fredag 6 april 2012

Synthetic telepathy “Artificial Telepathy”



Synthetic telepathy “Artificial Telepathy”


Readers of the world

bluered.gif (1041 bytes)

Synthetic telepathy“Artificial Telepathy” is the art of electronically transfering thought directly to and from a brain. The primary objectives of www.cyberbrain.se are to expose technology that can provide point to point communication from one brain to another, to localize unwanted sources of telepathic communication, and to provide evidence that technologically implemented telepathy is possible.

Technology to block unwanted voices is being investigated. A key objective is to prove the existence of criminals who abuse existing synthetic telepathy technology. Further objectives include investigating other computational substrates than brain tissue. www.cyberbrain.se is also interested in marketing existing synthetic telepathy technology. For justice and medical purposes only.


Readers of the world

Welcome to cyberbrain.se


bluered.gif (1041 bytes)

The experience of synthetic telepathy or“Artificial Telepathy” is really not that extraordinary. It’s as simple as receiving a cell-phone call in one’s head.

Indeed, most of the technology involved is exactly identical to that of cell-phone technology. Satellites link the sender and the receiver. A computer “multiplexer” routes the voice signal of the sender through microwave towers to a very specifically defined location or cell. The “receiver” is located and tracked with pinpoint accuracy, to within a few feet of actual location. But the receiver is not a cell phone. It’s a human brain.



Animation1

Out of nowhere, a voice suddenly blooms in the mind of the target. The human skull has no “firewall” and therefore cannot shut the voice out. The receiver can hear the sender’s verbal thoughts. The sender, in turn, can hear all of the target’s thoughts, exactly as if the target’s verbal thoughts had been spoken or broadcast. For this reason, the experience could be called “hearing voices” but is more properly described as “artificial telepathy”.

Now, if artificial telepathy were entirely voluntary, like a conversation between friends sitting across the room from one other, it might be kind of cool. One could talk back and forth with one’s friend, exchanging verbal thoughts exactly as if speaking on the phone, but without ever using one’s voice or mouth. It’s a completely silent, subvocal form of speech. Between lovers, this would be beautiful.

The problem is that artificial telepathy provides the perfect weapon for mental torture and information theft. It provides an extremely powerful means for exploiting, harassing, controlling, and raping the mind of any person on earth. It opens the window to quasi-demonic possession of another person’s soul.


Instant readers of the world

Visitors of today
bluered.gif (1041 bytes)

When used as a “nonlethal” weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protestors, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon.

Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. Embarrassing private moments cannot be hidden: they are subject to all manner of hurtful comments and remarks. Evidence can be collected for blackmail with tremendous ease: all the wrongs or moral lapses of one’s past are up for review.

Like a perverted phone caller, a hostile person with this technology in hand can call at any time of day, all day long. Sleep can be disrupted. Prayers can be desecrated, religious beliefs mocked. Business meetings can be interrupted, thoughts derailed. Love can be polluted, perverted, twisted, abused. Dreams can be invaded, fond memories trashed.

The attacker cannot be seen or identified, the attack cannot be stopped, and the psychological damage is enormous. But there is no physical damage, not one single mark is left on the body and there is absolutely no proof that any crime or any violation ever took place! Everything that “happens” to the victim happens inside the victim’s head. What physical evidence is there to give the police? Without physical evidence, how can one photograph the “crime scene” or fingerprint the stalker? There are no footprints leading to or from the scene. Indeed, there is no physical scene at all, and no evidence that an attack ever took place.

Most people who experience this abusive form of “artificial telepathy” feel as if their mind has been raped. They find themselves hunted, stalked, harassed and abused by a person or persons who refuse to give their names, who defile one’s mind with the most foul and perverse language imaginable, and who refuse to hang up or go away. The caller or callers delight in the perverse and sadistic torture of their targets. Furthermore, they delight in violating the privacy of their targets, reading the target’s mind and commenting on everything the target thinks, in an effort to demonstrate as brutally as possible that the target has no privacy at all.

Imagine what a man might do if he found a  ”cell phone” that allowed him to dial into the heads and the private thoughts of anyone on earth. The temptation to choose a target at random and start spying on or abusing that person would be enormous, almost irresistable. It could become a sick and twisted hobby, a guilty pleasure very quickly. Put into the hands of a secret police unit, the potential for abusing such technology is even more chilling.

bluered.gif (1041 bytes)artificial telepathy

bluered.gif (1041 bytes)

Synthetic Telepathy system, would be intelligence gathering and interrogation. As a communication system, it would have a limited appeal as any nation with a similar setup could either listen in, or pretend to be the A.I. interface. As such, it raises important ethical and legal questions, especially the question of secrecy given that all major governments would be aware of the system. Given that no law permits this type of interrogation, its secrecy may be more to do with criminal activity on behalf of the security agencies, rather than national security.


Its All About The Transceiver!

To understand how this works, it is best to start with the target, then trace backwards and identify each of the required subsystems. If we look at the last diagram to the left, we can see that the key to this system is its ability to both listen and respond to the electrical activity of the brain implant from satellite.

bluered.gif (1041 bytes)


bluered.gif (1041 bytes)

Now, the natural reaction of a normal and intelligent person who undergoes the horrible experience of mind rape for the first time is to panic and reach for a real phone. They call family, contact their doctor or call police with a bizarre complaint that “someone is beaming voices into my head.”

But if the police are the ones behind the abuse, the victims aren’t going to get much help, are they? And if the police are not the perpetrators, then how are they to make an arrest? It’s much more convenient and easy to believe that the caller is a nutcase.

In short order, the victim of mind rape finds herself or himself undergoing the additional humiliation of being carted off to the psych ward, often being committed involuntarily by a loved one “for one’s own good.”

The more vehement the efforts to prove that the voice or voices in one’s head are “real”, the more smug become the smiles of the medical doctors, who gently insist that such technology does not exist, that the voices cannot possibly be real, and that one must take a powerful psych med and lie down for a good long rest.


bluered.gif (1041 bytes)

The experience of “hearing voices” — especially voices that give a running stream of negative abuse — will gain one automatic admission to the rubber room. Indeed, hearing voices is a classic example of schizophrenia. If you hear voices, you are, by definition, crazy.

Yet when released from the psych ward with an expensive supply of meds, “voice hearers” often find that the meds are ineffective — exactly as one would expect if their problem had nothing to do with brain chemistry and everything to do with a bio-electronic attack by unseen stalkers.

Voice hearers often puzzle psychiatrists, because many of them don’t fit the classic model of schizophrenia, which usually begins onset in the early twenties. The victims of Synthetic telepathy “artificial telepathy” are often well into their thirties or fourties and many have no prior history of serious mental illness or drug abuse. Many seem to be alert, healthy, and rational even while insisting that they can hear voices. They agree with the psychiatrists that, yes, they are depressed, but who wouldn’t be a bit depressed under such trying circumstances? To be stalked and verbally bullied every waking hour of the day is a form of mental torture.

Victims of mind rape quickly learn not to discuss their “psychological problems” with family and coworkers. It’s embarrassing, it’s bizarre, it gets very little sympathy and only serves to alarm most people. The only way that another person can “help” is to suggest that the mind rape victim see a psychiatrist, who will promptly double one’s dose of psych meds and antidepressants. The result is a very stiff medical bill, which only adds financial pain to the mix. And the verbal harassment continues.

As they learn to endure their daily torture, voice hearers can usually return to mainstream life, where they are able to carry on intelligent, coherent conversations, hold down jobs, and function quite normally. In fact, if they don’t discuss their “problem” they usually can’t be told apart from normal people on the street. Because they are normal people.


bluered.gif (1041 bytes)

The growing number of voice hearers in our society is therefore well masked. Those who continue to insist that there is a “secret society of people beaming voices into our heads” are simply laughed into silence or labelled paranoid schizophrenics. They are completely discredited. In fact, many voice hearers have internalized the idea that they are mentally ill, and they struggle to understand how their “auditory hallucinations” could continue to seem so very, very real.

Naturally, many of these voice hearers are deeply confused. They turn to support groups, including such on-line communities as the Voice Hearers’ support group at Yahoo.com.

Anyone who doubts that “artificial telepathy” exists need only contact such a Voice Hearers community, where they will encounter people who continue to insist that they are being harassed by real people using an unknown or unexplained technology.


artificial telepathy
bluered.gif (1041 bytes)

Surprisingly, there is a tremendous amount of scientific literature and circumstantial evidence to back up that claim.

In the following posts, we will explore the history of synthetic telepathy and learn the names of the scientists who developed this sinister technology. We will also identify and examine some of the government agencies that are fielding and using this weapon of torture against innocent civilians.
bluered.gif (1041 bytes)



By  Magnus Olsson  Mindtech (Sweden)

Brain “Mind”Link Technology

The NSA – Behind The Curtain

consciousness
bluered.gif (1041 bytes)
Today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.
What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.
We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.
I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.
bluered.gif (1041 bytes)


The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.
The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer s The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

bluered.gif (1041 bytes)
The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

Mr Computer

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.
Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.
Mr Computer’s capabilities and human-like reasoning cannot be understated.

Read moore: http://www.mindcontrol.se/?page_id=6776

Inga kommentarer:

Skicka en kommentar