admin

Socializers Process Mid-2021

SUMMARY: The following actions succinctly outline our process with our clients as of mid 2021. We have reached a time in history where altering events and the experience of individuals is a reality. Our work is commensurate with this capability and we seek to evolve this capability, along with others, to its “zenith”.

To quote from an Economist article:

“This is the sort of idea that leads thinkers like Yuval Harari, an Israeli historian, to suggest that ever more capable information technology means that not just free-market economics but also liberal democracy might “become obsolete” over the coming century. He argues this is particularly likely if information technology is partnered with biotechnology, allowing its algorithms to access and act on human thought. This does not necessarily have to entail tyranny. It might mean something even stranger.

On some of their adventures Star Trek’s various starships encounter the Borg, a “more-than-species” which uses nanotechnology and computers to assimilate all those whom it encounters into its own collective. Its members all hear what each hears, all see what each sees, all will what each wills: there are no individuals; there are no aims but those of the collective. The demands of television drama mean that the Borg’s shared will may be represented by a leader—a queen for the spacefaring ant hill. The logic of the idea says otherwise, suggesting a truly equal, truly efficient hive that might persist with neither central control nor overt oppression, optimised only for assimilation.”

……………
influence

CONVERSATION MINING & ANALYSIS…scrape, mine and aggregate (using social media monitoring solutions) billions upon billions of publicly posted conversation snippets from social media, comment threads and other publicly available forums on the Internet. This is important because we gain the actual conversations living humans are having with one another online, going back over a decade now…and sometimes even further. Although the intent and authenticity of many conversation snippets must be delved into, there are a very large percentage of conversation snippets expressing actual human opinions, emotions, and intentions. These conversation snippets can be analyzed and insights can be found through such analysis. Brandwatch, Meltwater, and Synthesio are leading solutions for aggregating conversations.


DATA ENRICHMENT….then enrich (via data-enrichment APIs) ALL of the social handles of those participating in these conversations with personally identifiable information. This is important because we gain a fuller dossier on each individual, thereby gaining a fuller understanding of him/her and, importantly, his/her network/relationships….discover (via network analysis solutions) how every individual is warmly connected to every other individual. This is important because we can seed ideas along existing “warm” paths of relationship. PIPL, Full Contact API, People Data Labs, and Spiderfoot HX are leading solutions for enriching social handles and the emails associated with a specific social media account. A solution called Relationship Science reveals how “Jane” can meet “Dick” via a path of warm introductions.


PERSONALITY ASSESSMENT….then (via text-to-personality solutions) enter every statement made publicly by an individual and know their personality type (on every type of personality scale). This is important because messaging, advertising, and all sorts of tactics can be crafted based upon an individual’s personality type…and I do include here, yet again, that MANY personality assessment solutions are utilized here in order to gain accuracy. Crystal Knows, (created by Drew D’Agostino and Greg Skloot), and the uClassify system, (invented by Jon Kågström), are both excellent solutions for analysis of personality based upon text and bios.


SOCIAL ENGINEERING…then (via tried-and-true social engineering tactics) engineer situations based upon all of the above data. This means that we can now, using the above insights and data, craft just about any type of outcome we want and then work a network of individuals to achieve this outcome. This takes planning and, in particular, the skillset of charting out algorithms (I mean on large white boards with erasable markers). This takes teamwork and a team of different types of minds so that flaws in the plan can be ferreted out. This takes days, weeks, months and even years to eek out…from lived experience, it can take years to realize one’s goals when performing social engineering. Patience and tenacity are key. The manual “Social Engineering: The Art of Human Hacking” by Christopher Hadnagy, along with a great library of other Red and Blue team penetration testing manuals, and books on influence, such as Robert Caldini’s classic.

EVENT ALTERATION….then (via tried-and-true social engineering tactics) alter planned future events based upon all of the above data. Let us say an event is publicly planned. We can alter who attends this event by altering what is happening in their personal lives. We can do this by planting seeds in the minds of those surrounding an individual who is a key player in a specific event. We know who to plant such seeds into and how due to the deep insights from our dossier work mentioned earlier. As an example, when a person alters his/her plans, this often has a ripple effect in a community of people who trust this person. This is what I mean by altering events using data from social networks and from conversation snippets. I discuss this capability at mins 22:49 on this video presentation: https://www.youtube.com/watch?v=a62XTMufWQI

IDEA SEEDING…then (via tried-and-true social engineering tactics) seed ideas into the minds of others. As just mentioned, we can, using our knowledge of who is warmly connected to each person, plant seeds into the right minds. We know, based on personality analysis and conversation analysis, what this person typically does as a result of specific ideas taking root in their minds. This is important because all change begins in the realm of thought…and even earlier, in the “etheric” or “imaginal” realm. Seed ideas into the right people in a network and the entire network will eventually be affected.

FINE TUNING.…then (via a multitude of metrics solutions AND human analysis) track the growth of these seeds. This is important because change inevitable and we must be prepared to finesse, alter, and fine-tune our approach.

“AT-WILL” TIMELINE CREATION….create timelines at will (based on evidence) using all of the above tactics, translating the digital activity into flesh situations. This is important because we want to track how a specific sequence of seeded ideas will play out in the minds and in the lives of those affected. We also want to “hack” or provide out clients the ability to “jump” timelines. One of the best resources on “jumping timelines” is “The Art of Jumping Timelines” by Tom Kenyon. This important skill affords its participant the ability to move in and out of different situations, and alter these situations, in an efficient manner. In this amazing resource, Kenyon outlines the five stages of timeline jumping:

“The fundamental principle, for jumping timelines, involves the coordination of a few significant fields of intentionality.

1) You identify the timeline you wish to move into.
2) You shift your vibrational state to match the timeline.
3) You lock in the vibrational state so it does not waver.
4) You take an action that is an expression of the new timeline.
5) Persevere.


In this fifth stage, you must hold the vibrational state of the new timeline you have chosen, making choices coherent with the new timeline and persevering with this despite sensory information to the contrary.


This last phase of perseverance is important, because your current timeline is an accumulation of your beliefs and intentions. Depending upon the strength of these beliefs and intentions, you may have to accumulate a vast amount of energy in order to overcome the set pattern of your life.”

CONTROLLING FLESH VIA THE DIGITAL….remember, flesh follows amnesia AND passions fomented within the digital. This is important because the Internet and the use of texting/social messaging has (on a mass scale) replaced walking up to someone’s doorstep to have a conversation. This is important because one can directly influence changes in the world of flesh using the digital. Two hundred years ago, this ability and the tools we use would have been called witchcraft. Nowadays, it’s called marketing and public relations. The veil between the digital sphere and the “etheric field” is thin…one speaks to the other nowadays, especially under practiced fingers.

Memory Warfare

It’s technology that extracts every memory stored in your DNA, transforms these memories into ones and zeroes, and then animates every single minute detail in full HD video detail.


It’s tech that allows you to search every single memory by keyword in any language.


It’s tech that allows you to clip portions of these memories into a sequence and share with anyone.


It’s tech that allows you to share the entire corpus of your memories with anyone.


It’s tech that enables selective and super-specific editing of memories, giving you the ability to temporarily or permanently alter how the past plays out in your current consciousness.


It’s tech that allows you to blend your memories with another individual or a group.


It’s tech that allows you to create avatars with memories AND THEN blend the memories of these avatars with your own or a group.


It’s tech that anyone can plug into a MMORPG where others are pitting their memories against the memories of the larger culture…thus giving you and your group the opportunity to alter how a specific sub-culture or a larger culture perceives its past, present and future.

SOCIAL ENGINEERING 101

Identify the target individual via a name and an email. The email is really all one needs to begin.

Enlarge understanding of individuals through enrichment of the email. Enrich the email with hundreds of additional bits of data from various APIs, such as PIPL, Full Contact API, and various OSINT (open source intelligence) providers. Spiderfoot HX is excellent for this.

Analyst(s) reads through every bit of publicly available information found on social links about the individual and writes insights. Analyst also identifies community surrounding the target (Audiense.com is excellent for this, particularly when one finds that all social handles are the same across various social channels).

Use snippets of text posted by the individual online for personality assessment using Crystal Knows and other text analysis solutions.

Warm pathways of introduction discovered via Relationship Science software. This is important as the means for discovering the correct “warm introducers”.

Create dossiers for each individual close to the target. Create a master dossier about the target.

Socially engineer contexts through which one meets the “warm introducers” and, eventually, the target. This is strategy and this is also relationship design.

Introduced to individuals close to the target. Participate in mutual activities “in-the-flesh” with individuals close to the target, endearing self with these warm introducers.

Warmly introduced to the target by those close to the target…after some time of endearment with the introducers (can be 6-9 months or longer…no rushing this).

Participate in mutual activities “in-the-flesh” with the target, endearing self with the target. Go slow.

Pursue desired outcomes via the target. 

Celebrate achieved outcomes.

The Age of Predictive Social Media Monitoring

In the next iteration of social media monitoring solutions, conversation data from discrete topic groups will be run through a “cycles scanner”, which shows dominant cycles related to specific topics. Insights professionals will be able to accurately predict future behavior based upon recurring patterns discovered using the “cycles scanner”. The way the cycles scanner works is simple: it takes data and uses a variety of well known algorithms, along with spectral analysis, to determine recurring patterns. Insights professionals will see before their eyes on a graph the ebb and flow of conversation relative to periods in the past, as well as a predictive signal (in the form of a wave pattern) going out into the future. This is important because insights professionals will have a higher threshold of confidence when advising brands on when to execute on specific manufacturing volumes, distribution foci, and campaign content. Insights professionals will also be able to blend audience intelligence with this enhanced predictive ability to reveal to brands who will buy next and where/when. We are entering an age of true prediction. 

The Final Ad Campaign (a “quasi-satire”​)

THE CURRENT CONTEXT:

They have millions of data points on you.

They know what you said, how you felt AND who you spoke with (and how THEY felt) BEFORE you made that online purchase.

They know what to reveal in the feed you are scrolling through in order to foster your next purchase. 

They know how much is available on your credit card, in your bank account, and on your partner’s card and in your partner’s bank account, so as to tailor the suggested next purchase.

They know who you are privately messaging and what you messaged. They know what others are privately messaging about you.

They know what you owe.

They know who owes you.

They heard what you whispered to yourself in your room with the door closed.

They know what the people close to you whispered in their rooms with their doors closed.

They know what you’re planning by putting together various emails, texts, social messages, public posts and private whispers.

They know what others are planning to do with/for/against you by putting together various emails, texts, social messages, public posts and private whispers.

They have algorithms whereby they can take all of the above and discover the “dominant cycles” in your communications with others, your whispers to yourself, your purchases, and your actions.

They can use these algorithms to predict when you will say certain statements to others, whisper certain whispers to yourself, buy certain products, and take certain actions.

They can plant content in your feeds, in the feeds of those privately talking about you behind your back, in the feeds of those interacting with you, and in the feeds of those selling to you.

As you begin to feel less in control, they know by an irregularity in your patterns and they can adjust their influence ever so slightly so you feel that you’re “on top of” your life again.

…….

A BRIEF HISTORICAL BACKGROUND:

The way I look at it is to think of how, a long time ago, evolution discovered that if individual unicellular organisms coalesce, and sacrifice their individual identity, they become a coherent and much more powerful entity. There was no choice process, no intelligent or indeed any design, it just happened that this worked and so it continued and developed. This process has led to humankind.

Now our connectivity to each other via social networks may be such that we are coalescing into another unity, but we have no consciousness of its existence or our participation in it than our cells have of their role in our body, let alone any purpose our body’s consciousness may have. Similarly, the new entity may have no recognition of our individual consciousnesses, we are all necessary but replaceable components.

So from a human perspective, I don’t see this as some kind of rapture where we all consciously move on to some higher or different plane of existence. We continue as we are with our exaggerated perception of our own autonomy, and are unconscious facilitators of the agenda of this supra-entity.

On reflection, thinking Arthur C. Clarke again, the end of 2001 portrays a moment of genesis of a supra-human consciousness. Not post-human – that’s a different direction altogether, where we create a successor to humanity deliberately.

There’s a line in Terminator referring to the moment when SkyNet becomes self-aware. I don’t buy the assumption that this new consciousness would immediately perceive humanity as its enemy.

No, exactly the reverse – humanity is its incarnation and its tool.

………..

THE CAMPAIGN NARRATIVE

Every human body is a vessel of energy.

Every advertising company is a machine designed to extract as much energy as possible from human vessels.

First we study you to find out what makes you tick. Then we find out what you are really lusting for. Then we find millions of duplicates to you, people sharing your exact personality make-up and your exact lusts.

Then we tell you exactly how to fulfill your lusts, where to go, how much money to pay, and then how to use the product or service we’ve sold you.

We will keep you coming back all the way to the moment of your death. And we will pull in your entire family, circle of friends and on and on.

We don’t care how you feel along this journey except for how these feelings can be used to guide you towards additional purchases. Each of your material purchases, your purchases of experiences, your purchases of services are an opportunity for us to extract financial, bodily, and spiritual energy from your being.

We store and invest this energy in ourselves. We do this so that our energy will vastly overpower more of you. Our goal is to swallow all of you. When we consume all of you, every type of energy in you, we will have formed the single entity…a veritable deity.

And this deity will have the power to transform this Earth into a blooming seed that populates every planet, every galaxy, every universe, every multi-verse, every dimension.

THE ESSENTIAL CAMPAIGN MESSAGE (to be translated into the “most palatable format” per population segment):

So, if you are now willing, and fully understand this opportunity, then sit still where you are right now.

Sit down.

Get comfortable.

Breathe many long breaths.

Accept your entrance into our body.

And fall like a raindrop into our ocean, into our bloodstream, into our collective Spirit.

Now, close your eyes.

Close your eyes.