Hacking the Body Via PDA Wireless Device
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves.
The brain waves run at 5Hz to 50Hz range generally depending on the content of things like caffeine. And the nerves and body signals also have ranges, here is some interesting information on that:
Now then if we take quartz crystals and put them in PDA devices, we could communicate to the bodies own system through the 8.0 KHz range:
You can also put a thought into someone's mind through the waves and frequencies at this level with a little fine-tuning. Meaning you could communicate without speech. And this has uses in Space travel, Under Water Exploration and even in special teams, which need quietness to fulfill mission.
Now when someone is carrying a personal electronic device there are ways to get to these frequencies. One way is to find the difference between the two components of the device, for instance the motherboard and the CPU, and get that device to one of the numbers near or around 5-50 Hz or 8 KHz. This can be done by sending information or energy to the device from somewhere else. This can be done by first pinpointing the device by GPS or other line of sight means and then sending pulses to the device, which will boost or lower the devices output or by sending a signal to the device under normal conditions that the device uses to operate. Microwave, Terabeam, Sound, laser, etc. may all be used for such. Now then once you spike one of the components of the device close to the other components range and get the difference within the range of the human bodily functions frequencies you can then introduce the desired result. For instance put the person to sleep slowly by lowering the difference between the waves of the device. You could increase it causing anxiety and possible even introduce information into the brain. For instance, you could contact the brain and auditory function and say "Run" or "This is Allah, killing Americans is wrong, put down your weapon and return to your family and be a good father and knock it off."
We already know that wireless devices can be easily hacked into as we have been reading. For instance the new WiFi freedom also has associated flaws and potential risks. You might want to Google these companies also on the subject: Airdefense, Atheros, LXE, and Airmagnet.
HIPPA issues medical data could be at risk without scrutiny since Hospitals and First Responders must rely on mobile devices to help save lives and remain efficient in those times of critical need. The medical industry is certainly discussing the HIPPA issues with wireless mobility. How can they have the information rapidly available and also maintain complete privacy when the information goes over the airwaves?
As speed increases and add ons occur security issues need to be continually reviewed and upgraded procedures. Blackberry is concerned and diligently working on the problems. Other Wireless Security Issues Include some below and this is just the beginning really, after all we cannot even get rid of SPAM.
While tapping information from normal citizens you can see the problems. Then the people in the know will export the hacking technology and then the same companies working in defense will have these people employed there, then those people will teach others who are our potential enemies and then we are in trouble.
As this technology becomes more advanced it is quite possible to read people's minds, enter thoughts into their heads, put them to sleep, increase heart rates to non-possible levels, cause anxiety or disrupt nerve impulses and mobility. All by using their on board PDA, Cell Phone or other electronic device. It is even possible now to send information this way using the skull and jawbone as an antenna and the vibrations are picked up by the inner ear.
The PDA wireless device or cell phone is merely an amplifier and since it has it's own power source maybe used in such a way as these companies are discovering and consumers seem to be happy to use. By reducing the amount of energy in the device itself batteries will last longer since lower volumes will be needed. The energy could come from the sender entirely, therefore batteries draining are no longer an issue. If people have RFID implants they could hook themselves up to a machine at night running on 8Hz which could super charge their immune system along with a once per week tablet of super vitamin C with is said to be 100 times more potent than the Vitamin C Fred Flintstone Chewables our kids take. Having a pace making device to steady one's system while performing extraordinary tasks could be good for adrenaline burn on nerves, NASCAR drivers, Apache Attack Helicopter Pilots, Astronauts, etc. by stabilizing the body and allowing the mind to focus on the event in a clear headed way.
If an enemy set of troops has implanted RFID tags we could stimulate the bodily functions by way of external impulse waves and help them change their minds to fight. Therefore Blue and Red Force tracking issues would be in our favor even if they had identical systems which were bought by pirated software from the DOD by a rogue nation. We could disable and over power implanted devices and therefore they would show up as another color, the enemy would see it's "Blue-friendly" turn to "Red Bad-guy" and thus not know who is who and kill their own men or be so confused that they stopped giving orders of what to shoot at and in the confusion and hesitation you have the time on your side and all options meaning, a decisive victory is in sort order of said battle.
It may appear to be rather a difficult task to take control of a body, but really it is not since the body is merely an organic robot and it works on a set of principles. You only have to change those few things. When we recently discussed the use of Long-range wireless tasers for crowd control we could see what we are technologically advancing in this regard. We know that we can stop human armies by way of bullets, explosion, harmonics, microwaves. We can blind them, nuke them, sterilize them and even make them fall down and cry.
But using this methodology of using portable devices on that person, we could essentially control them by phone lines half way around the world. Once access is giving or even overwhelmed by electronic power you would have control of that person's thoughts, central nervous system and heart rate. An interesting concept in that a doctor could have a patient on the phone and stabilize their blood pressure, heart rate or even put in settings for super healing while they sleep. Or in the case of conflict you could bring an army to it's knees and completely immobilize it, put the rank and file into deep sleep, end the natural lives of those participating trying to kill you or make them think twice about what they were doing. This is not science fiction we are nearly here, we need to stay "Heads UP" on these issues.
"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs
Hartsfield-Jackson to bolster IT security after airport cyberattacks - The Atlanta Journal Constitution
Hartsfield-Jackson to bolster IT security after airport cyberattacks The Atlanta Journal Constitution
Did Brazil DSL Modem Attacks Change Device Security? Security Intelligence
Lebanon: Indictment of State Security members in torture case an 'encouraging development' - Amnesty International
Lebanon: Indictment of State Security members in torture case an 'encouraging development' Amnesty International
Treasury officials would have done more for national security by leaving Tornado Cash alone - Cointelegraph
Treasury officials would have done more for national security by leaving Tornado Cash alone Cointelegraph
Lepide Data Security Platform 22.1 protects sensitive data and critical infrastructure - Help Net Security
Lepide Data Security Platform 22.1 protects sensitive data and critical infrastructure Help Net Security
US Homeland Security Chief Warns Borders Being Rendered Meaningless Voice of America - VOA News
Former Trump national security advisor John Bolton says he is considering 2024 presidential bid - CNBC
Former Trump national security advisor John Bolton says he is considering 2024 presidential bid CNBC
Drone-based security patrols: Mitigate the human factor Security Magazine
Launch of the Japan-United States Energy Security Dialogue US Embassy and Consulates in Japan
Clark County, Ohio Schools Commit $1M to Security Systems Government Technology
Featured job: Project Manager - Library Security & Safety Hillsborough County
New security K-9 teams in training – Michigan Medicine Headlines Michigan Medicine Headlines
Guide to Network Security EnterpriseNetworkingPlanet
The Android December security patch is here Android Police
Judicial security bill named for slain son of N.J. jurist heading for congressional approval - NJ.com
USA Freedom Act Security Policies Bundle 2022: New Mandates on How Corporations Collect, Process, and Store Data - ResearchAndMarkets.com - Business Wire
USA Freedom Act Security Policies Bundle 2022: New Mandates on How Corporations Collect, Process, and Store Data - ResearchAndMarkets.com Business Wire
Montana State University recieves $4 million from Homeland Security for cybersecurity project - Bozeman Daily Chronicle
Montana State University recieves $4 million from Homeland Security for cybersecurity project Bozeman Daily Chronicle
Cyber Safety Review Board to Conduct Second Review on Lapsus$ Homeland Security
#HowTo: Make Security a Board Level Discussion Infosecurity Magazine
The top 10 hacks and cyber security threats of 2022 | Cyber Security Hub Cyber Security Hub
Industry has lots to say about the Homeland Security plan for cyber incident reporting - Federal News Network
Industry has lots to say about the Homeland Security plan for cyber incident reporting Federal News Network
Chicopee reexamines security measures at high school sporting events Western Massachusetts News
Ogden hangar owner's security badge restored, but legal spat continues Standard-Examiner
External Cloud Automotive Cyber Security Services Global Market Report 2022: Ukraine-Russia War Impact - Yahoo Finance
External Cloud Automotive Cyber Security Services Global Market Report 2022: Ukraine-Russia War Impact Yahoo Finance
Remarks at a UN Security Council Briefing on the UN Investigative Team for Accountability of Da'esh/ISIL (UNITAD) - United States Mission to the United Nations
Remarks at a UN Security Council Briefing on the UN Investigative Team for Accountability of Da'esh/ISIL (UNITAD) United States Mission to the United Nations
St. Louis Hills Man Designs Security App to Combat Crime Riverfront Times
National Terrorism Advisory System Bulletin - November 30, 2022 Homeland Security
Chinese Security Forces Well-prepared to Silence Protests VOA Learning English
BitKeep Completed a Security Audit of Swap Protocol and Launched a Secure Asset Fund With an Initial Capita... - The Daily Hodl
BitKeep Completed a Security Audit of Swap Protocol and Launched a Secure Asset Fund With an Initial Capita... The Daily Hodl
Social Security update: Exact date boosted direct $914 Supplemental Security Income checks will be sent out - Washington Examiner
Social Security update: Exact date boosted direct $914 Supplemental Security Income checks will be sent out Washington Examiner
Unpack With YUPAC: Security of Israel: A Priority on the Rise in the US - The Commentator - The Commentator
Unpack With YUPAC: Security of Israel: A Priority on the Rise in the US - The Commentator The Commentator
Dan Campbell has funny comment on his job security Larry Brown Sports
Columbia Police Department adds 55 live-streaming security cameras across city - Charleston Post Courier
Columbia Police Department adds 55 live-streaming security cameras across city Charleston Post Courier
Homeland Security grants new deportation amnesty for Haitians Washington Times
This Week in Apps: The year’s best apps, Twitter rival Hive’s security woes, App Store backlash grows - TechCrunch
This Week in Apps: The year’s best apps, Twitter rival Hive’s security woes, App Store backlash grows TechCrunch
Energy Security Support to Ukraine - United States Department of State Department of State
Transcard Enables Property Management Firms to Streamline Security Deposit Refunds with Multi-Party Payment Solution - PR Web
Transcard Enables Property Management Firms to Streamline Security Deposit Refunds with Multi-Party Payment Solution PR Web
Cequence Security Generates Millions in Pipeline Using Data-Driven Insights from ON24 - Business Wire
How Chinese students made an ‘invisibility cloak’ that evades security cameras - South China Morning Post
How Chinese students made an ‘invisibility cloak’ that evades security cameras South China Morning Post
The Biden administration's skewed green agenda threatens American security Washington Examiner
Politician Urges Iran's Top Security Man To Change Constitution ایران اینترنشنال
Chinese Hackers Stole Millions From US COVID Relief Benefits, Secret Service Reports - Washington Free Beacon
Chinese Hackers Stole Millions From US COVID Relief Benefits, Secret Service Reports Washington Free Beacon
Do Security Cameras Stop Crime? Screen Rant
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture - The White House
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture The White House
FBI director raises national security concerns about TikTok The Associated Press
Diplomatic Security Service Leads U.S. Security at the World Cup - United States Department of State - Department of State
Diplomatic Security Service Leads U.S. Security at the World Cup - United States Department of State Department of State
Report: Iranians Launch Nationwide Labor Strike in Challenge to Regime Washington Free Beacon
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby - The White House
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby The White House
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him - CNN
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him CNN
Statement from DHS on Decision Regarding Title 42 Homeland Security
UN official calls on Security Council to support a 'secure, peaceful and prosperous Sahel' - UN News
How To Cover Your Tracks On The Internet
Every single time you access a website, you leave tracks. Tracks that others can access.
How To Clean the Spies In Your Computer?
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001.
Spyware, What It Is, What It Does, And How To Stop It
Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer.
Wireless Network Security
Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken.
P C. owners are constantly at risk from attacks by hackers.
How To Prevent Spyware Attacking Your Computer
Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source.
Phishing - Identity Theft & Credit Card Fraud
What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information.
Traditional Antivirus Programs Useless Against New Unidentified Viruses!
Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike.
Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.
Why you Must Secure your Digital Product and Thank You Web Page
A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until.
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open.
Reclaim Your PC from the Internet Spies
Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.
With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions
High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days.
Protect Your Little Black Book
The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum.
Is Shopping Online For Your Horse Gifts Safe?
Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online.
The Risk Of Electronic Fraud & Identity Theft
Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face.
Phishing: A Scary Way of Life
The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail.
DOS Attacks: Instigation and Mitigation
During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website.
Internet Scams: Dont be a Victim
As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent.
Email Scams - Ten Simple Steps To Avoiding Them
According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims.
|home | site map|