Corpus ID: 155643062

The Mind Has No Firewall

@inproceedings{Thomas1998TheMH,
  title={The Mind Has No Firewall},
  author={Timothy L. Thomas},
  year={1998}
}
The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.[2] We are on the threshold of an era in which these data processors of… Expand
Exploring the Human Computer Interface and Photic Driving.
TLDR
It is indicated that no direct correlation between photic driving and test score can be proved, and subjects' comments following their participation indicate however that there were some significant effects caused by the photic drive that were not reflected in the test scores. Expand
Mind Control with Electromagnetic Frequency
TLDR
A brief introduction to mind control technologies, the grave situation of hidden mind co ntrol abuses and tortures, and victims, including Soleilmavis Liu, whose work is to exposeMind control technologies and their torturous abuses, and to urge governments worldwide to invest and halt these egregious violations of human rights. Expand
Opening Pandora's box: How technologies of communication and cognition may be shifting towards a 'psycho-civilized society'
  • K. Dennis
  • Sociology, Computer Science
  • First Monday
  • 2008
TLDR
Whether the use of wireless technologies to target an individual's biological body is not shifting dangerously towards a psycho-civilised society, where greater emphasis is placed upon social control and pre-emptive strategies is considered. Expand
Mind Control: the Ultimate Brave New World
    Technologies for stimulating the brain and controlling the mind can have benefits, but they have a dark side that military and intelligence planners have been exploiting for decades.It would alsoExpand
    Soleilmavis' case summary on mind control torture and abuse
    One of the twenty-first century’s greatest violations of human rights is the proliferation of mind control technologies and their accompanying abuse and torture. The author, Soleilmavis Liu, is oneExpand
    THE EARLY MIND WARS
    My work at the time was involved with an AI database for paranormal references (Project Parafile). A second paper was also presented at the Omniversal Symposium, California State College at Sonoma,Expand
    Hacking the Akashic Records: The Next Domain for Military Intelligence Operations?
    Abstract This paper outlines a hypothetical six-dimension doctrine for military intelligence-gathering in the Akashic domain. The Akashic records are described by esotericists and mystics as aExpand
    Challenging the United States Symmetrically and Asymmetrically: Can America Be Defeated
    Abstract : The U.S. Army War College's Ninth Annual Strategy Conference was held at Carlisle Barracks, Pennsylvania, during the period March 31-April 2, 1998. The theme of the conference wasExpand
    Strategic Influence Operations - The Information Connection
    Abstract : The intent of this paper is to analyze and highlight the U.S. government's (USG) current approach to conducting strategic influence operations within the international envrionment.Expand
    How We Will Lose the Next War with Russia: A Critique of US Military Strategy
    The ignominious fiasco of our campaign against Iraq showed that our strategy was deficient or had gone on holiday. We have clearly forgotten that war remains the continuation of politics by otherExpand
    ...
    1
    2
    ...

    References

    SHOWING 1-10 OF 16 REFERENCES
    Zap! Hard day at the office for NATO's laptop warriors,
    • The Times,
    • 1997
    Can Rulers Make `Zombies' and Control the World?" Orienteer
    • 1997
    Cybernetic Battlefield & National Security,
    • Nezavisimoye Voyennoye Obozreniye,
    • 1997
    DOD looks for IT `golden nuggets,'
    • Federal Computer Week,
    • 1997
    Nonlethal Weapons," U.S
    • News and World Report,
    • 1997
    Wonder Weapons," U.S
    • News and World Report,
    • 1997
    Information War and Some Aspects of a Computer Operator's Defense," talk given at an Infowar Conference in Washington, D.C., September 1996, sponsored by the National Computer Security Association
    • 1996
    The Front Where Shots Aren't Fired," Orienteer, May 1995, p. 45. This article was based on information in the foreign and Russian press, according to the author, making it impossible
    • 1995
    Chernishev , " Can Rulers Make ` Zombies ' and Control the World ? Douglas Pasternak , " Wonder Weapons
    • Joint Pub 3 - 13 . 1 , Joint Doctrine for Command and Control Warfare ( C 2 W ) , 7 February 1996 , p . v . 6 . The American Heritage Dictionary
    • 1982
    Ibid . 12 . Larry Dodgen , " Nonlethal Weapons , " U . S . News and World Report , 4 August 1997 , p . 5 . 13 . " Background on the Aviary
    • " Cybernetic Battlefield & National Security , " Nezavisimoye Voyennoye Obozreniye
    • 1982
    ...
    1
    2
    ...