Monday, May 19, 2014
Sunday, April 13, 2014
JIHAD : including how to induce paranoia (4.5 Hz), depression (6.66 Hz), manic rage (11.3 Hz) (...) security police, such as MI5 use the 450 MHz frequency (legally allowed to be used by the police)for behavioral control.
A vast catalog of mind control frequencies are in the MHz range, FM radio,TV and mobile phone frequencies, have been measured, which are used for control, killing or disabling victims: 147, 153, 197, 199, 447, 453, 456, 466, 853, 883, 884, 887…
LET'S PLAY
3 Tuning Control Dials to lock onto any Target (person, place or thing) remotely anywhere in the universe, once locked onto your target you can then send information (Thoughtforms) /Remote Influence, or receive information / Remote Viewing. http://www.higherpowertech.com/
A vast catalog of mind control frequencies are in the MHz range, FM radio,TV and mobile phone frequencies, have been measured, which are used for control, killing or disabling victims: 147, 153, 197, 199, 447, 453, 456, 466, 853, 883, 884, 887…
LET'S PLAY
3 Tuning Control Dials to lock onto any Target (person, place or thing) remotely anywhere in the universe, once locked onto your target you can then send information (Thoughtforms) /Remote Influence, or receive information / Remote Viewing. http://www.higherpowertech.com/
Saturday, April 12, 2014
Brain-Wave Machine
Brain-Wave Machine (And God said, Let there be light...)
Commercial brain-wave machines cost hundreds of dollars, but you can build your own using only a few dollars worth of components. In this document I will walk you through hardware construction and software control of an easy to build brain-wave machine. Disclaimer: I am not an electronics expert or a biofeedback specialist. If you fry your hardware (or your wetware) don't come whining (or drooling) to me. I assume no responsibility for what you do with this information. (Always yield to the hands-on imperative.)
I'm using 8 LED's, one per parallel port data out line. This provides an easy way to control each individual LED allowing for some variations in pattern and intensity. Each lense on the goggles will hold four LED's in a diamond pattern. The LED's are powered by the parallel port and controlled via software. Basic electronics experience is recommended but not necessary to construct this brain-wave machine. Parts List 8 LED's (choose green, yellow, or red LED's) DB25 pin male parallel port connector (or butcher a printer cable, 25 conductor) Goggles (safety glasses or similar eyewear) Wire Note: Radio Shack charges about $20 for 8 LED's. I got 20 LED's from a real electronics store for $3. Circuit Diagram Construction Browse the Brain-Wave Machine Image Gallery for pictures of readers goggles as well as modifications and variations. (Code is the essence of everything.)
BASIC The PC parallel port has eight data lines out. These data lines can be turned on and off by sending a byte to the port where each bit in the byte represents the on or off state of one of the data lines out. In BASIC you do this with the OUT function. The OUT function accepts two parameters, port address and a byte in decimal format. The most common addresses for LPT ports in hex are 378h, 278h, and 3BCh. LPT1 is almost always 378h, or 888 in decimal. The address parameter can be in hex (i.e. OUT &H378, #) or decimal format (i.e. OUT 888, #). Now let's take a look at bit patterns...
FOR i=1 to 50
OUT 888, 255
FOR x=1 to 500
NEXT x
OUT 888,0
FOR x=1 to 500
NEXT x
NEXT i
Obviously we need something better for timing than a FOR/NEXT loop. Unfortunately QBasic doesn't offer any timing functions with millisecond accuracy. Note: hz and cycles/second both refer to the flashrate of the LED's, so 15 hz = 15 flashes/second. I've written a small sample application which demonstrates one method of dealing with the timing issue in QBasic (using the SOUND function of all things). The program also has timed sessions, selectable frequencies, and three different flash patterns. Feel free to experiment with it. Sample QBasic App: BWM.BAS. Brainstar 1: Smoother interface and more features. Edit, save, and load patterns. QBasic source as well as a packaged run-time version are included. Contributed by Fractal (HardCore Software), May 6, 2000. Brainstar 2: Now with audio support, graphical session editing, and more. Contributed by Fractal (HardCore Software), October 4, 2000. Note 1: QBasic can be found on your Windows CD under OTHER/OLDMSDOS or search for olddos.exe on microsoft.com. Note 2: These programs will not work under NT unless a driver such as Direct I/O is utilized. C / C++
(This is your brain on Theta.)
You can use the brain-wave goggles with or without audio. However, the effects of the brain-wave machine are more powerful when used in conjunction with suitable audio. Many brain-wave stimulation and subliminal CD's and cassettes can be purchased from new-age bookstores. I highly recommend the "Brainwave Suite" 4 disc box-set by Dr. Jeffrey Thompson. Doctor Thompson has also produced several other brainwave CD's. Some Suggested Uses
www.hackcanada.com |
Thursday, April 3, 2014
Mars One To Build Simulated Colony For One-Way Astronauts

Mars colony
Mars One
In an email statement this morning, Mars One also named Kristian von Bengston—co-founder of Copenhagen Suborbitals, a private effort to build and launch a crewed suborbital rocket—as leader of the new effort to establish multiple training outposts at yet-to-be-determined locations. For now Von Bengston is seeking out construction companies and courting financial sponsors. The first simulated colonies won't contain actual life-support systems, at least to begin with, but they will be retrofitted with the technology later on, according to the statement.
More than 200,000 people applied for the one-way mission. Late last year, Mars One narrowed the selection pool to 1,058. Their ultimate goal: select 24 to 40 candidates who will travel to Mars in groups of four (two men and two women, ideally from four different continents, says CEO Bas Lansdorp). Mars One wants to send the first group in 2025, with the subsequent crews launching one at a time, every two years thereafter. The organization intends to televise the final rounds of the search.
Spaceflight contractors Lockheed Martin and Surrey Satellite Technology Ltd. are already working with Mars One to develop a robotic lander and a data-link satellite for an unmanned, exploratory mission to Mars in 2018. Should this initial mission get off the ground, it would test several technologies required to support human life on another world.
Last August, Popular Science spoke with one of the applicants, video game designer Katrina Wolfe, who has since made it to round two of the selection process.
High-Tech Thieves and the Gadgets They Use
Curious about the latest in gadgets and gizmos thieves are using these day?
As our world rushes into the futuristic realm of technology and the geniuses of our time continue to think up revolutionary software, gadgets, gizmos, as well as other high-tech tools, thieves become ever more skilled in using them.
There are many products that I will bring to your attention today in an effort to look inside the tool box of high-tech thieves and what gadgets they use to victimize the unsuspecting public. I was planning on only writing on one or two of the ‘most used' items but there were so many to choose from that I decided to incorporate quite a few to broaden the spectrum of technologies being used today.
Manufacturers aren't fessing up to who made these dandy delights and buying these items can be hard to do if you don't know where to look. But nevertheless, I figured it was worth the heads up. Incidentally, BBC has an article about these thieves and the motivation behind their actions that I found very interesting in my research.
Thousands of homes have a biological alarm system called a dog. Thieves that target a home have to watch out for this natural anti-theft device, so they use a small video camera that can slide under a door or into a small hole in the wall to help them find any vicious critters that would like to greet them with all of their sharp pointy teeth. Counter Intelligence Technologies, Inc. manufactures fiber optic digital cameras that are highly affordable. But they are certainly not the only ones to make them. Many online retailers have them and one example of a good super flex micro camera is from Amazon.
Flexible Camera
Snake Camera
Okay, now on to another gadget that high-tech thieves use. Scanners that find specific radio frequencies are often used to gain access into a home via the garage door or car. As technology advances the alarms will need to be updated. If you are still using an old electronic garage door or an old car alarm system chances are the frequency can be duplicated. Hacker Central has devices like the RF (Radio Frequency) Detectors and Code Grabbers as well as providing lists of cars and garage doors/gates they open. Amazon has a well rated one here. The functions are pretty simple. The device itself locks on to the radio frequencies when the victim opens their garage door to leave or come home. By activating the code grabber it finds the exact frequency to open the door and duplicates it for future use. (Read more about Mobile Scanner and Radar laws in the U.S at afn.org.)
Code Scanner
Code Grabber
Credit Card Cloners and Skimmers
ATM Scammer
Endless reports across the globe are reporting on credit card cloning and skimming. Devices are designed to be placed in plain site, usually on ATM's or even gas pumps for those of us looking for a fast transaction in our hectic lives. The Age and Sun Herald in Australia are reporting small covert cameras that not only record the pin numbers being entered but also the numbers on the credit card as well and all data on the magnetic strip. This is the very recipe for cloning an unlimited credit account at someone else's expense.
Car Key Code Scanning Laptops
Laptop
Car thieves are going high-tech too, well at least those with expensive tastes are. David Beckham just had his vehicle stolen according to MSNBC by way of a laptop... that's right, a laptop. The computer, along with an antenna and of course special software was able to extract a code that was transmitted by a Radio Frequency (RFID) chip located in the key.
Magnetic Keyboards
Magnetic Keyboard (from Neowin.net)
While we are on the topic of cars I found another object of desire for thieves today... yep, you guessed it, gasoline. Because of the high price of petrol at the pumps, high-tech thieves are targeting new ways to get the juice for free. ABC news reports enlighten the public to the fact that magnetic keyboards are the culprit. The keyboard was basically used to ‘turn on' the pumps from a closed Citgo gas station in Rhode Island. They were able to get 134 gallons in that one trip that they loaded into empty metal drums.
Keystroke Catchers
Keystroke Catcher (from Spy-solutions.com)
Although "pharming" or "phishing" scams are still all the rage with dishonest thieves via the internet, specialists at truecredit.com (a branch of TransUnion) say that there is one more thing to watch out for... "Keystroke catchers". Small devices are affixed to the cable which goes from the keyboard to the computer itself and are as cheap as $100. The connector is what they call a "catcher" and it records whatever you type into your computer. They are usually slipped into public computer areas like libraries and internet cafés. The moral of this story kiddies, is to never pay bills or shop online in a public terminal where just anybody has access to the data you transmit. You can pick one of these up on Amazon here.
Well, what do you think of the latest gadgets being used criminals? Do you think these technologies should be allowed in the marketplace at all? Do you think this article will facilitate criminal behaviour by explaining how these technologies are being used? Should we not be writing about these types of security related devices?
As our world rushes into the futuristic realm of technology and the geniuses of our time continue to think up revolutionary software, gadgets, gizmos, as well as other high-tech tools, thieves become ever more skilled in using them.
There are many products that I will bring to your attention today in an effort to look inside the tool box of high-tech thieves and what gadgets they use to victimize the unsuspecting public. I was planning on only writing on one or two of the ‘most used' items but there were so many to choose from that I decided to incorporate quite a few to broaden the spectrum of technologies being used today.
Manufacturers aren't fessing up to who made these dandy delights and buying these items can be hard to do if you don't know where to look. But nevertheless, I figured it was worth the heads up. Incidentally, BBC has an article about these thieves and the motivation behind their actions that I found very interesting in my research.
Super Flexible Cameras
Thousands of homes have a biological alarm system called a dog. Thieves that target a home have to watch out for this natural anti-theft device, so they use a small video camera that can slide under a door or into a small hole in the wall to help them find any vicious critters that would like to greet them with all of their sharp pointy teeth. Counter Intelligence Technologies, Inc. manufactures fiber optic digital cameras that are highly affordable. But they are certainly not the only ones to make them. Many online retailers have them and one example of a good super flex micro camera is from Amazon.
Radio Frequency Code Grabbers
Okay, now on to another gadget that high-tech thieves use. Scanners that find specific radio frequencies are often used to gain access into a home via the garage door or car. As technology advances the alarms will need to be updated. If you are still using an old electronic garage door or an old car alarm system chances are the frequency can be duplicated. Hacker Central has devices like the RF (Radio Frequency) Detectors and Code Grabbers as well as providing lists of cars and garage doors/gates they open. Amazon has a well rated one here. The functions are pretty simple. The device itself locks on to the radio frequencies when the victim opens their garage door to leave or come home. By activating the code grabber it finds the exact frequency to open the door and duplicates it for future use. (Read more about Mobile Scanner and Radar laws in the U.S at afn.org.)
Credit Card Cloners and Skimmers
Endless reports across the globe are reporting on credit card cloning and skimming. Devices are designed to be placed in plain site, usually on ATM's or even gas pumps for those of us looking for a fast transaction in our hectic lives. The Age and Sun Herald in Australia are reporting small covert cameras that not only record the pin numbers being entered but also the numbers on the credit card as well and all data on the magnetic strip. This is the very recipe for cloning an unlimited credit account at someone else's expense.
Car Key Code Scanning Laptops
Car thieves are going high-tech too, well at least those with expensive tastes are. David Beckham just had his vehicle stolen according to MSNBC by way of a laptop... that's right, a laptop. The computer, along with an antenna and of course special software was able to extract a code that was transmitted by a Radio Frequency (RFID) chip located in the key.
Magnetic Keyboards
While we are on the topic of cars I found another object of desire for thieves today... yep, you guessed it, gasoline. Because of the high price of petrol at the pumps, high-tech thieves are targeting new ways to get the juice for free. ABC news reports enlighten the public to the fact that magnetic keyboards are the culprit. The keyboard was basically used to ‘turn on' the pumps from a closed Citgo gas station in Rhode Island. They were able to get 134 gallons in that one trip that they loaded into empty metal drums.
Keystroke Catchers
Although "pharming" or "phishing" scams are still all the rage with dishonest thieves via the internet, specialists at truecredit.com (a branch of TransUnion) say that there is one more thing to watch out for... "Keystroke catchers". Small devices are affixed to the cable which goes from the keyboard to the computer itself and are as cheap as $100. The connector is what they call a "catcher" and it records whatever you type into your computer. They are usually slipped into public computer areas like libraries and internet cafés. The moral of this story kiddies, is to never pay bills or shop online in a public terminal where just anybody has access to the data you transmit. You can pick one of these up on Amazon here.
Well, what do you think of the latest gadgets being used criminals? Do you think these technologies should be allowed in the marketplace at all? Do you think this article will facilitate criminal behaviour by explaining how these technologies are being used? Should we not be writing about these types of security related devices?
Manda Spring
Surveillance and Security Innovations
InventorSpot.com
- See more at: http://inventorspot.com/articles/hightech_thieves_and_gadgets_they_use_15452#sthash.0tY9hJ5A.dpufSurveillance and Security Innovations
InventorSpot.com
Handheld Scanner Can Copy Car Keys Just By Peeking At The Lock
Locksmiths and car thieves can both get excited over a new handheld device that electronically maps the inside of car locks and then provides the key code within seconds via USB cable connection to a computer. The key code, matched to the make of the car, allows key-cutting machines to churn out a replacement key. Popular Mechanics reports that the key replication only works for Ford vehicles so far -- news that may leave bemused expressions on the faces of Ford owners.
The Electronic Key Impressioner (EKI) comes with common vehicle keyway inserts, a USB cable, and lock mapping software. That software connects to a database full of updated key codes, which also allows the system to remotely "brick" devices that have fallen into the wrong hands. But car manufacturers may not accept that reassurance, even as the EKI creators hope to expand their device's ability to work with a wider range of cars. Unhappy automakers could render it useless by changing their lock technology completely.
Another caveat is
Either way
, look for this magical key replacement (or Grand Theft Auto) device to come your way late this year.
that the
system mainly works for old-fashioned keys, as opposed to newer car keys that contain transponders. But tools already exist for locksmiths or less savory characters to crack the transponder codes.
http://www.popsci.com/technology/article/2010-02/lock-diving-sensor-creates-replacement-car-keys-good-or-ill
The Electronic Key Impressioner (EKI) comes with common vehicle keyway inserts, a USB cable, and lock mapping software. That software connects to a database full of updated key codes, which also allows the system to remotely "brick" devices that have fallen into the wrong hands. But car manufacturers may not accept that reassurance, even as the EKI creators hope to expand their device's ability to work with a wider range of cars. Unhappy automakers could render it useless by changing their lock technology completely.
Another caveat is
Either way
, look for this magical key replacement (or Grand Theft Auto) device to come your way late this year.
that the

Key Replicator
Here, let me unlock your car for you
Alternative Product Solutions
http://www.popsci.com/technology/article/2010-02/lock-diving-sensor-creates-replacement-car-keys-good-or-ill
Wednesday, April 2, 2014
Tuesday, April 1, 2014
Subscribe to:
Posts (Atom)