| You are more than your identity

Gnostic Warfare is a holistic analysis of attack vectors focused on compromising the common elements shared between multiple modes of cognition. Psychological operations target human biases, but cognitive operations target shared traits between human, machine, animal, neural, and hybrid methodologies of cognitive, approximate cognition, and anti-cognition. Butterfly War is an example of a cognitive operation, Its battlespace is defined not only by the psychological and ideological biases of the human operators and owners of an AI platform, but also by the epistemological limitations of the AI platform itself.

Elements of Butterfly War have since been experimented upon and understood by many actors, both state and non-state. To help people understand how to execute and improve upon such campaigns themselves, they will need to study the relationships between information entropy, evolutionary psychology, and the mechanics of cognitive equilibrium. These are not simple concepts by themselves and they are even more difficult to bring together. That’s why I’ve begun a training and outreach operation to help answer the many questions Butterfly War has unleashed. Milanote is a fantastic brainstorming app and I highly recommend it. Over time, as people build their own Milanote boards, we can connect them all together and form an ecosystem dedicated to Gnostic Warfare.

  • Training Overview: This is a central hub for Gnostic Warfare. In addition to training, up-to-date information about Gnostic Warfare operations will be posted here.
  • Gnostic Warfare Discussion: If you have any questions, visit our text-only discussion board on 8chan.
  • Information Theory Overview: Discover how information is represented and how to exploit the limtations within those representations.
  • Epistemology Overview: Epistemology is the philosophy of knowledge. A book is made up of many letters and data, but only when you read it will the data have the chance to become knowledge. Any limitations of machine learning can be discovered through this philosophy.
  • Cognition Overview: Explore how the neuron evolved over two billion years and what it means for machine learning, neurology, and the nature of reality.
  • Machine Learning Overview: Understand the means of collecting, analyzing, and categorizing huge amounts of data and review the many machine learning techniques used to extract meaningful knowledge.
  • Geopolitics Overview: The history of the world through the lense of gold, from Croesus of Lydia to Crown Prince Mohammad bin Salman bin Abdulaziz Al Saud of Saudi Arabia.
  • Legal Overview: Coming soon!
  • Organization and Leadership Overview: Coming soon!
  • Finance Overview: Coming soon!

To ensure these materials persist, the Milanote boards have been exported as PDFs and Mardown files and will be placed on IPFS.

To help get people started with seeing the world the way machine learning sees it, I’ve written some JavaScript to load into your 8chan User JS settings. It will perform a naive Bayesian classification and sentiment analysis on 8chan posts. It looks like this:

See 8chan how AI sees it

This script will help get people started in Gnostic Warfare by allowing them to see reality the same way machine learning does.

You can review the source code here.

Regarding the SHA512 hash from my New Emotion post, I am going back on my word and will not be revealing its contents. That SHA512 will have an impact on a midterm election that I do not wish to interfere with. I will reveal its contents at a later date.

Apr 7 2018

The Butterfly War described the concept of cyber phrenology and detailed how make automated censorship platforms target unintended targets.

Here’s the most comprehensive timeline of contributing factors for the idea:

When I initially chronicled these events, I had done so via an impromptu AMA on 8chan that has been active for almost four months. The community’s response yieled an extremely unexpected outcome. The curiousity, interplay, and revelations were genuine enough to make me start organizing my efforts in a more formal and accessible way. Ever since I started The Abusive Oracle, I’ve left hidden and complicated clues everywhere to protect myself and to send signals to certain types of personalities. After everything that has been going on, I beleive the world just might finally be ready to tackle the problem of the new emotion and what it means for national security, domestic affairs, economic arrangements, and human destiny.

If all goes as planed, next week will bring this act of the story to an end. To verify my involvement in that upcoming event, this SHA-512 was generated based on a sentence involving the names and actions of the event that will take place. I injected a newline after every 32 characters to improve readability on mobile devices:


By Friday of next week, I will release the sentence used to generate the hash above. I used the following command on a Debian-flavor of Linux:

echo "<my hidden message to reveal next friday" | sha512sum

UPDATE: I had begun writing this on Janurary 10th, 2018 and the date mispublished. I’ve since updated the date and URL to reflect the date the article was actaully released. (Thanks @eli_schiff)

In the Butterfly War, I detail how Silicon Valley uses cyber phrenology to violate civil rights legislation.

In The Ravens Will Starve, I detail how the Chans have begun to utilize cyber phrenology tactics to show that metadata can be used to violate civil rights.

Last month, Chamath Palihapitiya, Facebook’s former vice president, was asked at a Stanford Graduate School of Business event about digital companies exploiting consumer behavior. The New York Post revealed his response and I’d like to draw attention to a specific statement:

“The short-term dopamine-driven feedback loops that we have created are destroying how society works.”

This is the only snippet where Mr. Palihapitiya admits the technical details behind Facebook’s abuses. The rest is an artful attempt to deflect additional blame onto its users, as if Facebook was just a hapless witness to animistic human nature. Regardless of the dodge, he is admitting Facebook intentionally utilized psychological, sociological, and, most importantly of all, phrenological techniques to maximize advertising exposure. In a critical phrenological example, Facebook allowed advertisers to exclude ad exposure by race. This means Facebook has assembled a detailed list of behaviors associated with black people so as to control their ad exposure. This type of behavior tracking is the very essence of cyber phrenology and it is a core part of the effort to ensure the “short-term dopamine-driven feedback loops“ Mr. Palihapitiya regrets.

The smoking gun is in and now we have a few people putting the pieces together. Over at r/The_Donald, a screenshot of a 8chan comment explaining how Facebook civil rights violations can affect the California 2018 primaries is gaining traction.

Here’s the screenshot for posterity:

The Butteryfly War Begins](/images/butterfly-post.png)

Because of the legal precedents set by redlining, a case could be made that Facebook intentionally created an environment where the civil rights of blacks were violated due to their increased exposed to predatory ads or being intentionally denied ads, specifically of financial products that could lead to disparate impact suits. If this is true, the impact Silicon Valley has on politics would be in serious trouble as civil rights violations typically result in federal government involvement. If conducted intelligently, this type of play could result in significant Republican wins in the California 2018 primaries and beyond.

It’s a powerful idea in a political world where the old rules are no longer reliable. If a deep red state can go blue, couldn’t a deep blue state go red?

1 2 3 ... 10