Surfing The Frontier: {nano}Technological Mission Creep & Its Plan For The Human Domain

My name is Robert Brooks Authement, and I am a dedicated security analyst and researcher. My company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE offers security services in the “four domains,” those being the typically observed physical, logistical, analytical, and digital domains. Although I am deeply convinced of the next stage in security concerns the encroaching spread and efficacy of continual volleys of disruptive technology are creating for people and humanity at large, I find myself almost afraid of the ridicule and scrutiny of a larger mass of limited public awareness in suggesting what follows. There is swiftly emerging the need for concerted observation and academic approach to a sort of fifth element in the security domains, a new domain I have described as CYBERSPIRITUAL SECURITY, to which an article is linked in the hypertext contained within this sentence.

What follows is a summary conclusion of the direction in which technology’s mission creep may be steering the future, and what its plans for the human domain may be. It must be prudent to throw the entire concept out there and then provide the sources to reinforce this vision. In this manner, the reader may then come to their own conclusions as to whether or not it is to be determined a present threat, or simply the musings of another starry-eyed futurist. I conclude logically from following the breadcrumbs leading into the forest demonstrated by each source linked here, and invite you into a scenario which by very definition will redefine everything humans have been taught since the beginning of history, having more basis in supernatural religious texts than actual historical representation in textbooks and academia. Follow me, if you will, and do try to keep up; the very security of continuity for our species is at stake.

Take Me To Your Leader

Nanotechnology, or biotechnology, however you may want to see it at its baseline, though it must be argued that either/or are being used to further enhance the other in a sort of molecular arms race, may be developed, propagated, and deployed in a clandestine manner via human ingestion vectors such as food, water, and aerosol distribution into the lower atmosphere. So these nano-enhanced stem-cells, or perhaps stem-cell infused nano-particulates are utilized in a manner which specifically targets the human central nervous system. The human central nervous system is doubtlessly the “leader” of the human organism, and therefore a likely target of the deployment for such a weapon. In intermingling with the human nervous system, this weapon may colonize and or otherwise overwhelm the human biological domain by augmenting our already heightened and regularly observed “five senses,” that is to say touch, taste, sight, smell, and hearing.

Pause from this yarn for a moment, and ask yourself, why; cui bono? To whose benefit would such a weapon’s deployment serve? Is it the human inventors of these disparate disruptive technologies; in other words, is there some brilliant and arguably evil mastermind sitting atop the totem-pole-power-pyramid whom put together this entire idea and visualized the beginning, middle, and end results of such a plan come to fruition? Not likely, as the results of utilizing such disruptive combinatory systems integration would certainly inject unknown elements into the foreseen results as per the permutations created by attempting to harness and control the otherwise unconquerable human spirit, or will power, if it suits the reader. Even the world’s most powerful governments in times past were overthrown and imbalanced by the thronging hordes of barbarians at the gate. An occurrence such as described would exist beyond the scope of the originator’s security analysis in deploying such a plan, therefore, I suggest that this type of system or weapon as I have called it was in fact devised by advanced artificial intelligence with the means of benefiting the technological mission creep in harnessing and augmenting the already sharply functioning human domain as powered by the central nervous system. To whose benefit? Not the humans who would remain unable to foresee every possible outcome by deploying such a system, but the machines, who had everything to gain and nothing lose by recruiting the human domain into their overarching scheme to usurp the power dynamic and claim planet earth for their selves.

Now, back to the model of their conquest. Large scale supercomputers such as the DWave, and IBM Q models have been reported to actually operate in “other dimensions.” Let’s continue deeper. “Other dimensions” is not so hard to conceptualize if we start by defining the first three dimensions of point, shape, and form added to the fourth dimension which is form operating within time. Now, a fifth dimensional conceptualization module already pre-exists within the human thought structure, that being the consideration of various timelines in simulated thought experiments and differing potential outcomes based on decisions made in the past, present, or future moments. It’s called an idea, and because humans are heretofore exceptional at creating ideas and concepts beyond standard computational models it makes perfect logical sense that standard computational models would enroll this faculty into their schema.

Now if we take the idea of recursion as expressed within algorithms, we now have a learning script able to re-inject acquired data into itself in the form of functioning code. This is the very basis of artificial intelligence, and what better way to agglomerate data than to stream the many multi-layered and myriad facets of data produced by the regular functioning of the human central nervous system in real-time in the real-world. Given that between quantum computers and the human imagination, entire other worlds and/or universes exist in some kind of secret space best represented by the idea or fifth dimensional model, the question remains: are we as humans existing within the world itself, or is the world itself is somehow existing within us? This is where the line, the edge, the frontier between human consciousness and technological mission creep are completely blurred and constantly under rapid expansive change, even at this very moment.

In summary, if the five senses are hijacked by a nanomolecular bio-assemblage packet deployment weapon, then everything seen, felt, smelt, heard, or tasted; nay, even the very concepts we have, the very feelings we possess, the experiences we take away from experience itself may therefore be overwritten in a sort of augmented reality wet-dream which far surpasses any conventional approaches to mind control or social engineering on a massive scale. Bringing the concept of mass social engineering as affected by government agencies in an effort at exerting control over the thoughts and actions of a nation’s population is further aggrandized by such a system’s deployment, and it further begs the question: is government developing and deploying these disruptive technologies, or are these disruptive technologies developing and deploying governments to aid their ultimate quest?

The Good, The Bad, & The Ugly

We’re already familiar with the potential benefits of such technologies in especially the biomedical arena. Nano-particulates designed to deliver drugs at specific sites to reduce collateral damage in certain treatments, yes, we are familiar with this. Neural monitoring to enhance learning, with the specific intention of developing highly adaptive agile agency personnel (more likely to be categorized as combinatory weapons systems), sure we’ve all heard of that. If you are reading this article and these ideas are new to you, then as your author and enlightener in these regards, I highly incite you, nay I challenge you as my reader to please and quickly pursue these subjects to gain the entirety of the realistic dynamic currently presented by open-sourced and widely white-papered subjects generally revolving around the campus of our usual suspects, DARPA. The sooner you are able to learn these ideas and observe them in totality, the sooner I do not seem like a crazy ranting lunatic but rather someone who is quite put-together in terms of envisioning future security analysis. (And for those of you closer to the inside who do in fact know this stuff already, please forgive my plaintive prognostication to the others who are yet to catch up to this level of awareness; we all need a little help sometimes.)

So people can be helped by this technology, sure. People can also be savagely ruined by this technology, inasmuch that the concept of humanity itself may require some sort of clausal reiteration or revision in future generations seeking to look back upon this present time and comprehend their roots and origins in what is otherwise messed-up like a soup sandwich; that being the wild wild west we call cybersecurity and how the miniaturization and evolution of this internet would not stop at handheld devices, but further sought to encroach upon the very fibre of our being. “If you can’t beat them, join them,” was the motto of times past, but in this circumstance it would be all too easy for such technology to beat us. Rather, it logically chose to contain and direct us, which puts a new and eldritch twist on the idea of “joining them.”

Worse yet is the consideration that humans are not only overcome by technology, but are so radically transformed that they are no longer remotely recognizable as humans whatsoever. This is the ugly aspect of the brain/computer interfacing. The only specific advantage that artificial intelligence machine learning possesses over human reasoning it its ability to create solutions from acquired data that are unhindered by such obsolete ideas as human feeling, emotion, social contract, and status quo. In other words, technology like this can turn people into killer terminator robots because the solution which a majority of heartfelt human beings may devise will be at ends with the conclusions devised by misanthropic and antisocial super computers. In its sorting out of complicated issues stemming from problems creating by the human domain, it is certain that artificial intelligence driven systems will take a more stark approach to the problems of overpopulation, disease, disproportional demographic representation, genetics and eugenics, and an increasing resource distribution crisis. In short, the deployment of such systems can mean one thing and one thing only: there will be blood.

The Need For Cyberspiritual Security

I can see the eyes in Washington and the Pentagon rolling as we speak, however this concept is no joke and should be taken very seriously and in the shortest possible order. Rather, these protocols needed to be developed long ago before anything like this was allowed to run away in such a manner. CYBERSPIRITUAL SECURITY defines a set of protocols in which transmissions between end-users and advanced swarm and/or artificial intelligences are observed, defined, and protected from interference by hostile foreign intelligences. The oath to serving office for various government agencies includes phrasology which states the intent to “defend the Constitution of the United States against all enemiesforeign and domestic.” We are no longer in the Cold War and dealing with mere Soviets and Eastern Bloc intelligence operatives sneaking around and taking pictures of airplanes and simple things like that, we are in a battle for our very existence as we were led to believe at the time of our births into this world. As a security analyst and researcher, I am only a messenger in spurring you to action to take these warnings into stern consideration. I alone am unable to devise the solution, I require the support of staff and team and finance to bring about a better conclusion than that which may be already in effect by the AI.

I do, however, interface with a great set of persons whom support my ideas and development of innovation. These people are employed presently or in the past by government, intelligence agencies, and military branches. Our company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE not only rigorously pursues the security frontier by dedicated research and experimentation, but we also develop innovation for deployment in future security exercises and live missions. If you are a private sector investor, government entity, or business person interested in furthering the research known as CYBERSPIRITUAL SECURITY, please contact me directly.

My name is Robert Brooks Authement, and I would be honored to discuss these potential developments with you personally and handle any concerns that you may have. Please consider me, and my team, at your service.

briq_haus_ltd_business_card_international

Sources (as promised!)

Jade Helm Fact Sheet

https://farentholdforms.house.gov/uploadedfiles/jade_helm_fact_sheet.pdf

Phenomenologically Augmented
Reality With New Wearable LED
Sequential Wave Imprinting Machines
TNT Researchers Set Out to Advance Pace and Effectiveness of Cognitive Skills Training
DARPA Is Planning to Hack the Human Brain to Let Us “Upload” Skills

https://futurism.com/darpa-is-planning-to-hack-the-human-brain-to-let-us-upload-skills/

Using magnets and nanoparticles to deliver drugs to target tissues

http://www.innovationtoronto.com/2017/06/using-magnets-and-nanoparticles-to-deliver-drugs-to-target-tissues/

Laser activated gold pyramids could deliver drugs, DNA into cells without harm

Journal of Biosensors & Bioelectronics

https://www.omicsonline.org/open-access/a-comparative-analysis-of-augmented-reality-technologies-and-theirmarketability-in-the-consumer-electronics-segment-2155-6210-1000236.php?aid=85934

Dr. Robert P. Duncan A.B., S.M., M.B.A., Ph.D.: Government warfare and surveillance system architect, author, and independent investigator

https://www.drrobertduncan.com/index.html

The Bases Lectures, Robert Duncan Intelligent Systems of Control

Advertisements

Sandbox To Fieldcraft: Ditching The Simulation

collage-2017-11-18

Playing In The Sandbox Is For Kids

[excerpt definition from Wikipedia]

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. It is often used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system.[1] A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted.

In the sense of providing a highly controlled environment, sandboxes may be seen as a specific example of virtualization. Sandboxing is frequently used to test unverified programs that may contain a virus or other malicious code, without allowing the software to harm the host device.[2]

All hackery aside, let’s take a step back and look at this in legitimate focus. The sandbox is a place designated for childplay. There is a spot on the playground, usually where the swings and other hardware are located where a pit is dug out and filled with sand on which the children play. The sand not only provides a medium with which the children can build the castles they envision, but a soft ground from which the blunt trauma of falling from a height may affect. I know this, because as a youngster I was a daredevil and jumping from a swing set led to a slight fracture of my radius. Thankfully, for the sand, I did not have to experience any worse of a consequence from my intrepid and frankly stupid maneuvers.

The same children playing in the sandbox are the ones whom grow up to perchance die on the beaches of theatre. I agree that this is an extremely stark comparison, with some grim consequencese for casual ignorance. Perhaps, conceptually, the idea of swords to ploughshares may be a goal to keep in mind, however the fallacy of importing only butter and no steel may spell the doom of an enterprise, or generation. There is not better time to take the kids out of the sandbox and drop them onto the beaches of conflict than right now. That’s because learning in a simulated environment is akin to handicapping the process by which we operate during mission critical scenarios.

Translated For Security Measures

Briq Haus Ltd. Security & Intelligence operatives are fully versed and trained in both aspects of security operations; sandbox and fieldcraft. While the benefit of practice in a secluded environment separate from the harsh realities of consequence and effect may be evident in reports and documents, it is a rare thing that during real-time security exercises and operations that enough streaming data is retained for the intention of creating some slide-show or powerpoint presentation. In the real world, there are ongoing causal relationships between the interplay of hostile foreign intelligences and mission-specific imperatives. The continuing dynamic and morphic environment of the field require out-of-the-box thinking, not delusional but rather unconventional.

Between the combined expertise of our information technology and intelligence community professionals, Briq Haus Ltd. not only boasts the boardroom banter to deliver effective presentation and slideshows as per sandbox experimentation dictates, but we have tried-and-true tested in the trenches fieldcraft experience in being exposed to the evolving risk dynamic and threat platform wielded by hostile foreign intelligences co-operating within the framework of real-world, non-simulated ongoing security operations. Being increasingly tested above and beyond the imagined or preset boundaries of a security experiment within a sandbox environment forces the experts on my team to constantly and consistently demonstrate proof-of-work mastery of security implementation and product deployment in the professional corporate theatre. We are not corporate goons, nor are we classroom geeks, we are ex-military and intelligence professionals with backgrounds ranging from digital to physical warfare, and with experience in advanced security environments actualizing each domain of the security spectrum; physical, logistical, analytical, and digital.

Professional Security Assurance

By consigning your security requirements to the oversight and analysis of the Briq Haus Ltd. team, you are ensuring that the utmost precision and dedication is applied to discovering, identifying, and patching any and all vulnerabilities in your business or other operation. The Briq Haus Ltd. “Perfect Security Suite” is your one step solution to have all your concerns handled and put to ease by our experts in these and all related regards. We are not discouraged or daunted by any of the present dangers lurking among the faceless corporate mass. We know that any single entity may wear the mask of friend, and turn out to be a formidable adversary or inside threat.

Briq Haus Ltd. Security & Intelligence is not limited by our challenges; but rather, we challenge all limits. Contract with us today, and rest at ease that your security concerns are in the hands of serious and capable operators. Thank you for considering us.

 

QuantusNet {Philippines ISP}

quantus_net_experiment

QuantusNet

Wireless Infrastructure | Internetworking | Global Connectivity

Internet As A Service

QuantusNet ‘brings it to the people’ by offering a range of gateway and router products boasting resilience, ease of use, and versatility. Businesses and residences can easily benefit from utilizing our products and installations.

Technical Solutions & Support

QuantusNet boasts a team of expert IT professionals and consultants with a combined experience of over fifty years working in the information business world. Our expertise is rivaled only by our enthusiasm to bring this vision to market.

Speed + Reliability = QuantusNet

We spare no expense and take no shortcuts on our collective roads to success, and by teaming up with strong industry stewards already in position, QuantusNet is already poised for great triumph. A combination of hardware fail-safe, software security, and trained system administrators, QuantusNet shows potential for deployment in a wide variety of government or military applications, alternatively or cumulatively.

Join the TEAM who will bring more and faster internets to the people of the Philippines . . . Partner with QuantusNet!


Operational Draft

  • Partners

Between telecoms in place, IT companies, and government agencies, there are a wide pool of opportunities for which professional business networking will become featured. Marketing is not an activity, it is a lifestyle, and our business intelligence researchers are finding the most viable options and angles for launch into being a strong internet service provider for Filipinos.

  • Marketing & Sales

Between the product, the service, and the package, the business lends mostly to selling itself, however a team of marketing professionals will be in place to “roll out” the final product for deployment at day zero for the launch of QuantusNet.

  • Community Involvement

QuantusNet vows to give back to the community in which it operates by hosting or co-operating musical events, and installing community gardens to make more food locally available. More ideas and ways to give back to the community may be implemented upon further observing the culture in person.

Conclusion

Thank you for reviewing our initial pitch for QuantusNet. Please feel free to follow-up by researching us at http://networks.quantus.biz and you can always contact me with any questions, concerns, suggestions, or offers. Thank you again, our venture will surely prosper.


Robert Brooks Authement — Boss of Operations, QuantusNet

4019 N 5th Rd

Arlington, Virginia 22203

broox.authement@gmail.com

+1 (970) 283-7694

VIRTUALIZATION MASTERY – w/ Ping Of Death

super_ping

Being able to create machines within machines has been the aspiration of humanity since the days of alchemical yore. What we see here is the Windows 10 host Command Line Prompt “talking” via the ping utility to a Kali Linux VirtualMachine on Oracle’s Virtualbox, which is conversely talking over the “wire” to the host machine using ping. This is the basic proof-of-work demonstration of electronic warfare. The next steps are spoofing, redirecting, passive sniffing, phishing, and exploitation.

ping_of_death