Three magic words: monitoring, control and modeling.
But if you need more, see below:

It’s a “trend”, that’s exactly what this is, I know because I’ve read it in Forbes, top-shelf authoritative source:

The Internet Of Behavior Is The Next Trend To Watch

Emmanuel Ramos, Forbes Technology Council, Mar 13, 2023

The world of technology is changing rapidly, and with it comes the development of new communication protocols like the Internet of Behavior (IoB). IoB offers a revolutionary way to monitor, control and model human behavior. As tech leaders in this ever-evolving industry, we must stay ahead of upcoming trends so that we can take advantage of its many benefits.

The Internet of Behavior

IoB is a system that uses sensors and other technologies to monitor, analyze and predict human behavior. It combines artificial intelligence (AI), machine learning (ML), big data analytics, cloud computing, Internet of Things (IoT) devices, mobile applications, wearable devices, augmented reality (AR), virtual reality (VR), robotics automation systems and more into one comprehensive platform for collecting behavioral data from individuals or groups. The collected data can then be used for various purposes such as predictive analytics or automated decision-making processes.

The primary benefit of using IoB technology is improved efficiency and productivity gains from automation enabled by predictive analytics. Leveraging AI algorithms for analyzing behavioral patterns in real time can help organizations make better decisions faster while reducing costs associated with manual labor or inefficient processes.

The Internet of Behavior is a rapidly growing technology that has the potential to revolutionize how we interact with and understand our world. In this article, I will explore how IoB works and what technologies are used to implement it.

How IoB Works

IoB is a revolutionary technology that enables the monitoring, control and modeling of human behavior. It combines the power of the technologies mentioned above to provide an unprecedented level of insight into how people interact with their environment. IoB has been used in various industries such as healthcare, retail, finance, education, transportation and more.

Protocols And Ecosystems Involved In IoB

IoB works by connecting devices to each other through networks or protocols like Bluetooth Low Energy (BLE). This connection allows for real-time data exchange between different systems, which can then be analyzed using AI algorithms. Additionally, these connections are often secured using encryption techniques like Transport Layer Security (TLS) to ensure privacy protection. Furthermore, this ecosystem also includes software platforms such as Amazon Web Services or Microsoft Azure which enable organizations to store large amounts of data securely in the cloud while providing scalability options when needed.

Technologies Used To Implement IoB

In order for IoB systems to work effectively, they must utilize several technologies, including sensors that detect changes in environmental conditions, communication protocols such as Wi-Fi or BLE, edge computing capabilities that allow for local processing, ML algorithms that analyze collected data, databases for storing information and APIs that facilitate integration with other applications or services. All these components come together to create an intelligent system capable of understanding user behavior patterns over time so it can make predictions about future actions based on past behaviors.

Challenges Of Developing And Implementing IoB

It is important to understand the protocols and ecosystems involved in IoB, as well as the technologies used to implement it, so you can unlock the potential of this powerful technology for improved efficiency, security and accuracy. Let’s explore further how these advantages can be leveraged with IoB for human behavior monitoring, control and modeling.

Advantages Of Using IoB For Human Behavior Monitoring, Control And Modeling

Automation and predictive analytics enabled by IoB can significantly improve efficiency and productivity gains. For example, IoB systems can be used to automate mundane tasks such as data entry or scheduling appointments, freeing up time for more complex activities that require higher-level thinking skills. Additionally, predictive analytics enabled by IoB can help identify patterns in customer behaviors that may not be immediately apparent to the naked eye.

Enhanced security and privacy protection are other advantages of using IoB for human behavior monitoring, control and modeling. Advanced data encryption techniques are used in these systems, which ensure that sensitive information remains secure at all times while still allowing access only when necessary.

The advantages of using IoB in this way have been demonstrated in terms of improved efficiency and security as well as increased accuracy. As the technology continues to evolve, we will see more sophisticated AI-based solutions emerging and greater emphasis on interoperability standards.

Upcoming Trends In The Development And Use Of IoB Technology

The development and use of IoB technology are rapidly evolving, with new trends emerging in the industry. AI-based solutions are becoming increasingly popular for automated behavioral analysis enabled by this technology. These solutions can help to identify patterns in user behavior that would otherwise be difficult to detect manually. This could include identifying potential security threats or uncovering customer preferences and insights from large datasets. Wearable devices are also gaining traction as an alternative to traditional sensors for collecting behavioral data. They offer a more convenient way of gathering information about user activities without having to install additional hardware or software components on the device itself.

Interoperability standards are also being developed with increasing focus, allowing different platforms utilizing IoB technology to integrate seamlessly across different systems and networks. This will enable users to access data collected from multiple sources within one platform, providing a comprehensive view of their behaviors over time while maintaining privacy and security protocols throughout the process.

Conclusion

In conclusion, the Internet of Behavior is a new communication protocol and ecosystem that promises to revolutionize the way we monitor, control and model human behavior. By leveraging the latest advances in technology such as artificial intelligence and machine learning algorithms, IoB can provide us with unprecedented insights into how people interact with each other and their environment. As this technology continues to evolve, it will become increasingly important for tech leaders to stay abreast of its development so they can leverage its potential benefits for their organizations. – End of Forbes article

Standard PR piece, ChatGPT redacted, I guess…
But damn worrying escalation from the previous piece on the Internet of Bodies and Internet of Things, or about optogenetics!
And we’re not talking about potential for abuse here because this is an abuse technology, abuse is what it does. With no one’s consent.

I didn’t even bother to check with google, but on any other search engine you get a lot of hits for “internet of behavior”, the secret is hidden in the open, as usual. but I leave you with a few of my own findings and resources, and from here there’s no way around knowing your enemy to escape and defeat your enemy.

The most obvious and effective examples of capitalizing on the Internet of Behaviours are Facebook and Google, which display adverts to surfers at frequent intervals depending on the detailed analysis and understanding they have created from consumer behavioral data obtained on a regular basis.

Precedence Research

More so, a Precedence Research report from past year reveals:

The global internet of behaviors (IoB) market size was valued at USD 402.6 billion in 2022 and is expected to surpass around USD 3592.6 billion by 2032, poised to grow at a compound annual growth rate (CAGR) of 24.97% from 2023 to 2032.

Internet of Behaviors Market Size 2023 To 2032

The Internet of Behaviours (IoB) seeks to debate how data may be best understood and is used to build and launch new products from the perspective of human psychology. The IoB may be utilized in a variety of ways by both public and commercial enterprises. This innovation will become an enticing big branding and distribution platform for businesses and organizations all around the world. Every firm gets an in awareness of its clientele, which the IoB platform enables. For instance, IoB links all mobile phones in the program, allowing them to observe their faults and receive visual tips on how to improve their swinging and stroke. The linking of devices generates a large number of new pieces of data and spans beyond the Internet of Things (IoT). Businesses acquire information from customers by ‘sharing’ data amongst linked devices, which are then monitored in real time by a single computer.

While refers to the interconnection of networked physical things that acquire and exchange data over the internet. IoB interprets this data in conjunction with particular human actions ranging from purchasing habits to demographic preferences. Location tracking, big data, and face recognition devices basically map client behavior. Here’s an easy example: Uber. Its Internet of Things app monitors both drivers with passengers. Once the consumer has been left off, Uber polls to assess the ride, allowing the driver’s conduct to be monitored and the quality of customer to be interpreted properly. By 2025, 40% of the world population would be subject to at least 1 IoB program (government or corporate) and digitally tracked in order to affect human behavior. IoB may be a great instrument for leveraging sales and marketing to develop effective strategies that make a difference in the products and services given to customers. But that’s not all; it’s also beneficial to other industries. IoB, for example, is useful in the medical arena, assisting healthcare personnel in assessing individuals’ illnesses, responsiveness to medicines, and other lifestyle information.

Growth factors

Over the last decade or so, there has been an astonishing increase in chronic and weakens the immune system illnesses (NCDs). Every year, over 41 million individuals die as a result of NCDs, resulting in exorbitant healthcare cost. IoB-enabled devices have enabled significant advancements in artificial pancreas technology. According to 2015 research, IoB devices resulted in a 50% reduction in 30-day hospital readmissions. IoB aids in the reduction of automobile insurance premiums. Users can install an app on their phones that collects crucial information such as distance traveled, automobile speed, and time of day the user is driving, and so on. As a result, determine the right premium that the user is entitled to pay. According to the study, prudent drivers would pay minimal rates. Aviva was the first insurance provider to create a smartphone app for tracking driving behavior in 2013.

Several digital advertising firms are already utilizing analytics technologies to gain insights into regular customer habits. Marketers may utilize the Internet of Things to monitor client purchasing behaviors across platforms, gain access to previously unavailable data, reconfigure the value chain, and even bring honest point-of-sale notifications and customized marketing. IoB is regarded as one of the top technology trends for 2021. The COVID-19 epidemic is mostly to blame for IoB becoming a trend since it has revolutionized how consumers engage with brands, forcing businesses to reconsider how they communicate with customers. From the angle of human psychology, the IoB concept attempts to accurately analyze data and use that understanding to build and market new things. The IoB attempts to understand data obtained from users’ online actions from the perspective of behavioral psychology. It seeks to address questions about how to analyze data and how to apply that information to develop and market new products, all from the standpoint of human psychology. This new approach occasionally has an impact on Quality Infrastructure since many organizations might increase their connectivity.

Using IoB technology has assisted numerous firms in reaching out to more clients through internet advertising. Companies may easily identify and target certain individuals or groups to offer their services and goods using the Internet of Behavior. Google and Facebook, for example, both utilize behavioral data to provide relevant adverts to its customers. Companies may use IoB to not only communicate with their target audience, but also track their habits in order to enhance services. Furthermore, new technologies such as Alexa, OK Google, and Siri are designed to study and analyze data and human behavior in order to perform more effectively.

Report Scope of the Internet of Behaviors (IoB) Market

Report CoverageDetails
Market Size in 2023USD 483.12 Billion
Market Size by 2032USD 3592.6 Billion
Growth Rate from 2023 to 2032CAGR of 24.97%
Base Year2022
Forecast Period2023 to 2032
Segments CoveredApplication, Enterprise Size, Industry, Geography
Companies MentionedAware Inc., Traceable, Guardian Analytics, Vertica Systems, Trifacta, NuData Security, Mazu Networks Inc., Qubit Digital, Cognitive Scale, Capillary Technologies, Among others.


Application Insights

Advertising Campaigns, Digital Marketing, Content Delivery, Brand Promotion, and Others are the market segments. Over the projected period, the Digital Marketing sector is likely to occupy a major proportion of the worldwide Internet of Behaviors (IoB) market. Because the internet of behavior (IoB) requires an internet connection, digital marketing services will benefit greatly from IoB technology. Data is the key commodity of digital marketing, which promotes products and services to consumers all over the world. If companies have access to behavioral analysis and interpretation technology, they will be better positioned to engage customers following the purchase process.

In 2022, the digital marketing category is expected to have the highest share. Because an internet connection is required for the internet of behavior (IoB), digital marketing services will benefit the most from IoB technology. Digital marketing is a field that markets products and services to individuals all over the world using data as its primary commodity. They will be in a better position to contact customers at the conclusion of the purchasing process if they have access to tools for behavioral analysis and interpretation. Globally, there is expected to be a major increase in digital marketing. Digital marketing will be used to promote brands, generate leads, and increase sales. The Internet of Business is a big boon to the sales profession. At the same time, for decades, corporations relied on data to make judgments. Why has the IoB trend become so important in today’s commercial, government, and non-profit sectors? First and foremost, IoB focuses on gathering, analyzing, and comprehending user behavior in order to enhance service quality and the value chain. This technology collaborates closely with behavioral science and can provide greater data insights. It also aids in the development of stronger client connections because IoB allows for two-way contact with them. Instead of doing surveys to learn from them, businesses may better understand their consumers’ demands and deliver significant improvements. 

Industry Insights

BFSI, Telecom and IT, Media and Entertainment, Tourism & Travel, Retail and e-Commerce, Healthcare, Manufacturing, and Others are the major segments. The BFSI category is expected to occupy a considerable part of the worldwide Internet of Behaviors (IoB) market by 2032. IoB is extensively utilized in the BFSI business for statement generation and automatic notification applications. Brands may maintain an omnichannel presence by swiftly determining a customer’s preferred channels and providing tailored messaging solely through those channels. Consumer connection is being prioritized by financial institutions and retail banks through location-based advertising. These reasons are expected to drive IoB adoption in the BFSI industry.

The most obvious and effective examples of capitalizing on the Internet of Behaviours are Facebook and Google, which display adverts to surfers at frequent intervals depending on the detailed analysis and understanding they have created from consumer behavioral data obtained on a regular basis. However, collecting and analyzing data from IoT is difficult, and many businesses do not have simple access to this data. With the number of IoT devices predicted to triple by 2025, IoT, which has so far had momentum in the B2B industry, is expected to experience rapid acceptance in the consumer segment.

Regional Insights

The adoption of the internet of behaviors in North America is expected to rise at a rapid pace. Furthermore, North America has made significant progress in the use of IoT, particularly in the industrial and automotive industries. Because of the demand for IoT, cloud platforms are seeing widespread acceptance, boosting the growth of the internet of behaviors market throughout the forecast period.

South Asia and the Pacific are expected to emerge as the most opportunistic markets for the internet of behaviors due to the presence of a large consumer population, creating opportunities for organizations engaged in behavioral analytics to better understand consumer behavior and strategize their sales/marketing campaigns accordingly. Furthermore, rising government smart city efforts and cloud investment in the area are expected to fuel market expansion in the near future. Furthermore, the introduction of high-speed networking technologies, increased interest in the area by international firms, and rising demand from developing countries such as India, Indonesia, and Australia are expected to boost market expansion.

Key market developments

Aware, Inc., a major global provider of biometrics software products, solutions, and services, will exhibit its digital identification expertise in many sessions at the Identity Week London 2021 conference, which will be held from September 22 to 23 in London, England. Identity Week London is an ideal venue for Aware to showcase its extensive biometric expertise and solutions for password-less authentication and identity ownership, with a focus on digital identity and complex authentication technologies.

Maxar Technologies’ AFIXTM suite of biometric products was bought by Aware, Inc., a prominent global provider of biometrics software products, solutions, and services, in November 2020. The Aware ABIS product line has expanded with the inclusion of AFIX, which provide turn key also face and fingerprint biometrics matching, in addition forensic analysis softwares for small and medium-sized law enforcement and government organizations.

Key market players

  • Aware Inc.
  • Traceable
  • Guardian Analytics
  • Vertica Systems
  • Trifacta
  • NuData Security
  • Mazu Networks Inc.
  • Qubit Digital
  • Cognitive Scale
  • Capillary Technologies

Combined Impact of IoB and IoT

Internet of behaviour is an extension of IoT. Let us try to know more about it. It’s not about the “things” at all when companies use the Internet of Things to persuade us to change our habits. We’ve crossed over into the Internet of Behavior as the IoT connects individuals with their activities. 

Consider the IoB as a mash-up of three disciplines:

  • Technology
  • Analytical data
  • Psychology is the study of human behaviour.

Emotions, choices, augmentations, and companionship are the four areas of behavioural science that we examine when we utilize technology.

Companies that know us through the data provided by IoT, can now influence our behaviour using the data provided by IoB. Consider using a smartphone health app to check your nutrition, sleep habits, heart rate, or blood sugar levels. The app can warn you about potentially dangerous circumstances and propose behaviour changes that would lead to a more positive or desirable outcome.

For the time being, corporations are mostly using IoT and IoB to watch and attempt to influence our behaviour to reach Allstate behavior their intended goal—typically, to purchase.

Working of IoB

  1. How Data Is Collected?

Consumer data may be gathered from a range of sites and technologies, including a company’s website, social media profiles, sensors, telematics, beacons, health monitors (such as Fitbit), and a variety of other devices.

Each of these sites gathers various types of information. For example, a website may keep track of how many times a person visits a certain page or how long they remain on it. Furthermore, telematics may track how hard a vehicle’s driver brakes or the vehicle’s typical speed.

How is IoT influencing the Human Body?)

  1. What Happens to the Information Gathered?

Data is collected and analyzed by businesses for a variety of purposes. These reasons include assisting businesses in making educated business decisions, customizing marketing techniques, developing products and services, and driving user experience design, among others.

Companies establish standards to aid in the analysis of this data. When a user performs a specific action(s), the firm then begins to convince the user to modify their behaviour. For instance, if a user visits a company’s page selling men’s slim jeans three times, the digital shop may show them a pop-up ad offering them 25% off a pair of jeans.

  1. Using Data from a Variety of Sources

Combining data from many sources and evaluating it to make a decision is another component of the Internet of Behaviors. Companies may develop in-depth user profiles for each user by combining data from a variety of sources. These profiles may then be looked at to see what the best course of action is for the person.

For example, on the brand’s Instagram page, a customer called Ted comments on a photo of a new sneaker. Ted visits the brand’s website a few days later and looks at the identical sneaker. After a week, Ted is watching an ad for the sneaker on YouTube. In the meanwhile, the brand is keeping track of all of Ted’s digital content touchpoints. 

Because Ted has expressed an interest in the brand’s shoe, the brand may synthesize this information and devise a strategy for converting Ted into a customer. Remarketing display advertising or emailing Ted a discount coupon are examples of actions the brand might do.

Use of IoB in Various Sectors

  1. IoB in Business

Online advertising is increasingly being used by a variety of businesses to reach out to their clients. They may discover and target certain persons or groups that could benefit from their products or services with the help of IoB.

Both Google and Facebook utilize behavioural data to provide ads to users on their sites. This enables companies to interact with their target consumers and measure their behaviour in response to advertisements via “click rates.”

Similarly, Youtube uses behavioural analytics to enhance the viewer’s experience by only recommending or highlighting videos and subjects that they are interested in.

  1. IoB During the Covid-19 Pandemic

The epidemic has increased our awareness of the precautions we must take during this period. Employers might use sensors or RFID tags to see if there are any inconsistencies in following safety standards. Restaurants and food delivery applications, for example, utilize the protocol information to guide their decisions.

Swiggy and Zomato, for example, both exhibited and promoted restaurant safety procedures. They also recorded and broadcast the temperature of the delivery person to reassure consumers that they were safe.

  1. IoB for the Insurance Industry

In the insurance industry, IoB may be quite beneficial. Driver tracking tools are already used by insurance companies like Allstate and StateFarm to track and secure a driver’s conduct. With the help of IoB, they may evaluate the behaviour and perhaps determine if a certain occurrence was an accident or a misjudged assumption on the part of the insured.

This can help prevent incidents of drunk driving, driving under the influence of drugs, and even underage or retired persons from getting behind the wheel and causing an accident.

End-Note

The Internet of Behaviors offers businesses cutting-edge methods for marketing products and services as well as influencing user and employee behaviour. This technology is highly useful to organizations since it allows them to optimize their customer relationships depending on the data acquired. 

Behavioral data technology is still developing. However, as new IoT devices proliferate, the argument over what constitutes critical data and ethical use is only beginning.

If it’s about sales and customer service, of course India has been at the forefront of it:

Very related, from our vault:

THE INTERNET OF BODIES AKA THE BORG IS HERE, KLAUS SCHWAB SAYS (BIOHACKING P.5)

Optogenetics and the weaponization of light by the Military BioTech Complex

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

! Articles can always be subject of later editing as a way of perfecting them

ORDER

Biden-Harris Administration Releases Strategic Plan To Ensure U.S. Nanotechnology Competitiveness

White House / October 09, 2021

New plan aims to accelerate research translation, advance equity

Today, on National Nanotechnology Day, the White House Office of Science and Technology Policy (OSTP) and the National Nanotechnology Coordination Office (NNCO) unveiled the 2021 National Nanotechnology Initiative (NNI) Strategic Plan. This strategy details a new framework to ensure that the United States continues to lead the world not only in nanoscience discoveries, but in translating and manufacturing its products to benefit all of America. In addition to identifying priorities for the NNI to best support the research community in the United States, the plan prioritizes efforts to expand sustainable infrastructure and advance equity in the nanotechnology workforce.

“The role of nanotechnology in our response to the pandemic—from vaccine delivery to protective clothing to testing kits—emphasizes the potential for small science to have big impacts,” said National Nanotechnology Coordination Office Director Dr. Lisa E. Friedersdorf. “This strategic plan charts an exciting path forward for the National Nanotechnology Initiative to ensure continued progress in nanotechnology research and development, and to attract students from across all of America.”

Nanotechnology research and development requires access to specialized tools and facilities. This plan emphasizes the need to expand and refresh the research infrastructure, and provide access that supports researchers and small business across all of America. This research infrastructure also plays a critical role in training the future workforce for high-paying jobs.

Since the launch of the NNI in 2000, nanoscience has transformed from an emerging area of research to a technology that is fueling real-world applications in areas as diverse as consumer electronics, water purification, infrastructure, medicine, energy, space exploration, and agriculture. Nanotechnology underpins and enables other critical technologies, including quantum computing and artificial intelligence, and will also help address the most significant challenges facing the world, including pandemic preparedness, climate change, and food insecurity. This strategic plan lays out a path to ensure continued U.S. leadership in this important area.

More on the National Nanotechnology Initiative (NNI): The NNI was announced in 2000 and codified on Dec. 3, 2003, through the 21st Century Nanotechnology Research and Development Act (15 USC §7501), to enhance interagency coordination of nanotechnology research and development; support a shared infrastructure; enable leveraging of resources while avoiding duplication; and establish shared goals, priorities, and strategies that complement agency-specific missions and activities.

More information on the NNI, including upcoming events and opportunities to engage, is available on Nano.gov. Inquiries and comments also can be sent to info@nnco.nano.gov.

###

This above is probably why some people attribute this to Biden’s admin. They\ve never come out with anything new and original, not even that oxymoronic “Build Back Better” slogan. This dates back to the Clinton admin, and originates in military research:

This video will explain Joe Biden’s “Moonshot Speech”

According to Wikipedia:

Mihail C. Roco proposed the initiative in a 1999 presentation to the White House under the Clinton administration. The NNI was officially launched in 2000 and received funding for the first time in FY2001.

President Bill Clinton advocated nanotechnology development. In a 21 January 2000 speech at the California Institute of Technology, Clinton stated that “Some of our research goals may take twenty or more years to achieve, but that is precisely why there is an important role for the federal government.”

President George W. Bush further increased funding for nanotechnology. On 3 December 2003 Bush signed into law the 21st Century Nanotechnology Research and Development Act (Pub. L. 108–153 (text) (PDF)), which authorizes expenditures for five of the participating agencies totaling $3.63 billion over four years. This law is an authorization, not an appropriation, and subsequent appropriations for these five agencies have not met the goals set out in the 2003 Act. However, there are many agencies involved in the Initiative that are not covered by the Act, and requested budgets under the Initiative for all participating agencies in Fiscal Years 2006 – 2015 totaled over $1 billion each.

In February 2014, the National Nanotechnology Initiative released a Strategic Plan outlining updated goals and “program component areas”, as required under the terms of the Act. This document supersedes the NNI Strategic Plans released in 2004 and 2007.

The NNI’s budget supplement proposed by the Obama administration for Fiscal Year 2015 provides $1.5 billion in requested funding. The cumulative NNI investment since fiscal year 2001, including the 2015 request, totals almost $21 billion. Cumulative investments in nanotechnology-related environmental, health, and safety research since 2005 now total nearly $900 million. The Federal agencies with the largest investments are the National Institutes of Health, National Science Foundation, Department of Energy, Department of Defense, and the National Institute of Standards and Technology.

The NNI cumulative investment by 2021 inclusive reached $36 billion, and nanotechnology has become pervasive in material, energy and biosystem related applications.”

Where we learn that the invention of the Lipid Nano-Containers used in Covid mRNA vaccines was publicly-funded research, Pfizer and Moderna just parasiting government’s achievements and selling it back to the people, “the owners of the Government”, at astronomical prices.

And LNC’s are made with PEGs that are made with graphene-oxide, which is also mentioned in the retrospective video above.

However. it’s 2023 now and here we are:

BONUS

Here’s something to further support for our findings that legal drug dealers and arms dealers are not really separate cartels, but rather form a Military BioTech Complex, that also includes the Silicone Valley freaks:

And on the heels of this, later came :
Obama, DARPA, GSK and Rockefeller’s $4.5B B.R.A.I.N. Initiative – better sit when you read

Nanotechnology Timeline

According to NNI

This timeline features Premodern example of nanotechnology, as well as Modern Era discoveries and milestones in the field of nanotechnology.

Premodern Examples of Nanotechnologies

Early examples of nanostructured materials were based on craftsmen’s empirical understanding and manipulation of materials. Use of high heat was one common step in their processes to produce these materials with novel properties.

Photo of the Lycurgus Cup at the British Museum, lit from withoutPhoto of the Lycurgus Cup at the British Museum, lit from within  
The Lycurgus Cup at the British Museum, lit from the outside (left) and from the inside (right)

4th Century: The Lycurgus Cup (Rome) is an example of dichroic glass; colloidal gold and silver in the glass allow it to look opaque green when lit from outside but translucent red when light shines through the inside. (Images at left.)

Photo, 9th C Iraq lustreware bowl
Polychrome lustreware bowl, 9th C, Iraq, British Museum (©Trinitat Pradell 2008)

9th-17th Centuries: Glowing, glittering “luster” ceramic glazes used in the Islamic world, and later in Europe, contained silver or copper or other metallic nanoparticles. (Image at right.)

Photo, Rose window, Notre Dame Cathedral
The South rose window of Notre Dame Cathedral, ca 1250

6th-15th Centuries: Vibrant stained glass windows in European cathedrals owed their rich colors to nanoparticles of gold chloride and other metal oxides and chlorides; gold nanoparticles also acted as photocatalytic air purifiers. (Image at left.)

13th-18th Centuries: “Damascus” saber blades contained carbon nanotubes and cementite nanowires—an ultrahigh-carbon steel formulation that gave them strength, resilience, the ability to hold a keen edge, and a visible moiré pattern in the steel that give the blades their name. (Images below.)

Photo, Damascus saber, 17th CPhoto, carbon nanotubes in a Damascus sword, 17th C
(Left) A Damascus saber (photo by Tina Fineberg for The New York Times). (Right) High-resolution transmission electron microscopy image of carbon nanotubes in a genuine Damascus sabre after dissolution in hydrochloric acid, showing remnants of cementite nanowires encapsulated by carbon nanotubes (scale bar, 5 nm) (M. Reibold, P. Paufler, A. A. Levin, W. Kochmann, N. Pätzke & D. C. Meyer, Nature 444, 286, 2006).

Examples of Discoveries and Developments Enabling Nanotechnology in the Modern Era

These are based on increasingly sophisticated scientific understanding and instrumentation, as well as experimentation.

Photo, bottle of colloidal "ruby" gold solution
“Ruby” gold colloid (Gold Bulletin 2007 40,4, p. 267)

1857: Michael Faraday discovered colloidal “ruby” gold, demonstrating that nanostructured gold under certain lighting conditions produces different-colored solutions.


1936: Erwin Müller, working at Siemens Research Laboratory, invented the field emission microscope, allowing near-atomic-resolution images of materials.

1947: John Bardeen, William Shockley, and Walter Brattain at Bell Labs discovered the semiconductor transistor and greatly expanded scientific knowledge of semiconductor interfaces, laying the foundation for electronic devices and the Information Age.

Photo, 1947 transistor, Bell Labs
1947 transistor, Bell Labs

 
1950: Victor La Mer and Robert Dinegar developed the theory and a process for growing monodisperse colloidal materials. Controlled ability to fabricate colloids enables myriad industrial uses such as specialized papers, paints, and thin films, even dialysis treatments.


1951: Erwin Müller pioneered the field ion microscope, a means to image the arrangement of atoms at the surface of a sharp metal tip; he first imaged tungsten atoms.



1956: Arthur von Hippel at MIT introduced many concepts of—and coined the term—“molecular engineering” as applied to dielectrics, ferroelectrics, and piezoelectrics
 

Photo, Jack Kilby, 1960
Jack Kilby, about 1960.

1958: Jack Kilby of Texas Instruments originated the concept of, designed, and built the first integrated circuit, for which he received the Nobel Prize in 2000. (Image at left.)

Photo of Richard Feynman
Richard Feynman (Caltech archives)

1959:  Richard Feynman of the California Institute of Technology gave what is considered to be the first lecture on technology and engineering at the atomic scale, “There’s Plenty of Room at the Bottom” at an American Physical Society meeting at Caltech. (Image at right.)
 

Moore's Law graph
Moore’s first public graph showing his vision of the semiconductor industry being able to “cram more components onto  integrated circuits

 
1965: Intel co-founder Gordon Moore described in Electronics magazine several trends he foresaw in the field of electronics. One trend now known as “Moore’s Law,” described the density of transistors on an integrated chip (IC) doubling every 12 months (later amended to every 2 years). Moore also saw chip sizes and costs shrinking with their growing functionality—with a transformational effect on the ways people live and work. That the basic trend Moore envisioned has continued for 50 years is to a large extent due to the semiconductor industry’s increasing reliance on nanotechnology as ICs and transistors have approached atomic dimensions.1974:  Tokyo Science University Professor Norio Taniguchi coined the term nanotechnology to describe precision machining of materials to within atomic-scale dimensional tolerances. (See graph at left.)



1981:  Gerd Binnig and Heinrich Rohrer at IBM’s Zurich lab invented the scanning tunneling microscope, allowing scientists to “see” (create direct spatial images of) individual atoms for the first time. Binnig and Rohrer won the Nobel Prize for this discovery in 1986.



1981: Russia’s Alexei Ekimov discovered nanocrystalline, semiconducting quantum dots in a glass matrix and conducted pioneering studies of their electronic and optical properties.

1985:  Rice University researchers Harold Kroto, Sean O’Brien, Robert Curl, and Richard Smalley discovered the Buckminsterfullerene (C60), more commonly known as the buckyball, which is a molecule resembling a soccer ball in shape and composed entirely of carbon, as are graphite and diamond. The team was awarded the 1996 Nobel Prize in Chemistry for their roles in this discovery and that of the fullerene class of molecules more generally. (Artist’s rendering at right.)depiction of buckyball

1985: Bell Labs’s Louis Brus discovered colloidal semiconductor nanocrystals (quantum dots), for which he shared the 2008 Kavli Prize in Nanotechnology.

1986:  Gerd Binnig, Calvin Quate, and Christoph Gerber invented the atomic force microscope, which has the capability to view, measure, and manipulate materials down to fractions of a nanometer in size, including measurement of various forces intrinsic to nanomaterials.

Image of IBM spelled in xenon atoms

1989: Don Eigler and Erhard Schweizer at IBM’s Almaden Research Center manipulated 35 individual xenon atoms to spell out the IBM logo. This demonstration of the ability to precisely manipulate atoms ushered in the applied use of nanotechnology. (Image at left.)


1990s: Early nanotechnology companies began to operate, e.g., Nanophase Technologies in 1989, Helix Energy Solutions Group in 1990, Zyvex in 1997, Nano-Tex in 1998….

1991: Sumio Iijima of NEC is credited with discovering the carbon nanotube (CNT), although there were early observations of tubular carbon structures by others as well. Iijima shared the Kavli Prize in Nanoscience in 2008 for this advance and other advances in the field. CNTs, like buckyballs, are entirely composed of carbon, but in a tubular shape. They exhibit extraordinary properties in terms of strength, electrical and thermal conductivity, among others. (Image below.)

Carbon nanotubesSEM image of CNT paperimage of an array of CNTs
Carbon nanotubes (courtesy, National Science Foundation). The properties of CNTs are being explored for applications in electronics, photonics, multifunctional fabrics, biology (e.g., as a scaffold to grow bone cells), and communications. See a 2009 Discovery Magazine article for other examplesSEM micrograph of purified nanotube “paper” in which the nanotubes are the fibers (scale bar, 0.001 mm) (courtesy, NASA).An array of aligned carbon nanotubes, which can act like a radio antenna for detecting light at visible wave- lengths (scale bar 0.001 mm) (courtesy, K. Kempa, Boston College).

 
1992: C.T. Kresge and colleagues at Mobil Oil discovered the nanostructured catalytic materials MCM-41 and MCM-48, now used heavily in refining crude oil as well as for drug delivery, water treatment, and other varied applications.

image of MCM-41 pore structureTEM image of MCM-41's straight pores
MCM-41 is a “mesoporous molecular sieve” silica nanomaterial with a hexagonal or “honeycomb” arrangement of its straight cylindrical pores, as shown in this TEM image (courtesy of Thomas Pauly, Michigan State University).This TEM image of MCM-41 looks at the straight cylindrical pores as they lie perpendicular to the viewing axis (courtesy of Thomas Pauly, Michigan State University).

 
1993: Moungi Bawendi of MIT invented a method for controlled synthesis of nanocrystals (quantum dots), paving the way for applications ranging from computing to biology to high-efficiency photovoltaics and lighting. Within the next several years, work by other researchers such as Louis Brus and Chris Murray also contributed methods for synthesizing quantum dots.

1998:  The Interagency Working Group on Nanotechnology (IWGN) was formed under the National Science and Technology Council to investigate the state of the art in nanoscale science and technology and to forecast possible future developments. The IWGN’s study and report, Nanotechnology Research Directions: Vision for the Next Decade (1999) defined the vision for and led directly to formation of the U.S. National Nanotechnology Initiative in 2000.
 

Image of molecular assembly fof an FeCO2 molecule, in four stages
The progression of steps of using a scanning tunneling microscope tip to “assemble” an iron carbonyl molecule, beginning with Fe (iron) and CO (carbon monoxide) molecules (A), joining them to produce FeCO (B), then adding a second CO molecule (C), to achieve the FECO2 molecule (D). (H.J. Lee, W. Ho, Science 286, 1719 [1999].)

1999: Cornell University researchers Wilson Ho and Hyojune Lee probed secrets of chemical bonding by assembling a molecule [iron carbonyl Fe(CO)2] from constituent components [iron (Fe) and carbon monoxide (CO)] with a scanning tunneling microscope. (Image at left.)
 

1999: Chad Mirkin at Northwestern University invented dip-pen nanolithography® (DPN®), leading to manufacturable, reproducible “writing” of electronic circuits as well as patterning of biomaterials for cell biology research, nanoencryption, and other applications. (Image below right.)

Image of DPN depositing biomolecular materials in patterns
Use of DPN to deposit biomaterials ©2010 Nanoink

1999–early 2000’s:  Consumer products making use of nanotechnology began appearing in the marketplace, including lightweight nanotechnology-enabled automobile bumpers that resist denting and scratching, golf balls that fly straighter, tennis rackets that are stiffer (therefore, the ball rebounds faster), baseball bats with better flex and “kick,” nano-silver antibacterial socks, clear sunscreens, wrinkle- and stain-resistant clothing, deep-penetrating therapeutic cosmetics, scratch-resistant glass coatings, faster-recharging batteries for cordless electric tools, and improved displays for televisions, cell phones, and digital cameras.

various images of nanotechnology-enabled products

2000: President Clinton launched the National Nanotechnology Initiative (NNI) to coordinate Federal R&D efforts and promote U.S. competitiveness in nanotechnology. Congress funded the NNI for the first time in FY2001. The NSET Subcommittee of the NSTC was designated as the interagency group responsible for coordinating the NNI.

2003:  Congress enacted the 21st Century Nanotechnology Research and Development Act (P.L. 108-153). The act provided a statutory foundation for the NNI, established programs, assigned agency responsibilities, authorized funding levels, and promoted research to address key issues.

Computer simulation of growth of gold nanoshell with silica core and over-layer of gold
Computer simulation of growth of gold nanoshell with silica core and over-layer of gold (courtesy N. Halas, Genome News Network, 2003) 

 
2003: Naomi Halas, Jennifer West, Rebekah Drezek, and Renata Pasqualin at Rice University developed gold nanoshells, which when “tuned” in size to absorb near-infrared light, serve as a platform for the integrated discovery, diagnosis, and treatment of breast cancer without invasive biopsies, surgery, or systemically destructive radiation or chemotherapy.2004: The European Commission adopted the Communication “Towards a European Strategy for Nanotechnology,” COM(2004) 338, which proposed institutionalizing European nanoscience and nanotechnology R&D efforts within an integrated and responsible strategy, and which spurred European action plans and ongoing funding for nanotechnology R&D. (Image at left.)

2004: Britain’s Royal Society and the Royal Academy of Engineering published Nanoscience and Nanotechnologies: Opportunities and Uncertainties advocating the need to address potential health, environmental, social, ethical, and regulatory issues associated with nanotechnology.

2004:  SUNY Albany launched the first college-level education program in nanotechnology in the United States, the College of Nanoscale Science and Engineering.

2005: Erik Winfree and Paul Rothemund from the California Institute of Technology developed theories for DNA-based computation and “algorithmic self-assembly” in which computations are embedded in the process of nanocrystal growth.
 

Nanoscale car from Rice University
Nanocar with turning buckyball wheels (credit: RSC, 29 March 2006).

 
2006:  James Tour and colleagues at Rice University built a nanoscale car made of oligo(phenylene ethynylene) with alkynyl axles and four spherical C60 fullerene (buckyball) wheels. In response to increases in temperature, the nanocar moved about on a gold surface as a result of the buckyball wheels turning, as in a conventional car. At temperatures above 300°C it moved around too fast for the chemists to keep track of it! (Image at left.)

2007: Angela Belcher and colleagues at MIT built a lithium-ion battery with a common type of virus that is nonharmful to humans, using a low-cost and environmentally benign process. The batteries have the same energy capacity and power performance as state-of-the-art rechargeable batteries being considered to power plug-in hybrid cars, and they could also be used to power personal electronic devices. (Image at right.)

MIT researchers Chiang, Belcher, and Hammond
(L to R) MIT professors Yet-Ming Chiang, Angela Belcher, and Paula Hammond display a virus-loaded film that can serve as the anode of a battery. (Photo: Donna Coveney, MIT News.)

 
2008:  The first official NNI Strategy for Nanotechnology-Related Environmental, Health, and Safety (EHS) Research was published, based on a two-year process of NNI-sponsored investigations and public dialogs. This strategy document was updated in 2011, following a series of workshops and public review.

2009–2010: Nadrian Seeman and colleagues at New York University created several DNA-like robotic nanoscale assembly devices. One is a process for creating 3D DNA structures using synthetic sequences of DNA crystals that can be programmed to self-assemble using “sticky ends” and placement in a set order and orientation. Nanoelectronics could benefit: the flexibility and density that 3D nanoscale components allow could enable assembly of parts that are smaller, more complex, and more closely spaced. Another Seeman creation (with colleagues at China’s Nanjing University) is a “DNA assembly line.” For this work, Seeman shared the Kavli Prize in Nanoscience in 2010.

2010: IBM used a silicon tip measuring only a few nanometers at its apex (similar to the tips used in atomic force microscopes) to chisel away material from a substrate to create a complete nanoscale 3D relief map of the world one-one-thousandth the size of a grain of salt—in 2 minutes and 23 seconds. This activity demonstrated a powerful patterning methodology for generating nanoscale patterns and structures as small as 15 nanometers at greatly reduced cost and complexity, opening up new prospects for fields such as electronics, optoelectronics, and medicine. (Image below.)

Rendered image of a nanoscale silicon tip chiseling a relief map of the world
A rendered image of a nanoscale silicon tip chiseling out the smallest relief map of the world from a substrate of organic molecular glass. Shown middle foreground is the Mediterranean Sea and Europe. (Image courtesy of Advanced Materials.)

 
2011:
 The NSET Subcommittee updated both the NNI Strategic Plan and the NNI Environmental, Health, and Safety Research Strategy, drawing on extensive input from public workshops and online dialog with stakeholders from Government, academia, NGOs, and the public, and others.

2012: The NNI launched two more Nanotechnology Signature Initiatives (NSIs)–Nanosensors and the Nanotechnology Knowledge Infrastructure (NKI)–bringing the total to five NSIs.

2013: 
  -The NNI starts the next round of Strategic Planning, starting with the Stakeholder Workshop. 
  -Stanford researchers develop the first carbon nanotube computer.

2014:
  -The NNI releases the updated 2014 Strategic Plan.
  –The NNI releases the 2014 Progress Review on the Coordinated Implementation of the NNI 2011 Environmental, Health, and Safety Research Strategy.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Sometimes my memes are 3D. And you can own them. Or send them to someone.
You can even eat some of them.
CLICK HERE

Everything you didn’t like about Pentagon’s DARPA, CIA’s In-Q-Tel, and more, but with funds stolen from Queen’s subjects and European peasantry.
The business of high-tech slavery is the future and the future is now! Advanced by slave work of course.

UK to host world-leading Nato Defence Innovation Headquarters

From: UK Ministry of Defence, Published 5 April 2022

The UK will partner with Estonia on the Defence Innovation Accelerator for the North Atlantic (DIANA) programme to maintain NATO’s technological edge.

The United Kingdom, in partnership with Estonia, will host the European HQ of a programme for NATO allies to accelerate, test, evaluate and validate new technologies that address critical defence challenges and contribute to Alliance deterrence.

Announced today by the NATO Secretary General, Jens Stoltenberg, the Defence Innovation Accelerator for the North Atlantic (DIANA) will see transatlantic cooperation on critical technologies and help NATO work more closely with industry and academia.

The UK’s accelerator will be twinned with a new accelerator in Tallinn, Estonia to encourage the sharing of expertise, explore the use of virtual sites to trial vehicles, including autonomous ones, and test cyber innovations.

As hosts, the UK and Estonia will:

  • Support start-up companies with funding, guidance and business expertise through twinned accelerator networks.
  • Offer the use of ‘deep tech’ test centres to assess technological solutions to military problems, utilising the Defence BattleLab.
  • Work with NATO to develop a virtual marketplace to connect start-ups with trusted investors, as well as a rapid acquisition service to connect products to buyers at pace.

UK Defence Secretary, Ben Wallace said:

The UK and Estonia are two of the most innovative countries in NATO and our hosting of DIANA will harness that innovation for the benefit of all Allies tackling future military threats.

The UK has a vibrant tech community, combining the academia, financiers, and high-tech start-ups that make it an ideal place to develop the next generation of military technologies.

Estonia was the natural partner for the UK given its international leadership in cyber, autonomy and AI, and our close partnership forged through the Enhanced Forward Presence.

Ranked in the world’s top ten innovative universities, Imperial College London will bring together academia, industry and government by hosting the headquarters of DIANA and a DIANA Accelerator at the Innovation Hub (IHUB) in the White City Innovation District, in a space shared with the UK’s Defence and Security Accelerator (DASA), Major Defence Contractors and The US Department of Defence’s Tri-Service Office.

Supported by DASA, the UK and Estonia DIANA HQ is expected to be operational from July 2022. DIANA is essential to delivering the NATO 2030 vision and ensuring that the Alliance develops the military capabilities needed to deter and defend against existing and future threats.

Estonian Defence Minister, Kalle Laanet.

The goal of DIANA is to support deep technologies companies that contribute to defence. It will bring together talented innovators with new technologies end-users in the area of defence. We are very glad to see that the good cooperation we have with the UK will expand even further and also encompass our universities and private sector more,

Cooperation between the UK and Estonia is working well on every level because we have a common understanding of defence policy. Good relations with Allies is a cornerstone of Estonian defence policy, and a successful start to this programme for us is a sign that this cornerstone is strong.

Co- Director, Institute for Security Science and Technology, Imperial College London, Professor Deeph Chana, said:

As one of the top STEM-B universities in the world, in one of the most diverse cities, Imperial College London is uniquely placed to power a progressive, responsible and holistic dual-use security and defence technology innovation program by hosting DIANA. Coordinated through our Institute for Security Science and Technology and Business School we’re committed to working on disruptive research and innovation to reduce insecurity and to deal with global threats and challenges.

DIANA will support all seven of the key emerging and disruptive technologies that NATO has identified as priorities: artificial intelligence, big-data processing, quantum-enabled technologies, autonomy, biotechnology, hypersonics and space.

She is Estonia’s Prime Minister

What the Estonian Ministry of Defense has to say on this:

Estonia chosen as one of the initiators of the NATO DIANA future technologies programme

5. April 2022 – 19:13

At the NATO summit last June in Brussels, NATO leaders decided to create an innovation accelerator – the DIANA (Defence Innovation Accelerator for the North Atlantic) programme will allow Allies to join their strengths in developing and adopting new and breakthrough technologies in the area of security and defence.

In cooperation between the Estonian ministries of defence, foreign affairs, and economic affairs and communication, Estonia and the United Kingdom submitted a bid for the programme, which was approved in full at the proposal of the NATO Secretary General. Together with the UK, Estonia is set to create the DIANA European headquarters, a NATO start-up accelerator will be founded in Estonia, and several existing testing sites for new technologies will be added to the DIANA accelerator network.

“The goal of DIANA is to support deep technologies companies that contribute to defence. It will bring together talented innovators with new technologies end-users in the area of defence. We are very glad to see that the good cooperation we have with the UK will expand even further and also encompass our universities and private sector more,” commented Minister of Defence Kalle Laanet. “Cooperation between the UK and Estonia is working well on every level because we have a common understanding of defence policy. Good relations with Allies is a cornerstone of Estonian defence policy, and a successful start to this programme for us is a sign that this cornerstone is strong.”

“Estonia and the UK are two of the most innovative nations in the Alliance, hosting respectively the most unicorn firms per capita, and the most unicorns in total. With Estonia’s impressive leadership in cyber, autonomy and AI, and the close partnership forged through our enhanced Forward Presence (eFP), they were a natural partner for the UK on this important initiative,” said UK Defence Secretary Ben Wallace.

“Trust in this Estonian initiative is a sign of our good reputation in creating favourable ecosystems for start-up innovation and developing new technologies. The fact that DIANA will be launched both in Estonia and the UK is an example of cooperation at work – both domestically between ministries, universities and the private sector, as well as across borders,” added Minister of Foreign Affairs Eva-Maria Liimets.

DIANA is a highly ambitious cooperation format that will bring together civil and military experts to develop and implement dual-use technologies in member states as well as across the transatlantic Alliance.

In addition, Estonia will participate at the negotiations for the founding of a NATO innovation fund. The objective of the fund is to support dual-use deep technology start-ups with investments, by offering trusted capital and creating additional opportunities for growth. States that have decided to join the fund will formalise the agreement at the NATO summit set to take place at the end of June.

Going forward, Estonia will continue preparations for the launch of the DIANA programme in 2023.

Additional information: press@mod.gov.ee

“Dual use” as in vaccines / bioweapons, I shall add.

Here’s a clue on how much DIANA’s future victims will be paying for it. This will be just launch money:

Defence sector innovation: NATO to invest €1B in startups

 THE RECURSIVE, 24 JUNE 2021  3 MINS READ

us-army-soldiers-army-men-54098

NATO, the intergovernmental defence alliance between 30 European and North American countries, launches a €1B fund and an accelerator targeting deeptech startups in the defence sector. The goal is to leverage the innovation capabilities of startups to develop the next generation of war machines. Part of NATO 2030, the move follows a period of concern for Alliance leaders regarding China’s increased reliance on tech for its military strategy.

At the end of two virtual meetings in early June, Foreign and Defence ministers agreed on the need to reinforce the transatlantic defence partnership between Europe and North America amid intensifying global competition. We need to sharpen our technological edge (…) We see that new and disruptive technologies, such as autonomous systems, artificial intelligence, and big data are really changing the way our militaries are going to operate in the future,” NATO Secretary-General Jens Stoltenberg said.

The Defence Innovation Accelerator for the North Atlantic (DIANA) is to become the center point for countries in the alliance to coordinate and cooperate on developing new technologies. DIANA will add offices and test centers throughout Alliance countries. 

“The goal is to have DIANA reach initial operating capability (IOC) by 2023,” David van Weel, assistant secretary-general for emerging security challenges, added in a virtual roundtable with reporters, following the 31st annual summit on June 14 in Brussels.

Planning to stay ahead of the curve is particularly important, as China has been investing heavily in new technologies to strengthen its military power and fuel its ambition to become a leader in the use of AI. The defence accelerator is also a recognition from European and North American leaders of the prevalence of disruptive technologies – and a decision to harness their unique potential to strengthen common defence strategies. 

How startups benefit from NATO’s initiative

For startups, this will be an opportunity to work together with the government sector and academia towards accelerating the achievement of national security and transatlantic collaboration goals. “Sometimes a technology company may not realize that their product could be viable for the defence community,” David van Weel said. Startups will also benefit from entering a network of stakeholders that can help them develop and get funded.

DIANA will be supporting startups working on either of the seven key emerging and disruptive technologies (EDTs) that NATO deems critical for the future: AI, big-data processing, quantum-enabled tech, autonomy, biotechnology, hypersonics, and space.

The accelerator includes a trusted capital marketplace that will enable funding opportunities for companies by connecting them to pre-qualified investors. Additionally, startups will receive support through a venture capital fund. The NATO Innovation Fund has been set up to support companies developing dual-use and key tech that could serve the Alliance. The fund will be an opt-in for member countries and would be underwritten by about €70M per year. Van Weel added that NATO would be looking for a partner from the private sector to help run the daily business operations of the fund.

DIANA is unique to NATO’s innovation efforts in that it has been built with the needs of the startup community in mind. It specifically targets early-stage startups rather than larger companies and traditional defence firms, in order to harness their unique ability for innovation.

IF YOU’RE NAIVE ENOUGH TO THINK THIS IS ABOUT DEFENSE, AND NOT THE INSANE DAVOS TRANSHUMANIST AGENDA…

… I will bring to your attention the fact that NATO has already adopted its own “Agenda 2030”, titled “NATO 2030”, and both of these are just “The Great Reset for Different Niches of Dummies” in their specific lingo. That’s all they are.
Proportionally, “NATO 2030” talks about climate change about as much as “The Great Reset”.

Also note how NATO presents itself more and more as a business accelerator.
Transhumanist businesses with a multinational army funded by half a billion unsuspecting dupes and NPCs in NATO countries and beyond. What could go wrong, right?

NATO hopes to launch new defense tech accelerator by 2023

DEFENSE NEWS,  Jun 22, 2021

Secretary-General Jens Stoltenberg gives press conference at the NATO summit in Brussels on June 14, 2021. (Photo by FREDERIC SIERAKOWSKI/BELGA MAG/AFP via Getty Images)

STUTTGART, Germany — In less than two years, NATO hopes to have its own, modified version of the U.S. Defense Advanced Research Projects Agency (DARPA) up and running.

Alliance members agreed at the 31st annual summit, held June 14 in Brussels, to launch a new initiative dubbed the Defence Innovation Accelerator of the North Atlantic, or DIANA, meant to speed up trans-Atlantic cooperation on critical technologies, and help NATO work more closely with private-sector entities, academia and other non-governmental entities.

The goal is to have DIANA reach initial operating capability (IOC) by 2023, David van Weel, assistant secretary-general for emerging security challenges, said at a Tuesday virtual roundtable with reporters. By next year, the hope is to have “the initial parts … starting to come up into fruition,” he added.

In the long term, DIANA will have headquarters both in North America and in Europe, and link to existing test centers throughout NATO member countries that will be used for “validating, testing, and co-designing applications in the field of emerging and disruptive technologies,” van Weel said. DIANA will also be responsible for building and managing a network meant to help relevant startups grow and support NATO’s technology needs via grant programs.

The focus will be on national security and defense purposes, and DIANA will not ask for or solicit companies’ intellectual property, van Weel noted.

While he singled out artificial intelligence, big-data processing, and quantum-enabled technologies, DIANA is meant to support all seven of the key emerging and disruptive technologies — or EDTs — that NATO has identified as critical for the future. The other four include: autonomy, biotechnology, hypersonics and space.

Sometimes a technology company may not realize that their product could be viable for the defense community, he added.

One key component of DIANA will be a trusted capital marketplace, where smaller companies can connect with pre-qualified investors who are interested in supporting NATO’s technology efforts. Ensuring that investors are vetted ahead of time will allow NATO to ensure “that the technology will be protected from illicit transfers,” van Weel said.

The fund is modeled after a The U.S. Defense Department set up its own trusted capital marketplace in 2019 as a tool that then-DoD acquisition czar Ellen Lord said could help encourage domestically based venture capitalists to fund national security and defense projects. That marketplace served as inspiration for the announced NATO trusted capital marketplace, per the alliance.

Members also agreed for the first time to build up a venture capital fund to support companies developing dual-use and key technologies that could be useful to NATO, and which will be optional for member-nations to participate in. The NATO Innovation Fund, as it’s called, would have a running time of about 15 years to start, and would be underwritten by about 70 million euro (about $83 million) per year, per van Weel.

The goal is not for NATO headquarters or for its member-nations to run the innovation fund, he noted. “The actual running of a venture capital fund, we believe, should be done by companies that have a broad range of experience in the field.” He cited the U.S.-based capital venture firm In-Q-Tel as an example of the type of partner NATO would seek to run the “day-to-day” business of the fund.

“I read somewhere that NATO is not a bank—we’re not,” van Weel said. “But it will be the nations providing the funds, and giving the general direction.”

These two initiatives of a technology accelerator and innovation fund are “hopefully going to … bring the alliance forward into the 21st century,” van Weel said.

NATO has previously invested in information technology (IT) and software through the NATO Communications and Information Agency (NCIA), but the difference with the innovation fund, and DIANA, is that the alliance wants to better connect with early-stage startups, rather than larger software companies or traditional defense firms, van Weel said.

“DIANA is not about taking over innovation for the NATO enterprise,” he said. “It’s a different community, and requires different funding mechanisms and different types of engagement.”

These two initiatives have been long awaited and demanded by NATO observers, and versions of both a “DARPA-like” technology accelerator and an alliance-wide investment bank were included in a 2020 list of recommendations by NATO’s advisory group on emerging and disruptive technologies.

But it is still early days. While the IOC goal is 2023, “step one is we want to know from allies what they want to offer to DIANA,” van Weel said. Once the NATO Innovation Fund has its participating members, for example, a charter will be set up that will lay out the funding models, rapid contracting processes, and leadership guidelines.

“We are trying to do this as fast as we can,” van Weel assured, but then noted, “we do want to get it right, because … with the startup community, you only get one chance.”

If you want to deepen your understanding of the situation and the context here, also read:

EVERYTHING WE PUBLISHED ON DARPA

BOMBSHELL! GERMAN & UK DEFENSE WORK ON MASSIVE “HUMAN AUGUMENTATION” PROJECT FOR CIVILIAN POPULATION! SWEDEN AND FINLAND INVOLVED TOO

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Remember: “The war abroad always comes home”.
And this one “starts with hyper-connectivity”.

“Cognitive warfare, when practiced effectively has strength, an insidious nature and disrupts our ordinary understandings and reactions to events. The term, cognitive warfare, requires some dissection and interpretation in the context of national security; broadly defined it is a disinformation process to psychologically wear down the receivers of the information. It is strategically spread through information resources like social media, networking, Internet resources, videos, photos taken out of context, simplistic resources like political cartoons and even well-planned websites that encourage the making of disinformation.”

Diana Mackiewicz
University of Massachusetts Lowell – Cognitive Warfare – Conference: INSS-Summer Institute 2018, Tel Aviv, Israel

Canada – NATO Innovation Challenge Fall 2021: Cognitive Warfare – 2021

Informational webinar on October 5th as Canada hosts the Fall 2021 NATO Innovation Challenge organized by Canadian Special Operations Forces Command (CANSOFCOM), Innovation for Defence Excellence and Security (IDEaS) and the NATO Allied Command Transformation (ACT) iHub. Innovators will have the opportunity to familiarize themselves with the concept of Cognitive Warfare as well as the Innovation Challenge’s eligibility requirements, application process and timeline.

Commenting on the video above, The Gray Zone notes:

The other institution that is managing the Fall 2021 NATO Innovation Challenge on behalf of Canada’s Department of National Defense is the Special Operations Forces Command (CANSOFCOM).

A Canadian military officer who works with CANSOFCOM, Shekhar Gothi, was the final panelist in the October 5 NATO Association of Canada event. Gothi serves as CANSOFCOM’s “innovation officer” for Southern Ontario.

He concluded the event appealing for corporate investment in NATO’s cognitive warfare research.

The bi-annual Innovation Challenge is “part of the NATO battle rhythm,” Gothi declared enthusiastically.

He noted that, in the spring of 2021, Portugal held a NATO Innovation Challenge focused on warfare in outer space.

In spring 2020, the Netherlands hosted a NATO Innovation Challenge focused on Covid-19.

Gothi reassured corporate investors that NATO will bend over backward to defend their bottom lines: “I can assure everyone that the NATO innovation challenge indicates that all innovators will maintain complete control of their intellectual property. So NATO won’t take control of that. Neither will Canada. Innovators will maintain their control over their IP.”

The comment was a fitting conclusion to the panel, affirming that NATO and its allies in the military-industrial complex not only seek to dominate the world and the humans that inhabit it with unsettling cognitive warfare techniques, but to also ensure that corporations and their shareholders continue to profit from these imperial endeavors.

thegrayzone.com

SOURCE

Considerations on resilience

Since the early days of the Alliance, NATO has played an essential role in promoting and enhancing civil preparedness among its member states. Article 3 of the NATO founding treaty establishes the principle of resilience, which requires all Alliance member states to “maintain and develop their individual and collective capacity to resist armed attack.” This includes supporting the continuity of government, and the provision of essential services, including resilient civil communications systems.

NATO
SOURCE

A Taipei think tank and observers in Taiwan say China is trying to influence residents with “cognitive warfare,” hoping to reverse opposition to Beijing’s desired takeover of Taiwan so it can be accomplished without having to go to war.

Taiwanese attitudes have been drifting away from the mainland, especially among the younger generation, whose members see themselves “born independent” with no ties to China.

China’s effort, these analysts say, includes tactics ranging from military intimidation and propaganda to misinformation spread by its army of online trolls in a bid to manipulate public opinion. They say the complexity and frequency of the effort puts Taiwan on a constant defensive.

“Its ultimate goal is to control what’s between the ears. That is, your brain or how you think, which [Beijing] hopes leads to a change of behavior,” Tzeng Yi-suo, director of the cybersecurity division at the government-funded Institute of National Defense and Security Research in Taipei, told VOA.

Campaign intensifies amid COVID

Cognitive warfare is a fairly new term, but the concept has been around for decades. China has never stopped trying to deter the island’s separatists, according to Tzeng, who wrote about the Chinese efforts last month in the institute’s annual report on China’s political and military development.

Liberal democracies such as Taiwan, that ensure the free flow of information, are vulnerable to cognitive attacks by China, while China’s tightly controlled media and internet environment makes it difficult for democracies to counterattack, according to Tzeng.

China’s campaign has intensified since the outbreak of COVID-19, using official means such as flying military jets over Taiwan, and unofficial channels such as news outlets, social media and hackers to spread misinformation. The effort is aimed at dissuading Taiwan from pursuing actions contrary to Beijing’s interests, the report said.

China has used these tactics to attack Taiwan President Tsai Ing-wen’s administration, undermine support for democracy and fuel Taiwan’s social tensions and political divide, it said.

NATO Releases Disturbing Stance on Cognitive Warfare

By Malcolm Harris – October 14, 2021  – Verity Weekly

Cyber and economic warfare are often seen as the future of war. There is, however, a new type of warfare being discussed. It is called “cognitive warfare.”

Cognitive warfare, similar to information warfare, involves the the swaying of public opinion as a means of war. What differentiates the two, is that information warfare is simply defined as the manipulation of public opinion via propaganda. Cognitive warfare, on the other hand, involves the literal manipulation of the human brain. Seems far fetched? Well according to a NATO-sponsored study, it is now being classified as a “sixth domain” of warfare. While even acknowledging the horrific dangers of this type of warfare, the report goes on to claim NATO should develop the means to use cognitive warfare to get ahead of China and Russia. There is far from any proof that either countries are developing cognitive warfare capabilities, with reports of information warfare being falsely labelled as “cognitive warfare.” The NATO Association of Canada has even admitted that cognitive warfare is “one of the hottest topics” for the military alliance.

The fact that NATO is lying about the ambitions of its enemies when it comes to developmental warfare is not surprising. Since the collapse of the Soviet Union, NATO has repeatedly exaggerated the threat of Russia in order to expand its influence eastward. Could the US government use these false pretexts in order to convince the public that cognitive control over our minds is necessary to defend ourselves? If you think that’s far fetched, then just look at how successful the government was in pushing for vaccines on children. Despite the overwhelming evidence that vaccines for children are unnecessary (studies have shown children are more likely to die from the vaccine than COVID-19 itself), the government has successfully manipulated a large portion of the public into believing they are indeed necessary. In the future, will some people be convinced to willingly volunteer to have chips placed in their heads, in order to protect themselves from “Russian cognitive attacks”?

SOURCE

Speaking to the South China Morning Post, Lu Li-shih, a former teacher at the Republic of China Naval Academy, said: “This staged photograph is definitely ‘cognitive warfare’ to show the US doesn’t regard the PLA [People’s Liberation Army] as an immediate threat.
“In the photo, Commander Briggs looks very relaxed with his feet up watching the Liaoning ship just a few thousand yards away, while his deputy is also sitting beside him, showing they take their PLA counterparts lightly.”
One Hong Kong newspaper reported that the photo sent one clear message to China: “We’re watching you.”
The image comes as the US and the Philippines begin two weeks of military drills in a show of force against China after hundreds of ships anchored off Whitsun reef last month.

Naval officers watch the Liaoning

COGNITIVE WARFARE

By Emily Bienvenue, Zac Rogers & Sian Troath May 14, 2019  THE COVE (Australian Defense publication)


The term cognitive warfare has entered the lexicon over the last couple of years. General David L. Goldfein (United States Air Force) remarked last year we are “transitioning from wars of attrition to wars of cognition”. Neuroscientist James Giordano has described the human brain as the battlefield of the 21st Century. Cognitive warfare represents the convergence of all that elements that have lived restlessly under the catch-all moniker of Information Warfare (IW) since the term’s emergence in the 1990s. However, military and intelligence organisations now grappling with this contentious new concept are finding cognitive warfare to be something greater than, or as Gestalt intended, different than, the sum of these parts. Cognitive warfare is IW with something added. As we begin to understand more about what has been added, awareness is growing that western military and intelligence organisations may have been caught playing the wrong game.

As Martin Libicki explained, IW burst onto the scene in the early 1990s in line with the shift from attrition-based to effects-based operations and the increasingly digitised and networked infrastructure underpinning contemporary warfare. It overarched lines of effort in intelligence, surveillance and reconnaissance (ISR), electronic warfare (EW), psychological operations (PSYOPS), and cyber operations that in general raised the need to contend for and take advantage of control of information flows. These elements overlapped but remained disparate and lacked a unified concept and unity of effort. Despite the desire for integration being an ever-present agenda item, such unity did not eventuate and the individual streams continued to evolve, driven by more-or-less separate military and intelligence communities of interest.

The various elements under the IW construct were largely pursued throughout the ensuing period as adjuncts in support of objectives defined by the traditional remit of military organisations – namely, to deliver lethal kinetic effects on the battlefield. The War on Terror provided an unconventional sandbox for the refining of IW elements; but again, little impetus emerged for their drawing together under a unified concept. Influence operations across both cyber and human terrains remained episodic and an adjunct to a kinetic main effort – even while the separation between victory on the battlefield and the capacity for enduring political successes became starker. The disconnect should have been more unnerving for Western military organisations. The capacity for an adversary to contend for battlefield victory below the threshold of conventional conflict is only one aspect of asymmetry. The disconnect raises the more fundamental question of why, if battlefield superiority was demonstrably not resulting in political success, would a conventionally inferior opponent pursue such a pathway at all? What if strategic success – the causing of a preferable behaviour change in those with which we contend – could bypass the traditional battlefield altogether?

For the nation-state adversaries of the US and its allies, the disconnect provided an opportunity to observe and to learn. While the ‘winning without fighting’ ethos is a well understood heuristic of Chinese strategic culture, as Wirtz has suggested also, Russian strategic culture has consistently excelled at imagining some of the non-intuitive and strategic level implications of technological change. Much more than mere opportunism, Russia’s unfavourable geo-strategic circumstances, combined with its deep distrust of US intentions, forced it to render strategic level gains from a weakening hand. Here-in lies the temporary advantage it gained in finding and filling the gap between IW and cognitive warfare. As Clint Watts has surmised, where IW described a war of information, the cognitive battlespace is a war for information as it is transformed into knowledge via the processes of cognition. The technologies of the networked digital age, conceived by the US and its allies as an accumulation of advantages on the conventional battlefield, and unleashed by the clamour for profit of the commercial sector, were transformed into a strategic gift for an imaginative adversary and thus presents us with the current dilemma. The convergence of IW into cognitive warfare has been forced upon us.

This gift emerged in the mid-2000s with the advent of hyper-connectivity, largely a product of the social media phenomenon and its attendant business model based on accessing the constant attention of the human brain. This phenomenon created the bridge between IW and cognitive war which has been exploited by an unscrupulous adversary. Hyper-connectivity created the opportunity to transform IW from a set of episodic activities, largely associated with operational lines-of-effort by military and intelligence practitioners in support of lethal and kinetic effects on the battlefield, into a single continuous effort to disrupt and deny the cognitive conditions in which whole societies are situated. Cognitive warfare gathers together the instruments of IW and takes us into the realm of ‘neuro-weapons’ – defined by Giordano as “anything that accesses the brain to contend against others”. When coordinated and directed at open liberal democratic societies, cognitive warfare has paid off in spades. The capacity of open societies to function – to sustain and renew the narratives upon which their superior material strength relies – gets quickly scrambled when certain cognitive processes are exposed to manipulation.

It remains an item of curiosity how American and allied military and strategic culture, imbued as it is with the insights of John Boyd and many others, has been slow to recognise the shift in orientation. Boyd’s OODA loop may be one of the most bastardised concepts in modern military strategy, but its central insights are absolutely prescient for the age of cognitive warfare. The loop’s second “O” – Orientation – subsumes each of its other points. Getting orientation wrong, no matter how well an actor can Observe, how quickly they can Decide, and how concisely they can Act, can nonetheless mean the actor is caught playing the wrong game. It centrality is made patently clear for anyone who actually reads Boyd, or any of a number of good biographies of his work. It is imperative that this strategic culture understands the way in which its own orientation has been turned against it.

As digitised and networked warfare has matured and evolved over the last 25 years into its contemporary iteration of Multi-Domain Battle (MDB), it has pursued better observation through superior ISR, better decision-making through big data and machine learning, and better action through the constant advance of military-technical capabilities. Its orientation, however, has remained the same. As Albert Palazzo has iterated, MDB remains oriented toward a military problem solvable by lethal kinetic means in which political success is considered as a follow-on phase and to which influence operations across cyber and human terrain remain adjunct lines of effort. What is becoming clearer is that the age of cognitive warfare is highlighting the joints and fissures in this basic construct to an unprecedented extent. General Michael Hayden has made this point in his 2018 book, The Assault on Intelligence.

Cognitive warfare presents us with an orientation problem. Adversary actors have strategised to avoid a confrontation with US and allied forces at their strongest point – namely, in high intensity conventional warfare. They have pursued gains in various domains that remain under the threshold of inducing a conventional military response. While US and allied forces have mused over ways to bolster below-the-threshold capabilities, the adversary has been busy changing the rules of the meta-contest. By denying, disrupting, and countering the narratives that underpin US and allied legitimacy, and by stifling our capacity to regenerate the preferred narrative via sophisticated and targeted disinformation operations, the adversary has changed the context within which force and the threat of force is situated. In other words, the diplomatic power of the traditional force-in-being of allied militaries to influence the behaviour of others is being diminished. Furthermore, the actual deployment of lethal kinetic capabilities will be subject to a similar reorientation where and when they occur. Simply put, lethal kinetic capability, as the traditional remit of military organisations, has undergone a reorientation at the hands of an adversary enabled by the hyper-connected digital age to manipulate its context to an unprecedented extent.

Cognitive war is not the fight most professional military practitioners wanted. A little discussed aspect is the extent to which our military and strategic culture perceives it as a deeply dishonourable fight. A cultural bias – if not a genuine cognitive blind spot – is at work and has slowed our response. But national security, before it is about winning kinetic battles and before it is centred on the profession of arms, is at its core about ensuring that people are safe to live their lives: it is about keeping the peace and protecting the population from harmful interference. This includes the harm that disrupts our capacity to conduct our collective social, economic, and political lives on our own terms.


About the Authors:

Emily Bienvenue, Zac Rogers & Sian Troath

Dr Emily Bienvenue is a Senior Analyst in the Defence Science and Technology Group’s, Joint and Operations Analysis Division. Her research interests include trust as a strategic resource, the changing nature of warfare, and competition below the threshold of conflict.

The views expressed here are her own and do not represent the official view of the Australian Defence Department.

Zac Rogers is a senior researcher at the Centre for United States and Asia Policy Studies and PhD candidate at the College of Business, Government, and Law, Flinders University of South Australia.

Sian Troath is a PhD candidate at Flinders University, and a combined Flinders University-DST Group research associate working on Modelling Complex Warfighting (MCW) Strategic Response (SR) 4 – Modelling Complex Human Systems. Her areas of expertise are international relations theory, trust theory, Australian foreign policy, Australia-Indonesia relations, and Anglo-American relations.

The views expressed in this article are those of the authors and do not necessarily reflect the position of the Australian Army, the Department of Defence or the Australian Government.

THE PERSPECTIVE FROM THE OTHER SIDE

Media, Cognitive Warfare and One World Government Social Engineering

Walt Peretto 13 October 2021  / IRANIAN COUCIL FOR DEFENDING THE TRUTH

Ownership of mainstream media and popular social media is imperative to control desired narrative during psychological and military operations. In the last 30 years, it has been the accessibility and freedom of the internet which has been invaluable for the communication of independent and objective analysis which is often evidence-based rather than information used in cognitive warfare for perception manipulation.

We now live in a time where the powers that shouldn’t be are scrambling to find methods to disrupt these free lines of communication without appearing to be an all-out assault on freedom-of-speech; so the current methodology is slow implementation of concepts like “community standards” violations to shut down people who are often disseminating information that government does not want communicated. When a new forum is formed that allows freedom of speech—that forum quickly attracts attention and efforts are quickly made to either buy out the forum and disparage it publicly — sometimes labeling it as politically “right-wing” which automatically loses most users who may identify as politically “left-wing.”

With the popular accessibility of the internet starting in the 1990s, the exchanges of information and ideas have been facilitated throughout the globe. Before internet popularity, channels of information were mainly held by mainstream media corporations. In the last twenty-five years, billions of people worldwide have been exchanging information instantly outside of official government and corporate filters. These developments have fractured the monopoly on information once held by government and corporations on behalf of elite interests worldwide. 

A significant percentage of the global population still blindly trusts corporate mainstream media and prestigious academic sources of news and information without verification. These same people instinctively avoid ‘alternative’ sources of news and information. However, a growing number of people have awoken to the realization that mainstream media sources of information are agenda-driven and often purposely deceiving while engaging in systemic censorship. These are the people more inclined to seek alternative sources of information and communicate using channels free from corporate and academic monopolies. The current battle to disturb and eventually shut down these channels are extremely important to one-world-government social-engineers. This is a major battleground in today’s cognitive warfare.

As we enter the mid-2020s, it will likely be increasingly difficult to freely exchange evidence-based and independent research and analysis on the internet. There is a cognitive war against freedom of information in the emerging totalitarian global scheme. Unlike conventional warfare, cognitive warfare is everywhere a communication device is used. Independent researchers, analysts, and journalists are being disrupted and banned from forums like YouTube and Facebook.

To counteract cognitive warfare and ultimately avoid a one-world-government dystopia—engage your neighbors and build local and personal relationships of information exchange and commerce as opposed to relying on long-distance electronic communications. Get off the grid as much as possible and reverse the psyop of ‘social-distancing’ that the Covid-19 operation has promoted for the last year and a half. 

OTHER ANGLES

Cognitive Electronic Warfare: Conceptual Design and Architecture – 2020

Qinghan XiaoPages – 48 – 65     |    Revised – 30-11-2020     |    Published – 31-12-2020 Published in International Journal of Artificial Intelligence and Expert Systems (IJAE) Volume – 9   Issue – 3    |    Publication Date – December 2020 

ABSTRACT

Computing revolution is heralding the transition from digital to cognitive that is the third significant era in the history of computer technology: the cognitive era. It is about the use of computers to mimic human thought processes, such as perception, memory, learning and decision-making in highly dynamic environments. In recent years, there is a growing research interest in the development of cognitive capabilities in radio frequency technologies. Using cognition-based techniques, a radar system would be able to perceive its operational environment, fine-tune and accordingly adjust its emission parameters, such as the pulse width, pulse repetition interval, and transmitter power, to perform its assigned task optimally. It is certain that traditional electronic warfare (EW) methods, which rely on pre-programmed attack strategies, will not be able to efficiently engage with such a radar threat. Therefore, the next generation of EW systems needs to be enhanced with cognitive abilities so that they can make autonomous decisions in response to changing situations, and cope with new, unknown radar signals. Because the system architecture is a blueprint, this paper presents a conceptual cognitive EW architecture that carries out both electronic support and electronic attack operations to synthesize close-to-optimal countermeasures subject to performance goals.

The cognitive warfare: Aspects of new strategic thinking

March 5, 2018 By Gagliano Giuseppe / Modern Diplomacy

Combining the strategic observations on revolutionary war – those made by Colonel Trinquier during the war in Algeria, in   particular–with US strategy regarding information warfare, the authors Harbulot and Lucas, leading experts  at the French École de guerre économique, and Moinet, Director of the DESS (Intelligence économique et développement des Entreprises) – place their emphasis on the profoundly innovative and strategic role played by information warfare and on its implications for companies. Naturally enough, it emerges with clarity that the authors’ intention is to utilize cognitive warfare in defense of the interests of French companies against their US competitors.

It is undeniable – in the opinion of the authors – that the date of September 11, 2001, represented a change in strategic thinking  of fundamental importance. Undoubtedly, the war in the Persian Gulf, the US military intervention  in Somalia, and the conflicts in former Yugoslavia had already presaged – even if in terms not yet precisely defined – an evolution of military strategy in the direction of newer strategic scenarios. It is enough to consider – the authors observe – that   at the time of the invasion of Kuwait, US public opinion was mobilized following a disinformation process planned at military level or more exactly, at psychological warfare level. In this regard, it is sufficient to recall how the televised landing of US troops on the beaches of Mogadishu, the televised lynching of a US Army soldier enabled the marginalization of the politico-military dimension of the civil war in progress. Yet the importance ascribed to the manipulation of information was determined by the  conviction  –  which  proved  to be correct – that the absolute mastery of the production of knowledge both upstream (the educational system) and downstream (Internet, media audio-visual means) can ensure – the authors emphasize – the long-lasting legitimacy of the control of world  affairs.

Yet  in  light  of the American political-military choices and reflections on the revolutionary war in Algeria, French strategy felt the need to define in strict terms exactly what information warfare is. First of all, the expression used in the context of French strategy is the one of cognitive warfare defined as the capacity to use knowledge for the purpose of conflict. In this regard, it is by no mere chance that Rand Corporation information warfare specialists John Arquilla and David Rundfeldt assert the domination  of  information  to  be  fundamental  to American strategy. Secondly, the ample and systematic use of information warfare by the US creates the need – in geographical-strategic  terms–for the European Union to do some serious thinking on cognitive warfare. On the other hand, the absence of legal regulation of manipulation of knowledge in the architecture of security inherited at the end of the Cold War can only lead to serious concern above all for economic security of European companies and must consequently bring about the formulation of a strategy of dissuasion and the use of subversive techniques that must be capable of creating barriers against attempts at destabilization.

later updates:

TRUTH COPS

THE INTERCEPT: Leaked Documents Outline DHS’s Plans to Police Disinformation

October 31 2022

Read here

Key Takeaways

  • The work is primarily done by CISA, a DHS sub-agency tasked with protecting critical national infrastructure.
  • DHS, the FBI, and several media entities are having biweekly meetings as recently as August.
  • DHS considered countering disinformation relating to content that undermines trust in financial systems and courts.
  • The FBI agent who primed social media platforms to take down the Hunter Biden laptop story continued to have a role in DHS policy discussions.

Jen Easterly, Biden’s appointed director of CISA, swiftly made it clear that she would continue to shift resources in the agency to combat the spread of dangerous forms of information on social media. “One could argue we’re in the business of critical infrastructure, and the most critical infrastructure is our cognitive infrastructure, so building that resilience to misinformation and disinformation, I think, is incredibly important,” said Easterly, speaking at a conference in November 2021.

The Intercept

MORE REFERENCES

A. Gliozzo, C. Ackerson, R. Bhattacharya, A. Goering, A. Jumba, S. Y. Kim, L. Krishnamurthy, T. Lam, A. Littera, I. McIntosh, S. Murthy and M. Ribas. (2017, Jun.). Building Cognitive Applications with IBM Watson Services: Volume 1 Getting Started. [On-line]. IBM Redbooks. Available: http://www.redbooks.ibm.com/redbooks/pdfs/sg248387.pdf [Dec. 10, 2020].
A. J. Butt, N. A. Butt, A. Mazhar, Z. Khattak and J. A. Sheikh. “The soar of cognitive architectures”. In Proc. 2013 International Conference on Current Trends in Information Technology, 2013, pp. 135-142.
A. K. Noor. (2015). “Potential of cognitive computing and cognitive systems”. Open Engineering. [On-line]. 5(1), pp. 75-88. Available: https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1018&context=msve_fac_pubs [Dec. 10, 2020].
A. M. Jones. “Performance Prediction of Constrained Waveform Design for Adaptive Radar”. Ph.D. thesis, Wright State University, United States, 2016.
A. Ranadive. “Cognitive Systems And Artificial Intelligence, According to IBM”. Internet:https://medium.com/@ameet/cognitive-systems-and-artificial-intelligence-according-to-ibm-eb03f4d663b6, Jan. 7, 2017 [Dec. 10, 2020].
B. Merritt. The Digital Revolution. Morgan & Claypool Publishers, 2016.
C. Adams. “Cognitive Electronic Warfare: Radio Frequency Spectrum Meets Machine Learning”, Internet: http://interactive.aviationtoday.com/avionicsmagazine/august-september-2018/cognitive-electronic-warfare-radio-frequency-spectrum-meets-machine-learning/, Aug./Sep. 2018 [Dec. 10, 2020].
C. D. Wickens and J. G. Hollands. Engineering Psychology and Human Performance, 3rd ed. New Jersey: Prentice-Hall, Upper Saddle River, 2000.
C. F. Beckmann and S. M. Smith. “Probabilistic independent component analysis for functional magnetic resonance imaging”. IEEE Transactions on Medical Imaging, vol. 23, pp. 137-152, Feb. 2004.
C. Horne, M. Ritchie and H. Griffiths. “Proposed ontology for cognitive radar systems”, IET Radar, Sonar and Navigation, vol.12, pp. 1363-1370, Dec. 2018.
C. Tromp. “The diffusion and implementation of innovation”, Innovative Studies: International Journal, vol. 2, pp. 18-30, Dec. 2012.
D. A. Norman. “Cognitive engineering and education”, in Problem Solving and Education: Issues in Teaching and Research. D. T. Tuma, and F. Reif, Eds. New Jersey: Erlbaum Associates, Hillsdale, 1980, pp. 81–95.
D. D. Woods and E. Roth. “Cognitive engineering: Human problem solving with tools”, Human Factors, vol. 30, pp. 415–430, Apr. 1988.
D. M. Zasada, J. J. Santapietro and L. D. Tromp. “Implementation of a cognitive radar perception/action cycle”. In Proc. 2014 IEEE Radar Conference, 2014, pp. 544-547.
D. Norman. The Design of Everyday Things, Revised and Expanded Edition. New York: Basic Books, 2013.
E. Kania. “The AI Titans’ Security Dilemmas”. Internet: https://www.hoover.org/research/ai-titans, Oct. 29 2018 [Dec. 10, 2020].
Electronic Warfare Fundamentals. Internet: https://docplayer.net/26585533-Electronic-warfare-fundamentals.html, Nov.2000 [Dec. 10, 2020].
euCognition. “Definitions of Cognition & Cognitive Systems”. Internet: http://www.vernon.eu/euCognition/definitions.htm [Dec. 10, 2020].
G. E. Smith, Z. Cammenga, A. Mitchell, K. L. Bell, J. Johnson, M. Rangaswamy and C. Baker. “Experiments with cognitive radar”. IEEE Aerospace and Electronic Systems Magazine, vol. 31, pp. 34-46, Dec. 2016.
G. I. Seffers. “Smarter AI for Electronic Warfare”. Internet: https://www.afcea.org/content/smarter-ai-electronic-warfare, Nov. 1 2017 [Dec. 10, 2020].
G. Pettersson. “An Illustrated Overview of ESM and ECM Systems”. MSc. thesis, Naval Postgraduate School, Monterey, California, United States, 1993.
G. Zhang, H. Rong and W. Jin. “Intra-pulse modulation recognition of unknown radar emitter signals using support vector clustering”, in Proc. 3rd International Conference on Fuzzy Systems and Knowledge Discovery, 2006, pp. 420-429.
Intelligence and Electronic Warfare Operations. Internet: http://www.bits.de/NRANEU/others/amd-us-archive/FM34-1%281987%29.pdf, Jul. 1987 [Oct. 18, 2020].
J. Barron. The Imperfect State: An American Odyssey. Indianapolis, IN: Dog Ear Publishing, 2011.
J. Browne. “Cognitive EW Provides Computer-Powered Protection”, Internet: http://www.mwrf.com/defense/cognitive-ew-provides-computer-powered-protection, May 10, 2017 [Dec. 10, 2020].
J. E. Kelly III and S. Hamm. Smart Machines: IBM’s Watson and the Era of Cognitive Computing. New York: Columbia University Press, 2013.
J. Friedenberg and G. Silverman. Cognitive Science: An Introduction to the Study of Mind. Sage Publications, 2006.
J. Guerci, R. M. Guerci, M. Rangaswamy, J. Bergin and M. Wicks. “CoFAR: Cognitive fully adaptive radar”. in Proc. IEEE Radar Conference, 2014, pp. 984-989.
J. Guerci. Cognitive Radar: The Knowledge-Aided Fully Adaptive Approach. Norwood, MA: Artech House, 2010.
J. Konwles. “Regaining the advantage – Cognitive electronic warfare”. The Journal of Electronic Defense, vol. 39, pp. 56-62, Dec. 2016.
J. M. Fuster. Cortex and Mind: Unifying Cognition. Oxford, U.K.: Oxford University Press, 2003.
J. Mitola III and G. Q. Maguire, Jr. “Cognitive radio: Making software radios more personal”, IEEE Personal Communications Magazine, vol. 6, pp. 13-18, Apr. 1999.
J. Pang, Y. Lin and X. Xu. “An improved feature extraction algorithm of radiation source based on multiple fractal theory”. International Journal of Signal Processing, Image Processing and Pattern Recognition, vol.7 pp. 237-242, Jan. 2014.
J. R. Anderson. “Is human cognition adaptive?”, Behavioral and Brain Sciences, vol. 14, pp. 471–485, Mar. 1991.
J. Wang. Associative Memory Cells: Basic Units of Memory Trace. Springer, 2019.
K. Krishnan, T. Schwering and S. Sarraf. (2016, May). “Cognitive dynamic systems: A technical review of cognitive radar”, arXiv:1605.08150. [On-line]. Available: https://arxiv.org/abs/1605.08150 [Dec. 10, 2020].
K. L. Bell, C. J. Baker, G. E. Smith, J. T. Johnson and M. Rangaswamy. “Cognitive radar framework for target detection and tracking”, IEEE Journal of Selected Topics in Signal Processing, vol. 9, pp. 1427-1439, Aug. 2015.
L. E. Brennan and I. S. Reed. “Theory of adaptive radar”. IEEE Transactions on Aerospace and Electronic Systems, vol. AES-9, pp. 237-252, Feb. 1973.
M. A. Brandimonte, N. Bruno and S. Collina. “Cognition”. in Psychological Concepts: An International Historical Perspective. K. Pawlik and G. d’Ydewalle, Eds. Hove, UK: Psychology Press, 2006, pp. 11-26.
M. E. Khan, S. G. M. Shadab and F. Khan. “Empirical study of software development life cycle and its various models”, International Journal of Software Engineering, vol. 8, pp. 16-26, Jun. 2020.
M. S. Greco, F. Gini, P. Stinco and K. Bell. “Cognitive radar: A reality?”, arXiv:1803.01000. [On-line]. Available: https://arxiv.org/abs/1803.01000 [Dec. 10, 2020].
N. S. Lanjewar and D. Rane. “Cognitive computing applications”, in Proc. 2nd National Conference of Recent Trends in Computer Science and Information Technology, vol. 5, 2019, pp. 54-59.
P. Gärdenfors and A. Wallin. A Smorgasbord of Cognitive Science, Bokförlaget, Nora: Nya Doxa, 2008.
Q. Wei, Q. Xu, Y. Pan and G. Zhange. “A novel method for sorting unknown radar emitter”. In Proc. 2009 IEEE International Workshop on Intelligent Systems and Applications, 2009, 4 pages.
R. Adams. “Cognitive science meets computing science: The future of cognitive systems and cognitive engineering”, in Proc. of 31st International Conference on Information Technology Interfaces, 2009, pp. 1-12.
R. J. Anderson. Security Engineering — Guide to Building Dependable Distributed Systems. Indianapolis, IN: Wiley Pub, 2008.
S. Andrews and M. Sheppard. “Software architecture erosion: Impacts, causes, and management”. International Journal of Computer Science and Security, vol. 14, pp. 82-93, Jun. 2020.
S. Banerjee, J. Santos, M. Hempel and H. Sharif. “A new railyard safety approach for detection and tracking of personnel and dynamic objects using software-defined radar”. in Proc. 2018 Joint Rail Conference, 2018, pp.1-10.
S. Cole. “Cognitive Electronic Warfare: Countering Threats Posed by Adaptive Radars”. Internet: http://mil-embedded.com/articles/cognitive-electronic-warfare-countering-threats-posed-by-adaptive-radars/, Jan. 31, 2017 [Dec. 10, 2020].
S. Feng, P. Setoodeh and S. Haykin. “Smart home: Cognitive interactive people-centric Internet of things”. IEEE Communications Magazine, vol. 55, pp. 34-39, Feb. 2017.
S. Haykin, Cognitive Dynamic Systems: Perception–Action Cycle, Radar, and Radio. Cambridge, U.K.: Cambridge Press, 2012.
S. Haykin, Y. Xue and P. Setoodeh. “Cognitive radar: Step toward bridging the gap between neuroscience and engineering”, in Proc. of the IEEE, vol. 100, pp. 3102–3130, Nov. 2012.
S. Haykin. “Cognition is the key to the next generation of radar systems,” in Proc. 13th IEEE Digital Signal Processing Workshop and 5th IEEE Signal Processing Education Workshop, 2009, pp. 463–467.
S. Haykin. “Cognitive radar: A way of the future”, IEEE Signal Processing Magazine, vol. 23, pp. 30-40, Jan. 2006.
S. Haykin. “Cognitive radar” in Knowledge Based Radar Detection, Tracking and Classification. F. Gini and M. Rangaswamy, Eds. Hoboken, New Jersey: John Wiley & Sons, pp. 9-30. 2008.
S. Holtel. “Artificial intelligence creates a wicked problem for the enterprise”. Procedia Computer Science, vol. 99, pp. 171-180, 2016.
S. Kuzdeba, A. Radlbeck and M. Anderson. “Performance Metrics for Cognitive Electronic Warfare – Electronic Support Measures,” in Proc. 2018 IEEE Military Communications Conference (MILCOM), 2018, pp. 151-156.
S. Nirenburg. “Cognitive systems as explanatory artificial intelligence” in Language Production, Cognition, and the Lexicon. N. Gala, R. Rapp and G. Bel-Enguix, Eds. Springer, 2015, pp. 37-49.
T. Broderick. “EW Defense Moves Closer to Reality”. Internet: https://defensesystems.com/articles/2016/11/03/ew.aspx, Nov. 3, 2016 [Dec. 10, 2020].
T. Broderick. “The U.S. Military Fears Russia’s Electronic Warfare Capabilities. DARPA Might Have a Solution”. Internet: https://nationalinterest.org/blog/the-buzz/the-us-military-fears-russias-electronic-warfare-18285, Nov. 3, 2016 [Dec. 10, 2020].
V. N. Gudivada, “Data analytics: Fundamentals”. in Data Analytics for Intelligent Transportation Systems. M. Chowdhury, A. Apon and K. Dey, Eds. Amsterdam: Elsevier Inc., 2017, pp. 31 – 67.
W. L. Melvin and M. C. Wicks. “Improving practical space-time adaptive radar”. in Proc. 1997 IEEE National Radar Conference, 1997, pp. 48–53.
Y. Zhang, G. Si and Y. Wang. “Modelling and simulation of cognitive electronic attack under the condition of system-of-systems combat”, Defense Science Journal, vol. 70, pp. 183-189, Mar. 2020,
Z. W. Pylyshyn. “Computing in cognitive science”, in Foundations of Cognitive Science. M. I. Posner, Ed. Cambridge MA: MIT Press, 1989, pp. 49-92.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

I’ve shown before that the 5G – Covid – vaccines connection is actually DATA.
Now we learn it’s energy too.
Of course this is not a novel idea, but the announcement made by Georgia tech and more counts as an official confirmation that they pursue this concept

To get the effect above you also need this:

No more device batteries? Researchers at Georgia Institute of Technology’s ATHENA lab discuss an innovative way to tap into the over-capacity of 5G networks, turning them into “a wireless power grid” for powering Internet of Things (IoT) devices. The breakthrough leverages a Rotman lens-based rectifying antenna capable of millimeter-wave harvesting at 28 GHz. The innovation could help eliminate the world’s reliance on batteries for charging devices by providing an alternative using excess 5G capacity. – Georgia Tech, March 2021

We Could Really Have a Wireless Power Grid That Runs on 5G

This tech might make us say goodbye to batteries for good.

POPULAR MECHANICS APR 30, 2021a georgia tech athena group member holds an inkjet printed prototype of a mm wave harvester the researchers envision a future where iot devices will be powered wirelessly over 5g networksCOURTESY OF CHRISTOPHER MOORE / GEORGIA TECH

  • Researchers at Georgia Tech have come up with a concept for a wireless power grid that runs on 5G’s mm-wave frequencies.
  • Because 5G base stations beam data through densely packed electromagnetic waves, the scientists have designed a device to capture that energy.
  • The star of the show is a specialized Rotman lens that can collect 5G’s electromagnetic energy from all directions.

If you’ve ever owned a Tile tracker—a square, white Bluetooth beacon that connects to your phone to help keep tabs on your wallet, keys, or whatever else you’re prone to losing—you’re familiar with low-power Internet-of-Things (IoT) devices.

Just like other small IoT devices, from voice assistants to tiny chemical sensors that can detect gas leaks, Tile trackers require a power source. It’s not realistic to hook these gadgets up to a wall outlet, and having to constantly change batteries is a waste of time that’s ultimately bad for the environment.

But what if you could wirelessly charge those devices with a power source that’s already all around you? Researchers at Georgia Tech have dreamed up this kind of “wireless power grid” with a small device that harvests the electromagnetic energy that 5G base stations routinely emit.

Just like the 3G and 4G cell phone towers that came before, 5G base stations radiate electromagnetic energy. At the moment, we’re only harnessing these precious bands of energy to transfer data (which helps you download your favorite Netflix series at lightning speeds).This content is imported from YouTube. You may be able to find the same content in another format, or you may be able to find more information, at their web site.

With some crafty engineering, it’s possible to use 5G’s waves of energy as a form of wireless power, says Manos Tentzeris, Ph.D., a professor of flexible electronics at Georgia Tech. He leads the university’s ATHENA research group, where his team has fabricated a specialized Rotman lens “rectenna” that makes this energy collection possible.

If the idea takes off, this tiny device—which is really a small, high-tech sticker—can use the wireless power grid to charge up far more devices than just your Tile tracker. Your cell phone providers could start beaming out electricity to power all kinds of small electronics, from delivery drones to tracking tags for pallets in a “smart warehouse.” The possibilities are truly endless.

“If you’re talking about real-world implementation of all of these ambitious projects, such as IoT, smart cities, or digital twins … you need to have wireless sensors everywhere,” Tentzeris tells Pop Mech. “But currently, all of them need to have batteries.”

But Wait, How Does 5G Create Power?

5g base stations

Let’s start out with the basics: 5G technically is energy.

5G can seem like a black box to those of us who aren’t electrical engineers, but the premise hinges on something we can all understand: electromagnetic energy. Consider the visible spectrum, or all of the light you can see. It exists along the larger electromagnetic spectrum, but it’s really just a blip.

In the graphic below, you can see the visible spectrum is just between ultraviolet and infrared light, or between 400 and 700 nanometers. As energy increases along the electromagnetic spectrum, the waves become shorter and shorter—notice gamma rays are far more powerful, and have more densely packed waves than FM radio, for example. Human eyes can’t detect these waves of energy.

electromagnetic spectrum

PRINCIPLES OF STRUCTURAL CHEMISTRY

5G is also invisible and operates at a higher frequency than other communication standards we’re used to, like 3G or 4G. Those networks work at frequencies between about 1 to 6 gigahertz, while experts say 5G sits closer to the band between 24 and 90 gigahertz.

Because 5G waves function at a higher frequency, they’re more powerful, but also shorter in length. This is the primary reason why new infrastructure (like small 5G cells installed on utility poles) is required for 5G deployment: the waves have different characteristics. Shorter waves, for example, will see more interference from objects like trees and skyscrapers, and even droplets of rain or flakes of snow.

But don’t think of a city’s constellation of 5G base stations as wasteful. Old standards, like 3G and 4G, are known for indiscriminately emitting power from massive service towers in all directions, beaming significant amounts of untapped energy. 5G base stations are much more efficient, says Jimmy Hester, Ph.D., a Georgia Tech alum who serves as senior lab advisor to the ATHENA group.

“Because they operate at high frequencies, [5G base stations] are much better able to focalize [power]. So there’s less waste in a sense,” Hester tells Pop Mech. “What we’re talking about is more of an intentional energization of the devices, themselves, by focalizing the beam towards the device in order to turn it on and power it.”

A ‘Tarantula’ Lens Takes Shape

rotman lens
The Rotman lens, pictured at the far right, can collect energy from multiple directions. IMAGE COURTESY OF GEORGIA TECH’S ATHENA GROUP

There’s a drawback to this efficient focalization: 5G base stations transmit energy in a limited field of view. Think of it like a beam of energy moving in one direction, rather than a circle of energy emanating from a tower. The researchers call it a “pencil beam.” How could a small device precisely snatch up energy from all of these scattered base stations, especially when you can’t see the direction in which the waves are traveling?

Enter the Rotman lens, the key technology behind the team’s breakthrough energy-harvesting device. You can see Rotman lenses at work in military applications, like radar surveillance systems meant to identify targets in all directions without having to actually move the antenna. This isn’t the prototypical lens you’re used to seeing in a pair of glasses or in a microscope. It’s a flexible lens with metal backing, the team explains in a new research paper published in Scientific Reports.

“THE LENS IS LIKE A TARANTULA…[IT] CAN LOOK IN SIX DIFFERENT DIRECTIONS.”

“The same way the lens in your camera collects all of the [light] waves from any direction, and combines it to one point…to create an image, that’s exactly how [this] lens works,” Aline Eid, a Ph.D. student and senior researcher at the ATHENA lab, tells Pop Mech. “The lens is like a tarantula … because a tarantula has six eyes, and our system can also look in six different directions.”

The Rotman lens increases the energy collecting device’s field of view from the “pencil beam” of about 20 degrees to more than 120 degrees, Eid says, making it easier to collect millimeter-wave energy in the 28-gigahertz band. So even if you slapped the sticker onto a moving drone, you could still reliably collect energy from 5G base stations all over a city.

“If you stick these devices on a window, or if you stick these devices on a light pole, or in the middle of an orchard, you’re not going to know the map of the strongest-power base stations,” Tentzeris explains. “We had to make our harvesting devices direction agnostic.”

Your Cell Phone Plan, Reimagined

researchers at georgia tech hold up their rotman lens rectenna

COURTESY OF CHRISTOPHER MOORE / GEORGIA TECH

Tentzeris says he and his colleagues are looking for funding and eager to work with telecom companies. It makes sense: these companies could integrate the rectenna stickers around cities to augment the 5G networks they’re already building out. The end result could be a sort of new-age cell phone plan.

“In the beginning of the 2000s, companies moved from voice to data. Now, using this technology, they can add power to data/communication as well,” Tentzeris says.

Right now, the rectenna stickers can’t collect a huge amount of power—just about 6 microwatts of electricity, or enough to power some small IoT devices, from 180 meters away. But in lab tests, the device is still able to gather about 21 times more energy than similar devices in development.This content is imported from {embed-name}. You may be able to find the same content in another format, or you may be able to find more information, at their web site.

Plus, accessibility is on the team’s side, since the system is fully printable. Tentzeris says it only costs a few cents to produce one unit through additive manufacturing. With that in mind, he says it’s possible to embed the rectenna sticker into a wearable or even stitch it into clothing.

“Scalability was very important, you’re talking about billions of devices,” Tentzeris says. “You could have a great prototype working in the lab, but when somebody asks, ‘Can everybody use it?’ you need to be able to say yes.” – POPULAR MECHANICS 2021

This is antiquated stuff by 2021 standards, but gives you an idea. Initially, much of the nanotech was powered by the body electricity, so it had very limited capabilities. 5G could power true robots.

ATHENA (Agile Technologies for High-performance Electromagnetic Novel Applications)

The ATHENA (Agile Technologies for High-performance Electromagnetic Novel Applications) group at Georgia Tech, led by Dr. Manos Tentzeris, explores advances and development of novel technologies for electromagnetic, wireless, RF and mm-wave applications in the telecom, defense, space, automotive and sensing areas.

This Manos guy is all ANTENNAS

In detail, the research activities of the 15-member group include Highly Integrated 3D RF Front-Ends for Convergent (Telecommunication,Computing and Entertainment) Applications, 3D Multilayer Packaging for RF and Wireless modules, Microwave MEM’s, SOP-integrated antennas (ultrawideband, multiband, ultracompact) and antenna arrays using ceramic and conformal organic materials and Adaptive Numerical Electromagnetics (FDTD, MultiResolution Algorithms).

The group includes the RFID/Sensors subgroup which focuses on the development of paper-based RFID’s and RFID-enabled “rugged” sensors with printed batteries and power-scavenging devices operating in a variety of frequency bands [13.56 MHz-60 GHz]. In addition, members of the group deal with Bio/RF applications (e.g. breast tumor detection), micromachining (e.g elevated patch antennas) and the development of novel electromagnetic simulator technologies and its applications to the design and optimization of modern RF/Microwave systems.

The numerical activity of the group primarily includes the finite-difference time-domain (FDTD) and multiresolution time-domain (MRTD) simulation techniques. It also covers hybrid numerical simulators capable of modeling multiple physical effects, such as electromagnetics and mechanical motion in MEMS devices and the combined effect of thermal, semiconductor electron transport, and electromagnetics for RF modules containing solid state devices.

The group maintains a 32 processor Linux Beowulf cluster to run its optimized parallel electromagnetic codes. In addition, the group uses these codes to develop novel microwave devices and ultracompact multiband antennas in a number of substrates and utilizes multilayer technology to miniaturize the size and maximize performance. Examples of target applications include cellular telephony (3G/4G), WiFi, WiMAX, Zigbee and Bluetooth, RFID ISO/EPC_Gen2, LMDS, radar, space applications, millimeter-wave sensors and surveillance devices and emerging standards for frequencies from 800MHz to 100GHz.

The activities are sponsored by NSF, NASA, DARPA and a variety of US and international corporations.ATHENA

SOURCE

MIT can charge implants with external wireless power from 125 feet away

By Digital Trends — Posted on June 6, 2018

Smart implants designed for monitoring conditions inside the body, delivering drug doses, or otherwise treating diseases are clearly the future of medicine. But, just like a satellite is a useless hunk of metal in space without the right communication channels, it’s important that we can talk to these implants. Such communication is essential, regardless of whether we want to relay information and power to these devices or receive data in return.

Fortunately, researchers from Massachusetts Institute of Technology (MIT) and Brigham and Women’s Hospital may have found a way to help. Scientists at these institutes have developed a new method to power and communicate with implants deep inside the human body.

“IVN (in-vivo networking) is a new system that can wirelessly power up and communicate with tiny devices implanted or injected in deep tissues,” Fadel Adib, an assistant professor in MIT’s Media Lab, told Digital Trends. “The implants are powered by radio frequency waves, which are safe for humans. In tests in animals, we showed that the waves can power devices located 10 centimeters deep in tissue, from a distance of one meter.”

These same demonstration using pigs showed that it is possible to extend this one-meter range up to 38 meters (125 feet), provided that the sensors are located very close to the skin’s surface. These sensors can be extremely small, due to their lack of an onboard battery. This is different from current implants, such as pacemakers, which have to power themselves since external power sources are not yet available. For their demo, the scientists used a prototype sensor approximately the size of a single grain of rice. This could be further shrunk down in the future, they said.

“The incorporation of [this] system in ingestible or implantable device could facilitate the delivery of drugs in different areas of the gastrointestinal tracts,” Giovanni Traverso, an assistant professor at Brigham and Women’s Hospital and Harvard Medical School, told us. “Moreover, it could aid in sensing of a range of signals for diagnosis, and communicating those externally to facilitate the clinical management of chronic diseases.”

The IVN system is due to be shown off at the Association for Computing Machinery Special Interest Group on Data Communication (SIGCOMM) conference in August.

More info : https://www.media.mit.edu/projects/ivn-in-vivo-networking/overview/

Click to access IVN-paper.pdf

DARPA’s Secret Mind Control Technology In Works Since the 1960’s – History Channel 2022

Buh-bye, Human race, you’ve just been assimilated by the Borg!

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

You’ve likely heard of IG Farben, but have you ever heard of American IG and the follow up story?

This is a follow up to an earlier report you should check first.

Imagine that the brutal experiments at Auschwitz were better concealed and the prisoners were drugged and brainwashed to believe that’s the best world out there for them. Then find out that the management has never stopped winning, expanding and perfecting their business model, up to today’s Great Reset.

This report is a video presentation

good stuff that i had to leave out the video documentary:

The Anti-Defamation League in the US is supportive of Prescott Bush and the Bush family. In a statement last year they said that “rumours about the alleged Nazi ‘ties’ of the late Prescott Bush … have circulated widely through the internet in recent years. These charges are untenable and politically motivated … Prescott Bush was neither a Nazi nor a Nazi sympathiser.”
However, one of the country’s oldest Jewish publications, the Jewish Advocate, has aired the controversy in detail.

THE GUARDIAN

Rockefellers brought the Nazi doctors and researchers to the US

SOURCE

ANSCO

Founded in Binghamton, New York, in 1901, Ansco was a manufacturer of photographic products and film. Ansco was originally founded through the merger of E. Anthony & Company and Scovill Manufacturing. In 1928, Ansco merged with Agfa to form Agfa-Ansco. The new corporation was a division of General Aniline and Film (GAF) Corporation, which was controlled by the German chemical cartel IG Farben. After Germany declared war on the United States in 1941, the United States Government seized the assets of GAF, including Agfa-Ansco. In 1943, the company removed “Agfa” from its name, once again becoming Ansco. The United States Justice Department oversaw Ansco’s operation until 1965, when government-held stock in GAF was sold to the public. In 1977, GAF eliminated its line of consumer photography products, including those manufactured by Ansco at the Binghamton facility. GAF also sold the Ansco trademark to Haking Enterprises. GAF continued to manufacture film at the Binghamton plant for industrial and medical use until 1981, when it sold the plant to Anitec Image Corporation. Over the next two decades, the former Ansco facility was sold several times, and in 2000, it was demolished.

Prior to the late 1970s, dozens of asbestos-containing materials were utilized in the construction and maintenance of buildings at Ansco’s Binghamton facility, including fireproof insulation, pipe covering and insulating cement. Inhaling dust from the application and removal of asbestos-containing materials placed workers at risk for developing an asbestos-related disease, such as mesothelioma or lung cancer.

Fireproof insulation was applied to structural steel during the construction of buildings at Ansco. Fireproofing materials were manufactured as a dry mixture of asbestos, linen and cement, packaged in fifty-pound paper bags. The dry mixture was mixed with water and sprayed onto the structural steel using a hose. Pouring, mixing and spraying fireproof insulation created clouds of asbestos-containing dust. After the fireproofing material was applied, it was typical for tradesmen, such as electricians or pipefitters, to scrape the fireproofing material from structural steel in order to install pipes and conduits. When the fireproof insulation was disturbed, asbestos fibers and dust became airborne.

Workers applied asbestos-containing pipe covering to pipes at the Binghamton Ansco facility. Pipe covering was applied to numerous piping systems in order to maintain stable internal temperatures and to protect pipes from damage. When pipe covering was applied, asbestos fibers were emitted. Insulating cement was also applied to pumps, valves and other equipment. It was manufactured as a powder and mixed with water to prepare it for application. Mixing insulating cement caused asbestos-containing dust to become airborne.

source:

What’s Bayer been up to lately?
We find out from their website:

The Bio Revolution is redefining innovation in the life sciences. How this might be a game changer.

The life sciences have made great advances in the past years. Biology, life sciences and the megatrend of digitization are growing closer together, enabling new inventions that impact our daily lives in a scope that we speak of a Bio Revolution. This revolution is reinforced by rapid increases in computing power and the emergence of new capabilities in AI, automation, and data analytics. These trends are further accelerating the pace of innovation and the potential for higher R&D productivity in the life sciences.

All this has led to new ways to understand and explore biology. The range of life forms on earth is incredibly complex and diverse. However, the methods to analyze them can be remarkably similar. Technologies and methods are transcending disciplinary boundaries even faster.

The implications across the life sciences can be enormous:

For human health, for example, a deeper understanding of the relationship between genetics and disease has led to the emergence of precision medicine, which can potentially be more effective than the one-size-fits-all therapies of the past. In the future, new technologies could help the healthcare industry not only treat, but cure or even prevent diseases. New gene and cell therapies, for example, aim to cure genetic diseases, potentially enabling sustainable organ replacement or reversing autoimmune diseases.

The Bio Revolution has the potential to help address some of the most critical global challenges, from climate change to pandemics, chronic diseases, and worldwide food security. Experts estimate that a significant portion of the economic impact of biological applications will be in health care, agriculture, and consumer products.3 Already today, the Bio Revolution with its convergence of science and technology has created an explosion of research projects in science and business. Each year, the amount of Intellectual Property related to the Bio Revolution is increasing.4 This can be seen, for example, by the number of patents in CrispR or plant biotech. In short: the revolution is gaining momentum and holds a great promise for health and food alike.

Total number of CRISPR patent applications worldwide per year from 1984 to 2018.

Quote symbolFueled by digitalization, growing connectivity, and falling costs, important advances in biotechnology are intertwined with more systemic shift in how bio-innovation is undertaken and who is involved. Microbiome technologies, advanced genomics, gene editing and synthetic biology are among key enabling technologies that have the potential to change the face of bio-innovation. This broader redefinition of bio-innovation creates new prospects to help address important nutrition, environmental and development needs.

World Economic Forum, Bio-Innovation Dialogue Initiative

.At the Forefront of the Bio Revolution

As a leading life science company, Bayer is aligned with the long-term market trends in health and nutrition and offers innovative and sustainable solutions to tackle some of the key challenges for humanity. Bayer brings to the table an extensive knowledge of human and plant science, supported by its expertise in regulatory processes and an impressive global footprint to ultimately bring innovations from labs to market. https://www.youtube-nocookie.com/embed/EYE1gya7XiM?autoplay=1&start=0&rel=0

The Bio Revolution marks the beginning of a new era: Innovations enabled by the convergence of biology and technology have the potential to significantly improve our lives, our nutrition, and our health.

Did you know that Bayer is at the forefront of the wave of innovation coming from the Bio Revolution?

The Bio Revolution is expected to transform healthcare and agriculture over the next decades – but the revolution is already happening now. With its newly established cell and gene therapy platform in Pharmaceuticals and innovative gene-editing tools such as CRISPR, Bayer operates at the core of the Bio Revolution and has tremendous opportunities to improve health and nutrition.

In Pharma, Bayer’s new Cell & Gene Therapy (CGT) platform steers our strategy in the area and orchestrates our activities along the value chain providing an innovation ecosystem for the companies – including BlueRock Therapeutics and Asklepios BioPharmaceutical (AskBio), which are fully owned by Bayer but operate autonomously. These therapies hold the potential to significantly impact patients’ lives by moving from treating symptoms to potentially curative approaches.

Bayer’s development portfolio of cell and gene therapies already comprises eight advanced assets in different stages of clinical development. These are applicable in multiple therapeutic areas with high unmet need, such as neurodegenerative, neuromuscular and cardiovascular indications, with programs in Pompe disease, Parkinson’s disease, hemophilia A, and congestive heart failure. With over 15 preclinical assets in the cell and gene therapy field, the pipeline is expected to grow steadily year by year.

Yet Bayer is not only using biotechnology to advance health – the promise for agriculture is just as inspiring. In the Crop Science Division, for example, tools like CRISPR can make changes to plant DNA with more precision than ever before and make plants more weather- or disease-resistant, enabling farmers to grow more or better-quality products under changing conditions.

Advancing genetic solutions for a sustainable future (1)PreviousNext

Did you know that Leaps by Bayer invests into potentially disruptive technologies to tackle some of the largest, unsolved challenges in the life sciences?

With Leaps by Bayer – our impact investment approach utilizing venture capital – we are constantly scanning for additional potential breakthroughs that hold promise to either cure or treat people from diseases or help feed a growing population with less impact on the environment.

$1 Billion

Since 2015, Leaps by Bayer has invested over $1 billion in ventures that tackle fundamental breakthroughs and shift core paradigms in our industries.

Leaps by Bayer has an investment focus on potentially disruptive solutions in the fields of healthcare and agriculture. The Leaps investment approach is remarkable: It aims to invest into or build up new innovative companies. Bayer supports those companies by enabling the exchange of proprietary assets, which can include sharing own patents or providing access to the Bayer network’s technical capabilities and 150 years of expertise. The companies remain autonomous with respect to decision making, while Leaps facilitates and supports them in a so-called active incubation process. Experienced team members actively engage in the young companies’ development by providing resources and helping them to steer the initial strategic direction. Today, the investment portfolio includes more than 35 companies advancing potential breakthrough technologies.

Quote symbolLeaps is our way of thinking big.

Werner Baumann, CEO of Bayer AG

Many Leaps ventures have made significant progress towards unlocking the potential of new technology platforms with a promising and transformative potential. BlueRock Therapeutics, for example, started as a Leaps investment and is now an integral part of Bayer’s CGT platform and just received clearance to proceed with a phase I trial in Parkinson’s disease.

Other companies, like the biopharmaceutical player Triumvira, are specialized on next generation immuno-oncology treatments. Triumvira focuses on novel T-cell therapies that aim to be safer and more efficacious than current cell therapy cancer treatments. Treating, curing and preventing cancer is one of the focus areas of Leaps by Bayer, since this group of diseases still represents one of today’s biggest health challenges with limited curative or preventative therapies available.

Quote symbolWe face a huge disease burden, and the way we produce food isn’t sustainable for the planet. I believe the Bio Revolution can help us overcome these issues.

Jürgen Eckhardt, Head of Leaps by Bayer

Leaps is also investing in the development of sustainable biotechnological solutions in the field of agriculture. One of the ventures in this field is Joyn Bio, a company that aims to significantly reduce the environmental impact of synthetic nitrogen fertilizers through a technology that fixes nitrogen into the soil. Nitrogen is one of the most important nutrients essential for every plant to grow, however, its use and production as a fertilizer is estimated to contribute 3-5% to all global greenhouse gas emissions. Joyn Bio is working on an engineered microbe that enables cereal crops like corn, wheat, and rice to convert nitrogen from the air into a form they can use to grow. This technology may have the potential to help farmers use nitrogen in new ways, and as a result, reduce agriculture’s environmental footprint.

The Leaps by Bayer investment portfolio includes more than 35 companies.

At least that’s what Bayer says. All I know is that they’re still running the show.

Ex-Standard Oil

HERE WE GO AGAIN:

ALSO SEE: HITLER’S BANKERS WHO ONCE HID DENTAL GOLD FROM AUSCHWITZ ARE TODAY’S “CENTRAL BANK OF CENTRAL BANKS”

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

We gave up on our profit shares from masks, if you want to help us, please use the donation button!
We think frequent mask use, even short term use can be bad for you, but if you have no way around them, at least send a message of consciousness.
Get it here!

One of world’s most celebrated scientists (by the establishment) suggested that genetic engineering is likely to create a new species of virus or superhuman creature that could destroy the rest of humanity.

Video by Bright Side


Hawking left a collection of articles and essays on what he called “the big questions”. In Brief Answers to the Big Questions he suggests that wealthy people will soon be able to choose to edit their own and their children’s DNA to create superhumans with enhanced memory, disease resistance, intelligence and longevity. – The Times

Speaking to the Radio Times ahead of the BBC Reith Lecture in 2016, Hawking said most of the threats humans now face come from advances in science and technology, such as nuclear weapons and genetically engineered viruses.
“We are not going to stop making progress, or reverse it, so we must recognise the dangers and control them,” he added.
Speaking through his speech synthesizer at the Ri, he answered a question on whether the electronic voice had shaped his personality, perhaps allowing the introvert to become an extrovert. Replying that he had never been called an introvert before, Hawking added: “Just because I spend a lot of time thinking doesn’t mean I don’t like parties and getting into trouble.” – The Guardian


The Daily Galaxy has chosen Stephen Hawking’s contention that the human species has entered a new stage of evolution as the top story of 2009.  It was included in his Life in the Universe lecture, along with many other thought provoking observations about the human condition. 


A living being usually has two elements: a set of instructions that tell the system how to sustain and reproduce itself, and a mechanism to carry out the instructions. In biology, these two parts are called genes and metabolism. But it is worth emphasising that there need be nothing biological about them. For example, a computer virus is a program that will make copies of itself in the memory of a computer, and will transfer itself to other computers. Thus it fits the definition of a living system, that I have given. Like a biological virus, it is a rather degenerate form, because it contains only instructions or genes, and doesn’t have any metabolism of its own. Instead, it reprograms the metabolism of the host computer, or cell. Some people have questioned whether viruses should count as life, because they are parasites, and can not exist independently of their hosts. But then most forms of life, ourselves included, are parasites, in that they feed off and depend for their survival on other forms of life. I think computer viruses should count as life. Maybe it says something about human nature, that the only form of life we have created so far is purely destructive. Talk about creating life in our own image. I shall return to electronic forms of life later on. 

We are more than just our genes. We may be no stronger, or inherently more intelligent, than our cave man ancestors. But what distinguishes us from them, is the knowledge that we have accumulated over the last ten thousand years, and particularly, over the last three hundred. I think it is legitimate to take a broader view, and include externally transmitted information, as well as DNA, in the evolution of the human race. 
The time scale for evolution, in the external transmission period, is the time scale for accumulation of information. This used to be hundreds, or even thousands, of years. But now this time scale has shrunk to about 50 years, or less. On the other hand, the brains with which we process this information have evolved only on the Darwinian time scale, of hundreds of thousands of years. This is beginning to cause problems. In the 18th century, there was said to be a man who had read every book written. But nowadays, if you read one book a day, it would take you about 15,000 years to read through the books in a national Library. By which time, many more books would have been written. 
This has meant that no one person can be the master of more than a small corner of human knowledge. People have to specialise, in narrower and narrower fields. This is likely to be a major limitation in the future. We certainly cannot continue, for long, with the exponential rate of growth of knowledge that we have had in the last three hundred years. An even greater limitation and danger for future generations, is that we still have the instincts, and in particular, the aggressive impulses, that we had in cave man days. Aggression, in the form of subjugating or killing other men, and taking their women and food, has had definite survival advantage, up to the present time. But now it could destroy the entire human race, and much of the rest of life on Earth. A nuclear war is still the most immediate danger, but there are others, such as the release of a genetically engineered virus. Or the green house effect becoming unstable.

There is no time, to wait for Darwinian evolution, to make us more intelligent, and better natured. But we are now entering a new phase, of what might be called, self designed evolution, in which we will be able to change and improve our DNA. There is a project now on, to map the entire sequence of human DNA. It will cost a few billion dollars, but that is chicken feed, for a project of this importance. Once we have read the book of life, we will start writing in corrections. At first, these changes will be confined to the repair of genetic defects, like cystic fibrosis, and muscular dystrophy. These are controlled by single genes, and so are fairly easy to identify, and correct. Other qualities, such as intelligence, are probably controlled by a large number of genes. It will be much more difficult to find them, and work out the relations between them. Nevertheless, I am sure that during the next century, people will discover how to modify both intelligence, and instincts like aggression.

Laws will be passed against genetic engineering with humans. But some people won’t be able to resist the temptation, to improve human characteristics, such as size of memory, resistance to disease, and length of life. Once such super humans appear, there are going to be major political problems, with the unimproved humans, who won’t be able to compete. Presumably, they will die out, or become unimportant. Instead, there will be a race of self-designing beings, who are improving themselves at an ever-increasing rate.

If this race manages to redesign itself, to reduce or eliminate the risk of self-destruction, it will probably spread out, and colonise other planets and stars. However, long distance space travel, will be difficult for chemically based life forms, like DNA. The natural lifetime for such beings is short, compared to the travel time.

It might be possible to use genetic engineering, to make DNA based life survive indefinitely, or at least for a hundred thousand years. But an easier way, which is almost within our capabilities already, would be to send machines. These could be designed to last long enough for interstellar travel. When they arrived at a new star, they could land on a suitable planet, and mine material to produce more machines, which could be sent on to yet more stars. These machines would be a new form of life, based on mechanical and electronic components, rather than macromolecules. They could eventually replace DNA based life, just as DNA may have replaced an earlier form of life.

Stephen Hawking – Life in the Universe

DNA and understandingBBC 2009

Professor Hawking, of the Department of Applied Mathematics and Theoretical Physics at Cambridge, gave a typically wide-ranging talk.

The professor said he did not advocate the genetic redesign of human beings, but saw it as inevitable as scientists gained a more complete understanding of DNA.

“Many people will say that genetic engineering on humans should be banned, but I rather doubt if they will be able to prevent it,” he said.

“Genetic engineering on plants and animals will be allowed for economic reasons and someone is bound to try it on humans.”

He said that it was unlikely to occur in the next 100 years, but GM humans would arrive sometime in the next millennium and they would bear little resemblance to the people of today.

Professor Hawking added that the only way he could see such a situation being prevented was in the event of a “totalitarian world order”.

Stephen Hawking explains Dara O’Brian why people can’t travel in space without genetic engineering

Stephen Hawking feared gene-edited superhumans would kill us all

By Nick Whigham

October 15, 2018 | 1:09pm | New York Post

The late Stephen Hawking believed advances in genetic science would lead to a future generation of superhumans who could ultimately destroy the rest of humanity.

In newly published writings, Hawking suggested an elite class of physically and intellectually powerful humans could arise from rich people choosing to edit their DNA and manipulating their children’s genetic makeup.

“I am sure that during this century, people will discover how to modify both intelligence and instincts such as aggression,” he wrote.

“Laws will probably be passed against genetic engineering with humans. But some people won’t be able to resist the temptation to improve human characteristics, such as memory, resistance to disease and length of life.”

The renowned theoretical physicist, who died in March, made the grim prediction in a collection of essays and articles recently published by the UK’s Sunday Times, prior to the release of a book containing a collection of writings by Hawking.

Those without the means to genetically modify themselves will become relegated to a sub-class of “unimproved humans,” he suggests in “Brief Answers To The Big Questions” due out on Tuesday. The wealthy who have power and access could tweak their genome to boost strength, memory and disease resistance.

Stephen Hawking

This two-tier system of humans, Hawking predicted, could have grave social consequences.

“Once such superhumans appear, there will be significant political problems with unimproved humans, who won’t be able to compete,” he wrote. “Presumably, they will die out, or become unimportant. Instead, there will be a race of self-designing beings who are improving at an ever-increasing rate.”

“If the human race manages to redesign itself, it will probably spread out and colonize other planets and stars.”

While the rise of superhumans won’t happen in our lifetime, new gene-editing technology has already led to concerns about the potential of designer babies.

Most notably, CRISPR-Cas 9 is a recently emerged technology that can be thought of as acting like a tiny pair of molecular scissors that can cut and alter nucleotides that make up DNA, enabling scientists to find and modify, or replace, genetic defects. – NY Post

LATER EPILOGUE

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Sometimes my memes are 3D. And you can own them. Or send them to someone.
You can even eat some of them.
CLICK HERE

With one exception, everything YouTube banned from us was good and meaningful information that’s never been debunked, or legit skepticism and inquiry. This interview should be no exception.
Besides the shocking “coincidences” with current events.

They deleted it before I even had the chance to edit the title 😀

The full text of my appeal to YouTube’s ban:

We all know you have no competence, capability, grounds or rights to do what you are claiming to do, and, in fact, you’re deleting stuff because it exposes your own business. But an YouTube ban brings me more traffic than I lose on your crappy narrative-enforcement machine, so keep up the great work! 😉

Also available on our Odysee channel

January 2014 interview with Anthony Patch, founder of Entangled Magazine an insightful and revelatory digital publication focused on current advances and pronouncements in: Quantum Computing, Artificial Intelligence, Cryptocurrencies/Blockchain, Quantum Mechanics, DNA/RNA Modification.

His YouTube channel has also been deleted, but he’s active on Bitchute.

I can’t vouch for some of the things he (or anyone) is saying on his channel, but smart people have a lot to learn from what he puts out.
Other than that, see our motto in the website header 😉

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Now THESE are words I never imagined I would ever write.
And these are the times…

So I am here to praise rapper Pitbull.
Not only for wokeness and having the balls to drop truth bombs, not only for being informed…

But mainly because he struck a major chord, with his plead for freedom.
You see, I am too born and raised in the communist gulag, my Romania and his Cuba were very much alike back then, 30+ years ago…
So after seeing this, I REALLY REALLY WANT TO GIVE A HUG TO THIS MAN, you know, make it physical.
I also feel bad, I lumped him with the Cardi B’s of this world, and that’s his fault for making money with all these sell outs. But then again, if he keeps dropping truth from that height, it’s all better than good.
So watch this and please please spread it around, it has the potential to drive more awareness in the masses! Let’s end this shit!

PS: The part where he says Fidel Castro must be dead jealous on Klaus Schwab… 💥💥💥

Watch the whole show and tell them Silview sent you over, for the woke part (it’s over 2h long) 😉

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them