If you haven't already been informed, the new iPhone X was announced September 12, 2017. While the $1,000 device represents a whole new era of technological achievement, many of the new capabilities should raise some concern. Most notable is Face ID; the ability to unlock the device with the user's face and eyes. This feat is accomplished by a number of new sensors built into the front-facing screen, including a dot projector, infrared camera, flood illuminator and proximity sensor. By projecting a field of over 30,000 invisible dots out into the environment, together these sensors are able to constantly scan for and map the geometry of the user's face to unlock the device from multiple angles, even in the dark. In other words, your face is your password. The technology is able model faces and adapt to the changing landscape and aspects of a person’s face as they grow and change. Apple states that the biometric data is stored locally on the device and claims that Face ID cannot be fooled by photographs of faces. Beyond the obvious question, "why is this necessary?", delving deeper into the device and it's data ties with the intelligence agencies, should raise skepticism regarding the true intentions behind the technology.
Privacy Violation: Governments Spying Via iPhones
According to hundreds of leaked documents via Wikileaks, as many as 160 intelligence contractors in the mass surveillance industry may have access to the data on a single cellular device. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers - no matter the country. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by. In addition, systems to infect every Facebook user, or smart-phone owner of an entire population group are and have been on the intelligence market since the rise of the patriot act, due to events that took place on September 11, 2001.
Companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. These speech analysis tools are able to identify individuals by gender, age and stress levels and track them based on ‘voiceprints’.
DROPOUTJEEP, a spyware said to be one of the tools employed by the NSA's ANT (Advanced or Access Network Technology) division, is able to gain backdoor access to various electronic devices. DROPOUTJEEP can infiltrate virtually all areas of the iPhone (not only the iPhone X), including voice mail, contact lists, instant messages, and cell tower location.
The general response among people who have justified and have been normalized to privacy violation after reading this is, "I have nothing to hide." Why is it that one closes the door when they use the restroom? Or why does one have a password on their phone is the first place? Akin to freedom of speech, privacy is, or should be, a basic human right. But the reality is that the right to privacy no longer exists. By waiving your freedom of privacy and saying, "I have nothing to hide", is equivalent to waiving your freedom of speech and saying, "I have nothing to say."
Normalizing Facial Scanning
Have you had your fingerprints taken for government ID? Your irises scanned? Your earlobes measured? A microchip implanted? Are you prepared to? Where will you draw the line? Acknowledged or not, this technology is normalizing facial scanning. Let us not be naive, this is a coordinated plan to institute a worldwide biometric id system to track every human on the planet.
Faces Contain a Significant Amount of Data
The science of judging one’s character from their facial characteristics, or physiognomy, dates back to ancient China and Greece. Aristotle and Pythagoras were among its disciples, and the latter used to select his students based on their facial features. Cesare Lombroso, the founder of criminal anthropology, believed that criminals could be identified by their facial features. There is a growing body of evidence suggesting that character can influence one’s facial appearance, and vice versa. The appearance of an individual's face drives first impressions of others, influencing our expectations and behavior toward them, which, in turn, shapes their character.
The existence of such links between facial appearance and character is supported by the fact that people can accurately judge others’ character, psychological states, and demographic traits from their faces. Some people can easily and accurately identify others’ gender, age, race, or emotional state — even from a glimpse of their faces. However others may lack the ability to detect or interpret them.
Case in point, a patent filed in 2014 by Facebook described plans to detect users emotions and deliver specific content, based on those emotions, through computing devices such as laptops, mobile phones and tablets that have a digital camera.
Recent progress in AI and computer vision has been largely driven by the widespread adoption of deep neural networks (DNN), or neural networks composed of a large number of hidden layers. DNNs mimic the neocortex by simulating large, multi-level networks of interconnected neurons. DNNs excel at recognizing patterns in large, unstructured data such as digital images, sound, or text, and analyzing such patterns to make predictions. DNNs are increasingly outperforming humans in visual tasks such as image classification, facial recognition, or diagnosing skin cancer. The superior performance of DNNs offers an opportunity to identify links between characteristics and facial features that might be missed or misinterpreted by the human brain.
Michal Kosinski, a Stanford University professor, conducted research suggesting that artificial intelligence (AI) can detect the sexual orientation of people based on photos. He mentions that sexual orientation was just one of many characteristics that algorithms would be able to predict through facial recognition. Using photos, AI will be able to identify people’s political views, whether they have high IQs, whether they are predisposed to criminal behavior, whether they have specific personality traits and many other private, personal details that could carry huge social consequences, he said.
Faces contain a significant amount of information, and using large datasets of photos, sophisticated computer programs can uncover trends and learn how to distinguish key traits with a high rate of accuracy. With Kosinski’s AI, an algorithm used online dating photos to create a program that could correctly identify sexual orientation 91% of the time with men and 83% with women, just by reviewing a handful of photos.
A Feature Able to be Used Against One's Will
The iPhone X’s facial recognition capabilities could spell disaster for those wanting to keep their private data from the prying eyes of law enforcement.
While the convenience of not having to lift a finger to unlock a phone is being touted as a selling point by Apple, the potential for privacy invasion at the hands of police has people worried. Police require a warrant to unlock and check your phone, but they don’t need one to compel you to use your fingerprint to unlock it.
Run through the following scenario: Police demand access to your iPhone X. Cannot compel you without warrant? No problem, they turn phone to face you, unlocks with FaceID.
In 2014, a Virginia judge ruled police could force users to unlock their phones using their fingerprints. In February 2016, a judge in Los Angeles signed a search warrant to make a woman unlock her iPhone with her fingerprint. Due to Fifth Amendment protections around self-incrimination in the US, police can’t force a person to give over their passcode, as it’s considered “knowledge.” Albeit, a fingerprint or a face, however, is a different scenario. This is worrying for the vast amount of people who are unlawfully detained and illegally searched.
Data Being Used Against the User
Beyond the violation of privacy, there are larger implications by which the intelligence agencies are able to hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in.
With the help of this facility, and many others like it, each day the NSA is able to intercept and store 1.7 billion electronic communications. Since it's inception, this secret industry has boomed and is worth billions of dollars per year.
There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies. Around the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale. The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.
Sentient World Simulation
Remarkably, this is precisely what is happening.
It is called the “Sentient World Simulation.” The program’s aim, according to its creator, is to be a “continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action.” In practical terms that equates to a computer simulation of the planet complete with billions of “nodes” representing every person on the earth.
The project is based out of Purdue University in Indiana at the Synthetic Environment for Analysis and Simulations Laboaratory. It is led by Alok Chaturvedi, who in addition to heading up the Purdue lab also makes the project commercially available via his private company, Simulex, Inc. which boasts an array of government clients, including the Department of Defense and the Department of Justice, as well as private sector clients like Eli Lilly and Lockheed Martin.
The program can be used to predict what would happen in the event of a large scale tsunami, for example, or how people would react during a bioterror attack. Businesses can use the models to predict how a new product would fare in the market, what kind of marketing plans would be most effective, or how best to streamline a company’s organization.
The original concept paper for the project was published in 2006 and in 2007 it was reported that both Homeland Security and the Defense Department were already using the system to simulate the American public’s reaction to various crises. In the intervening five years, however, there has been almost no coverage at all of the Sentient World Simulation or its progress in achieving a model of the earth.
The Sentient World Simulation is one example of one program run by one company for various governmental and Fortune 500 clients. But it is a significant peek behind the curtain at what those who are really running our society want: complete control over every facet of our lives achieved through a complete invasion of everything that was once referred to as “privacy.”
Ultimately, it should be noted that all technology can be used as either a tool or as a weapon. But when the technology is in the hands of multinational, monopoly corporations with government influences and coercion, it may be best to side with skepticism and not with open arms.
Corbett, J. (2012). Sentient World Simulation: Meet Your DoD Clone : The Corbett Report. [online] Corbettreport.com. Available at: https://www.corbettreport.com/sentient-world-simulation-meet-your-dod-clone/ [Accessed 24 Sep. 2017].
Krannert.purdue.edu. (2017). Seas Labs. [online] Available at: http://www.krannert.purdue.edu/centers/perc/html/aboutperc/seaslabs/seaslabs.htm [Accessed 24 Sep. 2017].
Priest, D. and Arkin, W. (2010). A hidden world, growing beyond control (Printer friendly version)| washingtonpost.com. [online] Projects.washingtonpost.com. Available at: http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/print/ [Accessed 24 Sep. 2017].
RT International. (2017). iPhone X facial recognition could give cops easy access to your cell. [online] Available at: https://www.rt.com/news/403229-iphone-face-id-police/ [Accessed 24 Sep. 2017].
Wang, Y., & Kosinski, M. (2017). Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. Journal of Personality and Social Psychology
Wikileaks.org. (2014). WikiLeaks - The Spy Files. [online] Available at: https://wikileaks.org/the-spyfiles.html [Accessed 15 Sep. 2017].
In the details of the document, air temperature within the eye and in the outflow of a hurricane is able to be raised by flying scores of jet planes with afterburners in the structure. It should be noted that small changes in temperature on a large scale bring in large changes in other variables on the smaller scale to change the direction and intensity of the hurricane.
Cloud seeding is a known process for artificially modifying the weather by injecting a composition into a cloud for formation of an ice freezing nuclei. Silver iodide is a well known substance used for cloud seeding. The Storm fury project carried out by the US Government for several years focused on hurricane formation suppression by means of aerial dispersion of silver iodide. This project was evaluated as a failure and cancelled.
In 1976, William Gray et al., suggested that the use of carbon black (or soot) might be a good way to modify tropical cyclones. The idea was that one could burn a large quantity of a heavy petroleum to produce vast numbers of carbon black particles that would be released on the edges of the tropical cyclone in the boundary layer. These carbon black aerosols would produce a heat source simply by absorbing the solar radiation and transferring the heat directly to the atmosphere. This would provide for the initiation of thunderstorm activity outside of the tropical cyclone core and weaken the eye wall convection. In 1958, the US Naval Research laboratory carried out some experiments to monitor clouds seeded with soot but the results were inconclusive.
As described in the patent, there are several "advantages", for the existence and application of this technology:
Patents Related to Weather Modification
Below is a list composed of some of the patents that describe abilities to modify weather:
Project Popeye - Cloud Seeding During Vietnam War
Project Popeye was a highly classified weather modification program in Southeast Asia during 1967–1972. The objective of the program was to produce sufficient rainfall along these lines of communication to interdict or at least interfere with truck traffic between North and South Vietnam.
A test phase of Project Popeye was approved by State and Defense and conducted during October 1966 in a strip of the Lao Panhandle generally east of the Bolovens Plateau in the valley of the Se Kong River. The test was conducted without consultation with Lao authorities (but with Ambassador Sullivan’s knowledge and concurrence).
During the test phase, more than 50 cloud seeding experiments were conducted. The results are viewed by DOD as outstandingly successful.
The experiments were deemed undeniably successful, indicating that, at least under weather and terrain conditions such as those involved, the U.S. Government has realized a capability of significant weather modification. If anything, the tests were “too successful”—neither the volume of induced rainfall nor the extent of area affected can be precisely predicted (Department of State - Office of the Historian, 1967).
Project Stormfury - An Attempt to Modify Hurricanes
Project Stormfury was an attempt to weaken tropical cyclones by flying aircraft into them and seeding with silver iodide.
The project was run by the United States Government from 1962 to 1983.The hypothesis was that the silver iodide would cause supercooled water in the storm to freeze, disrupting the inner structure of the hurricane. This led to the seeding of several Atlantic hurricanes. However, it was later shown that this hypothesis was incorrect. In reality, it was determined most hurricanes do not contain enough supercooled water for cloud seeding to be effective. Additionally, researchers found that unseeded hurricanes often undergo the same structural changes that were expected from seeded hurricanes. This finding called Stormfury’s successes into question, as the changes reported now had a natural explanation.
The last experimental flight was flown in 1971, due to a lack of candidate storms and a changeover in NOAA’s fleet. More than a decade after the last modification experiment, Project Stormfury was officially canceled. Although a failure in its goal of reducing the destructiveness of hurricanes, Project Stormfury was not without merit. The observational data and storm lifecycle research generated by Stormfury helped improve meteorologists’ ability to forecast the movement and intensity of future hurricanes.
Former CIA Director, John Brennan, Discusses SAI or "Chemtrails"
A number of government agencies have developed plans for research and operational programs in weather and climate modification. Here is a report from 1966, in which various agencies expressed interest in the ability to modify the weather. In 2015, the National Academy of Sciences conducted a 21-month geoengineering study, which happened be funded by the "U.S Intelligence community", also known as the Central Intelligence Agency (National Academy of Sciences, 2015). Below is a video of John Brennan, former CIA director from March 2013 to January 2017, speaking about stratospheric aerosol injection (SAI), commonly referred to as "chemtrails", at the Council on Foreign Relations.
Research Suggests Climate Engineering is Ineffective
Scientists at Helmholtz Centre for Ocean Research (Kiel, Germany) conducted a study where they evaluated effectiveness and risks of different geoengineering techniques, such as SRM (solar radiation management), afforestation, artificial ocean upwelling, ocean iron fertilization and ocean alkalinization.
The researchers discovered that even when applied continuously and at scales as large as currently deemed possible, all methods are, individually, either relatively ineffective
with limited (o8%) warming reductions, or they have potentially severe side effects and cannot be stopped without causing rapid climate change (Keller, Feng and Oschlies, 2014).
To assess their true potential and verify their side effects, such interventions require full-scale experiments that may have long-term and possibly compromise the very planetary mechanisms and ecosystems we’re trying to save.
Potential Proof of Weather Manipulation
In the photos below, several abnormal cloud formations with a seemingly unnatural origin, containing straight lines and 90° angles, can be observed.
Based on the information aforementioned, toxic materials, heavy metals, and harmful chemicals are able to be positioned in the atmosphere of the planet. Many speculate that these particles may be manipulated by powerful radio frequency signals, in which a strange impact on clouds can be observed. In addition, it is claimed that these square clouds are created via electrically conductive heavy metal nanoparticles (that are constantly being sprayed into our atmosphere by the the geoengineers) which are able to be manipulated with the global grid of radio frequency transmitters. Some suggest that these radio frequencies have originated from ionospheric heaters like HAARP (High Frequency Active Auroral Research Program) in Gakona, Alaska, the most notable U.S. geoengineering facility. HAARP wasscheduled for shut down by the U.S. Air Force in May, 2014. There are many other transmission installations around the world, some officially known and others completely secret.
U.S. Senate Document Reveals Weather Modification
The United States Federal government has been involved for over 60 years in a number of aspects of weather modification, through activities of both the Congress and executive branch. Since 1947, weather modification bills pertained to research support, operations, policy studies, regulations, liabilities, activity reporting, establishment of panels and committees, and international concerns have been introduced in the Congress. There have been hearings on many of these proposed measures, and oversight hearings have also been conducted on pertinent ongoing programs. In the 750-page document below, various topics regarding weather modification are discussed, including but not limited to:
Weather Warfare Explained Further
Department of State - Office of the Historian. (1967). Foreign Relations of the United States, 1964–1968, Volume XXVIII, Laos - Office of the Historian. [online] Available at: https://history.state.gov/historicaldocuments/frus1964-68v28/d274#fnref:126.96.36.199.14.336.7.6 [Accessed 12 Sep. 2017].
Keller, D., Feng, E. and Oschlies, A. (2014). Potential climate engineering effectiveness and side effects during a high carbon dioxide-emission scenario. Nature Communications, 5. https://doi.org/10.1038/ncomms4304
Wigington, D. (2016). Is Climate Engineering Real? Square Cloud Formations Are Undeniable Proof. [online] Geoengineering Watch. Available at: http://www.geoengineeringwatch.org/is-climate-engineering-real-square-cloud-formations-are-undeniable-proof/ [Accessed 12 Sep. 2017].
This feed contains research, news, information, observations, and ideas at the level of the world.