If Edward Snowden’s revelations about the United States’ global surveillance activities taught U.S. allies anything, it’s that on the world stage, even your closest friends can’t be trusted. The United States has recently been feeling the sting in a similar way – not because of espionage, but because its allies are hemorrhaging valuable defense technology to China. Recent reports suggest that the United States’ European allies and Israel have exported or had made plans to export sensitive defense technology to China.
According to Reuters, “If the People’s Liberation Army went to war tomorrow, it would field an arsenal bristling with hardware from some of America’s closest allies: Germany, France and Britain.” Reuters substantiates this claim – Chinese advanced surface warships largely field French and German diesel engine designs under the hood; Chinese destroyers field French sonar technology, as do anti-submarine warfare (ASW) helicopters and surface-to-air missiles; British propulsion technology and airborne early warning radars can be found in several PLA fighters, bombers, and anti-ship aircraft. Additionally, “some of China’s best attack and transport helicopters rely on designs from Eurocopter, a subsidiary of pan-European aerospace and defense giant EADS.”
SWITZERLAND, Zurich — In the very near future, the Chinese military will launch an unprovoked wave of attacks—starting with the islands of Japan and Hawaii and ending with twin nuclear detonations in the U.S. cities of San Francisco, California and Seattle, Washington.
The Chinese will start their attacks in the East and make their way West with the use of a radar cloaking technology which will render their drones, planes, ships and submarines invisible to U.S. military defense systems. Once in the clear, Chinese subs will likely launch a pair of unmanned drones which will be outfitted to carry nuclear warheads to their respective targets.
Download & Forward PDF
The notion of a Chinese nuclear attack on the United States was openly flaunted on October 31, 2013, when the Chinese government released a nuclear blast map projection for the U.S. cities of Seattle and Los Angeles, after they were struck by Chinese nuclear warheads (see photo below). A few weeks later on December 17, 2013, a Chinese rover diorama showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the Full Article Here
EMP. The letters spell burnt out computers and other electrical systems and perhaps even a return to the dark ages if it were to mark the beginning of a nuclear war. But it doesn’t need to be that way. Once you understand EMP, you can take a few simple precautions to protect yourself and equipment from it. In fact, you can enjoy much of the “high tech” life style you’ve come accustomed to even after the use of a nuclear device has been used by terrorists—or there is an all-out WWIII.
EMP (Electro-Magnetic Pulse), also sometimes known as “NEMP” (Nuclear Electromagnetic Pulse), was kept secret from the public for a long time and was first discovered more or less by accident when US Military tests of nuclear weapons started knocking out phone banks and other equipment miles from ground zero.
EMP is no longer “top secret” but information about it is still a little sketchy and hard to come by. Adding to the problems is the fact that its effects are hard to predict; even electronics designers have to test their equipment in powerful EMP simulators before they can be sure it is really capable of with standing the effect.
EMP occurs with all nuclear explosions. With smaller explosions the effects are Read more…
Researchers at the University of Rochester recently demonstrated how beams of light can actually levitate nanoscale diamonds. And while they’re not actually suggesting that we construct a light-driven hoverboard made of the precious gems, the things we might be able to do with floating diamonds are pretty cool in their own right.
By shining a second light source on the diamonds and recording both their vibrations and the light these precious stones emit, it’s possible to create a quantum computer. Project leader Nick Vamivakas describes this possibility in a paper regarding the experiment:
“…in theory we could encode information in the vibrations of the diamonds and extract it using the light they emit. Levitating particles such as these could have advantages over other optomechanical oscillators that exist, as they are not attached to any large structures. This would mean they are Read more…
Robots will be patrolling cities by 2040 according to Professor Noel Sharkey, who predicts their tasks will include asking for ID, tasering and arresting suspects as well as crowd control.
In an article entitled 2084: Big robot is watching you, Sharkey, a robotics professor at the University of Sheffield, forecasts a world in which the jobs of surveillance, security and law enforcement have largely been handed over to artificial intelligence.
WIthin the next 30 years, Sharkey asserts that, “Humanoid walking robots would be more in use for crowd control at games, strikes and riots. Robots will patrol city centres and trouble spots where fights are likely to break out.”
“Robots will have reasonable speech perception and be able to ask questions and respond to answers. What is your ID number? What are you doing here? Move along. They may work in teams of tracked robots with non-lethal weapons (e.g. Tasers or nets) and be on call for Read more…
“Warning” If you, your kids or grand kids take pics from your phone—WATCH THIS!
This is truly alarming – please take the time to watch. At the end they’ll tell you how to set your phone so you don’t run this risk!
PLEASE PASS THIS INFO TO ANYONE YOU KNOW WHO TAKES PICTURES WITH THEIR CELL OR SMART PHONE AND POSTS THEM ONLINE.
I want everyone of you to watch this and then be sure to share with all your family and friends.
It’s REALLY important info, about what your posting things on your cell phones can do TO YOU!!!
Too much technology out there these days so beware………..
PLEASE TAKE THE TIME TO WATCH THIS VIDEO, AND TAKE THE RECOMMENDED PRECAUTIONS.
If you have children or grandchildren you NEED to watch this. I had no idea this could happen from taking pictures on the blackberry or cell phone. It’s scary.
August 9, 2013 -
Biometrics Research Group, Inc. has observed that national security and military applications are driving a large proportion of “Big Data” research spending.
Big Data is a term used to describe large and complex data sets that can provide insightful conclusions when analyzed and visualized in a meaningful way. Conventional database tools do not have capabilities to manage large volumes of unstructured data. The U.S. Government is therefore investing in programs to develop new tools and technologies to manage highly complex data. The basic components of Big Data include hardware, software, services and storage.
Biometrics Research Group estimates that federal agencies spent approximately US$5 billion on Big Data resources in the 2012 fiscal year. We estimate that annual spending will grow to Read more…
By Aaron Dykes and Melissa Melton
“A tormenting thought: as of a certain point, history was no longer real. Without noticing it, all mankind suddenly left reality.” -Elias Canetti, Nobel Laureate in literature
As more and more information is released via National Security Administration whistleblower Edward Snowden, many Americans drifting through each day blissfully unaware of what country they really live in have had the curtain pulled back just enough to be fed their first spoonful of reality…it’s a bitter taste.
The clip below is of a public service message warning the public on the growing use of technology and surveillance by government and corporations (though who can really tell the difference these days) to control our lives.
Sure, you say. We know all about that. Snowden has conclusively shown us with leaked documentation what our government is doing to us.
Ah. But the film was not made last week or even last decade; it was filmed in 1974.
Watch and listen. No, really listen. This message isn’t just to warn us about the coming technological surveillance state itself, but how its construct is to Read more…
“We have developed so called brain-computer interfaces which allow the user to control different devices and programmes without hands, by means of the user’s thoughts.”
That is how Christoph Hintermüller of the Project Management and Research team at g.tec Guger Technologies sums up a machine which can quite literally read the mind.
It is intended for disabled patients, and the system made up of electrodes which sit on the scalp translates user intentions into electronic commands.
“A brain-computer interface captures various electrical impulses from the head of the user, and decodes them into specific tasks and actions,” continued Christoph Hintermüller.
That allows the user to play an online computer game, hands-free. The user selects the commands by simply looking at the blinking arrows on the screen. The frequency of the flashing is reproduced in Read more…