Anonymous ID: 1c2494 May 6, 2021, 7:21 a.m. No.13596677   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6717 >>6762 >>6778 >>6858

Information Operations may employ a range of little known technical control systems.

 

USP # 6,052,336 (April 18, 2000), Apparatus and Method of Broadcasting Audible Sound Using Ultrasonic Sound as a Carrier

Abstract: An ultrasonic sound source broadcasts an ultrasonic signal which is amplitude and/or frequency modulated with an information input signal originating from an information input source. The modulated signal, which may be amplified, is then broadcast via a projector unit, whereupon an individual or group of individuals located in the broadcast region detect the audible sound.

 

USP # 3,951,134 (April 20, 1976), Apparatus & Method for Remotely Monitoring & Altering Brain Waves

Abstract: Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subjectโ€™s brain waves. The interference waveform โ€ฆ is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.

 

USP # 5,159,703 (Oct. 27, 1992), Silent Subliminal Presentation System

Abstract: A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain.

 

USP # 5,017,143 (May 21, 1991), Method and Apparatus for Producing Subliminal Images

Abstract: A method and apparatus to produce more effective visual subliminal communications. Graphic and/or text images, presented for durations of less than a video frame, at organized rhythmic intervals, the rhythmic intervals intended to affect user receptivity, moods or behavior.

 

USP # 6,052,336 (April 18, 2000), Apparatus and Method of Broadcasting Audible Sound Using Ultrasonic Sound as a Carrier

Abstract: An ultrasonic sound source broadcasts an ultrasonic signal which is amplitude and/or frequency modulated with an information input signal originating from an information input source. The modulated signal, which may be amplified, is then broadcast via a projector unit, whereupon an individual or group of individuals located in the broadcast region detect the audible sound.

 

USP # 5,539,705 (July 23, 1996), Ultrasonic Speech Translator and Communications System

Abstract: A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy

 

Subliminal embeds enhance perceptual experience of any image, intensifying autonomous responses such as EKG, EEG, GSR โ€“ heart rate, brain rhythms and galvanic skin response. Emotionalized, repressed information remains in memory for long periods, perhaps for a lifetime

 

What Key cites as one of the more important discoveries about subliminals was from Dixon: โ€œthe more subliminal, the lower the threshold and the greater effects on perception and behavior.โ€

Dixon, Subliminal Perception pp 283-84

 

Any effort to remediate IO damage should have the object of creating a robust, versatile consciousness able to alter and revise understanding of reality.

 

Our historical records have been falsified in was both trivial and gross. Programming which specifically addresses and corrects that record where evidence is available is desirable though every effort should be made to be clear where there is conjecture this must be stated.

Virtual reality โ€“ why we need it โ€“ opportunities and threats, canโ€™t have one without the other

VR and MR University and Virtual incubator etc

 

All these things are contingent on secure networking, since safe VR depends on secure perceptual pathways and networks are the perceptual pathways of social super organisms, we must have secure identity-based networking before we can safely use such technology.