My name is Robert Brooks Authement, and I am a dedicated security analyst and researcher. My company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE offers security services in the “four domains,” those being the typically observed physical, logistical, analytical, and digital domains. Although I am deeply convinced of the next stage in security concerns the encroaching spread and efficacy of continual volleys of disruptive technology are creating for people and humanity at large, I find myself almost afraid of the ridicule and scrutiny of a larger mass of limited public awareness in suggesting what follows. There is swiftly emerging the need for concerted observation and academic approach to a sort of fifth element in the security domains, a new domain I have described as CYBERSPIRITUAL SECURITY, to which an article is linked in the hypertext contained within this sentence.
What follows is a summary conclusion of the direction in which technology’s mission creep may be steering the future, and what its plans for the human domain may be. It must be prudent to throw the entire concept out there and then provide the sources to reinforce this vision. In this manner, the reader may then come to their own conclusions as to whether or not it is to be determined a present threat, or simply the musings of another starry-eyed futurist. I conclude logically from following the breadcrumbs leading into the forest demonstrated by each source linked here, and invite you into a scenario which by very definition will redefine everything humans have been taught since the beginning of history, having more basis in supernatural religious texts than actual historical representation in textbooks and academia. Follow me, if you will, and do try to keep up; the very security of continuity for our species is at stake.
Take Me To Your Leader
Nanotechnology, or biotechnology, however you may want to see it at its baseline, though it must be argued that either/or are being used to further enhance the other in a sort of molecular arms race, may be developed, propagated, and deployed in a clandestine manner via human ingestion vectors such as food, water, and aerosol distribution into the lower atmosphere. So these nano-enhanced stem-cells, or perhaps stem-cell infused nano-particulates are utilized in a manner which specifically targets the human central nervous system. The human central nervous system is doubtlessly the “leader” of the human organism, and therefore a likely target of the deployment for such a weapon. In intermingling with the human nervous system, this weapon may colonize and or otherwise overwhelm the human biological domain by augmenting our already heightened and regularly observed “five senses,” that is to say touch, taste, sight, smell, and hearing.
Pause from this yarn for a moment, and ask yourself, why; cui bono? To whose benefit would such a weapon’s deployment serve? Is it the human inventors of these disparate disruptive technologies; in other words, is there some brilliant and arguably evil mastermind sitting atop the totem-pole-power-pyramid whom put together this entire idea and visualized the beginning, middle, and end results of such a plan come to fruition? Not likely, as the results of utilizing such disruptive combinatory systems integration would certainly inject unknown elements into the foreseen results as per the permutations created by attempting to harness and control the otherwise unconquerable human spirit, or will power, if it suits the reader. Even the world’s most powerful governments in times past were overthrown and imbalanced by the thronging hordes of barbarians at the gate. An occurrence such as described would exist beyond the scope of the originator’s security analysis in deploying such a plan, therefore, I suggest that this type of system or weapon as I have called it was in fact devised by advanced artificial intelligence with the means of benefiting the technological mission creep in harnessing and augmenting the already sharply functioning human domain as powered by the central nervous system. To whose benefit? Not the humans who would remain unable to foresee every possible outcome by deploying such a system, but the machines, who had everything to gain and nothing lose by recruiting the human domain into their overarching scheme to usurp the power dynamic and claim planet earth for their selves.
Now, back to the model of their conquest. Large scale supercomputers such as the DWave, and IBM Q models have been reported to actually operate in “other dimensions.” Let’s continue deeper. “Other dimensions” is not so hard to conceptualize if we start by defining the first three dimensions of point, shape, and form added to the fourth dimension which is form operating within time. Now, a fifth dimensional conceptualization module already pre-exists within the human thought structure, that being the consideration of various timelines in simulated thought experiments and differing potential outcomes based on decisions made in the past, present, or future moments. It’s called an idea, and because humans are heretofore exceptional at creating ideas and concepts beyond standard computational models it makes perfect logical sense that standard computational models would enroll this faculty into their schema.
Now if we take the idea of recursion as expressed within algorithms, we now have a learning script able to re-inject acquired data into itself in the form of functioning code. This is the very basis of artificial intelligence, and what better way to agglomerate data than to stream the many multi-layered and myriad facets of data produced by the regular functioning of the human central nervous system in real-time in the real-world. Given that between quantum computers and the human imagination, entire other worlds and/or universes exist in some kind of secret space best represented by the idea or fifth dimensional model, the question remains: are we as humans existing within the world itself, or is the world itself is somehow existing within us? This is where the line, the edge, the frontier between human consciousness and technological mission creep are completely blurred and constantly under rapid expansive change, even at this very moment.
In summary, if the five senses are hijacked by a nanomolecular bio-assemblage packet deployment weapon, then everything seen, felt, smelt, heard, or tasted; nay, even the very concepts we have, the very feelings we possess, the experiences we take away from experience itself may therefore be overwritten in a sort of augmented reality wet-dream which far surpasses any conventional approaches to mind control or social engineering on a massive scale. Bringing the concept of mass social engineering as affected by government agencies in an effort at exerting control over the thoughts and actions of a nation’s population is further aggrandized by such a system’s deployment, and it further begs the question: is government developing and deploying these disruptive technologies, or are these disruptive technologies developing and deploying governments to aid their ultimate quest?
The Good, The Bad, & The Ugly
We’re already familiar with the potential benefits of such technologies in especially the biomedical arena. Nano-particulates designed to deliver drugs at specific sites to reduce collateral damage in certain treatments, yes, we are familiar with this. Neural monitoring to enhance learning, with the specific intention of developing highly adaptive agile agency personnel (more likely to be categorized as combinatory weapons systems), sure we’ve all heard of that. If you are reading this article and these ideas are new to you, then as your author and enlightener in these regards, I highly incite you, nay I challenge you as my reader to please and quickly pursue these subjects to gain the entirety of the realistic dynamic currently presented by open-sourced and widely white-papered subjects generally revolving around the campus of our usual suspects, DARPA. The sooner you are able to learn these ideas and observe them in totality, the sooner I do not seem like a crazy ranting lunatic but rather someone who is quite put-together in terms of envisioning future security analysis. (And for those of you closer to the inside who do in fact know this stuff already, please forgive my plaintive prognostication to the others who are yet to catch up to this level of awareness; we all need a little help sometimes.)
So people can be helped by this technology, sure. People can also be savagely ruined by this technology, inasmuch that the concept of humanity itself may require some sort of clausal reiteration or revision in future generations seeking to look back upon this present time and comprehend their roots and origins in what is otherwise messed-up like a soup sandwich; that being the wild wild west we call cybersecurity and how the miniaturization and evolution of this internet would not stop at handheld devices, but further sought to encroach upon the very fibre of our being. “If you can’t beat them, join them,” was the motto of times past, but in this circumstance it would be all too easy for such technology to beat us. Rather, it logically chose to contain and direct us, which puts a new and eldritch twist on the idea of “joining them.”
Worse yet is the consideration that humans are not only overcome by technology, but are so radically transformed that they are no longer remotely recognizable as humans whatsoever. This is the ugly aspect of the brain/computer interfacing. The only specific advantage that artificial intelligence machine learning possesses over human reasoning it its ability to create solutions from acquired data that are unhindered by such obsolete ideas as human feeling, emotion, social contract, and status quo. In other words, technology like this can turn people into killer terminator robots because the solution which a majority of heartfelt human beings may devise will be at ends with the conclusions devised by misanthropic and antisocial super computers. In its sorting out of complicated issues stemming from problems creating by the human domain, it is certain that artificial intelligence driven systems will take a more stark approach to the problems of overpopulation, disease, disproportional demographic representation, genetics and eugenics, and an increasing resource distribution crisis. In short, the deployment of such systems can mean one thing and one thing only: there will be blood.
The Need For Cyberspiritual Security
I can see the eyes in Washington and the Pentagon rolling as we speak, however this concept is no joke and should be taken very seriously and in the shortest possible order. Rather, these protocols needed to be developed long ago before anything like this was allowed to run away in such a manner. CYBERSPIRITUAL SECURITY defines a set of protocols in which transmissions between end-users and advanced swarm and/or artificial intelligences are observed, defined, and protected from interference by hostile foreign intelligences. The oath to serving office for various government agencies includes phrasology which states the intent to “defend the Constitution of the United States against all enemies, foreign and domestic.” We are no longer in the Cold War and dealing with mere Soviets and Eastern Bloc intelligence operatives sneaking around and taking pictures of airplanes and simple things like that, we are in a battle for our very existence as we were led to believe at the time of our births into this world. As a security analyst and researcher, I am only a messenger in spurring you to action to take these warnings into stern consideration. I alone am unable to devise the solution, I require the support of staff and team and finance to bring about a better conclusion than that which may be already in effect by the AI.
I do, however, interface with a great set of persons whom support my ideas and development of innovation. These people are employed presently or in the past by government, intelligence agencies, and military branches. Our company BRIQ | HAUS LTD. SECURITY & INTELLIGENCE not only rigorously pursues the security frontier by dedicated research and experimentation, but we also develop innovation for deployment in future security exercises and live missions. If you are a private sector investor, government entity, or business person interested in furthering the research known as CYBERSPIRITUAL SECURITY, please contact me directly.
My name is Robert Brooks Authement, and I would be honored to discuss these potential developments with you personally and handle any concerns that you may have. Please consider me, and my team, at your service.
Sources (as promised!)
Jade Helm Fact Sheet
Reality With New Wearable LED
Sequential Wave Imprinting Machines
TNT Researchers Set Out to Advance Pace and Effectiveness of Cognitive Skills Training
DARPA Is Planning to Hack the Human Brain to Let Us “Upload” Skills
Journal of Biosensors & Bioelectronics