SUMMARY: The following actions succinctly outline our process with our clients as of mid 2021. We have reached a time in history where altering events and the experience of individuals is a reality. Our work is commensurate with this capability and we seek to evolve this capability, along with others, to its “zenith”.
To quote from an Economist article:
“This is the sort of idea that leads thinkers like Yuval Harari, an Israeli historian, to suggest that ever more capable information technology means that not just free-market economics but also liberal democracy might “become obsolete” over the coming century. He argues this is particularly likely if information technology is partnered with biotechnology, allowing its algorithms to access and act on human thought. This does not necessarily have to entail tyranny. It might mean something even stranger.
On some of their adventures Star Trek’s various starships encounter the Borg, a “more-than-species” which uses nanotechnology and computers to assimilate all those whom it encounters into its own collective. Its members all hear what each hears, all see what each sees, all will what each wills: there are no individuals; there are no aims but those of the collective. The demands of television drama mean that the Borg’s shared will may be represented by a leader—a queen for the spacefaring ant hill. The logic of the idea says otherwise, suggesting a truly equal, truly efficient hive that might persist with neither central control nor overt oppression, optimised only for assimilation.”
CONVERSATION MINING & ANALYSIS…scrape, mine and aggregate (using social media monitoring solutions) billions upon billions of publicly posted conversation snippets from social media, comment threads and other publicly available forums on the Internet. This is important because we gain the actual conversations living humans are having with one another online, going back over a decade now…and sometimes even further. Although the intent and authenticity of many conversation snippets must be delved into, there are a very large percentage of conversation snippets expressing actual human opinions, emotions, and intentions. These conversation snippets can be analyzed and insights can be found through such analysis. Brandwatch, Meltwater, and Synthesio are leading solutions for aggregating conversations.
DATA ENRICHMENT….then enrich (via data-enrichment APIs) ALL of the social handles of those participating in these conversations with personally identifiable information. This is important because we gain a fuller dossier on each individual, thereby gaining a fuller understanding of him/her and, importantly, his/her network/relationships….discover (via network analysis solutions) how every individual is warmly connected to every other individual. This is important because we can seed ideas along existing “warm” paths of relationship. PIPL, Full Contact API, People Data Labs, and Spiderfoot HX are leading solutions for enriching social handles and the emails associated with a specific social media account. A solution called Relationship Science reveals how “Jane” can meet “Dick” via a path of warm introductions.
PERSONALITY ASSESSMENT….then (via text-to-personality solutions) enter every statement made publicly by an individual and know their personality type (on every type of personality scale). This is important because messaging, advertising, and all sorts of tactics can be crafted based upon an individual’s personality type…and I do include here, yet again, that MANY personality assessment solutions are utilized here in order to gain accuracy. Crystal Knows, (created by Drew D’Agostino and Greg Skloot), and the uClassify system, (invented by Jon Kågström), are both excellent solutions for analysis of personality based upon text and bios.
SOCIAL ENGINEERING…then (via tried-and-true social engineering tactics) engineer situations based upon all of the above data. This means that we can now, using the above insights and data, craft just about any type of outcome we want and then work a network of individuals to achieve this outcome. This takes planning and, in particular, the skillset of charting out algorithms (I mean on large white boards with erasable markers). This takes teamwork and a team of different types of minds so that flaws in the plan can be ferreted out. This takes days, weeks, months and even years to eek out…from lived experience, it can take years to realize one’s goals when performing social engineering. Patience and tenacity are key. The manual “Social Engineering: The Art of Human Hacking” by Christopher Hadnagy, along with a great library of other Red and Blue team penetration testing manuals, and books on influence, such as Robert Caldini’s classic.
EVENT ALTERATION….then (via tried-and-true social engineering tactics) alter planned future events based upon all of the above data. Let us say an event is publicly planned. We can alter who attends this event by altering what is happening in their personal lives. We can do this by planting seeds in the minds of those surrounding an individual who is a key player in a specific event. We know who to plant such seeds into and how due to the deep insights from our dossier work mentioned earlier. As an example, when a person alters his/her plans, this often has a ripple effect in a community of people who trust this person. This is what I mean by altering events using data from social networks and from conversation snippets. I discuss this capability at mins 22:49 on this video presentation: https://www.youtube.com/watch?v=a62XTMufWQI
IDEA SEEDING…then (via tried-and-true social engineering tactics) seed ideas into the minds of others. As just mentioned, we can, using our knowledge of who is warmly connected to each person, plant seeds into the right minds. We know, based on personality analysis and conversation analysis, what this person typically does as a result of specific ideas taking root in their minds. This is important because all change begins in the realm of thought…and even earlier, in the “etheric” or “imaginal” realm. Seed ideas into the right people in a network and the entire network will eventually be affected.
FINE TUNING.…then (via a multitude of metrics solutions AND human analysis) track the growth of these seeds. This is important because change inevitable and we must be prepared to finesse, alter, and fine-tune our approach.
“AT-WILL” TIMELINE CREATION….create timelines at will (based on evidence) using all of the above tactics, translating the digital activity into flesh situations. This is important because we want to track how a specific sequence of seeded ideas will play out in the minds and in the lives of those affected. We also want to “hack” or provide out clients the ability to “jump” timelines. One of the best resources on “jumping timelines” is “The Art of Jumping Timelines” by Tom Kenyon. This important skill affords its participant the ability to move in and out of different situations, and alter these situations, in an efficient manner. In this amazing resource, Kenyon outlines the five stages of timeline jumping:
“The fundamental principle, for jumping timelines, involves the coordination of a few significant fields of intentionality.
1) You identify the timeline you wish to move into.
2) You shift your vibrational state to match the timeline.
3) You lock in the vibrational state so it does not waver.
4) You take an action that is an expression of the new timeline.
In this fifth stage, you must hold the vibrational state of the new timeline you have chosen, making choices coherent with the new timeline and persevering with this despite sensory information to the contrary.
This last phase of perseverance is important, because your current timeline is an accumulation of your beliefs and intentions. Depending upon the strength of these beliefs and intentions, you may have to accumulate a vast amount of energy in order to overcome the set pattern of your life.”
CONTROLLING FLESH VIA THE DIGITAL….remember, flesh follows amnesia AND passions fomented within the digital. This is important because the Internet and the use of texting/social messaging has (on a mass scale) replaced walking up to someone’s doorstep to have a conversation. This is important because one can directly influence changes in the world of flesh using the digital. Two hundred years ago, this ability and the tools we use would have been called witchcraft. Nowadays, it’s called marketing and public relations. The veil between the digital sphere and the “etheric field” is thin…one speaks to the other nowadays, especially under practiced fingers.