Mastering the Human Domain

Military Is Developing ‘Cognitive Warfare’ Weapons

And HERE

OCTOBER 15, 2021

Western governments in the NATO military alliance are developing tactics of “cognitive warfare,” using the supposed threats of China and Russia to justify waging a “battle for your brain” in the “human domain,” to “make everyone a weapon.”

NATO is developing new forms of warfare to wage a “battle for the brain,” as the military alliance put it.

The US-led NATO military cartel has tested novel modes of hybrid warfare against its self-declared adversaries, including economic warfare, cyber warfare, information warfare, and psychological warfare.

Now, NATO is spinning out an entirely new kind of combat it has branded cognitive warfare. Described as the “weaponization of brain sciences,” the new method involves “hacking the individual” by exploiting “the vulnerabilities of the human brain” in order to implement more sophisticated “social engineering.”

Until recently, NATO had divided war into five different operational domains: air, land, sea, space, and cyber. But with its development of cognitive warfare strategies, the military alliance is discussing a new, sixth level: the “human domain.”

2020 NATO-sponsored study of this new form of warfare clearly explained, “While actions taken in the five domains are executed in order to have an effect on the human domain, cognitive warfare’s objective is to make everyone a weapon.”

“The brain will be the battlefield of the 21st century,” the report stressed. “Humans are the contested domain,” and “future conflicts will likely occur amongst the people digitally first and physically thereafter in proximity to hubs of political and economic power.”

While the NATO-backed study insisted that much of its research on cognitive warfare is designed for defensive purposes, it also conceded that the military alliance is developing offensive tactics, stating, “The human is very often the main vulnerability and it should be acknowledged in order to protect NATO’s human capital but also to be able to benefit from our adversaries’s vulnerabilities.”

In a chilling disclosure, the report said explicitly that “the objective of Cognitive Warfare is to harm societies and not only the military.”

With entire civilian populations in NATO’s crosshairs, the report emphasized that Western militaries must work more closely with academia to weaponize social sciences and human sciences and help the alliance develop its cognitive warfare capacities.

The study described this phenomenon as “the militarization of brain science.” But it appears clear that NATO’s development of cognitive warfare will lead to a militarization of all aspects of human society and psychology, from the most intimate of social relationships to the mind itself.

Such all-encompassing militarization of society is reflected in the paranoid tone of the NATO-sponsored report, which warned of “an embedded fifth column, where everyone, unbeknownst to him or her, is behaving according to the plans of one of our competitors.” The study makes it clear that those “competitors” purportedly exploiting the consciousness of Western dissidents are China and Russia.

In other words, this document shows that figures in the NATO military cartel increasingly see their own domestic population as a threat, fearing civilians to be potential Chinese or Russian sleeper cells, dastardly “fifth columns” that challenge the stability of “Western liberal democracies.”

NATO’s development of novel forms of hybrid warfare come at a time when member states’ military campaigns are targeting domestic populations on an unprecedented level.

The Ottawa Citizen reported this September that the Canadian military’s Joint Operations Command took advantage of the Covid-19 pandemic to wage an information war against its own domestic population, testing out propaganda tactics on Canadian civilians.

Internal NATO-sponsored reports suggest that this disclosure is just scratching the surface of a wave of new unconventional warfare techniques that Western militaries are employing around the world.

“Cognitive warfare seeks to change not only what people think, but also how they act,” the Canadian government wrote in its official statement on the challenge. “Attacks against the cognitive domain involve the integration of cyber, disinformation/misinformation, psychological, and social-engineering capabilities.”

Ottawa’s press release continued: “Cognitive warfare positions the mind as a battle space and contested domain. Its objective is to sow dissonance, instigate conflicting narratives, polarize opinion, and radicalize groups. Cognitive warfare can motivate people to act in ways that can disrupt or fragment an otherwise cohesive society.”

Read full story here… or  Read More HERE

.

Cognitive Warfare

June-November 2020

Hacking the individual

The revolution in information technology has enabled cognitive manipulations of a new kind, on an unprecedented and highly elaborate scale. All this happens at much lower cost than in the past, when it was necessary to create effects and impact through non-virtual actions in the physical realm. Thus, in a continuous process, classical military capabilities do not counter cognitive warfare. Despite the military having difficulty in recognising the reality and effectiveness of the phenomena associated with cognitive warfare, the relevance of kinetic and resource-intensive means of warfare is nonetheless diminishing.

Social engineering always starts with a deep dive into the human environment of the target.  The goal is to understand the psychology of the targeted people.

This phase is more important than any other as it allows not only the precise targeting of the right people but also to anticipate reactions, and to develop empathy. Understanding the human environment is the key to building the trust that will ultimately lead to the desired results.  Humans are an easy target since they all contribute by providing information on themselves, making the adversaries’ sockpuppets more powerful.4  In any case NATO’s adversaries focus on identifying the Alliance’s centres of gravity and vulnerabilities.  They have long identified that the main vulnerability is the human. It is easy to find these centres of gravity in open societies because they are reflected in the study of human and social sciences such as political science, history, geography, biology, philosophy, voting systems, public administration, international politics, international relations, religious studies, education, sociology, arts and culture…

Cognitive Warfare is a war of ideologies that strives to erode the trust that underpins every society.

Read More HERE

.

In the article below, they basically compare people to a computer.  That is because they are working very hard to make the human brain programmable.

.

People Hacking : The Psychology of Social Engineering Text of Harl’s Talk at Access All Areas III

Read More Here

.

The booklet below is amazing.  I only had time to read enough to give you a taste.  I know I will spend hours with it.  Here’s a piece of the puzzle.

.

The Human Brain Project A Report to The European Commision

April 2012

The Human Brain Project

Understanding the human brain is one of the greatest challenges facing 21st century science. If we can rise to the challenge, we can gain fundamental insights into what it means to be human, develop new treatments for brain diseases, and build revolutionary new Information and Communications Technologies (ICT). In this report, we argue that the convergence between ICT and biology has reached a point at which it can turn this dream into reality. It was this realisation that motivated the authors to launch the

Human Brain Project – Preparatory Study (HBP-PS) – a one year EU-funded Coordinating Action in which nearly three hundred experts in neuroscience, medicine and computing came together to develop a new “ICT-accelerated” vision for brain research and its applications. Here, we present the conclusions of our work.

We find that the major obstacle that hinders our understanding of the brain is the fragmentation of brain research and the data it produces. Modern neuroscience has been enormously productive but unsystematic. The data it produces describes different levels of biological organisation, in different areas of the brain in different species, at different stages of development. Today we urgently need to integrate this data – to show how the parts fit together in a single multi-level system.

Thanks to the convergence between biology and ICT, this goal is within our grasp. New sequencing and imaging technologies and new techniques of microscopy have revolutionized our ability to observe the brain. Cloud technology, combined with the Internet, allows us to federate data from research groups and clinics all over the world, Neuroinformatics gives us new means to analyse the data, to build and share detailed brain atlases, to identify gaps in our knowledge and to predict the value of parameters where experimental data is still missing. Supercomputers make it possible

to build and simulate brain models with unprecedented levels

of biological detail.

These technologies can enormously accelerate brain research. They can also open the road to treatments that prevent and cure brain disease and to new computing technologies with the potential to revolutionise industry, the economy and society. Medical informatics can mine enormous volumes of clinical data allowing us to understand the basic causes of brain diseases, a pre-condition for early

diagnosis, prevention and cure. Meanwhile, brain simulation has the potential to revolutionise ICT itself, laying the foundations for a completely new category of low-energy computing systems, with brain-like intelligence. If European industry is to play a leading role in the world economy of the

2020s and 2030s, it has to take the lead in developing these technologies.

Applying ICT to brain research and its applications promises huge economic and social benefits. But to realize these benefits, we first have to make the technology accessible to scientists, building it into research platforms they can use for basic and clinical research, drug discovery, and

Read More HERE

.

Towards Social and Affective Machine Learning, Natasha Jaques

Social learning is a crucial component of human intelligence, allowing us to rapidly adapt to new scenarios, learn new tasks, and communicate knowledge that can be built on by others. Can the ability of artificial intelligence to learn, adapt, and generalize to new environments be enhanced by mechanisms that allow for social learning? My work proposes novel deep- and reinforcement-learning methods that improve the social and affective capabilities of artificial intelligence (AI), through social learning both from humans and from other AI agents. I show how AI agents can learn from each other in a multi-agent environment, and learn from humans by sensing their social and affective cues. Together, these social learning techniques allow AI agents to flexibly learn from each other and from humans.

Natasha Jaques recently finished her PhD at MIT, which focused on improving the social and affective intelligence of deep learning and deep reinforcement learning. She is now a Research Scientist at Google Brain and Berkeley working with Sergey Levine and Doug Eck. Her work has received an honourable mention for best paper at ICML 2019, a best paper award at the NeurIPS ML for Healthcare workshop and was part of the team that received Best Demo at NeurIPS 2016. She has interned at DeepMind, Google Brain, and is an OpenAI Scholars mentor. Her work has been featured in Quartz, the MIT Technology Review, Boston Magazine, and on CBC radio. Natasha earned her Masters degree from the University of British Columbia, and undergraduate degrees in Computer Science and Psychology from the University of Regina.

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*¬~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

I know it’s ridiculous these days, but I get the warm fuzzies when I think of militaries.  I read a story about arm fuzzies and cold pricklies to my children maybe forty years ago.  They weren’t quite like what you will see below, but you get the idea…

What are warm fuzzies like?  Look here:

TAC The Original Warm Fuzzy Tale – Claude Steiner.

This video is about TAC The Original Warm Fuzzy Tale by Claude Steiner

Narrated by Rosalind Sharples.

A Transactional Analysis Cymru Ltd Production.

This story tells us about the importance of kindness and warmth.

Claude Steiner uses his story (for children and adults) to get us to think about what happens when we a stingy with our kindness to and our compassion for each other.

This relates to Eric Berne’s theory of Psychological Hungers and Strokes and their importance for healthy development. In a sense these concepts are the foundation of Script development in Transactional Analysis.

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*¬~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

.

But things have changed…

.

The Tale of the Warm Fuzzies – 2021 Edition

Life is the only game where the rules are to find out what the rules are….

We all have choice in life and the biggest choice we get is to choose our own thoughts. 🧠 When we let others control our thoughts and tell us what to do we spiral down. When we consciously focus our thoughts on what we want we Spiral Up.🌟

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*¬~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

.

I’ve always been of the mind that humanity operated like cogs in a wheel.  There is far too much knowledge for any one person to hold, so we each hold a piece of it and must do our part.  I know things and learn things easy—so that’s my part.

Military was never my thing, but it seems our military has come to view us as something to control rather than something to serve.  We used to be the military.  The military has now established its own subculture and has become very STRONG.  With the establishment of human stratums, we have become far less than cogs in any wheel.

Now we fight each other for position in that stinking pile.  Statistically most of us end up in the pile of bodies.  We’ve been had.

BE WARNED!!!

They put this stuff together years in advance.  You might think because some of this information is old, it has no meaning.

REMEMBER NOW!!!

They’ve been destroying us with chemicals and shots and pharmaceutical products for over fifty years—that’s Half a Century.  They got my babies with their baby shots in the 1970s.

.

JADE HELM: “MASTERING THE HUMAN DOMAIN”-1033 Program & Exec Order 13684

Read More HERE

.

JADE HELM: “MASTERING THE HUMAN DOMAIN”-1033 Program & Exec Order 13684

According to SOCOM, THIS EXERCISE IS SCHEDULED TO END ON SEPTEMBER 11th, not the 15th as being reported. Coincidence?

Jade Helm appears to be an integral part of Obama’s executive order 13684, 21st Century Policing, in conjunction with his 1033 Program which were both quietly signed recently with virtually no MSM coverage or fanfare.

We’ve seen all too often how the road to hell is often paved with what appear to be, on the surface, good intentions.

It is important to watch the entire video to understand the USAWC’s war tactic,

“Mastering the Human Domain – No Turning Back” and how this ties into Obama’s XO 13684 and the 1033 Program.

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*¬~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

.

There are so many military publications available.  They are brilliant.  The Art of War is centuries old.  Too bad we don’t pay as much attention to the Art of Peace.

.

ART OF WAR | SUN TZU

A 2009 History Channel Documentary narrated by James Lurie.

Although accounts differ over the Sun Tzu’s origins, according to a biography written by a 2nd century BC historian he was a general who lived in the state of Wu in 6th century BC.

Sun Tzu is most famous for the Art of War, praised as the definitive work on military strategy and tactics prior to the collapse of imperial China. Consisting of 13 chapters, the Art of War is one of the most famous studies on strategies for military success.

The most fundamental of Sun Tzu’s principles is that “warfare is based on deception”, and he believed that “the supreme art of war is to subdue the enemy without fighting”. One of his stratagems emphasizes the importance of knowing your enemy, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat”. Over the centuries it has been influential to both traditional armies and guerrilla fighters .

This is a documentary on the main principles of Sun Tzu’s “Art of War” illustrated with examples from the Vietnam War (Demoralization), the Second World War (Invasion of Normandy), the American Civil War (Gettysburg) and Tzu’s own battles.

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*¬~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

.

Let’s look at some of the documents out there:

.

Deployment and Redeployment Operations

Read More Here

.

Here we go again…  I had pointed out in this article that we have military operations all over the world:

.

.

.

The Human Body, Nanotechnology, and We—Augmented [first posted 2/1/2021]

.

.

.

.

U.S. Army Europe:  Reception, Staging, Onward Movement, and Integration

Read More HERE

.

Joint Headquarters Organization, Staff Integration, and Battle Rhythm

9/1/2019

2.0 HEADQUARTERS ORGANIZATION.

We continue to find that the traditional HQ structure with a Commander, Deputy(s), Command Senior Enlisted Leader (CSEL), Chief of Staff, personal and special staffs, and J-staff is most effective. This basic structure provides the headquarters with effective and efficient coordination and control, accountability, and administration characteristics less evident in other types of organizations. This structure ensures the major directorate principals remain accountable through the CoS to the Commander for the major functions of the HQ. It also facilitates the rapid integration of staff augments, is recognizable and understood across the Joint Force, Services, and our partners, and allows for effective interaction with other HQs.

We have found several functions within HQs that require clarification on which staff and senior leaders is responsible. They include assessment, fires and targeting (kinetic and non-kinetic), interagency and multinational coordination, key leader engagements, reports to higher HQ, and knowledge and information management. While an SOP may codify these functions, we find that their inclusion in a TOR (discussed below) provides better awareness of Commander’s expectations.

As noted earlier, size of HQs is also important; large HQs often take on unnecessary functions, require more internal coordination, and have the potential to overwhelm mission partners with demands for information, all of which can reduce the focus on providing agile support to commander decision requirements and subordinates.

Mission drives function. The role of the HQs will largely dictate required functions, processes, liaison, and outputs.  As depicted in the adjacent figure, the HQs role is a function of the USG role relative to other actors, the US military role relative to other USG agency actors, the CCMD role relative to other DOD organizations, and internally to a CCMD, the HQs role with the other components. Spend time upfront understanding the role of the HQs, and identifying required HQ functions, and determining and codifying the appropriate organization, responsibilities, and processes before focusing on specifics of manning.

Terms of Reference (TOR). Most commands describe or direct organization, staff roles and responsibilities in SOPs or HQ instructions. However, we find that many develop a Commander-unique TOR document to delineate roles, authorities, and responsibilities for the command group and key staff (the figure denotes four of several more roles). TORs help clarify key leader portfolios and informs

Read More HERE

.

JOINT RECEPTION STAGING ONWARD MOVEMENT AND INTEGRATION (JRSOI)

14-06-2019

Read More HERE

.

I find it very hard to think of our warriors as the enemy, but we really need to remember what Eisenhower told us so long ago:

.

EISENHOWER FAREWELL ADDRESS – ‘MILITARY INDUSTRIAL COMPLEX’ WARNING

President Dwight D. Eisenhower’s Farewell Address, famed for its reference to the “military-industrial complex,” is one of the most famous speeches in American history. Its meaning has been analyzed and debated by historians ever since. President Eisenhower delivered the speech on January 17, 1961. Audio recording of the Farewell Address

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

.

And of course don’t forget this guy…

.

ART OF WAR | SUN TZU

A 2009 History Channel Documentary narrated by James Lurie.

Although accounts differ over the Sun Tzu’s origins, according to a biography written by a 2nd century BC historian he was a general who lived in the state of Wu in 6th century BC.

Sun Tzu is most famous for the Art of War, praised as the definitive work on military strategy and tactics prior to the collapse of imperial China. Consisting of 13 chapters, the Art of War is one of the most famous studies on strategies for military success.

The most fundamental of Sun Tzu’s principles is that “warfare is based on deception”, and he believed that “the supreme art of war is to subdue the enemy without fighting”. One of his stratagems emphasizes the importance of knowing your enemy, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat”. Over the centuries it has been influential to both traditional armies and guerrilla fighters .

This is a documentary on the main principles of Sun Tzu’s “Art of War” illustrated with examples from the Vietnam War (Demoralization), the Second World War (Invasion of Normandy), the American Civil War (Gettysburg) and Tzu’s own battles.

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*¬~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

.

Click a link below to get your copy of The Nuremberg Code.

http://www.environmentandhumanrights.org/resources/Nuremberg%20Code.pdf

2-2-the-nuremberg-code-1Download

.

Nuremberg Code Video link

.

If you download The Nuremberg Code, understand you have to do something with it.  Please e-mail these folks below:

.

It’s actually time to stop talking and stop watching videos and signing useless petitions and do this:

It’s time to get The Hague involved for violations of The Nuremberg Code and Crimes Against Humanity.  Contact them here:

Submit communications to the
Office of the Prosecutor

Information and Evidence Unit
Office of the Prosecutor

Post Office Box 19519
2500 CM The Hague
The Netherlands
otp.informationdesk@icc-cpi.int
Fax +31 70 515 8555

.

Trying individuals for genocide, war crimes, crimes against humanity, and aggression

Contact us

Communications and claims under art.15 of the Rome Statute may be addressed to:

Information and Evidence Unit
Office of the Prosecutor
Post Office Box 19519
2500 CM The Hague
The Netherlands

or sent by email to otp.informationdesk@icc-cpi.int

or sent by facsimile to +31 70 515 8555.

The more of us who do this, the more they can’t ignore us.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: