DARPA announces ‘N3’ utilizing brain-embedded NANOTECHNOLOGY

Let me begin by thanking Clyde Lewis of Ground Zero Media for referencing my material. I’m only the messenger.

It has been at least since early 2017 Defense Advanced Research Project Agency – DARPA revealed to the public the presence of an embedded neurotechnology program to enhance learning and skill development in the warfighter. The original iteration was called ‘TNT’ short for Targeted Neuroplasticity Training. This under the banner of Dr. Douglas Weber.

Now the evolution of the program, announced earlier in April 2018, ‘N3’ short for Non-invasive Non-surgical Neurotechnology. This program has advances insofar as we won’t have to envision terminator bots hooked up to wires in the lab with camera lens eyes, but rather more sleek and portable versions of the skinned man-borg, hubot, cyber zombie. Whatever.


This Tweet from out usual suspects demonstrates at their annual D60 conference, the astounding progress which has actually been made in the field of connected brain-computer interface machines. Now a brief analysis from BRIQ | HAUS LTD. Security & Intelligence CEO, Robert Brooks Authement:

Imagine the implications in terms of #CYBERSECURITY? No longer are we protecting big dumb metal boxes from cyberbullies and what have you, this type of neurotechnology ensures a very battle for our sovereign identities; our souls. Not only can signals be sent into the brain via the advancing and disruptive evolution of invasive sensor technologies, but transmissions can similarly be read emanating from the cerebrum. This means #TOTAL #SURVEILLAINCE in ways never before imagined. The subject of this type of upgrade will never experience a moment of privacy ever again.

This holds a candle of accuracy for my wildly discredited theory of CYBERSPIRITUAL SECURITYwhich establishes the necessity to enforce protocols by which transmissions are secured between end-users and advanced swarm and/or artificial intelligences.


DARPA TNT – https://www.darpa.mil/program/targeted-neuroplasticity-training

DARPA N3 – https://www.darpa.mil/news-events/2018-03-16

Parallel Computing VS Cloud In Security Deployment

This article is written by our lead technical consultant, Brian Taylor of Always In Tao.


Imagine for a moment you keying up a serious computer with real muscle. One of those fancy $40,000 Puget Systems jobs. You login to a server and see a distributed network waiting for a command, everything is pristine, a controller GUI – no even better a CLI list in front of you shows which resources on which machine are just waiting for your command. Now of course the question becomes, “Which process on which machine do you actually need to do what?” If what you needed was to solve a massive resource issue, you might need to break it into components and let the machine solve it in Parallels.

Clustered Nodes

Parallel computing is mostly this kind of computing, 200 machines being controlled from one terminal. You don’t need a $40,000 computer to do anything like that. You just need an interface that has the ability to issue commands across the networks of clustered machines and spit out solutions in assembly ready chunks. Not much practical purpose to that sort of thing at home, but maybe at work.

Clustered Nodes As A Cloud

Similar scenario, except a different problem altogether. You key into your $40,000 Puget, login and are faced with a readout of available resources slipping into and out of a variety of systems already in use. You notice that a central storage area has access to hundreds of Petabytes of space which isn’t filling up very rapidly. You decide to try to solve the same resource issue and the machine files it in the cue for the next go around with processing.

What Differences Do You Spot?

The number of users may seem obvious, but multiple users can make use of Parallels on distributed networks. The resource allotment cue is different, the process of getting at storage is perhaps somewhat different, and most certainly the functionality is different. You can use a cloud system as though it were a massive computer, multiple users can access the same files, generally at the same time. That means that is someone in Bolivia is watching the Matrix in their native language, you can still watch it in yours at the same time. What parallel computing does is more akin to staying on task with as much power as possible, where clouds generally distribute power in calculated shares on a per user basis.

Can The Same Hardware Do Both?

Yes – at a cost. There are configurations of cluster systems possible that make use of virtualization in ways that enable a wider assortment of user experiences and in some cases can perhaps integrate them well enough on a user basis somewhat smaller than a system dedicated to just one configuration or another. VDI’s on distributed networks is a system as a service and in fact can be utilized for cloud desktop systems. Some systems exist which offer a degree of security that can be incorporated into your infrastructure without the same hassle as some of the other VDI’s on offer.

What Can This Do For Your Business

It can enable your business to make use of security technology in more compliant ways. A dog groomer might not need this technology, but a successful one who has a franchise under their management almost certainly does. It may be possible to individually secure a network for everyone who has a professional IT team at their disposal, but even then it’s rare. Compliance with security protocols across large systems is akin to locking the backdoor at night. A smart business does it, and a foolish business never does. If you are interested in discussing this technology I can recommend you contact BriqHausLtd. Tell them “Always In Tao” sent you, to get a free consultation and ask how it could help your organization.



Being able to create machines within machines has been the aspiration of humanity since the days of alchemical yore. What we see here is the Windows 10 host Command Line Prompt “talking” via the ping utility to a Kali Linux VirtualMachine on Oracle’s Virtualbox, which is conversely talking over the “wire” to the host machine using ping. This is the basic proof-of-work demonstration of electronic warfare. The next steps are spoofing, redirecting, passive sniffing, phishing, and exploitation.