![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Hacking the Body Via PDA Wireless Device
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves. The brain waves run at 5Hz to 50Hz range generally depending on the content of things like caffeine. And the nerves and body signals also have ranges, here is some interesting information on that: http://www.ncbi.nlm.nih.gov/entrez/query.f...2&dopt=Abstract Now then if we take quartz crystals and put them in PDA devices, we could communicate to the bodies own system through the 8.0 KHz range: http://www.cmac.com/mt/databook/crystals/smd/cx1_2.html You can also put a thought into someone's mind through the waves and frequencies at this level with a little fine-tuning. Meaning you could communicate without speech. And this has uses in Space travel, Under Water Exploration and even in special teams, which need quietness to fulfill mission. http://www.phoneinbuddy.com/TB_compression.htm Now when someone is carrying a personal electronic device there are ways to get to these frequencies. One way is to find the difference between the two components of the device, for instance the motherboard and the CPU, and get that device to one of the numbers near or around 5-50 Hz or 8 KHz. This can be done by sending information or energy to the device from somewhere else. This can be done by first pinpointing the device by GPS or other line of sight means and then sending pulses to the device, which will boost or lower the devices output or by sending a signal to the device under normal conditions that the device uses to operate. Microwave, Terabeam, Sound, laser, etc. may all be used for such. Now then once you spike one of the components of the device close to the other components range and get the difference within the range of the human bodily functions frequencies you can then introduce the desired result. For instance put the person to sleep slowly by lowering the difference between the waves of the device. You could increase it causing anxiety and possible even introduce information into the brain. For instance, you could contact the brain and auditory function and say "Run" or "This is Allah, killing Americans is wrong, put down your weapon and return to your family and be a good father and knock it off." We already know that wireless devices can be easily hacked into as we have been reading. For instance the new WiFi freedom also has associated flaws and potential risks. You might want to Google these companies also on the subject: Airdefense, Atheros, LXE, and Airmagnet. HIPPA issues medical data could be at risk without scrutiny since Hospitals and First Responders must rely on mobile devices to help save lives and remain efficient in those times of critical need. The medical industry is certainly discussing the HIPPA issues with wireless mobility. How can they have the information rapidly available and also maintain complete privacy when the information goes over the airwaves? As speed increases and add ons occur security issues need to be continually reviewed and upgraded procedures. Blackberry is concerned and diligently working on the problems. Other Wireless Security Issues Include some below and this is just the beginning really, after all we cannot even get rid of SPAM. While tapping information from normal citizens you can see the problems. Then the people in the know will export the hacking technology and then the same companies working in defense will have these people employed there, then those people will teach others who are our potential enemies and then we are in trouble. As this technology becomes more advanced it is quite possible to read people's minds, enter thoughts into their heads, put them to sleep, increase heart rates to non-possible levels, cause anxiety or disrupt nerve impulses and mobility. All by using their on board PDA, Cell Phone or other electronic device. It is even possible now to send information this way using the skull and jawbone as an antenna and the vibrations are picked up by the inner ear. The PDA wireless device or cell phone is merely an amplifier and since it has it's own power source maybe used in such a way as these companies are discovering and consumers seem to be happy to use. By reducing the amount of energy in the device itself batteries will last longer since lower volumes will be needed. The energy could come from the sender entirely, therefore batteries draining are no longer an issue. If people have RFID implants they could hook themselves up to a machine at night running on 8Hz which could super charge their immune system along with a once per week tablet of super vitamin C with is said to be 100 times more potent than the Vitamin C Fred Flintstone Chewables our kids take. Having a pace making device to steady one's system while performing extraordinary tasks could be good for adrenaline burn on nerves, NASCAR drivers, Apache Attack Helicopter Pilots, Astronauts, etc. by stabilizing the body and allowing the mind to focus on the event in a clear headed way. If an enemy set of troops has implanted RFID tags we could stimulate the bodily functions by way of external impulse waves and help them change their minds to fight. Therefore Blue and Red Force tracking issues would be in our favor even if they had identical systems which were bought by pirated software from the DOD by a rogue nation. We could disable and over power implanted devices and therefore they would show up as another color, the enemy would see it's "Blue-friendly" turn to "Red Bad-guy" and thus not know who is who and kill their own men or be so confused that they stopped giving orders of what to shoot at and in the confusion and hesitation you have the time on your side and all options meaning, a decisive victory is in sort order of said battle. It may appear to be rather a difficult task to take control of a body, but really it is not since the body is merely an organic robot and it works on a set of principles. You only have to change those few things. When we recently discussed the use of Long-range wireless tasers for crowd control we could see what we are technologically advancing in this regard. We know that we can stop human armies by way of bullets, explosion, harmonics, microwaves. We can blind them, nuke them, sterilize them and even make them fall down and cry. But using this methodology of using portable devices on that person, we could essentially control them by phone lines half way around the world. Once access is giving or even overwhelmed by electronic power you would have control of that person's thoughts, central nervous system and heart rate. An interesting concept in that a doctor could have a patient on the phone and stabilize their blood pressure, heart rate or even put in settings for super healing while they sleep. Or in the case of conflict you could bring an army to it's knees and completely immobilize it, put the rank and file into deep sleep, end the natural lives of those participating trying to kill you or make them think twice about what they were doing. This is not science fiction we are nearly here, we need to stay "Heads UP" on these issues. "Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs
MORE RESOURCES: Opinion | What Happens When There’s a Real National Security Crisis? The New York Times AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock The Hacker News Rewind and Reconnoiter: Is Climate Security Out in the Cold in the U.S. Intelligence Community? War on the Rocks Law Firms Fear Trump Orders Could Affect Security Clearances of Lawyers Who Are Military Reservists Military.com DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Kirtland Security Forces Detective Trains with APD to Strengthen Investigative Skills, Partnerships afgsc.af.mil AWS achieves Cloud Security Assurance Program (CSAP) low-tier certification in AWS Seoul Region Amazon Web Services Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News DOJ grant supports study of the effects of school security equipment on student outcomes George Mason University Rep. Carbajal Statement Following New Reporting on National Security Advisor Mike Waltz’s Extensive Use of Signal for Official Work Purposes Congressman Salud Carbajal (.gov) Space Security Sentinel Via Satellite Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch 2024 Security IP Year In Review: Innovations And Best Practices Semiconductor Engineering Auto Sector Leads The Way In IC Security Semiconductor Engineering Israel Warns ‘Syria’s AL-Jolani of Heavy Price' If Security Interests Are Threatened kurdistan24.net Mike Waltz’s team set up at least 20 Signal chats for national security work – report - The Guardian Corgea BLAST uncovers hidden vulnerabilities in code Help Net Security 1touch.io helps organizations safeguard sensitive data Help Net Security Open-source malware doubles, data exfiltration attacks dominate Help Net Security Planning for your IAM Roles Anywhere deployment Amazon Web Services SIA NPS Awards Celebrate Innovations in Security Technology Security Info Watch Milwaukee's Brady Street businesses increase security to improve safety FOX6 News Milwaukee Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com CyberQP launches Zero Trust Helpdesk Security Platform Help Net Security Are LLM firewalls the future of AI security? Computer Weekly National Security Space Association's Marc Berkowitz Nominated to Serve as Assistant Secretary of Defense Space Coast Daily Commission presents a European internal security strategy European Commission Law firms fear Trump orders could affect security clearances of lawyers who are military reservists ABC News Mountain Home approves renaming Veterans Plaza after First Security Bank Mountain Home Observer I sent hundreds of cold emails to find a US VC firm that would hire me as an immigrant. I'm glad I ended up at a small company. Business Insider Russia's FSB security service searches home of elderly father of former Navalny aide The Jerusalem Post Building a cybersecurity strategy that survives disruption Help Net Security Israel's security is America's security. Americans should not ignore that - opinion The Jerusalem Post Beware fake AutoCAD, SketchUp sites dropping malware Help Net Security Opinion: Alaska can increase its food security without an agriculture department Anchorage Daily News Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles County approves more security for Colbert courthouse timesdaily.com Terahertz Imaging Poised to Shake Up Weapons Detection Security Info Watch Glencoe based Security Bank & Trust Co. expands reach in Minnesota McLeod County Chronicle Security, Data Privacy, AI Code Reliability Biggest Software Development Challenges for 2025 Supply & Demand Chain Executive Opinion: Trump’s casual response to his administration’s security lapse Chattanooga Times Free Press Apple security chief acquitted, mistrial for ex-undersheriff in Santa Clara County gun permit bribery case The Mercury News Charges Filed Against Former PUSD Security Guard Pasadena Now Kratos Defense & Security Solutions (NasdaqGS:KTOS) Breaks Ground On New Hypersonic Facility Yahoo Finance Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com Fight at maximum security unit precedes tour by state’s prison work group - South Dakota Searchlight Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight NYPD boosts synagogue security ahead of Passover as anti-Jewish crimes 'jump off the page' New York Post HPD, Homeland Security bust multiple game rooms FOX 26 Houston New security system coming to Alaska’s Capitol building Your Alaska Link National security implications of tariff announcement LiveNOW from FOX |
![]() |
![]() |
![]() |
RELATED ARTICLES
How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. Computer-Virus Writers: A Few Bats In The Belfry? "Male. Obsessed with computers. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. ![]() |
home | site map |
© 2006 |