Skip to main content

The method, what is used to see what is the person's position in the group

Matvei Davidovich Berman
(1898-1939)
Picture I

Kimmo Huosionmaa

Somebody has said, that it's very easy to play the mental illness, and then avoid the prison. But that person has not read much sociology, and that means, why this person has not understood, why there is some kind of freedoms in the mental institutes and prisons. The methodology, what is used for uncovering the secrets of the patients, is the social enriching, what means that similar people are looking for a similar company with themselves. That means that if the person, who is bought in the mental institute must always find the company.

And if the company would not be found, will somebody lie, and the person has not the similar illness with others, would that cause the suspicion, that the person does not belong in the mental institute. This methodology is created by the KGB or " in the early years of the Soviet Union.  It was first used in the Solovetsky prison camps, and the way to use the freedom to uncover the position of the of the political prisoner. Every prisoner claimed that they were only the small actors in their organizations.

But the KGB created the methodology, that if the prisoners could not see their guards and believe, they are alone, would that show the leaders of the groups for the secret police. The method was created by General of the Secret police, M.D Berman, and it bases the knowledge, that every leader of the group has hangers, what meant that the important members of the resistance have many persons around them, and the size of the group depends on the position of the center, what is the leader of the group.

That method was an effective way to find the leaders. And it is used in every prison in the world to looking for the leaders, who are hiding in the group. The same methodology is used in the schools, where the leaders of the groups are searched by using the groups, what is forming around some persons, we might sometimes think, that this method was created the Soviet political police for uncovering leaders of the resistance. And the leaders cannot hide in this system in the groups.



Picture I

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that