Corpus ID: 155643062

The Mind Has No Firewall

@inproceedings{Thomas1998TheMH,
  title={The Mind Has No Firewall},
  author={T. Thomas},
  year={1998}
}
  • T. Thomas
  • Published 1998
  • Political Science
  • The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.[2] We are on the threshold of an era in which these data processors of… CONTINUE READING
    Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated
    • 37
    • PDF
    Opening Pandora's box: How technologies of communication and cognition may be shifting towards a 'psycho-civilized society'
    • 1
    • Highly Influenced
    • PDF
    Mind Control with Electromagnetic Frequency
    Soleilmavis' case summary on mind control torture and abuse
    THE EARLY MIND WARS
    Hacking the Akashic Records: The Next Domain for Military Intelligence Operations?

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 16 REFERENCES
    Zap! Hard day at the office for NATO's laptop warriors,
    • 1997
    Background on the Aviary
      Can Rulers Make `Zombies' and Control the World?
        Can Rulers Make `Zombies' and Control the World?" Orienteer
        • 1997
        Chernishev , " Can Rulers Make ` Zombies ' and Control the World ? Douglas Pasternak , " Wonder Weapons
        • 1982
        Cybernetic Battlefield & National Security,
        • 1997
        DOD looks for IT `golden nuggets,'
        • 1997
        FM 101-5-1, Operational Terms and Graphics
          Ibid . 12 . Larry Dodgen , " Nonlethal Weapons , " U . S . News and World Report , 4 August 1997 , p . 5 . 13 . " Background on the Aviary
          • 1982
          Information War and Some Aspects of a Computer Operator's Defense