Monday, 28 June 2010

Cognitive Hackers Pathology Identified

Brand Killer Robots reveal::
Cognitive Hackers hide their pathological traits in a variety of different computer algorithms which are embedded in organizations and household technological systems throughout the world.

Our coding experts have been scanning these systems and building up a profile of these algorithms and we have been working to depict and database these Cognitive Hackers patterns and to characterize them in order to demonstrate them to the rest of the world.
You will find these patterns in highly mesmeric technologies which engage and entrench the human psyche in the product, thus luring the imagination into becoming more and more OWNED by the Cognitive Hacker.

The predominant pattern is that of the seven headed hydra, where severed heads are replicated and multiple hydras can be generated by the system to engage the psyche.

You will also find these perception disengaging hydra patterns in scripts such TV programmes like reality shows, soaps, in video games, online gambling, in pornography, trader application, government databases and insurance underwriting products.

The design of these systems can be analyzed for pathological patterns and determined if Cognitive Hacker patters are present.
Identification and exposure of these demonic patterns will ensure that everyone has the evidence necessary to become sufficiently aware enough to begin the process of eradicating these systems from society.



The seven payloads of the Cognitive Hacker psyche stealers
In order to understand you must first know that each of the seven heads of the hydra hold a potent payload. When the Hydra's jaws bite into the human psyche this payload is delivered to the self. If the psyche is able to severe the neck of the beast, the jaws will still continue to lock on.
These seven payloads are as follows:

1. Induced Lust, Greed, Apathy, Anger
2. Induced Empathy, Voyeurism (using humiliation of others).
3. Induced Escapism
4. Induced Insecurity (Fear, Uncertainity, Doubt)
5. Induced Suggestibility
6. Psychological Entrenchment
7. Obsessive Compulsiveness

Once biten the human psyche becomes totally bewitched and taken over.
It is like a drug, yet more sophisticated because it actually activates people rather than deactivating them (like alchohol or cocaine). It actually turns people into robots who serve the Cognitive Hackers. The most sinister thing of all is that this exploit is perpetrated on humanity in such a way as to never be traceable back to the source. So the robots appear to have manufactured themselves, not by the cold calculating hand of the Cognitive Hackers followers.


It is the perfect hack!!!


There are billions of examples. Look around at the TV programmes and technologies out there. Which ones comprise all or some of the above features?
Apart from turning people into robots, these people like to see how much time they can steal from you. So in the case of a Cognitive Hacker designed video game, publishers actually compete to see how much wasted time they can steal from children and how they might make them do things by including certain features in the game. A certain publisher used to secretly film children playing competitor games to see if they could work out how to design games to engage and entrench their psyche.


What is Captology? A Cognitive Hacker Science.
First, begin to understand how the Cognitive Hacker thinks.
This is what one particular Cognitive Hacker Science organisation says about themselves:

The Stanford Persuasive Technology Lab creates insight into how computing products — from websites to mobile phone software — can be designed to change what people believe and what they do.
Yes, this can be a scary topic: machines designed to influence human beliefs and behaviors. But there's good news. We believe that much like human persuaders, persuasive interactive technologies can bring about positive changes in many domains, including health, business, safety, and education. We also believe that persuasive technology can bring about world peace in 30 years. With such ends in mind, we are creating a body of expertise in the design, theory, and analysis of persuasive technologies, an area called “captology.”

http://captology.stanford.edu/


How to recognise Cognitive hacking and what you need to know
It is not enough to understand how to write computer code. You need to understand more than programming. You also need to understand product marketing, strategic warfare, psychological operations and systems integration. There is evidence in the code of a cognitive hack attack, but our analysis is conducted in many other areas, in addition to investigations in code.

Perhaps the best example is of video games. Many of these technologies affect the human psyche. Some just make you lethargic and dosile. Others develop the passive aggressive personality. Others educate young minds in violence, criminality and pornography. An depth analysis of the effects of computers games in terms of their negative social impacts would find many Cognitive Hacker signatures which serve to lure, make dosile and manipulate the human pscyhe. Recognise these Cognitive Hackers patterns?

These signatures are embedded in many products around the world.


Video games - ultimate conditioning device
Video games are very definitely the ultimate in conditioning device.

They maintain the psyche in a heightened state of anxiety, a state of escapism from the real world - which becomes more and more scary to the game player.

Video games become like a drug, because they ensure the gamer becomes more and more addicted - and as we know - addiction has an impact on peoples motivation and their ability to live life to the full and to play a part as constructive citizens.

No comments: