CultState| You are more than your identity
Gnostic Warfare is a holistic analysis of attack vectors focused on compromising the common elements shared between multiple modes of cognition. Psychological operations target human biases, but cognitive operations target shared traits between human, machine, animal, neural, and hybrid methodologies of cognitive, approximate cognition, and anti-cognition. Butterfly War is an example of a cognitive operation, Its battlespace is defined not only by the psychological and ideological biases of the human operators and owners of an AI platform, but also by the epistemological limitations of the AI platform itself.
Elements of Butterfly War have since been experimented upon and understood by many actors, both state and non-state. To help people understand how to execute and improve upon such campaigns themselves, they will need to study the relationships between information entropy, evolutionary psychology, and the mechanics of cognitive equilibrium. These are not simple concepts by themselves and they are even more difficult to bring together. That’s why I’ve begun a training and outreach operation to help answer the many questions Butterfly War has unleashed. Milanote is a fantastic brainstorming app and I highly recommend it. Over time, as people build their own Milanote boards, we can connect them all together and form an ecosystem dedicated to Gnostic Warfare.
To ensure these materials persist, the Milanote boards have been exported as PDFs and Mardown files and will be placed on IPFS.
This script will help get people started in Gnostic Warfare by allowing them to see reality the same way machine learning does.
You can review the source code here.
Regarding the SHA512 hash from my New Emotion post, I am going back on my word and will not be revealing its contents. That SHA512 will have an impact on a midterm election that I do not wish to interfere with. I will reveal its contents at a later date.
The Butterfly War described the concept of cyber phrenology and detailed how make automated censorship platforms target unintended targets.
Here’s the most comprehensive timeline of contributing factors for the idea:
When I initially chronicled these events, I had done so via an impromptu AMA on 8chan that has been active for almost four months. The community’s response yieled an extremely unexpected outcome. The curiousity, interplay, and revelations were genuine enough to make me start organizing my efforts in a more formal and accessible way. Ever since I started The Abusive Oracle, I’ve left hidden and complicated clues everywhere to protect myself and to send signals to certain types of personalities. After everything that has been going on, I beleive the world just might finally be ready to tackle the problem of the new emotion and what it means for national security, domestic affairs, economic arrangements, and human destiny.
If all goes as planed, next week will bring this act of the story to an end. To verify my involvement in that upcoming event, this SHA-512 was generated based on a sentence involving the names and actions of the event that will take place. I injected a newline after every 32 characters to improve readability on mobile devices:
By Friday of next week, I will release the sentence used to generate the hash above. I used the following command on a Debian-flavor of Linux:
echo "<my hidden message to reveal next friday" | sha512sum
UPDATE: I had begun writing this on Janurary 10th, 2018 and the date mispublished. I’ve since updated the date and URL to reflect the date the article was actaully released. (Thanks @eli_schiff)
In the Butterfly War, I detail how Silicon Valley uses cyber phrenology to violate civil rights legislation.
In The Ravens Will Starve, I detail how the Chans have begun to utilize cyber phrenology tactics to show that metadata can be used to violate civil rights.
Last month, Chamath Palihapitiya, Facebook’s former vice president, was asked at a Stanford Graduate School of Business event about digital companies exploiting consumer behavior. The New York Post revealed his response and I’d like to draw attention to a specific statement:
This is the only snippet where Mr. Palihapitiya admits the technical details behind Facebook’s abuses. The rest is an artful attempt to deflect additional blame onto its users, as if Facebook was just a hapless witness to animistic human nature. Regardless of the dodge, he is admitting Facebook intentionally utilized psychological, sociological, and, most importantly of all, phrenological techniques to maximize advertising exposure. In a critical phrenological example, Facebook allowed advertisers to exclude ad exposure by race. This means Facebook has assembled a detailed list of behaviors associated with black people so as to control their ad exposure. This type of behavior tracking is the very essence of cyber phrenology and it is a core part of the effort to ensure the “short-term dopamine-driven feedback loops“ Mr. Palihapitiya regrets.
The smoking gun is in and now we have a few people putting the pieces together. Over at r/The_Donald, a screenshot of a 8chan comment explaining how Facebook civil rights violations can affect the California 2018 primaries is gaining traction.
Here’s the screenshot for posterity:
Because of the legal precedents set by redlining, a case could be made that Facebook intentionally created an environment where the civil rights of blacks were violated due to their increased exposed to predatory ads or being intentionally denied ads, specifically of financial products that could lead to disparate impact suits. If this is true, the impact Silicon Valley has on politics would be in serious trouble as civil rights violations typically result in federal government involvement. If conducted intelligently, this type of play could result in significant Republican wins in the California 2018 primaries and beyond.
It’s a powerful idea in a political world where the old rules are no longer reliable. If a deep red state can go blue, couldn’t a deep blue state go red?