Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves.

The brain waves run at 5Hz to 50Hz range generally depending on the content of things like caffeine. And the nerves and body signals also have ranges, here is some interesting information on that:

http://www.ncbi.nlm.nih.gov/entrez/query.f...2&dopt=Abstract

Now then if we take quartz crystals and put them in PDA devices, we could communicate to the bodies own system through the 8.0 KHz range:

http://www.cmac.com/mt/databook/crystals/smd/cx1_2.html

You can also put a thought into someone's mind through the waves and frequencies at this level with a little fine-tuning. Meaning you could communicate without speech. And this has uses in Space travel, Under Water Exploration and even in special teams, which need quietness to fulfill mission.

http://www.phoneinbuddy.com/TB_compression.htm

Now when someone is carrying a personal electronic device there are ways to get to these frequencies. One way is to find the difference between the two components of the device, for instance the motherboard and the CPU, and get that device to one of the numbers near or around 5-50 Hz or 8 KHz. This can be done by sending information or energy to the device from somewhere else. This can be done by first pinpointing the device by GPS or other line of sight means and then sending pulses to the device, which will boost or lower the devices output or by sending a signal to the device under normal conditions that the device uses to operate. Microwave, Terabeam, Sound, laser, etc. may all be used for such. Now then once you spike one of the components of the device close to the other components range and get the difference within the range of the human bodily functions frequencies you can then introduce the desired result. For instance put the person to sleep slowly by lowering the difference between the waves of the device. You could increase it causing anxiety and possible even introduce information into the brain. For instance, you could contact the brain and auditory function and say "Run" or "This is Allah, killing Americans is wrong, put down your weapon and return to your family and be a good father and knock it off."

We already know that wireless devices can be easily hacked into as we have been reading. For instance the new WiFi freedom also has associated flaws and potential risks. You might want to Google these companies also on the subject: Airdefense, Atheros, LXE, and Airmagnet.

HIPPA issues medical data could be at risk without scrutiny since Hospitals and First Responders must rely on mobile devices to help save lives and remain efficient in those times of critical need. The medical industry is certainly discussing the HIPPA issues with wireless mobility. How can they have the information rapidly available and also maintain complete privacy when the information goes over the airwaves?

As speed increases and add ons occur security issues need to be continually reviewed and upgraded procedures. Blackberry is concerned and diligently working on the problems. Other Wireless Security Issues Include some below and this is just the beginning really, after all we cannot even get rid of SPAM.

While tapping information from normal citizens you can see the problems. Then the people in the know will export the hacking technology and then the same companies working in defense will have these people employed there, then those people will teach others who are our potential enemies and then we are in trouble.

As this technology becomes more advanced it is quite possible to read people's minds, enter thoughts into their heads, put them to sleep, increase heart rates to non-possible levels, cause anxiety or disrupt nerve impulses and mobility. All by using their on board PDA, Cell Phone or other electronic device. It is even possible now to send information this way using the skull and jawbone as an antenna and the vibrations are picked up by the inner ear.

The PDA wireless device or cell phone is merely an amplifier and since it has it's own power source maybe used in such a way as these companies are discovering and consumers seem to be happy to use. By reducing the amount of energy in the device itself batteries will last longer since lower volumes will be needed. The energy could come from the sender entirely, therefore batteries draining are no longer an issue. If people have RFID implants they could hook themselves up to a machine at night running on 8Hz which could super charge their immune system along with a once per week tablet of super vitamin C with is said to be 100 times more potent than the Vitamin C Fred Flintstone Chewables our kids take. Having a pace making device to steady one's system while performing extraordinary tasks could be good for adrenaline burn on nerves, NASCAR drivers, Apache Attack Helicopter Pilots, Astronauts, etc. by stabilizing the body and allowing the mind to focus on the event in a clear headed way.

If an enemy set of troops has implanted RFID tags we could stimulate the bodily functions by way of external impulse waves and help them change their minds to fight. Therefore Blue and Red Force tracking issues would be in our favor even if they had identical systems which were bought by pirated software from the DOD by a rogue nation. We could disable and over power implanted devices and therefore they would show up as another color, the enemy would see it's "Blue-friendly" turn to "Red Bad-guy" and thus not know who is who and kill their own men or be so confused that they stopped giving orders of what to shoot at and in the confusion and hesitation you have the time on your side and all options meaning, a decisive victory is in sort order of said battle.

It may appear to be rather a difficult task to take control of a body, but really it is not since the body is merely an organic robot and it works on a set of principles. You only have to change those few things. When we recently discussed the use of Long-range wireless tasers for crowd control we could see what we are technologically advancing in this regard. We know that we can stop human armies by way of bullets, explosion, harmonics, microwaves. We can blind them, nuke them, sterilize them and even make them fall down and cry.

But using this methodology of using portable devices on that person, we could essentially control them by phone lines half way around the world. Once access is giving or even overwhelmed by electronic power you would have control of that person's thoughts, central nervous system and heart rate. An interesting concept in that a doctor could have a patient on the phone and stabilize their blood pressure, heart rate or even put in settings for super healing while they sleep. Or in the case of conflict you could bring an army to it's knees and completely immobilize it, put the rank and file into deep sleep, end the natural lives of those participating trying to kill you or make them think twice about what they were doing. This is not science fiction we are nearly here, we need to stay "Heads UP" on these issues.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Politico

Bolton names Commerce official as his national security deputy
Politico
“I selected her as deputy national security adviser because her expertise is broad-based and includes national security matters related to our alliances, defense posture, technology security, foreign security assistance and arms control,” Bolton said ...
White House announces new deputy national security advisorDefenseNews.com
John Bolton begins to shape National Security Council staff - The ...Washington Post

all 9 news articles »

Fortune

Twitter Bans Ads from Russian Computer Security Company Kaspersky Lab
Fortune
Twitter has banned ads on its service from Russian security software maker Kaspersky Lab, after the U.S. government prohibited agencies from using its products because of alleged ties to the Russian government. The ban, confirmed by Twitter to Reuters ...
Twitter banned Russian security firm Kaspersky Lab from buying adsTechCrunch
Kaspersky banned from advertising on Twitter over security fearsTelegraph.co.uk
Twitter Ads policies - Twitter for BusinessTwitter for Business
Reuters -Homeland Security -Kaspersky Lab -Ars Technica
all 38 news articles »

CryptoSlate

Crypto Trade Group Pressures SEC to Exempt Ethereum From Security Classification
CryptoSlate
An alliance of lawyers, venture capitalists, and entrepreneurs have recently met with the US Securities and Exchange Commission to petition for the creation of cryptocurrency “safe harbors” for specific cryptocurrencies and tokens, including Ethereum ...
US Regulators Asked Not to Classify Ethereum as a Security: NYT ...CCN

all 20 news articles »

TechRepublic

Upcoming Windows Defender feature will tell you when security fails
TechRepublic
All of the attestation is done by the secure kernel, the end result of which is security validation that an attacker or malware in the Windows kernel can't alter. Microsoft gives an example where "an app could ask Windows Defender System Guard to ...
Windows 10: Microsoft to boost Linux app security with Windows Defender firewallZDNet
Hackers can bypass the Windows 10 S lockdown due to security flawDigital Trends
Google discloses 'medium-severity' security flaw in Windows 10 SWindows Central
Naked Security -Chrome - Google -Monorail - The Chromium Projects
all 59 news articles »

Brookings Institution (blog)

Development for security: Lending for peace?
Brookings Institution (blog)
Two World Development Reports tackled the security-development nexus. The WDR 2011 explicitly argued that investments in citizen security and justice reform can help countries break recurring cycles of violence. The WDR 2017 surmised that good ...


WFAA.com

Italy ISD increasing security after school shooting
WFAA.com
Italy ISD increasing security after school shooting. "Italy ISD will always be the school that this happened to. What we're going to do is focus on prevention and response." Author: Monica Hernandez. Published: 8:54 PM CDT April 20, 2018. Updated: 9:07 ...


Rutland Herald

Rutland Town eyes poll security at school
Rutland Herald
Rutland Town Clerk Kirsten Hathaway said the alleged threat of violence at Fair Haven Union High School and violence at schools in other parts of the country has her thinking twice about security at Rutland Town Elementary School during townwide voting ...

and more »

Assessing Server Security | CIO
CIO
Analysts at Chicago financial firm William Blair believe that Equifax's costs tied to dealing with last year's data breach could run between $200 million and $300 million1 – and that figure is after insurance coverage is applied. While this was a ...

and more »

NewsChannel5.com

Maintaining Cyber Security On Student Devices
NewsChannel5.com
FRANKLIN, Tenn. - In order to keep students without access to the internet from falling behind, students will be able to take laptops home. But some are questioning what that means for their cyber security. It's why several school districts have moved ...

and more »

Ars Technica

When you go to a security conference, and its mobile app leaks your ...
Ars Technica
A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the ...
No way, RSA! Security conference's mobile app embarrassingly ...The Register

all 7 news articles »
Google News

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More