Only through inactive action does one become a victim; by exercising proactive action against evil one walks in their own power creating resistance to that which chooses to destroy humanity and the preciousness of life.
Fight America; don't become a victim to the evil that is destroying our world!
_Donald F. Truax (Tough times don't last, tough people do)
A technologically mature "posthuman civilization" would have enormous computing power. Based on this empirical fact, the simulation argument shows that at least one of the following propositions is true: (1) The fraction of human-level civilizations that reach a posthuman stage is very close to zero; (2) The fraction of posthuman civilizations that are interested in running ancestor-simulations is very close to zero; (3) The fraction of all people with our kind of experiences that are living in a simulation is very close to one.
If (1) is true, then we will almost certainly go extinct before reaching posthumanity. If (2) is true, then there must be a strong convergence among the courses of advanced civilizations so that virtually none contains any relatively wealthy individuals who desire to run ancestor-simulations and are free to do so. If (3) is true, then we almost certainly live in a simulation. In the dark forest of our current ignorance, it seems sensible to apportion one’s credence roughly evenly between (1), (2), and (3).
Unless we are now living in a simulation, our descendants will almost certainly never run an ancestor-simulation.
Purdue University's Synthetic Environment for Analysis and Simulations, or SEAS, is currently being used by Homeland Security and the US Defense Department to simulate crises on the US mainland. SEAS "enables researchers and organizations to try out their models or techniques in a publicly known, realistically detailed environment. It is now capable of running real-time simulations for up to 62 nations, including Iraq, Afghanistan, and China. The simulations gobble up breaking news, census data, economic indicators, and climactic events in the real world, along with proprietary information such as military intelligence. [...] The Iraq and Afghanistan computer models are the most highly developed and complex of the 62 available to JFCOM-J9. Each has about five million individual nodes representing things such as hospitals, mosques, pipelines, and people.
SEAS was developed to help Fortune 500 companies with strategic planning. Then it was used to help "recruiting commanders to strategize ways to improve recruiting potential soldiers". In 2004 SEAS was evaluated for its ability to help simulate "the non-kinetic aspects of combat, things like the diplomatic, economic, political, infrastructure and social issues".
Sentient World Simulation is the name given to the current vision of making SEAS a continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action.
The Sentient World Simulation project (SWS) is to be based on SEAS. The ultimate goal envisioned byAlok R. Chaturvedion March 10, 2006 was for SWS to be a continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action. SWS will react to actual events that occur anywhere in the world and incorporate newly sensed data from the real world. [...] As the models influence each other and the shared synthetic environment, behaviors and trends emerge in the synthetic world as they do in the real world. Analysis can be performed on the trends in the synthetic world to validate alternate worldviews. [...] Information can be easily displayed and readily transitioned from one focus to another using detailed modeling, such as engineering level modeling, to aggregated strategic, theater, or campaign-level modeling.
Simulex Inc.’sSynthetic Environments for Analysis and Simulation system is almost certainly how the priests of the technocracy are now maintaining “normal” operations, and, more importantly, how They plan to kill most of us off.
The system allows for terra scale datasets with granularity of results down to one node (individual). It has a physics engine for tracking any number of people (or other elements) in virtual cities or spaces. It can correlate any amount of social, economic, political, environmental or other data with the behavior of groups or individuals on the ground. The U.S. Government, and some of the most powerful corporations on the planet are using the SEAS system.
When U.S. Army theorist Ralph Peters said, “Statistically, we win,” he wasn’t kidding. If you’ve read about theClubofRome, wondered how the scientific application of fascism would work, or how kill off will be planned, simulated and executed, friend, you’ve come to the right place.
There’s really no way to know how many ways this system is already being used against us. I tried to think about it for a few minutes and it’s mind boggling. “How isn’t it being used?” is probably a more interesting question. If the Architectwas interested in tools that could help him more effectively run the Matrix, he’d have Simulex reps on the phone ASAP.
Perhaps your real life is so rich you don't have time for another.
Even so, the US Department of Defense (DOD) may already be creating a copy of you in an alternate reality to see how long you can go without food or water, or how you will respond to televised propaganda.
The DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and AR.
Called the Sentient World Simulation (SWS), it will be a "synthetic mirror of the real world with automated continuous calibration with respect to current real-world information", according to a concept paper for the project.
"SWS provides an environment for testing Psychological Operations (PSYOP)," the paper reads, so that military leaders can "develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners".
SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.
The FBI and telecom companies collaborated to routinely violate federal wiretapping laws for four years as, agents got access to reporters’ and citizens’ phone records using fake emergency declarations or simply asking for them.
The Justice Department Inspector General’s internal audit, released Wednesday, harshly criticized how the Federal Bureau of Investigation’sCommunications Analysis Unita counterterrorism section founded after 9/11 — relied on so-called “exigent” letters to get carriers to turn over phone records immediately. The letters were a hangover from the investigation into the 9/11 attacks in New York and promised telecoms, falsely, that subpoenas would follow shortly.
The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions.
E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. The stream of urgent requests for phone records also overwhelmed the FBI communications analysis unit with work that ultimately was not connected to imminent threats.
A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests, bureau officials confirmed.
The F.B.I. cast a much wider net in its terrorism investigations than it has previously acknowledged by relying on telecommunications companies to analyze phone-call patterns of the associates of Americans who had come under suspicion, according to newly obtained bureau records.
The documents indicate that the Federal Bureau of Investigation used secret demands for records to obtain data not only on individuals it saw as targets but also details on their “community of interest” — the network of people that the target was in contact with. The bureau stopped the practice early this year in part because of broader questions raised about its aggressive use of the records demands, which are known as national security letters, officials said.
The community of interest data sought by the F.B.I. is central to a data-mining technique intelligence officials call link analysis. Since the attacks of Sept. 11, 2001, American counterterrorism officials have turned more frequently to the technique, using communications patterns and other data to identify suspects who may not have any other known links to extremists. NSA Spying/Data Mining
News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports, plus a USA Today story in May 2006 and the statements of several members of Congress, revealed that the NSA is also receiving wholesale copies of their telephone and other communications records.
All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.
What does the Chronology of Data Breaches contain?
The data breaches noted have been reported because the personal information compromised includes data elements useful to identity thieves, such as Social Security numbers, account numbers, and driver's license numbers. Some breaches that do NOT expose such sensitive information have been included in order to underscore the variety and frequency of data breaches. However, we have not included the number of records involved in such breaches in the total because we want this compilation to reflect breaches that expose individuals to identity theft as well as breaches that qualify for disclosure under state laws. The breaches posted below include only those reported in the United States. They donot include incidents in other countries.
San Francisco - A federal judge has dismissed Jewel v. NSA, a case from the Electronic Frontier Foundation (EFF) on behalf of AT&T customers challenging the National Security Agency's mass surveillance of millions of ordinary Americans' phone calls and emails.
The alarming upshot of the court's decision is that so long as the government spies on all Americans, the courts have no power to review or halt such mass surveillance even when it is flatly illegal and unconstitutional," said EFF Senior Staff Attorney Kevin Bankston. "With new revelations of illegal spying being reported practically every other week -- just this week, we learned that the FBI has been unlawfully obtaining Americans' phone records using Post-It notes rather than proper legal process -- the need for judicial oversight when it comes to government surveillance has never been clearer.
Earlier this week, the DOJ’s Inspector General issued a heavily redacted report about the FBI’s Communications Analysis Unit (CAU), which found "shocking" violations, including embedded telecom employees providing customer phone records in response to post-it notes.
The report reveals that AT&T routinely provided the FBI with the "community of interest" profiles of its customers without any legal process. However, the DOJ redacted a large section of the report that discusses what a "community of interest" is, including an explanatory diagram. Yet, AT&T itself has publishedseveralresearchpapers extensively discussing communities of interest. Basically, your community of interest includes the people you call and who call you, and the people with whom this group communicates. It is sometimes refined by frequency or by time period. AT&T evenpublishedthe Hancock programming language, which AT&T designed to analyze communities of interest, and "sift calling card records, long distance calls, IP addresses and internet traffic dumps, and even track the physical movements of mobile phone customers as their signal moves from cell site to cell site." AT&T published thisgraphic, which illustrates AT&T using what they call "guilt by association" to determine fraud within a community of interest (the shaded boxes).
The improper NSL was issued at the direction of FBI headquarters, after the FBI already had the documents in hand pursuant to an earlier subpoena. While the matter received the personal attention of FBI Director Robert S. Mueller III, as well as officials with the FBI Office of the General Counsel, and was covered in news media, it was not formally reported until a short time before Inspector General Glenn Fine’s report on the (ab)use of NSLs was due before Congress. While the report identified dozens of instances in which National Security Letters may have violated laws and agency regulations and were not reported, this is the first time documents have that shown top FBI executives were aware of a misuse before it was officially reported.
Five members of the Supreme Court declared that a “corporation” is a person, not a “regular person” but one above all natural laws, subject to no God, no moral code but one with unlimited power over our lives, a power awarded by judges who seem themselves as grand inquisitors in an meant to hunt down all hertics who fail to serve their god, the god of money.
Their ruling has made it legal for foreign controlled corporations to flush unlimited money into our bloated political system to further corrupt something none of us trust and most of us fear. The “corporation/person” that the 5 judges, the“neocon”purists, have turned the United States over to isn’t even American. Our corporations, especially since our economic meltdown are owned by China, Russia and the oil sheiks along with a few foreign banks. They don’t vote, pay taxes, fight in wars, need dental care, breathe air, drive cars or send children to school. Anyone who thinks these things are people is insane. Anyone who would sell our government to them is a criminal and belongs in prison. There is nothing in the Constitution that makes this “gang of five” bribe sucking clowns above the law. There is nothing in the Constitution that even mentions corporations much less gives them status equal to or greater than the Executive, Legislative and Judicial branches of government.
Experiment leads to major shift in strategic philosophy and technical requirements.
The U.S. military is revolutionizing the way it fights in urban environments. A tactical transformational concept that shifts the emphasis from the adversary to the local population has been fast-tracked to commanders operating in Afghanistan, and it is being supported by technology that originally was designed to help market toothpaste to China. The technology, along with some very innovative thinking, reveals both intended and unintended consequences of actions so decision-makers can anticipate the impact each will have in a particular situation.
Within months of the conclusion of Urban Resolve 2015 (UR 2015), an experiment that took place in three two-week segments late last year, lessons learned from the event were making their mark in the Global War on Terrorism. Executed by the U.S. Joint Forces Command (JFCOM), Norfolk, Virginia, the experiment demonstrated that the urban fighting challenge is not one of overcoming terrain obstacles but rather entails controlling the environment—all the infrastructure and systems that make up a city. This radical concept change, written in partnership with the U.S. Army and U.S. Marine Corps, was the first UR 2015 deliverable and led to overhauling the entire U.S. Defense Department master plan. And similar to a row of dominoes that falls when the first tile tips, the master plan overhaul is creating a cascade of newly needed capabilities.
U.S. Secretary of Defense Donald Rumsfeld recently delegated technology transfer authority to U.S. Joint Forces Command (USJFCOM), allowing it to share technology with academia and industry for the purpose of research and development. While USJFCOM is not a national laboratory, the new authority gives the command many of the same authorities national laboratories use to structure partnerships with industry to exchange personnel and technical data, make technology assessments and collaborate on research and development efforts.
The Department of Defense’s (DoD) Unified Command Plan 08 assigns U.S Joint Forces Command (USJFCOM) responsibility for leading and coordinating joint concept development and experimentation (JCD&E) efforts of the services, the combatant commands (COCOM), and defense agencies.
USJFCOM’s JCD&E Directorate (J9) leads the development of emerging joint concepts, conducts and enables joint experimentation, and coordinates DoD JCD&E efforts in order to provide joint capabilities to support the current and future joint force commander in meeting security challenges.
USJFCOM J9 is also responsible for the integration of multinational and interagency experimentation efforts in support of future joint warfighting capabilities. It fulfills these responsibilities through.
During Urban Resolve 2015, U.S. Joint Forces Command and partners from across the services and the government are aiming to examine the challenges which come with operating in cities.
By Jim Garamone
American Forces Press Service
(WASHINGTON - Oct. 19, 2006) -- U.S. Joint Forces Command is in the midst of the most important and complex experiment the command has conducted since Millennium Challenge in 2002, officials said here yesterday.
The experiment is Urban Resolve 2015 and is designed to test solutions for that most complicated warfighting task: combat in cities.
Dave Ozolek, executive director of the Joint Futures Lab at the command, said the experiment is designed to examine solutions for current and future gaps in warfighting capabilities.
(SUFFOLK, Va. - Sept. 13, 2006) -- 10 a.m.: Urban Resolve 2015 (UR2015) is a huge experiment, involving more than 1,000 participants at 19 locations around the world. Its purpose is to try out new tools and operating concepts for warfighters in urban environments. The scenario is set in the year 2015 in a fictional city.
As I sit here today, I'm going to try to give you as clear a picture as possible as to how this phase of what is a multiple event series of experiments.
The experiment runs from August to October and is broken into three human-in-the-loop (HITL) experiments which put human decision-makers into a scenario generated by supercomputers. HITL 1 took place in August and pitted a present-day force against an advanced enemy.
Create a VV&A methodology for DARPA for the Conflict Modeling, Planning and Outcome Experimentation (COMPOEX) Program. COMPOEX is a large political, military, economic, social, information, and infrastructure (PMESII) simulation.
Simulations used to model operations where PMESII factors are relevant stretch the boundaries of scientific knowledge. Consequently verifying, validating and accrediting (VV&A) are difficult tasks.
Actual VV&A of PMESII models have been few and shallow.
Hartley, Dean S., III (2004). FAST for the Warfighter: Test Strategy & Plan (Revision 3). DRC, Vienna, VA.
Hartley, Dean S., III (2005). MOOTW FAST Prototype Toolbox: FY04 Validation Strategy & Plan. DRC, Vienna, VA.
Hartley, Dean S., III (2005). MOOTW FAST Prototype Toolbox: FY05 Validation Strategy & Plan. DRC, Vienna, VA.
Senko, Robert M. (2005). Flexible Asymmetric Simulation Technologies (FAST) for the Warfighter: FY05 Final Verification
Test Report. DRC, Vienna, VA.
Analysis: broad but shallow
Synthetic Environment for Analysis and Simulation (SEAS)
Citations
Chaturvedi, Alok R. (2003). “SEAS-UV 2004: The Theoretical Foundation of a Comprehensive PMESII/DIME Agent-Based Synthetic Environment,” Simulex, Inc.
McDonald, C. S. (2006). Verification and Validation Report for the Synthetic Environment for Analysis and Simulation (SEAS). The Johns Hopkins University – Applied Physics Laboratory, Laurel, MD.
Sheldon, Bob (2006). “Memorandum for the Record: V&V Report for the Synthetic Environment for Analysis and Simulation (SEAS), 27 October 2006.”
Analysis: narrow and shallow
Conflict Modeling, Planning and Outcome Experimentation (COMPOEX) Program
Citations
Davis, D. F. (2006). “Consolidated Report Consisting of three Research and Development Project Summary Reports,” Contract #W15P7T-06-T-P238. Peace Operations Policy Program, George Mason University, Arlington, VA.
Analysis: very narrow (elements analyzed not included in COMPOEX) and medium depth (not all needed parts were available)
===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"
No comments:
Post a Comment