Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Hacking the Body Via PDA Wireless Device > NetSparsh - Viral Content you Love & Share

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves.

The brain waves run at 5Hz to 50Hz range generally depending on the content of things like caffeine. And the nerves and body signals also have ranges, here is some interesting information on that:

http://www.ncbi.nlm.nih.gov/entrez/query.f...2&dopt=Abstract

Now then if we take quartz crystals and put them in PDA devices, we could communicate to the bodies own system through the 8.0 KHz range:

http://www.cmac.com/mt/databook/crystals/smd/cx1_2.html

You can also put a thought into someone's mind through the waves and frequencies at this level with a little fine-tuning. Meaning you could communicate without speech. And this has uses in Space travel, Under Water Exploration and even in special teams, which need quietness to fulfill mission.

http://www.phoneinbuddy.com/TB_compression.htm

Now when someone is carrying a personal electronic device there are ways to get to these frequencies. One way is to find the difference between the two components of the device, for instance the motherboard and the CPU, and get that device to one of the numbers near or around 5-50 Hz or 8 KHz. This can be done by sending information or energy to the device from somewhere else. This can be done by first pinpointing the device by GPS or other line of sight means and then sending pulses to the device, which will boost or lower the devices output or by sending a signal to the device under normal conditions that the device uses to operate. Microwave, Terabeam, Sound, laser, etc. may all be used for such. Now then once you spike one of the components of the device close to the other components range and get the difference within the range of the human bodily functions frequencies you can then introduce the desired result. For instance put the person to sleep slowly by lowering the difference between the waves of the device. You could increase it causing anxiety and possible even introduce information into the brain. For instance, you could contact the brain and auditory function and say "Run" or "This is Allah, killing Americans is wrong, put down your weapon and return to your family and be a good father and knock it off."

We already know that wireless devices can be easily hacked into as we have been reading. For instance the new WiFi freedom also has associated flaws and potential risks. You might want to Google these companies also on the subject: Airdefense, Atheros, LXE, and Airmagnet.

HIPPA issues medical data could be at risk without scrutiny since Hospitals and First Responders must rely on mobile devices to help save lives and remain efficient in those times of critical need. The medical industry is certainly discussing the HIPPA issues with wireless mobility. How can they have the information rapidly available and also maintain complete privacy when the information goes over the airwaves?

As speed increases and add ons occur security issues need to be continually reviewed and upgraded procedures. Blackberry is concerned and diligently working on the problems. Other Wireless Security Issues Include some below and this is just the beginning really, after all we cannot even get rid of SPAM.

While tapping information from normal citizens you can see the problems. Then the people in the know will export the hacking technology and then the same companies working in defense will have these people employed there, then those people will teach others who are our potential enemies and then we are in trouble.

As this technology becomes more advanced it is quite possible to read people's minds, enter thoughts into their heads, put them to sleep, increase heart rates to non-possible levels, cause anxiety or disrupt nerve impulses and mobility. All by using their on board PDA, Cell Phone or other electronic device. It is even possible now to send information this way using the skull and jawbone as an antenna and the vibrations are picked up by the inner ear.

The PDA wireless device or cell phone is merely an amplifier and since it has it's own power source maybe used in such a way as these companies are discovering and consumers seem to be happy to use. By reducing the amount of energy in the device itself batteries will last longer since lower volumes will be needed. The energy could come from the sender entirely, therefore batteries draining are no longer an issue. If people have RFID implants they could hook themselves up to a machine at night running on 8Hz which could super charge their immune system along with a once per week tablet of super vitamin C with is said to be 100 times more potent than the Vitamin C Fred Flintstone Chewables our kids take. Having a pace making device to steady one's system while performing extraordinary tasks could be good for adrenaline burn on nerves, NASCAR drivers, Apache Attack Helicopter Pilots, Astronauts, etc. by stabilizing the body and allowing the mind to focus on the event in a clear headed way.

If an enemy set of troops has implanted RFID tags we could stimulate the bodily functions by way of external impulse waves and help them change their minds to fight. Therefore Blue and Red Force tracking issues would be in our favor even if they had identical systems which were bought by pirated software from the DOD by a rogue nation. We could disable and over power implanted devices and therefore they would show up as another color, the enemy would see it's "Blue-friendly" turn to "Red Bad-guy" and thus not know who is who and kill their own men or be so confused that they stopped giving orders of what to shoot at and in the confusion and hesitation you have the time on your side and all options meaning, a decisive victory is in sort order of said battle.

It may appear to be rather a difficult task to take control of a body, but really it is not since the body is merely an organic robot and it works on a set of principles. You only have to change those few things. When we recently discussed the use of Long-range wireless tasers for crowd control we could see what we are technologically advancing in this regard. We know that we can stop human armies by way of bullets, explosion, harmonics, microwaves. We can blind them, nuke them, sterilize them and even make them fall down and cry.

But using this methodology of using portable devices on that person, we could essentially control them by phone lines half way around the world. Once access is giving or even overwhelmed by electronic power you would have control of that person's thoughts, central nervous system and heart rate. An interesting concept in that a doctor could have a patient on the phone and stabilize their blood pressure, heart rate or even put in settings for super healing while they sleep. Or in the case of conflict you could bring an army to it's knees and completely immobilize it, put the rank and file into deep sleep, end the natural lives of those participating trying to kill you or make them think twice about what they were doing. This is not science fiction we are nearly here, we need to stay "Heads UP" on these issues.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

SB Nation

The Dolphins' dangerous stadium just caused a security guard to get hurt
SB Nation
The inexplicably close walls behind the end zones at Hard Rock Stadium have created dangerous situations in the past. On Sunday, it caused an injury to a security guard who got destroyed by Miami Dolphins wide receiver Kenny Stills. Stills caught a 5 ...
Kenny Stills cuts TD celebration short to check on security guard he ran overFor The Win
VIDEO: Dolphins Security Woman Gets Destroyed by Kenny Stills After TD Grab12up

all 18 news articles »

KOB

New Mexico districts to share funding for security upgrades
The State
More than 220 school campuses around New Mexico will be sharing state funding for security upgrades that will range from new doors and locks to fencing and security cameras. Forty-seven school districts applied for security improvements at 288 campuses.
Hundreds of New Mexico schools to get security upgradesKOB

all 4 news articles »

WIRED

The Tiny Chip That Powers Up Pixel 3 Security
WIRED
Having a secure, mobile hardware element isn't especially novel; the ARM chips that power most higher-end Android smartphones have something called TrustZone, a secure enclave within the main processor that sits apart from the operating system.


Fox News

Here's why Hillary Clinton losing her security clearance matters for the rest of us
Fox News
Hillary Clinton no longer has a security clearance. A letter released from the Department of State to Senator Chuck Grassley, a Republican from Iowa, says she lost her clearance on August 30 at her request. The State Department also withdrew security ...

and more »

Fox News

5 security settings to turn on your router before it's too late
Fox News
Suppose your house has a top-notch security system. There are locks on all the doors. Security cameras monitor from every angle. No one could get in – except for an open door that you completely forgot about and therefore leads to every room in the house.
Home Network Security in the Internet AgeTechSpective

all 2 news articles »

WWBT NBC12 News

WANTED: Man breaks into home, accidentally takes selfie on security camera
WWBT NBC12 News
BATON ROUGE, LA (WAFB) - Say Cheese! Police are asking for the public's assistance identifying and locating a burglary suspect. The East Baton Rouge Parish Sheriff's Office says on Oct. 8, they were called about a residential burglary in the 1000 block ...

and more »

Military Times

US commander confident in ability of Afghan security forces
Military Times
WASHINGTON — The assassination of Afghan leaders in Kandahar province won't lessen U.S. support for the war in Afghanistan or deter local security forces in the fight against the Taliban, the top U.S. military commander in the Middle East said Saturday.

and more »

Arizona Sports

Kenny Stills rewards security guard after sending her into endzone wall
Arizona Sports
Miami Dolphins wide receiver Kenny Stills (10) gives a football to a security woman he pushes to the ground after scoring a touchdown, during the first half of an NFL football game against the Detroit Lions, Sunday, Oct. 21, 2018, in Miami Gardens, Fla.
Kenny Stills hammers security guard after touchdown247Sports
Watch: Dolphins' Kenny Stills runs into security guard after TDYardbarker
Kenny Stills runs over security guard, gives her TD ballYahoo Sports
The Spun (blog)
all 821 news articles »

New York Post

Dolphins receiver accidentally blindsides security woman in brutal hit
New York Post
Miami Dolphins receiver Kenny Stills was shaken up when he ran into a female security officer as he caught a 5-yard touchdown pass in the corner of the end zone during the second quarter against Detroit. The woman was blindsided, tumbled to the ground ...

and more »

Sarasota Herald-Tribune

How anonymous is the state's new security app?
Sarasota Herald-Tribune
The Florida Legislature required the Florida Department of Law Enforcement and Florida Attorney General's Office to launch an app for anonymously reporting suspicious activity last March as part of the sweeping new school security law. Nearly seven ...

Google News

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More