Tag Archives: digital advertising

what’s goin’ on

what’s goin’ on

We are in the post-constitutional era in the United States, a time when the government does whatever it wants to whomever it wants, and there is not a thing anyone can do about it.

How it is possibe that the president can bomb a foreign country or threaten a full-scale international war without so much as even mentioning the need for Congress to chime in, let alone actually vote on a declaration of war?

The short answer is, disinformation and propaganda, which is the domain of mainstream media. When people are confused, when truth is hidden, when agendas are presented as life or death options, and when the public has no clue about which laws government is bound to, then anything goes.

Regarding disinformation, the following list of 25 rules of disinformation is from Twenty-Five Ways To Suppress Truth: The Rules of Disinformation (Includes The 8 Traits of A Disinformationalist) by H. Michael Sweeney, and offers a comprehensive way of processing information in a time of universal deceit.

READ: 11 Tactics Used by the Mainstream Media to Manufacture Consent for the Oligarchy

http://www.wakingtimes.com/2017/04/17/25-rules-disinformation/

 

[&&]{**}[##]

forewarded by a correspondent

for your review

Happy reading: caveat lector

 

Silent Weapons for Quiet Wars

An Introduction Programming Manual

Operations Research Technical Manual
TW-SW7905.1

The following document is taken from two sources. The first, was acquired on a website (of which I can’t remember the address) listing as its source the book titled Behold A Pale Horse by William Cooper; Light Technology Publishing, 1991. The second source is a crudely copied booklet which does not contain a copyright notice, or a publishers name. With the exception of the Forward, the Preface, the main thing that was missing from the first source was the illustrations. As we began comparing the two, we realized that the illustrations, and the accompanying text (also missing from the first) made up a significant part of the document. This has now been restored by The Lawful Path, and so far as I know, is the only internet copy available complete with the illustrations.

We have no first-hand knowledge that this document is genuine, however many of the concepts contained herein are certainly reasonable, important, and bear strong consideration.

If anyone has additional knowledge about the source of this document; has better copies of the illustrations than the ones posted here; has any missing pieces to this document, or has any comments which can improve upon the quality of this document, we will appreciate your comments.

The Lawful Path http://www.lawfulpath.com

Foreword

This manuscript was delivered to our offices by an unknown person. We did not steal the document, nor are we involved with any theft from the United States Government, and we did not get the document by way of any dishonest methods. We feel that we are not endangering the “National Security” by reproducing this document, quite the contrary; it has been authenticated and we feel that we are not only within our rights to publish it, but morally bound to do so.

Regarding the training manual, you may have detected that we had to block out the marginal notes made by the selectee at the C.I.A. Training Center, but I can assure you that the manual is authentic, and was printed for the purpose of introducing the selectee to the conspiracy. It has been authenticated by four different technical writers for Military Intelligence, one just recently retired who wants very much to have this manual distributed throughout the world, and one who is still employed as an Electronics Engineer by the Federal Government, and has access to the entire series of Training Manuals. One was stationed in Hawaii, and held the highest security clearance in the Naval Intelligence, and another who is now teaching at a university, and has been working with the Central Intelligence Agency for a number of years, and wants out before the axe falls on the conspirators.

We believed that the entire world should know about this plan, so we distributed internationally one-hundred of these manuscripts, to ask individuals at top level positions their opinions. The consensus opinion was to distribute this to as many people as who wanted it, to the end that they would not only understand that “War” had been declared against them, but would be able to properly identify the true enemy to Humanity.

Delamer Duverus

Preface

Conspiracy theories are nothing new to history. Plots to “kill Caesar” and overthrow Rome abounded, for instance. however, it is seldom that concrete clues to such plots come to light, and are generally known.

Silent Weapons for Quiet Wars, An Introduction Programming Manual was uncovered quite by accident on July 7, 1986 when an employee of Boeing Aircraft Co. purchased a surplus IBM copier for scrap parts at a sale, and discovered inside details of a plan, hatched in the embryonic days of the “Cold War” which called for control of the masses through manipulation of industry, peoples’ pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public’s attention from what is really going on.

The document you are about to read is real. It is reprinted in its virgin form, with diagrams, as a touch of reality.

Table of Contents

•Foreword

•Preface

•Security

•Historical Introduction

•Political Introduction

•Energy

•Descriptive Introduction of the Silent Weapon

•Theoretical Introduction

•General Energy Concepts

•Mr. Rothschild’s Energy Discovery

•Apparent Capital as “Paper Inductor

•Breakthrough

•Application in Economics

•The Economic Model

•Industrial Diagrams

•Three Industrial Classes

•Aggregation

•The E-model

•Economic Inductance

•Inductive Factors to Consider

•Translation

•Time Flow Relationships and Self-destructive Oscillations

•Industry Equivalent Circuits

•Stages of Schematic Simplification

•Generalization

•Final Bill of Goods

•The Technical Coefficients

•The Household Industry

•Household Models

•Economic Shock Testing

•Introduction to the Theory of Shock Testing

•Example of Shock Testing

•Introduction to Economic Amplifiers

•Short List of Inputs

•Short List of Outputs

•Table of Strategies

•Diversion, the Primary Strategy

•Diversion Summary

•Consent, the Primary Victory

•Amplification Energy Sources

•Logistics

•The Artificial Womb

•The Political Structure of a Nation – Dependency

•Action/Offense

•Responsibility

•Summary

•System Analysis

•The Draft

•Enforcement

The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.

TOP SECRET

Silent Weapons for Quiet Wars

Operations Research Technical Manual TM-SW7905.1

Welcome Aboard

This publication marks the 25th anniversary of the Third World War, called the “Quiet War”, being conducted using subjective biological warfare, fought with “silent weapons.”

This book contains an introductory description of this war, its strategies, and its weaponry.

May 1979 #74-1120

Security

It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.

This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodologies for economic conquest – it must be understood that a state of domestic warfare exists between said person or group of persons and the public.

The solution of today’s problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values.

You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without the loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.

Historical Introduction

Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the Military Management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).

It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.

Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high-speed computerized data-processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.

Relay computers were to slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly, filled the bill.

The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician George B. Dantzig.

Then in 1948, the transistor, invented by J. Bardeen, W.H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.

With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.

Immediately, the Rockefeller Foundation got in on the ground floor by making a four-year grant to Harvard College, funding the Harvard Economic Research Project for the study of the structure of the American Economy. One year later, in 1949, The United States Air Force joined in.

In 1952 the grant period terminated, and a high-level meeting of the Elite was held to determine the next phase of social operations research. The Harvard project had been very fruitful, as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering. (Studies in the Structure of the American Economy – copyright 1953 by Wassily Leontief, International Science Press Inc., White Plains, New York).

Engineered in the last half of the decade of the 1940’s, the new Quiet War machine stood, so to speak, in sparkling gold-plated hardware on the showroom floor by 1954.

With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power was a possibility only decades away.

The combination was irresistible.

The Quiet War was quietly declared by the International Elite at a meeting held in 1954.

Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon-system has never suffered any major setbacks.

This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.

Political Introduction

In 1954 it was well recognized by those in positions of authority that it was only a matter of time, only a few decades, before the general public would be able to grasp and upset the cradle of power, for the very elements of the new silent-weapon technology were as accessible for a public utopia as they were for providing a private utopia.

The issue of primary concern, that of dominance, revolved around the subject of the energy sciences.

Energy

Energy is recognized as the key to all activity on earth. Natural science is the study of the sources and control of natural energy, and social science, theoretically expressed as economics, is the study of the sources and control of social energy. Both are bookkeeping systems: mathematics. Therefore, mathematics is the primary energy science. And the bookkeeper can be king if the public can be kept ignorant of the methodology of the bookkeeping.

All science is merely a means to an end. The means is knowledge. The end is control. Beyond this remains only one issue: Who will be the beneficiary?

In 1954 this was the issue of primary concern. Although the so-called “moral issues” were raised, in view of the law of natural selection it was agreed that a nation or world of people who will not use their intelligence are no better than animals who do not have intelligence. Such people are beasts of burden and steaks on the table by choice and consent.

Consequently, in the interest of future world order, peace, and tranquillity, it was decided to privately wage a quiet war against the American public with an ultimate objective of permanently shifting the natural and social energy (wealth) of the undisciplined and irresponsible many into the hands of the self-disciplined, responsible, and worthy few.

In order to implement this objective, it was necessary to create, secure, and apply new weapons which, as it turned out, were a class of weapons so subtle and sophisticated in their principle of operation and public appearance as to earn for themselves the name “silent weapons.”

In conclusion, the objective of economic research, as conducted by the magnates of capital (banking) and the industries of commodities (goods) and services, is the establishment of an economy which is totally predictable and manipulatable.

In order to achieve a totally predictable economy, the low-class elements of society must be brought under total control, i.e., must be housebroken, trained, and assigned a yoke and long-term social duties from a very early age, before they have an opportunity to question the propriety of the matter. In order to achieve such conformity, the lower-class family unit must be disintegrated by a process of increasing preoccupation of the parents and the establishment of government-operated day-care centers for the occupationally orphaned children.

The quality of education given to the lower class must be of the poorest sort, so that the moat of ignorance isolating the inferior class from the superior class is and remains incomprehensible to the inferior class. With such an initial handicap, even bright lower class individuals have little if any hope of extricating themselves from their assigned lot in life. This form of slavery is essential to maintain some measure of social order, peace, and tranquillity for the ruling upper class.

Descriptive Introduction of the Silent Weapon

Everything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in its own manner of functioning.

It shoots situations, instead of bullets; propelled by data processing, instead of chemical reaction (explosion); originating from bits of data, instead of grains of gunpowder; from a computer, instead of a gun; operated by a computer programmer, instead of a marksman; under the orders of a banking magnate, instead of a military general.

It makes no obvious explosive noises, causes no obvious physical or mental injuries, and does not obviously interfere with anyone’s daily social life.

Yet it makes an unmistakable “noise,” causes unmistakable physical and mental damage, and unmistakably interferes with the daily social life, i.e., unmistakable to a trained observer, one who knows what to look for.

The public cannot comprehend this weapon, and therefore cannot believe that they are being attacked and subdued by a weapon.

The public might instinctively feel that something is wrong, but that is because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence. Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it.

When a silent weapon is applied gradually, the public adjusts/adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.

Therefore, the silent weapon is a type of biological warfare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.

Theoretical Introduction

Give me control over a nation’s currency, and I care not who makes its laws.

— Mayer Amschel Rothschild, 1743 – 1812)

Today’s silent weapons technology is an outgrowth of a simple idea discovered, succinctly expressed, and effectively applied by the quoted Mr. Mayer Amschel Rothschild. Mr. Rothschild discovered the missing passive component of economic theory known as economic inductance. He, of course, did not think of his discovery in these 20th-century terms, and, to be sure, mathematical analysis had to wait for the Second Industrial Revolution, the rise of the theory of mechanics and electronics, and finally, the invention of the electronic computer before it could be effectively applied in the control of the world economy.

General Energy Concepts

In the study of energy systems, there always appears three elementary concepts. These are potential energy, kinetic energy, and energy dissipation. And corresponding to these concepts, there are three idealized, essentially pure physical counterparts called passive components.

1In the science of physical mechanics, the phenomenon of potential energy is associated with a physical property called elasticity or stiffness, and can be represented by a stretched spring. In electronic science, potential energy is stored in a capacitor instead of a spring. This property is called capacitance instead of elasticity or stiffness.

2In the science of physical mechanics, the phenomenon of kinetic energy is associated with a physical property called inertia or mass, and can be represented by a mass or a flywheel in motion. In electronic science, kinetic energy is stored in an inductor (in a magnetic field) instead of a mass. This property is called inductance instead of inertia.

3In the science of physical mechanics, the phenomenon of energy dissipation is associated with a physical property called friction or resistance, and can be represented by a dashpot or other device which converts energy into heat. In electronic science, dissipation of energy is performed by an element called either a resistor or a conductor, the term “resistor” being the one generally used to describe a more ideal device (e.g., wire) employed to convey electronic energy efficiently from one location to another. The property of a resistance or conductor is measured as either resistance or conductance reciprocals.

In economics these three energy concepts are associated with:

1Economic Capacitance – Capital (money, stock/inventory, investments in buildings and durables, etc.)

2Economic Conductance – Goods (production flow coefficients)

3Economic Inductance – Services (the influence of the population of industry on output)

All of the mathematical theory developed in the study of one energy system (e.g., mechanics, electronics, etc.) can be immediately applied in the study of any other energy system (e.g., economics).

Mr. Rothchild’s Energy Discovery

What Mr. Rothschild had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is “when you assume the appearance of power, people soon give it to you.”

Mr. Rothschild had discovered that currency or deposit loan accounts had the required appearance of power that could be used to induce people (inductance, with people corresponding to a magnetic field) into surrendering their real wealth in exchange for a promise of greater wealth (instead of real compensation). They would put up real collateral in exchange for a loan of promissory notes. Mr. Rothschild found that he could issue more notes than he had backing for, so long as he had someone’s stock of gold as a persuader to show his customers.

Mr. Rothschild loaned his promissory notes to individual and to governments. These would create overconfidence. Then he would make money scarce, tighten control of the system, and collect the collateral through the obligation of contracts. The cycle was then repeated. These pressures could be used to ignite a war. Then he would control the availability of currency to determine who would win the war. That government which agreed to give him control of its economic system got his support.

Collection of debts was guaranteed by economic aid to the enemy of the debtor. The profit derived from this economic methodology mad Mr. Rothschild all the more able to expand his wealth. He found that the public greed would allow currency to be printed by government order beyond the limits (inflation) of backing in precious metal or the production of goods and services.

Apparent Capital as “Paper” Inductor

In this structure, credit, presented as a pure element called “currency,” has the appearance of capital, but is in effect negative capital. Hence, it has the appearance of service, but is in fact, indebtedness or debt. It is therefore an economic inductance instead of an economic capacitance, and if balanced in no other way, will be balanced by the negation of population (war, genocide). The total goods and services represent real capital called the gross national product, and currency may be printed up to this level and still represent economic capacitance; but currency printed beyond this level is subtractive, represents the introduction of economic inductance, and constitutes notes of indebtedness.

War is therefore the balancing of the system by killing the true creditors (the public which we have taught to exchange true value for inflated currency) and falling back on whatever is left of the resources of nature and regeneration of those resources.

Mr. Rothschild had discovered that currency gave him the power to rearrange the economic structure to his own advantage, to shift economic inductance to those economic positions which would encourage the greatest economic instability and oscillation.

The final key to economic control had to wait until there was sufficient data and high-speed computing equipment to keep close watch on the economic oscillations created by price shocking and excess paper energy credits – paper inductance/inflation.

Breakthrough

The aviation field provided the greatest evolution in economic engineering by way of the mathematical theory of shock testing. In this process, a projectile is fired from an airframe on the ground and the impulse of the recoil is monitored by vibration transducers connected to the airframe and wired to chart recorders.

By studying the echoes or reflections of the recoil impulse in the airframe, it is possible to discover critical vibrations in the structure of the airframe which either vibrations of the engine or aeolian vibrations of the wings, or a combination of the two, might reinforce resulting in a resonant self-destruction of the airframe in flight as an aircraft. From the standpoint of engineering, this means that the strengths and weaknesses of the structure of the airframe in terms of vibrational energy can be discovered and manipulated.

Application in Economics

To use this method of airframe shock testing in economic engineering, the prices of commodities are shocked, and the public consumer reaction is monitored. The resulting echoes of the economic shock are interpreted theoretically by computers and the psycho-economic structure of the economy is thus discovered. It is by this process that partial differential and difference matrices are discovered that define the family household and make possible its evaluation as an economic industry (dissipative consumer structure).

Then the response of the household to future shocks can be predicted and manipulated, and society becomes a well-regulated animal with its reins under the control of a sophisticated computer-regulated social energy bookkeeping system.

Eventually every individual element of the structure comes under computer control through a knowledge of personal preferences, such knowledge guaranteed by computer association of consumer preferences (universal product code, UPC; zebra-striped pricing codes on packages) with identified consumers (identified via association with the use of a credit card and later a permanent “tattooed” body number invisible under normal ambient illumination).

Summary

Economics is only a social extension of a natural energy system. It, also, has its three passive components. Because of the distribution of wealth and the lack of communication and lack of data, this field has been the last energy field for which a knowledge of these three passive components has been developed.

Since energy is the key to all activity on the face of the earth, it follows that in order to attain a monopoly of energy, raw materials, goods, and services and to establixh a world system of slave labor, it is necessary to have a first strike capability in the field of economics. In order to maintain our position, it is necessary that we have absolute first knowledge of the science of control over all economic factors and the first experience at engineering the world economy.

In order to achieve such sovereignty, we must at least achieve this one end: that the public will not make either the logical or mathematical connection between economics and the other energy sciences or learn to apply such knowledge.

This is becoming increasingly difficult to control because more and more businesses are making demands upon their computer programmers to create and apply mathematical models for the management of those businesses.

It is only a matter of time before the new breed of private programmer/economists will catch on to the far reaching implications of the work begun at Harvard in 1948. The speed with which they can communicate their warning to the public will largely depend upon how effective we have been at controlling the media, subverting education, and keeping the public distracted with matters of no real importance.

The Economic Model

Economics, as a social energy science has as a first objective the description of the complex way in which any given unit of resources is used to satisfy some economic want. (Leontief Matrix). This first objective, when it is extended to get the most product from the least or limited resources, comprises that objective of general military and industrial logistics known as Operations Research. (See simplex method of linear programming.)

The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy: at first the American economy, and then the world economy. It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such has proven to be the case. Moreover, the economy has been transformed into a guided missile on target.

The immediate aim of the Harvard project was to discover the economic structure, what forces change that structure, how the behavior of the structure can be predicted, and how it can be manipulated. What was needed was a well-organized knowledge of the mathematical structures and interrelationships of investment, production, distribution, and consumption.

To make a short story of it all, it was discovered that an economy obeyed the same laws as electricity and that all of the mathematical theory and practical and computer know-how developed for the electronic field could be directly applied in the study of economics. This discovery was not openly declared, and its more subtle implications were and are kept a closely guarded secret, for example that in an economic model, human life is measured in dollars, and that the electric spark generated when opening a switch connected to an active inductor is mathematically analogous to the initiation of war.

The greatest hurdle which theoretical economists faced was the accurate description of the household as an industry. This is a challenge because consumer purchases are a matter of choice which in turn is influenced by income, price, and other economic factors.

This hurdle was cleared in an indirect and statistically approximate way by an application of shock testing to determine the current characteristics, called current technical coefficients, of a household industry

Finally, because problems in theoretical electronics can be translated very easily into problems of theoretical electronics, and the solution translated back again, it follows that only a book of language translation and concept definition needed to be written for economics. The remainder could be gotten from standard works on mathematics and electronics. This makes the publication of books on advanced economics unnecessary, and greatly simplifies project security.

[snip:  Here I have snipped out a major portion of the web page which can be read at the link below.]

The Draft (As military service)

Few efforts of human behavior modification are more remarkable or more effective than that of the socio-military institution known as the draft. A primary purpose of a draft or other such institution is to instill, by intimidation, in the young males of a society the uncritical conviction that the government is omnipotent. He is soon taught that a prayer is slow to reverse what a bullet can do in an instant. Thus, a man trained in a religious environment for eighteen years of his life can, by this instrument of the government, be broken down, be purged of his fantasies and delusions in a matter of mere months. Once that conviction is instilled, all else becomes easy to instill.

Even more interesting is the process by which a young man’s parents, who purportedly love him, can be induced to send him off to war to his death. Although the scope of this work will not allow this matter to be expanded in full detail, nevertheless, a coarse overview will be possible and can serve to reveal those factors which must be included in some numerical form in a computer analysis of social and war systems.

We begin with a tentative definition of the draft.

The draft (selective service, etc.) is an institution of compulsory collective sacrifice and slavery, devised by the middle-aged and elderly for the purpose of pressing the young into doing the public dirty work. It further serves to make the youth as guilty as the elders, thus making criticism of the elders by the youth less likely (Generational Stabilizer). It is marketed and and sold to the public under the label of “patriotic = national” service.

Once a candid economic definition of the draft is achieved, that definition is used to outline the boundaries of a structure called a Human Value System, which in turn is translated into the terms of game theory. The value of such a slave laborer is given in a Table of Human Values, a table broken down into categories by intellect, experience, post-service job demand, etc.

Some of these categories are ordinary and can be tentatively evaluated in terms of the value of certain jobs for which a known fee exists. Some jobs are harder to value because they are unique to the demands of social subversion, for an extreme example: the value of a mother’s instruction to her daughter, causing that daughter to put certain behavioral demands upon a future husband ten or fifteen years hence; thus, by suppressing his resistance to a perversion of a government, making it easier for a banking cartel to buy the State of New York in, say, twenty years.

Such a problem leans heavily upon the observations and data of wartime espionage and many types of psychological testing. But crude mathematical models (algorithms, etc.) can be devised, if not to predict, at least to predeterminate these events with maximum certainty. What does not exist by natural cooperation is thus enhanced by calculated compulsion. Human beings are machines, levers which may be grasped and turned, and there is little real difference between automating a society and automating a shoe factory.

These derived values are variable. (It is necessary to use a current Table of Human Values for computer analysis.) These values are given in true measure rather than U.S. dollars, since the latter is unstable, being presently inflated beyond the production of national goods and services so as to give the economy a false kinetic energy (“paper” inductance).

The silver value is stable, it being possible to buy the same amount with a gram of silver today as it could be bought in 1920. Human value measured in silver units changes slightly due to changes in production technology.

Enforcement

Factor I

As in every social system approach, stability is achieved only by understanding and accounting for human nature (action/reaction patterns). A failure to do so can be, and usually is, disastrous.

As in other human social schemes, one form or another of intimidation (or incentive) is essential to the success of the draft. Physical principles of action and reaction must be applied to both internal and external subsystems.

To secure the draft, individual brainwashing/programming and both the family unit and the peer group must be engaged and brought under control.

Factor II – Father

The man of the household must be housebroken to ensure that junior will grow up with the right social training and attitudes. The advertising media, etc., are engaged to see to it that father-to-be is pussy-whipped before or by the time he is married. He is taught that he either conforms to the social notch cut out for him or his sex life will be hobbled and his tender companionship will be zero. He is made to see that women demand security more than logical, principled, or honorable behavior.

By the time his son must go to war, father (with jelly for a backbone) will slam a gun into junior’s hand before father will risk the censure of his peers, or make a hypocrite of himself by crossing the investment he has in his own personal opinion or self-esteem. Junior will go to war or father will be embarrassed. So junior will go to war, the true purpose not withstanding.

Factor III – Mother

The female element of human society is ruled by emotion first and logic second. In the battle between logic and imagination, imagination always wins, fantasy prevails, maternal instinct dominates so that the child comes first and the future comes second. A woman with a newborn baby is too starry-eyed to see a wealthy man’s cannon fodder or a cheap source of slave labor. A woman must, however, be conditioned to accept the transition to “reality” when it comes, or sooner.

As the transition becomes more difficult to manage, the family unit must be carefully disintegrated, and state-controlled public education and state-operated child-care centers must be become more common and legally enforced so as to begin the detachment of the child from the mother and father at an earlier age. Inoculation of behavioral drugs [Ritalin] can speed the transition for the child (mandatory). Caution: A woman’s impulsive anger can override her fear. An irate woman’s power must never be underestimated, and her power over a pussy-whipped husband must likewise never be underestimated. It got women the vote in 1920.

Factor IV – Junior

The emotional pressure for self-preservation during the time of war and the self-serving attitude of the common herd that have an option to avoid the battlefield – if junior can be persuaded to go – is all of the pressure finally necessary to propel Johnny off to war. Their quiet blackmailings of him are the threats: “No sacrifice, no friends; no glory, no girlfriends.”

Factor V – Sister

And what about junior’s sister? She is given all the good things of life by her father, and taught to expect the same from her future husband regardless of the price.

Factor VI – Cattle

Those who will not use their brains are no better off than those who have no brains, and so this mindless school of jelly-fish, father, mother, son, and daughter, become useful beasts of burden or trainers of the same.

This concludes what is available of this document.

http://www.lawfulpath.com/ref/sw4qw/index.shtml 

[&&]{**}[##]

https://ssd.eff.org 

Tips, Tools and How-tos for Safer Online Communications 

Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF’s guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

Select an article from our index to learn about a tool or issue, or check out one of our playlists to take a guided tour through a new set of skills.

 

OVERVIEWS

Understanding the basics: What digital surveillance is, and how you can fight it.

 

TUTORIALS

Step-by-step guides to help you install and use handy software and tools.

 

BRIEFINGS

Detailed guides for specific situations.

 

An Introduction to Public Key Cryptography and PGP

Attending Protests (International)

Attending Protests (United States)

Choosing the VPN That’s Right for You

Communicating with Others

Facebook Groups: Reducing Risks

How Do I Protect Myself Against Malware?

Key Verification

Protecting Yourself on Social Networks

The Problem with Mobile Phones

Things to Consider When Crossing the US Border

 

[&&]{**}[##]

The Basic Attention Token is one of the most compelling projects in the Ethereum space right now, and if successful, would fundamentally change the way advertising works on the internet. The white paper released by Brave Software is a high-level description of the idea and why it’s important for the future of the internet. While the paper is light on Ethereum-specific details about the token mechanics, it still outlines the problems with the digital advertising ecosystem and presents a compelling case for a possible path forward built on top of the Ethereum blockchain.

Link to the White Paper underneath the video

http://phibetaiota.net/2017/04/yoda-breaking-googlegestapo-the-next-internet-basic-attention-token-brave-software-ethereum/ 

 

https://www.youtube.com/watch?v=pEP2jlV5qEo 

[&&]{**}[##]

Facebook announced that it assembled a team of 60 people to develop a technology allowing users to “think” commands and messages at their smartphones. The system would be able to literally read your mind … constantly. What could go wrong?

The people at Facebook are going down a path that can only be described as post-Orwellian. Not satisfied with the fact that their users willingly share their most intimate information on a daily basis, Facebook is looking to reshape the world and decipher thoughts that haven’t even been verbalized.

More here:

https://vigilantcitizen.com/latestnews/facebook-working-smartphone-can-read-thoughts/ 

https://en.wikipedia.org/wiki/Regina_E._Dugan 

[&&]{**}[##]

music:

https://www.youtube.com/watch?v=rveSPom1mLc 

[&&]{**}[##]

Of great interest and utility:  the new GDELT mapping API for creating point, ADM1 and country-level maps of the geography of global news coverage from nearly all countries worldwide in 65 languages over the last 24 hours, updating every 15 minutes.

The API, which is fully free and open, generates both instant embeddable browser-based interactive maps and GeoJSON optimized for use with platforms like Carto.

http://blog.gdeltproject.org/gdelt-geo-2-0-api-debuts/

Specify any keyword or phrase and search the English machine translations of all content monitored in those 65 languages, allowing you to search across languages. For each keyword, the system compiles a list of all locations (down to the resolution of a hilltop in many areas) that were found within a sentence or two of your keyword and constructs a map showing the locations mentioned most frequently in context with your search. You can also map specific languages, domains, by tone, etc.

Perhaps most uniquely, we are releasing a set of experimental maps that apply the deep learning image categorization we perform on global news imagery each day (more than a quarter billion images processed last year) and let you search by 10,000 labels of objects and activities depicted in the image, the OCR’d text in more than 80 languages depicted in the image, all of the text contained in the image file’s metadata fields, the textual caption of the image as it appeared in each article, and the result of a Google Images reverse search that compiles a list of all of the captions used for that image anywhere it was found on the open web and assigns several million topical labels.

As but one simple, but extremely powerful example – one of our research threads revolves around how violence is depicted across the world and the differing levels of normative baselines (for example, here in the US ISIS beheadings are typically shown with a “before” image or a heavily pixelated image, whereas in the presses of certain other countries the raw graphic image is frequently shown; similarly in the US we rarely see imagery of drowned refugees with the notable exception of Alan Kurdi, while the presses of other countries run graphic imagery of those who perish on a more frequent basis). Understanding how violence is depicted in the presses of the world and how those baselines are changing offers a lot of insight into the question of desensitization and the communication of crises.

The new API allows you to create such a map in just a few seconds and have it live update every 15 minutes – here is one such example map that displays up to five images from the domestic press of each country over the last 24 hours that were determined to potentially depict some sense of “violence” (click on each country to see the images from its local press). (WARNING: many of these images are very disturbing). While you will see some errors here and there, overall this gives a very visceral sense of the differences in depiction of violence throughout the world.

http://api.gdeltproject.org/api/v2/geo/geo?query=imagetag:%22safesearchviolence%22&mode=imagesourcecountry&format=imagehtml

Similarly, here is a map of rubble, destruction, flooding and fire that we are using in a series of forthcoming projects to ground truth the severity of natural disasters as they occur in realtime (note that this particular map below shows the imagery of damage FROM the press of that country, which may reflect events in other countries as well):

http://api.gdeltproject.org/api/v2/geo/geo?query=(imagetag:%22rubble%22%20OR%20imagetag:%22demolition%22%20OR%20imagetag:%22disaster%22%20OR%20imagetag:%22earthquake%22%20OR%20imagetag:%22flood%22%20OR%20imagetag:%22fire%22)&mode=imagesourcecountry&format=imagehtml

Looking at text, you can map a particular news outlet like AllAfrica:

http://api.gdeltproject.org/api/v2/geo/geo?query=domain:allafrica.com

Or source language like Chinese:

http://api.gdeltproject.org/api/v2/geo/geo?query=sourcelang:chinese

Or the phrase “Donald Trump”, aggregated to the country level:

http://api.gdeltproject.org/api/v2/geo/geo?query=%22donald%20trump%22&mode=country

You can find many more examples, along with full documentation on the announcement this morning:

http://blog.gdeltproject.org/gdelt-geo-2-0-api-debuts/

Feel free to email me directly with any questions! We are super excited to see what you all are able to do with these new capabilities! And stay tuned for our temporal API being released in a few weeks!

Kalev

http://blog.gdeltproject.org

http://kalevleetaru.com/

[&&]{**}[##]

 

https://blogs-images.forbes.com/kalevleetaru/files/2016/01/news-geography-2015-total-footprint-1200×600.jpg?width=960 

https://www.forbes.com/sites/kalevleetaru/2016/01/08/mapping-the-geography-of-2015-through-massive-news-mining/#526be3ed3a3b 

[##]

http://blog.gdeltproject.org/page/10/ 

[##]

https://www.theatlantic.com/international/archive/2013/11/how-three-decades-of-news-coverage-has-shaped-our-view-of-the-world/281613/