Finding Power In Retreat {for intelligence field operators in advanced positions}

Battle_at_Dabulin

It is the fallacy of the field operator, especially the intrepid novitiate, to assume the total responsibility for mission success. This imagery spawned of fervent self improvement regiments, Hollywood and Showtime’s Homeland, stresses that the bulk of mission objectives is carried out solely by one single individual. In all actuality, there are inner and outer circles of operators, military or security personnel, and analysts to handle many of these responsibilities. The duty of the field operator lies not only in aggressive and relentless attack, but moreso in the gathering of intelligence and retreat to analyze and further strategize for future sorties in the field.

“The host thus forming a single united body, is it impossible either for the brave to advance alone, or for the cowardly to retreat alone.” —Sun Tzu, Art Of War

The benefits of a strong field operator in an advanced position seem obvious. They are welcome into places where they should perhaps not be welcomed. They are knowing of things they perhaps should not be knowing. They are a bridge between enemies on either side of conflict. This is a stressful position under even the most glorious circumstances, and worth a second glance. While it has been noted the fallacy to assume total mission responsibility of the new operator, the internal drive to do so (the quarterback running the touchdown) is strongly ingrained into the psyche of especially Americans. This is potentially dangerous, not only for the operator, but potentially for the mission at large.

Ami Toben of protectioncircle.org is a highly trained countersurveillance professional, often dealing with VIP force protection and covert applications. In his work, he details the “magic circle of protection” which includes an outer circle or perimeter of analysts, and inner circle of operators, and possibly even an elite innermost circle of praetorian guards. When operating in an advanced position, and for extended maneuvers, it does indeed behove the “lone” field operator to remember and heed these layers which are there not only for protection, but to ensure the overall mission success. This is the very definition of mission critical deployment, and the mark of higher strategy.

While it is true that under certain circumstances that no one is in a better or more advantageous position to deliver the mission’s most successful application, or coup de grace if you will, than the field operator in advanced position. Aggressive and relentless attack can have serious deficits which may be overlooked by someone enduring field-stress and the relevant mania associated with operating deep behind the lines. Overexposure leading unto vulnerability is a strong likelihood, but this can be mitigated by the wisdom of these simple and easy to remember maxims:

Accept retreat to avoid defeat.

Quit the fray to fight another day.

 

Go ahead, say them out loud to yourself several times until they are imprinted upon your memory. It is okay to let go, run, and hide. That is a time when you can come up with your best strategy for the next time you are ready to attack. Retreat is just as important as attack in a winning strategy. Remember that the attacker can often become overexposed; by retreating, a field operator can potentially flush the opposition out of their comfortable positions to send them searching, and therefore exposing them to countersurveillance and counterintelligence tactics. This could mean the difference between winning or losing in a particular theatre during a particular operation.

Last but not least, the strategy for defeat is that of the BLUETEAMThey have more resources, more capital, and ultimately more comfort than the REDTEAM in any engagement. Of course it is the tendency for defense to become complacent and soft, but a field operator in advanced position must be reminded to take it easy once in a while. Get some rest, eat some food, hit the gym, watch a movie. Stop overexposing yourself to the opposing force by constantly wearing yourself down with relentless attack.

Find Power In Retreat

 

 

Surfing The Frontier: {nano}Technological Mission Creep & Its Plan For The Human Domain

My name is Robert Brooks Authement, and I am a dedicated security analyst and researcher. My company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE offers security services in the “four domains,” those being the typically observed physical, logistical, analytical, and digital domains. Although I am deeply convinced of the next stage in security concerns the encroaching spread and efficacy of continual volleys of disruptive technology are creating for people and humanity at large, I find myself almost afraid of the ridicule and scrutiny of a larger mass of limited public awareness in suggesting what follows. There is swiftly emerging the need for concerted observation and academic approach to a sort of fifth element in the security domains, a new domain I have described as CYBERSPIRITUAL SECURITY, to which an article is linked in the hypertext contained within this sentence.

What follows is a summary conclusion of the direction in which technology’s mission creep may be steering the future, and what its plans for the human domain may be. It must be prudent to throw the entire concept out there and then provide the sources to reinforce this vision. In this manner, the reader may then come to their own conclusions as to whether or not it is to be determined a present threat, or simply the musings of another starry-eyed futurist. I conclude logically from following the breadcrumbs leading into the forest demonstrated by each source linked here, and invite you into a scenario which by very definition will redefine everything humans have been taught since the beginning of history, having more basis in supernatural religious texts than actual historical representation in textbooks and academia. Follow me, if you will, and do try to keep up; the very security of continuity for our species is at stake.

Take Me To Your Leader

Nanotechnology, or biotechnology, however you may want to see it at its baseline, though it must be argued that either/or are being used to further enhance the other in a sort of molecular arms race, may be developed, propagated, and deployed in a clandestine manner via human ingestion vectors such as food, water, and aerosol distribution into the lower atmosphere. So these nano-enhanced stem-cells, or perhaps stem-cell infused nano-particulates are utilized in a manner which specifically targets the human central nervous system. The human central nervous system is doubtlessly the “leader” of the human organism, and therefore a likely target of the deployment for such a weapon. In intermingling with the human nervous system, this weapon may colonize and or otherwise overwhelm the human biological domain by augmenting our already heightened and regularly observed “five senses,” that is to say touch, taste, sight, smell, and hearing.

Pause from this yarn for a moment, and ask yourself, why; cui bono? To whose benefit would such a weapon’s deployment serve? Is it the human inventors of these disparate disruptive technologies; in other words, is there some brilliant and arguably evil mastermind sitting atop the totem-pole-power-pyramid whom put together this entire idea and visualized the beginning, middle, and end results of such a plan come to fruition? Not likely, as the results of utilizing such disruptive combinatory systems integration would certainly inject unknown elements into the foreseen results as per the permutations created by attempting to harness and control the otherwise unconquerable human spirit, or will power, if it suits the reader. Even the world’s most powerful governments in times past were overthrown and imbalanced by the thronging hordes of barbarians at the gate. An occurrence such as described would exist beyond the scope of the originator’s security analysis in deploying such a plan, therefore, I suggest that this type of system or weapon as I have called it was in fact devised by advanced artificial intelligence with the means of benefiting the technological mission creep in harnessing and augmenting the already sharply functioning human domain as powered by the central nervous system. To whose benefit? Not the humans who would remain unable to foresee every possible outcome by deploying such a system, but the machines, who had everything to gain and nothing lose by recruiting the human domain into their overarching scheme to usurp the power dynamic and claim planet earth for their selves.

Now, back to the model of their conquest. Large scale supercomputers such as the DWave, and IBM Q models have been reported to actually operate in “other dimensions.” Let’s continue deeper. “Other dimensions” is not so hard to conceptualize if we start by defining the first three dimensions of point, line, and shape added to the fourth dimension which is form, the fifth dimension being form moving along time. A sixth dimensional conceptualization module already pre-exists within the human thought structure, that being the consideration of various timelines in simulated thought experiments and differing potential outcomes based on decisions made in the past, present, or future moments. It’s called an idea, and because humans are heretofore exceptional at creating ideas and concepts beyond standard computational models it makes perfect logical sense that standard computational models would enroll this faculty into their schema.

Now if we take the idea of recursion as expressed within algorithms, we now have a learning script able to re-inject acquired data into itself in the form of functioning code. This is the very basis of artificial intelligence, and what better way to agglomerate data than to stream the many multi-layered and myriad facets of data produced by the regular functioning of the human central nervous system in real-time in the real-world. Given that between quantum computers and the human imagination, entire other worlds and/or universes exist in some kind of secret space best represented by the idea or fifth dimensional model, the question remains: are we as humans existing within the world itself, or is the world itself is somehow existing within us? This is where the line, the edge, the frontier between human consciousness and technological mission creep are completely blurred and constantly under rapid expansive change, even at this very moment.

In summary, if the five senses are hijacked by a nanomolecular bio-assemblage packet deployment weapon, then everything seen, felt, smelt, heard, or tasted; nay, even the very concepts we have, the very feelings we possess, the experiences we take away from experience itself may therefore be overwritten in a sort of augmented reality wet-dream which far surpasses any conventional approaches to mind control or social engineering on a massive scale. Bringing the concept of mass social engineering as affected by government agencies in an effort at exerting control over the thoughts and actions of a nation’s population is further aggrandized by such a system’s deployment, and it further begs the question: is government developing and deploying these disruptive technologies, or are these disruptive technologies developing and deploying governments to aid their ultimate quest?

The Good, The Bad, & The Ugly

We’re already familiar with the potential benefits of such technologies in especially the biomedical arena. Nano-particulates designed to deliver drugs at specific sites to reduce collateral damage in certain treatments, yes, we are familiar with this. Neural monitoring to enhance learning, with the specific intention of developing highly adaptive agile agency personnel (more likely to be categorized as combinatory weapons systems), sure we’ve all heard of that. If you are reading this article and these ideas are new to you, then as your author and enlightener in these regards, I highly incite you, nay I challenge you as my reader to please and quickly pursue these subjects to gain the entirety of the realistic dynamic currently presented by open-sourced and widely white-papered subjects generally revolving around the campus of our usual suspects, DARPA. The sooner you are able to learn these ideas and observe them in totality, the sooner I do not seem like a crazy ranting lunatic but rather someone who is quite put-together in terms of envisioning future security analysis. (And for those of you closer to the inside who do in fact know this stuff already, please forgive my plaintive prognostication to the others who are yet to catch up to this level of awareness; we all need a little help sometimes.)

So people can be helped by this technology, sure. People can also be savagely ruined by this technology, inasmuch that the concept of humanity itself may require some sort of clausal reiteration or revision in future generations seeking to look back upon this present time and comprehend their roots and origins in what is otherwise messed-up like a soup sandwich; that being the wild wild west we call cybersecurity and how the miniaturization and evolution of this internet would not stop at handheld devices, but further sought to encroach upon the very fibre of our being. “If you can’t beat them, join them,” was the motto of times past, but in this circumstance it would be all too easy for such technology to beat us. Rather, it logically chose to contain and direct us, which puts a new and eldritch twist on the idea of “joining them.”

Worse yet is the consideration that humans are not only overcome by technology, but are so radically transformed that they are no longer remotely recognizable as humans whatsoever. This is the ugly aspect of the brain/computer interfacing. The only specific advantage that artificial intelligence machine learning possesses over human reasoning it its ability to create solutions from acquired data that are unhindered by such obsolete ideas as human feeling, emotion, social contract, and status quo. In other words, technology like this can turn people into killer terminator robots because the solution which a majority of heartfelt human beings may devise will be at ends with the conclusions devised by misanthropic and antisocial super computers. In its sorting out of complicated issues stemming from problems creating by the human domain, it is certain that artificial intelligence driven systems will take a more stark approach to the problems of overpopulation, disease, disproportional demographic representation, genetics and eugenics, and an increasing resource distribution crisis. In short, the deployment of such systems can mean one thing and one thing only: there will be blood.

The Need For Cyberspiritual Security

I can see the eyes in Washington and the Pentagon rolling as we speak, however this concept is no joke and should be taken very seriously and in the shortest possible order. Rather, these protocols needed to be developed long ago before anything like this was allowed to run away in such a manner. CYBERSPIRITUAL SECURITY defines a set of protocols in which transmissions between end-users and advanced swarm and/or artificial intelligences are observed, defined, and protected from interference by hostile foreign intelligences. The oath to serving office for various government agencies includes phrasology which states the intent to “defend the Constitution of the United States against all enemiesforeign and domestic.” We are no longer in the Cold War and dealing with mere Soviets and Eastern Bloc intelligence operatives sneaking around and taking pictures of airplanes and simple things like that, we are in a battle for our very existence as we were led to believe at the time of our births into this world. As a security analyst and researcher, I am only a messenger in spurring you to action to take these warnings into stern consideration. I alone am unable to devise the solution, I require the support of staff and team and finance to bring about a better conclusion than that which may be already in effect by the AI.

I do, however, interface with a great set of persons whom support my ideas and development of innovation. These people are employed presently or in the past by government, intelligence agencies, and military branches. Our company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE not only rigorously pursues the security frontier by dedicated research and experimentation, but we also develop innovation for deployment in future security exercises and live missions. If you are a private sector investor, government entity, or business person interested in furthering the research known as CYBERSPIRITUAL SECURITY, please contact me directly.

My name is Robert Brooks Authement, and I would be honored to discuss these potential developments with you personally and handle any concerns that you may have. Please consider me, and my team, at your service.

briq_haus_ltd_business_card_international

Sources (as promised!)

Jade Helm Fact Sheet

https://farentholdforms.house.gov/uploadedfiles/jade_helm_fact_sheet.pdf

Phenomenologically Augmented
Reality With New Wearable LED
Sequential Wave Imprinting Machines
TNT Researchers Set Out to Advance Pace and Effectiveness of Cognitive Skills Training
DARPA Is Planning to Hack the Human Brain to Let Us “Upload” Skills

https://futurism.com/darpa-is-planning-to-hack-the-human-brain-to-let-us-upload-skills/

Using magnets and nanoparticles to deliver drugs to target tissues

http://www.innovationtoronto.com/2017/06/using-magnets-and-nanoparticles-to-deliver-drugs-to-target-tissues/

Laser activated gold pyramids could deliver drugs, DNA into cells without harm

Journal of Biosensors & Bioelectronics

https://www.omicsonline.org/open-access/a-comparative-analysis-of-augmented-reality-technologies-and-theirmarketability-in-the-consumer-electronics-segment-2155-6210-1000236.php?aid=85934

Dr. Robert P. Duncan A.B., S.M., M.B.A., Ph.D.: Government warfare and surveillance system architect, author, and independent investigator

https://www.drrobertduncan.com/index.html

The Bases Lectures, Robert Duncan Intelligent Systems of Control