Vaccine 1

ATLAS Research & Development
4 min readAug 9, 2023

From Torture to Second Booster

This is a work in progress, it still belongs to me. Please don’t pirate.

According to the Sino-Soviet philosophy of cyber security the human being, their body and mind, both, comprise nodes on a network which require the defense systems charged with protecting cyberspace to also protect them. At the point at which the PRC decided unilaterally that the vaccine program would be dependent on the cyber space security policy of the PRC the multinational corporations and public health institutions in competition for the prestige of developing a novel coronavirus vaccine, were effectively compelled to cooperate with the security policies of the Peoples Republic of China. Given the amount of tactical intelligence available suggesting that there was a coordinated effort on behalf of international terrorists and their state sponsors to perpetrate a global genocide, American defense contractors and integrators were mobilized over the course of several months to coordinate a domestic effort to produce a viable means through which to unify the efforts of three very different sovereign states each with their own plan to combat the already devastating critical infrastructure damage and loss of human life.

In part due to the popularity of schedule 1 narcotics and the criminal culture which supplies them them. The business model based around the Sino-Soviet conception of cyberspace security had been growing in popularity since the early 2010’s. The criminal culture which supplies and accompanies schedule 1 narcotics has always been a particularly dangerous source of disinformation. Everything from the lighters to the glassware is designed to allow the narcotics supplier access to the consumer psyche.

With access to the consumer psyche the potential avenues of financial gains are vast but often include the production and sale of denial about the declining health and well being of the individual, their property and their community as well as the production and sale of individual behavioral data and intellectual property to criminal enterprises.

In turn the denial allows for even more avenues of financial gains including the theft and sale of intellectual and other property. Specifically the information needed to produce and manufacture the denial needed to continue the process of addiction and decline. The recursive extraction of behavioral data is often facilitated by the high levels of information system autonomy from extraction to processing to analysis to distribution.Unfortunately the human behavior data mining industry is itself one that churns $1 trillion dollars a year and the popularity of schedule 1 narcotics, though perhaps a key factor in its development, is now only a small part of a much more pervasive industry. The other players in the data mining game can be understood to be everyone which produces a product for human consumption; necessarily including the food, beverage, fuel, carbon offset, hospitality, housing, education, medical, news and entertainment industries. Among the avenues of financial gain stemming from the behavioral data is one with a much darker undertone. Often, businesses employ data in such destructive ways that that individuals are often deliberately injured, physically, psychologically, emotionally and socially. Tracing the lineage of these types of businesses again leads us again to the market for schedule 1 narcotics and the tactics of recursive data mining and with the deliberate attempt to degrade the character of either the consumer or those which say no. As TCO generate the disinformation necessary to perpetrate what is commonly called “wrecking” they consistently work to degrade the character of their customers, or those who oppose their perspective that schedule 1 narcotics are a legitimate business, to the community in which their victims live, domestic law enforcement, foreign publics and by proxy the domestic intelligence community. This process of corrupting the domestic law enforcement community and the domestic intelligence community serves to further their financial interests by preventing the institutions which are responsible for public safety and national security from protecting their victims, in the process making the victims out to be criminals themselves. At the same time this process serves to further the interests of foreign sovereigns which consider the United States an adversary. This process is in turn employed by both domestic and foreign institutions as the victims of TCO are turned from ordinary citizens into the commodities or stock of sovereign states. Stepping these timelines forward reveals the emerging market of information security designed to protect individuals and organizations from being victimized by businesses which stand to benefit from leveraging personal and behavioral data in destructive ways. Unfortunately, the agnostic nature of the information security industry allows it to benefit both organized crime and the victims of it.

--

--

ATLAS Research & Development
0 Followers

Non combatant and journalist. B.A. in Global Affairs. M.A. in Political Science. Professional software developer, Dev/AiOps engineer, Blue team ethical hacker.