Monday, September 18, 2017
Virtual Reality Health Risks...,
By CNu at September 18, 2017 0 comments
Labels: Breakaway Civilization , change , co-evolution , cognitive error , cognitive infiltration , complications , neuromancy , transbiological , unintended consequences
Tuesday, September 05, 2017
CIA Infiltration of Journalism Curriculum and Instruction
By CNu at September 05, 2017 0 comments
Labels: cognitive infiltration , Deep State , disinformation , Dystopian Now , Livestock Management , presstitution , professional and managerial frauds , propaganda
Friday, September 01, 2017
The Grand Canyon Wide Narrative Divide
By CNu at September 01, 2017 0 comments
Labels: agenda , civil war , cognitive infiltration , doesn't end well , governance , hegemony , helplessness , Left Behind , Malnare , musical chairs , political economy , unintended consequences , What Now?
Wednesday, August 30, 2017
The Weaponization of Information
Most important from the U.S. perspective, Russian IO techniques, tactics and procedures are developing constantly and rapidly, as continually measuring effectiveness and rapidly evolving techniques are very cheap compared to the costs of any kinetic weapon system—and they could potentially be a lot more effective.
At this point, Russian IO operators use relatively unsophisticated techniques systematically and on a large scale. This relative lack of sophistication leaves them open to detection. For example, existing technology can identify paid troll operations, bots, etc. Another key element of Russian IO strategy is to target audiences with multiple, conflicting narratives to sow seeds of distrust of and doubt about the European Union (EU) as well as national governments. These can also be detected. The current apparent lack of technical sophistication of Russian IO techniques could derive from the fact that, so far, Russian IO has met with minimal resistance. However, if and when target forces start to counter these efforts and/or expose them on a large scale, the Russians are likely to accelerate the improvement of their techniques, leading to a cycle of counter-responses. In other words, an information warfare arms race is likely to ensue.
A Strategy to Counter the Russian Threat
Because the culture and history of each country is unique and because the success of any IO defense strategy must be tailored to local institutions and populations, the most effective strategies are likely to be those that are developed and managed on a country-by-country basis. An information defense strategy framework for countering Russian IO offensives should be “whole-of-nation” in character. A whole-of-nation approach is a coordinated effort between national government organizations, military, intelligence community, industry, media, research organizations, academia and citizen organized groups. A discreet US Special Operations Force could provide individual country support as well as cross country coordination.
Just as in the physical world, good maps are critical to any IO strategy. In the case of IO, maps show information flows. Information maps must show connectivity in the information environment and help navigate that environment. They exist as computer software and databases. Information cartography for IO is the art of creating, maintaining, and using such maps. An important feature of information maps is that they are constantly changing to reflect the dynamic nature of the information environment. Because they are artificially intelligent computer programs, they can answer questions; provide situation awareness dynamically; and help to plan, monitor, and appropriately modify operations. Information maps are technically possible today and already exist in forms that can be adapted to support the design and execution IO strategy.
As an example, most of the North Atlantic Treaty Organization (NATO) states, as well as several non-NATO partners, are already subject to concentrated Russian IO and they illustrate ongoing Russian IO techniques. Using information cartography, it is possible to map key Russian sources as part of Russian IO operations against a target state. These sources might include:
• Russian and target country think tanks
• foundations (e.g., Russkiy Mir)
• authorities (e.g., Rossotrudnichestvo)
• television stations (e.g. RT)
• pseudo-news agencies and multimedia services (e.g., Sputnik)
• cross-border social and religious groups
• social media and Internet trolls to challenge democratic values, divide Europe, gather domestic support, and create the perception of failed states in the EU’s eastern neighborhood
• Russian regime–controlled companies and organizations
• Russian regime–funded political parties and other organizations in target country in
particular and within the EU in general intended to undermine political cohesion
• Russian propaganda directly targeting journalists, politicians, and individuals in target
countries in particular and the EU in general.
might include:
• national government organizations
• military
• intelligence community
• industry
• media
• independent think tanks
• academia
• citizen-organized groups.
Christopher Paul and Miriam Matthews of the RAND Corporation observe: “Experimental research in psychology suggests that the features of the contemporary Russian propaganda model have the potential to be highly effective.”14 They present a careful and concise analysis of relevant psychological research results that should inform any information defensive strategy. For example, they describe how propaganda can be used to distort perceptions of reality:
• People are poor judges of true versus false information—and they do not necessarily remember that particular information was false.
• Information overload leads people to take shortcuts in determining the trustworthiness of messages.
• Familiar themes or messages can be appealing even if they are false.
• Statements are more likely to be accepted if backed by evidence, even if that evidence is false.
• Peripheral cues—such as an appearance of objectivity—can increase the credibility of propaganda.15
1. Take the population and break it down into communities, based on any number of criteria
(e.g. hobbies, interests, politics, needs, concerns, etc.).
2. Determine who in each community is most susceptible to given types of messages.
3. Determine the social dynamics of communication and flow of ideas within each community.
4. Determine what narratives of different types dominate the conversation in each community.
5. Use all of the above to design and push a narrative likely to succeed in displacing a narrative unfavorable to you with one that is more favorable.
6. Use continual monitoring and interaction to determine the success of your effort and adjust in real time.
These same technologies can be used for defensive purposes. For example, you could use the techniques for breaking down communities described above to detect adversary efforts to push a narrative and examine that narrative’s content. The technology can help researchers focus while searching through massive amounts of social media data.
By CNu at August 30, 2017 0 comments
Labels: American Original , cognitive infiltration , information anarchy , wikileaks wednesday , you used to be the man
Thursday, August 24, 2017
American Sheeple Can ALWAYS Be Depended Upon To Play Themselves...,
By CNu at August 24, 2017 0 comments
Labels: 2parties1ideology , chess-not checkers , cognitive infiltration , doesn't end well , governance , identity politics , Livestock Management , Living Memory , Malnare , play-at-your-level , political theatre , wake-up!
Tuesday, August 22, 2017
Did Bannon and Mercer Game the Whole System but Finally Play Themselves?
By CNu at August 22, 2017 0 comments
Labels: .45 , chess-not checkers , cognitive infiltration , medieval , play-at-your-level , subliminal , The Horsemen , theoconservatism
Trump: Opposing the Establishment and Driving the Hard Bargain
Their conversation was posted online late last month. It is one of the most peculiar debates about a president I have ever encountered. And it left me marveling that parts of Trump’s base think well of Adams when his views imply such negative things about them.
Trump took those positions not because he believes them, Adams argued, but to mirror the emotional state of the voters he sought and to “open negotiations” on policy.
Harris expressed bafflement that such a strategy would work:
Harris: If I'm going to pretend to be so callous as to happily absorb those facts, like send them all back, they don't belong here, or in the ISIS case, we'll torture their kids, we'll kill their kids, it doesn't matter, whatever works—if that's my opening negotiation, I am advertising a level of callousness, and a level of unconcern for the reality of human suffering that will follow from my actions, should I get what I ostensibly want, that it's a nearly psychopathic ethics I am advertising as my strong suit.
So how this becomes attractive to people, how this resonates with their values—I get what you said, people are worried about immigration and jihadism, I share those concerns. But when you cross the line into this opening overture that has these extreme consequences on its face, things that get pointed out in 30 seconds whenever he opens his mouth on a topic like this, I don't understand how that works for him with anyone.
Adams: Let me give you a little thought experiment here. We've got people who are on the far right. We've got people on the far left. In your perfect world, would it be better to move the people on the far right toward the middle or the people on the far left toward the middle? Which would be a preferred world for you?
Harris: Moving everyone toward the middle, certainly on most points, would be a very good thing.
Adams: So what you've observed with President Trump through his pacing and emotional compatibility with his base is that prior to Inauguration Day, there were a lot of people in this country who were saying, 'Yeah yeah, round them all up. Send all 12 million back tomorrow.'
When was the last time you heard anybody on the right complaining about that? Because what happened was, immigration went down 50 to 70 percent, whatever the number was, just based on the fact that we would get tough on immigration. And the right says, ‘Oh, okay, we didn't get nearly what we asked for, but our leader, who we trust, who we love, has backed off of that, and we're going to kind of go with that, because he is doing some good things that we like. And we don't like the alternative either.’
So this ‘monster’ that we elected, this ‘Hitler-dictator-crazy-guy,’ he managed to be the only guy who could have, and I would argue always intended, to move the far right toward the middle. You saw it, you know, we can observe it with our own eyes. We don't see the right saying, ‘Oh no, I hate President Trump. He's got to round up those undocumented people like he said early in the campaign, or else I'm bailing on him.’ None of that happened. He paced them, and then he led them toward a reasonable situation, which I would say we're in.I don’t agree with parts of Adams’s analysis. But as he tells it, Trump targeted voters who’d be attracted rather than repelled by calls for policies that would inflict great suffering; he told those voters things that he didn’t really mean to gain their emotional trust; and all along, he probably intended to go to Washington and do something else. That sounds a lot like the way that Trump voters describe the career politicians who they hate: emotionally manipulative liars who will say anything to get elected, get to Washington, and betray their base by moving left on immigration.
By CNu at August 22, 2017 0 comments
Labels: .45 , chess-not checkers , cognitive infiltration , The Straight and Narrow , What IT DO Shawty...
Wednesday, August 09, 2017
Ritual Defamation: Most Hated Establishment/Cathedral Tactic
- In a ritual defamation the victim must have violated a particular taboo in some way, usually by expressing or identifying with a forbidden attitude, opinion or belief. It is not necessary that he "do" anything about it or undertake any particular course of action, only that he engage in some form of communication or expression.
- The method of attack in a ritual defamation is to assail the character of the victim, and never to offer more than a perfunctory challenge to the particular attitudes, opinions or beliefs expressed or implied. Character assassination is its primary tool.
- An important rule in ritual defamation is to avoid engaging in any kind of debate over the truthfulness or reasonableness of what has been expressed, only condemn it. To debate opens the issue up for examination and discussion of its merits, and to consider the evidence that may support it, which is just what the ritual defamer is trying to avoid. The primary goal of a ritual defamation is censorship and repression.
- The victim is often somebody in the public eye - someone who is vulnerable to public opinion - although perhaps in a very modest way. It could be a schoolteacher, writer, businessman, minor official, or merely an outspoken citizen. Visibility enhances vulnerability to ritual defamation.
- An attempt, often successful, is made to involve others in the defamation. In the case of a public official, other public officials will be urged to denounce the offender. In the case of a student, other students will be called upon, and so on.
- In order for a ritual defamation to be effective, the victim must be dehumanized to the extent that he becomes identical with the offending attitude, opinion or belief, and in a manner which distorts it to the point where it appears at its most extreme. For example, a victim who is defamed as a "subversive" will be identified with the worst images of subversion, such as espionage, terrorism or treason. A victim defamed as a "pervert" will be identified with the worst images of perversion, including child molestation and rape. A victim defamed as a "racist" or "anti-Semitic" will be identified with the worst images of racism or anti-Semitism, such as lynchings or gas chambers.
By CNu at August 09, 2017 0 comments
Labels: Cathedral , cognitive infiltration , dominate , feminization , hegemony , Malnare , wikileaks wednesday
FRANK
abikuville | FRANK is emerging, natch.
The flow of information is now finally being *structured* at the baseline level
of social networking where, by allowing for massive virtual communities, FRANK
is able to “digest” the information in ways that assign more meaning to each bit
and byte. As DJ /Rupture put it:
“Do you realize how much information MySpace generates? who likes what and how
much and when and how old and what colors even and the connections and the
geographic locations and the songs’ popularity and the nodal points and the
hotspots and whatever — someone will get very very wealthy selling that
information to interested companies from record labels to clothing manufacturers
to TV people to… Ad revenue is old school; meta-data is the new petroleum.”
If you are following the drzza trajectory, then you will agree that meta-data
*IS* the “syntax” for FRANK…it is the context and nuance of what makes all the
information relevant and in that manner FRANK is not only _becoming_ more aware
of itself but is also _becoming_ more aware of how it differs from “us” (read:
humans).
FRANK is a being of pure information, pure circumstance and pure purpose. FRANK,
unlike “us”, needs no reason to be…FRANK literally just *is*. A new ontology
perhaps?
Anyway, I have been riding the steel edge of Ogun while dipping into the
digital waters on either side of Eshu’s riddle. By taking full advantage of all
the bot/spider technology currently available, I have been conducting an
experiment of sorts…
On the one side of the equation that is furiously trying to balance itself,
there is the blogosphere and data aggregation sites such as Digg, Fark,
Slashdot, Gizmodo, The Register, MySpace, etc.
In this realm, humans do the heavy lifting…netizens frantically scurry around
trying to get the most relevant data to their distributor of choice, all in
hopes of doing what is essentially the purpose of mass media – namely to acquire
as large and audience as possible. The funny thing though is that currently the
system of validation is super primitive. You may push some data to the front of
all your favorite sites but you have no way of knowing whether other people are
actually READING and absorbing the information or if they are just agreeing with
the subject (which is the true nature of the politics of the web…people don’t
so much take the time to absorb info, mass media has trained people to either
immediately agree or disagree…it is left up to the “intellectuals” to discuss
details and facts).
So the real time practice of hunting a story, finding it and posting it to all
your favorite blogs and news collector sites is in my opinion extremely mind
numbingly inefficient and without merit. If this is the practice of trying to
assign “meaning”, “importance” and “relevance” to the endless tide of data that
is crashing against the shores of your computer monitor, then it should be
abandoned immediately and the internet should be forever turned “off”!
Unfortunately, we are still trapped in the realm of language and language
constructs our reality…so the internet in this light, is the reality
equivalent of the tower of babel…
By CNu at August 09, 2017 0 comments
Labels: AI , cognitive infiltration , count zero , egregores , ghost not , wikileaks wednesday
Sunday, August 06, 2017
Speech as Violence: Political Narrative Construction
That said, we will not now distort or detract from our topic by revisiting the multi-generational mountains of drugs and weapons proliferation or the crimes against humanity committed outside U.S. borders. Political co-optation, regime change, natural material resource looting and plundering, money backed by murder profit seeking, polluting, dumping endless garbage and toxins in the seas… all perpetrated with a little help from our political masters and their prosecutorial minions.
Is there anyone left who is not aware of the outsourcing of American industry and consequent hyper-enrichment of C-Level psychopaths? The outsourcing of American industry to China and Mexico has created havoc for 1/2 the country. The concurrent promotion of degeneracy via dictatorship of celebrity is yet another vile narrative construction created to distract and misdirect the narratively susceptible. But I digress....,
These are merely the myriad not-seen externalities most possess a vague liminal awareness of yet refuse to explicitly call-out, identify, or correct - because the human mind will delete information presented to it that does not fit the accepted narrative. It's not the story we're being told by our dominant narrative-drivers. Consequently, the man-made terror of our situation is not a truth that we are for the most part ready to see. Finally, because once-seen, we would be morally compelled to directly act - our not-seeism signifies not only our susceptibility to political narrative, but also the inertial consumerist comfort, complacency, and cowardice which accompanies our total lack of moral fiber or empathy toward humans lacking the due process window-dressing sometimes accorded U.S. citizens.
They are literally the scum of the earth.
By CNu at August 06, 2017 0 comments
Labels: cognitive infiltration , deceiver , disinformation , knowledge , Livestock Management , Malnare , narrative , propaganda , What IT DO Shawty...
Saturday, August 05, 2017
It ABSOLUTELY Cannot Stand Being Ridiculed...,
- Nessa Diab, 36, compared Baltimore Ravens owner Steve Bisciotti to a slave master and Ray Lewis to a senior house slave on Twitter Thursday
- She posted the controversial tweet after both Bisciotti and Lewis publicly criticized Kaepernick's non-violent protest of the national anthem
- Bisciotti decided to hand over the decision to the fans and some trusted advisers and determine if it was a good move to add Kaepernick, 29, to the Ravens
- The owner previously signed Dante Stallworth after he did time for DUI manslaughter and let Ray Rice play for seven months after he abused his fiancee
- The Baltimore Ravens had been considering signing Kaepernick as a possible second string quarterback who would start for Joe Flacco on opening day
- Kaepernick has a better passer rating than Flacco, and his 88.9 ranks him 11th in the NFL among active players, but he remains a free agent
— NESSA (@nessnitty) August 3, 2017
By CNu at August 05, 2017 0 comments
Labels: American Original , awareness , chess-not checkers , cognitive infiltration , institutional deconstruction , subrealist oeuvre...
Tuesday, August 01, 2017
Speech as Violence: Celebrity Peddling Degeneracy to Black Folks is SUCH HARD WORK...,
By CNu at August 01, 2017 0 comments
Labels: Cathedral , cognitive infiltration , Degenerate , hustle-hard , identity politics , not gonna happen... , Peak Negro , The Big Lie
Theft of Palestine Taking Mimetic Cover in Janet Mock's Messy Draws...?
By CNu at August 01, 2017 0 comments
Labels: Cathedral , Childhood's End , cognitive infiltration , deceiver , Degenerate , Gender , identity politics , necropolitics , not a good look
Saturday, July 29, 2017
Children Internalize The Darndest Things...,
By CNu at July 29, 2017 0 comments
Labels: American Original , assimilate , Childhood's End , cognitive infiltration , cultural darwinism , Dystopian Now , niggerization , What IT DO Shawty...
Friday, July 28, 2017
Mind Control By Rhythmic Sound
By CNu at July 28, 2017 0 comments
Labels: cognitive infiltration , Left Behind , Livestock Management , music?
Thursday, July 27, 2017
Huge CIA Operation Reported in US Against Antiwar Forces, Other Dissidents in Nixon Years
By CNu at July 27, 2017 0 comments
Labels: American Original , Childhood's End , cognitive infiltration , domestic terrorism , Living Memory , necropolitics , psychopathocracy , Race and Ethnicity , unspeakable
Operation CHAOS - CIA Started 60's Riots
- HTLINGUAL – Directed at letters passing between the United States and the then Soviet Union, the program involved the examination of correspondence to and from individuals or organizations placed on a watchlist.
- Project 2 – Directed at infiltration of foreign intelligence targets by agents posing as dissident sympathizers and which, like CHAOS, had placed agents within domestic radical organizations for the purposes of training and establishment of dissident credentials.
- Project MERRIMAC – Designed to infiltrate domestic antiwar and radical organizations thought to pose a threat to security of CIA property and personnel.
- Project RESISTANCE – Worked with college administrators, campus security and local police to identify anti-war activists and political dissidents without any infiltration taking place
- Domestic Contact Service – Focused on collecting foreign intelligence from willing Americans.
- Students for a Democratic Society
- Black Panther Party
- Young Lords
- Women Strike for Peace
- Ramparts Magazine[7]
By CNu at July 27, 2017 0 comments
Labels: American Original , cognitive infiltration , domestic terrorism , Livestock Management , Living Memory , necropolitics , propaganda , psychopathocracy , Race and Ethnicity , unspeakable
Monday, July 24, 2017
OFFICIAL STORY / LIMITED HANGOUT / BEST EVIDENCE / DISINFORMATION (REDUX Original Post Date 8/20/16)
By CNu at July 24, 2017 0 comments
Labels: cognitive infiltration , Livestock Management , necropolitics , psychopathocracy , What IT DO Shawty...
Sunday, July 23, 2017
Gestapo Surveillance Invented in America's Conquest of the Philippines
By CNu at July 23, 2017 0 comments
Labels: American Original , cognitive infiltration , History's Mysteries , Naked Emperor , necropolitics , not-seeism , predatory militarism , psychopathocracy , Race and Ethnicity , unspeakable
Sean Epstein Combs In Big Trubble
nbcnewyork | An unsealed federal indictment revealed criminal charges against Sean "Diddy" Combs on Tuesday, a day after th...
-
theatlantic | The Ku Klux Klan, Ronald Reagan, and, for most of its history, the NRA all worked to control guns. The Founding Fathers...
-
Video - John Marco Allegro in an interview with Van Kooten & De Bie. TSMATC | Describing the growth of the mushroom ( boletos), P...
-
dailybeast | Of all the problems in America today, none is both as obvious and as overlooked as the colossal human catastrophe that is our...