David Rockefeller thanks the media

David Rockefeller addressed a Trilateral Commission meeting in 1991 with these words:

We are grateful to The Washington Post, The New York Times, Time Magazine, and other great publications, whose directors have attended our meetings and respected their promises of discretion for almost forty years. It would have been impossible for us to develop our plan for the world if we had been subject to the bright lights of publicity during those years.

(Kent 2005, p. 66)

Kent, Deirdre. 2005. Healthy Money Healthy Planet: Developing Sustainability Through New
Money Systems. Nelson, New Zealand: Craig Potton

See also

Smith, J., Karides, M., Becker, M., Brunelle, D., Chase-Dunn, C., & Della Porta, D.. (2015). Global Democracy and the World Social Forums. Global Democracy and the World Social Forums, 2nd Edition. Routledge

Plain numerical DOI: 10.4324/9781315636375
DOI URL
directSciHub download

Guzman-Concha, C.. (2012). Jackie Smith, Social Movements for Global Democracy. International Sociology, 27(5), 661–664.

Plain numerical DOI: 10.1177/0268580912452372c
DOI URL
directSciHub download

Swiss, L.. (2009). Jackie Smith, Social Movements for Global Democracy.. Canadian Journal of Sociology, 34(2), 518–520.

Plain numerical DOI: 10.29173/cjs6096
DOI URL
directSciHub download

Markoff, J.. (2010). Review of “Social Movements for Global Democracy,” by Jackie Smith. Journal of World-Systems Research, 310–315.

Plain numerical DOI: 10.5195/jwsr.2010.443
DOI URL
directSciHub download

WiFi radiation banned in France from daycares

N° 2065 – Enregistré à la Présidence de l’Assemblée nationale le 26 juin 2014.

PROPOSITION DE LOI MODIFIÉE PAR LE SÉNAT,
relative à la sobriété, à la transparence, à l’information  et à la concertation en matière d’exposition aux ondes électromagnétiques,

www.assemblee-nationale.fr/14/propositions/pion2065.asp

The World Health Organisation (WHO) has confirmed that radiofrequency electromagnetic fields can be carcinogenic to humans (Group 2B). Wireless phone use has been linked to an increased risk for brain cancer. The National Agency Health Safety of Food, Environment and Labour (ANSES) has also recommended to limit exposure of the population to radiofrequencies – especially from mobile phones – and especially for children and heavy users.

What is even more worrying is that exposure to such radiations isn’t limited to Wi-Fi but every other gadget that you and your child love so much – cell phones, cordless phones, wireless laptops, routers, electronic devices…even electrical wiring, smart meters and phone towers! Taking a strong, proactive step to minimise damage, the French National Assembly in January 29, 2015 passed a national law to reduce exposure to wireless radiation and electromagnetic fields. While Wi-Fi and wireless devices have been completely banned in nurseries and daycare centres, their use has also been severely restricted in schools for children up to 11 years.

Source: ehtrust.org/france-new-national-law-bans-wifi-nursery-school/

In fact, after this disturbing finding, even India has started taking emergency steps. The Rajasthan High Court, for instance, has directed telecom service providers to remove towers that are near schools, hospitals and play grounds. Such actions are, as PRIARTEM, France’s association for the regulation of mobile phone base stations, points out – “A first step in the legal recognition of the need to regulate the development of mobile phone communications and all wireless applications. This legislative effort must be an encouragement to go further in protecting people.”

Source: https://www.powerwatch.org.uk/

Graphene – the perfect atomic lattice (Nobel lecture by Prof. Konstantin Novoselov)

www.nobelprize.org/prizes/physics/2010/illustrated-information/

So far, most of the possible practical applications for graphene exist only in our fantasies. A great deal of interest has been spurred by graphene’s conducting ability. Thus graphene transistors are predicted to be substantially faster than those made out of silicon today. Maybe we are on the verge of yet another miniaturization of electronics that will lead to computers becoming even more efficient in the future.

Graphene

Since graphene is practically transparent (up to nearly 98%) whilst being able to conduct electricity, it would be suitable for the production of transparent touch screens, light panels and maybe solar cells. Also plastics could be made into electronic conductors if only 1% of graphene were mixed into them. Likewise, by mixing in just a fraction of a per mille of graphene, the heat resistance of plastics would increase by 30˚ C while at the same time making them more mechanically robust. This resilience could be utilised in new super strong materials, which are also thin, elastic and lightweight.

The perfect structure of graphene also makes it suitable for the production of extremely sensitive sensors that could register pollution at molecular level.

Dr. Steven M. Greer: The unacknowledged threat secret and covert operations by the USA

World Affairs: The Journal of International Issues
Vol. 8, No. 2 (2004), pp. 35-52
URL: www.jstor.org/stable/48504791

theunacknowledgedthreat

German post-war “re-education”

Review: Re-Education in Post-War Germany
Reviewed Work: Neuordnung oder Restauration? Das Demokratiekonzept der amerikanischen Besatzungsmacht und die politsche Sozialisation der Westdeutschen: Wirtschaftsordnung. Schulstruktur. Politsche Bildung by Jutta-B. Lange-Quassowski
Review by: Konrad Jaraush
History of Education Quarterly
Vol. 22, No. 3, Special Issue: Educational Policy and Reform in Modern Germany (Autumn, 1982), pp. 387-390 (4 pages)
Published By: Cambridge University Press
History of Education Quarterly
doi.org/10.2307/367777
www.jstor.org/stable/367777

Kreis, R.. (2018). From reeducation to partnership: Amerikahäuser and German-American institutes in Bavaria. In German-American Encounters in Bavaria and Beyond, 1945-2015
Anderton, A.. (2016). Hearing democracy in the ruins of Hitler’s Reich: American musicians in postwar Germany. Comparative Critical Studies

Plain numerical DOI: 10.3366/ccs.2016.0200
DOI URL
directSciHub download

Druffner, F.. (2014). Education is reeducation: Peter suhrkamp’s programmatic work in cooperation with the military government in Germany. Germanic Review

Plain numerical DOI: 10.1080/00168890.2014.932198
DOI URL
directSciHub download

Wegner, G. P., & Füssl, K.. (1997). Wissenschaft als säkularer Kreuzzug: Thomas V. Smith und die Deutschen Kriegsgefangenen in den USA (1944–1946). International Journal of Phytoremediation

Plain numerical DOI: 10.1080/0030923970330108
DOI URL
directSciHub download

Castillo, G.. (2004). Design Pedagogy Enters the Cold War. Journal of Architectural Education, 57(4), 10–18.

Plain numerical DOI: 10.1162/104648804323085437
DOI URL
directSciHub download

Parkinson, A. M.. (2017). A sentimental reeducation: Postwar West Germany’s intimate geographies. Emotion, Space and Society, 25, 95–102.

Plain numerical DOI: 10.1016/j.emospa.2017.05.009
DOI URL
directSciHub download

Shuster, G. N.. (1949). German Reeducation: Success or Failure. Proceedings of the Academy of Political Science, 23(3), 12.

Plain numerical DOI: 10.2307/1173036
DOI URL
directSciHub download

Weiner, D. R. P.. (2020). American and british efforts to democratize schoolbooks in occupied Italy and Germany from 1943 to 1949. Journal of Educational Media, Memory, and Society

Plain numerical DOI: 10.3167/jemms.2020.120106
DOI URL
directSciHub download

Inducing Resistance to Conspiracy Theory Propaganda: Testing Inoculation and Metainoculation Strategies

Inoculation theory
“McGuire’s (Papageorgis & McGuire, 1961, 1961a; 1961b) original conceptualization
of inoculation theory proposed that individuals can be inoculated against counter-
attitudinal attacks in a manner similar to immunization against viral attacks.
Just as preemptive immunization shots protect people from future exposure to viruses,
McGuire posited that preemptive messages could protect attitudes from subsequent
exposure to counterattitudinal persuasive messages. Inoculation treatments contain
two essential message features: threat and refutational preemption (Compton & Pfau,
2005; Szabo & Pfau, 2002). Threat is the motivational component of an inoculation.
It forewarns of a persuasive attack, highlighting the vulnerability of an individual’s
current attitudes, and thereby motivates resistance. The refutational preemption
component contains specific content that can be used to bolster attitudes against
an impending attack (Pfau et al., 1997). The purpose of the refutational component
is twofold: It provides individuals with arguments or evidence that can be used to
counter persuasive attacks, and it also allows individuals to practice defending their
beliefs through counterarguing (Compton & Pfau, 2005; Insko, 1967; Wyer, 1974).
Research reveals inoculation to be an effective strategy for conferring resistance
to persuasion. … Conspiracy theories present an interesting challenge for inoculation scholars
because they defy the rational, logical, and reasoned approach exemplified by
inoculation interventions. Conspiratorial arguments often employ circular reasoning,
repetition of unproven premises, nonfalsifiable premises, and a host of other logical
flaws (Miller, 2002). Persuasion is not a purely rational process, however, and dual-
process theories (e.g., Petty & Cacioppo, 1986) apply the metaphor of two separate
routes to persuasion: A central route, based on careful processing of the evidence;
and a peripheral route, based on some mental shortcut instead of careful evaluation
of arguments and evidence. These theories propose that both motivation and ability
to process persuasive messages are necessary for central route processing to occur.
Watching a film is a more passive process than reading, which should reduce the
ability to counterargue or process many of the empirical claims presented (Compton
& Pfau, 2005).”

Abstract

This investigation examined the boundaries of inoculation theory by examining how inoculation can be applied to conspiracy theory propaganda as well as inoculation itself (called metainoculation). A 3-phase experiment with 312 participants compared 3 main groups: no-treatment control, inoculation, and metainoculation. Research questions explored how inoculation and metainoculation effects differ based on the argument structure of inoculation messages (fact- vs. logic-based). The attack message was a 40-minute chapter from the 9/11 Truth conspiracy theory film, Loose Change: Final Cut. The results indicated that both the inoculation treatments induced more resistance than the control message, with the fact-based treatment being the most effective. The results also revealed that metainoculation treatments reduced the efficacy of the inoculation treatments.


Banas, J. A., & Miller, G.. (2013). Inducing Resistance to Conspiracy Theory Propaganda: Testing Inoculation and Metainoculation Strategies. Human Communication Research, 39(2), 184–207.

Plain numerical DOI: 10.1111/hcre.12000
DOI URL
directSciHub download

van der Linden, S., Leiserowitz, A., Rosenthal, S., & Maibach, E.. (2017). Inoculating the Public against Misinformation about Climate Change. Global Challenges, 1(2), 1600008.

Plain numerical DOI: 10.1002/gch2.201600008
DOI URL
directSciHub download

Maertens, R., Anseel, F., & van der Linden, S.. (2020). Combatting climate change misinformation: Evidence for longevity of inoculation and consensus messaging effects. Journal of Environmental Psychology

Plain numerical DOI: 10.1016/j.jenvp.2020.101455
DOI URL
directSciHub download

Enforcing Social Conformity: A Theory of Authoritarianism

“…people who value social conformity… support the government when it wants to increase its control over social behavior and punish nonconformity…valuing social conformity increases the motivation for placing restrictions on behavior…the desire for social freedom is now subservient to the enforcement of social norms and rules. Thus, groups will be targeted for repression to the extent that they challenge social conformity…
~ Stanley Feldman, Enforcing Social Conformity: A Theory of Authoritarianism

Abstract

Fifty years after the publication of The Authoritarian Personality, the empirical literature on authoritarianism continues to grow even though there is no widely accepted theory to account for the phenomenon. The absence of a secure theoretical grounding severely limits our understanding of authoritarianism. This paper offers a new conceptualization in which authoritarian predispositions originate in the conflict between the values of social conformity and personal autonomy. Prejudice and intolerance should be observed among those who value social conformity and perceive a threat to social cohesion. These hypotheses were tested with a sample of undergraduate students; the questionnaire included new measures of the dimension of social conformity–autonomy as well as items from Altemeyer’s RWA (right–wing authoritarianism) scale.

“We are fast approaching the stage of the ultimate inversion: the stage where the government is free to do anything it pleases, while the citizens may act only by permission; which is the stage of the darkest periods of human history, the stage of rule by brute force.”
~ Ayn Rand, Capitalism: The Unknown Ideal


Feldman, S.. (2003). Enforcing Social Conformity: A Theory of Authoritarianism. Political Psychology

, 24(1), 41–74.
Plain numerical DOI: 10.1111/0162-895X.00316
DOI URL
directSciHub download

Passini, S.. (2022). Songs and flags: Concern for Covid-19 and submission to authority. Personality and Individual Differences

, 185, 111251.
Plain numerical DOI: 10.1016/j.paid.2021.111251
DOI URL
directSciHub download

The internet of bodies

“The Internet of Bodies (IoBs) is an imminent extension to the vast Internet of Things domain, where interconnected devices (e.g., worn, implanted, embedded, swallowed, etc.) are located in-on-and-around the human body form a network. Thus, the IoB can enable a myriad of services and applications for a wide range of sectors, including medicine, safety, security, wellness, entertainment, to name but a few. Especially, considering the recent health and economic crisis caused by the novel coronavirus pandemic, also known as COVID-19, the IoB can revolutionize today’s public health and safety infrastructure. Nonetheless, reaping the full benefit of IoB is still subject to addressing related risks, concerns, and challenges. Hence, this survey first outlines the IoB requirements and related communication and networking standards. Considering the lossy and heterogeneous dielectric properties of the human body, one of the major technical challenges is characterizing the behavior of the communication links in-on-and-around the human body. Therefore, this article presents a systematic survey of channel modeling issues for various link types of human body communication (HBC) channels below 100 MHz, the narrowband (NB) channels between 400 and 2.5 GHz, and ultrawideband (UWB) channels from 3 to 10 GHz. After explaining bio-electromagnetics attributes of the human body, physical, and numerical body phantoms are presented along with electromagnetic propagation tool models. Then, the first-order and the second-order channel statistics for NB and UWB channels are covered with a special emphasis on body posture, mobility, and antenna effects. For capacitively, galvanically, and magnetically coupled HBC channels, four different channel modeling methods (i.e., analytical, numerical, circuit, and empirical) are investigated, and electrode effects are discussed. Finally, interested readers are provided with open research challenges and potential future research directions.”

Celik, A., Salama, K. N., & Eltawil, A. M.. (2022). The Internet of Bodies: A Systematic Survey on Propagation Characterization and Channel Modeling. IEEE Internet of Things Journal

Plain numerical DOI: 10.1109/JIOT.2021.3098028
DOI URL
directSciHub download


Lee, M., Boudreaux, B., Chaturvedi, R., Romanosky, S., & Downing, B.. (2020). The Internet of Bodies: Opportunities, Risks, and Governance. The Internet of Bodies: Opportunities, Risks, and Governance

Plain numerical DOI: 10.7249/rr3226
DOI URL
directSciHub download

Makitalo, N., Flores-Martin, D., Berrocal, J., Garcia-Alonso, J., Ihantola, P., Ometov, A., … Mikkonen, T.. (2020). The Internet of Bodies Needs a Human Data Model. IEEE Internet Computing

Plain numerical DOI: 10.1109/MIC.2020.3019920
DOI URL
directSciHub download

Boddington, G.. (2021). The Internet of Bodies—alive, connected and collective: the virtual physical future of our bodies and our senses. AI and Society

Plain numerical DOI: 10.1007/s00146-020-01137-1
DOI URL
directSciHub download

Blake, M. B., Kandasamy, N., Dustdar, S., & Liu, X.. (2020). Internet of Bodies/Internet of Sports. IEEE Internet Computing

Plain numerical DOI: 10.1109/MIC.2020.3026924
DOI URL
directSciHub download

Ray, P. P.. (2020). Intelligent Ingestibles: Future of Internet of Body. IEEE Internet Computing

Plain numerical DOI: 10.1109/MIC.2020.3023484
DOI URL
directSciHub download

El-Khoury, M., & Arikan, C. L.. (2021). From the internet of things toward the internet of bodies: Ethical and legal considerations. Strategic Change

Plain numerical DOI: 10.1002/jsc.2411
DOI URL
directSciHub download

Fast Face-swap Using Convolutional Neural Networks

1611.09577
Peng, B., Fan, H., Wang, W., Dong, J., & Lyu, S.. (2021). A Unified Framework for High Fidelity Face Swap and Expression Reenactment. IEEE Transactions on Circuits and Systems for Video Technology

Plain numerical DOI: 10.1109/TCSVT.2021.3106047
DOI URL
directSciHub download

Zhang, W., Zhao, C., & Li, Y.. (2020). A novel counterfeit feature extraction technique for exposing face-swap images based on deep learning and error level analysis. Entropy

Plain numerical DOI: 10.3390/e22020249
DOI URL
directSciHub download

Korshunova, I., Shi, W., Dambre, J., & Theis, L.. (2017). Fast Face-Swap Using Convolutional Neural Networks. In Proceedings of the IEEE International Conference on Computer Vision

Plain numerical DOI: 10.1109/ICCV.2017.397
DOI URL
directSciHub download

Senses, M., & Topal, C.. (2019). Real time face swap based on patch warping. In 27th Signal Processing and Communications Applications Conference, SIU 2019

Plain numerical DOI: 10.1109/SIU.2019.8806397
DOI URL
directSciHub download

Mahajan, S., Chen, L. J., & Tsai, T. C.. (2017). SwapItUp: A face swap application for privacy protection. In Proceedings – International Conference on Advanced Information Networking and Applications, AINA

Plain numerical DOI: 10.1109/AINA.2017.53
DOI URL
directSciHub download

Sadu, C., & Das, P. K.. (2020). Swapping face images based on augmented facial landmarks and its detection. In IEEE Region 10 Annual International Conference, Proceedings/TENCON

Plain numerical DOI: 10.1109/TENCON50793.2020.9293884
DOI URL
directSciHub download

Zhao, Y., Tang, F., Dong, W., Huang, F., & Zhang, X.. (2019). Joint face alignment and segmentation via deep multi-task learning. Multimedia Tools and Applications

Plain numerical DOI: 10.1007/s11042-018-5609-1
DOI URL
directSciHub download

Chawla, R.. (2019). Deepfakes: How a pervert shook the world. International Journal of Advance Research and Development
Jiang, J., Li, B., Wei, B., Li, G., Liu, C., Huang, W., … Yu, M.. (2021). FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. Journal of Computer Security

Plain numerical DOI: 10.3233/JCS-200124
DOI URL
directSciHub download

Mirsky, Y., & Lee, W.. (2021). The Creation and Detection of Deepfakes. ACM Computing Surveys

Plain numerical DOI: 10.1145/3425780
DOI URL
directSciHub download

Zhang, W., & Zhao, C.. (2019). Exposing Face-Swap Images Based on Deep Learning and ELA Detection. Proceedings

Plain numerical DOI: 10.3390/ecea-5-06684
DOI URL
directSciHub download

Yan, S., He, S., Lei, X., Ye, G., & Xie, Z.. (2018). Video Face Swap Based on Autoencoder Generation Network. In ICALIP 2018 – 6th International Conference on Audio, Language and Image Processing

Plain numerical DOI: 10.1109/ICALIP.2018.8455775
DOI URL
directSciHub download

Skibba, R.. (2020). Accuracy Eludes Competitors in Facebook Deepfake Detection Challenge. Engineering

Plain numerical DOI: 10.1016/j.eng.2020.10.008
DOI URL
directSciHub download

Wöhler, L., Henningson, J. O., Castillo, S., & Magnor, M.. (2020). PEFS: A Validated Dataset for Perceptual Experiments on Face Swap Portrait Videos. In Communications in Computer and Information Science

Plain numerical DOI: 10.1007/978-3-030-63426-1_13
DOI URL
directSciHub download

Bode, L., Lees, D., & Golding, D.. (2021). The Digital Face and Deepfakes on Screen. Convergence

Plain numerical DOI: 10.1177/13548565211034044
DOI URL
directSciHub download

Cole, S.. (2018). We Are Truly Fucked: Everyone Is Making AI-Generated Fake Porn Now. Motherboard
Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., & Ortega-Garcia, J.. (2020). Deepfakes and beyond: A Survey of face manipulation and fake detection. Information Fusion

Plain numerical DOI: 10.1016/j.inffus.2020.06.014
DOI URL
directSciHub download

Baek, J. Y., Yoo, Y. S., & Bae, S. H.. (2020). Generative Adversarial Ensemble Learning for Face Forensics. IEEE Access

Plain numerical DOI: 10.1109/ACCESS.2020.2968612
DOI URL
directSciHub download

Kaur, S., Kumar, P., & Kumaraguru, P.. (2020). Deepfakes: temporal sequential analysis to detect face-swapped video clips using convolutional long short-term memory. Journal of Electronic Imaging

Plain numerical DOI: 10.1117/1.jei.29.3.033013
DOI URL
directSciHub download

Gu, S., Bao, J., Yang, H., Chen, D., Wen, F., & Yuan, L.. (2019). Mask-guided portrait editing with conditional gans. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition

Plain numerical DOI: 10.1109/CVPR.2019.00355
DOI URL
directSciHub download

Wen, L., & Xu, D.. (2019). Face Image Manipulation Detection. In IOP Conference Series: Materials Science and Engineering

Plain numerical DOI: 10.1088/1757-899X/533/1/012054
DOI URL
directSciHub download

Guera, D., & Delp, E. J.. (2019). Deepfake Video Detection Using Recurrent Neural Networks. In Proceedings of AVSS 2018 – 2018 15th IEEE International Conference on Advanced Video and Signal-Based Surveillance

Plain numerical DOI: 10.1109/AVSS.2018.8639163
DOI URL
directSciHub download

Hashmi, M. F., Ashish, B. K. K., Keskar, A. G., Bokde, N. D., Yoon, J. H., & Geem, Z. W.. (2020). An Exploratory Analysis on Visual Counterfeits Using Conv-LSTM Hybrid Architecture. IEEE Access

Plain numerical DOI: 10.1109/ACCESS.2020.2998330
DOI URL
directSciHub download

Nagarajan, A., & Soghrati, S.. (2018). Conforming to interface structured adaptive mesh refinement: 3D algorithm and implementation. Computational Mechanics

Plain numerical DOI: 10.1007/s00466-018-1560-2
DOI URL
directSciHub download

Gerstner, E.. (2020). Face/off:” DeepFake” face swaps and privacy laws. Def. Counsel J.