arrow-up-circle
Izberite del besedila, ki ga želite pojasniti (največ 80 besed)

The Severe Control of Artificial Telepathy (part 1)

This article has been temporarily translated using an online translator. The original article is in Italian. If you would like to help us improve the translation in your language, please contact us by email: info@accademiadicoscienzadimensionale.it or via chat on ACD. Thank you.

 

Page 1 of 6

In the previous volume I explained to you what Artificial Telepathy is and how it works, posing the example of youtube. Artificial Telepathy can unite the thoughts of two people, but it can also conduct communication from technologies to minds of people. In other words, a computer can communicate telepathically with a person, and vice versa, through all the nanotechs embedded in the human brain that are meant to make our minds increasingly controllable by the government, completely depriving us of privacy (not even being able to think without being heard and watched from the inside) and rebuilding our neural networks through the same nanotechs. They can look through our eyes and listen through our ears if they want to. When I was a little girl, I often had memories of some men positioning a machine in front of me, which projected my thoughts and dreams through video footage onto a screen. For many years I thought they were simply memories of dreams; I hoped they were not memories of events that actually happened. In hindsight I realized later that those were not dreams, as that is exactly what they are doing today: projecting our thoughts and dreams onto a screen, recreating them through AI images. On the other hand, these are technologies that have been used for well over a century, but still seem strange in people's eyes today. So over the decades those technologies have definitely been updated. 

Yet everyone, by now, is noticing the "randomness" that is happening in their days, more and more repeated, so much so that it is becoming very annoying. I am referring to those randomnesses in which you say something verbally, perhaps while you are talking confidentially with your life partner, and shortly afterwards the advertisement of that product you mentioned, that city you would like to travel to, or video of that topic you just mentioned appears on your cell phone. It happens once, it happens twice, it happens every single day, of necessity it starts to bother you. We've gone to such an insane level of anti-privacy, and so quickly invasive, that we haven't even had time to complain about being spied on about what we used to write on our cell phones, that now we're being spied on about what we're thinking in our minds, that now talking about how we're being spied on on our cell phones seems almost the least of the problems and as if it's not so serious anymore. Instead it remains serious all right, only that the next levels to which they have quickly gone are so insane that they make it difficult for most people to understand how to react, or what to do to make them stop. Let's recap for a moment the levels that have been touched, albeit very quickly, from anti-privacy through technologies are to get to the projects they are pursuing today, by the government against us. 

First they went from spying on our Internet search histories. For example, if on your browser you searched for "bicycle on offer," looked at the various options, and then at some point closed all the pages, you being merely curious about the bicycle (but maybe not even wanting to buy it, it was just to browse the prices) here it was that the following days, whatever site you visited, you would find as a banner ad the one about the bicycle you had looked at earlier. And of course happens to this day. In the beginning these were unfamiliar technologies, so you didn't think that that advertisement was stalking you, but you thought instead that those sites had set up banner ads on bicycles! And that everything was just a fluke. Instead, those sites set up "mirror banners," that is, banners that even the sites in question don't know what those banners are, however (since they don't choose the ads, but the companies that own the banners). 

These mirror banners reflect what the individual user, upon entering that site, has previously searched for on other sites and therefore re-shows him his searches in an attempt to convince him to buy them. As in, "Did you forget you wanted the bicycle? We'll remind you, repeat it over and over again, so you'll be convinced to buy it!" and thus spend money and all. This is a very invasive sales method; it is like a Promoter who wants to sell you a coffee machine, and even though you don't want it, he chases you to every store in the mall you visit (even though they are not his stores) to try to convince you to buy the darn coffee machine. He is so invasive that even when you leave the mall, and stop at a coffee shop nearby, there he is, the Promoter enters the coffee shop and still tries to convince you to buy that coffee machine. This is what banner ads do: it is very intrusive advertising, because when you leave the shopping site, and you go to a recipe site, or an animal site, and then a whole other site, you will still find that banner ad trying to sell you that bicycle you were looking at so many days ago. It's overly intrusive advertising. Then the anti-privacy went up a notch. It used to "only" spy on your searches, your histories, yet you might have thought it was "unobtrusive" from the moment it replayed a thousand times the product you first searched for. So there is a tendency to justify the anti-privacy of invasive banner ads by claiming that we did the first search anyway, from our pc or cell phone, so "it's not that bad." The problem is not that the bicycle site replays to us the bicycle we've already looked at; the problem is that if you close the window of that bicycle site, and head to a whole other site, such as one about animals, or one about air travel, it will replay the bicycle again. 

What is happening concretely is that your computer is not your own, because what you type on your computer or his cell phone is not only being read by you, but "others" are also reading it. And who are these others??? And why do they have the right to read what we write on our private cell phone if, in theory, it is only ours, since we pay for it with our money and it costs so much too? So we buy a cell phone, we buy a sim in our name, we pay for phone top-ups every month or subscriptions to use phone calls or wi-fi connection, and despite all these expenses our cell phone is not really ours but can be spied on and monitored by anyone we want, at our expense? So we pay for a tool that is used by someone else to have total control over our business. Spying on our histories basically means spying on our thoughts, because every time you do a search on the web, for example about a bicycle, it means you are thinking that you might want to buy one; then whether you want to buy it now or for the future, whether you want to buy it for yourself or for your granddaughter, it doesn't matter, anyway basically it means you would probably want to buy one. So you are stating your thoughts directly on the web. If you do research on the internet about rental houses, it means that you are thinking about changing houses, now or in the future, but you are thinking about it, so you are exposing your thought directly on the web. If you do research on the Internet about how to lose weight, it means that you think you have gained weight and would need to lose weight; it doesn't matter then if you really are going to diet or if it's those activities that you say you want to do but then throw into oblivion... because in the meantime it means that you think you have gained weight and would need to diet, exposing your thoughts on the Web, where they can be read by someone else without your knowledge. That someone else knowing that you think you're out of shape (and maybe it's not even true, however you think it and that's what matters) might take advantage of those negative thoughts about yourself and artificially enhance them, just as he might artificially increase your physical disorder and make you gain even more weight to get you into a limbo that is difficult to get out of. 

In the meantime, he will offer you "magic" solutions such as slimming pills (which are full of substances that go to block sensory and psychicity, as well as full of synthetic nanotech) through banner ads that will appear to you until you are exhausted, but which you will naively think it is "a nice coincidence" that they appeared just when you were looking for a solution to lose weight. 

But what makes you think that the right solution is those slimming pills? The same people reading your thoughts (right or wrong) about the belief that you are gaining weight will artificially reinforce that obsession so that you believe you are much, much more overweight than you really are, and you feel compelled to a quick and forced solution such as precisely the slimming pills. Everyone knows that they do not work and that they get much worse results, however, you will think, who knows why, that they will work with you and that even though they cost a lot of money they are worth trying. These thoughts may not be yours but they have been imposed on you by those who want you to buy and feed synthetic "food" that contains nanotechnology inside and makes you even more suitable for artificial human-computer communication. And there you come full circle because all this would allow the government to get much more into your mind and spy on your thoughts and thus know more about what you want to do or buy, even before you write it down on the web. 

Having reached this point, spying on our private history was no longer enough; there was a need to raise the bar. It is good to clarify that today many of the roles of virtual spying are done by AI, but it is good to clarify that AI cannot do everything by itself but is constantly monitored by operators working for agencies precisely to check that people's data is being collected correctly. However, until a few years ago it was a job covered almost entirely by operators (the same ones, by the way, of call centers that call you a thousand times to collect data about you, asking you a thousand questions as they try to sell you something; meanwhile they collect info about you without you knowing it!), which is even more serious, so let's not underestimate it. Too many forget that call center operators like operators who sell or promote other businesses, like the millions of operators who work inside fb, or inside youtube, or inside google, are individuals who have a duty--by signed contract! - to keep the utmost confidentiality regarding their work, not being able to tell people about working inside fb or inside youtube (I am not referring to youtubers, which is another thing! But rather to those who work inside the administrative panel and manage the hidden functions of youtube!), precisely to prevent news from leaking out. However, you will well understand that all those who work on fb, or on youtube, known for their privacy violations and for reading private chats and selling private data to third parties (including, of course, the government they work for) are also very easy to spy on your personal profile in case they want to. If your neighbor or your ex-boyfriend or whoever you want today works inside on fb, he can - just by knowing your first and last name, or your nickname on social, or just your ip - trace your profile and not only access all your private information (which you think you have put "private" or "visible only to friends" you have chosen) but also access your private chats, and so on. All of this is for the government to be able to spy on you constantly, but meanwhile even a simple individual who is obsessed with you, or curious about you, or envious of you, such as your current boyfriend's ex-boyfriend or that person you've only seen once in your life but remembers your name, or who knows how to track you down (e.g., by looking at the friends of his friend's friends, thus finding your profile by recognizing you from the photos you post!) can access your profile and spy on you. 

In order to make you understand how much our "privacy" no longer exists, I will tell you an anecdote from my life that will allow you to clarify your ideas about the fact that anyone can really do whatever he wants with your data. 

Quite a few years ago, when I was still staying in an old house, for a while I found myself having connection problems with the old Internet provider with whom I had a contract. Keep in mind that I was staying in northern Italy even though it might apparently seem to have nothing to do with it. I kept having problems with my Internet connection, so I started calling the support operators to get the problem fixed, but they kept saying that there was no error, that everything was fine, that there was no problem with the connection. I repeated to them that I had connection problems, I certainly wasn't imagining it! But they kept, everyone I talked to, several people each time, claiming that in their computers it showed that there was no connection problem and therefore that I was wrong. But how does a person get it wrong or imagine that they have connection problems? Their solution was to connect me to the Internet and visit their website, but I had to explain to them-decerebrates-that I could not connect to their site since it would not connect me to the Internet! I used to ask them to at least check my modem, maybe by sending it for service they would find out that it was broken, or that there was something wrong with the antennas near my house (a time when I still didn't know that antenna problems after I practiced there... were good events; we are still talking about many years ago) and they all eventually replied that according to their computer the connection and the modem was fine (never checked live! They checked it remotely and according to them it was working fine..) and that I, in a nutshell, was imagining it. 

Eventually, after many, many phone calls, I gave up, and kept a non-functioning modem; so I turned it off and away, used the phone as a modem, even though the yearly subscription was already paid for and they didn't want to know about assisting me, returning the money spent, or fixing my modem. I had that modem at home, which did not work or at least did not allow me to connect to the Internet, so it was completely useless. One day, several months later, I don't even remember how much time passed, talking to a student I had practically just met, she revealed to me that she worked for that very company with which I had the internet connection contract. So, chatting, I told her the anecdote, just for the sake of talking, of course thinking that she would certainly not be able to do anything to change the situation, I told her about it just to make small talk. Whereupon she asked if I would like some help in re-establishing my Internet connection. Absurdly, thinking that by now I had tried a thousand times with a thousand different operators, I almost refused, telling her that it was no use anyway since no one had been able to solve my problem, so there was no need for her to try. Moreover, I didn't know what data I would have to provide to that person, whom I had just met anyway, to try to re-establish my Internet, and that maybe it could just be an excuse-that of helping me-to mind my own business. As bad as it is to say, so many people every day try to take advantage of me with the most absurd excuses, even pretending that they want to help me or want to do me good, so I must always be careful and not be naive. However, I was heartened to know that I did not have to provide her with practically any data, because she claimed that she could track my Internet connection (thus my home, my address, and the precise connection I was using) through only my name, which she already had. Of course I knew that anti-privacy existed even then, but it was interesting to have this umpteenth proof.

Before she did anything I tried again to access the Internet connection but of course again it was not going, even though I had paid the subscription for the whole year (which the operators did not want to compensate me for!), so of course it was not a problem of paying in the red, but it was the line that was not going. This student went back to her town in southern Italy and the next day went to work, precisely to the telephone and internet company for which she worked as an operator. She called me on the phone and asked me to turn on the modem since it appeared to her from her computer that I had disconnected it from us; of course it was true, not even the time to go to work that she had already connected to my address and could see from her computer the status of my internet connection, without even me giving her my home address or any other info. 

So under her directives I plugged the modem into the power, and she told me that it now indicated to her that the modem was on. She told me to wait a few minutes and my Internet connection would start working again. It only took a few minutes? Months and months of calling a thousand operators to "fix" my connection, and she was only going to take a few minutes? It was absurd and I almost couldn't believe it, by now a thousand people had tried! Or rather, the operators had told me they had tried, but I later understood that this was not true at all. Well, a few minutes later the connection went through and I was able to reuse, from that day on, every day the connection at a perfect speed, even better than the speed I was going at in the past! I asked her what she had done, and she simply replied that "someone" had voluntarily blocked my connection to internet, in order to prevent me from using it, and that she simply lifted that block and clicked on an upgrade to boost my speed, as the speed could be boosted or decreased just by clicking buttons. She did this all from her city, from southern Italy, while I was in the north, and theoretically she was not supposed to know where I lived or what I did, yet she could "spy" this information about me only by having a little info about me. 

That woman as well as my student explained to me that there are only a bunch of scams behind the internet upgrades, i.e., operators tell you that if you pay more they can upgrade your connection and make it better, but in reality it is the same operators who before calling you, for a few days lower the speed of your connection and thus reduce the speed for which you are already paying the subscription, and then a few days later they call you asking you to pay more to have an increased connection, but which is actually the exact same connection you had already paid for years! Someone blocked my internet connection out of spite or for other reasons, and she simply removed that block, and also removed the speed "slowers" that someone had put in my line, giving me back the connection speed that I had already been paying for for a long time. 

This anecdote lets you understand first of all that you don't need to give all your data to just anyone for them to do anything: it is so easy for operators to track down your data (which you gave or put out even many, many years before!) by going fishing for them even from other companies (for example, from the company with which you signed the contract for electricity and gas utilities, or with the telephone company, or with the name under which you registered your house, and so on and so forth), and from those data that you believe you did not give to the operator-but which he or she will easily find from other sources-he or they can without your knowledge do what they want. In fact, initially I did not know who had blocked my Internet connection and for how long (although I later went to psychically attack him so hard to remind him well that if he wanted to play spiteful on me, I could also become very spiteful, causing him to remember it for life.) or for what reason, but he had definitely done so by tracing my data without my realizing that I had given it, not to him, but to other companies from which he then drew my private info. 

As luck would have it, I later met that person who became my student and who offered to help me, discovering all that was behind that apparent failure of my Internet connection that instead concealed much more. She, too, a person I had just met, to whom I apparently gave no information about me other than my name that she already knew by introducing us, was instead able to trace my residence, then find out where I lived, what my home was, writing down my address (and of course catching us on the fly, perfectly) and choosing to solve a "technical" problem on my connection even though I was not her customer and she gained nothing from solving that problem. In other words, it was not a support worker whom I called to solve my problem, but it was an outside person who willingly chose to search the database for my private info and access my connection to solve my problem. This event that has now happened more than a decade ago opened my eyes so much and allowed me to realize that really anyone could access our info and, for example, have the technological objects inside our house broken, or fixed if they wanted to... but usually this is knowledge that is used more to harm us, than to help us. 

Thus, it is much more likely that an ex or envious person will log on to our network to spoil our technologies out of spite, and not the other way around. These "brilliant ideas" come more out of envy than altruism. In any case, I was very happy that my Internet connection was restored, and I was much more committed to keeping my personal information confidential. As well as what I teach all my students to do, and what I reiterate over and over again. One must not be naïve, and must understand instead that our data has immense value and can be constantly used against us even by those we least expect. There are occasions when it has become very difficult not to disclose your sensitive data, for example when you sign the contract with the utilities you are giving a lot of your data that then will not remain with the gas or electricity or water supply company alone, but will obviously be made public to all those who will know a minimum to research and get that info about you. Nonetheless, there are plenty of other situations where you really don't need to give your personal information, even though the operators, promoters, or whoever you have in front of you will push you to believe that you are being coerced. You don't! And when you can, it is critical that you always choose not to give out your sensitive information. Many people, quite rightly, name their bills all in the name of an individual of the household, so they avoid giving out the names and personal details of everyone in the house. As for example, many people use the same "loyalty card" from supermarkets or stores, making them all in the name of a single household member and then passing it on for use by multiple people when they need it. This, too, is a clever way to avoid giving all the private data of all family members. Again, many people put cell phone numbers in the name of one person in the household, even though all those sims will not belong to him or her but will be used by other family members. All these people obviously do well! All this would like to be stopped by the government (and it has been trying for a long time already!), and it would definitely succeed with the subcutaneous chip, to make sure that all these "passes" are stopped and that everyone can only use what is in his own name; which means that we will get to the point where a child will not be able to go shopping with his mother's money, but first there will have to be a money pass from the mother's chip to the child's chip, complete with a reason for it well explained in detail, and then allow the child to go shopping for his mother. 

This is just one example to understand where the government would like us to go, which we must obviously avoid. 

End page 6 of 6. If you enjoyed the article, please comment below describing your feelings while reading or practicing the proposed technique.

0 komentarji