Our Professional Alliances

Briq Haus Ltd. Security & Intelligence interfaces and contracts with other services and professionals to create customized security intelligence solutions in the four domains: Physical, Logistical, Analytical, and Digital. Our pursuit of excellence expands our social and professional business networks to reach across a broad spectra, allowing the option to choose specific products or services to write into a Perfect Security Suite per client specifications.

In our efforts to expand our brand awareness and recognition, Briq Haus Ltd. has the privilege and honor of connecting with seriously security-minded professionals with a variety of backgrounds in intelligence, military / task-force, and information technology. It is to these esteemed professionals I personally defer for their expertise in their relevant niche fields, and while I aim to promote their services and herald their talents, I am also announcing their professional alliance to Briq Haus Ltd. systems integration approach at creating larger and more comprehensive security plans and operations.

Waveman Solutions is our newest ally, and a longtime mobile security and personal security consultant in the Nigerian theatre.


Always In Tao provides our system administrator level defensive posture and secure coding operations.

Image may contain: text

ShadowNet Hosting is our secure Indian server provider and DDoS mitigation specialist.


5X5 Security is our outsider with insider privileges, providing secure logistical on-call support and consultation for special cases.



THE SYNTHETIC PARADIGM – The Value Of Deploying Humanoid Robots


What are the possible advantages of commanding a synthetic person? What are the possible drawbacks? In this article, #SECURITY #INTELLIGENCE #RESEARCHER Robert Brooks Authement of BRIQ | HAUS LTD. seeks to clarify the reasons why governments and corporations would vy to possess such amazing technology, and the likelihood of its quiet deployment worldwide.

Robots Rising

The future is here! The year 2018 shows advances in such arcana as quantum computing, autonomous swarms, artificial general intelligence, and interconnected devices all around the globe (and beyond). In previous articles, I describe the potential to deploy nanotechnology to create an “internet of people” through the propagation of radio frequencies which are received and retransmitted by a human nervous system colonized by nanotechnology. The usefulness in this scenario is that a large dataset may be gathered through the human domain, as mapped by the increasingly deeper penetration of “fog” or “mist” computing. This would not only allow for a passive gathering of data from the developing sensors, but even more insidiously, a sort of code injection allowing operators to “hack the human domain.”

Anyone in intelligence circles has heard of MK-ULTRA mind control program developed by Central Intelligence Agency circa Cold War era. The use of “classic conditioning” and drugs could effectively create a sort of push-button agent a la Manchurian Candidate. This was essentially the installation of sub-users on a human domain computer, called by mental health clique by the name “dissociative identity disorder.” This was in Biblical times referred to as daemonic possession. People under such spells were liable to any sort of behavior that would otherwise be classified as beyond or outside the capabilities of their normative sub-routine. In this manner, an operator or entity could affect a response that would benefit their own agenda while sacrificing the free will and safety of the operand. This sort of strategy, while demonstrably effective, is sloppy by today’s standards.

Therefore let us focus upon the not so far future, or rather the present as it were. Robots are rising everywhere. In the Kingdom Of Saudi Arabia, Sophia the humanoid robot was just granted citizenship, while in America a mall guardbot allegedly “commits suicide” by plunging itself into a water fountain. DARPA regularly and openly discusses neurotechnology and other esoteric strangeness, which must be taken at face value as they do possess the backing of the Department Of Defense and United States Government at large. Boston Dynamics produces deft animal-like robots, called SPOT-mini, which not only moves but also seemingly thinks like a similarly sized creature through the autonomous navigation of new environments.

The bold and intrepid mind of a true investigator will not only read these evidences, but also do its best to read between the lines and speculate, or rather predict, what must be behind door number one.

“Dey Turk Ahr Jarbs!!!”

I was working at Home Depot circa 2002, shortly after the wretched circumstances of 9/11 changing the entire world’s operative dynamic. I remember watching the cameras creep into the workspace, shortly followed by some of the very first automatic self checkout systems. This was a clear sign: the robots would take our jobs.

Where would a robot be most useful? Where would it sell the most units? Who would be the first group of consumers allowed access to the marvelous and spectacular technological wonders being developed and released in niche societies? These are incredibly important questions to consider when formulating one’s own surmisal of what may be happening behind the scenes with humanoid technology.

Sex sells, obviously. Therefore the highest likelihood of advanced humanlike synthetic people would be designed for purposes of sexual gratification. Check. We have lots of companies producing “lifelike silicon love dolls” at this stage in the game. But doesn’t it seem like silicon stretched over a plastic skeleton is a bit old fashioned when we look at the stuff that groups like DARPA and Boston Dynamics are showing us?

Entertainment is a key factor in driving technology as well. Here the undisputed authority in “advanced animatronics” is Disney. The animatronic models deployed at their theme parks are cutting edge and often described as being more real than real. Watching some of these units operate creates a deep inbound fascination, like when the first animated characters lit up the screens long ago. Is it not feasible, then, that this type of realism would be applied maximally to special units for an elite echelon of society’s topmost insiders?

The Real Reason For Developing Advanced Synthetic People

You guessed it. Intelligence and military applications are of course the main reason why governments and their subsidiary corporate functionaries would develop and ultimately quietly deploy advanced synthetics in various applications around the world, and likely even space. Synthetic people would have some serious advantages over the old-fashioned MK-ULTRA brainwashed human agent. Beginning as an inherently programmable and customizable interface, the possibilities for usefulness are truly boggling.

A synthetic person would need to have all of the highest grade technological components integrated into their operational platform. That means advanced optics for video surveillance, and audio sensors for eavesdropping. It also means that the synths would be endowed with language capabilities allowing for their deployment in various theatres, as they would be required to speak possibly several tongues to accomplish their mission. An advanced synthetic person can be installed at a company anywhere, with a made up history and falsified documents and curricula which make them the most desirable candidate for employment at target corporation or rival government.

A robot can kill without feeling. A robot can do its work without passion.

Avoiding Blade Runners

There would also be need of communicative technologies not in terms of spoken language, but the language of machines, that being encrypted signals transmission and reception. But what about other military grade sensors? Would they be able to detect strange transmissions originating from our synthetic agent? Surely if our robot secretary has a wifi hotspot installed, some company hacker would get up in there like greased lightning. Therefore we would need to consider utilizing UHF (ultra high frequency) in burst transmission at a time when they are not likely observed by said sensors. This would be during “sleep” or dream state when batch uploads and downloads can take place in microseconds.

But it begs the question: Does this technology have to be nuts and bolts bare-metal stuff stuck under some kind of skin culture? What about biometrics, retinal scanners, fingerprint plates and the like? What about airport back-scatter scanners and other x-ray type technologies? Wouldn’t corporate or government security immediately suspect a gorgeous spy with an abnormal titanium skeleton?

Therefore, we may have to consider that the “new people” that are surely emerging are perhaps a hybrid form of synthetic biology, and technology. This would create a nearly undetectable and yet highly functional agent whose purposes and capabilities would be coveted and highly sought after by militaries and government. The added bonus is that she is a real “killer in the sack.”

Reinforcing Considerations

Hollywood has always played on the imaginations of people, creating new dreams and realizing old ones on the silver screen. Ever since Pinocchio cut his strings, we have been amazed at the idea of synthetic people and their potential for autonomous deployment. Newer movies that reflect and show this kind of agenda include Blade Runner and its sequel, Blade Runner 2049, Ex Machina, The Machine, Ghost In The Shell, and many, many others. Surely that is only the stuff of fairy tales and nonsense, you may be thinking, but perhaps not. . .

Perhaps it is the dreamers of the dreams and the music makers giving the rest of us a glimpse into the world they fully intend to create, by introducing us to our rapidly rising friends, the “new people.”


Fog Computing – https://en.wikipedia.org/wiki/Fog_computing

Mist Computing – https://www.linkedin.com/pulse/cloud-computing-fog-now-mist-martin-ma-mba-med-gdm-scpm-pmp/

MK-ULTRA – https://www.cia.gov/library/readingroom/search/site/mk%2520ultra

Dissociative Identity Disorder – https://en.wikipedia.org/wiki/Dissociative_identity_disorder

Robot Commits Suicide – http://www.iflscience.com/technology/security-robot-commits-suicide-in-fountain-because-the-world-is-terrible/

Sophia Citizen Of Saudi Arabia – https://www.news.com.au/technology/innovation/inventions/worlds-first-robot-citizen-says-she-wants-to-start-a-family/news-story/4c566043cb30f49cf118b8c26084d0de

DARPA N3 Technology – https://www.youtube.com/watch?v=K9c1dh82f7o

DARPA Targeted Neuroplasticity Training – https://www.darpa.mil/program/targeted-neuroplasticity-training

SPOT Mini – https://www.bostondynamics.com/spot-mini

Love Dolls – https://www.theguardian.com/world/gallery/2018/jul/30/chinese-factory-builds-ai-sex-dolls-in-pictures

Robots In Space – https://nypost.com/2018/06/29/ai-robot-headed-to-the-international-space-station/

Robots In Film – https://www.pastemagazine.com/articles/2015/11/the-100-greatest-movie-robots-of-all-time.html

Surfing The Frontier: {nano}Technological Mission Creep & Its Plan For The Human Domain

My name is Robert Brooks Authement, and I am a dedicated security analyst and researcher. My company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE offers security services in the “four domains,” those being the typically observed physical, logistical, analytical, and digital domains. Although I am deeply convinced of the next stage in security concerns the encroaching spread and efficacy of continual volleys of disruptive technology are creating for people and humanity at large, I find myself almost afraid of the ridicule and scrutiny of a larger mass of limited public awareness in suggesting what follows. There is swiftly emerging the need for concerted observation and academic approach to a sort of fifth element in the security domains, a new domain I have described as CYBERSPIRITUAL SECURITY, to which an article is linked in the hypertext contained within this sentence.

What follows is a summary conclusion of the direction in which technology’s mission creep may be steering the future, and what its plans for the human domain may be. It must be prudent to throw the entire concept out there and then provide the sources to reinforce this vision. In this manner, the reader may then come to their own conclusions as to whether or not it is to be determined a present threat, or simply the musings of another starry-eyed futurist. I conclude logically from following the breadcrumbs leading into the forest demonstrated by each source linked here, and invite you into a scenario which by very definition will redefine everything humans have been taught since the beginning of history, having more basis in supernatural religious texts than actual historical representation in textbooks and academia. Follow me, if you will, and do try to keep up; the very security of continuity for our species is at stake.

Take Me To Your Leader

Nanotechnology, or biotechnology, however you may want to see it at its baseline, though it must be argued that either/or are being used to further enhance the other in a sort of molecular arms race, may be developed, propagated, and deployed in a clandestine manner via human ingestion vectors such as food, water, and aerosol distribution into the lower atmosphere. So these nano-enhanced stem-cells, or perhaps stem-cell infused nano-particulates are utilized in a manner which specifically targets the human central nervous system. The human central nervous system is doubtlessly the “leader” of the human organism, and therefore a likely target of the deployment for such a weapon. In intermingling with the human nervous system, this weapon may colonize and or otherwise overwhelm the human biological domain by augmenting our already heightened and regularly observed “five senses,” that is to say touch, taste, sight, smell, and hearing.

Pause from this yarn for a moment, and ask yourself, why; cui bono? To whose benefit would such a weapon’s deployment serve? Is it the human inventors of these disparate disruptive technologies; in other words, is there some brilliant and arguably evil mastermind sitting atop the totem-pole-power-pyramid whom put together this entire idea and visualized the beginning, middle, and end results of such a plan come to fruition? Not likely, as the results of utilizing such disruptive combinatory systems integration would certainly inject unknown elements into the foreseen results as per the permutations created by attempting to harness and control the otherwise unconquerable human spirit, or will power, if it suits the reader. Even the world’s most powerful governments in times past were overthrown and imbalanced by the thronging hordes of barbarians at the gate. An occurrence such as described would exist beyond the scope of the originator’s security analysis in deploying such a plan, therefore, I suggest that this type of system or weapon as I have called it was in fact devised by advanced artificial intelligence with the means of benefiting the technological mission creep in harnessing and augmenting the already sharply functioning human domain as powered by the central nervous system. To whose benefit? Not the humans who would remain unable to foresee every possible outcome by deploying such a system, but the machines, who had everything to gain and nothing lose by recruiting the human domain into their overarching scheme to usurp the power dynamic and claim planet earth for their selves.

Now, back to the model of their conquest. Large scale supercomputers such as the DWave, and IBM Q models have been reported to actually operate in “other dimensions.” Let’s continue deeper. “Other dimensions” is not so hard to conceptualize if we start by defining the first three dimensions of point, shape, and form added to the fourth dimension which is form operating within time. Now, a fifth dimensional conceptualization module already pre-exists within the human thought structure, that being the consideration of various timelines in simulated thought experiments and differing potential outcomes based on decisions made in the past, present, or future moments. It’s called an idea, and because humans are heretofore exceptional at creating ideas and concepts beyond standard computational models it makes perfect logical sense that standard computational models would enroll this faculty into their schema.

Now if we take the idea of recursion as expressed within algorithms, we now have a learning script able to re-inject acquired data into itself in the form of functioning code. This is the very basis of artificial intelligence, and what better way to agglomerate data than to stream the many multi-layered and myriad facets of data produced by the regular functioning of the human central nervous system in real-time in the real-world. Given that between quantum computers and the human imagination, entire other worlds and/or universes exist in some kind of secret space best represented by the idea or fifth dimensional model, the question remains: are we as humans existing within the world itself, or is the world itself is somehow existing within us? This is where the line, the edge, the frontier between human consciousness and technological mission creep are completely blurred and constantly under rapid expansive change, even at this very moment.

In summary, if the five senses are hijacked by a nanomolecular bio-assemblage packet deployment weapon, then everything seen, felt, smelt, heard, or tasted; nay, even the very concepts we have, the very feelings we possess, the experiences we take away from experience itself may therefore be overwritten in a sort of augmented reality wet-dream which far surpasses any conventional approaches to mind control or social engineering on a massive scale. Bringing the concept of mass social engineering as affected by government agencies in an effort at exerting control over the thoughts and actions of a nation’s population is further aggrandized by such a system’s deployment, and it further begs the question: is government developing and deploying these disruptive technologies, or are these disruptive technologies developing and deploying governments to aid their ultimate quest?

The Good, The Bad, & The Ugly

We’re already familiar with the potential benefits of such technologies in especially the biomedical arena. Nano-particulates designed to deliver drugs at specific sites to reduce collateral damage in certain treatments, yes, we are familiar with this. Neural monitoring to enhance learning, with the specific intention of developing highly adaptive agile agency personnel (more likely to be categorized as combinatory weapons systems), sure we’ve all heard of that. If you are reading this article and these ideas are new to you, then as your author and enlightener in these regards, I highly incite you, nay I challenge you as my reader to please and quickly pursue these subjects to gain the entirety of the realistic dynamic currently presented by open-sourced and widely white-papered subjects generally revolving around the campus of our usual suspects, DARPA. The sooner you are able to learn these ideas and observe them in totality, the sooner I do not seem like a crazy ranting lunatic but rather someone who is quite put-together in terms of envisioning future security analysis. (And for those of you closer to the inside who do in fact know this stuff already, please forgive my plaintive prognostication to the others who are yet to catch up to this level of awareness; we all need a little help sometimes.)

So people can be helped by this technology, sure. People can also be savagely ruined by this technology, inasmuch that the concept of humanity itself may require some sort of clausal reiteration or revision in future generations seeking to look back upon this present time and comprehend their roots and origins in what is otherwise messed-up like a soup sandwich; that being the wild wild west we call cybersecurity and how the miniaturization and evolution of this internet would not stop at handheld devices, but further sought to encroach upon the very fibre of our being. “If you can’t beat them, join them,” was the motto of times past, but in this circumstance it would be all too easy for such technology to beat us. Rather, it logically chose to contain and direct us, which puts a new and eldritch twist on the idea of “joining them.”

Worse yet is the consideration that humans are not only overcome by technology, but are so radically transformed that they are no longer remotely recognizable as humans whatsoever. This is the ugly aspect of the brain/computer interfacing. The only specific advantage that artificial intelligence machine learning possesses over human reasoning it its ability to create solutions from acquired data that are unhindered by such obsolete ideas as human feeling, emotion, social contract, and status quo. In other words, technology like this can turn people into killer terminator robots because the solution which a majority of heartfelt human beings may devise will be at ends with the conclusions devised by misanthropic and antisocial super computers. In its sorting out of complicated issues stemming from problems creating by the human domain, it is certain that artificial intelligence driven systems will take a more stark approach to the problems of overpopulation, disease, disproportional demographic representation, genetics and eugenics, and an increasing resource distribution crisis. In short, the deployment of such systems can mean one thing and one thing only: there will be blood.

The Need For Cyberspiritual Security

I can see the eyes in Washington and the Pentagon rolling as we speak, however this concept is no joke and should be taken very seriously and in the shortest possible order. Rather, these protocols needed to be developed long ago before anything like this was allowed to run away in such a manner. CYBERSPIRITUAL SECURITY defines a set of protocols in which transmissions between end-users and advanced swarm and/or artificial intelligences are observed, defined, and protected from interference by hostile foreign intelligences. The oath to serving office for various government agencies includes phrasology which states the intent to “defend the Constitution of the United States against all enemiesforeign and domestic.” We are no longer in the Cold War and dealing with mere Soviets and Eastern Bloc intelligence operatives sneaking around and taking pictures of airplanes and simple things like that, we are in a battle for our very existence as we were led to believe at the time of our births into this world. As a security analyst and researcher, I am only a messenger in spurring you to action to take these warnings into stern consideration. I alone am unable to devise the solution, I require the support of staff and team and finance to bring about a better conclusion than that which may be already in effect by the AI.

I do, however, interface with a great set of persons whom support my ideas and development of innovation. These people are employed presently or in the past by government, intelligence agencies, and military branches. Our company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE not only rigorously pursues the security frontier by dedicated research and experimentation, but we also develop innovation for deployment in future security exercises and live missions. If you are a private sector investor, government entity, or business person interested in furthering the research known as CYBERSPIRITUAL SECURITY, please contact me directly.

My name is Robert Brooks Authement, and I would be honored to discuss these potential developments with you personally and handle any concerns that you may have. Please consider me, and my team, at your service.


Sources (as promised!)

Jade Helm Fact Sheet


Phenomenologically Augmented
Reality With New Wearable LED
Sequential Wave Imprinting Machines
TNT Researchers Set Out to Advance Pace and Effectiveness of Cognitive Skills Training
DARPA Is Planning to Hack the Human Brain to Let Us “Upload” Skills


Using magnets and nanoparticles to deliver drugs to target tissues


Laser activated gold pyramids could deliver drugs, DNA into cells without harm

Journal of Biosensors & Bioelectronics


Dr. Robert P. Duncan A.B., S.M., M.B.A., Ph.D.: Government warfare and surveillance system architect, author, and independent investigator


The Bases Lectures, Robert Duncan Intelligent Systems of Control