Enter the Sentient World Simulation (SWS). Oh, wait, you’re already in!

Mankind uses the mobile phone as a shovel to dig its own grave.
With very rare exceptions of conscious users. If you want to be one of them, you need to be informed and aware of how this thing works and how our enemies use it against us. And in order to become so, you need, among other things, to fully absorb what I’m about to show you.

Perceptive people over 40 years old have often sensed a rift in the logic of events last few years.
The powers that be occasionally commit apparently illogical and inexplicable acts, that later make sense in relation with other later events . Like a present response to unpredictable future events. Which is also illogical, unless they have a time-travelling machine, another illogical concept. So we often erase these senselessly convoluted connections from our minds just to maintain sanity.

The mind-trap there is the assumption of unpredictability.

Pre-scripted events and predictive programming are two ways to solve the predictability problem. But sometimes these don’t work either and there’s just no way you can draw a straight timeline and causality.

What if you don’t need to time-travel to see the future?

What if they can simulate it, then build it and tune it up?
Which means they can react to what you would’ve done if they didn’t REACT BEFORE THE CAUSE?
Remember those stories in media where morons get arrested for resisting arrest and they are too dumb to defend themselves. Add a topping of Minority Report for good taste.
And to soften the edges, what if they just can control your edge perception?
Here’s how:

The Sentient World Simulation (SWS) vs. Targeted Individuals
The Sentient World Simulation (SWS) can plant Cognitive Autonomous Agents inside your head

A Military Second Earth

By BRUCE STERLING / Wired JUN 25, 2007

SOURCE: Sentient world: war games on the grandest scale | The Register .

“Perhaps your real life is so rich you don’t have time for another.

“Even so, the US Department of Defense (DOD) may already be creating a copy of you in an alternate reality to see how long you can go without food or water, or how you will respond to televised propaganda.

“The DOD is developing a parallel to Planet Earth, with billions of individual “nodes” to reflect every man, woman, and child this side of the dividing line between reality and AR.

“Called the Sentient World Simulation (SWS), it will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information”, according to a concept paper for the project.

“SWS provides an environment for testing Psychological Operations (PSYOP),” the paper reads, so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

“Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next….

(((Yeah, and New World Order cybersoldiers are gonna be Warcrafting-out on awesome gizmoscapes like this while some nimble illiterate teen with a cheap assault rifle simply shoots them.)))

Raytheon demonstrates how their RIOT software illegally tracks you online (2010)

Sentient World Simulation: You’re In It Now

by Ken Korczak, 01.01.2023

A powerful ‘sentient’ computer simulation of billions of people and nations that ‘mirrors’ reality is up-and-running and likely tracking your every move

Artificial neural network with chip. Credit: mikemacmarketing / original posted on flickr (Wiki Commons Public Domain)

What if someone created a digital avatar of you and placed it in a massive simulation database –- and you knew nothing about it?

How would you feel about that?

Yes, while you are blissfully ignorant and unaware and just going about your normal life, your “simulated self” is now also going about its own life in a simulated global environment with most of the other eight billion other people inside a simulated planet earth.

Well, what if I were to tell you that this has already happened?

It has!

The server for this world simulation database –- that includes your avatar -– is actually located in (drumroll): Indiana!

That’s right!

It’s called the Sentient World Simulation (SWS). It is up and running, and housed in a building at Purdue University, West Lafayette, Indiana.

The SWS is the brainchild of Dr. Alok R. Chaturvedi, a professor of information systems who is also the founder and director of the SEAS Laboratory at Purdue’s Krannert School of Management.

SEAS stands for Synthetic Environment and Analysis Simulations.

Dr. Chaturvedi outlined his concept for the SWS in a 2006 academic paper titled:

Sentient World Simulation: A Continuously Running Model of the Real World: A Concept Paper

From the abstract of this document, the concept is explained this way:

“The goal of the Sentient World Simulation (SWS) is to build a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information, such as major events, opinion polls, demographic statistics, economic reports, and shifts in trends.”

I should add that the “geography” of an area is modeled at multiple levels, including city, state, country, selected regions of interest and, of course, globally. Some categories for models include military, political, social, economic, informational and infrastructure nodes.

After publishing his 2006 concept paper, it didn’t take long for the thing to get up and running. By 2007, the SWS had already collected massive amounts of data in 62 of the 195 nations on Earth.

It is important to point out that the SWS is a project that was initiated by the U.S. Joint Forces Command.

Some believe, as does futurist Rebecca Hardcastle Wright Ph.D., that SWS has since advanced well beyond 62 countries in the 15 years since 2007 to now encompass most areas of the planet that matter and has swept up the majority of Earth’s 8-billion-person population.

IT’S NOT QUITE ‘THE MATRIX’ YET BUT …

Now let me clarify that your avatar in the SWS is not (probably not yet) a complete duplicate of yourself in terms of image or looks, and it does not possess self-aware consciousness as did Neo and his pals in the Matrix.

It is significant to note that the SWS team at Purdue maintains that they “do not create your identical likeness” and instead used a “depersonalized likeness.” They also say this depersonalized likeness is “not immediately identifiable” and “cannot be replicated.”

Even so, many may find it equally disturbing that each avatar in the SWS virtual reality universe does represent a thorough activity profile of who you are and what you are doing in the real world.

That’s because you are likely “feeding” your avatar every day whether you know it or not.

You do that by participating in the digital world. Every time you engage with cyberspace, the SWS vacuums up that data point and adds it to the profile of your avatar.

For example, when you make a purchase on Amazon, search for something on Google, do your taxes online, text a friend, pay a utility bill, use a debit card to pay for a meal at a restaurant –- that information is funneled to the SWS and your avatar is updated to reflect your ongoing lifestyle.

This creates a “predictive model” of you and tells SWS operators how you are likely to react in certain situations as well as how you will perform or act in a group dynamic situation.

WHY WAS THE SENTIENT WORLD SIMULATION BUILT?

Well …

Remember when former NSA computer consultant Edward Snowden went rogue in 2013 and fled to Hong Kong and then to the Russian Federation along with a treasure trove of highly classified intelligence files on the NSA’s massive global surveillance program?

This surveillance program involved mostly tapping and monitoring millions, if not billions of telephones and internet communication accounts. The overt rationale for the creation of this program was for counterterrorism.

Ostensibly, the NSA wanted to be able to identify terrorist chatter across the telecom and cybernetwork bandwidth as a way to identify and thwart possible major attacks against American interests.

National Security Agency HQ, Fort Meade, Maryland (Public Domain)

Snowden bolted because of the NSA’s ability to tap and monitor private citizens and everyday innocent Americans a fundamental violation of privacy, unconstitutional and the start of a bona fide “Big Brother” nightmare state.

Well, one might consider the SWS the next logical step. It is the NSA wiretap effort on steroids.

With this new system, the information gathering on all citizens of the world can go well beyond listening into their phone chatter, texting or email communications.

Rather, it collects a wide range of data points that essentially provides a complete profile of every person, including what they do, what they like, how they act in certain situations, and so on.

When all this information is dumped into one massive database –- in this case, an actual simulation program –- you not only have real-time data on every individual in every nation on earth -– you also now can massage the data in myriad useful ways.

That includes running gaming simulations on how vast populations will react to specific situations.

For example, let’s say the U.S. Department of Defense (DoD) would like to know how the population of the East Coast would react if they knew an enemy had released a deadly virus into the subway system of New York City.

The DoD folks would be eager to “game the scenario” of a bioweapons attack before it happened to that they, in turn, could formulate an effective response by knowing with a high degree of certainty how large populations of people would react.

As Dr. Chaturvedi writes in his concept paper:

“The ability of a synthetic model of the real world to sense, adapt, and react to real events distinguishes SWS from the traditional approach of constructing a simulation to illustrate a phenomenon. Behaviors emerge in the SWS mirror world and are observed much as they are observed in the real world.”

WHO USES SWS DATA?

As you might expect, the SWS has no lack of eager clients consisting of powerful government agencies, private entities and Fortune 500 companies. A short (and by far not exhaustive) list includes:

· The U.S. Department of Defense

· The U.S. Department of Justice

· Eli Lilly

· Lockheed Martin

· The U.S. Department of Homeland Security

Furthermore, SWS has found customers in everything from banks and financial institutions that use it to test psyop events — to Hollywood studios who want to “game out” audience reactions to proposed movie scripts and ideas.

The above is according to Hardcastle Wright in her book 2021 book, Exoconscious Humans. She also said the SWS was used to simulate a cough spreading inside an airplane during the height of COVID. (Exoconscious Humans, Page 160).

NSA poster, circa 1950s-60s (Public Domain)

IS THERE PUBLIC OUTRAGE?

There is some, but as far as I can tell, those sounding an alarm about the intrusiveness of the SWS are few and far between.

One person who is disturbed by the existence of the SWS is software specialist and cryptocurrency advocate Alireza Beikverdi. He wrote in a 2015 article for Cointelegraph.com:

“The project is dangerous and intrusive enough that one of its researchers even quit, citing concerns about the possibility of handing over such a dangerous weapon to a top-secret agency with little accountability.” (Source)

Beikverdi added:

“This not only invades our privacy but can also cause severe damage to society. Knowing that there is a copy of each of us in the virtual world, which can think and behave like us, and whose actions can be predicted by the authorities is a far more intimidating invasion. This will have a negative impact on societies by reducing trust between citizens and government, as well as among people — altering normal human behavior since the populace will be conscious of the fact that there is a copy of them in a virtual world without their consent.” (Source)

Others grumble about the SWS but also express a sense of inevitability. One example is the commentators over at the Everywhere You Go is Bullsh*t webcast. In this video, they state:

“As our lives move online, this (the SWS) is an inevitable part of that. We all want that feeling of safety and this kind of thing provides … and we allowed this to happen. I think as more people become aware that this is the reality of this intense kind of privacy breach is happening, I think eventually we are going to accept it and it is going to get worse — or there will be some kind of rebellion about it and it’s going to be a pretty interesting future.”

ONLY SCRATCHING THE SURFACE

Certainly, the existence of the Sentient World Simulation project at Purdue University has profound implications in and of itself.

However, in conducting research for this story, I quickly found myself drawn into a much deeper and more complex rabbit hole.

When you place the SWS into context with other current facets driving other kinds of technological determinism — such as the race toward fully self-conscious AI, the cybernetic manipulation/transformation of the human body, the transhumanism movement writ large — it becomes apparent that SWS is but one aspect of a rapidly evolving human sphere of fundamental transformations.

Thus, even if you loathe the idea of the SWS and want to implement social and/or political efforts to slow it down or kill it — you’ll be up against an array of technological/social initiatives of profound scope, character, variety and purpose.

Can anyone stop it, or even opt out? That won’t be easy.

CIA’s Gus Hunt On Big Data: We ‘Try To Collect Everything And Hang On To It Forever’

The CIA Wants Big Data — All Of It

By Matt Sledge / Huffington Post, Mar 20, 2013

NEW YORK — The CIA’s chief technology officer outlined the agency’s endless appetite for data in a far-ranging speech on Wednesday.

Speaking before a crowd of tech geeks at GigaOM’s Structure:Data conference in New York City, CTO Ira “Gus” Hunt said that the world is increasingly awash in information from text messages, tweets, and videos — and that the agency wants all of it.

“The value of any piece of information is only known when you can connect it with something else that arrives at a future point in time,” Hunt said. “Since you can’t connect dots you don’t have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever.”

Hunt’s comments come two days after Federal Computer Week reported that the CIA has committed to a massive, $600 million, 10-year deal with Amazon for cloud computing services. The agency has not commented on that report, but Hunt’s speech, which included multiple references to cloud computing, indicates that it does indeed have interest in storage and analysis capabilities on a massive scale.

The CIA is keenly interested in capabilities for so-called “big data” — the increasingly massive data sets created by digital technology. The agency even has a page on its website pitching big data jobs to prospective employees.

Hunt acknowleded that at some scale, data storage becomes impractical, adding that he meant “forever being in quotes” when he said the agency wants to keep data “forever.” But he also indicated that he was interested in computing capabilities like 1 petabyte of RAM, a massive capacity for on-the-fly calculations that has heretofore been seen only in computers that simulate nuclear explosions.

He referenced the failure to “connect the dots” in the case of Umar Farouk Abdulmutallab, the “underwear bomber” who was able to board a plan with an explosive device despite repeated warnings of his intentions. In that case, a White House review found that the CIA had all of the data it needed to identify the would-be bomber, but still failed to stop him. Nevertheless, the agency does not seem to have curbed its ambitions for an endless amount of data.

A slide from Hunt’s presentation.

“It is really very nearly within our grasp to be able to compute on all human generated information,” Hunt said. After that mark is reached, Hunt said, the agency would also like to be able to save and analyze all of the digital breadcrumbs people don’t even know they are creating.

“You’re already a walking sensor platform,” he said, nothing that mobiles, smartphones and iPads come with cameras, accelerometers, light detectors and geolocation capabilities.

“You are aware of the fact that somebody can know where you are at all times, because you carry a mobile device, even if that mobile device is turned off,” he said. “You know this, I hope? Yes? Well, you should.”

Hunt also spoke of mobile apps that will be able to control pacemakers — even involuntarily — and joked about a “dystopian” future where self-driving cars force people to go to the grocery store to pick up milk for their spouses.

Hunt’s speech barely touched on privacy concerns. But he did acknowledge that they exist.

“Technology in this world is moving faster than government or law can keep up,” he said. “It’s moving faster I would argue than you can keep up: You should be asking the question of what are your rights and who owns your data.”

US Govt Develops a Matrix-Like World Simulating the Virtual You

ALIREZA BEIKVERDI, COINTELEGRAPH, MAY 05, 2015

Picture a parallel virtual world that collects information on our virtual identities in real time, tracks our behavior, and is smart enough to interpret this data to simulate a virtual YOU on its own.

It is not surprising that data in the Information Age can be extremely valuable, even a source of power. Now picture a parallel virtual world that collects information on our virtual identities in real time, tracks our behavior, and is smart enough to interpret this data to simulate a virtual YOU on its own. This is exactly the concept of Sentient World Simulation (SWS) that was proposed in a paper by a few researchers in 2006, which has since largely flown under the radar.

Sentient World Simulation

SWS is one of the ongoing projects by secret agencies and organizations such as the NSA. In fact, these organizations have a long history of always seeking new technologies to process a continuous stream of information about the population. However, SWS differs from other information aggregators such as Google in that this technology actually simulates us, while taking our personalities into account, in a parallel virtual world.

SWS is actually a continuously running, continually updated mirror model of the real world in parallel on a computer, designed to predict and evaluate future events and courses of action. Put simply, SWS is a virtual mirror of the real society where individuals, leaders, organizations and institutions are simulated according to real data. The geography of a society is modeled at various levels including city, province, country, region, and world in terms of political, military, economic, social, information and infrastructure nodes.

SWS uses Synthetic Environment for Analysis and Simulation (SEAS), which is designed to be agnostic to the type of simulations and choice of models in order to allow experimentation in the context of multiple and potentially conflicting theories and predictions.

In a complex scenario, a single theory from SWS doesn’t give comprehensive information about the case. It requires a different analysis from different perspectives of the same phenomena by combining all the theories. It’s developed in a way where each component and theory is built on the previous, serving as stepping stones in the development of SWS.

Global Research reported that “U.S. defense, Intel and homeland security officials” are involved in constructing this project. With all the massive data collections, and also all the records from the Internet, SWS has the potential to predict the answers to many complicated queries, as it gets more intelligent the more information it is fed.

Watched Over by Machines

The project is dangerous and intrusive enough that one of its researchers even quit, citing concerns about the possibility of handing over such a dangerous weapon to a top secret agency with little accountability.

Back in 2009, PBS Nova reported:

“With the entire Internet and thousands of databases for a brain, the device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collected — through phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records — it may one day be possible to know not just where people are and what they are doing, but what and how they think.”

This not only invades our privacy but can also causes severe damage to society. Knowing that there is a copy of each of us in the virtual world, that can think and behave like us, and whose actions can be predicted by the authorities is a far more intimidating invasion. This will have a negative impact on societies by reducing trust between citizens and government, as well as among people — altering normal human behavior, since the populace will be conscious of the fact that there is a copy of them in a virtual world without their consent.

Another thing in the back of everyone’s minds could also be the possibility of a virtual copy doing something that you are doing right now. Perhaps a simulated version of me has actually written this article? The line between actual reality and virtual reality will surely blur as more and more information is collected.

Some people may argue that SWS could also be a beneficial tool for governments and secret agencies to use to prevent terrorism and predict incidents by simulating them in a mirror world. Moreover, these type of models are often justified by the phrase: “If you have nothing to hide, then you have nothing to fear.” This phrase has always been the excuse of those who want to downplay increasing threat of a surveillance state and imply guilt for those who express concern.

But while massive data gathering and simulation models could indeed have their benefits for society. Such is the double-edged sword of most breakthrough technology. The centralized control of personal and social information by a single entity gives it immense and unprecedented power.

Decentralization

Blockchain architecture could be used to create a decentralized data network that would not give any particular entity control, mitigating the risk of data misuse. Decentralization, by not giving an advantage to any one entity, is a viable solution that can save us from horrible future scenarios.

While this system is certainly more difficult to build and implement, as it requires the involvement of a lot of people, a decentralized data network not only guarantees and makes sure that the technology isn’t used against the interests of the majority of the population, but also reduces the possibility of censorship, facilitating free speech

Any new technology can be used for both good and evil. Nevertheless, if these technologies are used transparently and in a way that reduces the possibility of manipulation and centralized control by bad actors, then the relationship between people and their representative government would be drastically improved. Perhaps then we would be able to attain greater individual privacy and realize the vision of Edward Snowden, who described his childhood:

“I grew up with the understanding that the world I lived in was one where people enjoyed a sort of freedom to communicate with each other in privacy, without it being monitored, without it being measured or analyzed or sort of judged by these shadowy figures or systems, any time they mention anything that travels across public lines.”

How the Government Predicts The Future – Inside the “Sentient World Simulation”

by James Corbett
BoilingFrogsPost.com
July 4, 2012

Podcast: Play in new window | Download | 

The NSA’s illegal warrantless wiretapping program. The building of the massive NSA data center in Utah to permanently store copies of all digital communication sent around the world. The UK government’s “Communications Data Bill” to monitor emails, instant messages and other personal information. What was dismissed as crazy conspiracy theory just over a decade ago has become, in this post-9/11 era, the all-too-familiar stuff of newspaper headlines and talking head reportage.

In fact, it was about a decade ago that the tactic of the intelligence agencies seemed to change. Instead of keeping their activities classified–referring to the NSA as “No Such Agency,” for example, or officially denying the existence of Echelon–the government increasingly began shoving this information in the public’s face.

Perhaps the scariest thing about something like the Total Information Awareness Office is not merely that it was proposed in the first place, or that it incorporated such blatantly creepy Orwellian imagery to convey its true nature and purpose, but that, as we sit here 10 years later, and as the core functions of the TIA office are now being openly performed by the NSA, DHS and other governmental agencies, people are now actively making excuses for this nightmarish police state.

“If you have nothing to hide then you have nothing to fear” has always been the rallying cry for those who are too afraid of questioning presumed governmental authority to speak out against the surveillance state and the implied assumption of guilt that goes along with it. With feigned bemusement these moral midgets inevitably ask “What’s so bad about the government spying on you, anyway?”

The answer, of course, is that the very question implies that the agencies tasked with carrying out this constant Big Brother surveillance are themselves above reproach, shining lights of moral rectitude who would never abuse this incredible power for nefarious ends. For the unimaginative out there, Hollywood yarns like “Enemy of the State” have provided fictional examples of what can go wrong if someone, somewhere, abuses this power of information and surveillance to target an innocent person in the wrong place at the wrong time.

To be sure, the power that these technologies give for agencies, or corrupt groups within those agencies, to destroy the lives of targeted individuals, is itself a fitting answer to the question of why government surveillance should be troubling to us. But beyond what can happen to specific, targeted individuals in such a scenario, however, is a much larger question: What if this data, our emails, our phone calls, our credit card transactions, our social media posts, our cell phone GPS logs, and all of the hundreds of other pieces of data that are admittedly being collected on us every day, were being fed into a database so gargantuan it contains a digital version of every single person on the planet? And what if that database were being used by the Department of Defense to war game various scenarios, from public reactions to natural disasters to the likelihood of civil unrest in the wake of a declaration of martial law?

Remarkably, this is precisely what is happening.

It is called the “Sentient World Simulation.” The program’s aim, according to its creator, is to be a “continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action.” In practical terms that equates to a computer simulation of the planet complete with billions of “nodes” representing every person on the earth.

The project is based out of Purdue University in Indiana at the Synthetic Environment for Analysis and Simulations Laboaratory. It is led by Alok Chaturvedi, who in addition to heading up the Purdue lab also makes the project commercially available via his private company, Simulex, Inc. which boasts an array of government clients, including the Department of Defense and the Department of Justice, as well as private sector clients like Eli Lilly and Lockheed Martin.

Chatruvedi’s ambition is to create reliable forecasts of future world events based on imagined scenarios. In order to do this, the simulations “gobble up breaking news, census data, economic indicators, and climactic events in the real world, along with proprietary information such as military intelligence.” Although not explicitly stated, the very type of data on digital communications and transactions now being gobbled up by the NSA, DHS and other government agencies make ideal data for creating reliable models of every individuals’ habits, preferences and behaviors that could be used to fine-tune these simulations and give more reliable results. Using this data, the SEAS Laboratory and its Sentient World Simulation offshoot are able to create detailed, operable real-time simulations of at least 62 nations. “The Iraq and Afghanistan computer models,” according to a 2007 Register report on the project, “each has about five million individual nodes representing things such as hospitals, mosques, pipelines, and people.”

At the time of initial reports on the program five years ago, there were only 62 country-level simulations being run by the US Department of Defense. These simulations grouped humans into composites, with 100 individuals acting as a single node. But already at that time, the US Army had used the systems to create a one-to-one level simulation of potential Army recruits. The ultimate aim would be to archive enough data on each individual to be able to make a computer model of everyone on the planet, one that could be used to predict the behaviors and reactions of every single person in the event of various scenarios.

The program can be used to predict what would happen in the event of a large scale tsunami, for example, or how people would react during a bioterror attack. Businesses can use the models to predict how a new product would fare in the market, what kind of marketing plans would be most effective, or how best to streamline a company’s organization.

The original concept paper for the project was published in 2006 and in 2007 it was reported that both Homeland Security and the Defense Department were already using the system to simulate the American public’s reaction to various crises. In the intervening five years, however, there has been almost no coverage at all of the Sentient World Simulation or its progress in achieving a model of the earth.

There is a very good chance that these types of systems are, at least for the moment, pure quackery. Computers are only as valuable as their programming, after all, and the algorithms required to accurately predict responses in chaotic systems with multiple, dimly-understood variables is orders of magnitude beyond what is currently possible. Or is it? One of the great ironies of our time, as Glenn Greenwald goes on to point out in his speech on the surveillance state, is that although we live in a time when it is possible for nebulous government agencies to know every detail of your life, from what you ate for breakfast to where you shopped last night to who your friends are, we are also living in an age of unprecedented ignorance about what are our own governments are actually doing.

This is the heart of the matter. Somehow we are expected to go along with the sophomoric sophism that “If we have nothing to hide then we have nothing to fear,” yet at the same time we are asked to believe that the government must keep all manner of information secret from the public in order to carry out its work of “protecting” that public.

If the government has nothing to hide, then why doesn’t it release the notes, memoranda and findings of the 9/11 Commission in full and unredacted?

Why doesn’t it release the records of the JFK assassination investigation instead of arguing, as it is, that those records should once again be removed from a declassification review that is to take place in 2013, 50 years after the assassination itself took place?

Why doesn’t it release the full audit trail of what banks received the emergency TARP funds and in what amounts?

Is it because, after all, the government does have something to hide from the public that are its ostensible masters? Is it because the old maxim that “Knowledge is power” is more true than we could ever know, and that the government’s one-way insistence on transparency for the citizens and opacity for itself is a reflection of the power that it holds over us?

The Sentient World Simulation is just one example of one program run by one company for various governmental and Fortune 500 clients. But it is a significant peek behind the curtain at what those who are really running our society want: complete control over every facet of our lives achieved through a complete invasion of everything that was once referred to as “privacy.” To think that this is the only such program that exists, or even that we have any significant details about the ways that the SWS has already been used, would be hopelessly naive.

So where does this leave a public that is at such a disadvantage in this information warfare? A public that is effectively told that anything and everything they do, say or buy, can and will be catalogued by the a.i. control grid even as the details of that grid are to be kept from them? Unfortunately there is no easy way back from the precipice that we were ushered toward with the creation of the national security state and the passage of the National Security Act of 1947. Perhaps we have already stepped over that precipice and there is no going back in the current political paradigm. These are things for an informed, aware, knowledgeable citizenry to decide through a societal dialogue over the nature of and importance of “privacy.”

But without a general awareness that programs like the Sentient World Simulation even exist, what hope do we have in counteracting it?

SIMULATORS’ POV

Human running performance from real-world big data

Wearable exercise trackers provide data that encode information on individual running performance. These data hold great potential for enhancing our understanding of the complex interplay between training and performance. Here we demonstrate feasibility of this idea by applying a previously validated mathematical model to real-world running activities of ≈ 14,000 individuals with ≈ 1.6 million exercise sessions containing duration and distance, with a total distance of ≈ 20 million km. Our model depends on two performance parameters: an aerobic power index and an endurance index. Inclusion of endurance, which describes the decline in sustainable power over duration, offers novel insights into performance: a highly accurate race time prediction and the identification of key parameters such as the lactate threshold, commonly used in exercise physiology. Correlations between performance indices and training volume and intensity are quantified, pointing to an optimal training. Our findings hint at new ways to quantify and predict athletic performance under real-world conditions. Laboratory performance tests provide the gold standard for running performance but do not reflect real running conditions. Here the authors use a large, real world dataset obtained from wearable exercise trackers to extract parameters that accurately predict race times and correlate with training.

DARPA contractor runs real time AI simulations of live events to assess best response scenario

SOLUTIONS?

  1. Starve the beast of your data by minimizing unnecessary usage. You don’t really need a smartphone half the times you’re out. You’re just being a junkie. Buy a goddam laptop, you need it more than a new expresso machine, tape the camera and the mic, use it wisely to give away a minimum of info etc… whatever you can think of to minimize the authentic data about you.
  2. Intoxicate the beast with fake data: like things 7ou don’t really like, follow people you don’t care about, tag yourself in unrelated things, build a web o fake random connections, be unpredictable, break patterns, do random acts of randomness. When you start getting ads and suggestions you can’t care about, you’re on the good path.
  3. I await suggestions.

Worldwide Smartphone Shutdown Now! #WWSS

Also check: THE INTERNET OF BODIES AKA THE BORG IS HERE, KLAUS SCHWAB SAYS (BIOHACKING P.5)

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Comments are closed.