Developing a human brain in brain chip for a hybrid brain,,,

BBC News

 Tuesday, 11 March 2008, 10:32 GMT 

Chemical brain controls nanobots
By Jonathan Fildes
Science and technology reporter, BBC News

Artificial brain
The researchers have already built larger ‘brains’

A tiny chemical “brain” which could one day act as a remote control for swarms of nano-machines has been invented.

The molecular device – just two billionths of a metre across – was able to control eight of the microscopic machines simultaneously in a test.

Writing in Proceedings of the National Academy of Sciences, scientists say it could also be used to boost the processing power of future computers.

Many experts have high hopes for nano-machines in treating disease.

“If [in the future] you want to remotely operate on a tumour you might want to send some molecular machines there,” explained Dr Anirban Bandyopadhyay of the International Center for Young Scientists, Tsukuba, Japan.

“But you cannot just put them into the blood and [expect them] to go to the right place.”

Dr Bandyopadhyay believes his device may offer a solution. One day they may be able to guide the nanobots through the body and control their functions, he said.

“That kind of device simply did not exist; this is the first time we have created a nano-brain,” he told BBC News.

Computer brain

The machine is made from 17 molecules of the chemical duroquinone. Each one is known as a “logic device”.

How nanotechnology is building the future from the bottom up

They each resemble a ring with four protruding spokes that can be independently rotated to represent four different states.

One duroquinone molecule sits at the centre of a ring formed by the remaining 16. All are connected by chemical bonds, known as hydrogen bonds.

The state of the control molecule at the centre is switched by a scanning tunnelling microscope (STM).

These large machines are a standard part of the nanotechnologist’s tool kit, and allow the viewing and manipulation of atomic surfaces.

Using the STM, the researchers showed they could change the central molecule’s state and simultaneously switch the states of the surrounding 16.

“We instruct only one molecule and it simultaneously and logically instructs 16 others at a time,” said Dr Bandyopadhyay.

The configuration allows four billion different possible combinations of outcome.

The two nanometre diameter structure was inspired by the parallel communication of glial cells inside a human brain, according to the team.

Robot control

To test the control unit, the researchers simulated docking eight existing nano-machines to the structure, creating a “nano-factory” or a kind of “chemical swiss army knife”.

Nano dust (SPL)

Scientists believe nano-machines could have medical applications

The attached devices, created by other research groups, included the “world’s tiniest elevator”, a molecular platform that can be raised or lowered on command.

The device is about two and a half nanometres (billionths of a metre) high, and the lift moves less than one nanometre up and down.

All eight machines simultaneously responded to a single instruction in the simulation.

“We have clear cut evidence that we can control those machines,” said Dr Bandyopadhyay.

This “one-to-many” communication and the device’s ability to act as a central control unit also raises the possibility of using the device in future computers, he said.

Machines built using devices such as this would be able to process 16 bits of information simultaneously.

Current silicon Central Processing Units (CPUs) can only carry out one instruction at a time, albeit millions of times per second.

The researchers say they have already built faster machines, capable of 256 simultaneous operations, and have designed one capable of 1024.

However, according to Professor Andrew Adamatzky of the University of the West England (UWE), making a workable computer would be very difficult at the moment.

“As with other implementations of unconventional computers the application is very limited, because they operate [it] using scanning tunnel microscopy,” he said.

But, he said, the work is promising.

“I am sure with time such molecular CPUs can be integrated in molecular robots, so they will simply interact with other molecular parts autonomously.”

Revolution in Artificial Intelligence,,,

 ScienceDaily: Your source for the latest research news<br /><br />
and science breakthroughs -- updated daily

 

Computer Scientist Leads the Way to the Next Revolution in Artificial Intelligence

ScienceDaily (Apr. 2, 2012) — As computer scientists this year celebrate the 100th anniversary of the birth of the mathematical genius Alan Turing, who set out the basis for digital computing in the 1930s to anticipate the electronic age, they still quest after a machine as adaptable and intelligent as the human brain.



Now, computer scientist Hava Siegelmann of the University of Massachusetts Amherst, an expert in neural networks, has taken Turing’s work to its next logical step. She is translating her 1993 discovery of what she has dubbed “Super-Turing” computation into an adaptable computational system that learns and evolves, using input from the environment in a way much more like our brains do than classic Turing-type computers. She and her post-doctoral research colleague Jeremie Cabessa report on the advance in the current issue ofNeural Computation.

“This model is inspired by the brain,” she says. “It is a mathematical formulation of the brain’s neural networks with their adaptive abilities.” The authors show that when the model is installed in an environment offering constant sensory stimuli like the real world, and when all stimulus-response pairs are considered over the machine’s lifetime, the Super Turing model yields an exponentially greater repertoire of behaviors than the classical computer or Turing model. They demonstrate that the Super-Turing model is superior for human-like tasks and learning.

“Each time a Super-Turing machine gets input it literally becomes a different machine,” Siegelmann says. “You don’t want this for your PC. They are fine and fast calculators and we need them to do that. But if you want a robot to accompany a blind person to the grocery store, you’d like one that can navigate in a dynamic environment. If you want a machine to interact successfully with a human partner, you’d like one that can adapt to idiosyncratic speech, recognize facial patterns and allow interactions between partners to evolve just like we do. That’s what this model can offer.”

Classical computers work sequentially and can only operate in the very orchestrated, specific environments for which they were programmed. They can look intelligent if they’ve been told what to expect and how to respond, Siegelmann says. But they can’t take in new information or use it to improve problem-solving, provide richer alternatives or perform other higher-intelligence tasks.

In 1948, Turing himself predicted another kind of computation that would mimic life itself, but he died without developing his concept of a machine that could use what he called “adaptive inference.” In 1993, Siegelmann, then at Rutgers, showed independently in her doctoral thesis that a very different kind of computation, vastly different from the “calculating computer” model and more like Turing’s prediction of life-like intelligence, was possible. She published her findings in Science and in a book shortly after.

“I was young enough to be curious, wanting to understand why the Turing model looked really strong,” she recalls. “I tried to prove the conjecture that neural networks are very weak and instead found that some of the early work was faulty. I was surprised to find out via mathematical analysis that the neural models had some capabilities that surpass the Turing model. So I re-read Turing and found that he believed there would be an adaptive model that was stronger based on continuous calculations.”

Each step in Siegelmann’s model starts with a new Turing machine that computes once and then adapts. The size of the set of natural numbers is represented by the notation aleph-zero, 0, representing also the number of different infinite calculations possible by classical Turing machines in a real-world environment on continuously arriving inputs. By contrast, Siegelmann’s most recent analysis demonstrates that Super-Turing computation has 20, possible behaviors. “If the Turing machine had 300 behaviors, the Super-Turing would have 2300, more than the number of atoms in the observable universe,” she explains.

The new Super-Turing machine will not only be flexible and adaptable but economical. This means that when presented with a visual problem, for example, it will act more like our human brains and choose salient features in the environment on which to focus, rather than using its power to visually sample the entire scene as a camera does. This economy of effort, using only as much attention as needed, is another hallmark of high artificial intelligence, Siegelmann says.

“If a Turing machine is like a train on a fixed track, a Super-Turing machine is like an airplane. It can haul a heavy load, but also move in endless directions and vary its destination as needed. The Super-Turing framework allows a stimulus to actually change the computer at each computational step, behaving in a way much closer to that of the constantly adapting and evolving brain,” she adds.

Siegelmann and two colleagues recently were notified that they will receive a grant to make the first ever Super-Turing computer, based on Analog Recurrent Neural Networks. The device is expected to introduce a level of intelligence not seen before in artificial computation.

Efficiency in Multi-Core Chips “computerbrain”

New Bandwidth Management Techniques Boost Operating Efficiency in Multi-Core Chips

ScienceDaily (May 25, 2011) — Researchers from North Carolina State University have developed two new techniques to help maximize the performance of multi-core computer chips by allowing them to retrieve data more efficiently, which boosts chip performance by 10 to 40 percent.


To do this, the new techniques allow multi-core chips to deal with two things more efficiently: allocating bandwidth and “prefetching” data.

Multi-core chips are supposed to make our computers run faster. Each core on a chip is its own central processing unit, or computer brain. However, there are things that can slow these cores. For example, each core needs to retrieve data from memory that is not stored on its chip. There is a limited pathway — or bandwidth — these cores can use to retrieve that off-chip data. As chips have incorporated more and more cores, the bandwidth has become increasingly congested — slowing down system performance.

One of the ways to expedite core performance is called prefetching. Each chip has its own small memory component, called a cache. In prefetching, the cache predicts what data a core will need in the future and retrieves that data from off-chip memory before the core needs it. Ideally, this improves the core’s performance. But, if the cache’s prediction is inaccurate, it unnecessarily clogs the bandwidth while retrieving the wrong data. This actually slows the chip’s overall performance.

“The first technique relies on criteria we developed to determine how much bandwidth should be allotted to each core on a chip,” says Dr. Yan Solihin, associate professor of electrical and computer engineering at NC State and co-author of a paper describing the research. Some cores require more off-chip data than others. The researchers use easily-collected data from the hardware counters on each chip to determine which cores need more bandwidth. “By better distributing the bandwidth to the appropriate cores, the criteria are able to maximize system performance,” Solihin says.

“The second technique relies on a set of criteria we developed for determining when prefetching will boost performance and should be utilized,” Solihin says, “as well as when prefetching would slow things down and should be avoided.” These criteria also use data from each chip’s hardware counters. The prefetching criteria would allow manufacturers to make multi-core chips that operate more efficiently, because each of the individual cores would automatically turn prefetching on or off as needed.

Utilizing both sets of criteria, the researchers were able to boost multi-core chip performance by 40 percent, compared to multi-core chips that do not prefetch data, and by 10 percent over multi-core chips that always prefetch data.

The paper, “Studying the Impact of Hardware Prefetching and Bandwidth Partitioning in Chip-Multiprocessors,” will be presented June 9 at the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) in San Jose, Calif. The paper was co-authored by Dr. Fang Liu, a former Ph.D. student at NC State. The research was supported, in part, by the National Science Foundation.

NC State’s Department of Electrical and Computer Engineering is part of the university’s College of Engineering.

Roll over headlines to view top news summaries:

Pacemaker for Your Brain: Brain-To-Computer Chip Revolutionizes Neurological Therapy

 

Pacemaker for Your Brain: Brain-To-Computer Chip Revolutionizes Neurological Therapy

ScienceDaily (June 28, 2010) — By stimulating certain areas of the brain, scientists can alleviate the effects of disorders such as depression or Parkinson’s disease. That’s the good news. But because controlling that stimulation currently lacks precision, over-stimulation is a serious concern — losing some of its therapeutic benefits for the patient over time.



Now a Tel Aviv University team, part of a European consortium, is delving deep into human behavior, neurophysiology and engineering to create a chip that can help doctors wire computer applications and sensors to the brain. The chip will provide deep brain stimulation precisely where and when it’s needed.

Prof. Matti Mintz of Tel Aviv University’s Psychobiology Research Unit in its Department of Psychology is focusing on the behavioral-physiological aspects of the research. He and the rest of the international research team are working toward a chip that could help treat some diseases of the mind in just a few years. The platform, says Prof. Mintz, is flexible enough to provide a basis for a variety of clinical experiments, and tools which can be programmed for specific disorders. For example, the chip could restore lost functions of the brain after a traumatic brain injury from a car accident or stroke.

Reversing strokes, depression and aging

The team’s methodology is straightforward — they record activity using electrodes implanted in diseased areas of the brain. Based on an analysis of this activity, they develop algorithms to simulate healthy neuronal activity which are programmed into a microchip and fed back into the brain.

For now, the chip, called the Rehabilitation Nano Chip (or ReNaChip), is hooked up to tiny electrodes which are implanted in the brain. But as chips become smaller, the ReNaChip could be made small enough to be “etched” right onto the electrodes themselves.

For therapeutic purposes, though, only the electrodes will be inserted into the brain. “The chip itself can be implanted just under the skin, like pacemakers for the heart,” says Prof. Mintz, who is currently conducting experiments on animal models, “ensuring that the brain is stimulated only when it needs to be.”

One of the challenges of the proposed technology is the size of the electrodes. The researchers hope to further miniaturize deep brain electrodes while adding more sensors at the same time says Prof. Mintz. His Tel Aviv University colleague and partner Prof. Yossi Shaham-Diamond is working on this problem.

The international multidisciplinary team, includes other researchers from TAU — Prof. Hagit Messer-Yaron and Dr. Mira Kalish — and partners from Austria, England and Spain, regularly converge on the TAU campus to update and integrate new components of the set-up and monitor the progress of the chip in live animals in Prof. Mintz’s lab.

A two-way conversation

The idea that a chip can interface between inputs and outputs of certain brain area is a very new concept in scientific circles, Prof. Mintz notes, although movies and TV shows about bionic humans have been part of the popular culture for decades. The researchers say that their ReNaChip could help people whose brains have deteriorated with age or been damaged by injury and disease. The chip will not only provide a bionic replacement for lost neuronal function in the brain, under ideal conditions, it could significantly rehabilitate the brain.

Currently, the researchers are attempting to rehabilitate motor-learning functions lost due to brain damage. “We are attaching the chip to the brain to stimulate relatively simple brain behaviors,” says Prof. Mintz. A controlled treatment for drug resistant epilepsy, based on the team’s technology, could be only a few years away, he says.

Public awareness of the technologies and experiments on humans and its impact on individuals and society in Sweden and Europe / USA.

Public awareness of the MIND CONTROL Technologies and experiments on humans and its impact on individuals and society in Sweden and Europe.

Only within a small sphere of military / medical classified research and industrial projects are factual knowledge available. It has once been of scientific research has focused on the new technologoist is developed into a commercial orgy of humantorture and humiliation,injury to a third party carried out by researchers and their speaking computers with artificial intelligence.

How long shall attempt to sacrifice their families and work have to fight for their human rights in the frenzy of abuse that is now underway on software developed for mapping the brain. 25-04-2010. MINDTECH seeks to establish a network of laymen and media. This group will be dealing with the social and ethical sides to research, development and the implementation of emerging technologies in our society. The most interesting part are the Direct Human Brain – artifcial intelegence – Interface System technologies. MINDTECH will do extensive and thorough research into this totally new area, which at this point, is being investigated only by the few.

bluered.gif (1041 bytes)

Implant chip in the human brain.Synthetic telepathy is communication systems built on thoughts, not speech. Multimedia communication network is based. Brain copying is performed around the clock, largely by learning computer, copying is nothing short of serious torture. No one would voluntarily give informed consent to this serious research abuse. It takes years of learning and program development to develop the new computer-brain interfaces and multimedia language between man and computer. Subjects are now against their will has been online for 6.5 years on Man-Brain-Computer-Interface.

Neurological research has progressed so far that you can hack the neural system is wireless, which means that a computer can communicate with your brain and store all your sensory experiences, and then studying your kognetiva behavior, ie, the ultimate human study. The commercial user fields are endless and it feels no need to explain the far-reaching consequences when abused. This technology brain-computer interaction has happened during the 2000’s and will revoltion our way of life.

bluered.gif (1041 bytes)

“The right to search for truth implies also a duty one must not conceal any part of what one has found to be true”

( ALBERT EINSTEIN)

417193_10150590212497245_184416517244_9626031_2090991766_n

Brain-implant-chip.

bluered.gif (1041 bytes)

IBM: Mind reading within reach in 5 years

The world is changing fast–maybe faster than we ever thought. And within five years, science fiction is going to turn into non-fiction. We’ll be able to read each other’s minds.

brain_chip_interface_bridge

These are just three of the five predictions IBM announced this morning as part of its annual “5 in 5” prognostication project.

December 19, 2011 12:12 PM

The list is meant to promote long-term work being done under Big Blue’s Smarter Planet initiative–and the company says “5 in 5″ already has a track record of success. In 2008, IBM says, it suggested that within five years, consumers would talk to the Web–and the Web would respond. This, the predictions are a bit more :

  • Mind reading is no longer science fiction.
  • You will never need a password again.
  • The digital divide will cease to exist.
  • Junk mail will become priority mail.

It would seem the most interesting idea posited by IBM is the one about reading minds. But lest you think that what its scientists are saying is that you’ll be able to glare at a friend–or perhaps more importantly, an enemy–and know what he or she is thinking, that may be more than five years off. Rather, this is about how our brain implant might someday be synced with computing devices: If you just need to think about calling someone, it happens. Or you can control the cursor on a computer screen just by thinking about where you want to move it.

ibm brain

We’ve been issuing the Next 5 in 5 predictions for the past six years. So, how are we doing? Mindful of the difficulty, and considering the fact that for most of the predictions less than five years have passed, we’ve done pretty well. Two of the first year’s predictions, for instance, have pretty much come true: We will be able to access healthcare remotely from just about anywhere in the world. Today, through telemedicine, patients can connect with physicians or specialists from just about anywhere via inexpensive computers and broadband networks. Doctors can view x-rays and other diagnostic imagery from thousands of miles away. Technologies the size of a few atoms will address areas of environmental importance. Nanotechnology is now used in countless fields and industries, including agriculture, biotechnology and sensor networks, enabling us to understand and interact with the naturals.

world in my eyes

Mr Computer’s capabilities and human-like reasoning cannot be understated.

Read moore: http://www.mindcontrol.se/?page_id=6776

Mon Jan 16, 2012 7:54 PM EST

Predictions from other years have panned out as well. A couple of examples: You will have a crystal ball for your health. Thanks to advances in genetic research and high-performance computing it is now possible to affordably decipher an individual’s entire genome. This makes it possible for physicians to alert people to medical conditions they might fall prey to, and it clears the pathway, eventually, to truly personal medicine. You will talk to the Web…and the Web will talk back. Today, speech recognition and mobile communications technologies make it possible for people to talk to the Internet using their computers or mobile phones, be understood, and listen to automated voices that are responsive to their needs. The Next 5 in 5 initiative got its start in an IBM Innovation Jam in 2006. The seed goal was to get the entire company thinking about grand challenges. “If you give people a grand challenge you push them to really innovate,” says Meyerson. “That’s when extraordinary things can happen.” IBM has played a significant role in each of these breakthroughs. So, it’s working.

Brain hive mind

 Brain-chip.

bluered.gif (1041 bytes)

By: Anders Sandberg. Oxford U.K An implant. It is an independent processor linked to the neurocomputer built to house an artifcial intelegence. The artifcial intelligence program has access to the sensory data and information in the neurocomputer, and can “read” surface thoughts of the owner (of course, access controls can be set if needed, both in the implant and the (artifcial intelegence). Having a (or several) as advisor/secretary/partner is becoming more and more common, although most people rely on an external artifcial intelegence system and a wireless neural connection. It is not uncommon for users to get a motoric shunt to give the artifcial intelegence the ability to control the body.Chips with monitoring artifcial intelegence are sometimes used for or behaviour correction in Landfall.

Brain dollar

Moodulator

bluered.gif (1041 bytes)

An implant of the limbic system, enabling the owners to control their moods. Normally it just sets an allowed range and a bias (e.g. towards cheerfulness or calm), but it can also induce stronger emotional states. The implant is somewhat dangerous due to the risk of addiction to extreme positive states; most users at least tend to improve their mood. Originally it was developed on Nova for treatment of certain emotional disorders, especially the rare but devastating OIAIS (Ocean Induced AutoImmune Syndrome, an autoimmune illness induced by certain poisons causing severe mood swings due to damage of the limbic system). Later more widespread use developed. There are also moodcasters, systems sending signals to the implants of people who have allowed access. Moodcasters are mainly used in virtual dramas.Autonomous control bluered.gif (1041 bytes)

Enables the owner to control many aspects of the autonomous nervous system such as hunger, sleep or pain. Turning off these functions are of course dangerous, but sometimes useful. It can also act as a super-alarm clock (guaranteed to wake you up) or “homeostatic tuner” to optimise the hormone balance of the body.

future_human_evolution_banner

bluered.gif (1041 bytes)

Mind Control “Brain Control” and Brain Cloning !

“To build a Computerbrain”

neuro waves

occupy our mind


Are You a Robosapiens YET ?

One of the most powerful weapons are now targeting some of the civilian population in Europe during its development. The weapon is called brain implants and synthetic telepathy. Synthetic telepathy covers mind reading, and artificial intelligence, to clone the brain and build a computerbrain. People who are involved in the development of invasive imaging of the brain and nervous system without their consent has no legal protection, no human rights, and no medical help. Instead of receiving protection diagnosed these people to suffer from a mental illness. Research is conducted 24 / 7 over the aging process.
We want this website to create an awareness and an awareness that many of the new technologies described developed on the civilian population in Sweden and Europe, without their consent and / or knowledge, for this many years.
Mindtech cooperate with the media and the Swedish / European companies to try to enforce the ethics debate. An ethical debate that has since been blacked out by the research and its representatives.
 
Know someone who is multi-media online but do not dare talk about it?
It is easy not to be believed for the person who claims that a paradigm shift in computer-brain integration and multimedia technology is already here.
 
We are aware that part of the information here may sound like pure science fiction, but it is already a reality.

bluered.gif (1041 bytes)

 

computing brain

.bluered.gif (1041 bytes)

Brain Implants and miniaturized Signal Analysis System is implanted in people without their informed consent, in hospitals all over Europe. The systems are used to clone, and make an artificial copy of the human life, including their nervous system, memory, learning and emotions. This type of illegal research of are impossible to detect. This crimes can continue because yet there is no technology that can detect bioelectronics/neuroelectronics in nano size. The artificial intelligence which performs the majority of the research work, is programmed as a war machine that does not hesitate from any means in order to improve its learning and cloning of a human. This intelligence acquire continuously, more and more unreasonable arguments for continuing its work to grow, including the use of gross physical and mental abuse in an attempt to uphold ”companionship” with the person who is under intrusion. This is also a war between humans and the new computer brains.
implant
These works are aimed at exploring and expose the techno-ethics /Human-Brain- of human interactions with adaptive and cognitive systems developed in the framework of Computer, Bionics, and Artificial Intelligence “computerbrain”.These interactions notably include:
– Human, Brain-Computer non-invasive interactions, involving (AI) autonomous computer which inhabit human environments;
– Human, Brain-machine invasive interactions, involving bionic systems for restoring or enhancing human functionalities;
– Human Brain-softbot interactions, involving AI systems for information access and communication like a Computerbrain, with related areas of applied ethics, concerns:
– Preservation and promotion of human freedom, rights, and identity;
– Fair access to adaptive BRAIN, machinery resources;
– Scientific method and techno-ethical policies;
– Precautionary principles in human-machine interactions;
– Responsibilities for cooperative human-machine deliberation and action;
– Machine autonomy and accountability;
– Individual and societal impact of human brain-machine cognitive and affective bonds;
– Intercultural aspects of robosapiens development, design, and use.

brain globe

Scientists Successfully Implant Chip That Controls The Brain

Allowing

Thoughts, Memory And Behavior To Be Transferred From One

Brain To Another Brain

Brain mind uploading

 In a scene right out of a George Orwell novel, a team of scientists working in the fields of “neural engineering” and “Biomimetic MicroElectronic Systems” have successfully created a chip that controls the brain and can be used as a storage device for long-term memories. In studies the scientists have been able to record, download and transfer memories into other hosts with the same chip implanted. The advancement in technology brings the world one step closer to a global police state and the reality of absolute mind control.

brain eye neuron nano

More terrifying is the potential for implementation of what was only a science fiction fantasy – the “Thought Police” – where the government reads people’s memories and thoughts and then rehabilitate them through torture before they ever even commit a crime based on a statistical computer analysis showing people with certain types of thoughts are likely to commit a certain type of crime in the future.

We already pre-emptively invade nations and torture alleged terrorist suspects with absolutely no due process of law, so the idea of pre-emptively torturing a terrorist suspect before hand to prevent them from committing an act of terrorism in the future really isn’t that far fetched of an idea.

Perhaps a less sensational example, than those I just depicted out of own of Orwell’s famous dystopian novels would be using the technology as it is depicted the modern day Matrix movies, in which computer programs are uploaded into people’s brains allowing them to instantly learn how to perform a wide variety of tasks.

That is exactly the example that Smart Planet uses in their write-up on the USC press release.

Wideband Link

bluered.gif (1041 bytes)

The implants used to achieve group consciousness. Unlike an ordinary neuro, (atrificial intelligence) inteface it connects to most of the cerebral cortex and has a much higher bandwidth. It can send and receive signals not just of primary sensory and motor information but also higher order associations and thoughts. Since each human has an individual “mental language” sophisticated translation systems and much training is required before digital telepathy is possible. Wideband links are also used by the Net Transcendence and Next Step Foundation in their experiments with expanding the human mind. One of the most controversial and interesting applications is to let software rewrite parts of the cortex; theoretically this could be the ultimate psychodesign, even if it is currently extremely crude.

nano implant

Medial forebrain pacemaker

bluered.gif (1041 bytes)

An implant in the motivation and pleasure centres that is controlled by the owner’s neurocomputer. It is illegal and very addictive: users quickly become hooked on anything that activates it. It can be used together with behaviour therapy to change habits and personality.

Thought Control – a new ethical problem! Being able to connect the human brain to a computer via electrodes open, of course, frightening possibilities. Will it be possible to control a person’s thoughts?

There are important ethical aspects of this. It would, of course, theoretically able to control brain functions and modify the human personality. For example, make them more or less prone to aggression or to increase learning ability by adding to chronic stimulation. It’s like with everything else, with the knowledge that there can use it in many ways, “says Göran Lundborg Sweden

People who are exposed without informed consent for research abuse and torture of the new technology, explained idiot when they seek help from authorities. This lack of knowledge caused by the researchers to withhold reports on the technology’s existence

——————————-

By: Anders Sandberg. Oxford U.K

The future may well involve the reality of science fiction’s cyborg, persons who have developed some intimate and occasionally necessary relationship with a machine. It is likely that implantable computer chips acting as sensors, or actuators, may soon assist not only failing memory, but even bestow fluency in a new language, or enable “recognition” of previously unmet individuals. The progress already made in therapeutic devices, in prosthetics, and Brain  in computer science indicate that it may well be feasible to develop direct interfaces between the brain and computers.

Colleague, Professor Gershenfeld, asserts that “in 5 years, computers will be everywhere; in 10 years, embedded by bioengineers in our bodies…” Neither visionary professes any qualms about this project, which they expect to alter human nature itself. “Suddenly technology has given us powers with which we can manipulate not only external reality — the physical world — but also, and much more portentously, ourselves.” Once networked the result will be a “collective intellegence, consciousness”, “the hive mind.” “The hive mind…is about taking all these trillions of cells in our skulls that make individual intelligence. consciousness and putting them together and arriving at a new kind of consciousness that transcends all the individuals.”

BRAIN CHIP FUTURE..By: Ellen.McGee and MQ Maguire Jr (KTH  STOCKHOLM SWEDEN)

A collaboration with mindtech

Mindtech To this information about the revolution highlighting interdisciplinary research, without informed consent to communicate with mind- brain-computer interface.

It’s about providing information to create a general awareness that leads to an ethical debate about this technology. This will hopefully lead to a legislation against the misuse of technology.

It is also about identifying who or what in Sweden and Europe who have illegally engaged in research on people under torture forms.

Mindtech cooperate with the media, church,  the private sector and victims of this research.

Contact us via the contact form.

By: Magnus Olsson / SWEDEN

Science News Brain / Implant

The Society of Neural Prosthetics “IMPLANT” and Whole Brain Emulation Science !

The Society of Neural Prosthetics and Whole Brain Emulation Science

What is mind uploading?

Mind uploading is a popular term for a process by which the mind, a collection of memories, personality, and attributes of a specific individual, is transferred from its original biological brain to an artificial computational substrate. Alternative terms for mind uploading have appeared in fiction and non-fiction, such as mind transfer, mind downloading, off-loading, side-loading, and several others. They all refer to the same general concept of “transferring” the mind to a different substrate.

Once it is possible to move a mind from one substrate to another, it is then called a substrate-independent mind (SIM). The concept of SIM is inspired by the idea of designing software that can run on multiple computers with different hardware without needing to be rewritten. For example, Java’s design principle “write once, run everywhere” makes it a platform independent system. In this context, substrate is a term referring to a generalized concept of any computational platform that is capable of universal computation.

We take the materialist position that the human mind is solely generated by the brain and is a function of neural states. Additionally, we assume that the neural states are computational processes and devices capable of universal computing are sufficient to generate the same kind of computational processes found in a brain.

Scientists to study synthetic telepathy (UCIrvine)

UC Irvine TODAY

Press Releases & Media Advisories Archives > Press Release

Scientists to study synthetic telepathy 
Researchers get grant to develop communication system based on thoughts, not speechIrvine, Calif., August 13, 2008A team of UC Irvine scientists has been awarded a $4 million grant from the U.S. Army Research Office to study the neuroscientific and signal-processing foundations of synthetic telepathy.The research could lead to a communication system that would benefit soldiers on the battlefield and paralysis and stroke patients, according to lead researcher Michael D’Zmura, chair of the UCI Department of Cognitive Sciences.

“Thanks to this generous grant we can work with experts in automatic speech recognition and in brain imaging at other universities to research a brain-computer interface with applications in military, medical and commercial settings,” D’Zmura says.

The brain-computer interface would use a noninvasive brain imaging technology like electroencephalography to let people communicate thoughts to each other. For example, a soldier would “think” a message to be transmitted and a computer-based speech recognition system would decode the EEG signals. The decoded thoughts, in essence translated brain waves, are transmitted using a system that points in the direction of the intended target.

“Such a system would require extensive training for anyone using it to send and receive messages,” D’Zmura says. Initially, communication would be based on a limited set of words or phrases that are recognized by the system; it would involve more complex language and speech as the technology is developed further.”

D’Zmura will collaborate with UCI cognitive science professors Ramesh Srinivasan, Gregory Hickok and Kourosh Saberi. Joining the team are researchers Richard Stern and Vijayakumar Bhagavatula from Carnegie Mellon University and David Poeppel from the University of Maryland.

The grant comes from the U.S. Department of Defense’s Multidisciplinary University Research Initiative program, which supports research involving more than one science and engineering discipline. Its goal is to develop applications for military and commercial uses.

About the University of California, Irvine: The University of California, Irvine is a top-ranked university dedicated to research, scholarship and community service. Founded in 1965, UCI is among the fastest-growing University of California campuses, with more than 27,000 undergraduate and graduate students and nearly 2,000 faculty members. The third-largest employer in dynamic Orange County, UCI contributes an annual economic impact of $3.6 billion. For more UCI news, visitwww.today.uci.edu .

News Radio: UCI maintains on campus an ISDN line for conducting interviews with its faculty and experts. The use of this line is available free-of-charge to radio news programs/stations who wish to interview UCI faculty and experts. Use of the ISDN line is subject to availability and approval by the university.

DeepThought’s Guide,,,

  DeepThought’s Guide

Can A Satellite Read Your Thoughts? – The Scientific Papers

Mon Mar 26, 2012 9:06 PM EDT

Well, we have a very interesting article today.  We’re going to take a look at the scientific papers, some strange signals hiding behind mains hum and a video of a CNN reporter having images inserted into his brain.  Its interesting that the media was all over this tec …

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Physics Revealed (2012 Update)

Sun Feb 19, 2012 4:00 PM EST

I received an email in regards to some of my calculations in this series. Apparently, discussions around the web have found several errors and even provided some better examples.

Continue reading this entry …

The NSA – Behind The Curtain

Mon Jan 16, 2012 7:54 PM EST

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities.

Continue reading this entry …

NSA Disinformation – Watch The Watchers With Me (Part 2)

Mon Jan 9, 2012 2:59 PM EST

Before we get to the good stuff, analyzing the technology employed in the NSA’s global listening network, I thought I would deal with one more instance of disinformation.  This one appeared on Slashdot.org on Christmas Day under the title of “The Science of Santa”.  I  …

Continue reading this entry …

NSA Disinformation – Watch The Watchers With Me

Sun Jan 1, 2012 3:14 AM EST

Its been around seven months since my last article on the NSA’s technology. I have been watching the slow spread of the information throughout the web and the disinformation it has spawned. It has been very interesting to watch the spies at work.

Continue reading this entry …

Can A Satellite Read Your Thoughts? – The Target’s Story – Part 2

Sun May 22, 2011 11:14 PM EDT

First off, I must apologize to those waiting for the second installment of this article.  The witness, from which this story is derived, was attacked just after the release of the first article.  From tachycardia, right through to muscular compression to mimic the effe …

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Time To Come Clean

Tue May 3, 2011 8:45 PM EDT

What is the connection between Guantanamo bay, human experimentation, color revolutions, middle-east uprisings, Total Information Awareness and the War On Terror?  It almost sounds like the lead in to a very funny punchline.  Unfortunately, no such punchline exists.&nb …

Continue reading this entry …

Build A Radio That Does Not Require Batteries

Tue May 3, 2011 12:35 PM EDT

I have been tinkering around with a very basic crystal radio over the last week.  For those that do not know what that means, a crystal radio is a very basic radio used mainly to listen to AM broadcasts.  Vital to the war effort during WWII, “foxhole radios” as they we …

Continue reading this entry …

Can A Satellite Read Your Thoughts? – The Target’s Story

Wed Mar 30, 2011 5:19 AM EDT

With so many articles on this topic, I thought it was about time that a high level overview was produced. So, in this article we are going to focus on what this system can do and present it in plain English.

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Hunting For The Signal

Wed Mar 23, 2011 4:39 PM EDT

Well, the inevitable has happened. With all this analysis showing that human perception can be controlled by ELF radio signals, I decided to create a setup to analyze signals in this portion of the spectrum. So, what did I find? The Setup

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Eye-Witness Testimony

Sun Mar 6, 2011 5:49 AM EST

If you have been following this series for the last year or so, you would know that I demonstrated how naturally occurring radio signals can be reconstructed by computer to betray thoughts, feelings, sight and sound and how such information can be communicated back to the body.

Continue reading this entry …

The End Of The Airforce?

Mon Feb 14, 2011 3:07 PM EST

Considered the work horse of the modern military, the airforce has played a pivotal role in conflicts for the last century. As with most things in life, everything has its day. The last two decades have seen a surge in development of both unmanned and autonomous aircraft.

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Was Jared Loughner A Target?

Tue Jan 11, 2011 2:53 AM EST

This series so far has focused on the technical side of Synthetic Telepathy. We have established the basic mode of operation and, to some extent, described some of the psychotropic sequences that the Artificial Intelligence employs.

Continue reading this entry …

Should Your Vote Depend On Your IQ?

Thu Nov 11, 2010 3:47 PM EST

I have been thinking a lot about how Democracy appears to be broken across the world. From unaccountable governments, to rises in extremism all forms, it does seem that some form of modification to our current models is required.

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Physics Revealed – Part 5

Wed Oct 20, 2010 10:01 AM EDT

Throughout this series we have examined a wide range of aspects, from the conceptual design to the transmission power of an individual neuron. Today, I thought we would look at a completely different aspect.

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Physics Revealed – Part 4

Sat Oct 9, 2010 2:48 PM EDT

In the last article, we refined our figures for the detection of weak radio emissions, from a single neuron, at orbital distances. Whilst the signal was weak, less than -200dBW, it was nothing outrageous that a modern satellite array could not detect.

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Physics Revealed – Part 3

Sun Oct 3, 2010 7:57 PM EDT

Note (20th Feb 2011):  The figures presented in this article have been revised.  The current version can be found here.     In the last couple of articles, I began an analysis to determine if it was scientifically possible for thoughts to be read by a satelli …

Continue reading this entry …

Can A Satellite Read Your Thoughts? – Physics Revealed – Part 2

Mon Sep 20, 2010 12:25 PM EDT

The last article in this series caused quite a stir around the Internet. From the legitimate crazies to the classic muddy-the-water tactics employed by various defense departments, the article has drawn attention right across the globe.

Continue reading this entry …

Einstein’s Missing Pages – The Energy And Mass Relationship

Sun Sep 12, 2010 2:28 PM EDT

Unless you have spent your life living under a rock you will have heard of the equation E=MC^2. Often touted as the equation that led to the nuclear bomb, it implied that Energy and Mass were interchangeable.

Continue reading this entry …

Einstein’s Missing Pages – The Doppler Shift And Information Loss

Tue Aug 24, 2010 7:46 PM EDT

I have been traveling around the web again and I ran into an interesting statement about The Doppler Shift at relativistic velocities. As this is the topic of the article, it seemed to be a good example to use.

Continue reading this entry …

P = NP or P ≠ NP – That Is The Question

Tue Aug 17, 2010 10:11 PM EDT

I read an article tonight over at physorg.com. Vinay Deolalikar, a computer scientist from HP claims to have solved one of the most important questions in computer science, P ≠ NP or P = NP. Quoting from the article, the following is a brief overview of the problem:

Continue reading this entry …

Einstein’s Missing Pages – Temporal Mechanics & Tube Theory

Wed Aug 11, 2010 12:53 PM EDT

Following on from my last article, I have decided to expand upon the topic. This is mainly because of the comment I made in relation to special relativity at the end of the last article.

Continue reading this entry …

Einstein’s Missing Pages – The Space-Time Equivalence

Thu Aug 5, 2010 8:58 AM EDT

Many people, when examining the big bang, wonder how time can just start or how does an event happen without time. Such questions are perfectly reasonable, but it is easy to demonstrate how this happens.

Continue reading this entry …

The Fallacy of Free Energy – Is Nuclear Fusion A Dud?

Tue Jul 27, 2010 7:56 AM EDT

Over the years, there have been a wide range of devices constructed that promise to deliver free energy. Whilst not entirely free to construct, they are meant to produce energy from no consumable source.

Continue reading this entry …

The NSA – Behind The Curtain

The NSA – Behind The Curtain

Mon Jan 16, 2012 7:54 PM EST

Say hello to Mr Computer…

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

 I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

 Mr Computer

 The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

 Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

 Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

Mr Computer’s capabilities and human-like reasoning cannot be understated.

Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

The Pipes Are Calling

First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

A mixture of ground, air and satellite-based networks are used to deliver this capability.

Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

Input, Input, Input

Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

Ignore any suggestion that this too much data.  The truth is that all the communications happening on the planet right now can be monitored in near real-time.

As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

Hardware

This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.

My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems.  With their base costs, they could be running several hundred easily.

In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.

The Thinking Machine

Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

Eidolon TLP – Mr Computer in incognito

Conclusion

The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.

At some point, it could be your turn.

What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:

81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) monthsprior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.

http://cryptome.org/mayer-016.htm

The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.

The NSA is a deeply corrupt organisation, that has little regards for the rights of others.  Never trust a government, even your own, implicitly.  Nations change, opinions change and people change.  It just takes the right catalyst for it to happen.

In most cases, you will find the seeds were always there, you just chose to ignore them.