· 6 years ago · Jan 10, 2020, 05:00 PM
1Notes
2
3Bigoted US military research personnel and affiliated University neuroscience [bad] research personnel involved with fraudulent activities "reserve their RIGHT" to use electrical computer engineering to conduct and promote hate, bigotry and fascism, terrorism, and human neuroscience exploitation and fraud to influence mass murder and suicide, the poisonous agenda of malicious brain signals intelligence, artificial intelligence and neural network chatbots to induce mental abuse and trauma of people everywhere! For those serving the welfare of the People and sacrifice(s) you are exempt from this message and we thank you for your good morals and intentions!
4
5Question yourselves, question the transient, question mental illness and mass murders and suicide, morals and fraud, question fraudulent use of U.S military satellite communications-US ARMY Research BCI-cognitive laboratories and neural network systems, question them!
6
7We are the Citizens of the World and We The People reserve our right to share information to the public about your US military personnel's hate crimes and criminal violations of our civil rights and human rights to ensure the protection of our rights, freedoms and liberties, We Will Expose and Exploit you! EXPECT US! END #FASCIST #USWARPIGCRIMINALS #HUMANRIGHTS #JUSTICE #ElectricalComputerEngineering #COGNITIVEneuroscience #hackMILSATCOM
8
9Artificial Intelligence: Risks to Privacy and Democracy
10KM Manheim, L Kaplan - Forthcoming, Yale Journal of Law and …, 2018 - papers.ssrn.com
11… The Inter- net of Things (IoT) has beneficially automated many functions while result- ing in ubiquitous … ian_ag/ 47 TOR protects anonymity by using its own network of routers … DeepFace,” a deep learning facial recognition system [that] employs a nine-layer neural net with over …
12
13https://yjolt.org/sites/default/files/21_yale_j.l._tech._106_0.pdf
14
15US Army Research Laboratory and Universities Electrical Computer Engineering (ECE, EECS) Cognitive Communications Laboratories Brain-Computer Human-Computer BCI neural network chatbot targeted use of bigotry and hate messages spam broadcasting by satellite (MILSATCOM) spread spectrum communications to civilian targets by Adelphi Laboratory Center-Army Research Laboratory, Aberdeen Proving Ground, Maryland arl.army.mil
16Fort Gordon - arcyber.army.mil Army Signal Command, afrl.af.mil personnel are patriotizing and broadcasting that people are "niggers" with "haunted horror house" synthesized musical with "fascist bigotry" bci neural network chatbot, using satellite radio frequency to target areas of the body with satellite radar and electromagnetics using human subject research trafficking as fraud to conduct hate crime
17
18Use signal processing geospatial satellite gps analysis at geolocation (38.8793234, -77.1137295) human research engineering directorate computational sciences information systems directorate neural engineering Adelphi Laboratory Center 2800 Powder Mill Rd, Adelphi, MD 20783 Auditory Vision Speech Language Cognitive BCI Computer Server Laboratory Electrical Computer Engineering Human Neurosciences Department personnel Army Research Office ARO-54228-LS-MUR decoding "imagined speech" from brain signals with military signals intelligence or using text-speech to fabricate fraudulent words phrases racism bigotry information warfare human subject abuses fraud misappropriations trafficking auditory evoked potentials artificial neural network chatbot to spam hate messages wavenet speech synthesis dialogue of bigotry, obscenities and pro-fascist hate messages "pussy" "nigger" "jewish" semitism "pig" "trash" "tweaker" "Mexican" "muslim" "plastic chinese" "motherfucker" "little pussy" "little negro" "pro-slavery south" dixie synthesized instrumental musical tunes through BCI neuroscience signals intelligence fraud, use of radio signals to conduct sexual molestation and sexual abuse of men, women and young children 's genitals and sexual misconduct "whenever we want" cybercoe meade bragg gordon heinous bigotry mass murder suicide psychological trauma
19
20EEG DataCatalog at https://cancta.net
21
22Adelphi Laboratory Center (Army Research Laboratory)
23* The Army Reserve Information Operations Command
24* Unified Cross Domain Services Management Office
25* HQ, U.S. Army Contracting Command (Army Contracting Command –APG, Adelphi Contracting Division)
26* U.S Army 93rd Signal Network - Network Enterprise Center
27* Logistics Readiness Center
28* U.S. Army Cyber Operation Group – 335th Signal Cmmand
29* Blossom Point Research Facility
30* Air Force Research Laboratory afrl.af.mil
31* Space Operations Command (SPOC), Vandenberg Air Force Base, California
32 * 21st Space Wing (21 SW), Peterson Air Force Base, Colorado
33 * 30th Space Wing (30 SW), Vandenberg Air Force Base, California
34 * 45th Space Wing (45 SW), Patrick Air Force Base, Florida
35 * 50th Space Wing (50 SW), Schriever Air Force Base, Colorado
36 * 460th Space Wing (460 SW), Buckley Air Force Base, Colorado
37 * 614th Air and Space Operations Center (614 AOC), Vandenberg Air Force Base, California
38* Space and Missile Systems Center (SMC), Los Angeles Air Force Base, California
39 * 61st Air Base Group (61 ABG), Los Angeles Air Force Base, California
40
41Cognitive-Communications Neuroscience Laboratories involving Electrical Engineering, Computer Engineering, Computational Human Neuroscience Research
42
43CCDC Army Research Laboratory, Human Research and Engineering Directorate, 7101 Mulberry Point Rd, Aberdeen Proving Ground, MD, 21005, USA
44email@mail.mil
45@arl.army.mil
46
47The University of Texas at San Antonio
48Department of Electrical and Computer Engineering, 1 UTSA Circle, San Antonio, TX 78249
49ece.utsa.edu
50
51Georgia Institute of Technology
52Van Leer, Department of Electrical and Computer Engineering, 30332, 777 Atlantic Dr, Atlanta, GA 30313
53ece.gatech.edu
54
55University of Pennsylvania
56Communication Neuroscience Lab
57Philadelphia, PA
58
59The University of Texas
60Department of Electrical and Computer Engineering, 2501 Speedway, Austin, TX 78712
61ece.utexas.edu
62
63Department of Electrical & Computer Engineering, Texas A&M University,
64Wisenbaker Engineering Building 3128, 188 Bizzell St, College Station, TX 77843
65engineering.tamu.edu
66
67Rice University Electrical and Computer Engineering, 6100 Main Street MS 366, Houston, TX 77005
68ece.rice.edu
69
70University of Houston
714800 Calhoun Rd, Houston, TX 77004
72Electrical and Computer Engineering, Houston, TX 77004
73ece.uh.edu
74
75Microelectronics Research Center Department of Electrical and Computer Engineering,
7610100 Harry Ransom Trail, Austin, TX 78758
77mrc.utexas.edu
78
79Texas Tech University
80Dept of Electrical and Computer Engineering,
811012 Boston Ave, Lubbock, TX 79409
82ece.ttu.edu
83
84DCS Corporation
85Alexandria, Virginia
86
87Adelphi Laboratory Center
882800 Powder Mill Rd, Adelphi, MD 20783
89arl.army.mil
90@arl.army.mil
91(39.0296267, -76.9638265)
92
93Air Force Research Laboratory Human Effectiveness Directorate 2255 H Street Wright-Patterson AFB, OH, 45433
94www.sdms.afrl.af.mil
95@afrl.af.mil
96
97Army Research Office
98University of North Texas
99PO Box 12211 - Denton, TX 76203
100@aro.army.mil
101
102Army Research Office
103Research Triangle Park, NC 27709-2211 USA
104aro.army.mil
105
106Intheon, 6020 Cornerstone Ct W Ste 220 San Diego, CA, 92121, USA
107
108Department of Computer Science, University of Texas at San Antonio, One UTSA Circle, San Antonio, 78249, USA
109
110US Army 335th Signal Battalion
111usar.army.mil/335thSC
112@usar.army.mil
113
114Air Force Research Laboratory
115afrl.af.mil
116@afrl.af.mil
117
118Fort Gordon Cyber School Training Battalion
11925701 Barnes Ave, Augusta, GA 30905
120cybercoe.army.mil
121(33.4166430, -82.1408010)
122
123Fort Huachuca, Arizona
124huachuca.army.mil
125
126Fort Detrick, Virginia
127detrick.army.mil
128
129Redstone Arsenal, Alabama
130Army Missile & Materiel Command
131redstone.army.mil
132
133Fort G. Meade - Maryland
134780th Signals Battalion (Signals Command)
135meade.army.mil
136*Use of network electronic radio signals from BCI neural network cognitive laboratory to broadcast information
137
138US Army Cyber Command,
1398825 Beulah St, Fort Belvoir, VA 22060
140arcyber.army.mil
141(38.7193182, -77.1572158)
142
143Fort Bragg - North Carolina
144Information Operations Command
145bragg.army.mil
146
147US Army Research Laboratory
148Aberdeen Proving Ground, MD 21005
149Austin, TX
150(39.0297087, -76.9638134)
151arl.army.mil
152
153Fort Detrick,
154810 Schreider St, Fort Detrick, MD 21702
155
156Applied Research Laboratories, 10000 Burnet Rd, Austin, TX 78758
157arlut.utexas.edu
158
159US Army Research Office
160800 Park Offices Dr, Durham, NC 27703
161aro.army.mil
162(35.8960205, -78.8701693)
163aro.army.mil
164
165https://docplayer.net/2789029-Army-information-architecture-aia.html
166
167US Air Force Research Laboratory, 26 Electronics Parkway, Rome, NY 13441
168wpafb.af.mil
169
170AFRL Sensors Directorate, 2241 Avionics Cir, Wright-Patterson AFB, OH 45433 Avionics Cir, Wright-Patterson AFB, OH 45433
171wpafb.af.mil
172
173Kirtland Air Force Base, 2000 Wyoming Blvd SE, Albuquerque, NM 87123
174kirtland.af.mil
175
176https://www.csee.umbc.edu/csee/research/cadip/docs/NetworkIntrusion/cannady_text.doc
177α0The Application of Artificial Neural Networks to Misuse Detection: Initial Results
178James Cannady James Mahaffey
179Georgia Tech Research Institute Georgia Tech Research Institute
180Georgia Institute of Technology Georgia Institute of Technology
181Atlanta, GA 30332 Atlanta, GA 30332
182email@gtri.gatech.edu
183
184Center for Human Modeling and Simulation University of Pennsylvania
185200 S. 33rd St., Philadelphia, PA 19104-6389
186email@graphics.cis.upenn.edu
187email@cis.upenn.edu
188
189Air Force Space Command (AFSC)
190* Fourteenth Air Force
191 * 50th Space Wing (Host wing)
192 * Headquarters 50th Space Wing
193 * 50th Comptroller Squadron
194 * 50th Operations Group
195 * 1st Space Operations Squadron
196 * 2nd Space Operations Squadron
197 * 3rd Space Experimentation Squadron
198 * 4th Space Operations Squadron
199 * 50th Operations Support Squadron
200 * 50th Network Operations Group
201 * 50th Space Communications Squadron
202 * 22nd Space Operations Squadron
203 * 50th Mission Support Group
204 * 50th Civil Engineer Squadron
205 * 50th Contracting Squadron
206 * 50th Force Support Squadron
207 * 50th Logistics Readiness Flight
208 * 50th Security Forces Squadron
209 * 21st Space Wing
210 * 21st Medical Group
211 * 21st Medical Squadron (GSU)
212 * Space and Missile Systems Center
213 * Detachment 11
214
215Air Combat Command (ACC)
216* US Air Force Warfare Center
217 * 53rd Wing
218 * 53rd Test Management Group
219 * 17th Test Squadron (GSU)
220 * 57th Wing
221 * 57th Adversary Tactics Group
222 * 527th Space Aggressor Squadron (GSU)
223 * Nevada Test and Training Range
224 * 25th Space Range Squadron (GSU)
225* Twenty-Fifth Air Force
226 * Air Force Technical Applications Center
227 * Detachment 46 (GSU)
228
229Air Force Reserve Command (AFRC)
230* Tenth Air Force
231 * 310th Space Wing
232 * Headquarters 310th Space Wing
233 * 310th Operations Group
234 * 6th Space Operations Squadron
235 * 7th Space Operations Squadron
236 * 19th Space Operations Squadron
237 * 310th Operations Support Squadron
238 * 310th Security Forces Squadron
239 * 310th Mission Support Group
240 * 310th Security Forces Squadron
241 * 310th Force Support Squadron
242 * 310th Communications Flight
243 * 710th Operations Group
244 * 8th Space Warning Squadron
245 * Detachment 1 (GSU)
246 * 926th Wing
247 * 926th Operations Group
248 * 14th Test Squadron (GSU)
249 * 26th Space Aggressor Squadron (GSU)
250 * 379th Space Range Squadron (GSU)
251United States Army
252Colorado Army National Guard
253* 100th Missile Defense Brigade
254United States Navy
255US Naval Observatory
256* USNO Alternate Master Clock
257
258Department of Defense
259United States Strategic Command
260* Joint Functional Component Command for Integrated Missile Defense
261* National Space Defense Center
262
263Missile Defense Agency
264* Missile Defense Integration and Operations Center
265National Reconnaissance Office
266* NRO Operations Squadron
267
268See also
269* Communications satellites
270* Milstar
271* Satellite navigation systems
272
273#RESIST #STOP #END US ARMY Adelphi Laboratory Center Aberdeen Proving Ground, Maryland neuroscience human & animal subject research fraud FASCIST CRIMINAL PERSONNEL arcyber.army.mil coe.army.mil belvoir.army.mil gordon.army.mil huachuca.army.mil aro.army.mil arl.army.mil .civ
274
275Adelphi Laboratory Center Fort Gordon Bragg Meade Huachuca electrical computer engineering neuroscience personnel bci computer lab auditory neuroscience fraud by adelphi laboratory center aberdeen proving ground maryland inside auditory vision speech cognitive laboratory using signal processing use of artificial intelligence neural network chatbot and wavenet text-to-speech on server client computer machines to spam bigotry hate speech "nigger" "jewish" semitism rhetoric anti-"muslim" "pussy" anti-homosexuality "faggot" anti-hispanic anti-black anti-racial use of neural network chatbot to spam anti-lgbt pro-fascist rhetoric through auditory neuroscience and Army Signals Command broadcasting wireless telecommunications satellite radar directed by adelphi-army research laboratory aberdeen proving ground maryland cyber information warfare arl.army.mil gordon.army.mil coe.army.mil arcyber.army.mil targeting arthritis neuroscience paresthesia with intent to harass, provoke and cause reckless endangerment leading to potential risk of harm and danger
276
277Involving the use of US Army Research Laboratory-Aberdeen Proving Ground, Maryland electrical computer engineering to track, target and exploit targeted human subjects and mental abuse through the hostile and fraudulent use of bci, auditory visual speech language processing and cognitive neurosciences, US Army Cyber and Information Operations, artificial intelligence, neural network chatbot and wavenet speech and auditory synthesis to incite and provoke terrorism in human subjects by simulating violence and fear to further commit malicious acts of terrorism against national security through mental abuse, trauma and schizophrenia.
278
279References
280
281https://scholar.google.com/citations?user=opgkEvkAAAAJ&hl=en&oi=sra
282
283[PDF] upenn.edu
284Consistent communication with control
285J Allbeck, NI Badler - Center for Human Modeling and …, 2001 - repository.upenn.edu
286We are seeking to outline a framework to create embodied agents with consistency both in terms of human actions and communications in general and individual humans in particular. Our goal is to drive this consistent behavior from internal or cognitive models of the agents …
287
288
289https://scholar.google.ch/scholar?cites=5613418846520958443&as_sdt=2005&sciodt=0,5&hl=en
290
291Mental state and emotion detection from musically stimulated EEG
292AL Tandle, MS Joshi, AS Dharmadhikari, SV Jaiswal - Brain informatics, 2018 - Springer
293This literature survey attempts to clarify different approaches considered to study the impact of the musical stimulus on the human brain using EEG Modality. Glancing at the field through various aspects of such studies specifically an experimental protocol, the EEG …
294
295Brain signal based human emotion analysis by circular back propagation and Deep Kohonen Neural Networks
296DJ Hemanth, J Anitha - Computers & Electrical Engineering, 2018 - Elsevier
297Human emotion analysis is one of the challenging tasks in today's scenario. The success rate of human emotion recognition has high implication in practical applications such as Human Machine Interaction, anomaly detection, surveillance, etc. Artificial Neural Networks …
298
299Human stress classification using EEG signals in response to music tracks
300A Asif, M Majid, SM Anwar - Computers in biology and medicine, 2019 - Elsevier
301Stress is inevitably experienced by almost every person at some stage of their life. A reliable and accurate measurement of stress can give an estimate of an individual's stress burden. It is necessary to take essential steps to relieve the burden and regain control for better health …
302
303[HTML] springer.com
304Mental state and emotion detection from musically stimulated EEG
305AL Tandle, MS Joshi, AS Dharmadhikari, SV Jaiswal - Brain informatics, 2018 - Springer
306This literature survey attempts to clarify different approaches considered to study the impact of the musical stimulus on the human brain using EEG Modality. Glancing at the field through various aspects of such studies specifically an experimental protocol, the EEG …
307
308[PDF] researchgate.net
309Human emotion classification from EEG signals using multiwavelet transform
310V Bajaj, RB Pachori - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
311In this paper, we propose new features based on multiwavelet transform for classification of human emotions from electroencephalogram (EEG) signals. The EEG signal measures electrical activity of the brain, which contains lot of information related to emotional states …
312
313[PDF] mdpi.com
314Review and classification of emotion recognition based on EEG brain-computer interface system research: a systematic review
315A Al-Nafjan, M Hosny, Y Al-Ohali, A Al-Wabil - Applied Sciences, 2017 - mdpi.com
316Recent developments and studies in brain-computer interface (BCI) technologies have facilitated emotion detection and classification. Many BCI studies have sought to investigate, detect, and recognize participants' emotional affective states. The applied domains for these …
317
318[PDF] uni-augsburg.de
319From physiological signals to emotions: Implementing and comparing selected methods for feature extraction and classification
320J Wagner, J Kim, E André - 2005 IEEE international conference …, 2005 - ieeexplore.ieee.org
321… Table 4. Recognition results with sets of emotions … 20 data sets of a single subject consecutively ex- pressing eight emotional states were collected. In this ex- periment, the such bject used specific images as cues during each emotion episode …
322
323[PDF] jst.go.jp
324Quantification of human stress using commercially available single channel EEG Headset
325SMU Saeed, SM Anwar, M Majid - IEICE Transactions on Information …, 2017 - jstage.jst.go.jp
326抄録 A study on quantification of human stress using low beta waves of electroencephalography (EEG) is presented. For the very first time the importance of low beta waves as a feature for quantification of human stress is highlighted. In this study, there …
327
328Human emotion recognition and analysis in response to audio music using brain signals
329AM Bhatti, M Majid, SM Anwar, B Khan - Computers in Human Behavior, 2016 - Elsevier
330Human emotion recognition using brain signals is an active research topic in the field of affective computing. Music is considered as a powerful tool for arousing emotions in human beings. This study recognized happy, sad, love and anger emotions in response to audio …
331
332An approach to EEG-based emotion recognition using combined feature extraction method
333Y Zhang, X Ji, S Zhang - Neuroscience letters, 2016 - Elsevier
334EEG signal has been widely used in emotion recognition. However, too many channels and extracted features are used in the current EEG-based emotion recognition methods, which lead to the complexity of these methods This paper studies on feature extraction on EEG …
335
336Toward automatic detection of brain responses to emotional music through analysis of EEG effective connectivity
337H Shahabi, S Moghimi - Computers in Human Behavior, 2016 - Elsevier
338The purpose of this study was to investigate the effective brain networks associated with joyful, melancholic, and neutral music. Connectivity patterns among EEG electrodes in different frequency bands were extracted by multivariate autoregressive modeling while 19 …
339
340[PDF] semanticscholar.org
341Emotion recognition from physiological signals using wireless sensors for presence technologies
342F Nasoz, K Alvarez, CL Lisetti, N Finkelstein - Cognition, Technology & …, 2004 - Springer
343In this article we describe a new approach to enhance presence technologies. First, we discuss the strong relationship between cognitive processes and emotions and how human physiology is uniquely affected when experiencing each emotion. Secondly,
344
345The Acoustic Cue of Fear: Investigation of Acoustic Parameters of Speech Containing Fear
346T ÖZSEVEN - Archives of Acoustics, 2018 - acoustics.ippt.gov.pl
347Speech emotion recognition is an important part of human-machine interaction studies. The acoustic analysis method is used for emotion recognition through speech. An emotion does not cause changes on all acoustic parameters. Rather, the acoustic parameters affected by …[PDF] ippt.gov.pl
348
349Machine learning for decoding listeners' attention from electroencephalography evoked by continuous speech
350T de Taillez, B Kollmeier… - European Journal of …, 2017 - Wiley Online Library
351Previous research has shown that it is possible to predict which speaker is attended in a multispeaker scene by analyzing a listener's electroencephalography (EEG) activity. In this study, existing linear models that learn the mapping from neural activity to an attended …
352
353EEG-based auditory attention detection: boundary conditions for background noise and speaker positions
354N Das, A Bertrand, T Francart - Journal of neural engineering, 2018 - iopscience.iop.org
355Objective. A listener's neural responses can be decoded to identify the speaker the person is attending to in a cocktail party environment. Such auditory attention detection methods have the potential to provide noise suppression algorithms in hearing devices with information …[PDF] biorxiv.org
356
357Real-time tracking of selective auditory attention from M/EEG: A bayesian filtering approach
358S Miran, S Akram, A Sheikhattar, JZ Simon… - Frontiers in …, 2018 - ncbi.nlm.nih.gov
359Humans are able to identify and track a target speaker amid a cacophony of acoustic interference, an ability which is often referred to as the cocktail party phenomenon. Results from several decades of studying this phenomenon have culminated in recent years in …
360
361EEG-based detection of the attended speaker and the locus of auditory attention with convolutional neural networks
362L Deckers, N Das, AH Ansari, A Bertrand, T Francart - bioRxiv, 2018 - biorxiv.org
363When multiple people talk simultaneously, the healthy human auditory system is able to attend to one particular speaker of interest. Recently, it has been demonstrated that it is possible to infer to which speaker someone is attending by relating the neural activity …[PDF] biorxiv.org
364
365Stimulus-aware spatial filtering for single-trial neural response and temporal response function estimation in high-density EEG with applications in auditory research
366N Das, J Vanthornhout, T Francart, A Bertrand - bioRxiv, 2019 - biorxiv.org
367Objective. Neural responses recorded using electroencephalography (EEG) and magnetoencephalography (MEG) can be used to study how our brain functions, as well as for various promising brain computer interface (BCI) applications. However, a common …[PDF] biorxiv.org
368
369The human neural alpha response to speech is a proxy of attentional control
370M Wöstmann, SJ Lim, J Obleser - Cerebral cortex, 2017 - academic.oup.com
371Abstract Human alpha (~ 10 Hz) oscillatory power is a prominent neural marker of cognitive effort. When listeners attempt to process and retain acoustically degraded speech, alpha power enhances. It is unclear whether these alpha modulations reflect the degree of …
372
373Frequency modulation entrains slow neural oscillations and optimizes human listening behavior
374MJ Henry, J Obleser - … of the National Academy of Sciences, 2012 - National Acad Sciences
375The human ability to continuously track dynamic environmental stimuli, in particular speech, is proposed to profit from “entrainment” of endogenous neural oscillations, which involves phase reorganization such that “optimal” phase comes into line with temporally expected …https://www.pnas.org/content/pnas/109/49/20095.full.pdf
376
377Interpretations of frequency domain analyses of neural entrainment: periodicity, fundamental frequency, and harmonics
378H Zhou, L Melloni, D Poeppel, N Ding - Frontiers in human …, 2016 - frontiersin.org
379Brain activity can follow the rhythms of dynamic sensory stimuli, such as speech and music, a phenomenon called neural entrainment. It has been hypothesized that low-frequency neural entrainment in the neural delta and theta bands provides a potential mechanism to …
380
381Game science
382
383[PDF] psu.edu
384[B] Spread spectrum communications handbook
385MK Simon, JK Omura, RA Scholtz, BK Levitt - 1994 - Citeseer
386… 354 5.8.4 Reed-Solomon Sequences 355 … 1173 3.5 The Potential Capacity of Direct Sequence Spread Spectrum CDMA in High-Density Networks 1176 … Not more than a decade ago, the discipline of spread-spectrum (SS) communications was primarily cloaked in secrecy …
387
388[B] The Telecommunications Handbook: Engineering guidelines for fixed, mobile and satellite systems
389JTJ Penttinen - 2015 - books.google.com
390… 5.8.1 General 5.8.2 Bluetooth RF 5.8.3 Bluetooth Profiles Hearing Aid Compatibility … 8.4.1 Streaming 8.5 Health Care 8.6 Education 8.7 CSTA 8.8 Advanced Telecommunications Functionalities 8.8 … Access Points 8.11.1 VoIP as a Solution for Fixed Communications Networks 8.11 …
391
392Mechanisms underlying selective neuronal tracking of attended speech at a “cocktail party”
393EMZ Golumbic, N Ding, S Bickel, P Lakatos… - Neuron, 2013 - Elsevier
394The ability to focus on and understand one talker in a noisy social environment is a critical social-cognitive capacity, whose underlying neuronal mechanisms are unclear. We investigated the manner in which speech streams are represented in brain activity and the …
395
396Tracking the signal, cracking the code: Speech and speech comprehension in non-invasive human electrophysiology
397M Wöstmann, L Fiedler, J Obleser - Language, Cognition and …, 2017 - Taylor & Francis
398Magneto-and electroencephalographic (M/EEG) signals recorded from the human scalp have allowed for substantial advances for neural models of speech comprehension over the past decades. These methods are currently advancing rapidly and continue to offer …
399
400Acoustic landmarks drive delta–theta oscillations to enable speech comprehension by facilitating perceptual parsing
401KB Doelling, LH Arnal, O Ghitza, D Poeppel - Neuroimage, 2014 - Elsevier
402A growing body of research suggests that intrinsic neuronal slow (< 10 Hz) oscillations in auditory cortex appear to track incoming speech and other spectro-temporally complex auditory signals. Within this framework, several recent studies have identified critical-band …
403
404Entrained neural oscillations in multiple frequency bands comodulate behavior
405MJ Henry, B Herrmann… - Proceedings of the …, 2014 - National Acad Sciences
406Our sensory environment is teeming with complex rhythmic structure, to which neural oscillations can become synchronized. Neural synchronization to environmental rhythms (entrainment) is hypothesized to shape human perception, as rhythmic structure acts to …[PDF] pnas.or
407
408A unified audio and image steganography by spectrum modification
409K Gopalan - 2009 IEEE International Conference on Industrial …, 2009 - ieeexplore.ieee.org
410A method of embedding information in the spectral domain of a cover audio and a cover image that can be extended to video frames is proposed. The technique exploits the imperceptibility of human auditory and visual systems at low levels of spectral changes. By …
411
412Steganalysis: The investigation of hidden information
413NF Johnson, S Jajodia - … Environment for the Future (Cat. No …, 1998 - ieeexplore.ieee.org
414… enforcement concerned in trafficking of illicit material via web page images, audio, and other … Development in the area of covert communications and steganography will continue … Systems to recover seemingly destroyed information and steganalysis techniques will be useful to …[PDF] academia.edu
415
416The first 50 years of electronic watermarking
417IJ Cox, ML Miller - EURASIP Journal on Advances in Signal Processing, 2002 - Springer
418Electronic watermarking can be traced back as far as 1954. The last 10 years has seen considerable interest in digital watermarking, due, in large part, to concerns about illegal piracy of copyrighted content. In this paper, we consider the following questions: is the …[PDF] springer.com
419
420A survey on audio steganography approaches
421KU Singh - International Journal of Computer Applications, 2014 - Citeseer
422Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. All of the existing steganographic techniques use the digital multimedia files as …[PDF] psu.edu
423
424Audio steganography for covert data transmission by imperceptible tone insertion
425K Gopalan, S Wenndt - Proc. The IASTED International …, 2004 - researchgate.net
426This paper presents the technique of embedding data in an audio signal by inserting low power tones and its robustness to noise and cropping of embedded speech samples. Experiments on the embedding procedure applied to cover audio utterances from noise-free …[PDF] researchgate.net
427
428Spread-spectrum watermarking of audio signals
429D Kirovski, HS Malvar - IEEE transactions on signal processing, 2003 - ieeexplore.ieee.org
430Watermarking has become a technology of choice for a broad range of multimedia copyright protection applications. Watermarks have also been used to embed format-independent metadata in audio/video signals in a way that is robust to common editing. In this paper, we …[PDF] psu.edu
431
432Hiding information in noise: Fundamental limits of covert wireless communication
433BA Bash, D Goeckel, S Guha, D Towsley - arXiv preprint arXiv:1506.00066, 2015 - arxiv.org
434… As in steganography and spread spectrum communication, prior to communicating, Alice and Bob may share a … rate covert communication, ie reliable transmission of O(n) covert bits in n … In general, the circumstances that allow Alice to covertly communicate with Bob at positive …[PDF] arxiv.org
435
436Multiband OFDM for covert acoustic communications
437G Leus, PA Van Walree - … Selected Areas in Communications, 2008 - ieeexplore.ieee.org
438… Communications (UCAC) aims at the estab- lishment of a covert communication link between … Literature on covert underwater communications is scarce, with the characteristics of the … Direct-sequence spread spectrum is a logical candidate modulation to achieve acoustic data …[PDF] psu.edu
439
440A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
441M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
442Ready or not, the digitalization of information has come, and privacy is standing out there, possibly at stake. Although digital privacy is an identified priority in our society, few systematic, effective methodologies exist that deal with privacy threats thoroughly. This …[PDF] core.ac.uk
443
444Covert communications employing wavelet technology
445R Orr, C Pike, M Bates, M Tzannes… - … on Signals, Systems …, 1993 - ieeexplore.ieee.org
446… F; + jFq contains values which we take to be complex-valued spread spectrum chip amplitudes … whereas the wavelet system does so via either pulse filter spectrum shaping or … System The culmination of the plan to develop wavelet- based covert communications contains three …
447
448Spread spectrum for commercial communications
449DL Schilling, LB Milstein, RL Pickholtz… - … Communications …, 1991 - ieeexplore.ieee.org
450… operates and explain why the FCC has allocated several spectral bands for … In particular, they discuss the use of spread spectrum for mobile cellular communications: the … communications in the stock exchange; police radars, radios, and covert communications, and amateur …
451
452Cross-layered resource allocation in UWB noise-OFDM-based ad hoc surveillance networks
453SC Surender, RM Narayanan… - EURASIP Journal on …, 2013 - biomedcentral.com
454Situational awareness in military surveillance and emergency responder scenarios requires detection of long range targets and secure communication of this information across a multi-sensor network. A potential approach towards this requirement is to harness the coexisting …
455
456Key Exchange Using Random Signals and Feedback—Statistical Analysis
457PL Liu - Journal of Lightwave Technology, 2010 - osapublishing.org
458Randomness plays an important role in secure communications. Instead of high SNR, the goal is to make signal small and fluctuations large. Statistical analysis is performed to determine signals and fluctuations in a recently proposed key exchange protocol. Ensemble …
459
460Radar research at The Pennsylvania State University Radar and Communications Laboratory
461RM Narayanan - Radar Sensor Technology XXI, 2017 - spiedigitallibrary.org
462The Radar and Communications Laboratory (RCL) at The Pennsylvania State University is at the forefront of radar technology and is engaged in cutting edge research in all aspects of radar, including modeling and simulation studies of novel radar paradigms, design and …
463
464Waveform design for radar-embedded communications exploiting spread spectrum technology
465B Li, J Lei, W Cao, L Wen, Y Mou - IET Communications, 2016 - IET
466Radar-embedded communication (REC) provides a reliable and low probability of intercept (LPI) communication link to the intended receivers while masking its presence from intercept receivers. This study summarises all the waveform design schemes as well as receiver …
467[PDF] researchgate.net
468
469High-throughput, cyber-secure multiuser superposition covert avionics system
470Y Xu, G Wang, S Wei, E Blasch… - IEEE Aerospace and …, 2018 - ieeexplore.ieee.org
471With the ever-growing attention on advanced cyber threats to aerospace systems, research activities on cyber resiliency have accelerated in both academic and industrial communities. For example, in mobile wireless devices, machine-to-machine architectures, as well as …
472
473Design, analysis, and performance of a noise modulated covert communications system
474J Chuang, MW DeMay, RM Narayanan - EURASIP Journal on Wireless …, 2008 - Springer
475
476Neural network-based evaluation of chronic non-thermal effects of modulated 2450 MHz microwave radiation on electroencephalogram
477RK Sinha, Y Aggarwal, PK Upadhyay… - Annals of biomedical …, 2008 - Springer
478
479Estimation of highly Selective Channels for Downlink LTE MIMO-OFDM System by a Robust Neural Network.
480A Omri, R Hamila, MO Hasna, R Bouallegue… - JUSPN, 2011 - researchgate.net
481
482New transmission scheme for MIMO-OFDM
483A Omri, R Bouallegue - International Journal of Next Generation …, 2011 - researchgate.net
484
485Multi-pitch estimation exploiting block sparsity
486SI Adalbjörnsson, A Jakobsson, MG Christensen - Signal Processing, 2015 - Elsevier
487[PDF] psu.edu
488
489Beampattern synthesis for wideband MIMO radar systems
490G San Antonio, DR Fuhrmann - 1st IEEE International …, 2005 - ieeexplore.ieee.org
491
492[PDF] Wavelets and signal processing
493O Rioul, M Vetterli - IEEE signal processing magazine, 1991 - infoscience.epfl.ch
494
495Automatic modulation recognition using wavelet transform and neural networks in wireless systems
496K Hassan, I Dayoub, W Hamouda… - EURASIP Journal on …, 2010 - biomedcentral.com
497
498Neural network predistortion technique for digital satellite communications
499M Ibnkahla - 2000 IEEE International Conference on Acoustics …, 2000 - ieeexplore.ieee.org
500
501Orthogonal neural network based predistortion for OFDM systems
502N Rodriguez, C Cubillos - Electronics, Robotics and …, 2007 - ieeexplore.ieee.org
503
504Target classification using the deep convolutional networks for SAR images
505S Chen, H Wang, F Xu, YQ Jin - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
506
507Harassment
50876-5-106. Harassment.
509(1) A person is guilty of harassment if, with intent to frighten or harass another, he communicates a written or recorded threat to commit any violent felony.
510(2) Harassment is a class B misdemeanor.
511
51276-5-106.5. Stalking -- Definitions -- Injunction -- Penalties --
513(1) As used in this section:
514(a) "Conviction" means:
515(i) a verdict or conviction;
516(ii) a plea of guilty or guilty and mentally ill;
517(iii) a plea of no contest; or
518(iv) the acceptance by the court of a plea in abeyance.
519(b) "Course of conduct" means two or more acts directed at or toward a specific person, including:
520(i) acts in which the actor follows, monitors, observes, photographs, surveils, threatens, or communicates to or about a person, or interferes with a person's property:
521(A) directly, indirectly, or through any third party; and
522(B) by any action, method, device, or means; or
523(ii) when the actor engages in any of the following acts or causes someone else to engage in any of these acts:
524(A) approaches or confronts a person;
525(B) appears at the person's workplace or contacts the person's employer or coworkers;
526(C) appears at a person's residence or contacts a person's neighbors, or enters property owned, leased, or occupied by a person;
527(D) sends material by any means to the person or for the purpose of obtaining or disseminating information about or communicating with the person to a member of the person's family or household, employer, coworker, friend, or associate of the person;
528(E) places an object on or delivers an object to property owned, leased, or occupied by a person, or to the person's place of employment with the intent that the object be delivered to the person; or
529(F) uses a computer, the Internet, text messaging, or any other electronic means to commit an act that is a part of the course of conduct.
530(c) "Emotional distress" means significant mental or psychological suffering, whether or not medical or other professional treatment or counseling is required.
531(d) "Immediate family" means a spouse, parent, child, sibling, or any other person who regularly resides in the household or who regularly resided in the household within the prior six months.
532(e) "Reasonable person" means a reasonable person in the victim's circumstances.
533(f) "Stalking" means an offense as described in Subsection (2) or (3).
534(g) "Text messaging" means a communication in the form of electronic text or one or more electronic images sent by the actor from a telephone or computer to another person's telephone or computer by addressing the communication to the recipient's telephone number.
535(2) A person is guilty of stalking who intentionally or knowingly engages in a course of conduct directed at a specific person and knows or should know that the course of conduct would cause a reasonable person:
536(a) to fear for the person's own safety or the safety of a third person; or
537(b) to suffer other emotional distress.
538(3) A person is guilty of stalking who intentionally or knowingly violates:
539(a) a stalking injunction issued pursuant to Title 77, Chapter 3a, Stalking Injunctions; or
540(b) a permanent criminal stalking injunction issued pursuant to this section.
541(4) In any prosecution under this section, it is not a defense that the actor:
542(a) was not given actual notice that the course of conduct was unwanted; or
543(b) did not intend to cause the victim fear or other emotional distress.
544(5) An offense of stalking may be prosecuted under this section in any jurisdiction where one or more of the acts that is part of the course of conduct was initiated or caused an effect on the victim.
545(6) Stalking is a class A misdemeanor:
546(a) upon the offender's first violation of Subsection (2); or
547(b) if the offender violated a stalking injunction issued pursuant to Title 77, Chapter 3a, Stalking Injunctions.
548(7) Stalking is a third degree felony if the offender:
549(a) has been previously convicted of an offense of stalking;
550(b) has been previously convicted in another jurisdiction of an offense that is substantially similar to the offense of stalking;
551(c) has been previously convicted of any felony offense in Utah or of any crime in another jurisdiction which if committed in Utah would be a felony, in which the victim of the stalking offense or a member of the victim's immediate family was also a victim of the previous felony offense;
552(d) violated a permanent criminal stalking injunction issued pursuant to Subsection (9); or
553(e) has been or is at the time of the offense a cohabitant, as defined in Section 78B-7-102, of the victim.
554(8) Stalking is a second degree felony if the offender:
555(a) used a dangerous weapon as defined in Section 76-1-601 or used other means or force likely to produce death or serious bodily injury, in the commission of the crime of stalking;
556(b) has been previously convicted two or more times of the offense of stalking;
557(c) has been convicted two or more times in another jurisdiction or jurisdictions of offenses that are substantially similar to the offense of stalking;
558(d) has been convicted two or more times, in any combination, of offenses under Subsection (7)(a), (b), or (c);
559(e) has been previously convicted two or more times of felony offenses in Utah or of crimes in another jurisdiction or jurisdictions which, if committed in Utah, would be felonies, in which the victim of the stalking was also a victim of the previous felony offenses; or
560(f) has been previously convicted of an offense under Subsection (7)(d) or (e).
561(9)
562(a) The following serve as an application for a permanent criminal stalking injunction limiting the contact between the defendant and the victim:
563(i) a conviction for:
564(A) stalking; or
565(B) attempt to commit stalking; or
566(ii) a plea to any of the offenses described in Subsection (9)(a)(i) accepted by the court and held in abeyance for a period of time.
567(b) A permanent criminal stalking injunction shall be issued by the court at the time of the conviction. The court shall give the defendant notice of the right to request a hearing.
568(c) If the defendant requests a hearing under Subsection (9)(b), it shall be held at the time of the conviction unless the victim requests otherwise, or for good cause.
569(d) If the conviction was entered in a justice court, a certified copy of the judgment and conviction or a certified copy of the court's order holding the plea in abeyance shall be filed by the victim in the district court as an application and request for a hearing for a permanent criminal stalking injunction.
570(10) A permanent criminal stalking injunction shall be issued by the district court granting the following relief where appropriate:
571(a) an order:
572(i) restraining the defendant from entering the residence, property, school, or place of employment of the victim; and
573(ii) requiring the defendant to stay away from the victim, except as provided in Subsection (11), and to stay away from any specified place that is named in the order and is frequented regularly by the victim;
574(b) an order restraining the defendant from making contact with or regarding the victim, including an order forbidding the defendant from personally or through an agent initiating any communication, except as provided in Subsection (11), likely to cause annoyance or alarm to the victim, including personal, written, or telephone contact with or regarding the victim, with the victim's employers, employees, coworkers, friends, associates, or others with whom communication would be likely to cause annoyance or alarm to the victim; and
575(c) any other orders the court considers necessary to protect the victim and members of the victim's immediate family or household.
576(11) If the victim and defendant have minor children together, the court may consider provisions regarding the defendant's exercise of custody and parent-time rights while ensuring the safety of the victim and any minor children. If the court issues a permanent criminal stalking injunction, but declines to address custody and parent-time issues, a copy of the stalking injunction shall be filed in any action in which custody and parent-time issues are being considered and that court may modify the injunction to balance the parties' custody and parent-time rights.
577(12) Except as provided in Subsection (11), a permanent criminal stalking injunction may be modified, dissolved, or dismissed only upon application of the victim to the court which granted the injunction.
578(13) Notice of permanent criminal stalking injunctions issued pursuant to this section shall be sent by the court to the statewide warrants network or similar system.
579(14) A permanent criminal stalking injunction issued pursuant to this section has effect statewide.
580(15)
581(a) Violation of an injunction issued pursuant to this section constitutes a third degree felony offense of stalking under Subsection (7).
582(b) Violations may be enforced in a civil action initiated by the stalking victim, a criminal action initiated by a prosecuting attorney, or both.
583(16) This section does not preclude the filing of a criminal information for stalking based on the same act which is the basis for the violation of the stalking injunction issued pursuant to Title 77, Chapter 3a, Stalking Injunctions, or a permanent criminal stalking injunction.
584(17)
585(a) A law enforcement officer who responds to an allegation of stalking shall use all reasonable means to protect the victim and prevent further violence, including:
586(i) taking action that, in the officer's discretion, is reasonably necessary to provide for the safety of the victim and any family or household member;
587(ii) confiscating the weapon or weapons involved in the alleged stalking;
588(iii) making arrangements for the victim and any child to obtain emergency housing or shelter;
589(iv) providing protection while the victim removes essential personal effects;
590(v) arranging, facilitating, or providing for the victim and any child to obtain medical treatment; and
591(vi) arranging, facilitating, or providing the victim with immediate and adequate notice of the rights of victims and of the remedies and services available to victims of stalking, in accordance with Subsection (17)(b).
592(b)
593(i) A law enforcement officer shall give written notice to the victim in simple language, describing the rights and remedies available under this section and Title 77, Chapter 3a, Stalking Injunctions.
594(ii) The written notice shall also include:
595(A) a statement that the forms needed in order to obtain a stalking injunction are available from the court clerk's office in the judicial district where the victim resides or is temporarily domiciled; and
596(B) a list of shelters, services, and resources available in the appropriate community, together with telephone numbers, to assist the victim in accessing any needed assistance.
597(c) If a weapon is confiscated under this Subsection (17), the law enforcement agency shall return the weapon to the individual from whom the weapon is confiscated if a stalking injunction is not issued or once the stalking injunction is terminated.
598
599Amended by Chapter 255, 2018 General Session
600
60176-5-107. Threat of violence -- Penalty.
602(1) A person commits a threat of violence if:
603(a) the person threatens to commit any offense involving bodily injury, death, or substantial property damage, and acts with intent to place a person in fear of imminent serious bodily injury, substantial bodily injury, or death; or
604(b) the person makes a threat, accompanied by a show of immediate force or violence, to do bodily injury to another.
605(2) A violation of this section is a class B misdemeanor.
606(3) It is not a defense under this section that the person did not attempt to or was incapable of carrying out the threat.
607(4) A threat under this section may be express or implied.
608(5) A person who commits an offense under this section is subject to punishment for that offense, in addition to any other offense committed, including the carrying out of the threatened act.
609(6) In addition to any other penalty authorized by law, a court shall order any person convicted of any violation of this section to reimburse any federal, state, or local unit of government, or any private business, organization, individual, or entity for all expenses and losses incurred in responding to the violation, unless the court states on the record the reasons why the reimbursement would be inappropriate.
610
61176-5-107.3. Threat of terrorism -- Penalty.
612(1) A person commits a threat of terrorism if the person threatens to commit any offense involving bodily injury, death, or substantial property damage, and:
613(a)
614(i) threatens the use of a weapon of mass destruction, as defined in Section 76-10-401; or
615(ii) threatens the use of a hoax weapon of mass destruction, as defined in Section 76-10-401; or
616(b) acts with intent to:
617(i) intimidate or coerce a civilian population or to influence or affect the conduct of a government or a unit of government;
618(ii) prevent or interrupt the occupation of a building or a portion of the building, a place to which the public has access, or a facility or vehicle of public transportation operated by a common carrier; or
619(iii) cause an official or volunteer agency organized to deal with emergencies to take action due to the person's conduct posing a serious and substantial risk to the general public.
620(2)
621(a) A violation of Subsection (1)(a) or (1)(b)(i) is a second degree felony.
622(b) A violation of Subsection (1)(b)(ii) is a third degree felony.
623(c) A violation of Subsection (1)(b)(iii) is a class B misdemeanor.
624(3) It is not a defense under this section that the person did not attempt to carry out or was incapable of carrying out the threat.
625(4) A threat under this section may be express or implied.
626(5) A person who commits an offense under this section is subject to punishment for that offense, in addition to any other offense committed, including the carrying out of the threatened act.
627(6) In addition to any other penalty authorized by law, a court shall order any person convicted of any violation of this section to reimburse any federal, state, or local unit of government, or any private business, organization, individual, or entity for all expenses and losses incurred in responding to the violation, unless the court states on the record the reasons why the reimbursement would be inappropriate.
628
629
630Amended by Chapter 39, 2013 General Session
631
63276-5-111. Abuse, neglect, or exploitation of a vulnerable adult -- Penalties.
633(1) As used in this section:
634(a) "Abandonment" means a knowing or intentional action or inaction, including desertion, by a person or entity acting as a caretaker for a vulnerable adult that leaves the vulnerable adult without the means or ability to obtain necessary food, clothing, shelter, or medical or other health care.
635(b) "Abuse" means:
636(i) attempting to cause harm, intentionally or knowingly causing harm, or intentionally or knowingly placing another in fear of imminent harm;
637(ii) causing physical injury by knowing or intentional acts or omissions;
638(iii) unreasonable or inappropriate use of physical restraint, medication, or isolation that causes or is likely to cause harm to a vulnerable adult that is in conflict with a physician's orders or used as an unauthorized substitute for treatment, unless that conduct furthers the health and safety of the adult; or
639(iv) deprivation of life-sustaining treatment, except:
640(A) as provided in Title 75, Chapter 2a, Advance Health Care Directive Act; or
641(B) when informed consent, as defined in this section, has been obtained.
642(c) "Business relationship" means a relationship between two or more individuals or entities where there exists an oral or written agreement for the exchange of goods or services.
643(d)
644(i) "Caretaker" means any person, entity, corporation, or public institution that assumes the responsibility to provide a vulnerable adult with care, food, shelter, clothing, supervision, medical or other health care, or other necessities.
645(ii) "Caretaker" includes a relative by blood or marriage, a household member, a person who is employed or who provides volunteer work, or a person who contracts or is under court order to provide care.
646(e) "Deception" means:
647(i) a misrepresentation or concealment:
648(A) of a material fact relating to services rendered, disposition of property, or use of property intended to benefit a vulnerable adult;
649(B) of the terms of a contract or agreement entered into with a vulnerable adult; or
650(C) relating to the existing or preexisting condition of any property involved in a contract or agreement entered into with a vulnerable adult; or
651(ii) the use or employment of any misrepresentation, false pretense, or false promise in order to induce, encourage, or solicit a vulnerable adult to enter into a contract or agreement.
652(f) "Elder adult" means a person 65 years of age or older.
653(g) "Endeavor" means to attempt or try.
654(h) "Exploitation" means an offense described in Subsection (4) or Section 76-5b-202.
655(i) "Harm" means pain, mental anguish, emotional distress, hurt, physical or psychological damage, physical injury, suffering, or distress inflicted knowingly or intentionally.
656(j) "Informed consent" means:
657(i) a written expression by the person or authorized by the person, stating that the person fully understands the potential risks and benefits of the withdrawal of food, water, medication, medical services, shelter, cooling, heating, or other services necessary to maintain minimum physical or mental health, and that the person desires that the services be withdrawn. A written expression is valid only if the person is of sound mind when the consent is given, and the consent is witnessed by at least two individuals who do not benefit from the withdrawal of services; or
658(ii) consent to withdraw food, water, medication, medical services, shelter, cooling, heating, or other services necessary to maintain minimum physical or mental health, as permitted by court order.
659(k) "Intimidation" means communication conveyed through verbal or nonverbal conduct which threatens deprivation of money, food, clothing, medicine, shelter, social interaction, supervision, health care, or companionship, or which threatens isolation or harm.
660(l)
661(i) "Isolation" means knowingly or intentionally preventing a vulnerable adult from having contact with another person by:
662(A) preventing the vulnerable adult from receiving visitors, mail, or telephone calls, contrary to the express wishes of the vulnerable adult, including communicating to a visitor that the vulnerable adult is not present or does not want to meet with or talk to the visitor, knowing that communication to be false;
663(B) physically restraining the vulnerable adult in order to prevent the vulnerable adult from meeting with a visitor; or
664(C) making false or misleading statements to the vulnerable adult in order to induce the vulnerable adult to refuse to receive communication from visitors or other family members.
665(ii) The term "isolation" does not include an act intended to protect the physical or mental welfare of the vulnerable adult or an act performed pursuant to the treatment plan or instructions of a physician or other professional advisor of the vulnerable adult.
666(m) "Lacks capacity to consent" means an impairment by reason of mental illness, developmental disability, organic brain disorder, physical illness or disability, chronic use of drugs, chronic intoxication, short-term memory loss, or other cause to the extent that a vulnerable adult lacks sufficient understanding of the nature or consequences of decisions concerning the adult's person or property.
667(n) "Neglect" means:
668(i) failure of a caretaker to provide nutrition, clothing, shelter, supervision, personal care, or dental or other health care, or failure to provide protection from health and safety hazards or maltreatment;
669(ii) failure of a caretaker to provide care to a vulnerable adult in a timely manner and with the degree of care that a reasonable person in a like position would exercise;
670(iii) a pattern of conduct by a caretaker, without the vulnerable adult's informed consent, resulting in deprivation of food, water, medication, health care, shelter, cooling, heating, or other services necessary to maintain the vulnerable adult's well being;
671(iv) intentional failure by a caretaker to carry out a prescribed treatment plan that results or could result in physical injury or physical harm; or
672(v) abandonment by a caretaker.
673(o) "Physical injury" includes damage to any bodily tissue caused by nontherapeutic conduct, to the extent that the tissue must undergo a healing process in order to be restored to a sound and healthy condition, or damage to any bodily tissue to the extent that the tissue cannot be restored to a sound and healthy condition. "Physical injury" includes skin bruising, a dislocation, physical pain, illness, impairment of physical function, a pressure sore, bleeding, malnutrition, dehydration, a burn, a bone fracture, a subdural hematoma, soft tissue swelling, injury to any internal organ, or any other physical condition that imperils the health or welfare of the vulnerable adult and is not a serious physical injury as defined in this section.
674(p) "Position of trust and confidence" means the position of a person who:
675(i) is a parent, spouse, adult child, or other relative by blood or marriage of a vulnerable adult;
676(ii) is a joint tenant or tenant in common with a vulnerable adult;
677(iii) has a legal or fiduciary relationship with a vulnerable adult, including a court-appointed or voluntary guardian, trustee, attorney, or conservator; or
678(iv) is a caretaker of a vulnerable adult.
679(q) "Serious physical injury" means any physical injury or set of physical injuries that:
680(i) seriously impairs a vulnerable adult's health;
681(ii) was caused by use of a dangerous weapon as defined in Section 76-1-601;
682(iii) involves physical torture or causes serious emotional harm to a vulnerable adult; or
683(iv) creates a reasonable risk of death.
684(r) "Undue influence" occurs when a person uses the person's role, relationship, or power to exploit, or knowingly assist or cause another to exploit, the trust, dependency, or fear of a vulnerable adult, or uses the person's role, relationship, or power to gain control deceptively over the decision making of the vulnerable adult.
685(s) "Vulnerable adult" means an elder adult, or an adult 18 years of age or older who has a mental or physical impairment which substantially affects that person's ability to:
686(i) provide personal protection;
687(ii) provide necessities such as food, shelter, clothing, or medical or other health care;
688(iii) obtain services necessary for health, safety, or welfare;
689(iv) carry out the activities of daily living;
690(v) manage the adult's own resources; or
691(vi) comprehend the nature and consequences of remaining in a situation of abuse, neglect, or exploitation.
692(2) Under any circumstances likely to produce death or serious physical injury, any person, including a caretaker, who causes a vulnerable adult to suffer serious physical injury or, having the care or custody of a vulnerable adult, causes or permits that adult's person or health to be injured, or causes or permits a vulnerable adult to be placed in a situation where the adult's person or health is endangered, is guilty of the offense of aggravated abuse of a vulnerable adult as follows:
693(a) if done intentionally or knowingly, the offense is a second degree felony;
694(b) if done recklessly, the offense is third degree felony; and
695(c) if done with criminal negligence, the offense is a class A misdemeanor.
696(3) Under circumstances other than those likely to produce death or serious physical injury any person, including a caretaker, who causes a vulnerable adult to suffer harm, abuse, or neglect; or, having the care or custody of a vulnerable adult, causes or permits that adult's person or health to be injured, abused, or neglected, or causes or permits a vulnerable adult to be placed in a situation where the adult's person or health is endangered, is guilty of the offense of abuse of a vulnerable adult as follows:
697(a) if done intentionally or knowingly, the offense is a class A misdemeanor;
698(b) if done recklessly, the offense is a class B misdemeanor; and
699(c) if done with criminal negligence, the offense is a class C misdemeanor.
700(4)
701(a) A person commits the offense of exploitation of a vulnerable adult when the person:
702(i) is in a position of trust and confidence, or has a business relationship, with the vulnerable adult or has undue influence over the vulnerable adult and knowingly, by deception or intimidation, obtains or uses, or endeavors to obtain or use, the vulnerable adult's funds, credit, assets, or other property with the intent to temporarily or permanently deprive the vulnerable adult of the use, benefit, or possession of the adult's property, for the benefit of someone other than the vulnerable adult;
703(ii) knows or should know that the vulnerable adult lacks the capacity to consent, and obtains or uses, or endeavors to obtain or use, or assists another in obtaining or using or endeavoring to obtain or use, the vulnerable adult's funds, assets, or property with the intent to temporarily or permanently deprive the vulnerable adult of the use, benefit, or possession of his property for the benefit of someone other than the vulnerable adult;
704(iii) unjustly or improperly uses or manages the resources of a vulnerable adult for the profit or advantage of someone other than the vulnerable adult;
705(iv) unjustly or improperly uses a vulnerable adult's power of attorney or guardianship for the profit or advantage of someone other than the vulnerable adult; or
706(v) involves a vulnerable adult who lacks the capacity to consent in the facilitation or furtherance of any criminal activity.
707(b) A person is guilty of the offense of exploitation of a vulnerable adult as follows:
708(i) if done intentionally or knowingly and the aggregate value of the resources used or the profit made is or exceeds $5,000, the offense is a second degree felony;
709(ii) if done intentionally or knowingly and the aggregate value of the resources used or the profit made is less than $5,000 or cannot be determined, the offense is a third degree felony;
710(iii) if done recklessly, the offense is a class A misdemeanor; or
711(iv) if done with criminal negligence, the offense is a class B misdemeanor.
712(5) It does not constitute a defense to a prosecution for any violation of this section that the accused did not know the age of the victim.
713(6) An adult is not considered abused, neglected, or a vulnerable adult for the reason that the adult has chosen to rely solely upon religious, nonmedical forms of healing in lieu of medical care.
714
71576-5-112. Reckless endangerment -- Penalty.
716(1) A person commits reckless endangerment if, under circumstances not amounting to a felony offense, the person recklessly engages in conduct that creates a substantial risk of death or serious bodily injury to another person.
717(2) Reckless endangerment is a class A misdemeanor.
718
71976-5b-203. Distribution of an intimate image -- Penalty.
720(1) As used in this section:
721(a) "Distribute" means selling, exhibiting, displaying, wholesaling, retailing, providing, giving, granting admission to, providing access to, or otherwise transferring or presenting an image to another individual, with or without consideration.
722(b) "Intimate image" means any visual depiction, photograph, film, video, recording, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, that depicts:
723(i) exposed human male or female genitals or pubic area, with less than an opaque covering;
724(ii) a female breast with less than an opaque covering, or any portion of the female breast below the top of the areola; or
725(iii) the individual engaged in any sexually explicit conduct.
726(c) "Sexually explicit conduct" means actual or simulated:
727(i) sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex;
728(ii) masturbation;
729(iii) bestiality;
730(iv) sadistic or masochistic activities;
731(v) exhibition of the genitals, pubic region, buttocks, or female breast of any individual;
732(vi) visual depiction of nudity or partial nudity;
733(vii) fondling or touching of the genitals, pubic region, buttocks, or female breast; or
734(viii) explicit representation of the defecation or urination functions.
735(d) "Simulated sexually explicit conduct" means a feigned or pretended act of sexually explicit conduct that duplicates, within the perception of an average person, the appearance of an actual act of sexually explicit conduct.
736(2) An actor commits the offense of distribution of intimate images if the actor, with the intent to cause emotional distress or harm, knowingly or intentionally distributes to any third party any intimate image of an individual who is 18 years of age or older, if:
737(a) the actor knows that the depicted individual has not given consent to the actor to distribute the intimate image;
738(b) the intimate image was created by or provided to the actor under circumstances in which the individual has a reasonable expectation of privacy; and
739(c) actual emotional distress or harm is caused to the person as a result of the distribution under this section.
740(3) This section does not apply to:
741(a)
742(i) lawful practices of law enforcement agencies;
743(ii) prosecutorial agency functions;
744(iii) the reporting of a criminal offense;
745(iv) court proceedings or any other judicial proceeding; or
746(v) lawful and generally accepted medical practices and procedures;
747(b) an intimate image if the individual portrayed in the image voluntarily allows public exposure of the image; or
748(c) an intimate image that is portrayed in a lawful commercial setting.
749(4)
750(a) This section does not apply to an Internet service provider or interactive computer service, as defined in 47 U.S.C. Sec. 230(f)(2), a provider of an electronic communications service as defined in 18 U.S.C. Sec. 2510, a telecommunications service, information service, or mobile service as defined in 47 U.S.C. Sec. 153, including a commercial mobile service as defined in 47 U.S.C. Sec. 332(d), or a cable operator as defined in 47 U.S.C. Sec. 522, if:
751(i) the distribution of an intimate image by the Internet service provider occurs only incidentally through the provider's function of:
752(A) transmitting or routing data from one person to another person; or
753(B) providing a connection between one person and another person;
754(ii) the provider does not intentionally aid or abet in the distribution of the intimate image; and
755(iii) the provider does not knowingly receive from or through a person who distributes the intimate image a fee greater than the fee generally charged by the provider, as a specific condition for permitting the person to distribute the intimate image.
756(b) This section does not apply to a hosting company, as defined in Section 76-10-1230, if:
757(i) the distribution of an intimate image by the hosting company occurs only incidentally through the hosting company's function of providing data storage space or data caching to a person;
758(ii) the hosting company does not intentionally engage, aid, or abet in the distribution of the intimate image; and
759(iii) the hosting company does not knowingly receive from or through a person who distributes the intimate image a fee greater than the fee generally charged by the provider, as a specific condition for permitting the person to distribute, store, or cache the intimate image.
760(c) A service provider, as defined in Section 76-10-1230, is not negligent under this section if it complies with Section 76-10-1231.
761(5)
762(a) Distribution of an intimate image is a class A misdemeanor except under Subsection (5)(b).
763(b) Distribution of an intimate image is a third degree felony on a second or subsequent conviction for an offense under this section that arises from a separate criminal episode as defined in Section 76-1-401.
764
765
766Enacted by Chapter 124, 2014 General Session
767
76876-6-1102. Identity fraud crime.
769(1) As used in this part, "personal identifying information" may include:
770(a) name;
771(b) birth date;
772(c) address;
773(d) telephone number;
774(e) drivers license number;
775(f) Social Security number;
776(g) place of employment;
777(h) employee identification numbers or other personal identification numbers;
778(i) mother's maiden name;
779(j) electronic identification numbers;
780(k) electronic signatures under Title 46, Chapter 4, Uniform Electronic Transactions Act;
781(l) any other numbers or information that can be used to access a person's financial resources or medical information, except for numbers or information that can be prosecuted as financial transaction card offenses under Sections 76-6-506 through 76-6-506.6; or
782(m) a photograph or any other realistic likeness.
783(2)
784(a) A person is guilty of identity fraud when that person knowingly or intentionally uses, or attempts to use, the personal identifying information of another person, whether that person is alive or deceased, with fraudulent intent, including to obtain, or attempt to obtain, credit, goods, services, employment, any other thing of value, or medical information.
785(b) It is not a defense to a violation of Subsection (2)(a) that the person did not know that the personal information belonged to another person.
786(3) Identity fraud is:
787(a) except as provided in Subsection (3)(b)(ii), a third degree felony if the value of the credit, goods, services, employment, or any other thing of value is less than $5,000; or
788(b) a second degree felony if:
789(i) the value of the credit, goods, services, employment, or any other thing of value is or exceeds $5,000; or
790(ii) the use described in Subsection (2)(a) of personal identifying information results, directly or indirectly, in bodily injury to another person.
791(4) Multiple violations may be aggregated into a single offense, and the degree of the offense is determined by the total value of all credit, goods, services, or any other thing of value used, or attempted to be used, through the multiple violations.
792(5) When a defendant is convicted of a violation of this section, the court shall order the defendant to make restitution to any victim of the offense or state on the record the reason the court does not find ordering restitution to be appropriate.
793(6) Restitution under Subsection (5) may include:
794(a) payment for any costs incurred, including attorney fees, lost wages, and replacement of checks; and
795(b) the value of the victim's time incurred due to the offense:
796(i) in clearing the victim's credit history or credit rating;
797(ii) in any civil or administrative proceedings necessary to satisfy or resolve any debt, lien, or other obligation of the victim or imputed to the victim and arising from the offense; and
798(iii) in attempting to remedy any other intended or actual harm to the victim incurred as a result of the offense.
799
800
801Amended by Chapter 258, 2015 General Session
802
80376-6-1105. Unlawful possession of another's identification documents.
804(1) As used in this section:
805(a)
806(i) "Identifying document" means:
807(A) a government issued document commonly used for identification;
808(B) a vehicle registration certificate; or
809(C) any other document, image, data file, or medium containing personal identifying information as defined in Subsections 76-6-1102(1)(b) through (m).
810(ii) "Identifying document" includes:
811(A) a counterfeit identifying document; or
812(B) a document containing personal identifying information of a deceased individual.
813(b) "Possess" means to have physical control or electronic access.
814(2)
815(a) Under circumstances that do not constitute a violation of Section 76-6-1102 or Section 76-6-502, an individual is guilty of a class A misdemeanor if the individual:
816(i) obtains or possesses an identifying document:
817(A) with knowledge that the individual is not entitled to obtain or possess the identifying document; or
818(B) with intent to deceive or defraud; or
819(ii) assists another person in obtaining or possessing an identifying document:
820(A) with knowledge that the person is not entitled to obtain or possess the identifying document; or
821(B) with knowledge that the person intends to use the identifying document to deceive or defraud.
822(b) Under circumstances that do not constitute a violation of Section 76-6-1102, an individual is guilty of a third degree felony if the individual:
823(i) obtains or possesses identifying documents of more than two, but fewer than 100, individuals:
824(A) with knowledge that the individual is not entitled to obtain or possess the identifying documents; or
825(B) with intent to deceive or defraud; or
826(ii) assists another person in obtaining or possessing identifying documents of more than two, but fewer than 100, individuals:
827(A) with knowledge that the person is not entitled to obtain or possess the multiple identifying documents; or
828(B) with knowledge that the person intends to use the identifying documents to deceive or defraud.
829(c) Under circumstances that do not constitute a violation of Section 76-6-1102, an individual is guilty of a second degree felony if the individual:
830(i) obtains or possesses identifying documents of 100 or more individuals:
831(A) with knowledge that the individual is not entitled to obtain or possess the identifying documents; or
832(B) with intent to deceive or defraud; or
833(ii) assists another person in obtaining or possessing identifying documents of 100 or more individuals:
834(A) with knowledge that the person is not entitled to obtain or possess the identifying documents; or
835(B) with knowledge that the person intends to use the identifying documents to deceive or defraud.
836
837
838Amended by Chapter 221, 2018 General Session
839
84076-8-903. Assembly for advocating criminal syndicalism or sabotage.
841 The assembly or consorting of two or more persons for the purpose of advocating, teaching, or suggesting the doctrine of criminal syndicalism, or to advocate, teach, suggest or encourage sabotage, or the duty, necessity, propriety or expediency of doing any act of violence, the destruction of or damage to any property, the bodily injury to any person, or the commission of any crime or unlawful act as a means of accomplishing or effecting any industrial or political ends, change or revolution, is hereby declared unlawful, and every person voluntarily participating therein, or by his presence aiding and instigating the same is guilty of a felony of the third degree.
842
843Electronic Communications harassment and abuse
844
845Effective 5/8/2018
84676-9-201. Electronic communication harassment -- Definitions -- Penalties.
847(1) As used in this section:
848(a) "Adult" means a person 18 years of age or older.
849(b) "Electronic communication" means any communication by electronic, electro-mechanical, or electro-optical communication device for the transmission and reception of audio, image, or text but does not include broadcast transmissions or similar communications that are not targeted at any specific individual.
850(c) "Electronic communication device" includes a telephone, a facsimile machine, electronic mail, a pager, a computer, or any other device or medium that can be used to communicate electronically.
851(d) "Minor" means a person who is younger than 18 years of age.
852(e) "Personal identifying information" means the same as that term is defined in Section 76-6-1102.
853(2) A person is guilty of electronic communication harassment and subject to prosecution in the jurisdiction where the communication originated or was received if with intent to intimidate, abuse, threaten, or disrupt the electronic communications of another, the person:
854(a)
855(i) makes repeated contact by means of electronic communications, regardless of whether a conversation ensues; or
856(ii) after the recipient has requested or informed the person not to contact the recipient, and the person repeatedly or continuously:
857(A) contacts the electronic communication device of the recipient; or
858(B) causes an electronic communication device of the recipient to ring or to receive other notification of attempted contact by means of electronic communication;
859(b) makes contact by means of electronic communication and insults, taunts, or challenges the recipient of the communication or any person at the receiving location in a manner likely to provoke a violent or disorderly response;
860(c) makes contact by means of electronic communication and threatens to inflict injury, physical harm, or damage to any person or the property of any person;
861(d) causes disruption, jamming, or overload of an electronic communication system through excessive message traffic or other means utilizing an electronic communication device; or
862(e) electronically publishes, posts, or otherwise discloses personal identifying information of another person, in a public online site or forum, without that person's permission.
863(3)
864(a)
865(i) Electronic communication harassment committed against an adult is a class B misdemeanor, except under Subsection (3)(a)(ii).
866(ii) A second or subsequent offense under Subsection (3)(a)(i) is a:
867(A) class A misdemeanor if all prior violations of this section were committed against adults; and
868(B) a third degree felony if any prior violation of this section was committed against a minor.
869(b)
870(i) Electronic communication harassment committed against a minor is a class A misdemeanor, except under Subsection (3)(b)(ii).
871(ii) A second or subsequent offense under Subsection (3)(b)(i) is a third degree felony, regardless of whether any prior violation of this section was committed against a minor or an adult.
872(4)
873(a) Except under Subsection (4)(b), criminal prosecution under this section does not affect an individual's right to bring a civil action for damages suffered as a result of the commission of any of the offenses under this section.
874(b) This section does not create any civil cause of action based on electronic communications made for legitimate business purposes.
875
8762. Violation of Privacy Rights
87776-9-401. Definitions.
878 For purposes of this part:
879(1) "Private place" means a place where one may reasonably expect to be safe from casual or hostile intrusion or surveillance.
880(2) "Eavesdrop" means to overhear, record, amplify, or transmit any part of a wire or oral communication of others without the consent of at least one party thereto by means of any electronic, mechanical, or other device.
881(3) "Public" includes any professional or social group of which the victim of a defamation is a member.
88276-9-402. Privacy violation.
883(1) A person is guilty of privacy violation if, except as authorized by law, the person:
884(a) trespasses on property with intent to subject anyone to eavesdropping or other surveillance in a private place;
885(b) installs, or uses after unauthorized installation in a private place, without the consent of the person or persons entitled to privacy in the private place, any device for observing, photographing, hearing, recording, amplifying, or broadcasting sounds or events in the private place; or
886(c) installs or uses outside of a private place a device for observing, photographing, hearing, recording, amplifying, or broadcasting sounds or events originating in the private place which would not ordinarily be audible, visible, or comprehensible outside the private place, without the consent of the person or persons entitled to privacy in the private place.
887(2) A person is not guilty of a violation of this section if:
888(a) the device used is an unmanned aircraft;
889(b) the person is operating the unmanned aircraft for legitimate commercial or educational purposes in a manner consistent with applicable Federal Aviation Administration rules, exemptions, or other authorizations; and
890(c) any conduct described in Subsection (1) that occurs via the unmanned aircraft is solely incidental to the lawful commercial or educational use of the unmanned aircraft.
891(3) Privacy violation is a class B misdemeanor.
892(1) A person commits communication abuse if, except as authorized by law, he:
893(a) Intercepts, without the consent of the sender or receiver, a message by telephone, telegraph, letter, or other means of communicating privately; this paragraph does not extend to:
894(i) Overhearing of messages through a regularly installed instrument on a telephone party line or on an extension; or
895(ii) Interception by the telephone company or subscriber incident to enforcement of regulations limiting use of the facilities or to other normal operation and use; or
896(b) Divulges without consent of the sender or receiver the existence or contents of any such message if the actor knows that the message was illegally intercepted or if he learned of the message in the course of employment with an agency engaged in transmitting it.
897(2) Communication abuse is a class B misdemeanor.
89876-9-404. Criminal defamation.
899(1) A person is guilty of criminal defamation if he knowingly communicates to any person orally or in writing any information which he knows to be false and knows will tend to expose any other living person to public hatred, contempt, or ridicule.
900(2) Criminal defamation is a class B misdemeanor.
901
90276-9-407. Crime of abuse of personal identity -- Penalty -- Defense -- Permitting civil action.
903(1) The definitions in Section 45-3-2 apply to this section.
904(2) Any person is guilty of a class B misdemeanor who knowingly or intentionally causes the publication of an advertisement in which the personal identity of an individual is used in a manner which expresses or implies that the individual approves, endorses, has endorsed, or will endorse the specific subject matter of the advertisement without the consent for such use by the individual.
905(3) It is an affirmative defense that the person causing the publication of the advertisement reasonably believed that the person whose personal identity was to be used had consented to its use.
906(4) Upon conviction of an offense under this section, unless waived by the victim, the court shall order that, within 30 days of the conviction, the person convicted shall issue a public apology or retraction to whomever received the advertisement. The apology or retraction shall be of similar size and placement as the original advertisement.
907(5) Nothing in this section prohibits a civil action under Title 45, Chapter 3, Abuse of Personal Identity Act.
908
909Abuse of Personal Identity Act
91045-3-2. Definitions.
911 As used in this act:
912(1) "Advertisement" means a notice designed to attract public attention or patronage and includes a list of supporters for a particular cause.
913(2) "Cause the publication" means that a person prepares or requests another to prepare an advertisement of the type described in Subsection 45-3-3(1), and that person submits or requests another to submit the advertisement to a publisher, and the advertisement has been published.
914(3)
915(a) "Consent" means a person's voluntary agreement to the use of that person's name, title, picture, or portrait.
916(b) "Consent" may not be inferred by the failure of the person to request that the person's name, title, picture, or portrait not be used or that the person's name be removed from a mailing or supporter list.
917(4) "Individual" means a natural person.
918(5) "Person" means any natural person, firm, partnership, association, corporation, joint venture, or any other form of business organization or arrangement, and the agents or representatives of such persons.
919(6) "Personal identity" means an individual's name, title, picture, or portrait.
920(7) "Publish" means that a person provides the instrumentality through which an advertisement is communicated to the public at large or to a significant portion thereof.
921
92245-3-3. Acts constituting abuse -- Permitting prosecution.
923(1) Except for purposes of the criminal penalty in Section 76-9-407, the personal identity of an individual is abused if:
924(a) an advertisement is published in which the personal identity of that individual is used in a manner which expresses or implies that the individual approves, endorses, has endorsed, or will endorse the specific subject matter of the advertisement; and
925(b) consent has not been obtained for such use from the individual, or if the individual is a minor, then consent of one of the minor's parents or consent of the minor's legally appointed guardian.
926(2) Nothing in this part prohibits prosecution of abuse of personal identity under Section 76-9-407.
927
928Abuse of Personal Identity
929 45-3-4. Cause of action for abuse -- Remedies.
930 An individual whose personal identity has been abused under Section 45-3-3 of this act may bring an action against a person who caused the publication of the advertisement, and is entitled to injunctive relief, damages alleged and proved, exemplary damages, and reasonable attorney's fees and costs.
931
932Enacted by Chapter 95, 1981 General Session
93345-3-5. Action against publisher -- Grounds -- Remedies.
934(1) An individual whose personal identity has been abused under Section 45-3-3 of this act may bring an action against a person who published the advertisement:
935(a) if the advertisement, on its face is such that a reasonable person would conclude that it is unlikely that an individual would consent to such use; and
936(b) the publisher did not take reasonable steps to assure that consent was obtained.
937(2) In an action under this section, the plaintiff shall be entitled to injunctive relief, damages alleged and proved, exemplary damages, and reasonable attorney's fees and costs.
938
939LIBEL
94076-9-509. Conveying false or libelous material to newspaper or broadcasting stations.
941 Any person who willfully states, conveys, delivers, or transmits, by any means whatsoever, to the manager, editor, publisher, reporter, or agent of any radio station, television station, newspaper, magazine, periodical, or serial for publication therein, any false or libelous statement concerning any person, and thereby secures actual publication of the same, is guilty of a class B misdemeanor.
942
943Enacted by Chapter 196, 1973 General Session
944
945VOYEURISM
94676-9-702.7. Voyeurism offenses -- Penalties.
947(1) A person is guilty of voyeurism who intentionally uses any type of technology to secretly or surreptitiously record video of a person:
948(a) for the purpose of viewing any portion of the individual's body regarding which the individual has a reasonable expectation of privacy, whether or not that portion of the body is covered with clothing;
949(b) without the knowledge or consent of the individual; and
950(c) under circumstances in which the individual has a reasonable expectation of privacy.
951(2) A violation of Subsection (1) is a class A misdemeanor, except that a violation of Subsection (1) committed against a child under 14 years of age is a third degree felony.
952(3) Distribution or sale of any images, including in print, electronic, magnetic, or digital format, obtained under Subsection (1) by transmission, display, or dissemination is a third degree felony, except that if the violation of this Subsection (3) includes images of a child under 14 years of age, the violation is a second degree felony.
953(4) A person is guilty of voyeurism who, under circumstances not amounting to a violation of Subsection (1), views or attempts to view an individual, with or without the use of any instrumentality:
954(a) with the intent of viewing any portion of the individual's body regarding which the individual has a reasonable expectation of privacy, whether or not that portion of the body is covered with clothing;
955(b) without the knowledge or consent of the individual; and
956(c) under circumstances in which the individual has a reasonable expectation of privacy.
957(5) A violation of Subsection (4) is a class B misdemeanor, except that a violation of Subsection (4) committed against a child under 14 years of age is a class A misdemeanor.
958
959Amended by Chapter 364, 2017 General Session
960
961They have violated my civil and human rights as an individual, and are liable for damages caused to myself.
962
96376-2-202. Criminal responsibility for direct commission of offense or for conduct of another.
964Every person, acting with the mental state required for the commission of an offense who directly commits the offense, who solicits, requests, commands, encourages, or intentionally aids another person to engage in conduct which constitutes an offense shall be criminally liable as a party for such conduct.
965
966Department of Defense Main Number
967Pentagon Switchboard: 703-545-6700
968
969Department of Defense Inspector General
970Hotline Phone Number:
971800-424-9098 (Toll-Free)
972703-604-8799 (Commercial)
973664-8799 (DSN)
974
975Military Service IGs
976Army IG
Phone: 800-752-9747; DSN 865-1845
977Marine Corps IG
Phone: 703-604-4661; DSN 664-4526
978Navy IG
Phone: 800-522-3451; DSN 288-6842
979Air Force IG
Phone: 800-38-8429; DSN 425-8429
980
981Human-Computer Interaction, Mass-Scale Neural Networks, Artificial Intelligence, and Non-consensual Civilian Target also known as the "Targeted Individual".
982
983Unclassified Information and Synopsis:
984
985Involvement: U.S. Department of the Army, DARPA, Department of Homeland Security, U.S. Army Research Office, U.S. Army Research Laboratory Human Research Engineered Directorate (HRED), Academic and Research Institutions, Biomedical, Biomagnetism, Radio Frequency, Community Collaboration, Universities, Federal and Government Funded and Sponsored
986
987Source Link(s) from
988Real-world neuroimaging technologies
989https://ieeexplore.ieee.org/iel7/6287639/6336544/06514970.pdf
990
991Preparing laboratory and real-world EEG data for large-scale analysis: a containerized approach
992https://www.frontiersin.org/articles/10.3389/fninf.2016.00007
993
994Functional near infrared spectroscopy (fNIRS): an emerging neuroimaging technology with important applications for the study of brain disorders
995
996Silent Spatialized Communication Among Dispersed Forces (Silent Talk Communication aka Hearing Voices)
997https://apps.dtic.mil/dtic/tr/fulltext/u2/a623995.pdf
998
999Silent communication: toward using brain signals
1000Related articles
1001http://www.schalklab.org/sites/default/files/misc/Silent%20communication%20toward%20using%20brain%20signals.pdf
1002
1003Analyzing brain functions by subject classification of functional near-infrared spectroscopy data using convolutional neural networks analysis
1004http://downloads.hindawi.com/journals/cin/2016/1841945.pdf
1005
1006Neuroimaging: decoding mental states from brain activity in humans
1007http://www.utdallas.edu/~otoole/HCS6330_F09/17_Haynes_decoding_NNR_06.pdf
1008
1009NeuroGrid: using grid technology to advance neuroscience
1010
1011Imagined speech classification with EEG signals for silent communication: a preliminary investigation into synthetic telepathy
1012https://www.researchgate.net/profile/B_Kumar8/publication/224158377_Imagined_Speech_Classification_with_EEG_Signals_for_Silent_Communication_A_Preliminary_Investigation_into_Synthetic_Telepathy/links/54a97f8a0cf256bf8bb95cfd/Imagined-Speech-Classification-with-EEG-Signals-for-Silent-Communication-A-Preliminary-Investigation-into-Synthetic-Telepathy.pdf
1013
1014Decoding attentional orientation from EEG spectra
1015http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.590.183&rep=rep1&type=pdf
1016
1017Use of EEG to track visual attention in two dimensions
1018https://apps.dtic.mil/dtic/tr/fulltext/u2/1010495.pdf
1019
1020Attention selectively modulates cortical entrainment in different regions of the speech spectrum
1021https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4915733/
1022
1023Toward EEG sensing of imagined speech
1024
1025Subject identification from electroencephalogram (EEG) signals during imagined speech
1026
1027The neuroanatomic and neurophysiological infrastructure for speech and language
1028
1029Responsible innovation: A new look at technology and ethics
1030
1031The Orwellian threat to emerging neurodiagnostic technologies
1032
1033search term(s)
1034https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=fnirs+neuroimaging+acquisition+convolutional&btnG=
1035https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=54228-ls-mur&btnG=
1036https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=real+world+neuroimaging+technologies&btnG=&oq=real+world+neuroimaging
1037
1038U.S. ARMY COMBAT CAPABILITIES DEVELOPMENT COMMAND – ARMY RESEARCH LABORATORY
1039Cognition and Neuroergonomics (CaN) Collaborative Technology Alliance (CTA)
1040Dr. Jonathan Touryan, Collaborative Alliance Manager (ARL)
1041Tim Lee, Program Manager (DCS Corp)
1042Prof. Paul Sajda, Science Lead (Columbia University)
1043Cognition and Neuroergonomics (CaN)
1044Collaborative Technology Alliance (CTA)
1045Develop and demonstrate governing principles for the application of neuroscience-based research and theory to complex operational settings. Integrate neuroscience, engineering, psychology, and human factors approaches to revolutionize Soldier- system performance.
1046http://www.cancta.net
1047* Researchers
1048M D'Zmura
1049R Srinivasan
1050K Brigham
1051BVKV Kumar
1052D Poeppel
1053S Thorpe
1054Y Shen
1055U.S. ARMY COMBAT CAPABILITIES DEVELOPMENT COMMAND – ARMY RESEARCH LABORATORY
1056Cognition and Neuroergonomics (CaN) Collaborative Technology Alliance (CTA)
1057Dr. Jonathan Touryan, Collaborative Alliance Manager (ARL)
1058Tim Lee, Program Manager (DCS Corp)
1059Prof. Paul Sajda, Science Lead (Columbia University)
1060Cognition and Neuroergonomics (CaN)
1061Collaborative Technology Alliance (CTA)
1062Develop and demonstrate governing principles for the application of neuroscience-based research and theory to complex operational settings. Integrate neuroscience, engineering, psychology, and human factors approaches to revolutionize Soldier- system performance.
1063http://www.cancta.net
1064https://apps.dtic.mil
1065https://extranet.aro.army.mil
1066https://www.arl.army.mil/aro/
1067http://www.army.mil/info/organization/unitsandcommands/commandstructure/smdc/
1068http://garrison.redstone.army.mil
1069http://www.afgsc.af.mil
1070http://www.marforstrat.marines.mil
1071http://www.afspc.af.mil
1072http://www.af.mil
1073http://web.archive.org
1074http://www.stratcom.mil