---BREAKAWAY CIVILIZATION ---ALTERNATIVE HISTORY---NEW BUSINESS MODELS--- ROCK & ROLL 'S STRANGE BEGINNINGS---SERIAL KILLERS---YEA AND THAT BAD WORD "CONSPIRACY"--- AMERICANS DON'T EXPLORE ANYTHING ANYMORE.WE JUST CONSUME AND DIE.---
The massive internet brain is some 500 times bigger
than what we web users can actually see. Search engines only index a
fraction of the web pages online, and the rest of the internet remains
hidden from view—thousands of terabytes of invisible
information. Unsurprisingly, the Defense Department wants to gain access
to the internet's hidden data, and it has a plan to create an entirely
new search paradigm for the military, law enforcement, and intelligence
agencies to use to shine a light on the deep web.
Yesterday DARPA called for proposals to create a next-gen search engine to "revolutionize the discovery, organization and presentation of search results." The
project's name, Memex, a portmanteau of "memory" and "index," comes
from a way-ahead-of-its-time concept for indexing the world's
information that was floated in 1945 by scientist Vannevar Bush, and eventually led to the invention of hypertext, the World Wide Web, and personal computers.
More
on that later; first, here’s how DARPA plans to access the invisible
web. The agency laid out what it sees as the shortcomings
of search today: It ignores shared content across web pages, doesn't
save browsing sessions or allow results to be shared with collaborators.
It doesn't crawl sites that aren't indexed, only organizes results in a
list of links, and requires entering the exact right text to get the
results you’re looking for.
Most
importantly, it's centralized—search today is a one-sized-fits-all
product. Instead, DARPA wants a system that can tailor searches to focus
on a specific topic, or realm of the internet. It would automate the
process, continuously crawling the web for a mission-specific subject,
and would leverage image recognition and natural language technology to
find content beyond plugging in certain keywords.
It
would also drastically expand the scope of what is indexed, to include
"link discovery and inference of obfuscated links, discovery of deep
content such as source code and comments, discovery of dark web content,
hidden services, etc,” according to the project report.
The
idea is to eventually use the personalized indexing to comb through the
hoards of information that are in the public domain but currently not
indexed. But first, the military would focus on hunting down human
traffickers, and the modern-day slave trade that lives largely on the
web in forums, chats, advertisements, job postings, and hidden services.
It’s also eyeing the counterfeit goods, missing people, and found data
realms.
Naturally,
the government trying to pry into every nook and cranny of the internet
is a loaded topic right now. But the defense agency claimed, for what
it's worth, that while it's sniffing around the deep web it's not trying
to out any anonymous users or spy on anyone. It states it's
"specifically not interested in proposals for the following: attributing
anonymous services deanonymizing or attributing identity to servers or
IP addresses, or gaining access to information which is not intended to
be publicly available." But exactly
how the DoD plans to bust sex traffickers in the hidden web without
deanonymizing users or identifying IP addresses, you’ve got me.
That
mystery aside, the mid-Century memex contraption that's inspired
DARPA's latest project is fascinating in retrospect. The agency is
drawing on an idea first conceived during World War II, and described by
Bush in an Atlantic article called As We May Think.
Bush
wrote that when the war is over, scientists should get to work on the
"massive task of making more accessible our bewildering store of
knowledge." Decades before the personal computer came along, Bush
imagined a "device," he named memex, that would be used a a mechanism
for finding and organizing the world's information, basically acting as a
mechanical backup for the human brain.
Memex animation - Vannevar Bush's diagrams made real
He
imaged a desk with a keyboard, buttons, levers, and two slated
translucent screens for reading. It could store troves of
information—books, articles, scientific work all stored as microfilm.
Users would consult the record by inputting a code to pull up a certain
book, and pulling the lever to scan through the pages backward and
forward. They could also use a stylus to take notes on the second
screen.
But
where Bush's proto-hypertext vision deviates from modern day search is
that he envisioned being able to save and build on "trails" of
information gathering—like going down a series of Wikipedia rabbit holes
and then being able to save that adventure, recall it later, and share
it with other researchers.
Per As We May Think:
Wholly
new forms of encyclopedias will appear, ready made with a mesh of
associative trails running through them, ready to be dropped into the
memex and there amplified. The lawyer has at his touch the associated
opinions and decisions of his whole experience, and of the experience of
friends and authorities. The patent attorney has on call the millions
of issued patents, with familiar trails to every point of his client's
interest. The physician, puzzled by a patient's reactions, strikes the
trail established in studying an earlier similar case, and runs rapidly
through analogous case histories, with side references to the classics
for the pertinent anatomy and histology.
In
a nutshell, Bush wanted to mimic how the human brain thinks, learns,
and remembers information. Which is exactly what artificial intelligence
researchers at the DoD and in Silicon Valley
are trying to do now, to glean better insights from the unruly army of
big data being collected by web giants and the military alike.
Now
DARPA plans to extend that next-gen capability to the deep web, or at
least try to—a rather unsettling prospect regardless of the agency’s
no-spying disclaimer. While I’m all for improving search and unveiling
the internet’s untapped information, what are implications for people
with good reason to stay in the digital dark—users trying to evade
censorship, whistleblowers, journalists, and activists? Exactly how much
light does the military want to shine on the hidden web?
Drug traffickers, forgers and hackers use the deep web and bitcoins to avoid detection of their lucrative trade
Chinese
underworld traders are now making inroads into "crypto-markets", the
notorious trading places of contraband goods and untraceable digital
currencies, in the "deep web" where sites are not reachable by search
engines.
The South China Morning Post has found several traders on crypto-markets operating from the Chinese mainland and Hong Kong.
They offer "hard to get" Colombian cocaine, Chinese-made
methamphetamine for export to the rest of the world, Chinese passports
and Hong Kong university diplomas, among other contrband goods, all
deliverable to your doorstep.
Customers can buy bitcoins with real-world currency in online
exchanges and then use the digital currency to buy products on
crypto-markets such as Silk Road, Pandora or Alpaca. Sellers can then
convert their earnings into real currency without leaving a paper trail
like traditional bank transfers. Workers prepare a drug similar to MDPV at a laboratory in Shanghai. Photo: Alex Hofford / Sinopix[1]
At least nine traders on the dark web’s markets said they sell
narcotics to the rest of the world out of the Chinese mainland. Their
offers include "well-cured" marijuana from Yunnan province, "pure"
synthetic stimulants and Ecstasy pills.
One trader identified as Dr Zheng, who charges US$20 (HK$155) for a
gram of "bath salt" narcotics and offers free global shipping, started
trading on the Silk Road platform in November last year.
Dr Zheng offers 207 types or quantities of narcotics delivered from
China, and claims to provide domestic delivery in the US, New Zealand
and within the European Union, skirting import customs checks there. "If
you want to resell in your region please get in touch," the trader
wrote in a message to custumers. A screenshot of cocaine sold to customers in China in the deep web. [2]
Another trader identified as Aracay charges HK$2,650 for a Hong Kong
or Chinese university diploma on the C9 crypto-market. "You won’t get
better quality elsewhere," the trader wrote. "Don’t risk getting
scammed."
A fake Hong Kong ID card or driver's licence scan sells for HK$187.40
on Evolution, another crypto-market. Scans sometimes suffice as proof
of identity for bank accounts or rental contracts. If not, sellers offer
entirely new identities including passports, credit cards and forged
utilities bills.
Customer reviews and product popularity statistics based on sales
records seem indicate that thousands of such transactions have occurred
in the past months.
These deep web traders have sprouted up only months after US federal
police claimed to have dealt a fatal blow to crypto-market operators.
On October 1 last year, officers from the US Drug Enforcement
Administration arrested Ross William Ulbricht. The 29-year old was
accused of being the man behind Silk Road, the deep web’s main
crypto-market at the time, which according to US prosecutors had grown
into a US$1 billion business selling narcotics, forgeries and hacking
services.
Police seized US$150 million in bitcoins following the arrest. In
February, he pleaded not guilty to charges of drug trafficking, computer
hacking and money laundering.
Yet, online illicit drug trading has expanded rapidly since Silk Road
was closed down, said Dr James Martin, director of research at the
Centre for Policing, Intelligence and Counterterrorism at Macquarie
University in Sydney, Australia. Cocaine seized by US forces in 18 separate interdictions shown by the US Coast Guard on Tuesday in San Diego. Photo: Reuters[3]
“The online drugs market is estimated to be bigger than ever, with
dozens of crypto-markets now in operation,” he said. “In some ways, the
closure of Silk Road actually facilitated the strength and diversity of
the contemporary online drugs market by removing a dominant player and
stimulating greater competition and innovation.”
Only 34 days after Ulbricht’s arrest, the site was running again. In a
statement, the new Silk Road 2.0 said it was “transforming a
notoriously-violent industry into a safe online marketplace”.
“Silk Road is not a marketplace,” the statement concludes, “it’s a global revolt.”
A recent study suggested that Silk Road has now been overtaken by
Agora, another crypto-market, which in August had 16,137 listings,
three-quarters of them narcotics, according to the Digital Citizens
Alliance, an internet security advocacy group.
Drug listings the group found on the dark web increased 28.7 per cent to to 41,207 in the first eight months of 2014. [4]
Among the thousands of listings the Post uncovered, hundreds
come from China. On Friday, police in Beijing said they have detained
some 30,000 people involved in cybercrimes in a concerted campaign that
began in 2011.
Entering the dark web is only the latest step that Chinese traders of
illicit goods have taken to prevent prosecution. Smuggled cigarettes
and fake ID cards have been traded for years on traditional online
retail sites under code names.
So called “bath salts”, synthetic stimulants, can be found for sale on many Chinese retail websites.
Federal agents in the US busted the largest known case of "bath
salts" imports from China in 2011. Over the span of two years, a
business owner in Syracuse, New York, received 89 shipments of the
synthetic narcotic, each between one and two kilograms, from China
Enriching Chemistry, a company headquartered in Shanghai with a factory
in Jiangsu province. Eric
Chang, owner of CEC Limited, is checking bags of an unidentified 'new
product' in his laboratory in Shanghai, China. Photo: Alex Hofford /
Sinopix[5]
Zhang Lei, alias Eric Chang, who ran the company and was named in US
court documents, was arrested by Chinese police last year, according to
an NPR report.[6]
China Enriching Chemistry remains in operation, according to a
staffer reached by phone. He declined to comment on reports that Chang
exported bath salts.
A recent study by two criminologists, Dr Judith Aldridge at the
University of Manchester and Dr David Décary-Hétu at the University of
Lausanne, noted that crypto-markets like Silk Road are still relatively
small in the overall international drug trade.
“Just as computers changed the way we manage and consume information,
crypto-markets have the potential to change how drug markets operate in
a way that may set back regulation efforts by decades,” they wrote.
“Crypto-markets may very well become the innovation that fundamentally
changes the drug trade in the decades to come.”
SPecial Executive for Counter-intelligence, Terrorism, Revenge and Extortion.
By: Jay
Pondering the news attention the famed Pink Panther diamond ring has garnered,
I was reminded of something out of a Bond novel. Judging by the
2D news narrative, we are expected to believe that this ring of some
two hundred crooks operates under unknown leaders plotting in the dark,
as noble authorities and intelligence officials feverishly work ’round
clock to apprehend the fiends. Diamonds Are Forever might be more appropriate, but in Fleming’s 1958 novel Dr. No,No makes an equally prescient and insightful statement about black market operations and their fierce master, shadow government:
“Mr. Bond, power is sovereignty.
Clausewitz’s first principle was to have a secure base. From there one
proceeds to freedom of action. Together, that is sovereignty. I have
secured these things and much beside. No one else in the world possess
them to the same degree. They cannot have them. The world is too
public. These things can only be secured in privacy. You talk of kings
and presidents. How much power do they possess? As much as their
people will allow them. Who in the world has the power of life and
death over his people? Now that Stalin is dead, can you name any man
except myself? And how do I possess that power, that sovereignty?
Through privacy. Through the fact that nobody knows. ” (pg. 161)
This writer has noted many times the principle of psychological
warfare employed by Fleming in the Bond novels that proved tremendously
effective – project every dark, secret, nefarious operation your side is
engaged in on the enemy. Also, be sure to make your enemy out to be a
disfigured hybrid mulatto for good measure (Dr. No was a Chinese and
German mixed racial villain). In the story, Dr. No has established his
secret base of operations on a secretive island off the coast of
Jamaica, where, in his secret underground mountain fortress and with his
secret high-tech radar and surveillance equipment from Moscow, he
remotely commandeers US missiles. Dr. No’s cover is the nasty
business of farming guano, or bird dung for fertilizer. With all the
usual Fleming tropes, No emerges in the narrative as an exemplary figure
of the sexually repressed daddy-issues villain, with connections to
international crime, espionage, the Soviets, and money laundering. Dr.
No is thus an exemplary figure of shadow government, and shadow
government is the normative form of government in our day.
HAIL COBRA! Image: Geek.com
In reality, the hierarchical pyramid of global government is not a
series of goodly nation-states seeking to protect the “free world” from
dastardly Manichaean dialectical manifestations, but rather
is itself is a large interlocking system of crime syndicates. The world
government that presently exists is one of covert, hidden rulership by
various oligarchs. While a certain level of competition exists and is
tolerated, these oligarchical Dr. Nos are not the denizens of secret
Soviet underground lairs, but Bilderberg attendees and banking
magnates. It is my thesis that whatever you see Dr. No or Blofeld or
SMERSH or SPECTRE do, is in fact what the actual establishment itself
does. The appellation of “rogue villain” or “rogue state” is rather a
media propaganda term for a controlled double agent, such as a
terrorist, or a rival syndicate to whatever crime syndicate happens to
be in power and run the media.
Yet is my claim the case? Evidence from numerous investigative
journalists, analysts and historians answers in the affirmative. In his
classic Tragedy & Hope, Dr. Carroll Quigley speaks of government by monopolistic money cartel that developed in the modern era:
“Naturally, the influence of bankers over
governments during the age of financial capitalism (roughly 1850-1931)
was not something about which anyone talked freely, but it has been
admitted frequently enough by those on the inside, especially in
England. In 1852 Gladstone, chancellor of the Exchequer, declared, “The
hinge of the whole situation was this: the government itself was not to
be a substantive power in matters of Finance, but was to leave the Money
Power supreme and unquestioned.”
On September 26, 1921, The Financial Times wrote,
“Half a dozen men at the top of the Big Five Banks could upset the
whole fabric of government finance by refraining from renewing Treasury
Bills.” In 1924 Sir Drummond Fraser, vice-president of the Institute of
Bankers, stated, “The Governor of the Bank of England must be the
autocrat who dictates the terms upon which alone the Government can
obtain borrowed money.” (pg. 61)
“Do you like my Mao suit? I borrowed it from Blofeld.”
Our political leaders are nothing more than puppets of the same
monopolistic cartel, but the point to grasp here concerns altering one’s
perception of the establishment as the authoritative white hat “good
guy” fighting the international “black hats” of diamond heists and
underground terrorist bases. It is the establishment that is
the ruling mafia cartel, and the control of black markets is key to
understanding what is meant by “shadow government.” Their goal is
global government and the control of all aspects of life, and
unfortunately some aspects of life in this world involve black markets.
We often speak of the “new world order” taking over governments or
conspiring to manipulate some event or subvert some institution, but the
best lens through which to grasp its true inner workings is
international crime and its syndicates. And is the best model because
the globalists run the international crime rackets. Investigative
journalist Michael Ruppert explained this piece of the puzzle in his Crossing the Rubicon:
“Globalization, the World Trade
Organization, NAFTA, the IMF, the World Bank, the Great Bull Market of
the 1990s, and the economic adulthood of the Empire have all been
nurtured by the controlled and directed use of criminal money streams.
One of the other great contributors to America’s economic growth has
been its willingness to profit from the destruction of the life, health,
safety, and happiness of its population. As I write, more than two
million people are in prisons or jails in the United States. Many of
those prisons are run by private corporations. That the profits of crime
and war, which are destructive of human life, of labor, of happy,
healthy neighborhoods (whether in the US or in Afghanistan, Africa, and
Iraq), are in effect a keystone of the global economy and a determinant
of success in a ruthless competition, is a compass needle for
human civilization. One cannot expect to follow the recipe for road-kill
stew and produce a creme brulee….
Perhaps the best summation of how the
global economy actually functioned just prior to the World Trade Center
attacks was offered in a brilliant two-part series by Le Monde Diplomatique in the spring of 2000. In part, the series said:
Indeed the engine of capitalist expansion
is now oiled by the profits of serious crime. From time to time
something is done to give the impression of waging war on the rapidly
expanding banking and tax havens. If governments really wanted to, they
could right this overnight. But though there are calls for zero
tolerance of petty crime and unemployment, nothing is being done about
the big money crimes.
Financial crime is becoming less visible,
periodically coming to light in one country or another in the guise of
scandals involving companies, banks, political parties, leaders,
cartels, mafias. This flood of illicit transactions — offences under
national law or international agreements has come to be portrayed just
as accidental malfunctions of free market economics and democracy that
can be put right by something called “good governance.” But the reality
is quite different. It is a coherent system closely linked to the
expansion of modern capitalism and based on an association of three
partners: governments, transnational corporations, and mafias. Business
is business. financial crime is first and foremost a market, thriving
and structured, ruled by supply and demand.” (pg. 76-7)
The reach of the globalist shadow government doesn’t stop with financial crimes involving laundering hundreds of billions in drug money, which are now daily news items. On the contrary, the syndicalism of the elite extends to all markets, including sex
trade, drugs, weapons, secret technology, cybercrime, etc. What comes
to mind here is the Jolly Roger Flag and the classic imagery of
international piracy. 21st Century Wire editor and investigative
journalist Patrick Henningsen perceptively makes this connection between
state-sponsored terror using “Sand Pirates” and black market trades in
his recent article, “ISIS Sex Slave Market is Modern Repeat of Barbary Pirate Trade”:
“As 21WIRE pointed out last week,
history has repeated itself again. Today’s ISIS/ISIL phenomenon is not
that different from another long and painful chapter in the East vs.
West clash of cultures and trade – the Barbary Pirates of the 17 and 18th centuries. Writer Patrick Henningsen explains:
‘For financial or
political reasons, Empires have always used external militarized cells
and mercenaries to commit unsavoury acts under a flag different than the
monarchy, nation-state, or private corporation who was directing them behind the scenes.”
“Ruthless and unconventional “asymmetric” enemies are nothing new to the United States. Historically, the Privateer, or Barbary “Corsair”,
was a private person or ship authorized by a government to attack
foreign vessels or governments, often covertly. During the 17th, 18th
and 19th centuries, Ottoman Corsairs operated along the North African coast, and attacked Colonial American ships for over a century”.
“It’s the time-honored practice of
non-state actors (with state sponsors) who are let loose to pillage and
plunder. Today’s ISIS pirates are really just the 21st century’s version
of the ‘privateers’…”
And,
“The ‘Barbary slave trade‘ refers to the “white slavery” markets along North Africa’s Barbary Coast between the 17th and 19th centuries, which comprised Morocco, Algeria, Tunisia and Libya. Conversely, the Arab slave trade
went on for the better part of a millennium – not only confined to the
Arab world, but also extending into west Asia, North Africa, Southern
Africa, Ethiopia, and Somalia, as well as southern coastal Europe (Spain
and Italy) as late as the 19th century. So great were the number of
men, women and children who were captured by pirates, that many European
coastal towns were forced to shut down, and all but abandoned.”
We interrupt this article for a breaking board meeting with George Soros, Henry Kissinger and Zbigniew Brzezinski:
From Russia with love (1963) - SPECTRE briefing
The modus operandi of international syndicates has not changed, and the international nature of piracy provides another helpful parallel. Like the media narrative of the Pink Panthers, which seems
to show clear intelligence agency involvement, the mainstream news
version of black markets is, as expected, nowhere near accurate or
realistic. While low-level employees of various agencies fight a
white hat battle, the larger players higher up on the pyramid are
aligned with criminal syndicates. Since these interests have
no national allegiances, the black flag of piracy is raised by the
globalists, as well. Connecting all these dots, an excellent work on
the pinnacles of power and black markets is investigative journalist
Daniel Estulin’s book Shadow Masters: How Governments and their
Intelligence Agencies are Working with International Drug Dealers and
Terrorists for Mutual Benefit and Profit. Estulin presents an
avalanche of information on little-known subjects and intrigues, namely
the rape of Russia by the IMF, the NATO-run operations in Kosovo that
connect to the drug trade, Bin Laden and state-sponsored terror, as well
as the life of Victor Bout, whose escapades formed the basis for the
film Lord of War with Nicolas Cage. Estulin comments:
“So you have an international terrorist
(Osama bin Laden) trained and funded by the CIA, an international
terrorist organization (the KLA, excuse me, Kosovo Protection Corps)
trained and funded by the British, American and German secret services
and special forces, and an American establishment (Clinton, Gore, Clark,
Albright, Holbrooke, Lieberman – all Bilderberg and CFR members, who
represent the interests of the new world order, fighting to establish
democracy and bring justice to a long-suffering and oppressed
people…(pg. 93)
From Vietnam to Cambodia, from Laos to
Pakistan and Afghanistan, from Iran to the Contras, the Agency has been
the progressive left’s favorite whipping boy. However, it isn’t only
the CIA that is up to their eyeballs in drugs. In the aforementioned
article, Le Monde Diplomatique explicitly stated that “the
secret services of the world’s most powerful state apparatus [in the
U.S.] have moved into economic warfare,’ becoming ‘international
financial crime’s number-one partner.” (pg. 122)
This is only a smattering of a topic so vast it would require volumes
to detail properly. However, it does provide an introductory model for
understanding government as conspiracy and black markets as the fuel for the real
economy. Rather than the Hollynews version of 007 exposing the
operations of Dr. No, the norm for power blocs is actually criminal
syndicalism and control of black markets. Indeed, the appropriate model
for understanding statecraft is not virtuous citizens rising to the top
through dispassioned intellectual argumentation and elections, but
stagecraft con men and their actor’s guilds, er, criminal guilds.
Recalling Dr. No’s quote above we can discern the rise of the
surveillance state has only served to foster black market escapades and
has little to do with halting “terror.” If only Dr. No had waited
around a little longer for the NSA. From the drug trade to sex trade to
financial scandals, we discover the whole business of war itself is a
racket, and intelligence operations are more often than not
merely legalized criminal espionage. In reality, Joe is an arm of
Cobra, and Bond is an agent of SPECTRE. The verdict of historians and
journalists is thus: The real Pink Panthers sit on the board of the IMF and CFR.
SPECTRE or IMF board meeting? Hard to tell.
Bill Gates comes under fire for criminally negligient vaccine experiments on poor Indian children
by J. D. Heyes
(NaturalNews) Billionaire Microsoft founder Bill Gates has been held up
by many as a humanitarian extraordinaire, and his Bill & Melinda
Gates Foundation has spent hundreds of millions on philanthropic
endeavors. But not all of what Gates has done or tried to do has been
beneficial to Mankind. In fact, some of it has been extremely harmful.
In fact, Gates is currently facing a lawsuit in India for illegally testing vaccines on tribal children, reports Health Impact News and VacTruth.com. The news sites report that the Gates Foundation is being investigated by the Supreme Courts of India. In particular, Health Impact News reported:
While
fraud and corruption are revealed on almost a daily basis now in the
vaccine industry, the U.S. mainstream media continues to largely ignore
such stories. Outside the U.S., however, the vaccine empires are
beginning to crumble, and English versions of the news in mainstream
media outlets are available via the Internet.
One such country is
India, where the Bill & Melinda Gates Foundation and their vaccine
empire are under fire, including a pending lawsuit currently being
investigated by the India Supreme Court.
'At least seven girls died'
The Economic Times of India
further reported that, beginning in 2009, a number of schools for
tribal children in Khammam District in Telagana, which was, at the time,
part of an undivided Andhra Pradesh, were used in observation studies
for a cervical cancer vaccine administered to thousands of girls aged 9 to 15.
The
girls were given three rounds of the Human Papilloma Virus (HPV)
vaccine throughout the year under the direction and supervision of state
health department officials. Gardasil, which is manufactured by Merck,
was the administered vaccine; it was given to some 16,000 girls in the
trials.
Months
later, many girls started falling ill and by 2010 five of them died.
Two more deaths were reported from Vadodara, Gujarat, where an estimated
14,000 children studying in schools meant for tribal children were also
vaccinated with another brand of HPV vaccine, Cervarix, manufactured by
GSK.
At least seven of the girls died. In the end, though, a report that the Times claimed was funded by the Bill & Melinda Gates Foundation essentially blamed the deaths on factors other than the vaccines.
However, the Times also noted that Indian authorities have begun to look into the foundation, and have found a number of conflicts of interest.
Reputation for harmful medical research
Specfically,
that the Bill & Melinda Gates Foundation and GAVI (Global Alliance
for Vaccines and Immunization) are tied to Big Pharma
The main
charge against GAVI is that it has representatives from pharmaceutical
companies on its board while the PHFI accepts grants from pharma
companies. "BMGF and GAVI are pushing the [vaccine] agenda with
governments around the world, including India," says Ritu Priya
Mehrotra, professor of Social Medicine and Community Health and School
of Social Sciences, Jawaharlal Nehru University, Delhi. The community
health activist says the biotechnology industry was pushing more and
more vaccines into India and that the health ministry was not ensuring
that adequate testing was done before recommending their use in
government programmes.
This is not the first time the Gates
Foundation has been implicated in harmful or ethically questionable
medical trials. As early as 2010, Natural News editor Mike Adams,
the Health Ranger, was reporting on the foundation's operations, noting
that the billionaire couple was "gaining a reputation for funding
technologies designed to roll out mass sterilization and vaccination
programs around the world."
"One of the programs recently funded
by the foundation is a sterilization program that would use sharp blasts
of ultrasound directed against a man's scrotum to render him infertile
for six months," Adams wrote. "It might accurately be called a
'temporary castration' technology. See Adams' full report here.
Google's Secretive DeepMind Startup Unveils a "Neural Turing Machine"
DeepMind has built a neural network that can access an external
memory like a conventional Turing machine. The result is a computer that
mimics the short-term memory of the human brain.
One of the great challenges of neuroscience is to
understand the short-term working memory in the human brain. At the same
time, computer scientists would dearly love to reproduce the same kind
of memoryin silico. Today,
Google’s secretive DeepMind startup, which it bought for $400 million
earlier this year, unveils a prototype computer that attempts to mimic
some of the properties of the human brain’s short-term working memory.
The new computer is a type of neural network that has been adapted to
work with an external memory. The result is a computer that learns as it
stores memories and can later retrieve them to perform logical tasks
beyond those it has been trained to do. DeepMind’s
breakthrough follows a long history of work on short-term memory. In the
1950s, the American cognitive psychologist George Miller carried out
one of the more famous experiments in the history of brain science.
Miller was interested in the capacity of the human brain’s working
memory and set out to measure it with the help of a large number of
students who he asked to carry out simple memory tasks. Miller’s
striking conclusion was that the capacity of short-term memory cannot
be defined by the amount of information it contains. Instead Miller
concluded that the working memory stores information in the form of
“chunks” and that it could hold approximately seven of them. That
raises the curious question: what is a chunk? In Miller’s experiments, a
chunk could be a single digit such as a 4, a single letter such as a q,
a single word or a small group of words that together have some
specific meaning. So each chunk can represent anything from a very small
amount of information to a hugely complex idea that is equivalent to
large amounts of information. But however much
information a single chunk represents, the human brain can store only
about seven of them in its working memory. Here is an
example. Consider the following sentence: “This book is a thrilling
read with a complex plot and lifelike characters.” This sentence consists of around seven chunks of information and is clearly manageable for any ordinary reader. By
contrast, try this sentence: “This book about the Roman Empire during
the first years of Augustus Caesar’s reign at the end of the Roman
Republic, describes the events following the bloody Battle of Actium in
31 BC when the young emperor defeated Mark Antony and Cleopatra by
comprehensively outmaneuvering them in a major naval engagement.” This
sentence contains at least 20 chunks. So if you found it more difficult
to read, that shouldn’t be a surprise. The human brain has trouble
holding this many chunks in its working memory. In
cognitive science, the ability to understand the components of a
sentence and store them in the working memory is called variable
binding. This is the ability to take a piece of data and assign it to a
slot in the memory and to do this repeatedly with data of different
length, like chunks. During the 1990s and 2000s,
computer scientists repeatedly attempted to design algorithms, circuits
and neural networks that could perform this trick. Such a computer
should be able to parse a simple sentence like “Mary spoke to John” by
dividing it into its component parts of actor, action and the receiver
of the action. So in this case, it would assign the role of actor to
Mary, the role of action to the words “spoke to” and the role of
receiver of the action to “John.” It is this task
that DeepMind’s work addresses, despite the very limited performance of
earlier machines. “Our architecture draws on and potentiates this work,”
say Alex Graves, Greg Wayne, and Ivo Danihelka at DeepMind, which is
based in London. They begin by redefining the nature
of a neural network. Until now, neural networks have been patterns of
interconnected “neurons” which are capable of changing the strength of
the interconnections in response to some external input. This is a form
of learning that allows them to spot similarities between different
inputs. But the fundamental process of computing
contains an important additional element. This is an external memory
which can be written to and read from during the course of a
computation. In Turing’s famous description of a computer, the memory is
the tickertape that passes back and forth through the computer and
which stores symbols of various kinds for later processing. This
kind of readable and writable memory is absent in a conventional neural
network. So Graves and co have simply added one. This allows the neural
network to store variables in its memory and come back to them later to
use in a calculation. This is similar to the way an
ordinary computer might put the number 3 and the number 4 inside
registers and later add them to make 7. The difference is that the
neural network might store more complex patterns of variables
representing, for example, the word “Mary.” Since
this form of computing differs in an important way from a conventional
neural network, Graves and co give it a new name—they call it a Neural
Turing Machine, the first of its kind to have been built. The Neural
Turing Machine learns like a conventional neural network using the
inputs it receives from the external world but it also learns how to
store this information and when to retrieve it. The
DeepMind work involves first constructing the device and then putting it
through its paces. Their experiments consist of a number of tests to
see whether, having trained a Neural Turing Machine to perform a certain
task, it could then extend this ability to bigger or more complex
tasks. “For example, we were curious to see if a network that had been
trained to copy sequences of length up to 20 could copy a sequence of
length 100 with no further training,” say Graves and co. It
turns out that the neural Turing machine learns to copy sequences of
lengths up to 20 more or less perfectly. And it then copies sequences of
lengths 30 and 50 with very few mistakes. For a sequence of length 120,
errors begin to creep in, including one error in which a single term is
duplicated and so pushes all of the following terms one step back.
“Despite being subjectively close to a correct copy, this leads to a
high loss,” say the team. Although the sequences
involved are random, it’s not hard to imagine how they might represent
more complex ideas such as “Mary” or “spoke to” or “John.” An important
point is that the amount of information these sequences contain is
variable, like chunks. They compare the performance
of their Neural Turing Machine with a conventional neural network. The
difference is significant. The conventional neural network learns to
copy sequences up to length 20 almost perfectly. But when it comes to
sequences that are longer than the training data, errors immediately
become significant. And its copy of the longest sequence of length 120
is almost unrecognizable compared to the original. The
DeepMind team go on to test the Neural Turing Machine on other tasks.
For example, one of these is the equivalent of photocopying: the task is
to copy a sequence and then repeat that sequence a specified number of
times and end with a predetermined marker. Once again, the Neural Turing
Machine significantly outperforms a conventional neural network. That
is an impressive piece of work. “Our experiments demonstrate that [our
Neural Turing Machine] is capable of learning simple algorithms from
example data and of using these algorithms to generalize well outside
its training regime,” say Graves and co. That is an
important step forward that has the potential to make computing machines
much more brainlike than ever before. But there is significant work
ahead. In particular, the human brain performs a
clever trick to make sense of complex arguments. An interesting question
that follows from Miller’s early work is this: if our working memory is
only capable of handling seven chunks, how do we make sense of complex
arguments in books, for example, that consists of thousands or tens of
thousands of chunks? Miller’s answer is that the
brain uses a trick known as a recoding. Let’s go back to our example of
the book and add another sentence: “This book is a thrilling read with a
complex plot and lifelike characters. It is clearly worth the cover
price.” Once you have read and understood the first
sentence, your brain stores those seven chunks in a way that is
available as a single chunk in the next sentence. In this second
sentence, the pronoun “it” is this single chunk. Our brain automatically
knows that “it” means: “the book that is a thrilling read with a
complex plot and lifelike characters.” It has recoded the seven earlier
chunks into a single chunk. To Miller, the brain’s
ability to recode in this way was one of the keys to artificial
intelligence. He believed that until a computer could reproduce this
ability, it could never match the performance of the human brain. Google’s
DeepMind has stated that its goal is “solving intelligence.” If this
solution is anything like human intelligence, a good test would be to
see whether Neural Turing Machines are capable of Miller’s recoding
trick. Ref:arxiv.org/abs/1410.5401: Neural Turing Machines //http://www.technologyreview.com/view/532156/googles-secretive-deepmind-startup-unveils-a-neural-turing-machine/
UFO: THE AUTHENTICATOR SIGNAL
UFO
THE AUTHENTICATOR SIGNAL
It is always refreshing to do a follow up story, especially when new
developments unfold that are compelling and that are capable of taking
or minds off the mainstream narrative and their various ways of spinning
climate change, ISIS, and Ebola.
Unfortunately we have at least two space disasters that have taken
place and a whole new batch of conspiracy theories that may or may not
be complete disinformation. The tragedy of Virgin’s Galactic Spaceship 2
crash has set the space tourism program back many years and whoever is
dominating outer space now will be able to continue their ‘work’
unabated. We also watched helplessly as the Antares rocket exploded as
it took off into space. In a fiery nighttime explosion, the rocket
carrying supplies to the International Space Station exploded six
seconds after launch.
With all the conspiracy theories about Russian espionage and alien
attack set aside, there have been some circumstantial events surrounding
these tragic events that need to be observed. In order to get to the
bottom of what has happened we need to go back to June of this year.
On June 20th KABC Channel 7 News in California filed a story about
strange lights seen over Malibu and connected it with a story that was
actually first reported by Jimmy Church of the “Fade to Black” radio show. The Huffington Post reported a few weeks earlier about the
possibility of a hidden alien structure below the ocean 6 miles of the
coast of Point Dume in Malibu, California. It is an unusual looking
structure that sits on the seabed floor.
It appears to be an the oval-shaped object that has a huge flat top
and what appear to be pillars or columns that seem to reveal the
entrance to a darker, inner place.
The anomaly is approximately 2,000 feet below the surface of the water, measuring nearly 3 miles wide.
Jimmy Church the host of “Fade To Black”
on Art Bell’s former Dark Matter Radio Network, reported that one of
his listeners someone named Maxwell contacted him last month with a
Google Earth image showing something odd, underwater off the coast of
Malibu. Church then asked graphic designer Dale Romero to capture as
many angled images of the anomaly as he could.
The anomaly can be found by using Google Earth coordinates 34° 1’23.31″N 118° 59’45.64″W.
Geologists of course are not calling it a UFO base and of course
there isn’t a sign hanging off of it that declares that it is. Only that
in 2009 the anomaly did catch the attention of Geologists and they
called it the Sycamore Knoll. Geologists believe that it is a thrust
fault and while it is 2000 feet below the surface they aren’t about to
go down and prove that it is either a natural phenomenon or artificial.
However the pillars and the entrance below is a compelling geological
anomaly that can’t easily be not explained nor can he UFO activity that
has been happening near Santa Barbara and strange lights over Venice
Beach.
The UFO activity may just be a coincidence and there have been many fireballs that are seen that are mistaken for UFOs.
Recently there has been a discussion regarding a number of anomalous
short band radio broadcasts that were detected and recorded at the 10 to
12 meter band at intervals at 54 KC. The presumed location for these
broadcasts was an area just outside of Port Dume in the Pacific Ocean.
The 12-meter band is frequented during the day, but during the busier
parts of the solar cycle, long distance communications can be achieved
at night as well.
The broadcasts at first sound like data dumps or telemetry, however
the more data that is broadcast the less that the sounds and electronic
wines appear to be from planet earth. The sounds do not match with
regular shortwave number stations or data.
The sounds were sent to Robert Stanley of Unicus Magazine by a
Ham radio operator named Emmet who used the 12-meter band frequently to
contact friends in New Zealand. The strange signals would show up every
54 kilocycles. Emmett asked several of his colleagues from Catalina
island to Oxnard if they heard the sound, he was surprised to hear that
they didn’t.
Emmet says that his home is located right near the so-called
submarine underwater UFO base near the Sycamore Knoll at Point Dume.
When I first heard the signals it reminded me of the scene in The Empire Strikes Back
when Han Solo and Luke Skywalker are scouting the icy planet, Hoth. A
number of meteorites were hitting the planet and they needed to
investigate. The rebel base on Hoth heard what sounded like a strange
alien broadcast on their channels. Soon they realized it was an Imperial
probe droid. Chewbacca first encountered it and when he fired on it, it
exploded. It was determined that the probe had a self destruct and it
was sending information to the Empire as to where the rebel base was.
There is also the sound that was heard in the movie Independence Day
where a signal is picked up at a radio telescope that sounds unearthly.
It is a huge scarping noise that startles the young scientist. It was a
message that was sent waiting for a response. If there is no response
or authenticator code the alien ships would attack.
The transmissions near the so-called Point Dume UFO base are
compelling especially the timing of the release of these transmissions.
On November 2nd, 2014 a moon sized UFO appeared near the sun in film
footage captured by the Solar Dynamics Observatory recording solar
activity in a video uploaded to Youtube on November 2.
UFO Near The Sun, Twisting Solar Eruption , Oct 28, 2014
The UFO has an unusual geometry comprising right angles that leads to
the conclusion that it is of alien origin. The UFO appears to have a
trail of solar particles behind it in the film footage of large solar
flare activity originally recorded on October 28.
If the UFO is of alien origin, it would be a dramatic example of a
Type II extraterrestrial civilization able to harness solar energy
according to the Kardashev scale of a civilization’s technological
advancement.
The November 2 video shows large solar flare activity in the form of
coronal loops occurring near the sun on October 28 as recorded by NASA’s
Solar Dynamics Observatory (SDO).
The UFO’s appearance is not very dramatic as it flashes above a huge solar storm or wave that rises up from the surface.
Meanwhile the Sentinels have returned. On October 31st, Halloween
night there were many reports of the three bright UFOs hovering over
Colorado, Utah, Texas, and California.
These three UFOs have been the subject of much speculation as of late and now it seems that they have not left the skies.
On October 3rd, 2014 a video was shot of one of the sentinels over
Crestone Colorado. It was one of the best recorded shots of the anomaly.
The video was shot by well known meteorologist Scott Stevens.
2014 1003 Crestone UFO
It is important that you understand that there have been some
anomalous developments taking place in space, developments that the
western media has not reported thoroughly.
In fact they have ignored these major developments for fear that it
might panic that populace. It is important that we report these stories
to you in order to demonstrate that we are most certainly preparing for
the alien intrusion and that there are military personnel and others
that are no longer keeping quiet.
Each year, over 300 objects intersect Earth’s orbital trajectory.
They range in size from a soccer ball, to the size of Manhattan.
It is only a matter of time, before we arrive at the wrong place at
the wrong time. We are also tracking a wave of extra-terrestrial
anomalies from alleged wormholes, vortices, lights and spaceships that
no one has seen before. The sun is also very active and solar flares and
CMEs have also been determined to be grave threats to our way of life.
We have all sorts anomalies now that are not easily explained ad the
weird part is no one is saying anything about weather balloons, swamp
gas or even Venus.
We simply are not getting a straight answer, while in the meantime it
seems that the frequencies and the skies are very active with unknown
objects and signals that are waiting for the authenticator code.
CNBC Exec’s Children Murdered, 1 Day After CNBC Reports $43 Trillion Bankster Lawsuit
Posted By Contributing Author On October 27, 2012 @ 2:35 pm In Controlling the Herd,Crime/Police State,Economy and Finance,Editor's Choice |
[1]
This week financial news organization CNBC gave some mainstream
attention to the largest money laundering and racketeering lawsuit in
United States History, in which “Banksters” and their U.S. racketeering
partners are being accused of laundering of 43 trillion dollars worth of
ill gotten gains. The lawsuit is said to involve officials located in
the highest offices of government and the financial sector.
Since this information was surprisingly revealed by the mainstream
news organization there has been a very suspicious and deadly fallout at
the CNBC headquarters. Within hours the original page for the article
was taken down, and CNBC senior vice president Kevin Krim received news
that his children were killed under very suspicious circumstances. It
seems that the murder happened first and then the page was removed
later.
According to mainstream accounts[2] the
children’s nanny is responsible for the murders, allegedly stabbing
both children. However, those same mainstream news sources report the
highly unlikely story that the nanny slit her own throat just after
committing the homicides. Police have released very little information
and although a wider plot has not been officially implicated, it seems
very possible that these murders are a show of force against the press
organization for releasing such damning information about the most
powerful people in the world.
Here is some more information about the lawsuit from the Wall Street Journal[3]:
“In the District Court lawsuit, Spire Law Group, LLP — on behalf of
home owner across the Country and New York taxpayers, as well as under
other taxpayer recompense laws — has expanded its mass tort action into
federal court in Brooklyn, New York, seeking to halt all foreclosures
nationwide pending the return of the $43 trillion ($43,000,000,000.00)
by the “Banksters” and their co-conspirators, seeking an audit of the
Fed and audits of all the “bailout programs” by an independent receiver
such as Neil Barofsky, former Inspector General of the TARP program who
has stated that none of the TARP money and other “bailout money”
advanced from the Treasury has ever been repaid despite protestations to
the contrary by the Defendants as well as similar protestations by
President Obama and the Obama Administration both publicly on national
television and more privately to the United States Congress. Because the
Obama Administration has failed to pursue any of the “Banksters”
criminally, and indeed is actively borrowing monies for Mr. Obama’s
campaign from these same “Banksters” to finance its political
aspirations, the national group of plaintiff home owners has been forced
to now expand its lawsuit to include racketeering, money laundering and
intentional violations of the Iranian Nations Sanctions and Embargo Act
by the national banks included among the “Bankster” Defendants. ”
Some of the alleged conspirators are Attorney General Holder,
Assistant Attorney General Tony West, the brother in law of Defendant
California Attorney General Kamala Harris, Jon Corzine (former New
Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster),
Timothy Geitner, Treasury Secretary, Vikram Pandit (recently resigned
and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a
Senior White House Advisor), Anita Dunn (a former “communications
director” for the Obama Administration), Robert Bauer (husband of Anita
Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as
well as the “Banksters” themselves, and their affiliates and conduits.
It is expected that all news on this subject will be removed from
CNBC, and that other news organizations will be discouraged from
covering such information. However, screen shots of the original CNBC article[4] were taken to verify the authenticity of this story.
Assassination and brute intimidation are common strategies for the
ruling class to use on people who may threaten their agenda. This is
the second situation this week in which a high level executive was the
victim of a suspicious attack that seemed very much like an
assassination. The Intel Hub just reported[5] that
Nicholas Mockford, a 60 year old British executive for the oil company
ExxonMobil was shot dead in front of his wife in an assassination-style
killing in Brussels. We will be keeping a close eye on both of these
stories and provide more details as they become available.
If you have any questions or disagreements share your ideas with the community in the new forums at theintelhub.com[6]
Article printed from The Daily Sheeple: http://www.thedailysheeple.com
URL to article: http://www.thedailysheeple.com/cnbc-execs-children-murdered-1-day-after-cnbc-reports-43-trillion-bankster-lawsuit_102012
URLs in this post:
[3] from the Wall Street Journal: http://www.marketwatch.com/story/major-banks-governmental-officials-and-their-comrade-capitalists-targets-of-spire-law-group-llps-racketeering-and-money-laundering-lawsuit-seeking-return-of-43-trillion-to-the-united-states-treasury-2012-10-25
[4] screen shots of the original CNBC article: http://sherriequestioningall.blogspot.com/2012/10/43-trillion-dollar-suit-against-us-govt.html
[5] The Intel Hub just reported: http://theintelhub.com/2012/10/27/oil-executive-and-renewable-fuel-researcher-assassinated/
[6] new forums at theintelhub.com: http://theintelhub.com/forums/
[7] J.G. Vibes: http://aotmr.com/djs/j-g-vibes-2/
[8] Alchemy of the Modern Renaissance: http://aotmr.com/books/alchemy-of-the-modern-renaissance/
This week financial news organization CNBC gave some mainstream
attention to the largest money laundering and racketeering lawsuit in
United States History, in which “Banksters” and their U.S. racketeering
partners are being accused of laundering of 43 trillion dollars worth of
ill gotten gains. The lawsuit is said to involve officials located in
the highest offices of government and the financial sector.
Since this information was surprisingly revealed by the mainstream
news organization there has been a very suspicious and deadly fallout at
the CNBC headquarters. Within hours the original page for the article
was taken down, and CNBC senior vice president Kevin Krim received news
that his children were killed under very suspicious circumstances. It
seems that the murder happened first and then the page was removed
later.
According to mainstream accounts the
children’s nanny is responsible for the murders, allegedly stabbing
both children. However, those same mainstream news sources report the
highly unlikely story that the nanny slit her own throat just after
committing the homicides. Police have released very little information
and although a wider plot has not been officially implicated, it seems
very possible that these murders are a show of force against the press
organization for releasing such damning information about the most
powerful people in the world.
Here is some more information about the lawsuit from the Wall Street Journal:
“In the District Court lawsuit, Spire Law Group, LLP — on behalf of
home owner across the Country and New York taxpayers, as well as under
other taxpayer recompense laws — has expanded its mass tort action into
federal court in Brooklyn, New York, seeking to halt all foreclosures
nationwide pending the return of the $43 trillion ($43,000,000,000.00)
by the “Banksters” and their co-conspirators, seeking an audit of the
Fed and audits of all the “bailout programs” by an independent receiver
such as Neil Barofsky, former Inspector General of the TARP program who
has stated that none of the TARP money and other “bailout money”
advanced from the Treasury has ever been repaid despite protestations to
the contrary by the Defendants as well as similar protestations by
President Obama and the Obama Administration both publicly on national
television and more privately to the United States Congress. Because the
Obama Administration has failed to pursue any of the “Banksters”
criminally, and indeed is actively borrowing monies for Mr. Obama’s
campaign from these same “Banksters” to finance its political
aspirations, the national group of plaintiff home owners has been forced
to now expand its lawsuit to include racketeering, money laundering and
intentional violations of the Iranian Nations Sanctions and Embargo Act
by the national banks included among the “Bankster” Defendants. ”
Some of the alleged conspirators are Attorney General Holder,
Assistant Attorney General Tony West, the brother in law of Defendant
California Attorney General Kamala Harris, Jon Corzine (former New
Jersey Governor), Robert Rubin (former Treasury Secretary and Bankster),
Timothy Geitner, Treasury Secretary, Vikram Pandit (recently resigned
and disgraced Chairman of the Board of Citigroup), Valerie Jarrett (a
Senior White House Advisor), Anita Dunn (a former “communications
director” for the Obama Administration), Robert Bauer (husband of Anita
Dunn and Chief Legal Counsel for the Obama Re-election Campaign), as
well as the “Banksters” themselves, and their affiliates and conduits.
It is expected that all news on this subject will be removed from
CNBC, and that other news organizations will be discouraged from
covering such information. However, screen shots of the original CNBC article were taken to verify the authenticity of this story.
Assassination and brute intimidation are common strategies for the
ruling class to use on people who may threaten their agenda. This is
the second situation this week in which a high level executive was the
victim of a suspicious attack that seemed very much like an
assassination. The Intel Hub just reported that
Nicholas Mockford, a 60 year old British executive for the oil company
ExxonMobil was shot dead in front of his wife in an assassination-style
killing in Brussels. We will be keeping a close eye on both of these
stories and provide more details as they become available.
If you have any questions or disagreements share your ideas with the community in the new forums at theintelhub.com
Delivered by The Daily Sheeple
- See more at:
http://www.thedailysheeple.com/cnbc-execs-children-murdered-1-day-after-cnbc-reports-43-trillion-bankster-lawsuit_102012#sthash.T9JWUN3A.dpuf