-specific content, frequency<br \/>\nand interpersonal connections. The aim is to predict fraud before it occurs.<\/p>\n<p><\/p>\n<p>    <strong>Palantir<\/strong> &#8211; Palantir<br \/>\nTechnologies, Inc. is a private American software and services company, specializing<br \/>\nin data analysis. The company is known for two software projects in particular:<br \/>\nPalantir Gotham is used by counter-terrorism analysts at offices in the United<br \/>\nStates Intelligence Community and United States Department of Defense, fraud<br \/>\ninvestigators at the Recovery Accountability and Transparency Board, and cyber<br \/>\nanalysts at Information Warfare Monitor.<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/martie 2020\/12\/22649_2.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>    <strong>CallMiner<\/strong> &#8211; Phone speech<br \/>\nanalytics software.<\/p>\n<p><\/p>\n<p>    <strong>MASINT <\/strong>&#8211; Remote tracking,<br \/>\nsurveillance, and extraction of brain-waves typifying thought-forms, emotional<br \/>\nstates, analytic mind states, and others.<\/p>\n<p><\/p>\n<p>    <strong>Mohomine mohoClassifier<\/strong> &#8211;<br \/>\nOrganizes mass data.<\/p>\n<p><\/p>\n<p>    <strong>3VR<\/strong> &#8211; 3VR Inc. develops<br \/>\nsoftware enabling organizations to mine data from video. 3VR works with leading<br \/>\nbanks, governments, law enforcement and retailers at the moment.<\/p>\n<p><\/p>\n<p>    <strong>Adaptx<\/strong> &#8211; Creates digital<br \/>\npens that speed up field data collection.<\/p>\n<p><\/p>\n<p>    <strong>Basis Technology<\/strong> &#8211;<br \/>\nSynthesizes the foreign chatter and provides software for text analytics in over<br \/>\ntwenty languages. They work primarily in applied natural language processing,<br \/>\nderiving meaning from the ways people actually use language.<\/p>\n<p><\/p>\n<p>    <strong>Cloudera<\/strong> &#8211; Large-scale<br \/>\ndata storage. Cloudera Enterprises is one of the most cost-effective ways for<br \/>\ncompanies to securely carry out large-scale data analysis and storage.<\/p>\n<p><\/p>\n<p>    <strong>FireEye<\/strong> &#8211; FireEye is one<br \/>\nof the most advanced cybersecurity firms and specializes in protecting against<br \/>\nbotnet attacks and also works to combat the malware that brings computers into the<br \/>\nnetwork.<\/p>\n<p><\/p>\n<p>    <strong>The Ember Corporation<\/strong> &#8211;<br \/>\nEmber Corporation focuses on developing networking systems that simplify wirelessly<br \/>\nnetworking low-power products. They&#8217;re focused on smart energy, remote<br \/>\nmonitoring, and remote control uses of their tech.<\/p>\n<p><\/p>\n<p>    <strong>Infinite Z <\/strong>&#8211; Virtual-<br \/>\nholographic simulation a reality through an interactive 3D environment.<\/p>\n<p><\/p>\n<p>    <strong>OpenSpan<\/strong> &#8211; Makes software<br \/>\nthat enables organizations to see exactly what employees are doing on their<br \/>\ncomputer: what programs they&#8217;re using, what progress they&#8217;re making,<br \/>\netc.<\/p>\n<p><\/p>\n<p>    <strong>Seventh Sense<\/strong> &#8211; Develops<br \/>\nhealth monitoring products that interface with human skin.<\/p>\n<p><\/p>\n<p>    <strong>Sonitus Medical<\/strong> &#8211; Makes a<br \/>\nhearing system that transmits sound imperceptibly through the mouth. The SoundBite<br \/>\nhearing system plays off the principle of bone conduction to transmit audial<br \/>\nmessages. A nearly invisible in-the-mouth hearing and communication platform is<br \/>\nnon-invasive and connects directly to the inner ear, allowing the user to hear<br \/>\ntransmitted messages through their skull.<\/p>\n<p><\/p>\n<p>    <strong>Spotter RF<\/strong> &#8211; Makes super-<br \/>\npowerful radars in a handheld form that can track a person walking anywhere within a<br \/>\n148 acre space, and it&#8217;s handheld.<\/p>\n<p><\/p>\n<p>    <strong>Visible Technologies<\/strong> &#8211;<br \/>\nExtracts business solutions from social media chatter with software that allows<br \/>\nusers to extract business value from social communities, and also give customer<br \/>\ninsights for brands online.<\/p>\n<p><\/p>\n<p>    <strong>Walleye<\/strong> &#8211; Makes handheld<br \/>\ndevices that can see into and through solid objects.<\/p>\n<p><\/p>\n<p>    <strong>In-Q-Tel and DARPA Mind Control<br \/>\nPrograms<\/strong><\/p>\n<p><\/p>\n<p>    <strong>Real-time Contextual Overlays for Live<br \/>\nStreams<\/strong> &#8211; A system and method for contextualizing and live-updating<br \/>\noverlay data for live media streams. Overlays can be generated in real-time and in<br \/>\nresponse to live events. (patent US 20130311595 A1 November 21, 2013.<br \/>\nGoogle Inc.)<\/p>\n<p><\/p>\n<p>    <strong>Method and Apparatus for Remotely<br \/>\nDetermining Emotional States<\/strong> &#8211; A waveform energy having a<br \/>\npredetermined frequency and intensity is generated and wirelessly transmitted<br \/>\ntowards a subject. Physiological or physical parameters of blood pressure, pulse<br \/>\nrate, pupil size, respiration rate and perspiration level are measured for<br \/>\nevaluating criminal intent in security sensitive areas. (patent US 5507291<br \/>\nA &#8211; April 5, 1994)<\/p>\n<p><\/p>\n<p>    <strong>Sounds of Silence: The Silent Subliminal<br \/>\nPresentation System (SSPS)<\/strong> &#8211; Silent Subliminal Presentation System<br \/>\nwas developed for commercial use in 1992. A silent communications system in which<br \/>\nnonaural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or<br \/>\nin the adjacent ultrasonic frequency spectrum are amplitude &#8211; or frequency-<br \/>\nmodulated with the desired intelligence and propagated acoustically or<br \/>\nvibrationally, for inducement in to the brain, typically through the use of<br \/>\nloudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be<br \/>\ntransmitted directly in real time or may be recorded and stored on mechanical,<br \/>\nmagnetic, or optical media for delayed or repeated transmission to the listener.<br \/>\n(US Patent 5,159,703)<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/martie 2020\/12\/22649_3.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>    <strong>Flame<\/strong> &#8211; The program is<br \/>\nable to turn on a target&#8217;s web cam and record video remotely and without<br \/>\ndetection.<\/p>\n<p><\/p>\n<p>    <strong>Multidisciplinary Research Program of the<br \/>\nUniversity Research Initiative (MURI)<\/strong> &#8211; Recognizes\/predicts social<br \/>\ncontexts, relationships, networks, and intentions from social media, taking into<br \/>\naccount non-verbal communication such as gestures, micro-expressions, posture, and<br \/>\nlatent semantics of text and speech. Creates algorithms for prediction and<br \/>\ncollection of latent signals and their use in predicting social information.<\/p>\n<p><\/p>\n<p>    <strong>Beware<\/strong> &#8211; Analyses<br \/>\npeople&#8217;s social media activity, property records, the records of friends,<br \/>\nfamily or associates, among other data, to assign suspects a so-called<br \/>\n&#8220;threat-score.&#8221; That &#8220;threat-score&#8221; can<br \/>\nthen be used by police to pre-judge if a suspect is going to be dangerous, and to<br \/>\nadapt their approach accordingly.<\/p>\n<p><\/p>\n<p>    <strong>Iraqi Silent Sound Program<\/strong><br \/>\n&#8211; US Psy-Ops teams set up FM transmitters, utilizing Iraqi frequencies and<br \/>\noverpowered the local station. Along with patriotic and religious music, PsyOps<br \/>\ntransmitted &#8220;vague, confusing and contradictory military orders and<br \/>\ninformation.&#8221; A sophisticated electronic system designed to<br \/>\n&#8216;speak&#8217; directly to the consciousness of the listener; to alter and<br \/>\nentrain his brainwaves, to manipulate his brain&#8217;s electroencephalographic<br \/>\n(EEG) patterns and thus artificially implant negative emotional states &#8211;<br \/>\nfeelings of intense fear, anxiety, despair and hopelessness were created in the<br \/>\nIraqi troops. This effective subliminal system implants emotions in the minds of the<br \/>\ntargeted subject.<\/p>\n<p><\/p>\n<p>    <strong>Nervous system manipulation by<br \/>\nelectromagnetic fields from monitors<\/strong> &#8211; US Patent and Trade<br \/>\nOffice, Patent #6,506,148 on subliminal behavior modification, 1\/14\/2003,<br \/>\nUnited States Patent 6,506,148, Loos, January 14, 2003.<br \/>\n<strong>Abstract:<\/strong> &#8220;It is possible to manipulate the nervous<br \/>\nsystem of a subject by pulsing images displayed on a nearby computer monitor or TV<br \/>\nset. For the latter, the image pulsing may be imbedded in the program material, or<br \/>\nit may be overlaid by modulating a video stream. Physiological effects have been<br \/>\nobserved in a human subject in response to stimulation of the skin with weak<br \/>\nelectromagnetic fields that are pulsed with certain frequencies near 1\/2 Hz or 2.4<br \/>\nHz, such as to excite a sensory resonance.<\/p>\n<p><\/p>\n<p>    Many computer monitors and TV tubes, when<br \/>\ndisplaying pulsed images, emit pulsed electromagnetic fields of sufficient<br \/>\namplitudes to cause such excitation. It is therefore possible to manipulate the<br \/>\nnervous system of a subject by pulsing images displayed on a nearby computer monitor<br \/>\nor TV set. For the latter, the image pulsing may be imbedded in the program<br \/>\nmaterial, or it may be overlaid by modulating a video stream, either as an RF signal<br \/>\nor as a video signal.<\/p>\n<p><\/p>\n<p>    The image displayed on a computer monitor may<br \/>\nbe pulsed effectively by a simple computer program. For certain monitors, pulsed<br \/>\nelectromagnetic fields capable of exciting sensory resonances in nearby subjects may<br \/>\nbe generated even as the displayed images are pulsed with subliminal intensity.<br \/>\nInventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.:<br \/>\n872528&#160; Filed: June 1, 2001.&#8221;<\/p>\n<p><\/p>\n<p>    <strong>Other DARPA\/In-Q-Tel<br \/>\nPrograms&#160;<\/strong><\/p>\n<p><\/p>\n<p>    <strong>Total Information Awareness<\/strong><br \/>\n&#8211; Under the umbrella of a system known as Total Information<br \/>\nAwareness, DARPA spearheaded many of the surveillance programs abused by the<br \/>\nNSA. DARPA&#8217;s Total Information Awareness concept created a veritable<br \/>\nbuffet of advanced surveillance and data mining programs, many of which ultimately<br \/>\nwere folded into NSA&#8217;s PRISM. PRISM culled citizens&#8217; personal data from<br \/>\ncompanies like Microsoft, Google, and Facebook.<\/p>\n<p><\/p>\n<p>    <strong>PRISM<\/strong> &#8211; A clandestine<br \/>\nnational security electronic surveillance program operated by the United States<br \/>\nNational Security Agency which can target customers of participating corporations<br \/>\noutside or inside the United States.<\/p>\n<p><\/p>\n<p>    <strong>Sounds of Silence &#8211; The Silent<br \/>\nSubliminal Presentation System<\/strong> was developed for commercial use in 1992. A<br \/>\nsilent communications system in which non-aural carriers, in the very low (ELF) or<br \/>\nvery high audio-frequency (VHF) range or in the adjacent ultrasonic frequency<br \/>\nspectrum are amplitude &#8211; or frequency- modulated with the desired intelligence<br \/>\nand propagated acoustically or vibrationally, for inducement in to the brain,<br \/>\ntypically through the use of loudspeakers, earphones, or piezoelectric transducers.<br \/>\nThe modulated carriers may be transmitted directly in real time or may be recorded<br \/>\nand stored on mechanical, magnetic, or optical media for delayed or repeated<br \/>\ntransmission to the listener. US Patent 5,159,703.<\/p>\n<p><\/p>\n<p>    <strong>Turbulence<\/strong> &#8211;<br \/>\nTurbulence is a National Security Agency information-technology project<br \/>\nstarted circa 2005. It was developed in small, inexpensive &#8220;test&#8221; pieces<br \/>\nrather than one grand plan like its failed predecessor, the Trailblazer<br \/>\nProject. It also includes offensive cyberwarfare capabilities, like injecting<br \/>\nmalware into remote computers.<\/p>\n<p><\/p>\n<p>    <strong>Tailored Access Operations<\/strong><br \/>\n&#8211; Intelligence-gathering unit of the NSA that is capable of harvesting<br \/>\napproximately two petabytes of data per hour.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Boundless Informant<\/strong> &#8211; A<br \/>\nsystem deployed by the NSA to analyze global electronic information. In March 2013,<br \/>\nBoundless Informant gathered 14 billion data reports from Iran, 6.3 billion from<br \/>\nIndia, and 2.8 billion from the United States.&#160;<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/martie 2020\/12\/22649_4.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>    <strong>Bullrun<\/strong> &#8211; A highly<br \/>\nclassified National Security Agency program to preserve its ability to eavesdrop on<br \/>\nencrypted communications by influencing and weakening encryption standards, by<br \/>\nobtaining master encryption keys, and by gaining access to data before or after it<br \/>\nis encrypted either by agreement, by force of law, or by computer network<br \/>\nexploitation (hacking).&#160;<\/p>\n<p><\/p>\n<p>    <strong>Carnivore<\/strong> &#8211; A system<br \/>\nimplemented by the Federal Bureau of Investigation that was designed to monitor<br \/>\nemail and electronic communications.&#160;<\/p>\n<p><\/p>\n<p>    <strong>DCSNet<\/strong> &#8211; The Federal<br \/>\nBureau of Investigation&#8217;s point-and-click surveillance system that can perform<br \/>\ninstant wiretaps on any telecommunications device located in the US.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Fairview<\/strong> &#8211; A mass<br \/>\nsurveillance program directed at foreign mobile phone users.&#160;<\/p>\n<p><\/p>\n<p>    <strong>ICREACH<\/strong> &#8211; Surveillance<br \/>\nfront-end GUI that is shared with 23 government agencies, including the CIA, DEA,<br \/>\nand FBI, to search illegally collected personal records.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Magic Lantern<\/strong> &#8211; A<br \/>\nkeystroke logging software deployed by the FBI in the form of an e-mail attachment.<br \/>\nWhen activated, it acts as a Trojan horse and allows the FBI to decrypt user<br \/>\ncommunications.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Main Core<\/strong> &#8211; A personal and<br \/>\nfinancial database storing information of millions of U. S. citizens believed to be<br \/>\nthreats to national security. The data mostly comes from the NSA, FBI, CIA, as well<br \/>\nas other government sources.&#160;<\/p>\n<p><\/p>\n<p>    <strong>MAINWAY<\/strong> &#8211; A NSA database<br \/>\ncontaining metadata for hundreds of billions of telephone calls made through the<br \/>\nfour largest telephone carriers in the United States.&#160;<\/p>\n<p><\/p>\n<p>    <strong>MUSCULAR<\/strong> &#8211; Overseas<br \/>\nwiretapping of Google&#8217;s and Yahoo&#8217;s internal networks by the<br \/>\nNSA.&#160;<\/p>\n<p><\/p>\n<p>    <strong>MYSTIC<\/strong> &#8211; Is a voice<br \/>\ninterception program used by the National Security Agency.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Room 641A<\/strong> &#8211; A<br \/>\ntelecommunication interception facility operated by AT&amp;T for the U.S. National<br \/>\nSecurity Agency.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Sentry Eagle<\/strong> &#8211; It monitors<br \/>\nand attacks an adversary&#8217;s cyberspace through capabilities include SIGINT,<br \/>\nComputer Network Exploitation, Information Assurance, Computer Network Defense,<br \/>\nNetwork Warfare, and Computer Network Attack. The efforts included weakening U. S.<br \/>\ncommercial encryption systems.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Special Collection Service<\/strong><br \/>\n&#8211; A black budget program that is responsible for &#8220;close<br \/>\nsurveillance, burglary, wiretapping, breaking and entering.&#8221; It employs<br \/>\ncovert listening device technologies to bug foreign embassies, communications<br \/>\ncenters, computer facilities, fiber-optic networks, and government<br \/>\ninstallations.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Terrorist Finance Tracking<br \/>\nProgram<\/strong> &#8211; A joint initiative run by the CIA and the Department of the<br \/>\nTreasury to access the SWIFT (Society for Worldwide Interbank Financial<br \/>\nTelecommunication) transaction database as part of the Bush administration&#8217;s<br \/>\n&#8220;Global War on Terrorism.&#8221;&#160;<\/p>\n<p><\/p>\n<p>    <strong>Multi-state Anti-Terrorism Information<br \/>\nExchange (MATRIX)<\/strong> &#8211; A data mining system originally developed for the<br \/>\nFlorida Department of Law Enforcement.<\/p>\n<p><\/p>\n<p>    <strong>Insight Program<\/strong> &#8211; It<br \/>\ndetects threat networks, irregular warfare, and terrorist operations by combining<br \/>\nintelligence information from imaging sensors, crowd-source and other social network<br \/>\nor text-based sensors, as well as from other sources for further analysis. Develops<br \/>\nintegrated human\/machine reasoning into intelligence equipment to encompass operator<br \/>\nknowledge and reasoning when dealing quickly with complex data from many different<br \/>\nsensors.&#160;<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/martie 2020\/12\/22649_5.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>    <strong>EM Fields and Hidden Symbols<\/strong><br \/>\n&#8211; Uses techniques to incept thoughts and ideas into the consciousness. Once a<br \/>\nconsciousness has been programed with the memory patterns, words and symbols can<br \/>\ntrigger the programing without the need of the original device.&#160;<\/p>\n<p><\/p>\n<p>    <strong>Narrative Networks Program<\/strong><br \/>\n&#8211; Developed classified techniques used to manipulate trust in humans. For its<br \/>\nNarrative Networks program, DARPA collaborated with a CIA agency called the<br \/>\nIntelligence Advanced Research Projects Agency (IARPA) to develop methods of<br \/>\noverwriting messages in the human consciousness.<\/p>\n<p><\/p>\n<p>    <strong>Mind Control Project<\/strong> &#8211;<br \/>\nRemotely disrupts political dissent and extremism by employing<br \/>\n&#8220;Transcranial Magnetic Stimulation&#8221; (TMS) in tandem with<br \/>\nsophisticated propaganda based on this technology. TMS stimulates the temporal lobe<br \/>\nof the brain with electromagnetic fields. This research aims to stop individuals<br \/>\nfrom thinking certain thoughts and make others believe things they normally would<br \/>\nnot believe. This research is being conducted by The Center for Strategic<br \/>\nCommunication at ASU and is entitled &#8220;Toward Narrative Disruptors and<br \/>\nInductors: Mapping the Narrative Comprehension Network and its Persuasive<br \/>\nEffects.&#8221; Mechanical disruptions of narrative processing may be,<br \/>\nultimately, replicated through targeted strategic communication campaigns that<br \/>\napproximate the narrative disruptions induced via magnetic stimulation. MIT<br \/>\nneuroscientists have shown that they can plant false memories. Most of the research<br \/>\nin this area currently revolves around how to induce and eliminate fear.&#160;<\/p>\n<p><\/p>\n<p>    <strong>yogaesoteric<\/strong><\/p>\n<p>    <strong>March 12, 2020<\/strong><\/p>\n<p>  &#160;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#160; Read the second part of the article The Brain Project &#8211; This area of study has received $100 million in funding via Obama&#8217;s ten-year BRAIN Project, as well as a $1.3 billion commitment from Europe. Concurrently, there is heavy military funding through agencies such as the Defense Advanced Research Projects Agency (DARPA). This raises [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1180],"tags":[],"class_list":["post-23289","post","type-post","status-publish","format-standard","hentry","category-information-control-for-social-manipulation-3480-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/23289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=23289"}],"version-history":[{"count":0,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/23289\/revisions"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=23289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=23289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=23289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}