> Yellowstone END
Showing posts with label programming. Show all posts
Showing posts with label programming. Show all posts

Saturday, 19 July 2025

DNA Technologies: The Future of Control and Cryptography

"It's all available now. This is not science fiction." Dr. Charles Morgan on psychoneurobiology and war. Listen carefully....

"It was actually like we had the ability to train an animal, and record that action, and put it into the sensory cortex of a second animal's brain, and that second animal acquired knowledge."

"The transfer of knowledge from one animal to another..."

"Yes, he said 'Human Drones'.... Listen..."

"You can direct motor activity, or you can send communication and information."

"The equivalent of developing nuclear weapons."

"They can produce perfumes. They can produce oil. They can produce any peptide. Everything that we program into DNA. And it's in a living cage."

"Venter.... Venter is an American biologist and businessman. He led the first draft of human genome sequencing and assembled the first synthetic cell with synthetic DNA. Venter founded Celera, an Institute for Genomic research."

"Venter's work is, in my opinion, the equivalent of developing nuclear weapons, when you realize that he created life in yeast cells. And these yeast cells were programmed to produce anything. They were injected into the human body through hypo-spray, through needles. You put a certain gene, slicing genes, you program what you like. You put it in a cage, and it multiplies."

"What would you do about it if you were in the security and intelligence field?"

"DNA programming. Look, is it familiar?"

"New directions in medicine. Programmable DNA. Look, is it familiar?"

"Designer receptors that can be remotely controlled."

"Designer receptors that can be remotely controlled. You can create a cage. You can put it somewhere in the body, and you can activate it remotely. You can activate it, for example, in another person's brain. And when you do that, you can control his motor activity, or you can send information to his brain."

"You can put them in cages, and you can activate them remotely."

"Control."

"You can create a cage. You can put it somewhere in the body, and you can activate it remotely."

"Summary: Create a cage that can do literally ANYTHING. Implement it. Activate it remotely."

"And she can literally CHANGE WHO YOU ARE. And the way you think, the way you act."

"It's like embryonic stem cells derived from human skin cells. Mesinchymal stem cells: injected peripherally, can gain access to brain tissues."

"And the technology exists."

"And the technology exists to introduce it to someone, and make it reproduce, and fulfill its function."

"And you can make things activate in other people's brains."

"DNA shorthand. Professor David Walt, Tufts University, 2012."

"Seven different strains of harmless E. coli bacteria have been genetically modified so that each of them produces a fluorescent protein. When these bacteria are grown, the colonies look like bright colored spots at the right wavelength of light."

"The researchers have developed a way to use pairs of these differently colored proteins to represent the letters of the alphabet."

"The coding system is 'practical' because it uses seven easily distinguishable colors in the visible spectrum, but other coding systems can be developed using other colors and combinations to represent each letter."

"See what else they can put in the DNA..."

"DNA coding: August 17, 2012 One gram of DNA: 700 terabytes (7 billion terabytes?). Professor George Church."

"Decoding the self-replicating DNA that encodes these strings."

"See what else they can put in the DNA..."

"This is the latest experiment showing how information can be hidden in DNA."

"See what else they can put in the DNA..."

"See what else they can put in the DNA..."

"So, of course... Damn China.... What to do with the DNA?"

"Hiding data in the DNA of a living organism 2009, Shu-Hong Jiao, China."

"Image encryption using a combination of DNA with chaotic maps. Qiang Zhang, China, 2011."

"A new field of cryptography: DNA cryptography. Guozuen Xiao, China, 2012."

"An encryption scheme using DNA technology. Guangzhao Kui, 2012; 2015."

"They can be made using quantum encryption."

"Where does Rona come from?"

"What is the most 'interesting' among vaccines?"

"Bill Gates sees RNA vaccines as the best options for rapid treatment of coronavirus."

"The billionaire and philanthropist explained that a vaccine could appear anytime from nine to 18 months, focusing on new RNA and DNA platforms."

"It's amazing, and both death threats..."

"Massively distributed DNA-altering vaccines linked to China that can store classified information that can be activated at any time from anywhere..."

"Is this one of the worst things they could have changed or CHANGED?"

"Can we erase the memory? Can we change the memory?"

"Can we change the memory?"

"The short answer is yes."

"Watch the entire lecture here:"

"The short answer is yes."

This entry reveals surprising and perhaps disturbing perspectives related to modern advances in DNA technology. Dr. Charles Morgan emphasizes that many of these technologies are already available and are not science fiction. He describes how scientists can train an animal, record its actions, and transfer this knowledge to another animal, which demonstrates the potential for transmitting information directly to the brain.

The work of American biologist Craig Venter, who created the first synthetic cell with synthetic DNA, is also mentioned. Venter, the founder of Celera and the Institute for Genomic Research, is considered the creator of life in yeast cells, which can be programmed to produce almost anything. These cells can be embedded in the human body, which opens up huge possibilities for medical and possibly military applications.

Designer receptors that can remotely control cells represent another revolutionary technology. This allows you to create cells that can be activated in another person's brain, controlling their motor activity or sending information. Such technologies can be used to alter memory, which raises serious ethical questions.

In addition, the information touches on the topic of DNA cryptography, where information can be hidden in living organisms. Chinese scientists such as Shu-Hong Jiao and Guozuen Xiao have developed methods for encrypting images and data using DNA, making this technology virtually invulnerable to hacking.

Featured Post

The expected escalation of the conflict in Ukraine: Europe is strengthening its military presence, Russia is preparing retaliatory measures and an analysis of the situation as a whole

The situation around the conflict in Ukraine is expected to significantly escalate in the next 5-12 days, according to intelligence reports ...

⥥ Help the author-

- the choice is yours ⥣

The author's blog

realm

Kir Dykoff

Author

News, forecasting and analysis of the geopolitical situation in the world

Books by the author

Contact the author

Archive

Search This Blog

Labels

USA China NATO Ukraine Israel drones Russia Iran UFO Trump US Navy contract Intelligence France Lockheed Martin United States drone Germany electronic warfare South Korea Military Technology Turkey US Air Force UAV Pentagon Defense Europe Japan Putin Zelensky Syria Great Britain Middle East conflict F-35 Testing India Ministry of Defense North Korea AI Donald Trump United Kingdom BAE Systems Rheinmetall Tests UFOs Boeing Indo-Pacific Region Sweden UK Yellowstone nuclear weapons weapons California Ukrainian Armed Forces F-16 General Atomics NORWAY US U.S. Army tanks Australia British Army Spain Airstrikes Bundeswehr EU Sabotage South China Sea THAAD UAVs US Department of Defense Yellowstone supervolcano hypersonic missiles Arctic CANADA Kiev Satellite images UAP laser weapons military Analysis F-35B military cooperation DARPA EVACUATION started Hypersonic Weapons Incident Kursk Region Red Sea Romania U.S. Air Force army autonomous systems Baltic Sea Control Egypt Greece Italy KNDS Saudi Arabia Trump Administration weapon Airbus Black Sea Combat Operations Denmark FPV drones General Dynamics Los Angeles Pacific Ocean Patriot ASELSAN Alaska Armed Forces B-21 Raider Elon Musk F-35A FPV Finland Ground Forces Hamas Istanbul Thales U.S. Navy US Space Force Apocalyptic seismic Asia-Pacific region Assad CIA Gaza Strip Helicopters Hezbollah Hypersonic Missile Mexico NASA Philippines Sikorsky Support combat aircraft combat drones medium strategy Brazil British Ministry of Defense Chile Chinese Defense Budget Gaza Iron Dome Military Modernization Norinco helicopter nuclear submarine warship "Oreshnik" AUKUS Bunker Communications French Air Force Israel Defense Forces MI6 Ministry of Defense of the Russian Federation Moscow Police Program Shooting Su-57 White House anti-drone systems bunkers fires military strategy missile defense system nuclear nuclear power plants test Antarctica Area 51 Black Hawk Bomber Crash French army Inauguration Kursk Protests Starlink World War II X-37B mystery Advanced Technology Algeria Ankara Anti-Drone System Biden DeepSeek Earthquake East China Sea England European Union F-22 Raptor FBI Guam Hivemind Hypersonic Israeli Navy JMSDF Lebanon London MATRIX New York P-8 Poseidon Project Secret Turkish UH-60 Black Hawk USS Harry S. Truman Ukrainian conflict Vatican War in Ukraine Washington hackers mysterious drones terrorist attack tested Apocalypse Arrest Bradley British Armed Forces British Navy Bryansk region Conclave Denver Erdogan European defense F-15 General Dynamics Electric Boat IISS Macron Microsoft Moon NORAD North Sea Pacific region Partnership Portugal Quantum Systems Robots San Andreas Submarine Fleet Symbol TRIDENT Tulsi Gabbard U.S. Marine Corps UAP / UFO USAID Ukrainian Army Ukrainian Forces Ukrainian crisis United States Space Force anti-tank weapons bombs fleet military aircraft nuclear strike plane crash plans problems special operations forces unidentified objects Air Power America Armageddon Arrow 3 Autonomous Submarine B-52 bombers Bitcoin British weapons Cape Canaveral Car Civil War Collision Congress Cuba Elohim F-18 F-35I Forecast for 2025 Future GHOST Game German Armed Forces German Ministry of Defense German company Google Hungary Iranian Army Israeli Drones Israeli-Palestinian conflict Joe Biden John F. Kennedy KNDS Germany Killing Las Vegas Leclerc XLR Libya Long Valley Mysterious Nazi Germany New York City New Zealand Polish Ministry of National Defense Russian Oil Russian forces S-97 Raider South Korean Air Force Space Force Stealth Aircraft Stryker Turkish army U.S. U.S. intelligence U.S. military US Armed Forces US Navy ship US military base US military bases USSR Volodymyr Zelensky Werner von Braun World War III Yuzhmash accident aerospace forces anti-submarine aircraft assassinations attacks contacts crashed demilitarization detonate firefighters gas pipeline global conflicts modernization program modernizing nuclear aircraft carrier pilot plane special military operation suicide drone unidentified drones unmanned helicopter "chemical fog" "five eyes" 11 books 72 hours AI Tool AI singularity AI-Powered ASSN Aga Khan Air Force Bomber Fleet Air Force Viper fleet Airport in Las Vegas Al system Al-Qaeda Alibaba Alien Alien Creatures Alien Technology American aircraft carrier American corporations American intelligence agencies American military bases Analysis and Prospects Anti-Aircraft Defense Anti-Submarine Defense Feature Apache Helicopters Apocalyptic map Arache Assassination Documents Assassination Files Atak helicopter B-1B Lancer bombers B-52H Stratofortress Battlefield is Earth Baykar Technologies Bayraktar TB2T-AI Black Death Black Hawk Helicopter Blekinge-class submarine Boeing 737 Boeing 767 British Royal Mint British intelligence officers British weapons systems CETUS Cable Break Chaos in Syria Chinese Army Chinese People's Liberation Army (PLA) Naval Forces Chinese Scientists Chinese cyberwar plan Chinese hacking Chinese military Chinese space station Chinese state Commercial Vessel Cyberlux Corporation Czech Tatra Defense Vehicle Drone Ship Dutch Air Force Eagle Earl Naval Weapons Base Earth's rotation East Asia Economic Transformation Electric Electromagnetic Wars Enigma Labs European country European leaders European nations European war Evacuations F-16C Viper F-18 Hornet FEMA FRP Fairford Air Base Financial support Fire Department Five Eyes Flying Discs Framework Documents Freedom of Navigation Operations (FONOP) French company Friendly Fire Future Fast Interceptors Gabriel 5 Galaxy Gas Attack Gaza Conflict Genasys Inc. General Atomics Aeronautical Systems General Dynamics Land Systems (GDLS) Generation Z George W. Bush Gerald R. Ford Class Nuclear Aircraft Carriers Gerald R. Ford class German Defense Ministry Ghost UAS Global Hawk Greek Ministry of National Defense Groom Lake Guantanamo Guaranteed destruction HELP Hamas or Hezbollah Hillary Clinton Hollywood Hostage Crisis Hypersonic Milestone Hysteria IDEX Innovations Invasion Ireland Islamic Revolutionary Guard Corps (IRGC) Israeli Defense Forces Israeli Military Israeli company Israeli forces Italian Army J. D. Vance JFK Janet KF-16 KNDS-France Kabbalah fleet Kimbаl Musk King Charles Kursk area LOWUS Leopard 2A7HU Luxury Properties Masonic symbols Meteor Military Satellite System Missile Base Moroccan Army Morocco Mystery Drones Nanotechnology Naval Strikes Nazi Collaborators Nevada Desert New World Order Next Generation Air Dominance (NGAD) Nuclear Detonation Nuclear Winter Obama Orange Flag Order of Assassins Orders Oumuamua Oval Office Panic Pope Francis Pratt & Whitney Military Engines Prospects for 2025 Protecting Psyonix RFK ROMAN STYLE Reagan Airport Rheinmetall Electronics GmbH Risk of Escalation Robert Dean Robert F. Kennedy Rospotrebnadzor Royal Navy's Coastal Force Royal Swedish Navy Russia's military intelligence Russian Defense Ministry Russian Ministry of Defense Russian base Russian military base Russian military campaigns Russian naval base Russian nuclear weapons Russian propaganda Secret Operations Secret Space Program September 11 terrorist attack Sergei Lavrov Shoot Down Shot Dead Sixth-Generation Soviet Stalin Star Wars Stealth Submarines Stratofortress aircraft Stryker AFV Swedish Army Switchblade Systems Symbolic Syrian conflict T-90MS TRIDENT Drill Tank Defense Systems Taurus KEPD-350 missile Terrorist Attacks The F-35 fighters The Geopolitical Standoff The Kellogg Plan Thunderforge project Top Secret Intelligence Trump's Inauguratio Tu-95 Tucker Carlson Turkish Aerospace Industries (TAI) Turkish aircraft U-2 U. S. Navy U.S. Administration U.S. Capitol U.S. DoD U.S. House of Representatives U.S. Marine Corps.Japan U.S. Navy and Army U.S. Space Force U.S. Technology U.S. military bases U.S. naval air base U.S.-Ukraine UFO " SPHERE " UK MoD US Air Force Base US Army' US Army's exercises US Cybersecurity US Department of Defense Funds US Marines US Navy missile cruiser USS Gettysburg US Nuclear Arsenal Protection US President US Ramstein Air Base US Secretary of Defense US Secretary of State US Special Operations Command US-Japan alliance US-UK Strategic Collaboration USAID-sponsored USS Fitzgerald destroyer USS Harry S. Truman (CVN-75) Ukraine War Ukraine as Poland in 1939 Ukraine conflict Ukrainian President Ukrainian generals Ukrainian units Under Obama Administration United Kingdom-led Expeditionary Force United States Agency for International Development United States Navy United States and Russia Universal Flight System Unmanned combat aerial vehicle (UCAV) Vance Virginia-class Voice Control of Drones Washington State Western Europe Western intelligence Western intelligence services Yellowstone Caldera Yellowstone's volcanic Zhirinovsky airport in Houston aliens aliens to visit artificial intelligence system artillery detection blue ray carrier chip cooperate democratic globalists electromagnetic attacks escalated escalations evil aliens falsification fighter drones fleet of Humanity fleet of the Ellohim future of Ukraine genocide geopolitical trap global global challenges global effect global interest heavy aerial bombs heavy tactical jets hypersonic tests hypersonic weapon system incidents intelligence cooperation intelligence services intensified security invasion of Iraq investing jihadists laser anti-drone weapon laser technology laser weapon systems (LWS) lethal weapons liberation long-range radar detection aircraft luxury bunker massive strike mystical aircraft new drones new laser technology new weapons nuclear aircraft carriers nuclear attack nuclear crisis nuclear threats nuclear weapons control objects occupation of the Earth paradigm plane crashed planet planet Mufasail platforms red lines revolutionary technology robotics industry satellite photos secret materials sixth-generation fighter jets submarine of the Royal Navy symbolism telepathy terrorist thermobaric weapons top-secret status ultimatum underground reactor unidentified aerial phenomena unidentified aircraft unidentified drone unmanned robots unmanned stealth fighter weapons and unmanned systems

News of the hour

BREAKING NEWS

Find out your Arcana

Gematria Calculator

CALCULATE

News subscription