Post Gathered by Carol Ray / Michael Nunnally (Sir_Templar) 8/5/17


A Corrupted iCon: A Life Lost in 2035

Walking briskly from the Global Neuroware Kiosk, Eve smiled up at the warm sun and excitedly inhaled the precisely maintained 72.1°F fresh Montana air. Eve loved the temperature her conurbation had almost unanimously chosen during the winter climate balloting. She quickly blinked her eyes to the upper left quadrant of her vision grid to signal her iNeu implant that she wanted to establish connection with her boyfriend. She had big news to tell.

“Hello?,” came an inquisitive voice over Eve’s iNeu.

Eve chided Hal. “Hello? Is that any way to greet your dream girl?”

Then came a long, awkward pause. “Um, who is this? I don’t see your data stream,” said the voice on the other end. “Hal, this is Eve. Stop messing with me; I have my new app from Global. I can change my eye color now to whatever you want. Won’t that be fun?”

“I’m sorry; I can’t confirm you for some reason. Please send me your DNA” (Data-Neuro-Avatar). Eve slowed her pace and then stopped.

Eve was used to Hal’s dry sense of humor and constant pranks, but his voice and the emoticons piped in from his iNeu indicated he was genuinely unsure of who he was talking to.

“Hal, this is your girlfriend, Eve. We’ve been dating six months you big silly. Here’s my DNA, as if you don’t already have it as your favicon.”

Eve went through the motions of accessing her DNA through her iNeu visual reference system displayed on her pupils, but the file was empty. She double checked and then went to her back-up server. Nothing.

“Um, Hal. I don’t know what to say, but I seem to have lost my DNA. My iCon must be corrupted.”

Hal didn’t know whether to feel sympathetic or skeptical. Was this really Eve or was this a hacker looking for another target?

“Eve? Look, I want to believe you, but you need your iConscience restored … unless someone completely corrupted you. I’ve seen bits on this recently; seems to be on the rise. Try this. Disconnect from me and contact your iCon provider; maybe they can reinstall your DNA.”

Eve stood motionless, letting the realization sink in that she’d been hacked. As far as the world was concerned, she didn’t exist.

By Col William Jensen, Col, USAF 17 Feb. 2010




The views expressed in this academic research paper are those of the author and do not reflect
the official policy or position of the US government or the Department of Defense. In
accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the
United States government.

Brave New World of Cyberspace Threats and Deterrence1
How does one prevent someone from doing something they do not want them to do?
Although the opening quote from the Bible indicates this question is as old as humankind, people
continue to seek viable solutions to the problem of deterring objectionable behavior. This
universal search for a solution spans the full spectrum of human relationships from one-on-one
parenting in homes to nation-to-nation international relations at the United Nations. Possible
solutions to this timeless question, within the context of national security studies, are posed in
deterrence theory.2 Reflecting a renewed emphasis on answering this question, the Department
of Defense (DoD) is examining ―evolving theories of deterrence.‖3
By reexamining long-held beliefs on deterrence, the DoD is seeking new ideas in the
wake of ―technological breakthroughs and shifts in the geostrategic environment (which) can
dramatically affect deterrence theory and potentially render aspects of it obsolete.‖4 This timely
research objective can be applied to many areas of national security, particularly in the contested
and constantly evolving cyberspace domain. With such rapid advances in cyberspace
technology, the DoD seeks to understand how nation-states manage the risk of escalation as
other nations and non-state actors acquire increasingly lethal and sophisticated capabilities in this
Specifically regarding non-state actors, the DoD is highly concerned with managing risks
perpetrated by cyber-savvy individuals due to the unexpected and unpredictable nature of this
potentially catastrophic threat. In fact, a single individual will, by design or miscalculation, have

the ability to dissuade, disrupt, deny, degrade and destroy via cyberspace.5 Deterring this
behavior will require the deterring nation to develop new ways to ferret out and identify
individuals whose intent is doing harm. Finding such a person in the increasingly nebulous
world of cyberspace will require new methods, tools, skill sets, and technologies which, when
combined, provide a cumulative level of insight that is akin to omniscience.6
The terms cyberspace and omniscience will be fully explored later; however, brief
explanations are needed. Cyberspace is ―a global domain within the information environment
consisting of the interdependent network of information technology infrastructures, including the
Internet, telecommunications networks, computer systems, and embedded processors and
controllers.‖7 Omniscience, within the cyberspace realm, is the ability to conduct comprehensive
intelligence collection on any [potentially] threatening cyberspace activity followed by near
simultaneous processing, exploiting and disseminating of the information. In essence,
cyberspace omniscience is Intelligence, Surveillance, and Reconnaissance (ISR) in the
cyberspace domain. Paired with cyberspace, ISR is the requisite ability to identify, track and
prosecute the offender.8 A full examination of this concept along with definitions follows below;
it is important to note that this concept is best understood in the technological and societal
environment that could emerge by 2035.

Cont. Reading at above link…



First the ‘Smart ID’ with the RFID chips, then the Verichip – one step at a time towards totalitarian control. EVERYBODY  Source  will have to have newly issued government ID – “Real ID”. Source


Texas School District Tracking Students With RFID Badge System

Written By: Yona Gavino August 5, 2017

Some parents are happy to have their kids tracked every inch of their school day, but the students are being conditioned to accept comprehensive surveillance as normal. This is a Technocracy scheme that may have no concrete reason for its justification. ⁃ TN Editor

Midlothian ISD launched a high-tech way for parents and the district to keep track of their kids.
The new system is called “Smart Tag,” and it’s already been installed in school buses in Midlothian ISD.



Deep Artificial Neural Networks and Neuromorphic Chips for Big Data Analysis: Pharmaceutical and Bioinformatics Applications

Lucas Antón Pastur-Romay,1 Francisco Cedrón,1 Alejandro Pazos,1,2 and Ana Belén Porto-Pazos1,2,*    Published online 2016 Aug 11

Over the past decade, Deep Artificial Neural Networks (DNNs) have become the state-of-the-art algorithms in Machine Learning (ML), speech recognition, computer vision, natural language processing and many other tasks. This was made possible by the advancement in Big Data, Deep Learning (DL) and drastically increased chip processing abilities, especially general-purpose graphical processing units (GPGPUs). All this has created a growing interest in making the most of the potential offered by DNNs in almost every field. An overview of the main architectures of DNNs, and their usefulness in Pharmacology and Bioinformatics are presented in this work. The featured applications are: drug design, virtual screening (VS), Quantitative Structure–Activity Relationship (QSAR) research, protein structure prediction and genomics (and other omics) data mining…



Energy-efficient neural network chips approach human recognition capabilities

Wolfgang Maassa,1  Published online 2016 Oct 4

The dream to create novel computing hardware that captures aspects of brain computation has occupied the minds of researchers for over 50 y. Driving goals are to carry both the astounding energy efficiency of computations in neural networks of the brain and their learning capability into future generations of electronic hardware. A realization of this dream has now come one step closer, as reported by Esser et al. (1). The authors demonstrate that a very energy-efficient implementation of an artificial neural network (i.e., of a circuit that shares properties with networks of neurons in the brain) achieves almost the same performance as humans as shown on eight benchmark datasets for recognizing images and sounds. It had previously been shown that somewhat different types of deep artificial neural networks can do this, but these required power-hungry computing hardware, such as graphics processing units (2).

Continue Reading at Source


Introducing a Brain-inspired Computer
TrueNorth’s neurons to revolutionize system architecture

By Dharmendra S. Modha

Six years ago, IBM and our university partners embarked on a quest—to build a brain-inspired machine—that at the time appeared impossible. Today, in an article published in Science, we deliver on the DARPA SyNAPSE metric of a one million neuron brain-inspired processor. The chip consumes merely 70 milliwatts, and is capable of 46 billion synaptic operations per second, per watt–literally a synaptic supercomputer in your palm.
Along the way—progressing through Phase 0, Phase 1, Phase 2, and Phase 3—we have journeyed from neuroscience to supercomputing, to a new computer architecture, to a new programming language, to algorithms, applications, and now to a new chip—TrueNorth.
Let me take this opportunity to take you through the road untraveled. At this moment, I hope this reflection will incite within you a burning desire to collaborate and partner with us to make the future journey a joint one.
Today’s computers can be traced back at least to Blaise Pascal’s 1642 mechanical calculator. The modern era in computing started with the unveiling of ENIAC on February 15, 1946. The development of the transistor in 1948 enabled the creation of integrated circuits in 1958, which, in turn, enabled the first microprocessor in 1971. Since then the clock frequency of the microprocessors has increased 1,000-fold. As remarkable as this evolution is, it has been headed in a direction diametrically opposite to the computing paradigm of the brain. Consequently, today’s microprocessors are eight orders of magnitude faster (in terms of clock rate) and four orders of magnitude hotter (in terms of power  per unit cortical area) than the brain….

Continue Reading at Source



SyNAPSE is a DARPA program that aims to develop electronic neuromorphic machine technology that scales to biological levels. More simply stated, it is an attempt to build a new kind of cognitive computer with similar form, function, and architecture to the mammalian brain. Such artificial brains would be used in robots whose intelligence would scale with the size of the neural system in terms of total number of neurons and synapses and their connectivity.
SyNAPSE is a backronym standing for Systems of Neuromorphic Adaptive Plastic Scalable Electronics. The name alludes to synapses, the junctions between biological neurons. The program is being undertaken by HRL Laboratories (HRL), Hewlett-Packard, and IBM Research. In November 2008, IBM and its collaborators were awarded $4.9 million in funding from DARPA while HRL and its collaborators were awarded $5.9 million in funding from DARPA. For the next phase of the project, DARPA added $16.1 million more to the IBM effort while HRL received an additional $10.7 million. In 2011, DARPA added $21 million more to the IBM project.[1] and an additional $17.9 million to the HRL project.[2] The SyNAPSE team for IBM is led by Dharmendra Modha, manager of IBM’s cognitive computing initiative. The SyNAPSE team for HRL is led by Narayan Srinivasa, manager of HRL’s Center for Neural and Emergent Systems.[3]
The initial phase of the SyNAPSE program developed nanometer scale electronic synaptic components capable of adapting the connection strength between two neurons in a manner analogous to that seen in biological systems (Hebbian learning), and simulated the utility of these synaptic components in core microcircuits that support the overall system architecture.
Continuing efforts will focus on hardware development through the stages of microcircuit development, fabrication process development, single chip system development, and multi-chip system development. In support of these hardware developments, the program seeks to develop increasingly capable architecture and design tools, very large-scale computer simulations of the neuromorphic electronic systems to inform the designers and validate the hardware prior to fabrication, and virtual environments for training and testing the simulated and hardware neuromorphic systems.



An ORGANICALLY CHARGED IMPLANT “subcutaneously implanted in a human or animal”:  Locator system with an implanted transponder having an organically-rechargeable battery

US 6828908 B2       Inventor:    Ronald Scott Clark   Publication date:   7 Dec 2004

A locator device having a transponder subcutaneously implanted in a person or animal that is to be periodically monitored in the event of emergency, abduction and other such situations. The transponder has a battery that is rechargeable by using the potential electrical energy generated by the body of the host organism. The preferred embodiment of the rechargeable transponder uses a piezoelectric battery that is to be implanted in an appropriate manner that would permit a large muscle to act upon a piezoelectric element thereby converting the mechanical energy into electrical energy to provide a recharge to the battery.



“The first human recipient of an implanted digital chip was Professor Kevin Warwick.  Professor Warwick, the chairman of the Cybernetics Department at the University of Reading in England had a digital chip implanted in his forearm in August of 1998.

The implant contained a radio transponder, electromagnetic coil and digital chip circuitry sealed in an inert glass capsule. The capsule is 23 millimeters long and 3 millimeters wide. Transmitting a radio signal to the transponder generates an electrical current in the coil that drives the circuitry. The implanted digital chip transmits a unique code to a computer that can open doors, turn on lights, heaters and in a digitized voice greet Professor Warwick when he enters his office. In July 2001, Applied Digital Solutions announced beta testing of implant technology in humans. The implants are capable of allowing users to emit a homing beacon, have vital bodily functions monitored and confirm identity when making e-commerce transactions. The digital transceiver named “Digital Angel” sends and receives electronic data capable of continuous tracking by Global Positioning Satellite technology with the aid of a hand carried Global Positioning Satellite transmitter.”

Comment:  “This chip I believe will tie into Cashless Banking…”you will not be able to buy nor sale.” without partaking of the chip. The AntiChrist may not be so much as a man but a system.”  MN