Cyberwarfare and You…Up Close and Personal

Cyberwarfare and You…Up Close and Personal

“What man can do—man can undo.”

Larry Arnn, President Hillsdale College

What an engineer can encode, an engineer can decode. i.e. “hack”

In 1948, cybernetics was defined as “the scientific study of control and communication in the animal and the machine.”

The word “cybernetics” derives from the Greek word κυβερνητική (kyverni̱tikí̱, “government”), i.e. all that are pertinent to κυβερνώ (kyvernó̱), the latter meaning to “steer,” “navigate” or “govern.”

Contemporary cybernetics began as an interdisciplinary study connecting the fields of control systems, electrical network theory, mechanical engineering, logic modeling, evolutionary biology, neuroscience, anthropology and psychology.

The word cybernetics was first used in the context of “the study of self-governance” by Plato in The Alcibiades to signify the governance of people.

The word ‘cybernétique’ was also used in 1834 by the physicist André-Marie Ampère (1775–1836) to denote the sciences of government in his classification system of human knowledge.

Today cybernetics works to control systems in fields such as:

Biology, sociology, education, engineering, computer science, management, mathematics, art, earth sciences, and psychology along with basic cybernetics systems sciences; and its tentacles in just about every field imaginable.

This is metrics, the mongers and the analysts. i.e. The Borg.

Cyberwarfare has been defined as the use of computers and other devices to attack an enemy’s information systems, or to influence its citizen’s behaviors.

As “progressives” would demand, even the most familiar definitions are expanding. The definition of Cyberwarfare has been expanded as defense departments are now conducting research programs as to how emerging technologies such as social media and psychological techniques can be harnessed by governments to influence people’s beliefs.

Programs such as: Cognitive and Behavior Concepts of Cyber Activities, Novel techniques for Public Sentiment, Perception Elicitation and Understanding Online Avatars, include aims of understanding behavior of Internet users from different cultures, the influence of social media such as Twitter and Facebook and the psychological impact of online video usage such as YouTube.

An expert in the field of Cyberwarfare notes that,

“The current furor over inter-state cyberwar is probably not where the game’s at. What is far more likely is that

The States (countries) will seek to influence their own populations and others through so-called “cyber” methods, which basically means the Internet and the device du jour, currently smart phones and tablets.

With the advent of sophisticated data-processing capabilities (including big data), the big number-crunchers can detect, model and counter all manner of online activities just by detecting the behavioral patterns they see in the data and adjusting their tactics accordingly.”

Dr. Tim Stevens of Kings College London


Cyberwarfare of the future may be less about hacking electrical power grids and more about hacking minds by shaping the environment in which political debate takes place,” he added. 

The recent events in Ukraine are a prime example of how this “influence” works. Paid cyber propagandists flooded the social media inciting fears and swaying the elections toward communism in the Eastern locales.

Which precipitates the recognition of what happens when folks forsake the truth of Nature’s God, the realities of fallen human nature;

the dark side of governments comprised of folks possessing human nature, and bred on Darwinism.

We have flocks of confused, naïve, shepherdless sheep whose centralized “governments” are placing them more and more under the control of the Cyberneticists (societal systems planners, smarter planet-dumber people) and on the Internet.

The same internet/ ethernet that is an open book to any governmentally aligned program bureaucrat, globalist, researcher, vendor, technician, educrat, or hacker who so desires to hack, dice, slice, shape and sheer the sheep.

Why would any “government” put more of their citizens’ data on computer, Internet platforms, which provide huge attractions for hackers?

Inside hackers, outside hackers and all hackers in-between.

(What was the revised definition of Cyberwarfare?

Ah yes, to coerce, corrupt, conquer, conform, clone, and Control)

Why would a government demand that such vital information such as:

Health care records (Electronic Health Records)

Health Insurance filing, Medicare, Medicaid, Social Security Numbers

Education (Common Core/ College and Career Ready Standards, 21st Century Global Competencies, e-learning, i-pads, laptops, virtual classrooms, SAT, PSAT, ACT, Stanford 10 etc. Aligned Assessments…digital badges, Statewide Longitudinal Data Systems (SLDS) etc.)

Workforce Development data systems (Indiana Network of Knowledge, INK/ IWIS)

Banking, Finance, Commerce etc. be placed on huge open computer internet/ ethernet linked data systems?

Everyone should know, that once any information, any data has been entered on a computer, digital device, smart phone, i-pad, tablet, lap top, etc. it is now available to all who care to look. The device need not be “on” or knowingly on the internet; and more than just the user’s numerical data is being recorded.

No, this there is not some little old lady or some young buck sitting analyzing how many “likes” you placed on the toilet paper manufacturer’s Facebook site. (does anybody really do this? Good grief!)

This is done by cybernation, by computers, that automatically catalog how many times you “make that face” (avatars), say that phrase (there are many you should NOT say), visit that site, connect with that person, group, etc. on social media; how much time you spend where, how much money you spend on Amazon, what you buy at the grocery store, did you use your “rewards” card…blah, blah, blah.

Well it’s not so “blah” to a computer.

It provides treasures of “datafood” as to what your patterns are; what media/ public relations methods will work to shape you into “effective citizenship” and provide more data to use to shape other folks that fit your patterns, profiles, and purposes for cyber planner programmers.

And not just you. Your children.

Here’s an excerpt from a Information Technology professional in the field of education technology, taken from “Cogs in the Machine” by Joy Pullmann, Jane Robbins, and Emmett McGroarty, on Big Data, published by Pioneer Institute this May:

“He points out that much of the technology that most people are now accustomed to, such as smart phones and tablets—which are also increasingly common in the classroom—can measure non-cognitive attributes. For example,

Nearly all new phones have at least one camera. The ones with two allow the user to flip from one side to the other and show themselves or others on the screen. . . . [T]here are already a number of Apps available that will “read” your expressions and develop an “avatar” for your social media. This technology by definition “sees” the expressions on your face. Other, more subversive features, will allow someone to monitor how you react to certain stimuli and topics. Although this monitoring App is not recognized by the end user, the technology is already inside the [device] and could be turned on/off at the whim of anyone who knows how to infiltrate the security protocols (like the manufacturer or App developer themselves).[1]

Other capabilities, he reports, include measuring body temperature and analyzing fingerprints through touch-screen technology. Essentially every touch-screen device has USB and other ports with which to integrate current and future technology.

Are teachers and administrators aware of these capabilities?

According to this IT specialist,

“ALL the manufacturers are aware of its capabilities. Some of the manufacturer’s reps are and some aren’t. I would suspect that most teachers are NOT aware of the actual capabilities. Many of the ones who are aware of the technology’s capabilities don’t believe it will ever be used in that way in their classrooms . . . .” Those would be the teachers who haven’t read the Grit report.”

People make mistakes; even the best intending folks make mistakes.

Now, we have not only fallen humans making mistakes, but computer programs written by fallen humans compounding a confederation of corrupted feedback loops controlling minds, bodies, senses and souls.

We have a populace of naïve sheep on a fodder of far too much technology. 

“We have probably had too good an opinion of human nature in informing our confederation.

We must take human nature as we find it.

Perfection falls not to the share of mortals.”

General George Washington 1786 letter to John Jay 

As our wise Watchman Founder, General George Washington argued, it’s time for a reality check on human nature and a convention of virtuous shepherding minds to re-establish a government run by a virtuous educated people and not mastered by technology’s cybernetics in the hands of despotic centralized planners.

This starts with self-governance regarding personal and family use of technology and a true perspective of human nature…. Particularly, the realities of human nature when it is absent of relationship with and veneration for God.

Hillsdale Constitutional Reader Constitution 101










This entry was posted in censorship, Culture, digital media, Education, Faith, Family, government, History, neurobiology, Parenting, perception, psychology, social emotional "learning", Technology, Values and tagged , , , , , , , , , , , , , , . Bookmark the permalink.

3 Responses to Cyberwarfare and You…Up Close and Personal

  1. Pingback: Trust and The Great Pretenders: Experts & Technology | Dawn Kazmierzak ~Connecting Families Who Choose to Stand

  2. Pingback: Mind-Warp: Globalization via Civics Gamification; the formatting of Marxist Minds in the palms of hands. | Dawn Kazmierzak ~Connecting Families Who Choose to Stand

  3. Pingback: Framework for Fascism USA: Continuing the “forcible coordination” | Dawn Kazmierzak ~Connecting Families Who Choose to Stand

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s