04/13/2018
Are cell phone companies transmitting frequencies from towers to support mind control techniques purportedly emitted by cell phone towers?
In this episode, Edge of Wonder sits down with James Scott, an expert in cybersecurity who serves as the Senior Fellow and co-founder of the Institute for Critical Infrastructure Technology, a Senior Fellow at the Center for Cyber Influence Operations Studies, and the Center for Space Warfare Studies.
They discuss how much of our personal data can be systematically collected and extracted from the intricate web of information stored within our cell phones using coding and other forms of technology. Take into account the recent disclosures concerning Facebook (now META) and Twitter (X), which have highlighted the revelation that these companies, in addition to unlawfully tracking specific user data, have been implicated in the practice of censorship and silencing users over an extended period.
Are you familiar with the term “Cyborgification”? It refers to the technological extension of oneself designed to compensate for vulnerabilities in the human condition. What about the term “hot miking,” which pertains to a microphone being turned on, specifically one broadcasting a spoken remark intended to be private? Shouldn’t all our personal conversations be considered private unless conducted in a public space?
How have technology companies strategically manipulated their users and ultimately exploited them for their own agendas? Who is responsible for the potential weaponization of social media, and what is the ultimate end goal?
The strategic manipulation of users by technology companies and the potential exploitation for their own agendas have raised profound concerns in the digital landscape. Companies often employ sophisticated algorithms and data analytics to curate user experiences, aiming to maximize engagement and, consequently, their bottom line. This manipulation can take various forms, such as targeted advertising, content prioritization, and algorithmic decisions that may shape users’ perceptions and behaviors.
External actors, including political entities, interest groups, or malicious actors, may exploit social media platforms for various purposes, such as influencing public opinion, sowing discord, or even conducting disinformation campaigns. These actors often leverage the platforms’ algorithms and user engagement strategies to maximize the reach of their content.
Don’t miss this Edge of Wonder interview with James Scott, and perhaps consider leaving your cell phone in another room.
Cell Phone Virus Uses Frequencies for Mind Control, Cyber Warfare
Are cell phone companies transmitting frequencies from towers to support mind control techniques purportedly emitted by cell phone towers?
In this episode, Edge of Wonder sits down with James Scott, an expert in cybersecurity who serves as the Senior Fellow and co-founder of the Institute for Critical Infrastructure Technology, a Senior Fellow at the Center for Cyber Influence Operations Studies, and the Center for Space Warfare Studies.
They discuss how much of our personal data can be systematically collected and extracted from the intricate web of information stored within our cell phones using coding and other forms of technology. Take into account the recent disclosures concerning Facebook (now META) and Twitter (X), which have highlighted the revelation that these companies, in addition to unlawfully tracking specific user data, have been implicated in the practice of censorship and silencing users over an extended period.
Are you familiar with the term “Cyborgification”? It refers to the technological extension of oneself designed to compensate for vulnerabilities in the human condition. What about the term “hot miking,” which pertains to a microphone being turned on, specifically one broadcasting a spoken remark intended to be private? Shouldn’t all our personal conversations be considered private unless conducted in a public space?
How have technology companies strategically manipulated their users and ultimately exploited them for their own agendas? Who is responsible for the potential weaponization of social media, and what is the ultimate end goal?
The strategic manipulation of users by technology companies and the potential exploitation for their own agendas have raised profound concerns in the digital landscape. Companies often employ sophisticated algorithms and data analytics to curate user experiences, aiming to maximize engagement and, consequently, their bottom line. This manipulation can take various forms, such as targeted advertising, content prioritization, and algorithmic decisions that may shape users’ perceptions and behaviors.
External actors, including political entities, interest groups, or malicious actors, may exploit social media platforms for various purposes, such as influencing public opinion, sowing discord, or even conducting disinformation campaigns. These actors often leverage the platforms’ algorithms and user engagement strategies to maximize the reach of their content.
Don’t miss this Edge of Wonder interview with James Scott, and perhaps consider leaving your cell phone in another room.
More Episodes
2 Comments
To Comment, Please Login