It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
1ofthe9
GUT - don't be too hard on yourself man. We've all had those moments I think.
1ofthe9
Goddamn I need a cigarette.
The GUT
1ofthe9
GUT - don't be too hard on yourself man. We've all had those moments I think.
Thanks, brother, that is so kind. I'm really beating myself up.
John your thoughts on the militarization of the police forces and ad hock organizations tasked for crowd control inside the U.S. borders. Is this a normal evolution of cause and effect or have the inside circles of power that you might be aware of deemed it is essential for the survival of the republic or their own power structures? There have been many articles about all the alphabet agencies being armed and around here one report of the government buying over 1.7 billion rounds of hollow point ammo got many people's attention.. Comment if you care to or have an opinion?
Like you I have the benefit of a long hindsight which to my memory never included a Swat team plus backup for something that before was taken care of by a Mayberry Sherriff…?
On my web site you'll find an entire monograph on this topic. I'll be writing more about it shortly - probably in my HP blog.
My question is, if you refer to the paper you co-authored with your son: Why, when I tried to access that paper from your website last year, while compiling the thread linked below, did I get a pop-up that basically stated something along the lines of "By accessing this file you give the DOD permission to permanently access and scan your hard-drive…" ??
The pop up froze my computer. Thusly, I'm hesitant to go to your site and attempt a download again…
I have not had that problem. There are both the monograph I wrote and a shorter piece co-authored with Mark. The monograph can also be accessed through the Joint Special Operations University web site and is available to the public.
When trying to access that document as per your reply at the Joint Special Operations University, I ran into a similar--though not exact--persistent pop-up screen that once again wants access to my computer. I've attached pics below. Imo, that's not exactly "public access" if I have to give consent to search.
I think the question that we want some kind of real response to regards the Constitutional questions raised by the blending of military tactics, training, and gear--both lethal and non-lethal--and state police forces. The whys and wherefores and just what kind of "forecasts" can justify the rhetoric.
Could you give us the title of both your monograph and that of the article co-authored with your son, Mark?
Thank You, Sir.
send me a private email from my web site and I'll try to get you the info. Not sure why there is a problem
1ofthe9
I checked with some friends who like to haunt these sites. The pop ups are a result of viewing the website from a non-DoDNet terminal. Could explain why Alexander wasn't familiar with it.
It is with GREAT PLEASURE and PRIDE that we announce the addition of Dr Christopher "Kit" Green to the AboveTopSecret.com Team.
Dr. Green is not only one of the most congenial, genuine and PLEASANT gentlemen I've ever spoken with he is without question one of the TOP Forensic Medicine, Radiology, and Psychiatry & Behavioral Neurosciences and fMRI geniuses alive on this planet.
RedCairo
Alright, I see now.
I feel like I woke up in a slightly alternate reality though. On the list of people who do not inspire free-of-control-agenda names, Green is... well he's up there. And now he's something at ATS? I thought they actually worked to keep the forum free of all that? I feel like I must be profoundly misunderstanding something.
Totally next topic: did you ever read John Lilly's autobiography? It seriously made me think our black ops is way, way ahead of us in hardware (hard wire!) for human influence compared to what we suspect. And that was decades ago, just imagine.
Back to control schemas: so isn't the primary "buying into" of all the various control schemas, that we just keep listening to, hanging on, to what the oh-so-obviously-playing-us personalities from former intell/agency have to say?
Then there is Jim, whose professional history in the subject goes back to his personal involvement in the Stargate project in the 1970’s and as a participant in the legendary “Working Group” meetings in the eighties. As one of the intel community’s most senior medical analysts, Jim frequently communicates with UFOlogists.
Chris Iverson believes that Tom and Jim clearly have differing agendas, noting, “Jim is the person I have had the most contact with over the last several months and he seems to be interested in the spreading of viral memes over the internet, particularly in relation to this subject.”…
“The whole subject,” Jim says in wonderfully measured speech, “is composed of three components: delusion, sociological groupthink, and a kernel of truth.” Jim then reminds that he is first and foremost a medical scientist. “My interest in this subject is much, much more professional than it is personal. That is, 90 to 95% of all persons who are engaged fully with this [UFO] subject are psychiatrically ill, and by that I mean that they are on medication or should be.”
Jim elaborates that “viral memes,”[see below] in which disturbed people seek validation in numbers on the web, is, or should be, a growing public health concern. That said, Jim nonetheless has a real interest in UFO’s, and seemingly with good reason.
Both Tom and Jim seem to share at least one rationale for their internet excursions: studying the frightening potential of “viral internet memes.”
Coined by evolutionary theorist Richard Dawkins in 1976 (The Selfish Gene), a meme is a unit of cultural information that evolves the way a gene propagates from one organism to another, and subject to all the analogous unintended mutations. In the view of many, computers and blogs could function as powerful meme “replicators.”
Richard Brodie, the creator of Microsoft Word, notes, “Most of these viruses of the mind are spread because they are intriguing or frightening or inspiring, and not necessarily because they're true. That's the problem.” It doesn’t take much intuition to envision an enemy creating memes that can be used to destabilize a society, or a freelance predator utilizing them to cozy up to potential victims. Caryn Anscomb writes online,
“The UFO community has been deeply penetrated by the manipulators of information, who couldn’t really give a fig whether there might be any valuable data pertaining to Aliens and contact hidden behind the deafening noise. That’s not their business; their business is information warfare.”
www.bibliotecapleyades.net...
RedCairo
Totally next topic: did you ever read John Lilly's autobiography? It seriously made me think our black ops is way, way ahead of us in hardware (hard wire!) for human influence compared to what we suspect. And that was decades ago, just imagine.
The GUT
We're in a box here, for example, on this very forum. Even in many senses a "closed loop". lakespirit (he's a real up & comer here, eh?!) gave not only an awesome example with explanatory power using Eidolon's model, but detailed how easy it would be to collate, track, compare, and extrapolate information in a forum environment. And even use that information to manipulate. It would seem a no-brainer for any scientist/sociologists, eh?
The Pseudo-Control System, by E23
DARPA is soliciting innovative research proposals in the areas of (1) quantitative analysis of narratives, (2) understanding the effects narratives have on human psychology and its affiliated neurobiology, and (3) modeling, simulating, and sensing-especially in stand-off modalities-these narrative influences. Proposers to this effort will be expected to revolutionize the study of narratives and narrative influence by advancing narrative analysis and neuroscience so as to create new narrative influence sensors, doubling status quo capacity to forecast narrative influence.
www.fbo.gov...
"Stories exert a powerful influence on human thoughts and behavior. They consolidate memory, shape emotions, cue heuristics and biases in judgment, influence in-group/out-group distinctions, and may affect the fundamental contents of personal identity.
It comes as no surprise that these influences make stories highly relevant to vexing security challenges such as radicalization, violent social mobilization, insurgency and terrorism, and conflict prevention and resolution. Therefore, understanding the role stories play in a security context is a matter of great import and some urgency," DARPA stated. "Ascertaining exactly what function stories enact, and by what mechanisms they do so, is a necessity if we are to effectively analyze the security phenomena shaped by stories. Doing this in a scientifically respectable manner requires a working theory of narratives, an understanding of what role narratives play in security contexts, and examination of how to best analyze stories-decomposing them and their psychological impact systematically."
1. To survey narrative theories. These empirically informed theories should tell us something about the nature of stories: what is a story? What are its moving parts? Is there a list of necessary and sufficient conditions it takes for a stimulus to be considered a story instead of something else? Does the structure and function of stories vary considerably across cultural contexts or is there a universal theory of story?
2. To better understand the role of narrative in security contexts. What role do stories play in influencing political violence and to what extent? What function do narratives serve in the process of political radicalization and how do they influence a person or group's choice of means (such as violence) to achieve political ends? How do stories influence bystanders' response to conflict? Is it possible to measure how attitudes salient to security issues are shaped by stories?
3. To survey the state of the art in narrative analysis and decomposition tools. How can we take stories and make them quantitatively analyzable in a rigorous, transparent and repeatable fashion? What analytic approaches or tools best establish a framework for the scientific study of the psychological and neurobiological impact of stories on people? Are particular approaches or tools better than others for understanding how stories propagate in a system so as to influence behavior?
www.networkworld.com...
The label “cognitive” in the title and elsewhere in this report is used in the broad sense. Unless otherwise noted, it refers to the cognitive sciences in general and comprises psychological and physiological processes underlying human information processing, emotion, motivation, social influence, and development. It includes contributions from all directly related disciplines, including the behavioral and social sciences, neurogenetics, proteomics, philosophy, mathematics, computer science, and linguistics.
The technology being applied to determine psychological state could even be derived from an incomplete model of brain function as long as it had sufficient predictive power to accomplish the desired goal. For instance, one would not need a complete model of brain function to construct a brain–computer interface that could improve the self-piloting capabilities of unmanned air vehicles. But the tolerance for error will be much less if a technology is used to determine whether an individual is lying about an act of treason, because the consequences of an error will be greater.
The committee believes that it is critical to fully understand the relationship between neurophysiological markers and actual mental states when the application is the detection of deception..
…Mind reading typically refers to the capacity (imparted by an external mechanism—that is, some form of technology) to determine precisely what an individual is thinking or intending, whether or not the individual is willing to communicate that state of mind. As discussed below, to “read” minds scientists must understand how minds really work to come up with a technology that is of real use, and there are several formidable barriers to…
Other questions raised by controlling the mind: How can we make people trust us more? What if we could help the brain to remove fear or pain? Is there a way to make the enemy obey our commands?
…However, the types of experiments being done may be more telling than the type of equipment needed. The same equipment might be needed for medical and for disruptive neuropsychopharmacological experiments. It could be asked, What types of experiments are being done?
How are the experiments being controlled and monitored, and why were they chosen? How would human experimentation be conducted outside accepted informed-consent limits?
www.nap.edu...
In developing the methodology, the committee considered the end user (analysts and predictors of the behaviors of individuals and groups), the data available to them, the desired output, and the unique aspects (if relevant) of neuroscience research. Intelligence analysts were available for consultation throughout the project in order to ensure that the methodology was realistically applied, given the limitations of the data sets.
An important issue for cognitive neuroscientists concerns efforts to determine whether a person is reporting a true experience or one that is false but believed. In the last decade, there have been innumerable research efforts designed to distinguish true from false memories.
Earlier work examining behavioral differences between true and false memories revealed that group differences were sometimes found (for example, more sensory details in true-memory reports) (Schooler et al., 1986). However, the statistical group differences did not enable reliable classification of any particular memory report as to its authenticity.
Some work with neuroimaging has attempted to locate differences in the brain that might reveal something about true and false memories. The goal of much of the work has been to demonstrate that true and false memories have different neural signatures...
The allure of such research has been so great that considerable effort is likely to be devoted in the future to the neurophysiology of false memory. Despite some progress, we are far from being able to use neuroimaging techniques to tell us about the veracity of particular memories…
…A notable exception can be found in the work of Okado and Stark (2005), who examined true and false memories in the context of a misinformation experiment and thus studied richer false memories. Misinformation studies show how readily memory can become skewed when people are fed misinformation…
Richard McNally and his collaborators (McNally, 2003) studied people who had very rich, although likely false, memories of alien abduction have been studied. One study explored whether people who believe they have been abducted exhibit heightened physiological reactivity (heart rate and skin conductance) that occurs commonly in patients who have posttraumatic stress disorder (PTSD) when they think about their traumas.
The “abductees” studied had experienced apparent sleep paralysis and hypnopompic hallucinations, which are vivid dreamlike hallucinations that occur as one is waking up, such as seeing figures hovering near their beds. Most had recovered memories with such techniques as guided imagery and hypnosis. Some of the recovered memories involved sexual intercourse with aliens or having sperm extracted for breeding purposes. Their physiological reactions were similar to those seen in PTSD patients who listen to audiotaped scripts of their traumas. Thus, expressed emotion is no guarantee that a memory is true.