Society Is Being Programmed By A Black Box

Moderators: Elvis, DrVolin, Jeff

Re: Society Is Being Programmed By A Black Box

Postby Iamwhomiam » Mon May 15, 2017 6:14 pm

^^^ Yeah, but:
The unanimous Declaration of the thirteen united States of America, When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation.

We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.--That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, --That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.--Such has been the patient sufferance of these Colonies; and such is now the necessity which constrains them to alter their former Systems of Government. The history of the present King of Great Britain is a history of repeated injuries and usurpations, all having in direct object the establishment of an absolute Tyranny over these States. To prove this, let Facts be submitted to a candid world.

He has refused his Assent to Laws, the most wholesome and necessary for the public good.

He has forbidden his Governors to pass Laws of immediate and pressing importance, unless suspended in their operation till his Assent should be obtained; and when so suspended, he has utterly neglected to attend to them.

He has refused to pass other Laws for the accommodation of large districts of people, unless those people would relinquish the right of Representation in the Legislature, a right inestimable to them and formidable to tyrants only.

He has called together legislative bodies at places unusual, uncomfortable, and distant from the depository of their public Records, for the sole purpose of fatiguing them into compliance with his measures.

He has dissolved Representative Houses repeatedly, for opposing with manly firmness his invasions on the rights of the people.

He has refused for a long time, after such dissolutions, to cause others to be elected; whereby the Legislative powers, incapable of Annihilation, have returned to the People at large for their exercise; the State remaining in the mean time exposed to all the dangers of invasion from without, and convulsions within.

He has endeavoured to prevent the population of these States; for that purpose obstructing the Laws for Naturalization of Foreigners; refusing to pass others to encourage their migrations hither, and raising the conditions of new Appropriations of Lands.

He has obstructed the Administration of Justice, by refusing his Assent to Laws for establishing Judiciary powers.

He has made Judges dependent on his Will alone, for the tenure of their offices, and the amount and payment of their salaries.

He has erected a multitude of New Offices, and sent hither swarms of Officers to harrass our people, and eat out their substance.

He has kept among us, in times of peace, Standing Armies without the Consent of our legislatures.

He has affected to render the Military independent of and superior to the Civil power.

He has combined with others to subject us to a jurisdiction foreign to our constitution, and unacknowledged by our laws; giving his Assent to their Acts of pretended Legislation:

For Quartering large bodies of armed troops among us:

For protecting them, by a mock Trial, from punishment for any Murders which they should commit on the Inhabitants of these States:

For cutting off our Trade with all parts of the world:

For imposing Taxes on us without our Consent:

For depriving us in many cases, of the benefits of Trial by Jury:

For transporting us beyond Seas to be tried for pretended offences

For abolishing the free System of English Laws in a neighbouring Province, establishing therein an Arbitrary government, and enlarging its Boundaries so as to render it at once an example and fit instrument for introducing the same absolute rule into these Colonies:

For taking away our Charters, abolishing our most valuable Laws, and altering fundamentally the Forms of our Governments:

For suspending our own Legislatures, and declaring themselves invested with power to legislate for us in all cases whatsoever.

He has abdicated Government here, by declaring us out of his Protection and waging War against us.

He has plundered our seas, ravaged our Coasts, burnt our towns, and destroyed the lives of our people.

He is at this time transporting large Armies of foreign Mercenaries to compleat the works of death, desolation and tyranny, already begun with circumstances of Cruelty & perfidy scarcely paralleled in the most barbarous ages, and totally unworthy the Head of a civilized nation.

He has constrained our fellow Citizens taken Captive on the high Seas to bear Arms against their Country, to become the executioners of their friends and Brethren, or to fall themselves by their Hands.

He has excited domestic insurrections amongst us, and has endeavoured to bring on the inhabitants of our frontiers, the merciless Indian Savages, whose known rule of warfare, is an undistinguished destruction of all ages, sexes and conditions.

In every stage of these Oppressions We have Petitioned for Redress in the most humble terms: Our repeated Petitions have been answered only by repeated injury. A Prince whose character is thus marked by every act which may define a Tyrant, is unfit to be the ruler of a free people.

Nor have We been wanting in attentions to our Brittish brethren. We have warned them from time to time of attempts by their legislature to extend an unwarrantable jurisdiction over us. We have reminded them of the circumstances of our emigration and settlement here. We have appealed to their native justice and magnanimity, and we have conjured them by the ties of our common kindred to disavow these usurpations, which, would inevitably interrupt our connections and correspondence. They too have been deaf to the voice of justice and of consanguinity. We must, therefore, acquiesce in the necessity, which denounces our Separation, and hold them, as we hold the rest of mankind, Enemies in War, in Peace Friends.

We, therefore, the Representatives of the united States of America, in General Congress, Assembled, appealing to the Supreme Judge of the world for the rectitude of our intentions, do, in the Name, and by Authority of the good People of these Colonies, solemnly publish and declare, That these United Colonies are, and of Right ought to be Free and Independent States; that they are Absolved from all Allegiance to the British Crown, and that all political connection between them and the State of Great Britain, is and ought to be totally dissolved; and that as Free and Independent States, they have full Power to levy War, conclude Peace, contract Alliances, establish Commerce, and to do all other Acts and Things which Independent States may of right do. And for the support of this Declaration, with a firm reliance on the protection of divine Providence, we mutually pledge to each other our Lives, our Fortunes and our sacred Honor.
User avatar
Iamwhomiam
 
Posts: 6572
Joined: Thu Sep 27, 2007 2:47 am
Blog: View Blog (0)

Re: Society Is Being Programmed By A Black Box

Postby seemslikeadream » Sat Jun 10, 2017 5:23 pm

Along with RNC operatives dispatched to San Antonio, the operation employed staff from Cambridge Analytica, the U.S.-based offshoot of a British company that deploys what it calls “psychographics,” research using personality, values and other voter traits for targeting.



Image

The Man Behind Trump’s Bid to Finally Take Digital Seriously

BRAD PARSCALE IS a survivor—at least in Donald Trump’s universe. Today, Parscale, Trump’s digital director, is one of the last men standing as the Trump campaign’s revolving door keeps spinning. And with 80 days left in the campaign, he’s about to get a lot busier.

Trump has cycled through campaign personnel—first Corey Lewandowski, and then today Paul Manafort. Through it all, Parscale has kept his head down, working on the campaign since before Trump even announced his candidacy publicly. But from an office in San Antonio, far from the Washington—New York hub of campaign drama, his influence has only grown.

The bearded, 6-foot-7-inch Kansan was there in Cleveland during the Republican convention, hopping into a car with Trump’s social media manager and pushing his way through the chaos on the convention floor to shoot a Facebook Live video of Trump’s children the night their father received the official nomination. Through it all, he’s remained out of the spotlight, but that may soon change. Tomorrow, the Federal Election Commission releases the presidential campaigns’ July financial disclosures. Parscale says the Trump campaign’s ledger will show an $8.4 million payment to his digital marketing firm, about 90 percent of which was spent on digital ads.1 It’s a massive leap that shows Trump may finally be getting serious about a digital strategy that goes beyond tweets.

In June, the Trump campaign spent just $1.63 million on digital advertising, which itself was still dramatically more than the $21,000 Parscale’s firm, Giles-Parscale, made between October and the end of December 2015. During that same time period, the Clinton campaign paid nearly 100 times that to its digital consulting firm, Bully Pulpit Interactive. During primary season, when his poll numbers were strong, Trump utilized free media exposure to gain an edge on his competitors. Now that Clinton’s dominating the polls, it seems, Trump is not only raising money ($80 million in July), he’s spending it too. And Parscale is helping him do it online.

“Mr. Trump understands the value of digital operations,” he says, “and he’s been extremely supportive of this operation.”


Me and Mr. Trump
Parscale, who grew up in Kansas, says he sees a lot of himself in the man he calls “Mr. Trump.” For starters, like Trump, he’s a political novice who has built a professional reputation for himself in Texas but has never worked in Washington. “Brad is a non-traditional guy, and he’s good for a non-traditional campaign,” says Vincent Harris, a Republican digital strategist who briefly worked for Trump’s campaign.

But more than that, Parscale feels his story parallels Trump’s rise in business. Parscale started out with a small investment in 2004. (Parscale’s was his own $500. Trump’s was his father’s $1 million). He began by cold-calling local clients but soon graduated to major contracts with the likes of the Trump Organization, which led to gigs building websites for Trump Winery and the Eric Trump Foundation. Now he’s managing multi-million dollar advertising budgets for perhaps the most-watched man in the world.

In conversation, Parscale expresses fierce loyalty for his controversial boss. He says Trump gave “a farm boy from Kansas” a chance. “When I was successful, he continued to reward me over and over again, because I worked hard and produced success,” he says.

Still, while his boss called for boycotting Apple and prefers talking about the glory days of trade in Pennsylvania steel country, Parscale exhibits the the forward-looking attitude of the typical tech exec. Among other things, he recently helped found a group called Tech Bloc in San Antonio, which represents the tech industry’s interests there. Among its biggest accomplishments was pushing San Antonio’s city council to reverse its decision to ban Uber from the city. Parscale is proud to say he was “rider zero” for Uber when they launched.

“Tech can be something that can be great for us. We don’t need to fear it,” Parscale says.

And yet the Trump campaign has lagged in embracing tech, both as a campaign tool and a policy priority. Unlike Clinton, Trump has not released anything resembling a tech policy agenda. And while Trump initially rejected the need for data as a crucial tool for targeting voters, Clinton has built a huge tech team in Brooklyn, drawing talent from the likes of Google, Twitter, and Facebook. Even some of Trump’s primary season competitors outstripped his campaign in terms of tech. Now, Trump’s team is finally trying to catch up, and Parscale is at the center.

This Ain’t Hollywood
Just before Trump spoke at the Republican convention, Parscale made a six-figure ad buy on Twitter, purchasing the promoted hashtag, #TextTrump88022. Meanwhile, the campaign has released a truly odd series of ads that feature Trump and various shots of astronauts and other space imagery.

For Harris, who ran digital for Sen. Rand Paul’s 2016 presidential bid, it’s the weirdness of these ads that makes them work. “I think the Trump campaign has shown again to Beltway consultants that this isn’t about $50,000 Hollywood video shoots,” Harris says. “This is about effective digital operations. It’s gritty. It’s fast-paced, and it’s about what the base wants to hear.”

Trump’s attempt to make up the gap via digital ads will be a difficult battle for a candidate who’s already starting from behind.
There is, of course, another reason why Trump’s campaign has to spend more on digital advertising, and that is because the campaign has not reserved much television time. According to a July report in AdAge, between July and November, Trump and his PACs had reserved $654,455 in TV and radio advertising compared to $111 million by Hillary Clinton and her PACs. Though he just recently spent $4 million on a new ad buy, that’s still a small amount compared to what Clinton has planned. That could make Trump’s attempt to make up the gap via digital ads a difficult battle for a candidate who’s already starting from behind and whose base is less likely to see those ads anyway.

“Republican voters in the general election are traditionally older,” says Harris. “Older people traditionally get their news and information from television.”

Still, Parscale is satisfied that the investment in digital produced a serious return for Trump in July. He declined to say what percentage of the $80 million raised was the result of the surge in digital ad spending. But it seems unlikely the campaign will let up on the digital front. Trump’s new campaign CEO, Steve Bannon, has spent the last few years sitting atop a far-right digital media empire. He seems to know how the web works. And finally Trump seems ready to spend the money to make the web work for him, if it’s not already too late.
https://www.wired.com/2016/08/man-behin ... seriously/


S.A. web firm might be included in probe of the Trump-Russia ties
By Bill Lambrecht, Washington BureauMay 26, 2017 Updated: May 26, 2017 7:52pm

Image
Brad Parscale, who was the Trump campaign's digital director, waits for an elevator at Trump Tower, Tuesday, Nov. 15, 2016, in New York. (AP Photo/Carolyn Kaster) Photo: Carolyn Kaster, STF / Associated Press / Copyright 2016 The Associated Press. All rights reserved.
Photo: Carolyn Kaster, STF / Associated Press
IMAGE 1 OF 4 Brad Parscale, who was the Trump campaign's digital director, waits for an elevator at Trump Tower, Tuesday, Nov. 15, 2016, in New York. (AP Photo/Carolyn Kaster)
WASHINGTON — The FBI’s wide-ranging criminal investigation into Russia’s meddling in the 2016 presidential election may include scrutiny of the Trump campaign’s San Antonio-based digital operation overseen by senior White House adviser Jared Kushner.

CNN reported that along with Kushner’s contacts with Russians and his relationship with fired national security adviser Michael Flynn, the FBI is looking at the campaign’s 2016 data analytics programs conducted largely out of San Antonio under the direction of local digital advertising executive Brad Parscale.

In looking at possible ties with Russia, the FBI has collected data on computer bots — software that runs automated scripts over the internet — that pushed negative information on Hillary Clinton and positive information on Trump, the cable network reported.

An FBI spokesman declined comment Friday, and the White House did not respond to messages.

Parscale did not respond to phone messages left at Giles-Parscale, the San Antonio web design and digital marketing company that he co-owns.

Kushner, Trump’s son-in-law, has not been accused of wrongdoing. His lawyer, Jamie Gorelick, said he will cooperate with the FBI if asked.

“Mr. Kushner previously volunteered to share with Congress what he knows about these meetings,” she said in a statement, referring to reports of meetings with Russian Ambassador Sergey Kislyak and with a Russian banker. “He will do the same if he is contacted in connection with any other inquiry.”

Parscale, 41, became heavily involved in the Trump campaign after designing a website for the campaign exploratory committee and carrying out other tasks for the Trump family. He worked under Kushner. By the campaign’s end, Parscale ran Trump’s digital operation, media buys and overall advertising, an exceptionally large role for someone with little experience in political campaigns.

“It was a data-driven campaign, so I was in the middle of it all,” Parscale said in an interview with the San Antonio Express-News after the election.

Federal Election Commission reports showed that Giles-Parscale received over $91 million from the Trump campaign and an allied super PAC over an 18-month period.

Parscale noted that while his company ended “in a healthy situation,” much of that money was paid for advertising and vendors.

Parscale remained on the campaign payroll through January and is associated with Trump’s re-election committee. FEC records show that his company received an additional $1.6 million through March for what was described as digital consultation and online advertising.

In the “Project Alamo” operation, Parscale had over 100 people employed on Trump’s behalf last year in San Antonio, many of them digital and media experts.

They worked closely with the Republican National Committee, which invested heavily in data and digital technology after losing the previous two presidential elections. The RNC provided the Trump campaign with a massive database that included details on millions of voters’ attitudes, buying habits and personal information available from public and private sources, combined with information the party had gleaned from contacts over the years.

The Parscale-run operation relied heavily on Facebook both for targeting voters and fundraising, Parscale has said, noting that Facebook helped the campaign raise more than

$260 million.

Along with RNC operatives dispatched to San Antonio, the operation employed staff from Cambridge Analytica, the U.S.-based offshoot of a British company that deploys what it calls “psychographics,” research using personality, values and other voter traits for targeting.

Cambridge was paid $6 million for its work, which Republican operatives described as voter persuasion.

BusinessWeek quoted an unnamed member of the Trump campaign staff late in the campaign as saying that their digital operation used Facebook ads and other means to suppress Clinton’s vote totals with negative messages aimed at African-Americans, young women and segments of liberals.

Parscale said in an earlier interview with the Express-News that his operation’s ability to identify 14.4 million persuadable voters in several swing states just prior to the election was a key to Trump’s victory.

“That’s why we won. We knew just the voters we needed to turn out, and we turned them out in big numbers,” he said.

Parscale’s success earned him the Digital Strategist of the Year Award, presented in March by the American Association of Political Consultants.

While not commenting on the report about FBI scrutiny of Kushner, Parscale has used his Twitter account in recent days to step up attacks on CNN and other news outlets with more than a dozen posts since last weekend.

“SO fake news,” Parscale tweeted May 20 in response to a CNN report that a former Trump staffer wants the president to set up a fund to help associates caught in the Russia investigation pay their legal bills. “Let’s fight back against @CNN.”

In another tweet that day, he wrote: “#1 lesson I’ve learned. Media is the enemy of this country.”
http://www.expressnews.com/news/local/a ... 177097.php
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Society Is Being Programmed By A Black Box

Postby Grizzly » Sat Jun 10, 2017 5:25 pm

Also...

Inside the Secretive and Intrusive World of Stingray Surveillance

http://tenthamendmentcenter.com/2017/06/07/inside-the-secretive-and-intrusive-world-of-stingray-surveillance/

One Florida man’s experience provides a peek into the secretive and intrusive world of stingray surveillance.

Many civil liberties activists say you can’t use a cell site simulator and remain compliant with the Fourth Amendment, or state constitutional limits on searches and seizures. Yet state and local police across the the country have access to these extremely intrusive surveillance devices. Due to the shroud of secrecy thrown over cell site simulator programs, your average resident doesn’t even realize their local police can easily track their phones and listen to conversations without them even knowing it.

Cell site simulators, commonly called “stingrays,” essentially spoof cell phone towers, tricking any device within range into connecting to the stingray instead of the tower. This allows law enforcement to sweep up communications content, as well as locate and track the person in possession of a specific phone or other electronic device.

The federal government funds the vast majority of state and local stingray programs, attaching one important condition. The feds require agencies acquiring the technology to sign non-disclosure agreements. This throws a giant shroud over the program, even preventing judges, prosecutors and defense attorneys from getting information about the use of stingrays in court. The feds sometimes even instruct prosecutors to withdraw evidence if judges or legislators press for information. As the Baltimore Sun reported in April 2015, a Baltimore detective refused to answer questions on the stand during a trial, citing a federal non-disclosure agreement.

The experience of a Pinellas County, Florida, man further highlights the shroud of secrecy around the use of stingray devices, along with the potential for abuse of power inherent in America’s law enforcement community.

In 2013, we first heard about LOVEINT with allegations that NSA employees abused their surveillance power to spy on significant others. The Senate Intelligence Committee reported 12 recorded cases where NSA agents spied on phone calls and emails; one even did a background check on a potential suitor. It was through self-reported polygraphs that NSA obtained knowledge of such actions. However, there appears to have been little in the way of punishment for those who illegally violated other peoples’ protected rights under the Fourth Amendment on their own personal whims.

The lesson: when somebody with power and means wants too, they can easily interfere with your life. James McLynas found this out when a cop fell for his ex.

McLynas began having odd run-ins with the law that started around his divorce in 2013. As he tells the story, his ex-wife found love within the Pinellas County Sheriff’s Office, and a bitter child custody battles ensued. McLynas claims he was harassed by Tampa Bay area law enforcement officers, along with the child services department. He says officers even stalked him at his child’s school. He also said the department ignored complaints that his wife broke into his home, and even destroyed property. His guests, or any car parked outside his home had their license plate recorded by cops. He claims he was continually harassed until he found evidence on his child’s phone where a Clearwater Police Department officer provided a picture of the recorded license plates to his ex-wife.

ARREST

After legal battles and complaints to the sheriff’s office, McLynas decided to run for Sheriff in the 2013 election and challenge Sheriff Gualtieri who he said consistently ignored his complaints. Not long after he entered the race, five felony charges were brought against him. One was for battery of an elderly person. and the others included grand theft auto and title fraud. At the time of his arrest, McLynas found himself surrounded by undercover law enforcement vehicles after he crossed a bridge between Hillsborough and Pinellas Counties, and parked in an auto repair shop.

James Mclynas was not unknown the sheriff’s department, nor was his home address unknown to them, nor was any other places he lived. So why on a random day, did the sheriff’s department arrest James when entering Pinellas County after he crossed the bridge? Why not arrest him at his home?

The bigger question: how did they find him?

McLynas and his attorney suspected deputies may have used a stingray device.

RECORDS REQUESTS

McLynas started his investigation by making Florida State’s Public Records requests in late May of 2015.

Any and all documents showing the possession or acquisition by Pinellas County Sheriff’s Office of “Stingray” or any other form of “Cell Site Simulator” that tracks or monitors cell phone location or activity.
Any documents that “Stingray” or any other form of Cell Site Simulator” was used to find or track any phone owned or operated by James McLynas on October 30, 2013, or any other date or time.
Any application for warrant requested by Pinellas County Sheriff’s Office for any surveillance or any form of monitoring for James McLynas.
Any application for any form of warrant for any purpose or reason related to James McLynas for any time frame.

On June 4th, The Pinellas County Sheriff’s Office responded:

1.The information you requested is not available as a public record at this time; it is exempt from disclosure under Florida Statutes Section 119.071(2)c, Section 119.071(2)(d) and Section 119.071(1)(f).
2.The information you requested is not available as a public record at this time; it is exempt from disclosure under Florida Statutes Section 119.071(2)c, Section 119.071(2)(d) and Section 119.071(1)(f).
3. No records responsive
4. No records responsive

Under agreements set up by Harris Corp and the FBI, acknowledging the use of a stingray is forbidden. Since the sheriff’s office can’t outright deny using a cell site simulator, the PCSO hedged. But reading between the lines of its response to question 1 and 2, it seems clear a stingray was in procession of the sheriff’s office and was used on McLynas. However there are no documents concerning a warrant for its use or warrant issued relating to James McLynas.

There is another oddity: the response “no records responsive” when inquiring about the report. When the sheriff’s office was pushed to explain this, they offered this statement.

“The reason you received the response ‘no records responsive’ is because we did not have the document in our possession as it was in the possession of the State Attorney’s Office and sealed under court order. As such, our response was accurate at the time.”

PRE-TRIAL

McLynas and his lawyer, Jerry Theophilopoulos, pushed back during pre-trial with a Motion to Compel the sheriff’s office to hand over the evidence. Prosecution cannot legally hide evidence from the defense, even if it is in its favor. In a Supreme Court case of Brady vs. Maryland, all evidence, including surveillance, must be turned over to the defense. The Pinellas County Sheriff’s Office, in the fashion of so many other law enforcement agencies, simply dropped the battery case against McLynas rather than turn over the evidence. However, it still kept the cases of title fraud and grand theft active.

Still not satisfied since he had not received verifiable confirmation that a stingray was used on him, McLynas continued to press the sheriff’s office regarding the other felonies presented against him with multiple records requests, He even went to the state attorney and asked why they decided to not purse him on the battery felony charge that was dropped. Eventually, due to an emailing error, a supervisor at the sheriff’s office accidentally sent McLynas an email titled, “More from McLynas.”

POST-HEARING RESPONSES

After the court hearing, the attorney and senior associate counsel, Paul Rozelle, told McLynas’s lawyer that a stingray was not used to locate McLynas. After leaving the courthouse, the attorney called the PCSO’s Tactical Operations Unit (TOU) to notify them of the motion to compel all document related to the stingray and if used on James McLynas. The TOU is the division within the sheriffs office that operates the stingray. In a Bar complaint, the attorney reported that was when he first learned that a cell site simulator was actually used on James. He further admitted in a response that a warrant was issued, but created and held by the State’s Attorney’s Office and not in the possession of the Pinellas County Sheriff’s Office. The document was then sealed.

Further the attorney claimed that the stingray was used without a warrant, and they were not dropping the case to hide the fact a stingray was used. He also denied his comment to James’s lawyer after the court hearing were dishonest.

James and his lawyer countered Paul Rozelle’s statements, along Sheriff Gualtieri.

“If the PCSO clerk knew that the documents didn’t exist and no stingray had been used on McLynas, then why did she need to contact Paul Rozelle, “senior associate counsel” for advice on how to simply tell McLynas that none of the documents he asked for existed? The answer; she wouldn’t need to contact Rozelle if that were the case. The documents existed and they turned to Rozelle to ask how to keep them from McLynas.

PCSO Sheriff Gualtieri agreed in writing to not disclose stingray documents “during pre-trial matters, in search warrants and related affidavits, in discovery, in response to court ordered disclosure, in other affidavits, in grand jury hearings, in the State’s case-in-chief, rebuttal, or on appeal, or in testimony in any phase of civil or criminal trial””

CONCLUSIONS

Later, McLynas and his lawyer finally got a copy of the court order. As it turns out, it wasn’t for a warrant to use a stingray. It was a court order for a pen register/trap and trace device. Nowhere in the order does it mention cell site simulator or stingray. When asked why they said they used a pen register instead of a stingray, the response James received was, they are “not terribly concerned with how they found the suspect.”

James and his lawyer concluded the following:

Paul Rozell knew exactly who to call about the use of a stingray in his county and refused to disclose this to James, and lied to his lawyer.
Public records documents were withheld from him to hide the fact that the stingray was used.
The State Attorney colluded with the Sheriff’s office in hiding the “warrant” documents.
James was illegally tracked by a stingray. No warrant was issued.
The case was dropped to continue to hide the documents after the Brady Rule was used in the Motion to Compel.


Note: Several embedded link in the actual article ...
“The more we do to you, the less you seem to believe we are doing it.”

― Joseph mengele
User avatar
Grizzly
 
Posts: 4722
Joined: Wed Oct 26, 2011 4:15 pm
Blog: View Blog (0)

Re: Society Is Being Programmed By A Black Box

Postby kelley » Sun Jun 11, 2017 8:24 am

"If we take 9/11 and the rollout of the Patriot Act as Year Zero for the USA’s massive data gathering, encapsulation, and digestion campaign (one that we are only now beginning to comprehend, even as parallel projects from China, Russia, and Europe are sure to come to light in time), then we can imagine the entirety of network communication for the last decade—the Big Haul—as a single, deep-and-wide digital simulation of the world (or a significant section of it). It is an archive, a library of the real. Its existence as the purloined property of a state, just as a physical fact, is almost occult. Almost."


http://www.e-flux.com/journal/53/59883/the-black-stack/


Journal #53 - March 2014

Benjamin H. Bratton
The Black Stack

Planetary-scale computation takes different forms at different scales: energy grids and mineral sourcing; chthonic cloud infrastructure; urban software and public service privatization; massive universal addressing systems; interfaces drawn by the augmentation of the hand, of the eye, or dissolved into objects; users both overdetermined by self-quantification and exploded by the arrival of legions of nonhuman users (sensors, cars, robots). Instead of seeing the various species of contemporary computational technologies as so many different genres of machines, spinning out on their own, we should instead see them as forming the body of an accidental megastructure. Perhaps these parts align, layer by layer, into something not unlike a vast (if also incomplete), pervasive (if also irregular) software and hardware Stack. This model is of a Stack that both does and does not exist as such: it is a machine that serves as a schema, as much as it is a schema of machines. As such, perhaps the image of a totality that this conception provides would—as theories of totality have before—make the composition of new governmentalities and new sovereignties both more legible and more effective.

My interest in the geopolitics of planetary-scale computation focuses less on issues of personal privacy and state surveillance than on how it distorts and deforms traditional Westphalian modes of political geography, jurisdiction, and sovereignty, and produces new territories in its image. It draws from (and against) Carl Schmitt’s later work on The Nomos of the Earth, and from his (albeit) flawed history of the geometries of geopolitical architectures. “Nomos” refers to the dominant and essential logic to the political subdivisions of the earth (of land, seas, and/or air, and now also of the domain that the US military simply calls “cyber”) and to the geopolitical order that stabilizes these subdivisions accordingly. Today, as the nomos that was defined by the horizontal loop geometry of the modern state system creaks and groans, and as “Seeing like a State” takes leave of that initial territorial nest—both with and against the demands of planetary-scale computation3—we wrestle with the irregular abstractions of information, time, and territory, and the chaotic de-lamination of (practical) sovereignty from the occupation of place. For this, a nomos of the Cloud would, for example, draw jurisdiction not only according to the horizontal subdivision of physical sites by and for states, but also according to the vertical stacking of interdependent layers on top of one another: two geometries sometimes in cahoots, sometimes completely diagonal and unrecognizable to one another.

The Stack, in short, is that new nomos rendered now as vertically thickened political geography. In my analysis, there are six layers to this Stack: Earth, Cloud, City, Address, Interface, and User. Rather than demonstrating each layer of the Stack as a whole, I’ll focus specifically on the Cloud and the User layers, and articulate some alternative designs for these layers and for the totality (or even better, for the next totality, the nomos to come). The Black Stack, then, is to the Stack what the shadow of the future is to the form of the present. The Black Stack is less the anarchist stack, or the death-metal stack, or the utterly opaque stack, than the computational totality-to-come, defined at this moment by what it is not, by the empty content fields of its framework, and by its dire inevitability. It is not the platform we have, but the platform that might be. That platform would be defined by the productivity of its accidents, and by the strategy for which whatever may appear at first as the worst option (even evil) may ultimately be where to look for the best way out. It is less a “possible future” than an escape from the present.

Cloud

The platforms of the Cloud layer of the Stack are structured by dense, plural, and noncontiguous geographies, a hybrid of US super-jurisdiction and Charter Cities, which have carved new partially privatized polities from the whole cloth of de-sovereigned lands. But perhaps there is more there.

The immediate geographical drama of the Cloud layer is seen most directly in the ongoing Sino-Google conflicts of 2008 to the present: China hacking Google, Google pulling out of China, the NSA hacking China, the NSA hacking Google, Google ghostwriting books for the State Department, and Google wordlessly circumventing the last instances of state oversight altogether, not by transgressing them but by absorbing them into its service offering. Meanwhile, Chinese router firmware bides its time.

The geographies at work are often weird. For example, Google filed a series of patents on offshore data centers, to be built in international waters on towers using tidal currents and available water to keep the servers cool. The complexities of jurisdiction suggested by a global Cloud piped in from non-state space are fantastic, but they are now less exceptional than exemplary of a new normal. Between the “hackers” of the People’s Liberation Army and Google there exists more than a standoff between the proxies of two state apparatuses. There is rather a fundamental conflict over the geometry of political geography itself, with one side bound by the territorial integrity of the state, and the other by the gossamer threads of the world’s information demanding to be “organized and made useful.” This is a clash between two logics of governance, two geometries of territory: one a subdivision of the horizontal, the other a stacking of vertical layers; one a state, the other a para-state; one superimposed on top of the other at any point on the map, and never resolving into some consensual cosmopolitanism, but rather continuing to grind against the grain of one another’s planes. This characterizes the geopolitics of our moment (this, plus the gravity of generalized succession, but the two are interrelated).

From here we see that contemporary Cloud platforms are displacing, if not also replacing, traditional core functions of states, and demonstrating, for both good and ill, new spatial and temporal models of politics and publics. Archaic states drew their authority from the regular provision of food. Over the course of modernization, more was added to the intricate bargains of Leviathan: energy, infrastructure, legal identity and standing, objective and comprehensive maps, credible currencies, and flag-brand loyalties. Bit by bit, each of these and more are now provided by Cloud platforms, not necessarily as formal replacements for the state versions but, like Google ID, simply more useful and effective for daily life. For these platforms, the terms of participation are not mandatory, and because of this, their social contracts are more extractive than constitutional. The Cloud Polis draws revenue from the cognitive capital of its Users, who trade attention and microeconomic compliance in exchange for global infrastructural services, and in turn, it provides each of them with an active discrete online identity and the license to use this infrastructure.

Early personal computer advertisement promises an easy way out of a future technological swamp.


That said, it is clear that we don’t have anything like a proper geopolitical theory of these transformations. Before the full ambition of the US security apparatus was so evident, it was thought by many that the Cloud was a place where states had no ultimate competence, nor maybe even a role to play: too slow, too dumb, too easily outwitted by using the right browser. States would be cored out, component by component, until nothing was left but a well-armed health insurance scheme with its own World Cup team. In the long run, that may still be the outcome, with modern liberal states taking their place next to ceremonial monarchs and stripped of all but symbolic authority, not necessarily replaced but displaced and misplaced to one side. But now we are hearing the opposite, equally brittle conclusion: that the Cloud is only the state, that it equals the state, and that its totality (figural, potential) is intrinsically totalitarian. Despite all, I wouldn’t take that bet.

Early personal computer advertisement promises an easy way out of a future technological swamp.

Looking toward the Black Stack, we observe that new forms of governmentality arise through new capacities to tax flows (at ports, at gates, on property, on income, on attention, on clicks, on movement, on electrons, on carbon, and so forth). It is not at all clear whether, in the long run, Cloud platforms will overwhelm state control on such flows, or whether states will continue to evolve into Cloud platforms, absorbing the displaced functions back into themselves, or whether both will split or rotate diagonally to one another, or how deeply what we may now recognize as the surveillance state (US, China, and so forth) will become a universal solvent of compulsory transparency and/or a cosmically opaque megastructure of absolute paranoia, or all of the above, or none of the above.

Between the state, the market, and the platform, which is better designed to tax the interfaces of everyday life and draw sovereignty thereby? It is a false choice to be sure, but one that raises the question of where to locate the proper site of governance as such. What would we mean by “the public” if not that which is constituted by such interfaces, and where else should “governance”—meant here as the necessary, deliberate, and enforceable composition of durable political subjects and their mediations—live if not there? Not in some obtuse chain of parliamentary representation, nor in some delusional monadic individual unit, nor in some sad little community consensus powered by moral hectoring, but instead in the immanent, immediate, and exactly present interfaces that cleave and bind us. Where should sovereignty reside if not in what is in-between us—derived not from each of us individually but from what draws the world through us?

For this, it’s critical to underscore that Cloud platforms (including sometimes state apparatuses) are exactly that: platforms. It is important as well to recognize that “platforms” are not only a technical architecture; they are also an institutional form. They centralize (like states), scaffolding the terms of participation according to rigid but universal protocols, even as they decentralize (like markets), coordinating economies not through the superimposition of fixed plans but through interoperable and emergent interaction. Next to states and markets, platforms are a third form, coordinating through fixed protocols while scattering free-range Users watched over in loving, if also disconcertingly omniscient, grace. In the platform-as-totality, drawing the interfaces of everyday life into one another, the maximal state and the minimal state, Red Plenty and Google Gosplan, start to look weirdly similar.

Our own subjective enrollment in this is less as citizens of a polis or as homo economicus within a market, but rather as Users of a platform. As I see it, the work of geopolitical theory is to develop a proper history, typology, and program for such platforms. These would not be a shorthand for Cloud Feudalism (nor for the network politics of the “multitude”) but models for the organization of durable alter-totalities which command the force of law, if not necessarily its forms and formality. Our understanding of the political economy of platforms demands its own Hobbes, Marx, Hayek, and Keynes.

User

One of the useful paradoxes of the User’s position as a political subject is the contradictory impulse directed simultaneously toward his artificial over-individuation and his ultimate pluralization, with both participating differently in the geopolitics of transparency. For example, the Quantified Self movement (a true medical theology in California) is haunted by this contradiction. At first, the intensity and granularity of a new informational mirror image convinces the User of his individuated coherency and stability as a subject. He is flattered by the singular beauty of his reflection, and this is why QSelf is so popular with those inspired by an X-Men reading of Atlas Shrugged. But as more data is added to the diagram that quantifies the outside world’s impact on his person—the health of the microbial biome in his gut, immediate and long-term environmental conditions, his various epidemiological contexts, and so on—the quality of everything that is “not him” comes to overcode and overwhelm any notion of himself as a withdrawn and self-contained agent. Like Theseus’s Paradox—where after every component of a thing has been replaced, nothing original remains but a metaphysical husk—the User is confronted with the existential lesson that at any point he is only the intersection of many streams. At first, the subject position of the User overproduces individual identity, but in the continuance of the same mechanisms, it then succeeds in exploding it.

The geopolitics of the User we have now is inadequate, including its oppositional modes. The Oedipal discourse of privacy and transparency in relation to the Evil Eye of the uninvited stepfather is a necessary process toward an alterglobalism, but it has real limits worth spelling out. A geopolitics of computation predicated at its core upon the biopolitics of privacy, of self-immunization from any compulsory appearance in front of publics, of platforms, of states, of Others, can sometimes also serve a psychological internalization of a now-ascendant general economy of succession, castration anxiety—whatever. The result is the pre-paranoia of withdrawal into an atomic and anomic dream of self-mastery that elsewhere we call the “neoliberal subject.”

The space in which the discursive formation of the subject meets the technical constitution of the User enjoys a much larger horizon than the one defined by these kinds of individuation. Consider, for example, proxy users. uProxy, a project supported by Google Ideas, is a browser modification that lets users easily pair up across distances to allow someone in one location (trapped in the Bad Internets) to send information unencumbered through the virtual position of another User in another location (enjoying the Good Internets). Recalling the proxy servers set up during the Arab Spring, one can see how Google Ideas (Jared Cohen’s group) might take special interest in baking this into Chrome. For Sino-Google geopolitics, the platform could theoretically be available at a billion-user scale to those who live in China, even if Google is not technically “in China,” because those Users, acting through and as foreign proxies, are themselves, as far as internet geography is concerned, both in and not in China. Developers of uProxy believe that it would take two simultaneous and synchronized man-in-the-middle attacks to hack the link, and at a population scale that would prove difficult even for the best state actors, for now. More disconcerting perhaps is that such a framework could just as easily be used to withdraw data from a paired site—a paired “user”—which for good reasons should be left alone.

Some plural User subject that is conjoined by a proxy link or other means could be composed of different types of addressable subjects: two humans in different countries, or a human and a sensor, a sensor and a bot, a human and a robot and a sensor, a whatever and a whatever. In principle, any one of these subcomponents could not only be part of multiple conjoined positions, but might not even know or need to know which meta-User they contribute to, any more than the microbial biome in your gut needs to know your name. Spoofing with honeypot identities, between humans and nonhumans, is measured against the theoretical address space of IPv6 (roughly 1023 addresses per person) or some other massive universal addressing scheme. The abyssal quantity and range of “things” that could, in principle, participate in these vast pluralities includes real and fictional addressable persons, objects, and locations, and even addressable mass-less relations between things, any of which could be a sub-User in this Internet of Haeccities.

So while the Stack (and the Black Stack) stage the death of the User in one sense—the eclipse of a certain resolute humanism—they do so because they also bring the multiplication and proliferation of other kinds of nonhuman Users (including sensors, financial algorithms, and robots from nanometric to landscape scale), any combination of which one might enter into a relationship with as part of a composite User. This is where the recent shift by major Cloud platforms into robotics may prove especially vital, because—like Darwin’s tortoises finding their way to different Galapagos islands—the Cambrian explosion in robotics sees speciation occur in the wild, not just in the lab, and with “us” on “their” inside, not on the outside. As robotics and Cloud hardware of all scales blend into a common category of machine, it will be unclear in general human-robotic interaction whether one is encountering a fully autonomous, partially autonomous, or completely human-piloted synthetic intelligence. Everyday interactions replay the Turing Test over and over. Is there a person behind this machine, and if so, how much? In time, the answer will matter less, and the postulation of human (or even carbon-based life) as the threshold measure of intelligence and as the qualifying gauge of a political ethics may seem like tasteless vestigial racism, replaced by less anthropocentric frames of reference.

The position of the User then maps only very incompletely onto any one individual body. From the perspective of the platform, what looks like one is really many, and what looks like many may only be one. Elaborate schizophrenias already take hold in our early negotiation of these composite User positions. The neoliberal subject position makes absurd demands on people as Users, as Quantified Selves, as SysAdmins of their own psyche, and from this, paranoia and narcissism are two symptoms of the same disposition, two functions of the same mask. For one, the mask works to pluralize identity according to the subjective demands of the User position as composite alloy; and for another, it defends against those same demands on behalf of the illusory integrity of a self-identity fracturing around its existential core. Ask yourself: Is that User “Anonymous” because he is dissolved into a vital machinic plurality, or because public identification threatens individual self-mastery, sense of autonomy, social unaccountability, and so forth? The former and the latter are two very different politics, yet they use the same masks and the same software suite. Given the schizophrenic economy of the User—first over-individuated and then multiplied and de-differentiated—this really isn’t an unexpected or neurotic reaction at all. It is, however, fragile and inadequate.

In the construction of the User as an aggregate profile that both is and is not specific to any one entity, there is no identity to deduce other than the pattern of interaction between partial actors. We may find, perhaps ironically, that the User position of the Stack actually has far less in common with the neoliberal form of the subject than some of today’s oppositionalist formats for political subjectivity that hope (quite rightly) to challenge, reform, and resist the State Stack as it is currently configuring itself. However, something like a Digital Bill of Rights for Users, despite its cosmopolitan optimism, becomes a much more complicated, fragile, and limited solution when the discrete identification of a User is both so heterogeneous and so fluid. Are all proxy composite users one User? Is anything with an IP address a User? If not, why not? If this throne is reserved for one species—humans—when is any one animal of that species being a User, and when is it not? Is it a User anytime that it is generating information? If so, that policy would in practice crisscross and trespass some of our most basic concepts of the political, and for that reason alone it may be a good place to start.

In addition to the fortification of the User as a geopolitical subject, we also require a redefinition of the political subject in relation to the real operations of the User, one that is based not on homo economicus, nor on parliamentary liberalism, nor on post-structuralist linguistic reduction, nor on the will to secede into the moral safety of individual privacy and withdraw from coercion. Instead, this definition should focus on composing and elevating sites of governance from the immediate, suturing, interfacial material between subjects, in the stitches and the traces and the folds of interaction between bodies and things at a distance, congealing into different networks demanding very different kinds of platform sovereignty.


The Black Stacks

I will conclude with some thoughts on the Stack-we-have and on the Black Stack, the generic figure for its alternative totalities: the Stack-to-come. The Stack-we-have is defined not only by its form, its layers, its platforms, and their interrelations, but also by its content. As leak after leak has made painfully clear, its content is also the content of our daily communications, now weaponized against us. If the panopticon effect is when you don’t know if you are being watched or not, and so you behave as if you are, then the inverse panopticon effect is when you know you are being watched but act as if you aren’t. This is today’s surveillance culture: exhibitionism in bad faith. The emergence of Stack platforms doesn’t promise any solution, or even any distinctions between friend and enemy within this optical geopolitics. At some dark day in the future, when considered versus the Google Caliphate, the NSA may even come to be seen by some as the “public option.” “At least it is accountable in principle to some parliamentary limits,” they will say, “rather than merely stockholder avarice and flimsy user agreements.”

If we take 9/11 and the rollout of the Patriot Act as Year Zero for the USA’s massive data gathering, encapsulation, and digestion campaign (one that we are only now beginning to comprehend, even as parallel projects from China, Russia, and Europe are sure to come to light in time), then we can imagine the entirety of network communication for the last decade—the Big Haul—as a single, deep-and-wide digital simulation of the world (or a significant section of it). It is an archive, a library of the real. Its existence as the purloined property of a state, just as a physical fact, is almost occult. Almost.

The geophilosophical profile of the Big Haul, from the energy necessary to preserve it to its governing instrumentality understood as both a text (a very large text) and as a machine with various utilities, overflows the traditional politics of software. Its story is much more Borges than Lawrence Lessig. As is its fate. Can it be destroyed? Is it possible to delete this simulation, and is it desirable to do so? Is there a trash can big enough for the Big Delete? Even if the plug could be pulled on all future data hauls, surely there must be a backup somewhere, the identical double of the simulation, such that if we delete one, the other will forever haunt history until it is rediscovered by future AI archaeologists interested in their own Paleolithic origins. Would we bury it, even if we could? Would we need signs around it like those designed for the Yucca Mountain nuclear waste disposal site that warn off unknowable future excavations? Those of us “lucky” enough to be alive during this fifteen-year span would enjoy a certain illegible immortality, curiosities to whatever meta-cognitive entity pieces us back together using our online activities, both public and private, proud and furtive, each of us rising again centuries from now, each of us a little Ozymandias of cat videos and Pornhub.

In light of this, the Black Stack could come to mean very different things. On the one hand, it would imply that this simulation is opaque and unmappable—not disappeared, but ultimately redacted entirely. It could imply that, from the ruined fragments of this history, another coherent totality can be carved against the grain, even from the deep recombinancy at and below the Earth layer of the Stack. Its blackness is the surface of a world that can no longer be composed by addition because it is so absolutely full, overwritten, and overdetermined, that to add more is just so much ink in the ocean. Instead of tabula rasa, this tabula plenus allows for creativity and figuration only by subtraction, like scratching paint from a canvas—only by carving away, by death, by replacement.

The structural logic of any Stack system allows for the replacement of whatever occupies one layer with something else, and for the rest of the architecture to continue to function without pause. For example, the content of any one layer—Earth, Cloud, City, Address, Interface, User—could be replaced (including the masochistic hysterical fiction of the individual User, both neoliberal and neo-other-things), while the rest of the layers remain a viable armature for global infrastructure. The Stack is designed to be remade. That is its technical form, but unlike replacing copper wire with fiber optics in the transmission layer of TCP/IP, replacing one kind of User with another is more difficult. Today, we are doing it by adding more and different kinds of things into the User position, as described above. We should, however, also allow for more comprehensive displacements, not just by elevating things to the status of political subjects or technical agents, but by making way for genuinely posthuman and ahuman positions.

In time, perhaps at the eclipse of the Anthropocene, the historical phase of Google Gosplan will give way to stateless platforms for multiple strata of synthetic intelligence and biocommunication to settle into new continents of cyborg symbiosis. Or perhaps instead, if nothing else, the carbon and energy appetite of this ambitious embryonic ecology will starve its host.

For some dramas, but hopefully not for the fabrication of the Stack-to-come (Black or otherwise), a certain humanism and companion figure of humanity still presumes its traditional place in the center of the frame. We must let go of the demand that any Artificial Intelligence arriving at sentience or sapience must care deeply about humanity—us specifically—as the subject and object of its knowing and its desire. The real nightmare, worse than the one in which the big machine wants to kill you, is the one in which it sees you as irrelevant, or as not even a discrete thing to know. Worse than being seen as an enemy is not being seen at all. As Eliezer Yudkowsky puts it, “The AI does not hate you, nor does it love you, but you are made out of atoms which it can use for something else.”

One of the integral accidents of the Stack may be an anthrocidal trauma that shifts us from a design career as the authors of the Anthropocene, to the role of supporting actors in the arrival of the Post-Anthropocene. The Black Stack may also be black because we cannot see our own reflection in it. In the last instance, its accelerationist geopolitics is less eschatological than chemical, because its grounding of time is based less on the promise of historical dialectics than on the rot of isotope decay. It is drawn, I believe, by an inhuman and inhumanist molecular form-finding: pre-Cambrian flora changed into peat oil changed into children’s toys, dinosaurs changed into birds changed into ceremonial headdresses, computation itself converted into whatever meta-machine comes next, and Stack into Black Stack.

×
An earlier version of this text was presented as a keynote lecture at Transmediale: Afterglow, January 31, 2014, in Berlin. Its presentation shared the stage with another keynote by Metahaven (Daniel van der Velden and Vinca Kruk) and was given at the curatorial invitation of Ryan Bishop and Jussi Parikka, along with Kristoffer Gansing and Transmediale. My thanks to each of them. The title, “The Black Stack,” was coined by Metahaven and I to conjoin two current projects: my forthcoming book The Stack: On Software and Sovereignty (MIT Press) and Metahaven’s book Black Transparency (Sternberg Press). I chose to take up the figure of the “Black Stack” as an alternative to the current system of global calculation.

Benjamin H. Bratton is a theorist whose work spans philosophy, art, and design. He is Associate Professor of Visual Arts and Director of D:GP, The Center for Design and Geopolitics at the University of California, San Diego. His research is situated at the intersections of contemporary social and political theory, computational media and infrastructure, architectural and urban design problems, and the politics of synthetic ecologies and biologies. Current work focuses on the political geography of cloud computing, massively granular universal addressing systems, and alternate models of ecological governance. His next book, The Stack: On Software and Sovereignty, is forthcoming.

© 2014 e-flux and the author
kelley
 
Posts: 615
Joined: Wed Mar 07, 2007 8:49 pm
Blog: View Blog (0)

Re: Society Is Being Programmed By A Black Box

Postby Iamwhomiam » Sun Jun 11, 2017 1:57 pm

^^^ let the games begin!
User avatar
Iamwhomiam
 
Posts: 6572
Joined: Thu Sep 27, 2007 2:47 am
Blog: View Blog (0)

Re: Society Is Being Programmed By A Black Box

Postby chump » Wed Jun 14, 2017 10:57 am


Published on Jun 10, 2017

This entire thing fell right into my lap like so many topics have, Television,cellphones laptops and cell phone towers are ALL working in unison to dumb down the population and worse.
RFB
User avatar
chump
 
Posts: 2261
Joined: Thu Aug 06, 2009 10:28 pm
Blog: View Blog (0)

Re: Society Is Being Programmed By A Black Box

Postby Elvis » Thu Jun 15, 2017 8:02 am

^^^^


Patents by Inventor Hendricus G. Loos

Hendricus G. Loos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).


Nervous system manipulation by electromagnetic fields from monitors
Patent number: 6506148
Abstract: Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near ½ Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.
Type: Grant
Filed: June 1, 2001
Date of Patent: January 14, 2003
Inventor: Hendricus G. Loos


NERVOUS SYSTEM MANIPULATION BY ELECTROMAGNETIC FIELDS FROM MONITORS
Publication number: 20020188164
Abstract: Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near ½ Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.
Type: Application
Filed: June 1, 2001
Publication date: December 12, 2002
Inventor: Hendricus G. Loos


Remote magnetic manipulation of nervous systems
Patent number: 6238333
Abstract: Apparatus and method for remote manipulation of nervous systems by the magnetic dipole field of a rotating bar magnet. Reliance on modulation of spontaneous spiking patterns of sensory nerve receptors, and exploitation of a resonance mechanism of certain neural circuits, allows the use of very weak magnetic fields. This, together with the large magnetic moments that can be obtained with a permanent bar magnet, makes it possible to effectively manipulate the nervous system of a subject over a distance of several hundred meters, using a small portable battery-powered device. The method can be used in law enforcement for standoff situations.
Type: Grant
Filed: August 10, 1999
Date of Patent: May 29, 2001
Inventor: Hendricus G. Loos


Pulse variability in electric field manipulation of nervous systems
Patent number: 6167304
Abstract: Apparatus and method for manipulating the nervous system of a subject by applying to the skin a pulsing external electric field which, although too weak to cause classical nerve stimulation, modulates the normal spontaneous spiking patterns of certain kinds of afferent nerves. For certain pulse frequencies the electric field stimulation can excite in the nervous system resonances with observable physiological consequences. Pulse variability is introduced for the purpose of thwarting habituation of the nervous system to the repetitive stimulation, or to alleviate the need for precise tuning to a resonance frequency, or to control pathological oscillatory neural activities such as tremors or seizures. Pulse generators with stochastic and deterministic pulse variability are disclosed, and the output of an effective generator of the latter type is characterized.
Type: Grant
Filed: June 17, 1999
Date of Patent: December 26, 2000
Inventor: Hendricus G. Loos


Pulsative manipulation of nervous systems
Patent number: 6091994
Abstract: Method and apparatus for manipulating the nervous system by imparting subliminal pulsative cooling to the subject's skin at a frequency that is suitable for the excitation of a sensory resonance. At present, two major sensory resonances are known, with frequencies near 1/2 Hz and 2.4 Hz. The 1/2 Hz sensory resonance causes relaxation, sleepiness, ptosis of the eyelids, a tonic smile, a "knot" in the stomach, or sexual excitement, depending on the precise frequency used. The 2.4 Hz resonance causes the slowing of certain cortical activities, and is characterized by a large increase of the time needed to silently count backward from 100 to 60, with the eyes closed. The invention can be used by the general public for inducing relaxation, sleep, or sexual excitement, and clinically for the control and perhaps a treatment of tremors, seizures, and autonomic system disorders such as panic attacks.
Type: Grant
Filed: August 31, 1998
Date of Patent: July 18, 2000
Inventor: Hendricus G. Loos


Electric fringe field generator for manipulating nervous systems
Patent number: 6081744
Abstract: Apparatus and method for manipulating the nervous system of a subject through afferent nerves, modulated by externally applied weak fluctuating electric fields, tuned to certain frequencies such as to excite a resonance in neural circuits. Depending on the frequency chosen, excitation of such resonances causes in a human subject relaxation, sleepiness, sexual excitement, or the slowing of certain cortical processes. The electric field used for stimulation of the subject is induced by a pair of field electrodes charged to opposite polarity and placed such that the subject is entirely outside the space between the field electrodes. Such configuration allows for very compact devices where the field electrodes and a battery-powered voltage generator are contained in a small casing, such as a powder box. The stimulation by the weak external electric field relies on frequency modulation of spontaneous spiking patterns of afferent nerves.
Type: Grant
Filed: July 17, 1998
Date of Patent: June 27, 2000
Inventor: Hendricus G. Loos


Subliminal acoustic manipulation of nervous systems
Patent number: 6017302
Abstract: In human subjects, sensory resonances can be excited by subliminal atmospheric acoustic pulses that are tuned to the resonance frequency. The 1/2 Hz sensory resonance affects the autonomic nervous system and may cause relaxation, drowsiness, or sexual excitement, depending on the precise acoustic frequency near 1/2 Hz used. The effects of the 2.5 Hz resonance include slowing of certain cortical processes, sleepiness, and disorientation. For these effects to occur, the acoustic intensity must lie in a certain deeply subliminal range. Suitable apparatus consists of a portable battery-powered source of weak subaudio acoustic radiation. The method and apparatus can be used by the general public as an aid to relaxation, sleep, or sexual arousal, and clinically for the control and perhaps treatment of insomnia, tremors, epileptic seizures, and anxiety disorders.
Type: Grant
Filed: October 31, 1997
Date of Patent: January 25, 2000
Inventor: Hendricus G. Loos


Method and apparatus for associative memory
Patent number: 5995954
Abstract: A method and apparatus for an electronic artificial neural network, which serves as an associative memory that has a complete set of N-dimensional Hadamard vectors as stored states, suitable for large N that are powers of 2. The neural net has nonlinear synapses, each of which processes signals from two neurons. These synapses can be implemented by simple passive circuits comprised of eight resistors and four diodes. The connections in the neural net are specified through a subset of a group that is defined over the integers from 1 to N. The subset is chosen such that the connections can be implemented in VLSI or wafer scale integration. An extension of the Hadamard memory causes the memory to provide new Hadamard vectors when these are needed for the purpose of Hebb learning.
Type: Grant
Filed: March 18, 1992
Date of Patent: November 30, 1999
Inventor: Hendricus G. Loos


Magnetic excitation of sensory resonances
Patent number: 5935054
Abstract: The invention pertains to influencing the nervous system of a subject by a weak externally applied magnetic field with a frequency near 1/2 Hz. In a range of amplitudes, such fields can excite the 1/2 sensory resonance, which is the physiological effect involved in "rocking the baby". The wave form of the stimulating magnetic field is restricted by conditions on the spectral power density, imposed in order to avoid irritating the brain and the risk of kindling. The method and apparatus can be used by the general public as an aid to relaxation, sleep, or arousal, and clinically for the control of tremors, seizures, and emotional disorders.
Type: Grant
Filed: June 7, 1995
Date of Patent: August 10, 1999
Inventor: Hendricus G. Loos


Manipulation of nervous systems by electric fields
Patent number: 5899922
Abstract: Apparatus and method for manipulating the nervous system of a subject through afferent nerves, modulated by an externally applied weak electric field. The field frequency is to be chosen such that the modulation causes excitation of a sensory resonance. The resonances found so far include one near 1/2 Hz which affects the autonomic nervous system, and a resonance near 2.4 Hz that causes slowing of certain cortical processes. Excitation of the 1/2 Hz autonomic resonance causes relaxation, sleepiness, ptosis of the eyelids, or sexual excitement, depending on the precise frequency used. The weak electric field for causing the excitation is applied to skin areas away from the head of the subject, such as to avoid substantial polarization current densities in the brain. Very weak fields suffice for bringing about the physiological effects mentioned. This makes it possible to excite sensory resonances with compact battery powered devices that have a very low current consumption.
Type: Grant
Filed: November 14, 1997
Date of Patent: May 4, 1999
Inventor: Hendricus G. Loos


Thermal excitation of sensory resonances

Patent number: 5800481
Abstract: In man, autonomic and cortical resonances of the nervous system can be excited by inducing subliminal heat pulses in the skin by means of a resistive heat patch, laser, heat lamp, or microwave radiation, or through a slow air jet that carries a small periodic fluctuation in temperature. Deeply subliminal skin temperature oscillations of frequency near 1/2 Hz induced in a subject by any of these means cause sleepiness, drowziness, relaxation, a tonic smile, ptosis of the eyelids, a tense feeling, sudden loose stool, or sexual excitement, depending on the precise pulse frequency used. For certain higher frequencies, the induced subliminal skin temperature oscillations cause fractured thought and a slowing of certain cortical processes. The method and apparatus can be used by the general public as an aid to relaxation, sleep, or arousal, and clinically for the control and perhaps treatment of tremors, seizures, and emotional disorders.
Type: Grant
Filed: December 28, 1995
Date of Patent: September 1, 1998
Inventor: Hendricus G. Loos


Method and apparatus for manipulating nervous systems
Patent number: 5782874
Abstract: Apparatus and method for manipulating the nervous system of a subject through afferent nerves, modulated by externally applied weak fluctuating electric fields, tuned to certain frequencies such as to excite a resonance in certain neural circuits. Depending on the frequency chosen, excitation of such resonances causes relaxation, sleepiness, sexual excitement, or the slowing of certain cortical processes. The weak electric field for causing the excitation is applied to skin areas away from the head of the subject, such as to avoid substantial polarization current densities in the brain. By exploiting the resonance phenomenon, these physiological effects can be brought about by very weak electric fields produced by compact battery-operated devices with very low current assumption. The fringe field of doublet electrodes that form a parallel-plate condenser can serve as the required external electric field to be administered to the subject's skin.
Type: Grant
Filed: January 24, 1997
Date of Patent: July 21, 1998
Inventor: Hendricus G. Loos


Bipolar fog abatement system
Patent number: 4475927
Abstract: A method and system for the abatement of fog in a designated air space over an aircraft approach zone and runway, consisting of gapped air jets laden with electrically charged droplets of low mobility, a ground corona guard in the form of a shallow water-and-oil basin, and a charged-collector-drops emitting device on the ground, arranged in such a manner that the low-mobility charged droplets blown aloft by the air jets form a virtual electrode suspended at appropriate height above the ground, toward which the oppositely charged high-mobility collector drops move, thereby collecting the neutral fog drops in their paths. The perforation ratio of the gapped air jet array is chosen such that the wind flux which penetrates the jet array is substantially equal to the entrainment flux at the lee side of the jets, thereby providing for a virtual canopy over the spatial region in which the fog is to be abated.
Type: Grant
Filed: March 3, 1981
Date of Patent: October 9, 1984
Inventor: Hendricus G. Loos


Multiple wavelength instrument for measurement of particle size distributions
Patent number: 4361403
Abstract: A method for measurement of the size distribution of particles suspended in a gas or in a liquid. The particle suspension is illuminated by a collimated beam of colored light, which is produced by passing a collimated beam of substantially white light through a spectral filter which has spatial sections of narrow spectral passband in the blue, green and red. Part of the light scattered by the particles is collected by a lens and is passed through a spatial filter placed in the focal plane of the lens. The light transmitted by the filter is measured by a photodetector. The photodetector output is measured as different spatial filters are switched in place. A computer, microprocessor, or analog device acts on the measured values and produces the particle size distribution as an output. The data reduction algorithm consists of a linear transformation of the measured data vector, followed by the construction of a linear combination of basis functions for the size distribution.
Type: Grant
Filed: January 21, 1980
Date of Patent: November 30, 1982
Inventor: Hendricus G. Loos


Dispersive instrument for measurement of particle size distributions
Patent number: 4338030
Abstract: A method for measurement of the size distribution of particles suspended in a gas or in a liquid. The particle suspension is illuminated by a collimated beam of substantially white light. Part of the light scattered by the particles is collected by a lens and is passed through a slit placed in the focal plane of the lens. The light transmitted by the slit is made to pass through a dispersive element which causes spectral decomposition of the processed light in a direction perpendicular to the slit. A spatial filter is placed in the exit plane of the dispersive element; the transmittance of this filter is a function of position on the filter. The light transmitted by the filter is measured by a photodetector. The photodetector output is measured as different spatial filters are switched in place. A computer, microprocessor, or analog device acts on the measured values and produces the particle size distribution as an output.
Type: Grant
Filed: March 18, 1980
Date of Patent: July 6, 1982
Inventor: Hendricus G. Loos


Optical instrument for measurement of particle size distributions
Patent number: 4245909
Abstract: A method for measurement of the size distribution of particles suspended in a gas or in a liquid. The particle suspension is illuminated by a collimated beam of nearly monochromatic light. Part of the light scattered by the particles is collected by a lens and is passed through a spatial filter placed in the focal plane of the lens. The light transmitted by the filter is measured by a photodetector. The photodetector output is measured as different spatial filters are switched in place. A computer, microprocessor, or analog device acts on the measured values and produces the particle size distribution as an output. The data reduction algorithm consists of a linear transformation of the measured data vector, followed by the construction of a linear combination of basis functions for the size distribution. The spatial filters consist of transparencies with non-uniform transmittance functions.
Type: Grant
Filed: June 26, 1978
Date of Patent: January 20, 1981
Inventor: Hendricus G. Loos


http://patents.justia.com/inventor/hendricus-g-loos




Who is Hendricus G. Loos?

Patent US6091994
Patent US6017302
Patent US5782874

And the list goes on… Almost all patents in his name are related to Mind Control.

Could the name be an anagram for “Source Holdings” or “US Core Holdings” ?
1 Answer
Tapan Mukherjee
Tapan Mukherjee, studied at University of Jammu
Answered Apr 25

The name Hendricus G. Loos does not belong to a person, its a fictitious name. Perhaps the person working behind this name is Professor Ross Adey , who qualified in Medicine from Australia, then came to Oxford University to study brain physiology . Then he joined University of California in 1954, later joined the Brain Research Institute in 1961. He mainly studied the effects of ELF & microwaves on human brain and nervous system. He developed several devices for remote mind control and manipulation of nervous system which were later patented in US. There could be a few other such professionals and scientists, who developed the Mind Control devices under a single fictitious name 'Dr Hendricus G. Loos', actually working for DARPA or CIA, so as not to attract the attention of the Media or investigators.

As per available records Dr Hendricus G. Loos( fictitious ) was associated with Plasmadyne Corporation during the late fifties. He published an article about Yang-Mills field in 1969 in American Physical Society Journal. He had set up a shop in Fallbrook, California and developed Lagoona Research Laboratory. Then he worked with the department of Defence , US; department of Health & Human Services and Defence Advance Research Projects Agency ( DARPA) where he spent most of his time. In 2003 , he became the President of Cuewave Corporation. Dr Loos filed for business licence ( entity no-C2396570). Company's own site www.cuewave.com is nothing more than a copy of site for advertising business. Any search for business yields nothing more than directory listings. The listings themselves provide little additional data other than the business is listed for commercial physical research and has a standard industrial classification (SIC) with code of 8731(10) This classifies them for commercial, physical and biological research. He is also referred to as Dr Henry Loos or Dr Hank Loos. Since 1978 , he has been awarded 11 patents by US for devices mainly aiming for human nervous system manipulation. Some examples are:

USP# 3009080- Apparatus and method for generating and containing plasma having ultra high temperatures.
USP# 4245909- An optical instrument for measurement of particle size distribution.
USP# 6238333- Remote magnetic manipulation of nervous systems.
USP# 6091994- Pulsative manipulation f nervous systems.
USP# 5782874- Method and apparatus for manipulating nervous system.
USP# 6017302- Subliminal acoustic manipulation of nervous system.
USP# 6506148-Nervous system manipulation by electromagnetic fields from monitor.

All devices are used for Mind Control projects run by CIA or other intelligence agencies. A group of researchers( under the name Dr H Loos) were actually a group of hired professionals for researching and inventing such devices which could be developed and used for mass mind control, PSYOPS, behaviour modification later by CIA.

1.2k Views · 5 Upvotes · Answer requested by Dinu Antony

https://www.quora.com/Who-is-Hendricus-G-Loos
“The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.” ― Joan Robinson
User avatar
Elvis
 
Posts: 7435
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Previous

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 16 guests