Recent Updates Toggle Comment Threads | Keyboard Shortcuts

  • Anonymous 12:15 pm on March 25, 2020 Permalink | Reply  

    Ideas for a Game 

    Let make a game. The idea of the game is to push a meme as far as you can.

    Find something that you can track analytically using some sort of view counter. This could be a web site, or a post. Or what ever you can track views on. See how far you can push it. When I launch my first post I had 10 views. As of March 25, 2020 I’ve been averaging about 100 view per day.

    Try it see. See what you can do. See how far you can push something.

  • Anonymous 9:32 pm on March 23, 2020 Permalink | Reply  

    Scare Tactics 

    Everyone uses them.

    Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up “exposure,” they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.

    The FBI counterintelligence program’s stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. “National Security” means the FBI’s security from the people ever finding out the vicious things it does in violation of people’s civil liberties. The FBI can use there size and power to basically scare people into follow the law.

  • Anonymous 8:23 pm on March 23, 2020 Permalink | Reply  

    Types of Spies 


    Some saboteurs pretend to be activists. She or he will ….

    1) Write encyclopedic flyers (in the present day, websites)

    2) Print flyers in English only. 

    3) Have demonstrations in places where no one cares.

    4) Solicit funding from rich people instead of grass roots support

    5) Display banners with too many words that are confusing.

    6) Confuse issues.

    7) Make the wrong demands.

    Cool Compromise the goal.

    9)Have endless discussions that waste everyone’s time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist’s work.


    1) Want to establish “leaders” to set them up for a fall in order to stop the movement.

    2) Suggest doing foolish, illegal things to get the activists in trouble.

    3) Encourage militancy.

    4) Want to taunt the authorities.

    5) Attempt to make the activist compromise their values.

    6) Attempt to instigate violence. Activisim ought to always be non-violent.

    7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.


    1) Want everyone to sign up and sing in and sign everything.

    2) Ask a lot of questions (gathering data).

    3) Want to know what events the activist is planning to attend.

    4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.


    Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.

    Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.


    ALWAYS assume that you are under surveillance.

    At this point, if you are NOT under surveillance, you are not a very good memer!

  • Anonymous 8:28 am on March 23, 2020 Permalink | Reply  

    How to Spot a Spy (Cointelpro Agent) 

    One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?

    1) The message doesn’t get out.

    2) A lot of time is wasted

    3) The activist is frustrated and discouraged

    4) Nothing good is accomplished.

    Informers and Infiltrators will infest any group and they have phoney activist organizations established. Their purpose is to prevent any real movement for justice or eco-peace from developing in this country. Agents come in small, medium or large. They can be of any ethnic background. They can be male or female. The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs. This post lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists. It is the agent’s job to keep the activist from quitting such a group, thus keeping him/her under control. In some situations, to get control, the agent will tell the activist

    “You’re dividing the movement.”

    [Here, I have added the psychological reasons as to WHY this maneuver works to control people]

    This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of “dedication to the cause.” Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she – being truly dedicated to the movement – becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that “on purpose.” It’s amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: “they did that unconsciously… they didn’t really mean it… I can help them by being forgiving and accepting ” and so on and so forth.

    The agent will tell the activist:

    “You’re a leader!”

    This is designed to enhance the activist’s self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.

    This is “malignant pseudoidentification.” It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist’s identification with him/her, thus increasing the activist’s vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.

    Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.

    The goal of the agent is to increase the activist’s general empathy for the agent through pseudo-identification with the activist’s self-concepts.

    The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of “twinship”. It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.

    The activist’s “felt quality of perfection” [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim’s own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is “mirroring” them.

    The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that “twinship alliances” between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally “lose touch with reality.”

    Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be “helpers” endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.

    Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist’s narcissistic investment in self as the embodiment of goodness.

    The agent’s expression of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.

    It can usually be identified by two events, however:

    First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being “emotionally hooked,” will be able to remain cool and unaffected by such emotional outpourings by the agent. As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that “the play has ended, the curtain has fallen,” and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim. The fact is, the movement doesn’t need leaders, it needs MOVERS. “Follow the leader” is a waste of time. A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.

    Some agents take on a pushy, arrogant, or defensive manner:

    1) To disrupt the agenda

    2) To side-track the discussion

    3) To interrupt repeatedly

    4) To feign ignorance

    5) To make an unfounded accusation against a person.

    Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.

  • Anonymous 8:32 am on March 22, 2020 Permalink | Reply  

    Eight Traits of the Disinformationalist 

  • Anonymous 4:16 am on March 22, 2020 Permalink | Reply  

    Twenty-Five Rules of Disinformation 

    1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

    2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

    3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

    4. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

    5. Sidetrack opponents with name calling and ridicule. This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

    6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

    7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

    8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

    9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

    10. Associate opponent charges with old news. A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

    11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

    12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

    13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

    14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

    15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.

    16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.

    17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

    18. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

    19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

    20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

    21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

    22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

    23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

    24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

    25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

    Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

  • Anonymous 12:15 am on March 21, 2020 Permalink | Reply  

    Statistical Memesearch 

    We need to be able to track ideas in order to understand the way things develop and change if we are to have a hope of successful meme-ception

    My basic idea is using google trends to track popularity and trends.

    Other for hashtags.

  • Anonymous 12:31 am on March 16, 2020 Permalink | Reply  

    Right Memes 

    If we should ever manage to rehabilitate, in the minds of the public, the image and politics of what is right, then we shall have won the war as the public would never again (or for a great period) be taken in by left wing propaganda.

    I will discuss ways to red-pill the masses.

    I would suggest trying to be comic, lighthearted about it. Stuff with subtle ideas woven in, but gernerally insane, something to laugh about. Laughter lowers people’s ‘mental defenses’ against certain ideas. If you could come up with some sort of ‘funny’ meme. Remember, you need to be subtle, people need to walk this path for themselves.

  • Anonymous 1:49 pm on March 12, 2020 Permalink | Reply  

    Ask a question. 

    Making memes and publishing them are not always the end goal. There is another tool/process these memes can utilized: query. Queries include linguistic questions, but aren’t limited to them: they can be roughly abstracted to “a request for information.” This includes all types of normal questions, but also such things as politics and life goals.

    There is a particular class of queries: queries about queries. For example, When some is deciding their opinion on something, asking them a loaded question about a politicians morals can go a long way.

    Memes become toxic/cancerous/parasitic when they supplant questions. The answer to a question might be what a person thinks the meme is after, when the real intent of the question, is to change the persons opinion on what is being talk about. The memetic war in a sense could be thought of as a war on questioning itself, a war on selection: the idealized viral meme would make perfect copies of itself endlessly. These queries could invoke both positive and negative thoughts and opinions

    To invoke a positive thought, a sale man always ask questions about how the person feels about the product, or what they like the most about the product. These intern make the person think about the good traits of the product, and could convince the person to purchase the product.

    There are ways to evoke negative thoughts. If someone wants to steal a girl, from a guy, all they need to do is keep asking about the negative features in a guy. The girl will then be forced to think about the negative side of her relation ship, and would be more likely to break off the relationship for something better.

    Good introductory information:

  • Anonymous 1:47 pm on March 11, 2020 Permalink | Reply  

    Ever Changing Field 

    All you can do is adapt to adaptations for a time until a new strategy adapts to those adaptions. It is truly infinite in complexity because the strategies build off of eachother

    Saying that you’ve solved memetics is like saying that you’ve solved evolution – you may well have a fitting broad theory, but the knowledge of the ocerarching theory does not give you knowledge of how adaptation will occur or even could occur in a given system

    At best you can make memetics into a science like economics and your theories can become more refined, but when you’re dealing with a living system that adapts to adaptations you will never be able to rest on any static strategy – the only static things will be necessary truths too broad to be useful.

    As soon as the knowledge of whatever insight they have into memetics is itself spread, then the market changes and the strategy no longer applies – you can only front run. For instance, as soon as it becomes known that a certain method of adverrising is effective for getting a consumer to buy X, then, the consumer will be incolcated against this strategy in proportion to their mindfulness. Here socialization comes into play as those that still fall for the strategy are deemed slow witted and made all the less likely to fall for the strategy due to stigmatization

  • Anonymous 1:41 pm on March 9, 2020 Permalink | Reply  

    Anyone Can Do It 

    Everyone is a “memetic engineer” to some existent, but not equally in talent. There are some that are naturally exceptionally gifted at it. These naturals can generally be classified into researchers, content creators and pushers, with an even smaller set that are prodigious in all three. The first step was to identify and study these individuals, which was made possible by the internet. Then came augmentation: testing to see how to make these memetic engineering techniques even better. The final part was when these naturals were tapped to apply memetics to memetics in a recursive process that increased the power of the program exponentially. The popularization of the word “meme” on the internet was the result of this, and also served as a siren’s call to attract more innate meme makers. It has also helped to normalize the concept of meme and make it appear harmless and natural rather than something evil and scary.

  • Anonymous 2:59 pm on December 10, 2020 Permalink | Reply  

    Keksarmy is down 

    I got to put it back together. Will be up soon.

  • Anonymous 5:24 am on September 11, 2020 Permalink | Reply  

    Types of Trolls 

    The Facefagger

    They are spearhead. in the streets, on the channels showing your face, climbing roofs, rolling down huge banners, speak publicly, maybe even become a prominent face of the movement. Hell, you might even take to the high seas and troll NGO freeloader ferries with things progressing as they are. If you’re ripped or have experience in security services you might as well be a part of a Safety Squad, ensuring the protection of higher profile Facefaggers during mass attendance events.

    All this will most likely get you in trouble with leftist fungus that will defame, denounce and character assassinate you. Therefore be aware that taking this path may very well be the path of a (proverbial) martyr. Nobody entering the path of valor should be under any illusion that his or her real life will go on as before, especially regarding finance, social status or your profession.That’s why you will be the heroes of the fight and that’s why the following two echelons are so important as well.

    The Shitdispatcher

    They are Anon. shitdispatcher don’t facefag, but you’re still out on the streets as well as active online. You attend rallies, marches, speeches, conventions but on a low profile. You document the movement on as much channels as possible and maintainable. You might PHYSICALLY REMOVE any and all leftist AgitProp in your neighborhood on a regular basis. You might as well make suitable memes print-ready and order or self-print stickers and/or posters and occasionally troll the shit out of Antifa propaganda with it. So there is certain risk. You also will filter the output of this here primordial soup of Meme Magic, take the most appealing and spread them.

    The Crapposter

    You are the person liking and sharing, what a facefagger or shitdispatcher post online. They are the biggest group of trolls.

  • Anonymous 5:05 am on September 11, 2020 Permalink | Reply  

    Regular Tasks of a Troll 

    -Gather lurkers

    -Make memes

    -Spell-check memes

    -Spread memes

    -Come up with new ideas

    -Ignore the shills

  • Anonymous 4:38 am on September 11, 2020 Permalink | Reply  

    What if They Began Using the Memes Against You? 

    Let’s say they use all those CIA toys to observe the anons. Imagine if those DARPA things they have been developing over the years were applied to mess with the anons minds. Imagine if they mapped all of your stimulus in the internet, through cameras, and marked each and every reaction to ever image you may ever have seen. They could separate the wheat from the tares and insert some of those memetic elements in daily things. Let’s say a van is parked in the parking lot by the end of the street, and they have another bus full of people down the other street. They can make shirts on the fly to make you react in the street to those stimuluses. if they pair those with other things, like something they would enjoy as a positive reinforcement, or something they don’t like as a negative reinforcement, its possible to make a AI predict what’s the better shirt someone should dress and diminish the costs of interrogating the suspects. CIA uses this thing to mess with anons heads in Europe and I believe FBI do it in the US. The thing is, those anons are forced to do things and since those are covert operations, they wouldn’t even change stuff if the subject shows some sort of compulsion to kill. So… Imagine a whole bunch of FBI agents following a spree killer without any intention to shut him down while he the real cops don’t appear. Imagine if CIA did it to make the Vault 7 look like a real need to the media, keeping their narrative solid? What would YOU do anon, I know you’re here, what would you do if they tried those things on you? Would that make you stop posting political stuff or any type of meme?

    I think there may be a central management so large most normal people would think it is the root of evil in the world. And so effective that it would work like magic. It’s fascinating what you can do if you rape someone’s mind. I mean, consider the following, let’s say you live in a region where politicians only steal and fuck with the population’s life so they can make some cash to wash in foreign countries and sell more crack to people using police officers.

  • Anonymous 2:45 am on September 10, 2020 Permalink | Reply  


    Trump does this a lot.

    1. Say something that can be emotionally-reversed at a later stage. Make sure to push your vocabulary as far as possible to exaggerate this effect. E.g., Trump finds out a media outlet is using blackmail on someone and he uses simple and inflammatory wording – WITHOUT GIVING EVIDENCE – and causes all of the left to hop on board and ridicule him.

    2. Reverse it. E.g., it turns out that the media outlet is indeed using blackmail. This causes all of those left-wing detractors to take a good few steps towards seeing Trump as a positive. The sheer value of the negative emotion is partially transmuted into positive emotion.

    3. Repeat this until people are on your side.

    By the way, this obviously has less to do with memetics and more with persuasion, but the two can be used in combination. The persuasion can be housed within a meme image.

  • Anonymous 4:43 am on September 9, 2020 Permalink | Reply  

    Changing Your Mind? Dopamine 

    You are a robot, I told you…. Memes elicit an instant emotional coupling. People only react to what is constructed as reality, no matter the obvious, better advised outcome.


    Got hungry, so bad that I go to the garage freezer, with a side plate, and pull FISH STIKS! Pathetic and full of GMOs and MSG. They lie in the plate, looking like frosty dog-biskets. I go   back to the kitchen. Into the microwave, 30 seconds, Flip-turn, 30 seconds, flip turn, 30 seconds, now its boiling inside. Get a hotpad and flip it into the toaster on a max-hot, foil lined pan. Watch them using a flashlight for 2 minutes, flip, and do it again, waiting, waiting…I can’t stand it, so, out they come into the rinsed saucer, sizzling. I pour a drink, add thick ranch dressing to the plate. Family-Guy’s on in my fort. The Cat wants to annoy me and I tell it to fuck-off. Bite. Crunch. Swallow. Result=happiness.

    What can you learn about neuro-chemistry and endocrine systems from this? I will remember that (I have a whole Bag!)  the cat matters less, and I’ll be back. I’m safe, knowing to say screw to anyone who said that’s “bad for you” (-too late for them now, I know better).

    Meme-makers should know Instincts work, that Food works, favors work, orgasms work, bribes work. and Fear triggers, promise motivates. I will adopt a promise of reward. How will we depict the indirect promise of a reward state in a Meme?

    How targeted drug delivery using genetic targeting can be used to integrate nanotechnology capable of communicating with a computer device?

    Targeted Drug

    Targeted drug delivery, sometimes called smart drug delivery,[1] is a method of delivering medication to a patient in a manner that increases the concentration of the medication in some parts of the body relative to others. This means of delivery is largely founded on nanomedicine, which plans to employ nanoparticle-mediated drug delivery to combat the downfalls of conventional drug delivery. These nanoparticles would be loaded with drugs and targeted to specific parts of the body where there is solely diseased tissue, thereby avoiding interaction with healthy tissue. The goal of a targeted drug delivery system is to prolong, localize, target, and have a protected drug interaction with the diseased tissue. The conventional drug delivery system is the absorption of the drug across a biological membrane, whereas the targeted release system releases the drug in a dosage form. The advantages to the targeted release system is the reduction in the frequency of the dosages taken by the patient, having a more uniform effect of the drug, reduction of drug side-effects, and reduced fluctuation in circulating drug levels. The disadvantage of the system is high cost, which makes productivity more difficult and the reduced ability to adjust the dosages.

    In passive targeting, the drug’s success is related to circulation time.[6] This is achieved by cloaking the nanoparticle with some sort of coating. Several substances can achieve this, with one of them being polyethylene glycol (PEG). By adding PEG to the surface of the nanoparticle, it is rendered hydrophilic, thus allowing water molecules to bind to the oxygen molecules on PEG via hydrogen bonding. The result of this bond is a film of hydration around the nanoparticle which makes the substance antiphagocytic. The particles obtain this property due to the hydrophobic interactions that are natural to the reticuloendothelial system (RES), thus the drug-loaded nanoparticle is able to stay in circulation for a longer period of time.[7] To work in conjunction with this mechanism of passive targeting, nanoparticles that are between 10 and 100 nanometers in size have been found to circulate systemically for longer periods of time.[8]

    Active targeting of drug-loaded nanoparticles enhances the effects of passive targeting to make the nanoparticle more specific to a target site. There are several ways that active targeting can be accomplished. One way to actively target solely diseased tissue in the body is to know the nature of a receptor on the cell for which the drug will be targeted to.[9] Researchers can then utilize cell-specific ligands that will allow for the nanoparticle to bind specifically to the cell that has the complimentary receptor. This form of active targeting was found to be successful when utilizing transferrin as the cell-specific ligand.[9] The transferrin was conjugated to the nanoparticle to target tumor cells that possess transferrin-receptor mediated endocytosis mechanisms on their membrane. This means of targeting was found to increase uptake, as opposed to non-conjugated nanoparticles.

    Active targeting can also be achieved by utilizing magnetoliposomes, which usually serves as a contrast agent in magnetic resonance imaging.[9] Thus, by grafting these liposomes with a desired drug to deliver to a region of the body, magnetic positioning could aid with this process.

    Electrical Stimulation of Neural Stem Cells Mediated by Humanized Carbon Nanotube Composite Made with Extracellular Matrix Protein

    Design and evolution of modular neural network architectures


    To investigate the relations between structure and function in both artificial and natural neural networks, we present a series of simulations and analyses with modular neural networks. We suggest a number of design principles in the form of explicit ways in which neural modules can cooperate in recognition tasks. These results may supplement recent accounts of the relation between structure and function in the brain. The networks used consist of several modules, standard subnetworks that serve as higher order units with a distinct structure and function. The simulations rely on a particular network module called the categorizing and learning module. This module, developed mainly for unsupervised categorization and learning, is able to adjust its local learning dynamics. The way in which modules are interconnected is an important determinant of the learning and categorization behavior of the network as a whole. Based on arguments derived from neuroscience, psychology, computational learning theory, and hardware implementation, a framework for the design of such modular networks is presented. A number of small-scale simulation studies shows how intermodal connectivity patterns implement “neural assemblies” that induce a particular category structure in the network. Learning and categorization improves because the induced categories are more compatible with the structure of the task domain. In addition to structural compatibility, two other principles of design are proposed that underlie information processing in interactive activation networks: replication and recurrence.

    Because a general theory for relating network architectures to specific neural functions does not exist, we extend the biological metaphor of neural networks, by applying genetic algorithms (a biocomputing method for search and optimization based on natural selection and evolution) to search for optimal modular network architectures for learning a visual categorization task. The best performing network architectures seemed to have reproduced some of the overall characteristics of the natural visual system, such as the organization of course and fine processing of stimuli in separate pathways. A potentially important result is that a genetically defined initial architecture cannot only enhance learning and recognition performance, but it can also induce a system to better generalize its learned behavior to instances never encountered before. This may explain why for many vital learning tasks in organisms only a minimal exposure to relevant stimuli is necessary.

    ARTMAP: Supervised real-time learning and classification of nonstationary data by a self-organizing neural network

    Deep brain stimulation to illicit fear and extreme anger.

    Nanotube radio.

    The integration of computers with the brain.The human-computer interface can be described as the point of communication between the human user and the computer. The flow of information between the human and computer is defined as the loop of interaction. The loop of interaction has several aspects to it, including:

        Visual Based :The visual based human computer inter-action is probably the most widespread area in HCI(Human Computer Interaction) research.

        Audio Based : The audio based interaction between a computer and a human is another important area of in HCI systems. This area deals with information acquired by different audio signals.

        Task environment: The conditions and goals set upon the user.

        Machine environment: The environment that the computer is connected to, e.g. a laptop in a college student’s dorm room.

        Areas of the interface: Non-overlapping areas involve processes of the human and computer not pertaining to their interaction. Meanwhile, the overlapping areas only concern themselves with the processes pertaining to their interaction.

        Input flow: The flow of information that begins in the task environment, when the user has some task that requires using their computer.

        Output: The flow of information that originates in the machine environment.

        Feedback: Loops through the interface that evaluate, moderate, and confirm processes as they pass from the human through the interface to the computer and back.

        Fit: This is the match between the computer design, the user and the task to optimize the human resources needed to accomplish the task.

    A brain–computer interface (BCI), sometimes called a mind-machine interface (MMI), direct neural interface (DNI), or brain–machine interface (BMI), is a direct communication pathway between an enhanced or wired brain and an external device. BCIs are often directed at researching, mapping, assisting, augmenting, or repairing human cognitive or sensory-motor functions.[1]

    Research on BCIs began in the 1970s at the University of California, Los Angeles (UCLA) under a grant from the National Science Foundation, followed by a contract from DARPA.[2][3] The papers published after this research also mark the first appearance of the expression brain–computer interface in scientific literature.

    In 1980s a report was given on control of a physical object, a mobile robot, using EEG signals [S. Bozinovski, M. Sestakov, L. Bozinovska: Using EEG alpha rhythm to control a mobile robot, In G. Harris, C. Walker (eds.) Proc IEEE Annual Conference on Medical and Biological Society, New Orleans, p. 1515-1516,1988][S. Bozinovski: Mobile robot trajectory control: From fixed rails to direct bioelectric control, In O. Kayniak (ed.) Proc. IEEE Workshop on Intelligent Motion Control, p. 63-67, 1990].

  • Anonymous 3:02 am on September 8, 2020 Permalink | Reply  

    Meme Warfare Reads 

    Here are some cool links to things to read that the government wrote:

  • Anonymous 12:36 pm on September 6, 2020 Permalink | Reply  

    Meme Merch 

    It seems like people selling patches and merchandised based on memes have become a thing. In recent years all these weird memes have had a lot of meaning. Some people thought it would be a good idea to make some merchandise out of them. I think this is a great idea but who is ever running this needs to realize, they need to be able to design and produce new merch to keep up with the ever changing field of memes.

  • Anonymous 2:10 am on September 5, 2020 Permalink | Reply  

    Should we be Worried? 

    No. I think that when it comes to the future, we shouldn’t be worried about it. Does that mean I think we should sit back and do nothing? No. We all need to do our part to make the world a better place. The internet has made that easier. Whether it’s setup troll groups or sharing articles and memes, there is always something social that we can do. I think once we realize that working together, we can change the world then I think that it is possible to make the world a better place.

  • Anonymous 1:39 am on September 5, 2020 Permalink | Reply  

    Bear with Biden Meme 

    Pepe is one of the most common memes on the Right. So it is only natural that someone would want a similar character for the left. Someone came up with the idea, of “Bear with Biden.” They even used an existing meme, of pedo bear, and colored it blue like the Democratic color. Also the name Bear with Biden doesn’t even seem like people are enjoying him as a candidate, even though they a bearing with him. It makes for a good play on words. Someone from BLM even went so far as to make a tweet about the new logo.

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc