RSS Feed

One-World Brain

Jim Keith (1949-1999)  |  Excerpt from the book Mass Control:
Engineering Human Consciousness
(Chapter 29).
Kempton: Adventures Unlimited Press, 1999. 830 views
August 5, 2013

In the 1930s, British intelligence agent and one-world theoretician H.G. Wells proposed a mind control plan that is apparently coming to fruition now, at the turn of the 21st century, with the creation of the Internet. At a November, 1936 speech before the Royal Institute of International Affairs, Wells laid out his idea for what he called a “World Encyclopaedia.” Wells said:

“I want to suggest that something, a new social organization, a new institution—which for a time I shall call World Encyclopaedia… This World Encyclopaedia would be the mental background of every intelligent man in the world… Such an Encyclopaedia would play the role of an undogmatic Bible to world culture. It would do just what our scattered and disoriented intellectual organizations of today fall short of doing. It would hold the world together mentally… It would compel men to come to terms with one another… It is a super university. I am thinking of a World Brain; no less… Ultimately, if our dream is realized, it must exert a very great influence upon everyone who controls administrations, makes wars, directs mass behavior, feeds, moves, starves and kills populations… You see how such an Encyclopaedia organization could spread like a nervous network, a system of mental control about the globe, knitting all the intellectual workers of the world through a common interest and cooperating unity and a growing sense of their own dignity, informing without pressure or propaganda, directing without tyranny.”

Wells was a little more candid in a private memo written in the same month:

“The Universities and the associated intellectual organizations throughout the world should function as a police of the mind.” [1]

Policing of the mind is precisely the danger of the Internet. Although at first blush the possibility of a communications medium that is egalitarian in its ability to accommodate both individuals and media monoliths is exciting, the apparent freedom of the Internet may be transitory…and illusory.

One problem is that along with ability to disseminate information widely and almost instantaneously, due to its technical flexibility the Internet also has the potential for assimilating—for literally devouring—all of the major information sources on the planet. With high-tech linkages and interfaces it is quite probable that worldwide television, radio, computer, and print media will all be sucked into the maw of what is currently called the Internet. All of these information and communication sources are gradually being linked together into a single computerized network, providing an opportunity for unheralded control of what will be broadcast, what will be said, and ultimately what will be thought.

The Internet provides the ability for almost instantaneous monitoring of the content of communications. It is possible that the ‘wide open information frontier’ of the Internet, as it currently exists, is going to be a temporary thing, and that a program of increased monitoring and regulation—as well as a more aggressive use of mind control, such as foreseen by Dr. Persinger—will emerge.

When NBC and Microsoft launched their joint venture MSNBC, in an attempt to link television and the Internet, newscaster and CFR member Tom Brokaw said,

“We can’t let that generation and a whole segment of the population just slide away out to the Internet and retrieve what information it wants without being in on it.” [2]

In China, they have also not held their tongues about what they see as the necessity of Internet control. Xia Hong, an advocate of government monitoring of the Net has said,

“The Internet has been an important technical innovator, but we need to add another element, and that is control. The new generation of information superhighway needs a traffic control center. It needs highway patrols: users will require driver’s licenses. These are the basic requirement for any controlled environment.” [3]

Is the idea that the Internet can be used for increasing surveillance on the public just paranoia on my part? Then we should examine who currently controls the medium: American intelligence agencies. At this time the major nexus of control of the Internet resides in the monopoly of “domain registration,” the keys to the broad Internet landscape. These domain names are registered as Internet Protocol numbers, and until recently were deeded by Network Solutions, Inc., a subsidiary of the government funded National Science Foundation. While Network Solutions registered the I.P. numbers, it was done as a free public service. This is no longer taking place.

Now the long arm of American intelligence agencies has hijacked the free flow of information—registration of domain names now starts at fifty dollars per year—since the purchase of Network Solutions by another company, Scientific Applications International Corp. (SAIC), a group previously mentioned circumstantially in this book in connection with the Heaven’s Gate mass suicide—or murder.

SAIC is an arm of the military industrial establishment, with twenty thousand employees and over 90% of its $1.9 billion in 1994 revenues obtained from government contracts. On the twenty-three person board of directors of SAIC are Admiral Bobby Inman, former deputy director of the CIA and head of the National Security Agency; President Nixon’s former defense secretary Melvin Laird; General Max Thurman, who commanded the invasion of Panama. Other board members of SAIC have included former CIA director Robert Gates; Secretary of Defense William Perry; and CIA director John Deutch.

Among the projects that Scientific Applications International Corp. has been engaged in recently have been the creation and implementation of technology for the Army Global Command and Control System—the renovation of the Pentagon’s computer and communication systems—and the upgrading of national, state, and local law enforcement databases. In other words, SAIC is involved in the upgrading and integration of the computerized infrastructure of the Establishment.

And now SAIC stands at the gate of the Internet.

According to researcher Jesse Hersh:

“The military-industrial complex was the name used to refer to the ruling power elite during the 1950s and 1960s. However, with the wide penetration of television during the ’60s, and the further proliferation of electronic media throughout the 1970s and ’80s, the complex has dissolved into the inner workings of almost all aspects of our society. The war economy has successfully been transformed into the information economy. Military technology, and military communications systems now control and operate almost all of our political-economic and social relations. This amalgamation of media, and conglomeration of power, is currently being presented to the ‘consumer’ as the Information Superhighway or ‘Internet’.” [4]

If it seems unlikely that Big Brother would concern himself with the communications of ordinary citizens on the Internet, then it should be realized that government is already engaged in monitoring civilian and business communications on an awesome scale. Around the world, electronic messages are intercepted by a collaboration amongst several spy agencies headed by the American NSA, termed ECHELON. Based upon a document known as the UKUSA Agreement, signed in 1948 by the U.S., Great Britain, Australia, Canada, and New Zealand, ECHELON is a system composed of receiving stations in Yakima, Washington; Sugar Grove, West Virginia; Norwenstow in Cornwall, England; Waihopai, New Zealand; and Geraldton, Australia.

The receiving stations of ECHELON sift through the output of the world’s electronic media. ECHELON primarily targets non-military domestic and business communications, including email, telephone, fax, and telex networks. This interception is primarily done through monitoring the communications of international phone company telecommunications satellites, civilian communications satellites, and communications as they are sent from undersea cables to microwave transmitters.

ECHELON uses computers that incorporate symbol and voice recognition systems to sift through millions of messages every minute, and to identify keywords and phrases, including business names, e-mail addresses, phone and fax numbers that are of interest to its participating member intelligence groups in the U.S., Britain, Canada, and New Zealand. After these phrases are located and the communications they are embodied in are culled, they are sent to analysts in whatever country requested the intercepts. According to one analyst, Amnesty International and Greenpeace have been among ECHELON’s targets.

“Let me put it this way,” a former NSA officer said. “Consider that anyone can type a keyword into a Net search engine and get back tens of thousands of hits in a few seconds. Assume that people working on the outer edges have capabilities far in excess of what you do.” [5]

The gradual assimilation and control of all communications—and ultimately all transactions entirely, including those of perception and thought—is a long term strategy of the controllers that has in recent years been facilitated through the creation of the interdisciplinary science of cybernetics. Now, with cybernetics, mass control is here, eating up our freedom on a day-to-day basis like a fast-acting viral organism.

The term cybernetics was invented by Norbert Wiener, a professor of mathematics at MIT who was involved with what was termed Operations Research as well as System Dynamics for the U.S. during World War II.

Cybernetics is primarily the science of information theory, and it is currently being applied to the world as a whole. Cybernetics theory was first envisioned as a way of precisely managing wars, but with experience it was seen that the disciplines and projections that were vital in the conduct of war were essentially the same as those utilized by government during peacetime. The cybernetic approach evolved such cross-disciplinary groups as the RAND Corporation, Mitre, and Ramo-Wooldridge (which became TRW), brainstorming the cybernetic approach to controlling society and nature itself. The cybernetics idea also provided the genus for the National Security Agency, which is at this time the largest intelligence agency on the planet. Such is the importance of information, according to the controllers.

According to cybernetic innovator Jay W. Forrester,

“The professional field known as system dynamics [or cybernetics] has been developing for the last 35 years and now has a world-wide and growing membership. System dynamics combines the theory, methods, and philosophy needed to analyze the behavior of systems in not only management, but also in environmental change, politics, economic behavior, medicine, engineering, and other fields. System dynamics provides a common foundation that can be applied where we want to understand and influence how things change through time.”

One experiment in cybernetics was conducted in 1971 after the Marxist-leaning Dr. Salvador Allende was elected president of Chile. As Castro had done earlier, Allende set about nationalizing the industry, banks, and major companies of Chile. But Allende was no agrarian primatif, and therein lay his danger to the Establishment world. He called in the British cyberneticist Stafford Beers to provide the means for micro-managing the country, which is rich in natural resources, but which has always been drained by the major industrial powers with little of its gelt left over for the country itself.

Beer gathered together a highly qualified group of cybernetics-savvy scientists and launched what he called Project Cybersyn, the objective of which was, according to Beers,

“To install a preliminary system of information and regulation for the industrial economy that will demonstrate the main features of cybernetic management and begin to help in the task of actual decision-making by March 1, 1972… It was a massive application of cybernetic feedback to help each industry and each factory keep track of itself through a central location. All communications flowed through the central location.”

Project Cybersyn utilized three primary components:

  • Cybernet, which was something of a precursor to today’s Internet, a means by which businessmen and government could communicate and consult with anyone else in the web.
  • Cyberstride, the programs necessary for monitoring individual companies as well as the economy as a whole, as well as providing alerts when specific areas needed enhancement or were in trouble.
  • Chaco, a computerized model of the Chilean economy that provided effective simulations of potential scenarios.
Richard Nixon and Henry Kissinger, July 3rd, 1973. Photo Bettmann/Corbis.
Richard Nixon and Henry Kissinger, July 3rd, 1973. Photo Bettmann/Corbis.
The purpose of Cybersyn was to monitor, to dissect, and to predict the Chilean economy; to debug it in order to create a functioning machine, in much the same manner that is being done in many countries throughout the world today.

The problem is that Cybersyn may have worked too well and so posed a threat to the capitalist world. As the demonstration project that Allende and Beers foresaw, it might have provided a tremendous public relations coup for the Communist world. Henry Kissigner, it is said, was the one who intervened to put an end to the grand experiment. Salvador Allende was assassinated by Chileans who are reported to have been in the pay of the CIA, and Cybersyn went by the wayside.

The CIA seems to have known precisely what it was doing, since there are indications that the Agency at about the same time was focused on cybernetic concerns of its own. According to Anna Keeler in my Secret and Suppressed anthology,

“Richard Helms wrote of such a system in the mid-1960s while he was CIA Plans Director. He spoke of ‘Sophisticated approaches to the coding of information for transmittal to population targets’ in the ‘battle for the minds of men’ and of ‘an approach integrating biological, social and physical-mathematical research in an attempt to control human behavior.’ He found particularly notable ‘use of modern information theory, automata theory, and feedback concepts…for a technology controlling behavior…using information inputs as causative agents…”

Elsewhere Helms wrote,

“Cybernetics can be used in molding of a child’s character, the inculcation of knowledge and techniques, the amassing of experience, the establishment of social behavior patterns…all functions which can be summarized as control of the growth processes of the individual.”

Cybernetics and the Internet—otherwise, the one world brain envisioned by H.G. Wells—allows for a regulated, interventionist world, one so fine-tuned that much of the machinations that take place behind the scenes are not observed by the man in the street. Among the control strategies that can be and are employed by the elitists in a cybernetic world are the control of food, the control of the monetary supply, the control of energy, and the control of public opinion. The Clinton administration’s close attention to the media and opinion polls, and manipulation of same, are in essence a primitive cybernetic approach that has allowed for the institution in the U.S. of a “soft” cybernetic fascism where violent internal intervention is rarely needed, and then seemingly only for public relations purposes.

The techno-fascists are approaching closure, and may have already achieved it. Not only do governments and intelligence agencies currently have the ability to monitor computer and other media messages, as well as the emotional responses of the electorate via polling and other techniques, they have the ability and the will to use media to brainwash us, to change our opinions when they believe it is warranted, and to sell us on every step on the road to complete utilization. As satirized in works like Report From Iron Mountain and Silent Weapons for Quiet Wars, the cybernetics approach to world management can yield the ultimate in control. Extrapolating from the accelerating advances of the last century, it is obvious that unless lovers of freedom act, and act fast, within the next twenty years the ruling elite will have effectively realized total control over the minds and bodies of mankind.[6]


notes:

[1] Wells, H.G. Cited in White, Carol. The New Dark Ages Conspiracy. New York: The New Benjamin Franklin House, 1980.

[2] Brokaw, Tom, cited in Pouzzner, Daniel. “The Architecture of Modern Political Power,” http://www.mega.nu/ampp/

[3] “The Great Firewall of China” by Geramie R. Barme and Sang Ye, Wired Magazine.

[4] Hersh, Jesse, “The Internet Complex,” Prevailing Winds, number 4; King, Bradley J., “Doubleplusungood! The Specter of Telescreening,” [formerly] at www.parascope.com.

[5] Hagar, Nicky, “Exposing the Global Surveillance System,” Covert Action Quarterly online, http://www.projectcensored.org/4-exposing-the-global-surveillance-system/; “Spies Like Us,” Connected, 16 December, 1997, at www.telegraph.co.uk; Vest, Jason, “Listening In,” Village Voice, August 12-18, 1998.

[6] Helms, Richard, cited in Bowart, Walter. Operation Mind Control. New York: Dell Books, 1978; Friedman, George and Meridith. The Future of War — Power, Technology, and American World Dominance. 1996; Beer, Stafford. Brain of the Firm, 1986; Wiener, Norbert. The Human Use of Human Beings — Cybernetics and Society. 1954; “Silent Weapons for Quiet Wars,” Secret and Suppressed, ed. Jim Keith, Feral House, 1993.

Filed under: Articles, Books, News