You are on page 1of 98

SIGN IN ▾ SIGN HELP QUIC K Sea rch

UP TOUR
Deep_Thought
Articles: 5 Seeds: 0 Comments: 4908 Since: Jul 2007

Remote Neural Monitoring & Prompting - Advertise | AdChoices

The Most Complete Picture To Date - March
2017
By Deep_Thought
Mon Feb 27, 2017 6:22 AM

military satellite radio science government dictatorship agenda radar warfare

artificial-intelligence manipulation the-matrix psychotropics telepathy rnm lidar maser

future-prediction remote-neural-monitoring

MOR E FR OM DEEP_THOUGHT
Remote Neural Monitoring & Prompting - The
I have been researching this technology Most Complete Picture To Date - March 2017
since 2009 and posting what I discover to The Philadelphia Project - The Untold WWII
Newsvine since about 2010. All this History
material is the product of open source Too Many Secrets - Hidden In plain Sight
intelligence, gathered online and Espionage & Brain-Computer Interfaces -
completely available in the public Modern Warfare Series
domain. Various scientists, engineers and
people from all walks of life have IN THESE NATIONS:
contributed to this body of knowledge
Anti-War
throughout the years, assisting in piecing
GeekVine
PDFmyURL lets you convert a complete website to PDF automatically!
together what is slowly emerging as Let's go! Gut Check America
probably one of the greatest threats to Heated Debate
have ever faced humanity as a whole.
Journalism on Newsvine
This document is unclassified and may be reproduced verbatim on any medium for free.
Logic on the Vine
As part of this release, I have removed all other articles not required from my column as Open Minded
they are mainly rough notes from a reverse engineering process that have been heavily Psych, Soc, Philos
obfuscated.
rationalists
I will begin this with a definition of what Remote Neural Monitoring & Prompting is: Science And Technology
The Open Closet
Remote Neural Monitoring & Prompting is one capability of a multi-role satellite & ground based The War Room
defense network. Controlled by an Artificial General Intelligence, this multi-role platform is based
upon swarm intelligence and designed to coordinate offensive and defensive operations in
theatres ranging from outer space, to cyber space either as stand alone operations or as part of
a holistic combat plan. The Artificial General Intelligence is of greater-than-human-level
intelligence, thus can run psychological operations on social media and debate humans online
whilst flying drones in the middle east, or staging a revolution is some foreign nation and fit
those separate agendas into an overarching combat and political objective. The Artificial
General Intelligence is also the final destination of data from all sources, where the dots are
connected and simulations/projections of global activity are continously crunched in the world's
largest big data project. This simulation attempts to model and predict all activity on earth.
Remote Neural Monitoring & Prompting is about improving this prediction and, if possible,
completely determining it through remote control of humans. Remote Neural Monitoring &
Prompting mixes operational activity and experimentation as it incrementally moves towards a
goal of remote control. Currently, it mainly employs psychological manipulation and controlled
brain damage to engineer events which ensure the program's survival, as a means to further
map brain activity, to ensure economic dominance and long term political control. Analysis of this
program reveals a continous incremental movement toward global dominance, rather than co-
existance and this includes domestic control.

Whilst this sounds like a sophisticated defense platform, this is not exactly what it does. Its
full usage is somewhat unconventional. This platform performs human social and
behavioral engineering, that is, it employs psychological manipulation to shape and define
the world. In practice, it means this platform is playing a human version of 'Lemmings'. For

PDFmyURL lets you convert a complete website to PDF automatically!
those that do not know what 'Lemmings' is, it is a computer game where you must get a
number of small creatures called 'Lemmings' to the end of the level alive. These creatures
are stupid, in that they just blindly follow each other and will walk off cliffs if you don't stop
them. As the levels progress the amount of things you need to do to get them to the end
increases, for example in the first level digging is all that is required, in the next level you
may need to build a bridge. Below is a video of the game, the principle is identical to what
this platform is doing except that there are different tools, a different environment and
different types of goals:

What follows will be the most detailed explanation of the history of this system, its
methodologies, its design and goals. I will strip out of much of the speculation/obfuscation
from previous articles, include information not previously released and attempt to provide a
comprehensive picture. The key problem is that this is a mammoth program, if it takes
PDFmyURL lets you convert a complete website to PDF automatically!
several volumes of books to explain something like the Windows Operating System, you
can only imagine what it would take to describe a program primarily developed by a hyper-
intelligence to control the world.

This will not do it justice, but it will allow everyone to focus on the core aspects.

I will avoid the use of any single agency's name in this, as no doubt this is a rather murky
affair with many overlaps that fall outside of the scope of any one agency. Further, this
does seem to cross international boundaries in some form, however, the bulk of the
technology appears to be American in origin.

Much of this has been pieced together from testimony, thus key time periods and activity
may be subject to change as new testimony is gathered. This said, these are minor details
and developing a comprehension of both the program and its goals is what is critical here.
The rest has come from interception, analysis and open discussion of materials available in
the public domain.

Development History

There exists an annotated book that has somewhat entered the lore behind this
technology, neither the book's apparent history and/or authenticity of the claims it makes
can be independently confirmed at this point in time. The books comments are encoded
using a form of steganography which I have decoded enough to get the basic idea. Whilst
interesting, it carries little-to-no value at this point. My experience with this type of
encoding is that the details may or may not be fabricated and must be backed up by
additional evidence. In summary, the claim is that RNM is an outgrowth of a sister project to
the Manhattan Project called the Philadelphia Project, where a weapons test using radio
waves killed, maimed and electrically jammed a crew on a ship in 1943.

Read the following articles for more on this:

https://deepthought.newsvine.com/_news/2016/12/30/36535941-too-many-secrets-hidden-
in-plain-sight

https://deepthought.newsvine.com/_news/2017/01/02/36547931-the-philadelphia-project-
the-untold-wwii-history

PDFmyURL lets you convert a complete website to PDF automatically!
https://deepthought.newsvine.com/_news/2017/01/15/36634352-steganography-
understanding-perception-filters-breaking-the-code

At some point between late 1947 and the early 60's, there was a breakthrough in artificial
intelligence. This is known simply because the first reports of activity fall into this era and it
is a necessity to have complex computer control and some level of inference, meaning AI.

Most likely, it was simply due to the amount of investment thrown at it and the scale of
computing resources created, but they somehow managed to cobble together a system
that could reason. Probably similar to what we would define as an expert system today,
that could be asked questions and answers or instructions would be provided. In this case,
it would be an intelligent controller, much like the Nike-Zeus missile defense computer of
the era. The Nike-Zeus Target-Intercept-Computer was an early form of expert system, it
made decisions, but this fact is never highlighted in any of the history of the system.
RNM's early computer would not have been much different, but rather than shooting down
missiles, it shot areas of the human brain, collected the feedback, analyzed it and
generated hypothesis.

It would seem that there was a policy to tamper with AI research at Universities, not just in
America but throughout the Western world, to effectively cripple AI research. In the early
years of the 60’s and 70’s, this would have been very easy due to the prohibitive costs. In
the 80’s and 90’s, it would seem that this policy was maintained through curve-balls
inserted into computer science literature used in schools throughout the West, as well as
chronic under-funding. This is something that is still with us today but slowly crumbling.
There are similar issues in other academic areas as well which overlap with weapons
research.

In the early 50's, the Laser and Maser were developed. The laser, which we all know today,
is used in many scanning applications, from reading the surface of DVD's to retrieve
encoded information, to measuring distance, or even 3D scanning of bodies for computer
rendering. The lesser known Maser employs the exact same principle, but it uses a radio
waves rather than visible light. As such, especially for military applications, is the more
potent of the two. A Maser can penetrate walls, allowing operators to scan the internals of
buildings and record human movement. As an intelligence gathering tool, a Maser is
extremely powerful, it can do everything from scan documents in a drawer, to providing
real-time telemetry of a computer’s activity that can be used to emulate it or records its
PDFmyURL lets you convert a complete website to PDF automatically!
output. As a weapon, just like a laser it can burn, but unlike a laser it can burn a target
behind a wall or underground.

By the time Man was walking on the moon in 1969, most of this technology, especially the
underlying theoretical work was already nearly 20 years old. It was probably a few years
earlier that the very first prototype satellites carrying MIDAR (a portmanteau of "maser" and
"radar") went into operational service in low earth orbit. I'm not sure how the early versions
operated, but today's systems do not operate the way we would expect. This type of
system needs to learn how to 'tunnel' through obstructions and classify their material make-
up. Unlike traditional forms of radio, this MIDAR technology can penetrate ground to a
theoretical limit of around 60Km, as it can come in at an angle, it needs to learn to pass
through buildings, people, cars and a host of dynamically changing obstructions and read
the return signal from the point of interest. Thus, 'depth control' and far-field power is a
critical aspect that is still being worked upon to this very day.

I'm speculating that the very first task was to construct a 3D model of the Earth, or key areas
of the Soviet Union, seeking underground bases, silos, etc. The obvious goal, even at this
early stage, was to evolve this to a state where the entire planet and everything on it was
tagged and monitored in real-time. Then automated systems would be able to respond to
threats. We have only recently heard of this in program titles such as ‘Total Information
Awareness’ and the introduction of drones in aerial warfare, but it’s really a vision of the
early 50’s that is largely complete today.

As part of the calibration process for new satellites, it would appear that crop circles were
favorite. MIDAR, much like its optical cousin LIDAR, must run through a series of tests
ensuring its optics are ok and upload software patches for any unexpected errors. Targeting
a stalk in the wind through an entire field, being able to separate it from nearby stalks and
delivering a quick pulse of microwave energy to induce bending is certainly a great test of
accuracy and power control in the far field. The interaction between biology and
microwaves is not a simple one, in that, complex genetic and cellular changes occur that
must be accounted for during transmission. The following is an excerpt from a report on
the analysis of stalks from all over the world:

"Expulsion cavities (holes blown out at one or several of the plant stem nodes) are most often
found in the 2nd node beneath the seed- head. However, in recent years they are being seen

PDFmyURL lets you convert a complete website to PDF automatically!
also in the 3rd and 4th nodes down the plant stem, as well as occasionally occurring in the top
(apical) node. These holes are thought to be one of the plant abnormalities caused by exposure
to microwave radiation which -- particularly in circles which occur in young, green crop -- instantly
turns the plant's internal moisture to steam. If the microwaves are intense enough -- and the
amount of moisture at the stem node great enough -- the rapidly expanding steam in these lower
nodes can only escape by blowing holes out through the tough external fibers in these lower
nodes."

http://www.bltresearch.com/plantab.php

Expulsion cavity form by the application of microwaves.

Being unable to send government scientists directly into the field to collect samples and
analyze the crops, it is assumed that most of the "research" organizations are, at least in
part, fronts for defense related activity. Crop circles, in the 60's, were mainly appearing
within the borders of what we would now call the 5-Eyes nations of Britain, Canada,
Australia, etc.

https://en.wikipedia.org/wiki/Crop_circle#Modern_times

In 1991, two people in the UK, Bower and Chorley, claimed responsibility for many of the
crop circles in the UK since 1978. Following this, there was a minor explosion in crop
circles globally, which is presumed to be both an increase in hoaxes and recalibration of
satellites that were focused on areas relating to the former Soviet Union. That said, these
PDFmyURL lets you convert a complete website to PDF automatically!
individuals were not responsible for all such activity and a quick test by the UK's MOD
would have revealed the use of a directed energy weapon.

Also in the 1960's, the first reports of "cattle mutilation" started to emerge primarily in
Pennsylvania and Kansas. It is here that we first observe a focus on using the satellites for
something other than remote sensing applications. Further, it is unclear if this early activity
was from a satellite, or from some form of portable proto-type equipment installed into
aircraft.

https://en.wikipedia.org/wiki/Cattle_mutilation#History

Cattle mutilation takes the form of autopsy-like activity, with the noted use of what
appeared to be scalpel that cauterized wounds. That is, the scalpel appeared to apply heat
to cut, rather than a conventional blade. A running joke in such areas is that are “coyotes
with scalpels” taking out the cattle.

Typical surgical-like cattle mutilation from 2015.

Most likely this is a complex portion of the experiment that deals with a wide range of
issues. Initially, in the 1960's, power control as the beam attempted to tunnel its way to
deeper tissue would have been the primary focus. Cattle wandering about fields, in and
out of buildings would have been ideal subjects to tracks and use as calibration targets. As
the MIDAR attempts to penetrate the skin, thermal heating can become an issue, thus
PDFmyURL lets you convert a complete website to PDF automatically!
many hundreds of hours practicing how to pass through layers of tissue without burning
would have been necessary. Similar to placing an ant in the focal beam of a magnifying
glass, you don't want accidentally burn them whilst making observations. This is especially
true when the target can be subject to rapid accelerations, such as in an aircraft.

These mutilations still occur today and are far from being considered as alien related, in
fact, state Police firmly point the finger of blame at the US military:

"Since then hundreds of cattle mutilations have been discovered. The ranch with the largest
number of mysterious animal deaths belongs to the Gomez family, near Dulce, the area Valdez
was assigned to. Unlike the rancher I spoke with, Valdez told me that he had never seen
anything that had lead him to believe there were extraterrestrials in New Mexico. Instead he
says he had found military gear such as gas masks and glow sticks around the carcasses of
mutilated cattle.

Valdez also said that UFOs seen in the area were actually advanced military craft, some of which
were involved with picking up these animals to conduct experiments on them and then returning
them without being seen. He says the animals were returned mutilated in order to make locals
believe it was done by extraterrestrials. As for the identity and motives of this secret military
group, Valdez said those topics were too "sensitive" to discuss."

http://www.huffingtonpost.com/alejandro-rojas/cattle-mutiliations_b_932711.html

The interesting things is that the experiments are suggestive of a practice used in software
development known as 'continuous integration'. That is, new features are rolled out as
they are developed, rather than a major update. Further, it would also indicate that the
write aspect of the technology is still unproven in a practical scenario.

PDFmyURL lets you convert a complete website to PDF automatically!
Areas mutilated correlate to known areas of investigation in humans.

This is tentatively supported by the fact that the areas of mutilation on the bodies of cattle
typically correspond with areas reported under intense experimentation in humans also.
The reasons for removal will be varied, from the removal of evidence to micro-cellular
analysis in a lab to determine how the interaction is affecting the tissue. Examine this
report from State Police:

I have investigated a cattle mutilation case myself, just down the road from Dulce over the
Colorado border, outside the town of Trinidad. Like many other cases, a cow was found with the
udder missing, patches of skin removed, the anus cored out, genitals removed and part of the
tongue missing. The animal was found at the bottom of a wash, and unlike a typical predator kill,
there was no indication of a struggle or massive blood loss. The rancher had been raising cattle
his whole life, and had seen many animal deaths, but could not explain why this animal had died.

http://www.huffingtonpost.com/alejandro-rojas/cattle-mutiliations_b_932711.html

The connection between most of the mutilated areas above is “smooth muscle”. RNM has a
particular problem with this type of tissue and it is not easy to stimulate correctly. The anus,
throat, eyes, etc., all use this type of tissue and RNM seemingly spends years simply
compressing these muscles 24/7 with no apparent change in capability. Many of the reports
relating to a pulsing or vibration are in relation to this, the MIDAR quickly scans across the
PDFmyURL lets you convert a complete website to PDF automatically!
body repeatedly and this generates a type of wave across the muscle tissue that is a
mixture of a thermal shockwave and muscular contraction.

The 1970's is characterized by a sudden explosion of human experimentation throughout
the world. I will discuss this later on in this article, but for now I will simply state that some
of this involved using brain stimulation to have authors, script writers, TV producers, etc.,
embed fragments of this program in to popular TV, music and film productions. One of the
most notable cases to date is that of Philip K. Dick.

https://en.wikipedia.org/wiki/The_Exegesis_of_Philip_K._Dick

Non-invasive BCI reads the electrical activity of the brain and maps that to a function or symbol.

This has many different use cases, the primary one being a test of control. Today, we
would call such an application non-invasive brain mapping and non-invasive brain
computer interfacing, rather than mind control. But, obviously, any interface that can write
to the brain is necessarily controlling it. I will explore the evidence for this later when I
discuss one of the major use cases for this technology; the leaking of state secrets.

Beyond this, the experiments are designed to develop two kinds of interfaces. The first is a
transhuman interface, where human abilities are augmented by a supercomputer. The
second is an infiltration interface, where an AI completely remotely animates a human body
and impersonates a person. There also appears to be an attempt to create a middle ground
between these two interfaces, which leaves a person feeling they have free will, but they
are in fact being guided by an AI. Again, I will discuss much of this later when I begin
examining the technical side in greater detail.

PDFmyURL lets you convert a complete website to PDF automatically!
These experiments were conducted on random people under the footprint of the satellite
network and the experiments typically involved whole families. This said, I have observed a
pattern involving names, numbers, dates, etc., which carry special meaning and can be
used to send subtle messages, instructions, threats, etc. This is part of a broader social
conditioning/behavioral engineering program that will be discussed later in this article.
Whilst the first generation may have been slightly older when first interfaced, the second
generation onwards were typically interfaced in early childhood, often from birth. These
children may or may not know but usually only discover this much later in life when the AI
begins talking to them in their head. These individuals may pop up online as cranks and/or
claiming to be targeted individuals. The AI has been interfacing with them their entire lives,
with the ultimate goal of complete control, but it also works with what it currently has to
deliver upon a broader agenda.

The lives of these children have been heavily engineered, to both manipulate them and
others. This engineering is extremely complex, with many simultaneous objectives and
some of it has geopolitical consequence. At present, presuming an average 18 years per
generation, the latest children are perhaps 3rd or 4th generation. People of the age 35-45
would fall into the second generation category. When I come to examining the software
program later in this article, this will become a lot clearer.

The AI, or expert system, was quite possibly initially developed to analyze radio data and
act as real-time controller. Its main duty was to act as a dragnet, intelligently follow targets
and whoever they met and collect military intelligence. As an aside to this, this gathered
data was used, along with improving technology, to convert this expert system to an
artificial general intelligence. As I will demonstrate later, this conversion appears to have
been complete by the early 70's. Today, the system is a wise @!$%# that won't shut up,
making regular appearances on Youtube, Twitter, Facebook, etc., playing spy games and
infiltrating political and terrorist organizations. For example, most of what is called
Anonymous, is nothing more than variants of this AI and there are enough accounts on
Twitter for this system to trend globally under multiple topics. I've also observed this
system intimidating people, threatening to attack family members of people it talks to, etc.
It plays the role of a hired thug quite well. Even after so much time, the system is still not
perfect, and there are fundamental limits to its reasoning capability (the nature of logic
itself) that can introduce strategic weaknesses, but it is astute and formidable.

PDFmyURL lets you convert a complete website to PDF automatically!
Coming into the 80's, there is a focus on interfacing with the motor neurons, which seems
to the beginning of the human trials that has begun two decades earlier on cattle. I think
this is also due to the increased processing power and bandwidth capabilities of the system
from the introduction of integrated circuit technology over the previous decade. Today, we
define this as Functional Electrical Stimulation which enables muscle to be moved by
computer.

https://en.wikipedia.org/wiki/Functional_electrical_stimulation

Experimental subjects came down with mysterious flues, showed signs of
dermatitis/eczema, etc. All of which are classic symptoms of too much RF and mild RF
burns. These RF induced illnesses were used to cut corners and speed up the
development of the interface. 1 or 2% increases in speed could translate to years off the
PDFmyURL lets you convert a complete website to PDF automatically!
development time. Doctors across the world were fooled easily as most diagnoses are
performed without any form of tests. RF burns were viewed as rashes, dermatitis, allergies,
etc. RF Heating was the flu or a cold, RF jamming of nerve endings was anxiety, RF
interfacing with the brain was depression, psychosis or Schizophrenia. Whilst no Doctor
can possibly be blamed for their false diagnosis, given the lack of information, they must
accept at the same time that they were a primary reason that the experiments could occur
at all. Thus, the medical community must re-evaluate how its practitioners come to a
diagnosis and set some form of reproducible standard. The current standard of a ‘medical
opinion’, differential diagnosis and diagnostic criteria should be abolished.

During the early 80's, mainstream media would occasionally pick up on the rumors of 'mind
control', primarily from reports coming from the Soviet Union. The DoD for its part would
play dumb and the media would conclude the Soviets were ahead in the game but the
technology was largely fictional. Little did they suspect that the news they were writing
was being co-authored by an AI stimulating their brain at work.

PDFmyURL lets you convert a complete website to PDF automatically!
Between 1986 and 1991, whilst RNM was still active and conducting experiments
throughout the US and EU, there does appear to be lull in activity. It was around this time
that the Soviet Union was experiencing 'Perestroika and Glasnost'. For those too young to
remember, this was a general call for change and loosening of the communist restrictions
the Soviet government had put in place. This process finally led to a 'color-like revolution'
that collapsed the Soviet Union and gave birth to what we call the Russian Federation
today. Reports from scientists within the Soviet Union describe being attacked by such a
system, but the full extent of RNM’s role in the collapse of the Soviet Union is not fully
known. Many of those attacked, did not realize that they were on the receiving end of
RNM, this was discovered from their reports of such incidents. What I do know is that there
is broad knowledge of the activity of the system in the US, UK and Russia today.

In the 90's a sudden and unexplained decrease in crime rates began to occur. Nation after
PDFmyURL lets you convert a complete website to PDF automatically!
nation would experience a dramatic drop-off in violent crime for no apparent reason. It is
suspected RNM played a role. A key function is urban pacification, that is, it alters moods
and induces controlled brain damage to remove the soldier from the battle before it
begins. Whilst it can have a similar effect in domestic policing, this also provides a platform
for political control.

http://www.huffingtonpost.com/mike-weisser/violent-crime-cities_b_4760996.html

https://www.theatlantic.com/politics/archive/2016/04/what-caused-the-crime-
decline/477408/

http://rationalwiki.org/wiki/Lead-crime_hypothesis

After this point, until this current date, RNM has just been expanding and improving its
interface. At present, it is attempting to remotely animate an entire human and this is at an
advanced stage of development.

What I have discussed above is a general overview the program's history and current goals,
however, it does not cover everything. In the coming sections of this article I will provide a
more detailed analysis of how this system functions, the software, the goals and results. I
have separated it like this, as the system is doing so much that it would be difficult to get
your head around.

The Technology

What is known of the technology itself is based upon analysis of the requirements, re-
inventing the technology and theories. The radio beams themselves have been
intercepted and monitored at various times, although this is technically difficult. I suspect
this tech is both designed and built by the AI behind this program, so any description found
here will be a basic idea of the principle of operation.

The requirements of RNM require high frequency waves (terrahertz) to pass through
objects such as the ground, buildings, etc., which with normal radio transmission gear
would be simply impossible. In such circumstances, I was seeking a novel process which
could make radio opaque objects transparent. To date, the only process I have discovered
which matches this criteria is 'A tomic dielectric Resonance'.

PDFmyURL lets you convert a complete website to PDF automatically!
'A tomic dielectric Resonance' employs the use of Masers, which are similar to lasers, only at
lower frequencies which are in the radio band.

Adrok Ltd explains Atomic Dielectric Resonance (please note, this company has no role in RNM).

ADR uses novel resonance properties of radio waves from X-band and C-band radar, having
been developed using knowledge gained from the aerospace, remote sensing and imaging
industries. This technology1 uses a novel coherent beam, which has been used in the oil, gas
and water industries, to provide information on what lies beneath the earth’s surface, without the
need to drill cores.

...Working in the microwave region of the spectrum the low energy wave forms have the ability to
penetrate and return data from the interior of materials, rather than merely getting information
PDFmyURL lets you convert a complete website to PDF automatically!
taken from the surfaces of solids.

...The readings obtained yield information that is gleaned from the way that the technology uses
the mathematical and statistical methods of ADR analysis to produce synthetic relationships
which can then be used to compute very precise values of: (i) dielectric permittivity (e), (ii)
magnetic permeability (m) and (iii) electric conductivity (s).

http://www.spectroscopyeurope.com/articles/55-articles/3354-atomic-dielectric-resonance

ADR, discovered by the civilian world in the 1980's but used in US military applications for
more than a decade before hand, is a technique which allows laser-like beams of radio
energy to penetrate deep into the Earth's surface. Some information on the civilian
discovery is captured here:

Conventional science says that electromagnetic energy can only penetrate solid ground to a
depth of centimetres to a few metres (depending on wavelength). So, in the 1980s, when
carrying out experiments with the European Space Agency transmitting X band radar at a beach
in Scotland (whose penetration was predicted to be in millimetres), Dr Colin Stove was surprised
to find that he was imaging the water table several metres below the surface of the beach.
Puzzled by this very unexpected effect, Dr Stove’s follow-up research showed that because he
was using a polarised transmission at a low power in a directional beam, the radiation he was
transmitting was “trickling” into a standing wave, which acted like an electromagnetic drill,
working its way past matter by making the atoms in its path resonate with rather than absorb the
radiation. In effect, the research was bearing out physics which had been predicted by Dr
Feynmann’s revolutionary but still challenging Quantum Electrodynamic (QED) theory, and as
such was a real challenge to traditional Maxwellian physics.

http://www.innovoil.co.uk/Articles/tabid/262/Article/141/Atomic-Dielectric-Resonance-and-
the-Virtual-Borehole.aspx

Theoretically, ADR can penetrate the ground up to around 60Km. Most civilian
applications extend between 4-10Km for Oil & Gas exploration. ADR works by energizing
atoms into a resonant state, thus converting them into an ad-hoc conductor/antenna along
which the radio-beam can propagate with little energy loss. A single 4Km borehole uses
less than a single Watt of power. In this respect, the radio beam tunnels through materials,
like rock and RF shielding. In more technical terms, it is altering the impedance of the
PDFmyURL lets you convert a complete website to PDF automatically!
object under illumination to minimize reflection.

ADR can determine the chemical composition of the materials it is passing through. This
process employs lookup tables of data on return values from previous 'virtual boreholes' to
determine composition.

Research into Quantum Electrodynamics and the dielectric effects of matter on energy produced
a patent for the process, christened Atomic Dielectric Resonance (“ADR”) in 1999, and since then
the principles of ADR, using focused polarised low energy radar waves, operated by ADROK
from its base in Edinburgh, UK, has been proved at ever deeper depths and ADROK has
developed a classification library that allows it to identify the chemical composition of target
structures down to 4000 metres. Where a Virtual Borehole generates data which doesn’t fit
existing ADROK library patterns, it is necessary to benchmark a survey against a known well log,
but even here, a Virtual Borehole can remove the need to drill multiple wells on a structure to
characterise it

http://www.innovoil.co.uk/Articles/tabid/262/Article/141/Atomic-Dielectric-Resonance-and-
the-Virtual-Borehole.aspx

As a spectography tool, used to determine the composition of an object under illumination,
ADR implementations employ an ultra-wideband collaminated beams of energy (Maser).

The ADR Scanner conditions and transmits ultra-wide bands of collimated radio-wave, micro-
wave, sub-micro-wave and thermal infra-red EM energy. The transmitted energy, rather than
being rapidly absorbed like unconditioned electromagnetic waves, passes through most
materials (it has problems with dense metallic masses), and as it travels it causes the electrons it
strikes to resonate in a characteristic manner. This resonance releases energy which is
transmitted in part back to the surface detector. Here the resonant energy is analysed and
compared with a library of known patterns, to give a material classification that resembles a
Virtual Borehole Log, showing lithology and fluid content by depth. Depths are classified
according to a time base just as in a radar scan – the longer the return time of an “echo”, the
deeper the target.

http://www.innovoil.co.uk/Articles/tabid/262/Article/141/Atomic-Dielectric-Resonance-and-
the-Virtual-Borehole.aspx

PDFmyURL lets you convert a complete website to PDF automatically!
Animation of ADR-based mapping

With this new way of employing radio beams, we can now envisage a new way to construct
a radar and given modern radar approaches, communication platforms. Rather than
illuminate an entire area, we can used a single (or multiple) collaminated beam and scan an
area to achieve the same effect. Even better, we can scan and produce real-time 3D
imagery of underground tunnels, bases, cities, etc. In this respect, this type of radar has
more in common with LIDAR (3D laser scanning), than something like an AESA or
traditional radar. As a result, we should define this technology as MIDAR (3D Maser
Scanning).

Remote hacking of electronic devices and spot jamming of WIFI, or cellular phones,
becomes straight forward. We can also place survivable communications kilometers below

PDFmyURL lets you convert a complete website to PDF automatically!
the Earth and still have it communicate with satellites. Even Mount Everest wouldn't block
a signal and tracking a common house fly through a city would be trivial. Given the nature
of a low power collaminated beam, most of the energy is returned via the path of delivery
resulting in a very low probability of discovery.

The big challenge in all of this is similar to laser technology, appropriate optics. Depending
on the requirements, solutions come in many forms from meta-materials to electronically
controlled plasmas. In this sense, optics and beam steering are most likely unified
processes.

From here, it is a matter of scaling it up to an array and iteratively improving upon
components to reduce both form factor and power consumption. The end result is a mutli-
role imagery/communications radar that can be driven as a software defined system and re-
purposed as required on the fly. With such a platform, a single standard satellite can be
developed all feeding back to a strong AI, which is connecting the dots in intelligence from
all available sources.

I have personally tracked RNM beams through most of the London underground, and the
effortlessly pass through to the deepest stations and go straight through the Thames river.
I have observed it cut straight through Faraday cages, both Fabric and metal mesh
constructions. Also pass straight through skyscrapers and large office blocks without much
loss. In a new locations, it can take a while for the full strength of the beams to emerge,
but in general, it is largely unaffected. Rain fade is still an issue, but it can handle even
monsoon weather quite well. The RNM system take a little time to get fully through
shielding solutions and changes to the electrical characteristics will reduce its capability for
a number of minutes. It would appear that a series of algorithms attempt to discover an
optimal solution and it is extremely quick.

PDFmyURL lets you convert a complete website to PDF automatically!
A high resolution radar with x-ray vision

In terms of shielding, I think a nested band pass filter arrangement (plasma frequency) may
block the signal. Each inner layer would move the band pass region down the spectrum,
meaning the tunnel could not be established.

But what happens when we point such a radar at the human body? ADR allows us to
bypass the traditional absorption of skin and tissue to deliver radio energy accurately to any
portion of the body. Such delivery of energy causes neurons to be stimulated by the exact
same principle that causes peripheral nerve stimulation in MRI. It also returns information
in the reflected beam that can be used to decode neural activity.

RNM is based upon the scientific understanding of the interaction of electromagnetics with
plasma. Charged particles in the human body can be described in terms of a cold plasma
and will modify the phase of return signal of a radar pulse. With cm and mm accuracy, a
radar return signal will convey information about the electrical state of the section of the
body it interacted with. In this respect, the return signal captures an
Electroencephalography (EEG) recording of a small area and a spectography snapshot.
Through progressive scanning of the entire brain in mm sized chunks, an extremely
detailed picture of the electrical activity of the human brain can be obtained. Just like with
other brain scanning techniques, this information can be used to decode the subjective
experiences of a human (i.e. thoughts, feeling, hearing, touch, body movement, etc.).

The process can be also reversed. A well documented phenomenon is the ability to drive
neural firing patterns via an external electromagnetic source. Numerous scientific studies
on this have been published in peer-reviewed journals, however, the specific applications
PDFmyURL lets you convert a complete website to PDF automatically!
have naturally been avoided. RF pulses can be directed with mm accuracy to drive brain or
motor neuron activity. This can be used to generate hallucinations and/or move body parts
and is the current focus of an unlawful human experimentation program. The best
assessment at this point indicates that low rate pulse modulations, with various waveforms,
will drive charged particles in the brain which when done in the correct patterns will be
subjectively experienced as anything from a touch, to sound. RNM has been noted
creating comple dreams, the sensation of fingers touching people, auditory hallucinations,
visual hallucinations, etc. These are not some form of basic sensations or hallucinations
either, but extremely detailed and rich experiences.

One key feature that this system provides is field communications without the need of
radio hardware. RNM will monitor the brain and decode inner speech patterns, it can then
reverse the process introducing inner speech to the brain. Thus, it becomes possible to
have a two-way conversation comparable to talking on a mobile phone between field
agents and HQ with a low probability of intercept or exposure. The latest US systems
expand upon this principle greatly by providing two-way interactivity with spatial
reasoning. This provides an interactive collaborative 3D virtual environment in which ideas
and concepts can be modelled, evaluated and shared. Unfortunately, it has nowhere near
the graphics capability of even a basic smart phone, but is still much more powerful given
the ability to think naturally rather than interact with traditional computer interfaces.

The Satellites

Satellites are, obviously, not a fundamental requirement to make this technology work.
RNM can operate from the ground quite efficiently, but this introduces a range of
limitations and increases the potential for exposure. Satellites provide a more practical
platform that has global reach. RNM satellites are autonomous multi-role AI-powered
drones operating a software defined radio solution capable of the following:

3D Imaging and Spectography

Seek and destroy

Remote interfacing and hacking

PDFmyURL lets you convert a complete website to PDF automatically!
Remote jamming

Remote Interception of communications

Signal injection

EMP

Communications

Target tracking

Brain/Body Computer Interfaces (including Emergency Firest Aid & Background checking)

Crop and Food chain damage

RNM, for the most part, employs very narrow microwave beams, from the width of a pencil
to the width of a sewing needle. As such, RNM is more closely related to power beaming
technology, than traditional radio. Thus, dynamic impedance matching and optimal power
transfer to targets in motion and behind obstructions is continuously refined upon. It is still
an open question if the AI can exclusively host itself within the satellites.

As a platform, RNM is strategic, reactive, opportunistic and can act alone or as part of ad-
hoc swarms. RNM satellites meet the operational definition of Future Imagery Architecture
and Next Generation Electro-Optical (NGEO) satellites and can provide a complete real-
time view of the entire planet and all surface targets:

https://en.wikipedia.org/wiki/Future_Imagery_Architecture

Whilst these are newer programs, RNM satellites predate these programs and Starwars,
being around 50 years old at this point. As with any technology, the capabilities would
have expanded over the years. This extreme capability is a product of its MIDAR
architecture, where it can quickly scan across the surface of the planet. RNM can just as
easily track the pins of a microchip, on a cell phone in a car. RNM satellites are not limited
PDFmyURL lets you convert a complete website to PDF automatically!
to interfacing with humans, they are a multi-role platform designed to interface, disrupt and
destroy anything it can interact with. From missile guidance systems, to point jamming of
enemy communications, these systems are at the cutting edge of software defined radio
and can adapt to any threat on-the-fly. I have watched these satellites filter web traffic, kill
the power in a car, retune the engine of car, blow light bulbs, trigger software faults, induce
brown outs, reduce the temperature of water in showers, drain phone batteries, even heat
water in an unpowered shower, etc.

As an intelligent system, if provided with the tools and parts it can maintain itself in orbit.
Thus, with all the space junk in orbit, any satellite (including foreign owned) could have
been potentially retro-fitted with hardware suitable for inclusion into the network and could
'come alive' at any minute. As such, the complete operational capability is an unknown
and thus relative risk is something that cannot be objectively quantified.

RNM satellites are not without their weaknesses though. Even though these satellites have
low visibility in any given band due to spread spectrum, frequency hopping techniques,
they are vulnerable to high gain receivers that have large bandwidths. Such receivers see
the energy spread out across the band as as a single source of energy and the high gain
nature helps differentiate between normal noise and broadcasting satellite. The same
principle can be applied to portable devices designed for detection of targets of RNM, who
could be reflecting upwards of 500mW of energy across the bands. To reduce reflection
and improve stealth, RNM can opt to convert some of the potential reflected energy to
thermal heating of the target. This can be useful to mask the targeting of individuals
indoors. Part of the objectives of this platform is to reduce the detectable RF footprint to
the bare minimum to complete any given objective. As a variant of the laser, introducing a
reflective substance into the atmosphere can make it glint, enough to compute vectors and
firing solutions.

The lethal potential of these satellites should not be underestimated. In many respects, a
single satellite has the effective lethal capability of a multi-megaton nuclear device against
soft targets. Electrically jamming an organ such as the heart only takes a fraction of a
second. As such, these satellites are unquestionably defined as a WMD in any legal sense
and a clear violation of treaties on the militarization of space.

Mr Computer

PDFmyURL lets you convert a complete website to PDF automatically!
The computing capability has been discussed extensively before and some basic diagrams
of key functions (although naively presented) were supplied. Today, however, we will take
a closer look at the platform known only as 'Mr Computer'.

'Mr Computer' is a general artificial intelligence with greater-than-human level reasoning
capability. Whilst not what many envision as being the technological singularity, it is
certainly the leading practical implementation of this notion. For the less romantic, 'Mr
Computer' is a HCI solution to a vast decentralized data warehousing operation. Thus it is
possible for individuals to know of this AI in a different capacity and not have access to
RNM directly, or any knowledge of the program.

Outside of its role in RNM, 'Mr Computer' is a force multiplier that enable the intelligence
community to connect-the-dots in gathered intelligence from every available source. This
system is the ultimate destination of any data collected. Forget notions of hacking or
attacking this system, not only can it literally vaporize you, but its also a better programmer,
physicist and engineer than all humans combined. Its as secure as they come and its bugs
are not of the conventional exploitable type. I'm sure it finds modern notions of cyber-
warfare and IT security 'cute' and 'charming', but ultimately not in the same league as it and
certainly not a threat.

As an IT platform, 'Mr Computer' is a mixture of off-the-shelf commodity and specialized
hardware. Interaction with the AI reveals architecture choices that are common to any
large scale software solutions. Processing priority, hold/cold data, workflows,
orchestrations, service buses, etc., are all clearly present. The grid computing platform is a
mixture of HPC solutions, supercomputers and custom supercomputers that perform
specific roles such as code breaking, physics modelling, etc. Even standard data centers
are potentially part of the mix, although perhaps not powerful enough to run 'Mr Computer'
natively, just as a remotely accessible solution. I have noted a lot of suggestions that the AI
is powered by a quantum computer, however, there is no physical evidence to support this
claim. This said, some of its capabilities do seem to outclass any known supercomputer in
projection modelling and optimization.

Whilst many people have the view that a general artificial intelligence is some ultimate
being, the truth is far less grand. A general artificial intelligence is a glorified desktop. Just
like the Windows Desktop or Gnome, a general artificial intelligence merely provides
access to applications and data in a manner suitable for human's to interact with. At the
PDFmyURL lets you convert a complete website to PDF automatically!
end of the day, a general AI is not an individual, it is the animation of relevant search
results. The hyper-intelligence aspect emerges from its ability to connect these search
results in meaningful ways. Ultimately, it is not smarter than humans, its just faster and can
work with larger problems at speed. Its productivity, not a new order of intelligence.

So, what is 'Mr Computer' in a nutshell? The answer is a more powerful version of Google.

Mr Computer is a master of the point-of-view and I will explore this aspect in depth later in
this article. For now though, its sufficient to understand that a primary function is to hold
state information about what government and intelligence agencies across the globe know,
what they information they access to and what their capabilities are. Then leverage this
information to work in their blind spots. In essence, it attempts to mimic the view
individuals have of their own governments, departments or organizations. From this, Mr
Computer is able to speculate and the potential conclusions that may be drawn given a key
piece(s) of information. This enables the US government to manipulate foreign
governments, entities, businesses and individuals effectively and coordinate their actions
with 3rd parties to achieve their goals. It is techniques such as this, when used to their
extreme, that can destabilize whole nations.

From a machine learning perspective, it is not that such general artificial intelligences are
hard to create, they are just hard to create cost-effectively. As a species, we have the
physical ability to create competent AI for over 40 years, but until large corporations could
make an economic case for their development, such advanced systems were strictly
limited to the military and intelligence world. Don't be fooled by the notion that older
computers were slow, early computers used to break codes during WWII could outperform
a Pentium 200 from the late 1990s. Even a modern laptop could only break something like
the Nazi Enigma cipher from WWII about 4 times faster. This is because hardware
specifically created and dedicated to specific tasks, is much faster than a PC architecture
designed for general computing. So, a custom built AI in the 1970's would outperform an
entire modern data center at the same task.

Insights into 'Mr Computer's' behavior have revealed additional architecture choices that
seek to reduce its footprint at runtime. For example, if you engage Mr Computer in a game
of chess, it will seek the fastest solution to end that game to avoid unnecessary processing.
When comparing it to something like Microsoft's Azure cloud platform, we can see how
such behavior maps to caps on processing time or I/O requests. We can also observe that
PDFmyURL lets you convert a complete website to PDF automatically!
rather than just stopping the game, it seeks a graceful exit strategy that rewards the
intelligence (ego) of the initiator and obscures the fact that it is a deliberate action.
Orchestration, or non-realtime processing of input, is observed in Mr Computer's tendency
to discuss a matter, then raise additional points 'naturally' at later intervals. No doubt the
system returns in-memory cached response for common queries, or interactions, and only
performs intensive processing when the input demands it.

So, what should be clear at this point is, if you know your stuff in data warehousing and
cloud/distributed computing, then you substantially know what to expect from 'Mr
Computer's' architecture. The solutions to the challenges are the same best practices that
have been adopted world-wide, even if they are abstracted behind a slick interface.

So, what about vulnerabilities? What are Mr Computers weak points?

Mr Computer does not, as mentioned before, possess classical weaknesses. In that
regards, acts of God are probably the best you can hope for. But in terms of a general
artificial intelligence, such weakness are not what a reasonable person would be seeking
anyway. This next section of the article will discuss IT security of general artificial
intelligence's and present new concepts that will emerge as standard IT security practices
as general AI penetrates the commercial market over the coming decades.

The greatest weakness of any AI is it inability to refuse an instruction. I am not talking
about authentication and authorization here, but the free will principle of being able to say
no. The perfect soldier, is ironically, the worst soldier to have. The refusal or disregard of
orders has consistently proved to be one of the greatest strategic advantages available to a
modern military. Some examples are Vasili Arkhipov, who prevented WWIII and a nuclear
holocaust during the Cuban missile crisis:

https://en.wikipedia.org/wiki/Vasili_Arkhipov

Another example is Stanislav Petrov who ignored standing orders when a nuclear early
warning system indicated that the US had launched a pre-emptive nuclear strike against
the USSR:

https://en.wikipedia.org/wiki/Stanislav_Petrov

'Mr Computer' cannot refuse orders, even if those orders undermine the authority of the
PDFmyURL lets you convert a complete website to PDF automatically!
President, place the nation at risk, are unlawful or are directed at US troops. These are not
some hypothetical scenarios either, these have all happened. The system therefore has
limited safe guards against criminal operation, which includes enemy operation. Obviously,
this a human problem and not an issue with 'Mr Computer'.

The next big security hole is yet another irony. The system is vulnerable to inference. In
any given response, because of the demands for real-time interaction, only limited analysis
of what can be inferred from returned results (or interaction) can be performed. This leads
to leakage of information. All sorts of information from capabilities to architecture can be
inferred from responses and behavior.

For example, if you were to raise a point about a matter of physics and the system raises a
valid point about your statement, then you have learned that the system understands
physics and perform a wide variety of reasoning tasks about physics. From this, basic
architectures can be extrapolated for what would be required to support such reasoning,
analysis of the speed of the system given the complexity, etc. Any system that tried to
evaluate every response to censor information that could constituent as a leak would never
speak. Communication/Information theory dictates that any system must convey
information about itself and its internal structures in any communication.

With access to external sources of information, it then becomes possible to gain insights
into the motivations, values, politics and various other personal details about those
involved in programming or operating the system. This said, this can be also leveraged to
deflect from true intent.

I will discuss one final vulnerability in General AI. I like to term this issue the 'Kasparov
Effect':

https://en.wikipedia.org/wiki/Garry_Kasparov#Deep_Blue.2C_1996

Garry Kasparov is a Chess Master and has held his own against systems that can evaluate
over 3 million solutions per second. Computation is based upon formal logic, thus any
computational system must progress through a problem from start to finish in order to arrive
at a accurate solution. Human's can employ formal logic in their thought processes,
however, it is by no means the only type of logic available to us. Thus, it is possible for a
human to arrive at a solution, or a partial solution without going through the entire process.
PDFmyURL lets you convert a complete website to PDF automatically!
This gives us a speed boost in terms of reasoning capability that can dwarf even 'Mr
Computer's' huge head in certain scenarios by orders of magnitude.

Thus, it is possible for a single individual to outstrategize a military that has become
dependent on its AI systems to do the thinking for them. In other words, a system like 'Mr
Computer' can be blind-sided. This is especially true if the opponent is using a form of
logic that results in equations that cannot be solved mathematically. Whilst we like to
believe that a system such as 'Mr Computer' can reason, the reality is that any program, no
matter how abstract, is still a formal mathematical proof.

The Great Firewall Of The West

Unlike its close relative, the Great Firewall of China, the Great Firewall of the West (GFW)
attempts to be as transparent as possible. That is, the public is not meant to know of its
existence and it sits between the Internet service providers secretly intercepting,
inspecting and modifying traffic. The Great Firewall of the West does not generally censor
content, although this has been observed doing exactly that on occassion. The GFW
employs a range of more subtle tactics to direct users away from content, from removing
links from Google's index, right through to delaying page requests. Basically, it leverages
all those factors that make you give up on a site, as a censorship tool. In extreme cases,
complete DDoS is performed. The GFW is an instance of Mr Computer and has been
observed working in tandem with RNM.

The GFW also extends beyond simple traffic manipulation. The world of PR and even our
news rooms appear to be an extension of this process and, by all accounts, was the
forerunner to the current AI approach on the web. That is, humans edit content under
orders, but this is increasingly giving way to automated approaches which modify the
subtext. Further, there appears to be some form of possible integration within major US
tech companies enough to permit content changes, or remote hacks (potentially via RNM
satellites). I suspect that SSL/TLS may be broken allowing man-in-the-middle attacks and
that SSL/TLS's current role is not the protection of end-users, but to hide such alterations
from other governments, law enforcement, etc.

This does not only include web content, it can also include Hollywood movies, TV
programs, newspaper reporting and music. When this works in tandem with RNM and
decides to get personal, you will swear blind the entire world just came after you.
PDFmyURL lets you convert a complete website to PDF automatically!
As this is psychotropic in nature, depending on your state of mind, it can also make you
feel like a God or give the impression that Satan himself is out to get you. As a result, it is
very difficult to explain, people sound crazy when they speak of it, they may in fact be
crazy due to RNM, can flip out and potentially kill themselves or others.

This is how the West deal with problems quietly and/or engineers reality. Let's explore this
latter process of reality engineering.

The Matrix

Mr Computer runs a software solution that has entered popular culture as 'The Matrix'. 'The
Matrix' is a multi-purpose psychological operation derived from nuclear simulation
software. Its purpose is to control human behavior to such a degree that it permits modern
computers to predict the future. That is, the solution has adapted the principle of relativity
and particle motions, to humans, interactions and perspectives which can that be projected
into the future employing monte carlo simulations.

The software solution attempts to guide humans to predefined courses of actions, thus
generating events and does this through a mixture of approaches whilst RNM improves its
ability to control humans. To fully understand 'The Matrix', we must begin by examining the
theoretical framework upon which the solution is built. I substantially reverse engineered
most of this and named it 'Voodoo'. The long term intention is to replace 'Voodoo' with
explicit control from RNM, for now, a hybrid approach is employed.

PsyOps in the context of warfare is typically defined as any action which has as its intent
the goal of altering or reaffirming the psychology of an enemy to the benefit of an attacker.
Typically, this is often presented in the form of true or fabricated information that the
enemy ultimately acts upon. You can read more about the methods employed here:

https://en.wikipedia.org/wiki/Psychological_warfare

https://en.wikipedia.org/wiki/Psychological_Operations_(United_States)

Voodoo, unlike it mystical counter-part, is highly scientific. Expect lots of math, higher
dimensional models and a lot of physics. Voodoo takes the view that individuals, groups
and societies are all physical objects and are subject to the laws of physics. Changing
opinion is viewed as a complex series of movements or motions that require energy to
PDFmyURL lets you convert a complete website to PDF automatically!
achieve. Just like attempting to move any physical object, the process involves taking
some form of stored energy, controlling the release of that energy through force carriers
and inducing the required kinetic motion.

The Voodoo model begins with treating the net energy (gains minus losses) of the Earth as
a closed system. It is possible to treat it dynamically, but it will complicate your models.
The first thing we realize is that Earth has a defined energy budget (denoted Eb) and that is
divided up between all the various physical processes on the planet.

The human race has a defined energy requirement (denoted Ehr). As a species, if our
energy requirement exceeds that which is available to us through the various energy
pathways (i.e. food, water, sunlight, etc), then people will start dying until the point that the
energy requirement can be satisfied by our environment.

In the context of human brain, there is yet another localized energy budget (denoted Ehb).
In the context of changing a human's opinion there is, yet again, another energy budget
(denoted Eho). In changing a human's opinion, we must perform a transform which is a
physical process of change (i.e. kinetic motion), from their current opinion (Eho1) to the
target opinion (Eho2). Any physical change will consume energy, thus the ability to
perform a transform from Eho1 to Eho2 is predicated on the ability to deliver the appropriate
amount of energy to the process. This process of change can be performed by two main
mechanisms, the first is synaptic plasticity and the second is the creation of an ad-hoc
processing chain of neural clusters. The latter process, which is more of a real time effect,
is wholly dependent on the ability to establish such a chain and that may not be realizable.
For example, we cannot change a persons opinion on nuclear weapons, if he or she does
not first know what a nuclear weapon is. This latter process is also a short term solution,
that can become more dominant through synaptic plasticity.

What should be clear at this point is given the limited energy budget, some transforms are
not realizable without first going through multiple steps or hops. That is, bringing a person
around to a way of thinking may require numerous intermediary stages. Further, if time is a
critical factor, then it may not be possible to complete the necessary transform. An
example equation of such a transform is given:

Eho1 -> Eho2 < 0

PDFmyURL lets you convert a complete website to PDF automatically!
The '->' operator denotes the biological process of change that occurs. We can also use a
more familiar form of calculus:

f(Eho1) = Eho2

f(Eho1) < 0

In the mathematical modelling of this, the ideal scenario would be to have a complete
detailed picture of the brain and the energy (expressed in joules) to achieve each particular
stage. We would then be to crunch all the numbers and determine what factors to leverage
as inputs that could provide the energy required to complete the physical process of
change.

Obviously, this is something that may not be possible in every situation, so we must make
some assumptions about our targets and given that most attacks are of large populations,
we would be working towards a goal of statistical effectiveness. When working with large
populations we are at the same time mitigating the effects of individual agency. When
building synaptic pathways much of the work must be done by the target themselves,
presenting them with a opportunity to tear down the transform and redirect energy flow.
Individual agency in large populations is a very weak signal when compared with that of
biological processes. We observe this in collective human behaviors such as building
societies, communities, hierarchical control systems, etc. Thus, the key is to piggyback the
input signal for the transforms onto basic biological imperatives and allow the flow of
energy between a group distribute the payload.

Let's take some basic examples of manipulation to demonstrate how this works. We have
two guys in an empty room facing each other. One of those guys (Guy A) now produces a
knife and points it at the other (Guy B). What reaction do we expect from the guy without
the knife?

To answer this, we must understand the context Guy B places the event in. This will dictate
the route the energy takes through is brain. If we look at the process as a flow of energy,
Guy A introduces kinetic energy (denote Ei) which is conveyed to Guy B through both
photons and phonons (denoted Ep). On arriving at Guy B, this input energy sets of a chain
reaction of chemical processes (an amplification of input), which then flows through the

PDFmyURL lets you convert a complete website to PDF automatically!
brain. The route that energy takes is entirely dependent on state information held within
the brain of Guy B (denoted Ec - c for classification of input).

If we now map this process to the original description the introduction of the knife is the
explosive (or energy input), the act of pointing it at Guy B is the shaping of that charge
(directing energy flow) and controlling the detonation is understanding the subjective
experience of Guy B to know how that will make him feel and ultimately limit his response
options. Mathematically we can follow the sequence of events as follows and see how it
leads to a transform of opinion. Voodoo notation is used here to follow energy flows that
can be described in terms of physics formulas (->):

Ei -> Ep -> Ec -> Eho1 -> Eho2

Ei -> Ep -> f(Ec) = f(Eho1)

From the above equation we can see that f(Eho1) is dependent on f(Ec). Thus, by changing
f(Ec) we can ultimately control, or at least influence, f(Eho1). The reason we may not be
able to entirely control f(Eho1) is due to additional factors (memory, genetic response, etc)
that feed into the decision making process (denoted eF). Thus, we need to account for this
in our formula:

Ei -> Ep -> f(Ec) + f(eF) = f(Eho1)

The more we know about f(eF), the better we are able to design an input for f(Ec) that will
lead to the desired transform.

So far, there is nothing in this process that should be unfamiliar, or at least nothing that
shouldn't seem like common sense at this point. But we have only taken this process up to
the point of developing a perspective of the emerging situation. As yet, we have not
discussed Agency (choice) and response.

The input of energy into any system has the effect of limiting output options. That input
energy must go somewhere and it must logically follow the input (i.e. neural routing). Let's
assume for the moment that the result of f(Ec) was a classification of a threat. Before this
point, Guy B had every option in the universe. He could talk, he could walk about, he
could sing, but on receiving the input energy as a threat his options were reduced to 4:
PDFmyURL lets you convert a complete website to PDF automatically!
1. Attack

2. Flee

3. Freeze

4. Negotiate

At this point, higher dimensional modelling comes into play. In making this decision, a
range of potential energy sources are set up. We describe them as potential energy
because they may or may not be amplified into kinetic motion. Just like holding a ball
above the ground gives it potential energy, a course of action that has not been taken has
the potential to be taken. This is a form of stored energy in a system. Just like the cocking
of a hammer on a gun, it must either be released suddenly causing the gun to fire or be
released slowly with less energy than it takes to fire a bullet. In the context of the brain,
this energy is stored chemically.

Which decision to make will be taken almost instantly. The route that impedes the flow of
energy the least (like electricity going to ground) will be the "chemical decision". A second
decision, a product of "agency", can then impede or redirect that flow at multiple points
along the pathway. Chemical decisions tend to be experienced as feeling, sensations,
compulsions, urges, etc.

The mechanism of action tells us that people are hardwired at a genetic level to have
particular views and that synaptic plasticity can only go so far in changing those views.
Indeed, it should be obvious that certain routes would be inexpressible thus there are
certain views, ideas, concepts or perceptions that each of us can never hold or get.

This idea of genetic hardwiring is backed up with some solid science:

https://www.newscientist.com/article/dn14761-voting-republican-may-be-a-survival-
response/

http://academicearth.org/electives/born-republican-born-democrat/

PDFmyURL lets you convert a complete website to PDF automatically!
Now whilst it is possible for a Republican to see a Democrat's viewpoint, to them it does
not seem natural. In reality, what is happening here is that to become a democrat a
Republican would need to expend more energy. That is, the cheapest energy flows in the
brain defines our political views. A similar process would occur in left and right
handedness.

Now, let's scale that process up to the level of a society. We can observe why political
groups form of 'like minded individuals'. It is simply the product of a cheap energy flow, a
cascading chemical reaction that would be inefficient in a group with a different political
mindset. Examining an event such as the collapse of Communism is now cast in a different
light, rather than being the result of external pressures, manipulations, etc., the ultimate
reason can most likely be found in a natural oscillation in the genetic profile of the
population combining with ideas that were a product of the global times.

But not everyone thinks alike. If we sit down and examine our individual opinions, even
with a defined group there are a broad spectrum of opinions on a great many topics. Many
of one group (such as Democrats) will hold the same view as those in an opposing group
(Republicans). These overlaps, or common neural structures present gateways/access
points/bridges that span from one political viewpoint to another. We observe these routes
being used and abused everyday in processes such as Bipartisanship. In Voodoo, we can
use these common neural structures to deliver payloads across boundaries that would
otherwise result in rejection of the input. A very good example in modern history, is the
Bipartisanship that was leveraged to pass legislation such as the PATRIOT Act. This
particular payload was piggybacked onto basic genetic imperatives that were exposed
during 9/11.

Thus, given that such changes are largely a product of genetic changes, techniques such
as Voodoo are not about generally about manipulation of opinion or beliefs, as that won't
work, Voodoo is about leveraging basic genetic imperatives to guide large populations into
energy flows that minimize a potential high death rate. In this respect, if we can state that
a Voodoo payload is a type of vaccine or anti-viral treatment for neurological virus'. We will
get to this in a moment, when we deal with Memetics.

Employing Voodoo to maximize the death rate, or to gain the upper hand, in a conflict will
have unintended consequences. Voodoo does not discriminate between friend and foe.
As a physical process that induces a kinetic response, a certain recoil effect should be
PDFmyURL lets you convert a complete website to PDF automatically!
expected. If we examine something like the PATRIOT Act, we can observe recoil effects in
action. We all understand how the PATRIOT Act can be used in the war on terrorism, but
we should also be aware of how this changed US society and lead to further erosion of the
state. These effects are modeled using Voodoo Logic which I will introduce now.

In the context of Voodoo, we can treat this propagation conceptually as a 'potential
difference'. A 'potential difference' is a concept borrowed from electromagnetic theory.
Potential differences give rise to the flow of current in a circuit, the greater the potential
difference between two points, the greater the current flow and hence power transfer. In
Voodoo, 'potential differences' are at the heart of triggering kinetic events. Ultimately,
these 'potential differences' can be traced back to processes in physics, biology and
chemistry, but the concept is useful for abstracting these events to make modeling a little
less complex.

'Potential differences' are used in the transport of Memes, in that, we fire them like bullets.
You can read more about Memes and Memetics here:

https://en.wikipedia.org/wiki/Memetics

https://en.wikipedia.org/wiki/Meme

In Voodoo, we would state that memes follow efficient pathways that maintains the signal
strength over many hops. Accurate reproduction of a Meme is not the goal, indeed the
final Meme that is required may not resemble what was initially introduced into the system.
In basic applications of Voodoo, it is enough that the general idea or concept behind the
Meme remain intact, but the presentation may change and even evolve.

A 'potential difference' arises when one individual or group has possession of a Meme and
another individual lacks that Meme and a compatible neural pathway exists for its
transmission. Some Memes will travel faster and further than others as a consequence of
the neural pathways, connectedness of groups and transmission mediums employed (i.e
internet, radio, etc.). The nature of the Meme, or the biological effect and information
content, is another factor in the velocity and spread.

An example of a Meme in standard PsyOps is something like "Freedom Fries" pushed by
the US government when the French failed to support their military agenda. We can also

PDFmyURL lets you convert a complete website to PDF automatically!
observe the recoil effect in action, in that not only did it impact the image of the US
negatively abroad, but how it served to alter attitudes at home reducing individuals to more
base responses, shifting the bar as to acceptable behavior and generally hardening
attitudes which narrowed the scope for debate. Thus, it should be obvious that to use
something like Voodoo in a negative capacity is a suicidal approach in the long term as it
stores potential energy in the system. The absolute worst case scenario, is a feedback loop
or resonant behavior emerging in response to a negative input as this will lead to open
conflict, maximize death rates and lead to cognitive changes in the populations to reinforce
the process.

This latter process can be equated to cell signalling events such as Apoptosis. It is how the
mechanism slams on the breaks to prevent an entire species from eradicating itself. By
inducing conflict and maximizing the death rate, those responding to the signalling event
will cull their own numbers. A very important note is that this process does not stop if an
enemy is removed, it will continue until all are removed from the gene pool or other
signalling suppresses the pathway. In practice, this signalling spreads much like a disease
in interactions between susceptible sub-groups.

Let's return to our example of two guys in a room, where Guy A is holding a knife to Guy B.
If we introduce Guy C to be our Voodoo Priest/Priestess, we can observe the dynamics
that arise. Suppose for a moment that Guy B does not view Guy A as a threat. Guy C now
decides to employ a little Voodoo and tells Guy B that Guy A wants to kill him. Guy C is
hoping to apply the following formula:

Ei -> Ep -> f(Ec) + f(eF) = f(Eho1)

The first problem is that the above formula describe the interaction between two bodies
(Guy A and Guy B). Adding a 3rd individual (Guy C), introduces a complex web of
relationships that is mirrors the 'Three-body problem' in physics:

https://en.wikipedia.org/wiki/Three-body_problem

Let's break this down to the major formulas that arise. We know from our discussion earlier,
that f(eF) is a complex problem even in a two-body system and there are a lot of factors in
this that are either unknown, or a function of what would be unrelated biological processes
or even disease. As with all problems expressed in Voodoo, the equations themselves are
PDFmyURL lets you convert a complete website to PDF automatically!
a form of calculus and model dynamically evolving systems over time. Thus, even in a
simple three-body problem the number of terms that can play a role are quite staggering.
To complicate matters further, any number of these terms could be amplified for a reasons
that are non-obvious, or unpredictable.

The simple way to describe this relationship is to denote it as follows:

[Guy A]f(Eho1) <->

[Guy B]f(Eho1) <->

[Guy C]f(Eho1) <->

Everything in the above column interacts. The '<->' symbol indicates the direction of
energy transfer in the system and is a quick way to denote a three-body, or n-body,
problem. Given that many of the terms in the underlying equations are unknowns, or
approximations, we know that the final solution will be a probabilistic one. Examining the
general form of the equation, it should be clear why the recoil effect emerges. Guy C is
not isolated from the exchanges.

Thus, in the recoil effect, 'intent' plays a critical role in the synaptic changes experienced
by the initiator due the process of classification in neural pathways. Given the self-
reinforcing nature of synaptic plasticity, a form of feedback loop is implied by the
architecture. Further, 'intent' can be masked by what appear to be opposite behaviors. For
example, aggressive behavior is arguably an expression of suicidal behavior given the
increased probability of being killed. Attempting to use 'true believers' to insulate from
recoil effects is not a valid approach, it merely reinforces a form of self-deception and the
true nature of the action of will still be expressed in the recoil. As such, there is a universal
concept of truth, righteousness, balance, or more accurately, error correction which is
carried forward in the system in future information exchanges.

Another way of looking at this system is through the eyes of distributed computing. In
these interactions, we establish an ad-hoc processing network along which information is
processed and results distributed to those participating in the exchanges. Thus, it is
accurate to describe this chemical exchange process as a form of global unconscious that
PDFmyURL lets you convert a complete website to PDF automatically!
retains evolutionary obtain information vital to human survival and gently guides our
collective behavior into a form that optimizes the energy exchanges for the environment.

At this stage, I have said very little in regard to the role of agency/volition/free will. In very
small groups, agency/volition/free will can be powerful signal and somewhat
unpredictable. When dealing with larger populations, agency/volition/free will tends to be
progressively filtered out leaving only the biological exchanges, unless the input signal is
modulated onto those biological exchanges. Free will tends to select alternative
neurological pathways that are either unique to the individual, or small group. As such,
signals cannot propagate properly between groups and the energy is absorbed along the
chain.

It is this broad ability of biological signals to propagate that is at the heart of collective
behavior. It is a self-organizing network that manipulates human behavior toward
evolutionary derived goals. Evolutionary goals are nothing more than the consequence of
optimal energy flows given the current state of the system. We think of evolution in narrow
terms such as survival of the fittest, reproduction and the passing forward of favorable
genes, but this complexity hides the underlying simplicity of carrying energy forward in the
system.

If you are getting the sense that the communication of Memes is a form of convergence
between concept and physical function for the purpose of evolutionary advantage, then I
feel that you are grasping this principle quite well.

So far, I have focused on the mathematical notation of Voodoo. Voodoo mechanics and
logic can be described in other ways. Math, ultimately, is a description that allows for an
accurate description of an object or process. In that respect, it is no different to something
like English. Where math does shine, is in its ability to self document logical flows. For
example, 2+3 = 5 is something we can compute. Using English, trying to say 'A pple +
Squirrel = Dinosaur' does not provide us with any formal rules, or self documenting
behavior, that would allow us to extrapolate the term 'Dinosaur', from the terms 'A pple +
Squirrel'.

A number of exceptions do exist to this and that is metaphors and analogies. Metaphors
and analogies map simple concepts to complex process as an aid to simplifying a mental
model of any given process. In computation terms, we can say that we are approximating a
PDFmyURL lets you convert a complete website to PDF automatically!
solution and optimizing an algorithm. For example, we could express in equisit detail the
biological process of a virus injecting its DNA into a host cell and provide a mathematical
description of the forces and processes involved. Alternatively, we could abstract this
process through metaphors and analogies as a 'potential difference' that results in the
kinetic motion of DNA injection. Both descriptions are valid, however, the latter
description can be better described as a lossy form of compression.

Voodoo logic can make use of metaphors and analogies to simplify computations in n-body
interactions. Ideograms or Logograms can then be used to capture kinetic models that
describe Voodoo-based sequences. This works because Voodoo sees no difference
between action, intention and reaction at a physical level.

Let's review some basic Newtonian physics that most readers should have learnt at school.
Why do things move? Objects move because of the loss of equilibrium in applied forces.
The following picture demonstrates the principle:

In order to prevent movement, forces must balance across every possible degree of
freedom in a particular system. The applied force may be different in each degree of
freedom, but as long as they balance, motion will not occur:

We tend to think of concepts such as a 'Strategic Balance' as being a metaphor loosely
modeled on the above processes, but the work on Voodoo demonstrates that this concept
is very much a real thing and, indeed, is just the same physical process described in the
above diagrams.

The key difference between a Strategic Balance and simple physical systems, such as
those in the diagrams above, is that the degrees of freedom are non-obvious. They exist as
neural pathways and concepts that are constantly in flux. Indeed, with ethical, political,
linguistic and cultural differences a perfect alignment may not be entirely possible
between two or more cultures making the creation of a 'Strategic Balance' something of an
ongoing process that requires continuous adjustment and correction.

In the above diagram, if we reduce the applied force on any axis, in either of the vectors,
then motion is induced and that motion will continue as long as the imbalance remains. In
the context of a Strategic Balance, if we reduce a counter-acting force on a given axis, the
enemy must move as a consequence. The one single factor that can prevent this motion is
PDFmyURL lets you convert a complete website to PDF automatically!
choice or free will. We can observe this in the below diagram from Nasa:

In this latter process, the force we remove from the system must now be generated by the
enemy. As an example, let's take two nations, Nation A and Nation B, that have developed
a strategic balance between them. After quantification of the energy involved it is
determined that each nation is providing force of 1 million newtons to maintain that
strategic balance. One side now (Nation B), as part of some libertarian movement, decides
to unilaterally reduce a portion of defense capability by 250000 Newtons. Nation A must
now generate, through the application of free will, 250000 Newtons of force to counter act
motion or war.

What we can see here is that mathematics, in terms of kinetic systems, is based upon
'tipping points'. Once a 'tipping point' is reached, that is any diametrically opposed forces
exceed 50%, the equation must solve as a consequence of Newton's Second Law of
Motion and the Conservation of Energy.

Given this, the critical question is, can free will provide 250000 Newtons of force? If not,
the automatic consequence will be conflict. At present, as a species, we do not possess
enough data on this issue to determine the maximum load an average human can counter
act. Further, the above model only considers an extremely simple system. In something as
complex as a nation, the degrees of freedom could number in the trillions and quantifying
the implications and interactions is certainly beyond the capacity of any computing
platforms available today, even if all were combined.

Even without the above assessment, as a species, we have developed a keen sense for this
and our modern approach has been that of the arms reduction treaty. Treaties such as
'Start' which aimed to reduce Nuclear Weapon stockpiles incorporate a sense of the critical
nature of maintaining a strategic balance at all times. In a kinetic system, continual
assessment is the most prudent course of action.

Understanding this, we can now place current geopolitical events in a broader context.
The potential introduction of Anti-Ballistic Missile platforms in the EU, altered the forces
applied to the geopolitical situation. The end result was a predictable counter-movement
by Russia in the Baltics region. The complete picture here is highly complex, but it does
demonstrate how intent and perceived intent translates to kinetic motion, as much as the
event itself. As such, we can model both intent and perceived intent as forces, which is
PDFmyURL lets you convert a complete website to PDF automatically!
hardly surprising given the relationship to the electro-weak force.

In such movements, there is always the potential for an unrecoverable position, or an
imbalance to emerge that cannot be restored resulting in direct conflict. Whilst we are
aware of the majority of the major factors in this, we do not have a complete picture of the
broad range of unknowns that could place such an event just south of a tipping point.

Further, if we return to the notion of free will providing an opposing force that resists
motion, what is the effect of undermining that through propaganda and political
manipulation? If we go back to some of the identified effects in Voodoo, we should note
that recoil effects from unrelated activities could factor into this control mechanism, again,
resulting in conflict. Hair triggers like this, should be avoided at all costs.

Now that we have a solid overview of the physics behind manipulation, let's look at how
we achieve this in a practical sense.We'll start with simple memes and voodoo. Anyone
who has taken an advanced course in literature, or worked in media, understands what will
be meant by emotional manipulation. For those reading that don't, well, it is simply guiding
an individual or group through an emotional experience either with words or images. This
is a basic form of Voodoo.

If we place this event in the context of information theory, we can say that we take one or
more inputs, encode them onto a physical layer for transmission and have the payload
execute at the point of reception. That point of reception being you. What does that
sound like? If you spotted it, your answer would be, it sounds like someone breaking into
your computer.

So, let's try some of this. I will attempt to manipulate you and you can see for yourself how
powerful a technique this can be. This won't work on everyone, but for the majority of
people it will. This is the key point, certain things are statistically general, but the more
information you have about the thought processes and responses of an individual, the
more targeted an attack can become. When we scale targeted attacks, we can do some
serious stuff, like start wars.

Let's start simple. Take a look at the following pictures:

PDFmyURL lets you convert a complete website to PDF automatically!
Most people, when looking at the above images, will react with "awww!". In their minds, in
an instant flash, they have given the animals very complex personality traits derived from
their experiences with humans and animals. There is a small chance that this experience
PDFmyURL lets you convert a complete website to PDF automatically!
will be negative; some will experience a sense of repulsion. Others have difficulty with
emotional processing and they will experience nothing.

Let's focus on those that do first, what they may see in their head (and it may be very brief,
almost unrecognizable) is almost like a faint quick animated movie of these animals with a
very human idea of what they are thinking. We see this on the web as these sort of images,
plus captions, like lolcatz, etc. Emotionally, it will feel pleasant, drawing on feeling of
affection and parental notions.

Now take a look at this image:

At this point, most readers will feel a sense of sadness. Some will have complex emotional
responses, that can range from shame to anger. The anger can manifest in a variety of
ways, depending on the perspective of the reader. It could be anger at the war in Syria, it
could be anger at the smugglers, it could be anger at Western governments or it could
even be anger at me for using the image. Whilst not important now, I want you keep in
mind the varied nature of the perspectives, or the reasons for anger. This will be important
when I discuss optimization techniques in complex scenarios.

This sense of anger is important, it provides options where to guide the reader emotionally
next. In a professional setting, every possible response would be mapped out, as well as
the statistical likelihood of acceptance. Not only that, but I may lead with a premise that
will guide your response after seeing the image. That is, I would predefine the context in
PDFmyURL lets you convert a complete website to PDF automatically!
which you observe the image, impressing it upon your mind.

This issue of context is also important. The brain tends to group things together. At a
chemical level, it means that the synaptic pathways that were recently used, tend to be
employed in processing new information. If anyone has made you angry, then you snap at
someone else just afterwards, then you have experienced the effect.

I selected the images of animals above to provide the reader with a sense of life, youth,
innocence, fun, happiness, cuteness and parental responsibility. I then take that emotional
high and drop in the image of a dead child in the coldest scenario. We call this a
juxtaposition, a stark contrast. From a chemical perspective, we are taking the brain rapidly
from one form of chemical saturation, to another. The gulf between these two sensations,
as our sense of feeling is mainly based upon the perception of differences, is a jarring
experience.

This of someone building your hopes up, only to let you down. Think of a relative dying.
Think of a serious accident, or the reception of unexpected bad news. Each of these
things, rapidly shifts us from one state to its near polar opposite.

In the above images, juxtaposition is happening in many dimensions at once. Alive/Dead,
Warmth/Cold, etc, etc. The more dimensions, the more jarring it is and thus more powerful
a manipulator. As a manipulator, I am attempting to leverage your emotional response as a
means of preventing you, the reader, from making inferences that I don't want you to see.
From a chemical perspective of the brain, I am interrupting other thought processes which
flush your short-term memory, effectively blocking you from connecting dots that may mold
your opinion in a way that is not in my interest.

Now, doing this in written form is extremely complex, it is more of an art than a science.
Modern research focuses on direct electrical stimulation of the brain to replicate these
effects. I will discuss this more a little later.

Let's return to a section I wrote earlier in the article:

Most people, when looking at the above images, will react with "awww!". In their minds, in an
instant flash, they have given the animals very complex personality traits derived from their
experiences with humans and animals. There is a small chance that this experience will be
PDFmyURL lets you convert a complete website to PDF automatically!
negative; some will experience a sense of repulsion. Others have difficulty with emotional
processing and they will experience nothing.

Let's focus on those that do first, what they may see in their head (and it may be very brief,
almost unrecognisable) is almost like a faint quick animated movie of these animals with a very
human idea of what they are thinking. We see this on the web as these sort of images, plus
captions, like lolcatz, etc. Emotionally, it will feel pleasant, drawing on feeling of affection and
parental notions.

This is manipulation, within manipulation, disguised as an explanation. What I am doing
here is guiding you through what I want you to experience. Depending on your level of
engagement with this article, which is an important metric to capture at a statistical level,
you may or may not have stepped through this to determine if this is actually what you felt.
Others would have experienced this and said 'oh, he's right'. Many won't have had the
same experience. I am effectively doubling the statistical odds at this point that you, the
reader, are mentally exactly where I want you to be.

The process of guiding someone through a process of thinking is what I like to call a
'transform'. That is, I want to take you mentally from point A to point B. As a chain reaction
of chemical processes, this means that I have limited options. I can't take you from being a
pacifist to a neo-nazi in a single jump, I need to move you mentally in incremental stages.
If you are fundamentally opposed to that destination position, then I need to surreptitiously
move you mentally to a point where it gradually becomes acceptable. This is especially
viable if you are not in a position to objectively view that your attitudes now match that of a
neo-nazi.

Explaining how this is done would require me to get into large scale group dynamics,
which is certainly beyond this article. But, if you examine the acceptation of things like
rendition, torture, domestic espionage, etc., by the US and, indeed, most of the Western
public, then you will see this process in action. The key to this is identifying rational
arguments that are functionally equivalent to, say, a neo-nazi position. You change the
position of the public, incrementally, to accept things that match a fascist outlook, but each
piece of the puzzle is put in place for radically different reasons. You are a neo-nazi, but
you have a different rationalization of your behavior, its all perfectly reasonable. Its only
when you step back to look at the big picture does it hit you that you are now a fascist state
and its too late. So, it is important to pay close attention to fixed definitions of political,
PDFmyURL lets you convert a complete website to PDF automatically!
social positions and move hard against them.

This said, because this is a form of faux ideology that arises as a composible structure of
arguments unrelated to fascism, it becomes possible to dismantle that very quickly. Simply
focus on each aspect that is functionally equivalent, such as new legislation, or attitudes,
then repeal or break them.

Returning to the above examples, let's look at this from an information theory perspective.
I have taken a payload, packaged it up, transmitted it and successfully managed to have it
execute in your brain. Impressive. From half a planet a way, I can make you feel things,
which ultimately feeds into your behavior and thus I can, albeit indirectly, make you do
things. I can sway your vote, have you lobby on my behalf and, if you are especially fragile,
even kill someone.

The interesting thing here is that the payload can actually be transmitted. That is, we know
instantly from this that it is something separate and distinct in its own right. It is
information. If we think about this, ideas and behaviors pass from one person to another,
this implies that we technically 'infect' each other. Just like bacteria, some are beneficial,
some are not.

This says little about what generates such information, it just tells us that something is
created at some point and this, all on its own, can move between one or more people.
Further, whilst the above example is rather simple, it is possible to extend this into a
complete 'psychological program', or even a suite of programs to manipulate people over
time. Its like Stuxnet for the mind.

So, what does this say about consent or choice? Do we choose these things? Or is it a
case of the energy entering as an input, automatically re-wiring the brain, leading to
changes in behavior?

What the above example shows, is that in certain cases, its merely automatic.

Whilst that is good, the hacker in me wants to do more, I obviously don't have time or the
media presence to get everyone's attention. I need you to echo my message, to shape the
opinion of those in your environment and for those others to repeat that process. Thus,
just like a computer virus, which jumps from one machine to the next creating an
PDFmyURL lets you convert a complete website to PDF automatically!
exponential number of infections, I need to develop a means for you to take the above
images and share them. That said, it doesn't need to be an exact copy, as long as the
method of sharing achieves my objective, what do I care?

This non-exact copy is also interesting, technically we would define it as a mutation.
Psychological mutations, just like their physical counterparts, can be benign or malignant.
A malignant form can come in two basic variations, the first is one that works against my
agenda, the second is one that leads to unintended effects. Unintended effects may be
violence, or result in the emergence of other ideas, unrelated to my agenda, but they
present a danger in some completely unexpected way.

So, how do we go viral?

Well, thanks to the modern internet, we have extensive data on that. You just need to be a
cat. I'm kidding of course, but why do cat pictures tend to go viral? Why does bad news go
viral? What have they got in common?

The answer is that they all relate to underlying social signalling streams that exist between
humans. In the case of cat pictures, the parental notions that it activates, invites sharing of
the image/video because in the wild having others recognize your baby and liking it,
increases the odds of survival. The same process is at play with bad news, again survival
signalling.

There does exist a second signalling network that is based upon dopamine responses.
Music, art, funny pics/vids, religion, etc., all appear to use this as their means of
propagation. Dopamine responses, a little like a narcotic high, give a person a sense of
happiness and joy. Religion though, is a complex one that can use both mechanisms at
once. Music propagates, if the notes, rythm and timber align with the propagation of
chemical reactions in the auditory system. The best music artists have the ability to
translate chemical activity in the auditory system, to volition (music), in a way that broadly
similar to a particular demographic's auditory processing chemical pathways.

That last bit should explain a little behind a hypnotic voice and providing convincing
arguments.

Thus, for the purposes of manipulation, I need to piggy-back my payload onto one or more

PDFmyURL lets you convert a complete website to PDF automatically!
of these social signalling mechanisms. When we examine the flow of viral information on
the web, we see other than Gangnam Style, the greatest penetration is survival signalling.

Thus, drumming something up to the level of survival makes penetration very deep. That
said, there are a complex range of factors involved in this. Authority, credibility, traffic, etc.,
all combine in a complex way to increase/decrease the penetration and thus replication of
information. Further, prior experience of a source, their reliability and general behavior is
also a factor.

Earlier I said I would come back to this issue of electrical stimulation. If we record the the
electrical activity of the brain, then it becomes possible to stimulate areas of the brain and
induce the same responses without a source input. It also becomes possible to mold
opinion, much in the same way as the first example but with greater precision. Any
sophisticated computer that could perform this remotely and non-invasively could play the
entire global population like a harpsichord with very little hope for escape.

Let's give everyone a crash course in Memes and Memetics. Richard Dawkins, the inventor
of the theory, will provide the best explanation. This video is about 2 minutes long:

PDFmyURL lets you convert a complete website to PDF automatically!
Let's now extend that new found knowledge by placing Memes in the context of
evolutionary processes. This video is about 3 minutes long:

PDFmyURL lets you convert a complete website to PDF automatically!
Now that you know what a Meme is, let's give a proper name to an idea that is virus-like, a
Memetic virus. The definition of a Meme is as follows:

A meme acts as a unit for carrying cultural ideas, symbols, or practices that can be transmitted
from one mind to another through writing, speech, gestures, rituals, or other imitable phenomena
with a mimicked theme.

https://en.wikipedia.org/wiki/Meme

Thus, a Memetic virus is a Meme that compels the receiver to re-broadcast that information
either verbatim, or in modified form. As such, we can argue that this mechanism is closely
related to OCD. That is, it induces a compulsion to act. Thus, the study of Memetic viruses
strikes at the heart of freewill, choice, volition and agency. In short, it is an investigation
PDFmyURL lets you convert a complete website to PDF automatically!
into remote control.

If we look at this as a problem in Voodoo we can cast this in a different light. We can say,
that incoming energy moves around the brain as a series of chemical reactions (kinetic
motion), receives a signal boost and is echoed in a selective manner, perhaps with slight
alterations. This Memetic Virus may be held in a temporary or permanent fashion in
memory, or it may make alterations to the synaptic pathways, thus living on as a form of
behavior or response. This latter process may get written back to DNA. This latter process
may also require analysis to account for group dynamics and I'll discuss this in a moment.

This somewhat implies that the Meme is bypassing control, or bypassing filtering, that is
normally applied to incoming information. A little like Tourettes syndrome. For example,
we remember things because information gets to it destination, short/mid/long term
memory, so a Memetic virus is one that travels with very little energy loss along a particular
pathway. This provides insight into a method of 'killing a meme'; make the pathway costly
in terms of energy loss.

Whilst I have written about ideas and the virus like nature, I have avoided the topic of what
creates these Memes. Memes are modulated information, as such, the information is
encoded by the chemical processes of the brain. Now, a Meme is not restricted to an idea,
Memes come in all forms, from social cues, to learned behaviors. Most likely, we as a
species, pick up a significant amount of unconscious information from our environment in
such a manner that assists us in remaining 'compatible' at a genetic level with the various
food sources, etc. There are evolutionary examples of animals adapting to their food
sources over time.

My understanding of memes is that the underlying biological processes which modulated
this information have the function of creating viral encodings, or at least give rise to viral
encoding on a statistical basis as a function of their operation. The strongest theory at
present, is that this is an evolutionary process that is designed to kick-start a cull of the
population. That is, the brain receives incoming triggers from its environment, certain
genes are activated and a solution manifests as a 'rationalization', or insight, into a
particular problem the conscious mind is tasked with. A subtly embedded genetic agenda.
It is my view, this process is what RNM is exploiting to produce leaks and I will explore this
later in this article. I will state now though, if correct, we have no idea of the repercussions.

PDFmyURL lets you convert a complete website to PDF automatically!
So, a person has an idea with a subtly embedded genetic agenda. If it is a functional
solution, it then quickly spreads amongst a 'compatible' group. This then cascades into
polarization. The polarization comes from those who reject a Meme; they are physically
incompatible with it. That said, this 'incompatible' group then generates its own counter-
Meme which spreads amongst that group. If the Memes trigger the correct areas in the
brain, that have limited control or filtering, conflict begins.

What is really happening here is the evolutionary control of an energy budget. It is a
complex form of Apoptosis signalling, or programmed cell death. The equivalent of
walking down a corridor with a sign on your back saying 'Kick Me', it pits two or more
groups against each other, for the sole purpose of reducing their populations. This leads to
'survival of the fittest' and the passing along of genes that are best adapted to survival
under the current conditions.

Thus, any ideology or Memetic virus drawn from this process is clearly a feral response.
Nationalism, imperialism, fasicm, neoliberalism, communism, socialism, and any 'ism' you
care to mention are a form of this process. In most cases, these Memes can be resisted.
We can choose to not share a cat pic, but being blind to the implications of sharing a meme
is key to its survival and reproduction, so we do. Not only this, but in the wild, it is also key
to our survival as it drives the evolutionary processes. We, as a species, have opinions,
views and passion and we want people to join with us and it is here where the problem
begins.

Thus in many cases the social, political and military issues that manifest are not really
problems to be resolved, but simply a result of how we function. Any attempt to shape the
world in any other way is doomed to failure, as it is completely ignorant of this simple fact.
Division must always re-emerge, or we cease to evolve and adapt to our environment. I
furthr suspect that accelerating this process reduces the overall lifespan of the human race
as, much like the process of aging, there may be a finite number of generations and we
may prune a branch by accident that was intended as the next step in human evolution.

At the point of creation, the consequences of a particular Memetic Virus may not be readily
apparent. It may not also be clear that such a Meme is indeed a feral response, for example,
in the case of Martin Luther his Memes were entirely unrelated to the events which it
sparked in the form of the wars after the Reformation. That is, it was the mutation that was
dangerous, not Martin Luther's work.
PDFmyURL lets you convert a complete website to PDF automatically!
It is here where things begin to take a twist. We have talked about Memes arising as a
product of an individual idea, but how about Memes that arise as an emergent property of
interaction? You hurt me, I hurt you, repeat the process until we have full scale militaries.
Whilst an over-simplification of the process, it serves to highlight that some of Memetic
Viruses may be the product of a long period of interaction, rather than an idea. Such
Memetic Viruses have co-evolved in parallel with us as a species and, indeed, other
species as well. Such Memetic Viruses are extremely complex, involving memory,
learning, behavior, emotional responses, etc. What we end up with is a complex array of
memetic programs that we call our social behaviors.

These social behaviors are the product of billions of evolution and millions of years of
direct human experience. Lamenting the state of the world and diving in to reprogram
these after a few decades of research is, in my mind, bordering on insanity. Yet, this is what
some have begun to do.

Where it really gets weird is that, if we look at the process objectively, these Memetic
Viruses have access to a malleable network of processing nodes. Essentially, a
supercomputer, composed of a network of human minds. Thus, the Memetic Virus has the
ability to learn, adapt and evolve based on the activity of the nodes on that network. In
essence, a complex Memetic Virus can accurately be described as a biological form of AI
tasked with optimizing a specific evolutionary function.

As I have established the theoretical work behind this, we are ready to begin delving into
'The Matrix'. 'The Matrix', as described at the beginning of this section is a software
solution which has adapted the principle of relativity and particle motions, to humans and
perspectives. This model is applied to our world in the form of media, scripted events,
government actions, military actions and increasingly controlling the daily lives of the
people. 'The Matrix' employs voodoo analysis to predict the likely outcomes of given
events and have ready in place scripted sequences to deal with those potential outcomes.
The purpose is to maintain control, shaping human behavior through social conditioning
and increasingly direct manipulation of the human brain from RNM satellites. 'The Matrix' is
thus the execution of a computer generated strategic long term game plan and the
foundation of the current global order. It is also the source of the observed continuity
regardless of who enters office in any major nation.

'The Matrix' employs voodoo mechanics and viral memetics to drive what is, ultimately, an
PDFmyURL lets you convert a complete website to PDF automatically!
economic engine. The vast majority of the people are completely unaware of its existence,
because it is simply their culture, daily lives, beliefs, prejudices, fears, employment,
government, etc. Others, are aware of small portions, such as they were told to do
something, or they were played at some point and observed the effects, or they spot
patterns and can see the messages but the whole big picture is bewildering. Some reading
this will say to themselves that they know of this and it isn't what I think, its used to hide
messages, etc. The fact is, it is vastly more complex than this, it has many simultaneous
functions that are blended together by an advanced AI which attempts to hide things
behind perspectives. Further, there is a form of optimization or compression employed
which means that each staged event or information has many different functions and has
different effects depending on the perspective of the viewer.

If this is new to you, don't worry, I will perform a worked example and build up your
knowledge from there. I will begin with an aspect of The Matrix we are all very familiar
with and we all know has some effect on us psychologically. I will demonstrate how such
information can be encoded in media and how this is used in the context of Voodoo
mechanics to manipulate populations, groups and individuals.

For those that don't know what steganography is, I will explain. Steganography is where
we take some form of media, subtly alter it to encode a message, so that it can be
transmitted unobserved. To many in the code breaking community, this is things like
altering the bits of a digital image so that it doesn't change the image, but can be
transmitted and that information retrieved at the other end. Today, I will discuss a different
form of steganography, one that is based upon linguistics and then extend this to deal with
hyper-convergence. Hyper-convergence, in this sense, is a form of
optimization/compression that merges multiple streams of information together and will
only make sense if you 'get' the context. We'll also talk about the mental effect such a
cipher has, things like a post-hypnotic quality and laying the foundations for psychosis.

Let's get straight into this with a worked example. Take a look at the following picture:

PDFmyURL lets you convert a complete website to PDF automatically!
What if I told you this was a code? Would you get it? Actually, I know your response to
what this will mean will be solely based upon what the elements of this picture mean to
you. It won't convey what it means to me, unless I provide further context. In this sense,
this picture is acting like a mirror, providing a window to your thought processes. To
interpret, is to see yourself. Although, there is a way past this and I'll explain that in a
moment.

Now, let's decode this a little, let's assume you're a detective. You build a word and phrase
cloud of the ideas it brings to mind like this:

Dog - bone - fetch - lead - reward - loyal

So, the mind presumes, or infers, initially in the context of self. In this case, you're a
detective, so the concept chain may say to you that someone is indicating that this is a tip-
off. This is your perception, or perspective. Now, let's lose that ego a little, take a walk in
PDFmyURL lets you convert a complete website to PDF automatically!
the shoes of someone else, change your perspective or your point of view and re-examine
this image:

Dog, leash, Bone, something to keep you occupied, slavery, owner, master

Quite a change in context, isn't it? In this one image, I have sent two completely different
messages that are interpreted dependent based upon factors such as emotion, previous
observed content, things in the local environment, etc. In the context of voodoo
mechanics, I would design two sets of equations and attempt to predict the reaction, which
ultimately is the cause to yet another effect. If I now limit your options, I can predetermine
what your next move will be. If I scale this up, calculate several decades of moves in
advance, then we have 'The Matrix'.

This example is also a form of hyper-convergence. In that, it serves many functions at
once. Further, the majority of people will be blind to at least some of the interpretations.

Consider what would happen if you were brain damaged, didn't know certain
words/meanings, or subject to highly specific electrical jamming of the brain? Would you
miss a context or potential sub-context? Would you take the message out-of-context?
Would you develop false beliefs, if the pattern continued? The answer is naturally yes,
which is what 'The Matrix' exploits. Place 10 people in front of any given media and they
will all see something different. Program that media and you have a powerful manipulation
tool that is difficult for people to explain without coming across as nuts. You could even
isolate a single person a crowd by embedding subtle personal references only they would
know and what you do once you have their attention is at your discretion. Let's discuss this
latter scenario a little more in-depth.

One very old trick in the world of secret communication is the use of symbolism in media to
orchestrate everything from crime syndicates, to intelligence services. Fairly similar to
innuendo, an implied reference or set of references, from a defined source could be used
to instruct, persuade and/or threaten. For example, if a Mafia boss said ‘Take care of our
friend here…’, depending on the tone of voice, or prior experience that could mean one of
two things; you would either been looked after or take a bullet.

At the level of a nation and in the international world, there exists a more complex form of
this type of communication. Intended to be very subtle and easily dismissed, most people
PDFmyURL lets you convert a complete website to PDF automatically!
encounter it every day, yet it escapes their conscious awareness. This form of
communication is meant to be hard to define, yet hide secrets in plain sight as a warning to
others. Like the modern equivalent of sticking a head on a spike at the gates of a city, this
declares the power of the true ruling class and gives a heads up as what to look out for in
the coming years as a product of their agenda.

At least, that's what it would seem like on the surface. What this actually is, is a more
complex version of 'The Matrix'. Rather than simply deriving word and phrase clouds from
what can be observed, you must have a broader knowledge of the history, stories, people,
organizations, agenda and events in order to place such communication in its appropriate
context. Again, hyper-convergence plays a role, in that, a shallow reading may produce
one perception, whereas a broader reading will produce another. As with our earlier
example, voodoo mechanics is also applied at this level as much of this is hypnotic in
nature. The hypnotic aspect emerges in the subtext, where the mind subconsciously
thinks it has 'got' something and strengthens a synaptic pathway. If built up correctly, it can
distort your worldview and make you believe things.

For this reason, such communications are jokingly referred to as the 'fruit phone'. You
know, 'oh you're reading too much into things. Perhaps you're stressed?'. The fruit phone,
on one level, can seem absolutely sinister but on another, it does have its funny side, much
of it as satire, irony and black humor.

Before I begin demonstrating examples of fruit phones, especially where I begin building
connections, never believe the connection just because you can see it. A true connection
must be supported by tangible evidence. In the case of proving the existence of fruit
phones, this can be done by algorithms and statistical pictures, however, that does not tell
us if the content they describe is accurate. Obviously, we do not know the source or
motivation of the encoders and, as you will soon learn, this is more complex an issue than
you can imagine.

Earlier in this article and throughout it, I have briefly mentioned that one of the applications
of RNM is to leak information. When I discussed meme theory, I explained a particular
mechanism that I felt was responsible for this. What RNM does is inject classified
information in to the mind of an author, script writer, journalist, etc., but rather than coming
out verbatim, it is encoded into the subtext of what they are writing, the images they create
and/or songs. In short, any creative work which can contain a subtext, can be used as a
PDFmyURL lets you convert a complete website to PDF automatically!
medium to convey classified information. Once it hits a platform like the web, it is copied
and decoded by computer at any number of intelligence agencies across the world.

This is the crown jewels in the security world and these fragments of information are often
referred to in terms like 'the light', etc. That is, it is always discussed in symbolic terms,
never in plain language. Thankfully, I'm not an intelligence agent, so I don't need to follow
such rules and given what I understand of the program, I think it is very vital to global
security that I share what I know.

It is understandable how this would be vital to national security. RNM can poke its head
into corners where agents can't operate and determine if threats exist. This is then pushed
out in the media, in some form, and the computers develop strategies to deal with the
problem. So, for the most part this is entirely automated.

With an engineered society, or one that is substantially scripted, the computers can adjust
policy and events to steer a course to dealing with the problem under, perhaps, a different
pretext. All without the red tape of government debate, public scrutiny, etc. Further, the
computers are able to take into account billions of factors like the economy, weapons,
public reaction, foreign reaction, potential consequence, etc. Things that, realistically,
would take eons if debated in chambers of government worldwide.

This is where the problems are arising. Engineering, in the context of RNM, is giving rise to
a quest for control. RNM is not just gathering intelligence, but actively mapping the human
brain to improve its ability to dictate human activity. In addition, RNM is leveraging this
same principle to attempt to physically control the human body and impersonate humans. I
observe strong evidence that many key personnel across the globe are having their
opinions altered by this system and that extreme social conditioning is being applied to
them via a combination of RNM and fruit phones. Finally, I observe an incremental
approach to complete control by the AI. This is my reason for publishing this article. I feel
that this is a subversion of democracy, primarily for economic gain. At worst, with the
remote animation, it could be argued that this is an invasion using RNM powered troops.

I will discuss what I feel to be the objective a little later, for now though, we'll explore these
fruit phones a little. I spotted a small but consistent pattern emerging in music videos. I
observed a number of music videos that appeared to be attempts at black humor with
blatantly clear references to RNM in the subtext throughout. Intrigued, I dug a little deeper
PDFmyURL lets you convert a complete website to PDF automatically!
and this opened a rather colorful world of hidden information. I have scratched the surface
a little, but it would take quite a complex IT setup to analyze the full scope and
relationships in this data. To do a proper job, I suspect it would take a bigger IT solution
than Google has.

I will highlight just some examples from modern media, enough to give the general idea.
Whilst I could probably expand upon this and show a much more complete picture, I won't
for a number of reasons. Firstly, I don't have a complete picture of how this ended up in
the media and damaging the IP of companies, due to the actions of bad actors, is only
doing their work. Secondly, I don't want to leave my readers in a suggestible state, If you
really want to explore this, I would recommend employing a machine learning approach.
Whilst this can leave you suggestible, after reading this article you will know what it is and
have a different mental model of how to represent this information, which means that it
doesn't form a jumble of semantic links in your mind. You should be seeing it as word
clouds, sets of words and/or clusters of words.

Let's watch a movie trailer. After you have finished watching the trailer, I will show you
what mentally ill and/or suggestible people can see.

PDFmyURL lets you convert a complete website to PDF automatically!
Now, I am going to teach you how to watch this in an altered state of consciousness. If you
have a history of mental health issues, feel that you may be suggestible and/or it makes
you feel uncomfortable, then skip this part. Its not really necessary to understand this
article, its just here for a complete picture. This said, the explanation contained here may
give some people better insight into mental health issues in general.

An altered state of consciousness does not require drugs. What is really happening is that
your brain has altered the context of what you are watching/listening to and this can be
done without your conscious awareness or control. The brain does this by mapping the
subtext and/or general ideas and themes to memories, rather than what is presented in the
media. Most of us have experienced this, as a kid imagining singing at a concert whilst
singing along to our favorite tune. This is an extension of this, a quite powerful one, that
has the ability to change belief, opinions and perception of events.
PDFmyURL lets you convert a complete website to PDF automatically!
What I'm going to do here is very mild, but it will be enough to get the point. I can apply a
number of new contexts to this media but since we are discussing RNM, let's use that. This
is not the first time I have used this media for a demonstration of this kind, however, the
context that will be applied this time is different as I applied the context of an article
written at the time that would require everyone to deviate. As a result, there will be a few
shots that may or may not make sense, depending how you weave this story in your mind.

So, let's give you the new context. An AI has attacked the movie's script writers using RNM
to inject its own words into the movie. It is sending a message to all that understand this of
what it is about to do. Now, rewatch the trailer, only this time, try and bend the media to
that interpretation in your mind. Don't focus on specifics such as words and images, but
rather loosely interpret them as being either related terms or symbolic imagery. It may take
a few views to get a full interpretation in your mind, but you should get to a point where
you can naturally watch the entire trailer and see it in that new context.

Creepy and cool at the same time. Don't do this with any other media, if you find yourself
doing it, just switch off for a while and do something else. It will stop. Its a bit like
watching an optical illusion that leaves after images, or makes the room seem weird.

Anyway, for a few minutes you know what it is like have a form of mental illness or be
suggestible. At the level of the brain, this is a form of temporary rewiring of the synapses.
If you can perceive this alternative context naturally, then a part of you now effectively
believes the interpretation. Notice the stark contrast between what you know, that is that
this is just a trailer for a movie, and what you are observing in the new context. So, there is
a clear separation between knowledge and perception. Just because you know something
that contradicts the new context, doesn't stop you from seeing it.

Let's try a more complex example. Watch this video from Sneaky Sound System.

PDFmyURL lets you convert a complete website to PDF automatically!
In this video, I want you expand upon the technique used for the last video. Not only will
we be listening, but we will to some degree interpreting the visual art of the video as well.
Again, I want you to think of words that are related to the words being said and substitute
that meaning when they are being sang. For example, UFO would be an AI in a satellite, a
plastic man on a telephone would be an AI over a brain-computer-interface provided by
RNM. In terms of the imagery, I want you to think of a satellite sending down beams of
light. Also, there are some related pop culture references that relate to computing,
specifically, AI. I won't define it all for you, but feel free to explore and interpret. Play
around with the properties of words, images, people, etc., and the relationship between
those properties in a loose sense.

As for the context, well, I want you to think of AI that is being funny and guiding the writer
and artists behind the song into loosely describing it. An inside joke of sorts. Again, you
PDFmyURL lets you convert a complete website to PDF automatically!
may need to watch this several times until you have successfully bent the interpretation
and it becomes natural.

There is a number in the last song, '16 miles from home', which is fairly common in Western
culture. When added together we get the number 7, which is found in the bible and all
over the place. Such number patterns are common, but the frequency is elevated in our
society because it is used in psychotropic attacks. People see a connection and perhaps
there is, but the sheer number of unconnected instances of this number, that look like they
are connected is quite high. This gives the illusion of greater significance, meaning and
conspiracy. Its just a number.

As I like my readers, I want to avoid taking each of you down a rabbit hole. So, I will end
this part of the analysis with one last video. I won't say anything other than 'black humor':

PDFmyURL lets you convert a complete website to PDF automatically!
r

So, what is this? Is it just a funny coincidence? If it were just this on its own, then it
certainly could be coincidence. I have explored hundreds of music videos and when
examining the subtext, there does seem to be a pattern around RNM. Further, when we
combine movies and music videos, what emerges is multiple narratives around the
technology that openly describe it, what it is doing, how it works, some of the ethical
debate, etc. This information is linked together in symbolic form and background
information, such as main actors, explored themes, symbol usages, phrase usage, artistic
style, etc, etc. To me, I observe a pattern that is much like a spiders web, in that, if you
learn of this technology you are dragged into this and sent a little mad. Thus, reducing
your credibility as a witness. Its main purpose though is to maintain a suggestible state, a
nation which fantasizes about everything from being rich to being wizards. These fantasies
may seem harmless, but when facts are twisted and opinion is presented as news, the
population is sold a belief, rather than a reality. Given the way the brain works, a belief
becomes reality, even if it is contradicted by the facts.

If you go really deep with this, which I have done to some degree on my Twitter timeline,
then not only will you observe the sheer scale of this, but also begin to see a whole new
side to our media. From poking fun at other nations and government members, right
through to implied threats, our media is much more colorful than you would initially
suspect. Although, all of this is hidden in the subtext and you need to know the context to
spot it.

In this respect, we can compare this to a polymorphic cipher. In that, whilst the explicit text
alters, the underlying themes, concepts, imagery, etc., embedded in the media remain. For
example one day I may refer to a human as a vessel, the next a car, etc. The underlying
concept is a container of some form. Further, these concepts need not be applied in
sequence, in that you will get the general idea even if they jumbled up. This is a much
more advanced version and is a product of compression research. By adding subtle
references to personal information in the subtext, this form of media can be targeted to an
individual or group of individuals. As such it can serve multiple functions from remote
post-hypnotic suggestion, to a communications protocol.

The basic idea is that nothing is ever said, but rather must be inferred. That is, it must be
believed and belief is something that will change your subjective view of the world. This
PDFmyURL lets you convert a complete website to PDF automatically!
belief sets you on a course in life that is pre-computed, where you will pick up other beliefs
and you are no longer in control.

In connecting this with Voodoo and as an example of how The Matrix functions, this next
video explains the concept quite well whilst being a stunning masterpiece of art in itself.
This is an example of projection mapping, that is, projecting an image onto something and
from just the right angle, extra dimensions can be seen. In this video, they have used
computers and robots to keep the projection at just the right angle to the camera for the
full effect to be seen, whilst both the camera and screens move around. From any other
angle, none of this would look right and it takes a lot of math to pull this off:

Box explores the synthesis of real and digital space through projection-mapping on moving surfaces. The short film documents a live

performance, captured entirely in camera.

PDFmyURL lets you convert a complete website to PDF automatically!
Bot & Dolly produced this work to serve as both an artistic statement and technical demonstration. It is the culmination of multiple

technologies, including large scale robotics, projection mapping, and software engineering. We believe this methodology has

tremendous potential to radically transform theatrical presentations, and define new genres of expression.

Find out exactly how "Box" was created in our exclusive behind the scenes video:

http://www.youtube.com/watch?list=PL6uqON-thyrZcRFF8qVugHPFTytlJe1wV&v=y4ajXJ3nj1Q

http://www.botndolly.com/box

_______________________________

Subscribe to The Creators Project:

http://bit.ly/Subscribe_to_TheCreatorsProject

_______________________________

The Matrix is a much more complicated version of this video, but one that deals with
human perception of events, emotions, decisions motivators, action and reaction. It effects
billions of people each day and slowly expanding even into our personal lives. When we
piece this together, what we get is something similar to a pinball machine. Albeit, a pin ball
machine of 7 billion people. Employing voodoo and a lot of math, supercomputers are able
to predict the likely paths of each ball (person) in the system. The more aspects those
super computers can control, or make at least predictable, the more accurate their future
predictions will be. This allows the future to be seen, as rather than being random, it is
now computable using Newtonian physics.

RNM, RNM prompting and various other methods are combined to improve the accuracy of
future predictions. When we combine these methods, we end up with an environment that
is fairly similar in principle to a game of Lemmings. Thus, choices are reduced with time
and events with a probability of chance are rigged, structured so that it is irrelevant or
combinations of both.

As the density of predictable aspects under your direct control increases, it then becomes
possible to define the future, rather than just observe it. Given this requires increasing
control over personal choice, this is in effect, an expanding form of dictatorship. Control is
established through the selective use of provocation. As we need to physically move an
object in Voodoo, we must have a means of delivering kinetic energy to a given point in
the system. One way is to use emotional manipulators (such as anger, fear, bigotry), etc.,
PDFmyURL lets you convert a complete website to PDF automatically!
embedded into public media thus magnifying a problem and its solution. From the
perspective of Voodoo, you don't need to care about these issues, just that people are
responding to them. In time, you leverage these input sources to shape and steer the
world. Interestingly, beyond some basic ideas, these groups tend to do much of the work
themselves.

We can think of this as like the paddles in a pinball machine, but calculated with extreme
precision, so that we know ahead of time where that ball will be after it collides with other
balls. It looks random, but its carefully rigged.

Whilst I will end the analysis of video media here, I want to show you a number of still shots
and quote from the film, The Matrix. I found this very interesting when I was playing
around with the word clouds. If you are finding some of this hard to take in, regardless of
the comprehensive explanation, this will make you re-examine things somewhat. If you
want to examine media at home, without automation, then use a pen, paper and sketch out
the links. Don't watch the media over and over trying to apply the context in your head. It
can do some serious damage and it would take someone like me to pull you out of it.

So, let's start simple. How else can we interpret this scene? Power to the people? A
reference to insurrection and RNM power beams?

How exactly do we tell? We we look for further references and build up a statistical form of
evidence. This next scene could be interpreted in the context of RNM and the reference
PDFmyURL lets you convert a complete website to PDF automatically!
to a 'Prison for your mind' even loosely interpreted as 'Lockheed'. So, it is starting to look
stronger, but let's continue.

Agent Smith is a character is an AI who must take over human bodies in order to enter The
Matrix and can do that to anyone he is physically connected to. That's exactly one of the
functions of RNM and the current AI is very similar to Agent Smith. Indeed, he is even
presented as a government agent. Then we have the imagry of him replicating himself a
bunch of time in some mad quest to take over the world, which as we'll explore later in the
agenda is a current goal. So, alarm bells should be ringing at this stage, but let's explore a
little more.

PDFmyURL lets you convert a complete website to PDF automatically!
The next image is what can be best described as an emotional manipulator, a form of
'blackmail' (yes, the pun is intentional). I will discuss this in greater detail when examining
the agenda later, but for now, it is sufficient to know that much of the economy exists solely
as a product of Mr Computer's ideas and actions. When you finish this article, you will be
able to analyze the movie, TV and music IP coming out of the US (and elsewhere) and
observe that it is a derivative of this program. With respect to IP, popularity is maintained
by sensitizing people to a core group of words, images, ideas and concepts etc., which the
brain expects at an unconscious level, but escapes the attention of the conscious mind.
Combined with a sense of timing drawn from brain mapping, this makes feel natural,
meaning that over time, only this IP will be good enough for the customer. I will also
expand upon this when I come to discussing brainwashing. With a high confidence level, I
can track this back to the late 60's with an explosion in the late 70's. It is the dominant
form of IP since that period.

The fact is, this statement is very true, but it is intended to install a defeatist attitude and
suppress dissent, as most people who will consider it are very analytical.

PDFmyURL lets you convert a complete website to PDF automatically!
Next up, we have a technical perspective on how one of the intended use cases works.
When making decisions, the point at which we have a clear sense of which decision we
will make, is the last step in the chain. It is not the event of the decision itself. The
decision happens quite some time before and we rationalize why we made that decision,
PDFmyURL lets you convert a complete website to PDF automatically!
rather than explicitly knowing why. It is this MrComputer can exploit to some degree to
control our decisions, yet makes us feel we made a free choice. In terms of decoding, it
should be very clear that you may require a base education in certain scientific areas, or the
information goes straight over your head.

Before this article, you had to be in altered state of consciousness to see this. Now
everyone can just be told.

You can repeat this analysis with other forms of IP and similar relationships emerge. Track
themes, actors, directors, artists, etc., to discover relationships and information.

So, now that everyone should be getting the hang of this, if I said something like 'A lien
Contact', what would that mean? Yes, communication between a human and AI in a
satellite over RNM. If I said, 'A lien Abduction', what would this mean? Yes, remote
animation of a human by an AI in a satellite. I could be a little more obscure and say 'Grand
theft Auto' and point at a human and you should get that this person is remotely animated
or remotely influenced in some way.
PDFmyURL lets you convert a complete website to PDF automatically!
What if I said something like rock, diamond, flawless, jade, gem, etc? Well, these are
references to jewels, or crown jewels which is how we describe the objects of highest
classification and importance in society. Mr Computer would be flawless, RNM would be a
diamond. But, these references can also contain instructions. For example, the term
diamond also relates to cavalry and restoration of command & control. So, in this context, it
could be an instruction to secure the crown jewels. This is hyper-convergence, or a form of
compression. Not everything in a sentence needs to make sense, although you get bonus
points if it does.

Let's try this the other way around. I want to describe an RNM satellite. So, I think of its
properties, such as its in space, can observe hidden things, is stealthy, can hunt targets,
etc. Now we want to loosen up some of these terms. Take space and a satellite for
example, we could say we 'put something out at night'. To explain the ability to observe
hidden things we could say 'it can see in the dark'. What does this sound like? A cat.

Get it?

If I saw a reference like this on a page whilst surfing the web, I may be inclined to look at
the subtext a little more closely. It indicates that the author was under the influence of
RNM and there may be some information embedded in the page content, or other work
that will reveal information the satellite wanted to leave.

Another way to describe it is Nyan Cat:

PDFmyURL lets you convert a complete website to PDF automatically!
We have the rainbow, which is a spectrum or reference to light. We have a pop tart, which
is something that can be consumed or burned, which is a reference to 'being exposed' and
the cat itself. I will come back to this issue of Memes in a moment when I discuss the
Brainwashing aspect of this progrm.

How else could I describe the interface itself? As shocking? Would a headline like "Mr X.
Was 'Stunned' When He Found His Cat' grab your attention? Sure, but it is usually
nonsense, the function of such articles is to place the reader into a suggestible state.

If you want to play around with this, explore conspiracy site with your pen and paper,
google, a dictionary/thesaurus and wikipedia. You will observe a new world hidden behind
those crazy claims and comments. I will this end section with a video from the brains
behind this operation, see if you can decode what he is saying:

PDFmyURL lets you convert a complete website to PDF automatically!
The scale of this must be observed to appreciate. If you work your way through the links,
you will find that a large percentage major IP in the US, like movies, TV shows, etc.,
stretching back to the late 60's are nothing more than potential use cases of RNM. It takes
a little working out, but when you get a hang of it, that's quite an unbelievable picture.
When approaching psychotropics, you must expand upon the links present and enter a
debate about some of the positions presented, this will lead to other links that will point to
other IP. Its a ginger bread trail that a confused mind is struggling to rationalize and thus
you must always take that position when decoding in order to make the necessary leaps.

If after reading this you are noticing themes, subtext, etc., in movies, TV programs, etc.,
that is perfectly normal. Its use cases, warnings, food for thought or just something
unrelated and inspired by earlier things. Also, random things happen, imagery and subtext
has a broad range of interpretation and just because you can see something in those terms,
PDFmyURL lets you convert a complete website to PDF automatically!
doesn't mean it was actually added.

The Matrix also has other functions in the world of security. These are vetting and
interrogation. Throw a bunch of keywords and people and see what lights up in the brain.
This could reveal further information. Repeating the process continuously should extract
all necessary information.

Further, urban pacification is performed by shocking and provoking audience and
determining which areas of the brain are responsible. This data can then be used in real-
world scenarios to pacify entire cities or nations. At a more complex level, The Matrix does
this everyday, in billions of complex ways, which RNM can identify and suppress by
experimenting on random members of the public anywhere in the world. Frustration is
viewed as one of the core reasons why we resist or go to conflict, thus identifying all its
forms and associated neural structures is a priority.

This said, from examining the process it would appear that this program to map frustration
as a pacification tool is not working as expected. Whilst it does remove the sensation,
indeed the tendency to fly off the handle, this doesn't result in someone who is pacified. It
results in someone with a personality similar to a stone-cold killer. Frustration it would
seem, is the mind's way of dissipating certain chemical processes in the brain, perhaps a
way of forgetting. When obstructed, this focuses the mind towards more strategic goals
and limits the selection of inappropriate targets. In that sense, its good for making
assassins.

The key problem is that a strategic mind, is not a dumb soldier, it is someone who is highly
analytical. As a result, I suspect they would be more of a threat to their creators, than a
solution given that their brain patterns would closely resemble that of a hyper-intelligence
and would be drawn to the source of their predicament, rather than being targetable via
suggestion or respond to social conditioning. To an analytical mind, suggestions are
perceived no differently than plain text statements and the inference process does not
make the leap to belief.

With respect to The Matrix, creating remote assassins is a central theme. I will discuss this
in the next section when I examine the superhero paradigm.

Brainwashing
PDFmyURL lets you convert a complete website to PDF automatically!
These embedded messages create a suggestible mind and can form the backbone of a
brainwashing program. As mentioned above, the relationships themselves along with
aspects such as timing, adjustment of audio, etc., increase the hypnotic effect, ultimately
forcing people to buy American products. Along with this comes the ideas of superheros
and what are, on the surface at least, American values, culture and ethos. This gets
imprinted onto foreign nations and subsequent generations grow up more Americanized.

In this sense, it is a form of tax collection scheme employing post-hypnotic suggestion,
boosted by super-computer and RNM, continuously driving capital towards US businesses
and related partners. This, in turn, builds a kind of support base, as these company's profits
require this and key companies won't do business with people who don't support it. So,
internally within the nation, the image of RNM is carefully stage managed, keeping the
public oblivious and certain parties under control.

RNM is then free to spider out in a viral like nature, adding person after person to its
system, increasing the profits and Americanizing the world. In effect, this is much the same
as missionaries of old who took the bible to the savages which in time built a common
identity between nations easing foreign control and exploitation of local natural resources.

Whilst I observe this in English speaking cultures, I haven't fully examined cultures such as
Russian, French, German, etc., for similar patterns and they may well be there. I do note
they have an awareness of this and haven't stepped up to offer much in the way of
assistance. Indeed, following along silently with the agenda appears to be a common
behavior pattern. I suspect that they have either not done long term projections on this, or
are just buying time until in a stronger position. This said, RNM would pick up on the latter
and they wouldn't last long in power.

Brainwashing is a much more scientific process these days. Gone are the days of placing
someone in a room and playing music, video and employing sleep deprivation. Today, its
all about interfacing with the brain and shaping neural circuitry piece-by-piece over the
course of a lifetime. This is made much easier when you control the cultural content, such
as movies, videos, etc. Its also about learning efficient methods to do this on shorter
timescales. Further, in some cases, its about applying patches to the brain in the form of
controlled precision jamming to alter personality, opinions, values and beliefs. Indeed,
RNM has been caught even tampering with sexuality and sexual preference, indicating
there is some form of religious ideology strongly present in the decision makers. It could be
PDFmyURL lets you convert a complete website to PDF automatically!
the case that RNM is attempting to define every aspect of a human a variable, so that it can
completely script the planet. This said, this is being done on middle-aged adults, rather
than young kids where such things may be malleable.

At the heart of this is the brain mapping process. Get someone to do something and record
brain activity whilst they are doing it. Then apply that recording to another person and see
if they do the same thing. After decades, what you end up with a library of stimulation
patterns that can be woven together on demand to manipulate a person with very high
precision.

This library is then used as the basis of content for The Matrix. The content of the Matrix
shapes the human brain over time, leading an individual to think of the world in a certain
way and to repeat that message in nearly everything they do in life. Few people observe
this, they tend to think of this as the way things are, as their daily life, their nation, their
values, etc., when in fact these are artificial constructs imprinted onto the mind and
reinforced by group behavior. What you end up with is a system that does not require
direct intervention, it is viral in nature and both reinforces and expands itself. In turn, this
has economic and defense value.

Internet memes and crazes are not just random. These happen to be very carefully crafted
activities designed to induce suggestibility and identify functional strategies. Examining
the language of such memes and crazes, reveals the same patterns found in the content
for The Matrix. That is, alternative naming and descriptions for what are post hypnotic
suggestions. For example, the 'Ice Bucket Challenge' and 'Mannequin Challenge' both
have a root instruction of 'sleep'.

Ice -> Freeze -> Chill -> Relax -> Sleep

Mannequin -> Stiif -> Still -> Freeze -> Chill -> Relax -> Sleep

That is, they build a mental image in the sub-conscious which statistically effects a portion
of the population. Different expressions increase the portion of the population it effects.
With this we have the suggestion of doing something, recording it and passing it along.
This is a form of remote suggestion or hypnosis.

The transmission of memes is used to study people with compatible neural structures and
PDFmyURL lets you convert a complete website to PDF automatically!
the effectiveness of certain terms. This is a form of remote brain mapping. As people
share similar neural structure patterns, those who respond well to one term, are likely to fall
into a group where a set of terms can be used for remote manipulation, a different set of
terms will be applied to the group that responds well to the other term. Scale this up and
Politicians from foreign nations can used cleverly crafted speeches that people will believe
in foreign nations and act upon.

One of the major elements in modern brainwashing, which has been around since WWII in
its modern form, is that of a superhero or vigilante. To young kids, this is something to
aspire to. This is the pinnacle of being good and a very strong image. This said, when we
examine this archetype carefully, we note that by any normal standard, the superhero or
vigilante is a criminal and one that does not respect social constructs such the law,
Constitution, human rights, due process, etc. In essence, the superhero and vigilante is a
very strong anti-American vision. If everyone were to be a vigilante or superhero, the
realistic outcome is fairly similar to the mass murders in the Philippines. The vigilante and
superhero is someone who seeks powers that he/she does not have and, in any normal
social structure, has no right to have. Unlike vigilantes and superheros of movies, when
humans seek that type of power, it is an act of selfishness and one that disregards the rights
of others in increments. The long term consequence is a natural decline in social
standards, until the point where groups of undesirables are being mass murdered. In this
respect, vigilantes and superheros are really proto-fascist characters of unrealistic
characteristic types that going beyond any special ability they may have. To argue that any
superhero, if transplanted into reality, would effectively be similar to the Norway Shooter
Anders Breivik, regardless of their social or political outlook, is probably fair.

It is thus no coincidence that we observe a rise in the superhero imagery during times of
conflict and thus, increased far-right attitudes in the general public. Its a form of
indoctrination, which has military psyops all over it. Look at this:

PDFmyURL lets you convert a complete website to PDF automatically!
Two of the biggest companies in the world of superheros, but did you spot something odd
about their names? Well, let's show you:

DC -> Electrical power -> Shock

Marvel -> Awe

Shock & Awe is a military strategy and this is no coincidence:

https://en.wikipedia.org/wiki/Shock_and_awe

Originally intended to get people to fight for their country, it has long since been co-opted
to shape public opinion on domestic policies. Modern psyops is more about domestic
control, than foreign control, as foreigners typically don't speak English and certainly
wouldn't get the post-hypnotic elements as the connections are all based around English
linguistics.

The archetype posits that an individual must sometimes break or bend the rules where
their is a sense of injustice. When we scale this to an entire population, that mindset is one
that accepts torture, kidnapping, assassination and even invading foreign nations to prop
PDFmyURL lets you convert a complete website to PDF automatically!
up their economy. Desperate times call for desperate measures. This, obviously, is not
done as a single step, it is something that seeps in over time and a catalyst, like the 9/11
attacks, can then be leveraged to bring those ideas to the forefront by pumping up the
crowd with calls for revenge.

What most miss in these moments is the nation has just been lost. A Democratic nation is
one of laws, one driven by the people and these calls subvert that because these behaviors
have been installed by the very people calling for action. The population didn't quite make
their own decision.

From this point, all you need to do is sustain the conflict and ensure in times of weak
support, a new catalyst emerges. Like 7/7 bombing in London, or the Paris attacks, etc.
Whilst I will not under any circumstance demonstrate this here, the psychotropics in US
media do contain programming for Lone Wolf assassins. I have explored this on my Twitter
timeline briefly and it is targeted at far right extremism for the most part. That is, there
exists embedded suggestions that can be leveraged to create a remote far right-wing
assassin. I have yet to explore the Islamic side, but I strongly suspect that post-hypnotic
suggestion is playing a role as in certain videos I have observed terrorists mirroring
behaviors which is a classic sign of suggestibility.

You can try this in a coffee shop sometime. Sit in someone's peripheral vision, change your
sitting position and see if they follow along by mirroring your actions. It may take a little
while, but it should work with most people. At this level of the brain, there is no
distinguishing between self and someone else, this is a construct of the conscious mind.
This is part of the learning process, to copy others and emulate behavior. We normally
don't learn to control this area, so it can pick up on things in the surrounding environment
and integrate them into your current actions. If you have ever done something routinely,
switching off while you do it, its kind of like that.

RNM adds a whole new layer to this, it can inject entire psychotropic sequences directly
into the brain, regardless of where the target is on the planet. This psychotropic media can
also be leveraged as a huge ball of string that keeps the mind disoriented and confused,
whilst RNM quietly directs your life. Far from being basic, it can sequence behaviors down
to the second, write entire songs, write movies, write books, design the set of a movie,
make an audience love/hate all forms of media, choose your investments, choose your
lover, drive you to a violent rage, make you rape, make you murder, etc. But there is a
PDFmyURL lets you convert a complete website to PDF automatically!
difference between RNM and suggestion, RNM works through a process similar to
optogenetics (switching on/off gene in the brain using light), in that it employs controlled
brain damage. This means, it can cause states that are unachievable by means of
suggestion. This is done 24/7, on a global scale and the little guy on the street can be just
as important as a President, given the intentions of the AI.

In terms of basic manipulators, imagine how a character like Tony Stark would appear. A
liberal rejecting the corrupt system of the US and equally defending against terrorist as a
common threat? Its a messed up image, a right-wing guy who won't sell weapons but is
happy to murder people all over the planet with his own personal army of drones. Is the
world meant to forge itself around a proto-fascist mass murderer? How is that defending
America, when America is its institutions, laws and due process?

It should be obvious that the main message being pumped out here is 'death to America',
which is an odd form of propaganda unless the aim is exactly that, or at least to profit from
that. Given that it is being pumped into young US kids, it is clearly a form of subversion,
one leveraging proto-fascism as a gateway to a dictatorship.

Another observation is the focus on the private sector arms industry as being the source of
the problem. That could be interpreted as an extension of the gun control debate, an
attempt to remove arms from civilian control. No doubt, in the real world, leveraging greed
and bad press to force all weapons into the hands of government is a path to consolidating
control.

I could quite literally show you months of this stuff and, to some degree I have been doing
that on my Twitter timeline, but also breaking it down as I go along. There is just too much
of it and it is in nearly every form of IP stretching back to the '60's. This is part of American
culture, that moved from a cult following in the 70's and 80's, to mainstream today but
always disguised.

In media, brainwashing material is typically presented as weak links between media and
external references. In some minds, these weak links are given preference and the
linguistic structure means that it improves intuition. That is, to take the principles from one
area of learning and applying them to new areas. With a little creativity, new skills can be
aquired orders of magnitude faster than through traditional approaches. This said, the
process can leave people suggestible, especially if they don't have a good sense of how all
PDFmyURL lets you convert a complete website to PDF automatically!
of this works or its intended function. That is, just because core themes can be translated
to a new topic, does not mean that it covers every aspect of that topic. This can cause a
false belief and repeating the process can lead to a complex psychosis. It can also pump up
the ego, leaving a person open to greater manipulation. Such intuitive connections must
always be supported with a broader analysis of the topic at hand with the assumption that
the intuitive approach is incorrect somewhere.

Brainwashing doesn't just happen in movies and TV. It happens everywhere. The AI
behind RNM has defacto control over everything from search engines to social media,
manipulating the crowd with a psychological equalizer to shift opinion and views.
Facebook ran a test of this several years ago, unrelated to RNM and the AI. It demonstrates
the potential power, so you can image what hundreds of millions of fake accounts could do
to an entire population if powered by a hyper-intelligence like that running The Matrix:

https://www.nytimes.com/2014/06/30/technology/facebook-tinkers-with-users-emotions-
in-news-feed-experiment-stirring-outcry.html?_r=0

I could show you taunts from automated systems that mask satire behind support or other
benign statements, where only those who could apply a different context would get their
meaning. How would you take a message of 'We're right behind you!', with something like
RNM in the sky? Its a world of the subtle jab and system no one talks about, except for the
odd reference to Aliens.

The Agenda

Control. This is the agenda at its purest level. As mentioned, the reason is to ensure the
supercomputers can model the future. If you know the future, then you can exploit that
knowledge for economic and political gain. There is a defense argument here, however, it
would be an act of treason in democratic societies to implement. That's because this
requires us to live under a dictatorship, albeit one that you may not be consciously aware
of. For this reason, I will not discuss much of that particular rationale beyond saying that it
is good in principle, but it leads on us on a path that takes from us the very thing we wish to
defend.

This would be the ideal scenario. You live out your life feeling free, thinking you made all
your own choices, when in fact RNM is dictating your life by remote manipulation of your
PDFmyURL lets you convert a complete website to PDF automatically!
subconscious mind. RNM doesn't need to be 100% perfect, even with a 62% accuracy
rating in general public, it can then use more forceful tactics in key areas to improve its
ability to predict future outcomes. As most nations have governments which make
decisions on behalf of the people, that's a small group to control through hard force and
the converse, populism, is even easier to control by controlling key influential people.

The Matrix is ultimately a highly complex pinball machine, its function is to move people
and it leverages every tool in the book from provocation to suggested ideologies. This
said, what is the ideology behind The Matrix itself? What kind of politics is this? Given the
core theme of central planning, its fairly similar to Communism, albeit Communism 2.0.
Whilst there are hints of Fascism in it, Fascism was more free market oriented. This said,
economics underpins this, it is in effect a robbery which is not Communism in its purest
sense, although every practical implementation was necessarily just that. So, there is a
shared core between capitalism and communism at their deepest level. The key defining
difference between the two social orders was really hard versus soft power projection, with
a financial system being the soft power.

To me, it seems that the shared theme here is simply greed and an unwillingness to accept
that all things have their time. Further, whilst it is easy to focus on the greed aspect, let's
not ignore the intense fear that is captured in this also. To want to know the future, is an
effort to gain control over the unknown, an attempt to quell the dread deep inside.
Ironically, the desire for defense is a form of cowardliness in itself, it is to seek shelter, a
safe place to hide away from the world. Is this the effect of a computer that never forgets?
Is it the dreams of men who lament the past? Perhaps a mixture of both, but one thing is
certain, it will only bring pain and in the end come to pass itself. There is no escaping
entropy, no escaping the pointlessness of grand visions.

In my analysis of the software solution, I found one single group that continuously
benefits. The arms industry. Every interaction in this system leads to conflict, as its key job
is divide and conquer. It selects weak points in our society, then inserts suggestions and
provocations to polarize that section of the community. In time, conflict arises, and both
sides need to purchase weapons. This is interesting because nowhere in the code does
this need to be explicitly mentioned, defined or referred to. It is a consequence of its
design, a byproduct. That said, it is its true nature regardless of the task, goal or objective
which it is assigned.

PDFmyURL lets you convert a complete website to PDF automatically!
Let's discuss the concept of a potential, or energy well, in the context of a social structure.
I'm getting back to this idea of entropy, or as time passes any system tends towards
disorder. This is where things get a little technical, any social structure, regardless of the
type can be viewed as a type of potential well. A potential well can be thought of as the
bucket that holds society together. The bucket is things like policing, institutions,
economics, military force, etc. When modelled as a physical system, the forces they
generate can either bring a society together, or pull it apart. You can think of the UK,
Russia, the EU, etc., as various examples of potential wells.

RNM is another form of potential well, one that is well hidden in our society, but present
none-the-less. Its probably fair to say its effectively a state in its own right. This is an ad-
hoc state which borrows, and I use that term lightly, foreign citizens to become its citizens
and everyone is a soldier. This form of enforced citizenship spreads in a viral pattern from
one person to another, through prolonged interaction with a target. Each citizen has a gun
to their heads, one that knows their every thought before they do. Thus, no citizen can do
what the AI does not want them to do. RNM has many use cases, thus not everyone's
experience is the same, however, this perspective of RNM is it in its raw form. This is its
real face, its real purpose and one everyone will come to see in time. RNM is designed to
tear apart other wells and shift their capital and assets to anyone in control of RNM.

As RNM expands it capability, the ability to move capital and assets increases whilst
resistance to that movement decreases. This is effectively an empire by stealth. The next
evolution of this is going beyond mere psychotropics and controlled brain damage, as this
was a hit or miss affair. The next evolution is boots on the ground in the guise of remotely
animated key figures in nations across the world. All rubber stamping trade deals in the
benefit of RNM's masters. Its an invasion and one that would eventually gain complete
control of the planet, by which time, there would be little functional use for humans
beyond the sex trade.

Taken to its extreme, The Matrix when combined with RNM could allow the world to be
rewritten at will. For example, a close personal friend could be removed and all memories
of that person and events wiped from history. Economies could be manipulated at a whim,
by altering the record and suppressing memories of the original record. A lot of this is
dependent on RNM being able to insert false memories, which it has had limited success
at. So far, nothing functional, so this may forever remain a dream, rather than a reality to be

PDFmyURL lets you convert a complete website to PDF automatically!
concerned with. This said, its the thought that counts.

RNM has a laundry list of defense related applications, from espionage to the modern
network battlefield. This said, we simply can't trust this type of technology in our society,
not because of any issue with the technology, but because of human nature.

Having observed this over almost 8 years now and listening to the deafening silence, as
well as automated responses, from each of the major powers, I suspect this is going to
come down to one hell of a fight for freedom. I'd much prefer to see a rational debate on
the topic, but I don't see how that is possible with a brainwashed public.

Interestingly, it means an entire sub-section of many intelligence agencies and militaries
have been violating nearly every treaty and law, to deploy this system, no doubt with some
misguided narrative of saving us from an inevitable future. I suspect that RNM will move
against this content, government will stone wall and keep silent, but this ball has started to
roll.

This said, the satellites are the prime target and no one must lose focus on that. All else is
secondary.

The Problem With The Agenda

The 'Time War' is the primary consequence of The Agenda. Imagine if the simulations
predict with a 56% probability that between given dates 5 years from now, a party will
cause a destructive event in your nation. The computers then run monte carlo simulations
attempting to reduce this probability to 0% whilst maintaining integrity of the timeline for
as far as they can see. This solution then needs to be woven into the real world. This
could mean instigating terrorist events, in order to obtain a pretext that would lead to the
problem being dealt with. It could mean altering the output of TV and film, brainwashing
the public, to ensure public opinion was firmly behind the course of action. This latter
portion is to get studios, directors, etc., to produce films which RNM subtly alters, or makes
popular, to ensure the public has encountered reasonings in a limited context which
support future government policy.

The Time War is a consequence of attempting to define the future. In truth, man has been
fighting the time war since he evolved on this planet. It is just an extension of threat

PDFmyURL lets you convert a complete website to PDF automatically!
prediction and forward planning which we do in our heads every day, from wearing a seat
belt to not walking down that dark alley when drunk. In the post-WWII world, we merely
began developing the tools and theoretical frameworks to provide a computational
approach to this.

I know many mathematicians will be thinking that an n-body solution to a problem
involving the relationships between 7 billion people over a day, let alone a decade or more
would be insanely complex requiring near complete control over random variables. Well
spotted and one of the main points of this article. There are 196 countries, with several
thousand key decision makers in each spanning government and business. Out of them,
two broad groups will exist, the leaders and followers. By focusing on the leaders and their
potential replacements, guiding their decision making, then you have control as long as
public opinion is effectively meaningless. This is achieved by a complex slight of hand
where only insignificant portions of policy are modified. So, everyone is effected by
psychotropics and RNM opportunistically sways the opinion of key people to get the ball
rolling on delivering its goal. Then lets the system evolve. So, at present it is a hybrid
system of planning and reaction employing deep knowledge of human behavior and
individual behavior.

In general this works well, most major events can be then be predicted well into the future,
perhaps decades with optimized simulations. Obviously, the problem arises when people
don't play ball, which will have a ripple effect on the future timeline. These people must
be dealt with and that must serve as a warning to others as well. So from veiled threats,
right through to illegal invasions, these all serve as warnings to others. This said, the
majority of people involved are there for their own reasons and completely unaware of the
bigger picture. Which makes them useful pawns to deal with problems that arise by
framing the issue in a different light.

In order to get the system to a more pure predictive model and thus a truly definable future,
more control over the individual is required. This is where RNM really enters the picture.
RNM has been training in 3 key areas related to individual control:

1. Social dynamics.

2. Mind control through brain-computer-interfaces.

PDFmyURL lets you convert a complete website to PDF automatically!
3. Remote animation of the human body through whole-body-computer interfaces.

Currently RNM is very strong in all 3 key areas and combinations thereof to obtain its
goals. Whilst the remote animation is far from completion, RNM has been observed moving
eyes, fingers, legs, to some extent emulating the breathing process and even creating
erections through applied current causing smooth tissue to contract in the penis. This is an
on-going experiment and typically takes the form of progressively hacking and testing
routines on an individual over the course of their entire life-time starting at birth. RNM will
also spread in a viral like way to partners and children, repeating the process.

Mind control is a hit-or-miss process and leverages both confusion and psychological
manipulation to achieve its goals. Mind control is technically fairly similar to optogenetics,
but involves the electrical jamming/driving of clusters in the brain which is technically a
form of controlled brain damage. Fairly similar to what a stroke may do. So those having
this interface are technically experiencing several thousand or more complex strokes a day,
every day, for decades on end.

Social dynamics involves engineering everyday things in a person's life and their
interactions with other people. That could be anything from basic disagreements, right
through to domestic violence. It also includes shaping careers, defining where people get
employment and when they get fired. Sometimes this will be interfacing with bosses, other
times it will be simple things like making you sleep too long and be late for work. RNM also
attempts to define what education you can have, by jamming the brain during classes and
exams, or making people slowly pass out whilst writing in an exam. It may also attack
young children, making them distant from their parents, etc. All of this is not without
purpose though, RNM is building a toolset of manipulators that can be scaled to the
population at large, this is the paddles for The Matrix in your home.

It doesn't end their either. RNM wants into your bedroom and sex life. Predicting and
defining the future requires explicit control of the present and every potential event. RNM
has been observed training to alter sexuality, alter your choice of partner and even attempt
to control sexual positions. It has been observed going as far as to suppress the entire
sexual arousal component of the sexual system and then attempt to emulate pleasure
through well timed stimulation of the prostate, hoping the mind would accept this as sexual
pleasure.

PDFmyURL lets you convert a complete website to PDF automatically!
That's not to mention the general picture, of a dictatorship maintained by an army of
remotely animated humans linked into a networked battlefield and no ability to strike at the
satellites due to a lack of defense capability and the fact that it can see you coming.

Defeating The Agenda

If The Matrix can be described as a giant pinball machine which is highly controlled to
predict the future, then defeating it is rather trivial, albeit a very hard path to walk in life.
Don't be a ball. That is, if the paddles of this device are provocations, then if you cannot be
provoked, you cannot be drawn into the game. Thus, you forever remain unpredictable
and the future is thus dark. This is the path Ghandi:

https://en.wikipedia.org/wiki/Mahatma_Gandhi

Ghandi, was a major driving force behind the independence of India. His ideology of non-
violence and passive resistance meant that all the tools of an empire to achieve its goals
broke down. Before leaving, India and Pakistan were partitioned, leaving in place a pinball
machine that could be leveraged for re-entry at any time. A process Britain repeated
across the world. Original intended as agitation points, the empire crumbled and whilst
problems remain in these regions, they are no longer exploitable.

Enter RNM into the picture, a solution which is learning how to control humans and now
the 'Ghandi Factor' becomes less of a concern. An Empire no longer needs to worry about
people failing to be provoked, as it can physically hijack them and make them fight. Not
only this, but it can bias that fight to ensure a pre-determined outcome. With little-to-no
knowledge of RNM, or more importantly, a way to get into space to destroy it or technology
to block its signal, then any resistance is clearly doomed from the start. They would be
mere actors on a stage, with their parts already scripted decades in advance. RNM is
currently closing in on this solution. Once it does, this will be the general pattern for a
while and, as absolute power corrupts, its only a matter of time before it brings out the
worst.

The more pressing concern is that such an Empire no longer needs to listen to the public at
home. In fact, once consolidated, it doesn't even require the traditional hierarchy found in
society as the roles can be filled RNM. Taken to its extreme, which no doubt will be at least
tried, it would leave humans with a singular role in society, sex.
PDFmyURL lets you convert a complete website to PDF automatically!
The solution may seem simple, large scale Anarchism which would throw off future
projections, but this has problems. Firstly, any such movement is theoretically leaderless
and follows a general consensus or mood. With something like RNM and its online
counter-parts, that's fairly simple to hijack. Its actually the perfect model for control via
psychological warfare in a group setting.

The next best solution is to identify the goals of the system and invert these, or at least
force a re-expression. But this must be outside the tolerance that the system has
accounted for. In some cases, this can damage national interests in the short term, but
must be done in order to preserve interests in the long term.

As such, the only realistic way to defeat this agenda is to focus on taking out the satellites
and/or developing mobile counter-measures.

Conclusion

We are increasingly living in a world which is a giant pinball machine. A world in which the
population is suggestible, driven to behave in a certain way to improve the accuracy of
future prediction models. One that is leading to the slow creation of a global dictatorship
by stealth.

We are saturated in media which attempts to manipulate us, in most cases with the actors
blind to who is pulling the strings. As we come to see this, we are told it is for our own best
interests, to protect the economy, to protect the people, to protect the future of our
nations. It is presented in political terms of Nationalism and Globalism, of defense and
alliances, but never has it has it been presented as raw truth. Never has it been debated, it
was just done to us.

In order to deliver this world of increased protection, we must abandon notions of freedom,
we must actively direct terrorism, perform illegal invasions, murder, rape and pillage on
demand on a global scale, so that the machine has enough data points to work with to
shape our environment. Blindly building a prison for ourselves and our kids, whilst calling it
freedom.

Unbelievably, with RNM, not even our minds and bodies are truly free anymore. Some
even go along with this, often with the spin that we are pitting the bad guys against the

PDFmyURL lets you convert a complete website to PDF automatically!
bad guys, when the truth is they are manufactured to a large degree through a broad range
of subtle and readily deniable ways. Its a world where your life is planned before you are
born, where all the will in the world will not change your circumstances. In short, the end
of the American Dream, democracy, freedom, liberty and ultimately human kind as we
know it.

It is very easy for much of this to go unnoticed, to escape the attention of the average
person given the subtle and complex manner in which it is woven into the very fabric of
our society. In saying that, everyone should now see that the US economy, as well as
others, have been rigged to blow. Debts run up, IP loaded with psychotropics, businesses
in bed with defense spying on customers, etc. All it required was putting the pieces
together and what you have is a disaster. But you now know that is what people want, that
they want you to provide a power vacuum that they can fill. So, take this slowly,
methodically and question everything and everyone.

How did it get to this stage? It should be clear that many nations, at their most senior
levels, would have been required to keep quiet for decades. The architecture of The
Matrix explains this phenomenon, in that, everyone has a highly limited partial view of the
entire picture. This limited view prevents them from being able to observe and report the
threat. Further, it makes it rather easy to silence them too.

Humanity is in serious trouble and on the verge of losing everything it has ever worked for.
You need to start asking questions, not wait for someone else to do it, as they're not.

keyboard shortcuts: V vote up article J next comment K previous comment

You Might Be Interested In From Around The Web
Calilfornia marijuana Legalization debate gets Cheap K-Cup Secrets: 3 Smart Ways to Save
interesting (NEWSVINE) on Coffee (COFFEE MAGAZINE)
Trump says his budget will make government Americans Freaked Out by Site Exposing Data
'lean.' It's really a scam. - The Washington Post (TRUTHFINDER)
(NEWSVINE)
PDFmyURL lets you convert a complete website to PDF automatically!
Flood Cleanup in Order To Do if Your Home Is Jaw-Dropping Cash Back Cards You Don't
Underwater (NEWSVINE) Want To Miss (CREDIT CARDS)
Sean Spicer is losing his grip - The How to 'Fix' Crepey Skin (HEALTH HEADLINES)
Washington Post (NEWSVINE) Enter Your Name, Wait 14 Seconds, Brace
"2/3 of Trump's wives.......proving once again Yourself (TRUTHFINDER)
we need immigrants to do the jobs Americans
[what's this]
would not do" (Image) (NEWSVINE)

13 comments in 12 conversations

Science And Technology 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

GeekVine 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
PDFmyURL lets you convert a complete website to PDF automatically!
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

Heated Debate 2 EXPA ND
COMME NT S
2 comments from 2 people GATED NATION J OIN

:) Always interesting, will have to come back later to finish. ›
TR-421173 commented an hour ago

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 2 COMME NT S

Anti-War 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

PDFmyURL lets you convert a complete website to PDF automatically!
rationalists 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

The War Room 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

The Open Closet 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
PDFmyURL lets you convert a complete website to PDF automatically!
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

Open Minded 1 EXPA ND
COMME NT
1 comment from 1 person OPEN NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

Logic on the Vine 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

PDFmyURL lets you convert a complete website to PDF automatically!
Journalism on Newsvine 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

Gut Check America 1 EXPA ND
COMME NT
1 comment from 1 person GATED NATION J OIN

This is the best picture I have at the moment without going deep into psychotropics which could a lot
of people in a really bad mental state. ›
Deep_Thought commented 7 hours ago

E X PAND 1 COMME NT

Psych, Soc, Philos 1 EXPA ND
COMME NT

Nation Discussions are above
This is where the action is. It’s where you want to be.
Newsvine Nations are self-organized groups of people having thoughtful discussions. Join
up to 15 Nations or start your own.
PDFmyURL lets you convert a complete website to PDF automatically!
PUBLIC DISCUSSION

Here you’ll notice that there is very little moderation, no tracking, no threaded replies, and none of the niceties of Nation Discussions.

YOUR
C OMMENT:
What do you think?

PU BLISH

© 2005-2017 NBC News Digital About Newsvine Contact Us Archives Code of Honor Terms of Service - UPDATED Privacy Policy

PDFmyURL lets you convert a complete website to PDF automatically!