Hacking the Body Via PDA Wireless Device
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves.
The brain waves run at 5Hz to 50Hz range generally depending on the content of things like caffeine. And the nerves and body signals also have ranges, here is some interesting information on that:
Now then if we take quartz crystals and put them in PDA devices, we could communicate to the bodies own system through the 8.0 KHz range:
You can also put a thought into someone's mind through the waves and frequencies at this level with a little fine-tuning. Meaning you could communicate without speech. And this has uses in Space travel, Under Water Exploration and even in special teams, which need quietness to fulfill mission.
Now when someone is carrying a personal electronic device there are ways to get to these frequencies. One way is to find the difference between the two components of the device, for instance the motherboard and the CPU, and get that device to one of the numbers near or around 5-50 Hz or 8 KHz. This can be done by sending information or energy to the device from somewhere else. This can be done by first pinpointing the device by GPS or other line of sight means and then sending pulses to the device, which will boost or lower the devices output or by sending a signal to the device under normal conditions that the device uses to operate. Microwave, Terabeam, Sound, laser, etc. may all be used for such. Now then once you spike one of the components of the device close to the other components range and get the difference within the range of the human bodily functions frequencies you can then introduce the desired result. For instance put the person to sleep slowly by lowering the difference between the waves of the device. You could increase it causing anxiety and possible even introduce information into the brain. For instance, you could contact the brain and auditory function and say "Run" or "This is Allah, killing Americans is wrong, put down your weapon and return to your family and be a good father and knock it off."
We already know that wireless devices can be easily hacked into as we have been reading. For instance the new WiFi freedom also has associated flaws and potential risks. You might want to Google these companies also on the subject: Airdefense, Atheros, LXE, and Airmagnet.
HIPPA issues medical data could be at risk without scrutiny since Hospitals and First Responders must rely on mobile devices to help save lives and remain efficient in those times of critical need. The medical industry is certainly discussing the HIPPA issues with wireless mobility. How can they have the information rapidly available and also maintain complete privacy when the information goes over the airwaves?
As speed increases and add ons occur security issues need to be continually reviewed and upgraded procedures. Blackberry is concerned and diligently working on the problems. Other Wireless Security Issues Include some below and this is just the beginning really, after all we cannot even get rid of SPAM.
While tapping information from normal citizens you can see the problems. Then the people in the know will export the hacking technology and then the same companies working in defense will have these people employed there, then those people will teach others who are our potential enemies and then we are in trouble.
As this technology becomes more advanced it is quite possible to read people's minds, enter thoughts into their heads, put them to sleep, increase heart rates to non-possible levels, cause anxiety or disrupt nerve impulses and mobility. All by using their on board PDA, Cell Phone or other electronic device. It is even possible now to send information this way using the skull and jawbone as an antenna and the vibrations are picked up by the inner ear.
The PDA wireless device or cell phone is merely an amplifier and since it has it's own power source maybe used in such a way as these companies are discovering and consumers seem to be happy to use. By reducing the amount of energy in the device itself batteries will last longer since lower volumes will be needed. The energy could come from the sender entirely, therefore batteries draining are no longer an issue. If people have RFID implants they could hook themselves up to a machine at night running on 8Hz which could super charge their immune system along with a once per week tablet of super vitamin C with is said to be 100 times more potent than the Vitamin C Fred Flintstone Chewables our kids take. Having a pace making device to steady one's system while performing extraordinary tasks could be good for adrenaline burn on nerves, NASCAR drivers, Apache Attack Helicopter Pilots, Astronauts, etc. by stabilizing the body and allowing the mind to focus on the event in a clear headed way.
If an enemy set of troops has implanted RFID tags we could stimulate the bodily functions by way of external impulse waves and help them change their minds to fight. Therefore Blue and Red Force tracking issues would be in our favor even if they had identical systems which were bought by pirated software from the DOD by a rogue nation. We could disable and over power implanted devices and therefore they would show up as another color, the enemy would see it's "Blue-friendly" turn to "Red Bad-guy" and thus not know who is who and kill their own men or be so confused that they stopped giving orders of what to shoot at and in the confusion and hesitation you have the time on your side and all options meaning, a decisive victory is in sort order of said battle.
It may appear to be rather a difficult task to take control of a body, but really it is not since the body is merely an organic robot and it works on a set of principles. You only have to change those few things. When we recently discussed the use of Long-range wireless tasers for crowd control we could see what we are technologically advancing in this regard. We know that we can stop human armies by way of bullets, explosion, harmonics, microwaves. We can blind them, nuke them, sterilize them and even make them fall down and cry.
But using this methodology of using portable devices on that person, we could essentially control them by phone lines half way around the world. Once access is giving or even overwhelmed by electronic power you would have control of that person's thoughts, central nervous system and heart rate. An interesting concept in that a doctor could have a patient on the phone and stabilize their blood pressure, heart rate or even put in settings for super healing while they sleep. Or in the case of conflict you could bring an army to it's knees and completely immobilize it, put the rank and file into deep sleep, end the natural lives of those participating trying to kill you or make them think twice about what they were doing. This is not science fiction we are nearly here, we need to stay "Heads UP" on these issues.
"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs
After Nashville Shooting, Christian Schools Beef Up Security and Brace for Copycats - National Review
How Chinese Private Security Companies in Africa Differ From Russia’s Voice of America - VOA News
Report: Ramming attack suspect was officer in PA security services The Times of Israel
Documents show Security Costs for Nathan Fletcher ABC 10 News San Diego KGTV
Remarks at a UN Security Council Briefing on Threats to ... - United States Mission to the United Nations
Remarks at a UN Security Council Briefing on Threats to ... United States Mission to the United Nations
DL Security Incident | Department of Public Safety the Texas Department of Public Safety
Online Briefing with Uzra Zeya, Under Secretary for Civilian Security ... Department of State
TSA officers stop Tweed New Haven Airport’s first firearm Transportation Security Administration
Lawmakers seek $75 million security grant for Milwaukee to host RNC Milwaukee Journal Sentinel
Energy security is trumping climate concerns Financial Times
WATCH: Dodgers fan gets crushed by security guard after running on field to propose to girlfriend - CBS Sports
WATCH: Dodgers fan gets crushed by security guard after running on field to propose to girlfriend CBS Sports
NYC Ramps Up Security Again Ahead of Possible Grand Jury Action Against Trump, Police Sources Say - NBC New York
NYC Ramps Up Security Again Ahead of Possible Grand Jury Action Against Trump, Police Sources Say NBC New York
Ypsilanti man pleads guilty to making false statements on security ... WDIV ClickOnDetroit
British Semiconductor Maker May Close Due To National Security Dispute With Chinese Parent Company - Forbes
British Semiconductor Maker May Close Due To National Security Dispute With Chinese Parent Company Forbes
NYC Ups Security Again After Trump Indictment, NYPD Orders Officers Report in Uniform - NBC New York
Man arrested over secretly recording Republicans prompts Senate to change security policies - NBC News
Man arrested over secretly recording Republicans prompts Senate to change security policies NBC News
TSA Honors Jacksonville Transit Authority with Gold Standard ... - Transportation Security Administration
TSA Honors Jacksonville Transit Authority with Gold Standard ... Transportation Security Administration
USENIX Security ’22 – Johannes Wikner, Kaveh Razavi – ‘RETBLEED: Arbitrary Speculative ... - Security Boulevard
USENIX Security ’22 – Johannes Wikner, Kaveh Razavi – ‘RETBLEED: Arbitrary Speculative ... Security Boulevard
Mayor of Niagara Falls launches program to encourage more businesses to install security cameras - WKBW 7 News Buffalo
Mayor of Niagara Falls launches program to encourage more businesses to install security cameras WKBW 7 News Buffalo
Murdaugh moved to protective custody at maximum security SC prison Live 5 News WCSC
Underwood Condemns Republican Plan to Cut Food Security ... Lauren Underwood
Modi Meets Patrushev, Says Russia Security Council Foreign Policy
Commerce Department Outlines Proposed National Security ... US Department of Commerce
Digest of Recent Articles on Just Security (Mar. 25-31) Just Security
Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner
China urges Apple to improve security and privacy The Register
TikTok bills could dangerously expand national security state Responsible Statecraft
TSA issues new cybersecurity requirements for airport and aircraft ... - Transportation Security Administration
TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration
Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security
Russian Court Orders Wall Street Journal Reporter Evan ... The Wall Street Journal
National security law’s effects undercut Hong Kong freedoms, says US report - South China Morning Post
National security law’s effects undercut Hong Kong freedoms, says US report South China Morning Post
FACT SHEET: President Biden’s Budget Strengthens Border ... The White House
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Why TikTok's security risks keep raising fears The Associated Press
McKeesport Area School District approves hire of more security guards; parents share concerns - WTAE Pittsburgh
McKeesport Area School District approves hire of more security guards; parents share concerns WTAE Pittsburgh
The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine
Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security
TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal
Jenkins Security Alert: New Security Flaws Could Allow Code ... The Hacker News
Officials are preparing security in case of Trump indictment The Associated Press
Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace ... The Wall Street Journal
How To Cover Your Tracks On The Internet
Every single time you access a website, you leave tracks. Tracks that others can access.
How To Clean the Spies In Your Computer?
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001.
Spyware, What It Is, What It Does, And How To Stop It
Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer.
Wireless Network Security
Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken.
P C. owners are constantly at risk from attacks by hackers.
How To Prevent Spyware Attacking Your Computer
Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source.
Phishing - Identity Theft & Credit Card Fraud
What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information.
Traditional Antivirus Programs Useless Against New Unidentified Viruses!
Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike.
Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.
Why you Must Secure your Digital Product and Thank You Web Page
A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until.
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open.
Reclaim Your PC from the Internet Spies
Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.
With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions
High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days.
Protect Your Little Black Book
The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum.
Is Shopping Online For Your Horse Gifts Safe?
Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online.
The Risk Of Electronic Fraud & Identity Theft
Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face.
Phishing: A Scary Way of Life
The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail.
DOS Attacks: Instigation and Mitigation
During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website.
Internet Scams: Dont be a Victim
As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent.
Email Scams - Ten Simple Steps To Avoiding Them
According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims.
|home | site map|