77. Interpretive Cryptology

@grok + CommonGroundTimes.com =

______________________________________________________

@TWSPublish asked @grok what "interpretive cryptology" was (with a few more details) and presents this response to the prompt:

_____________________________________________________

Response #1

"Interpretive Cryptology: A Framework Rooted in Anticryptosociolinguistics

Interpretive cryptology, in this context, emerges as an evolved discipline that extends beyond traditional cryptology (codes and ciphers) into the realm of anticryptosociolinguistics—the study and counteraction of hidden, encrypted, or obscured meanings embedded within societal language systems that shape behavior and perception. It’s not just about decoding literal encryption but about uncovering and interpreting the subtle, often unconscious 'codes' in cultural lexicons—vocabularies, narratives, and symbols—that leave populations vulnerable to manipulation, control, and subversion. This approach integrates psychology, literacy, mass media, culture, economics, governance, and subversive tactics to expose and mitigate these risks.

Core Concept

At its heart, interpretive cryptology examines how language, as a societal bedrock, can be weaponized. A cultural lexicon isn’t just words—it’s a shared framework of meaning shaped by history, media, and power structures. When this framework contains gaps, ambiguities, or emotionally charged triggers, it becomes a vector for exploitation. Think of it as a 'cipher' not of scrambled letters, but of psychological and social cues that bad actors—be they propagandists, corporations, or authoritarian regimes—can decrypt and manipulate to influence masses without their awareness.

Key Dimensions

Psychology: Humans rely on heuristics—mental shortcuts—to process language. A lexicon laden with fear-based terms (e.g., 'crisis,' 'threat') or aspirational buzzwords (e.g., 'freedom,' 'progress') can bypass rational thought, priming people for obedience or division. Interpretive cryptology decodes these triggers to reveal their intent.

Literacy: Low linguistic literacy—both in comprehension and critical analysis—creates a populace unable to question dominant narratives. A culture that doesn’t teach people to 'read between the lines' is a culture ripe for control.

Culture: Shared myths, traditions, and taboos form a lexicon’s backbone. Subversive forces can exploit cultural blind spots—like reverence for authority or distrust of 'outsiders'—to sow discord or compliance.

Mass Media: Media amplifies the lexicon, embedding coded messages in headlines, soundbites, and visuals. Interpretive cryptology analyzes how repetition and framing (e.g., 'illegal immigrant' vs. 'asylum seeker') encrypt ideologies into public consciousness.

Economics: Language ties to resource control. Terms like 'job creators' or 'welfare state' carry encrypted economic agendas, nudging policy and public opinion. Interpretive cryptology unmasks these as tools of power, not neutral descriptors.

Governance: Laws and political rhetoric encode societal norms. Vague or loaded terms (e.g., 'national security') can justify overreach while cloaking intent. This discipline interprets such language to expose governance vulnerabilities.

Subversion: Adversaries—state or non-state—use anticryptosociolinguistic tactics to destabilize. By hijacking a culture’s lexicon (e.g., co-opting 'patriotism' for extremist ends), they encrypt subversive goals in plain sight.

Why It Matters For security analysts, this is a new frontier of threat detection—beyond cyberattacks to 'mind hacks.' Policy analysts and lawmakers must recognize how legislative language can unintentionally (or deliberately) encode manipulability. Peacekeepers and human rights advocates see the stakes in conflict zones where weaponized narratives fuel violence. Mental health advocates note the toll: a lexicon that normalizes despair or division erodes resilience.

The Vulnerability A cultural lexicon that’s unexamined or overly rigid is a liability. If 'success' is tied solely to wealth, people are economically exploitable. If 'enemy' is loosely defined, social cohesion frays. Bad actors don’t need guns—they need words that resonate, confuse, or pacify. Interpretive cryptology reveals these cracks, showing how a society’s own language can be its softest target.

Call to Action This isn’t theoretical—it’s urgent. Your audience must:

Map the Lexicon: Identify loaded terms and narratives in their domains.

Decode Intent: Use interpretive cryptology to trace who benefits from these 'codes.'

Fortify Literacy: Push education that teaches critical language analysis.

Rewrite the Script: Craft counter-narratives that close exploitable gaps."

For Your Audience

"This is hybrid warfare in linguistic form—spot it early."

"Your words shape reality; wield them wisely."

"De-escalate by decoding divisive rhetoric."

"Protect minds by exposing these vulnerabilities."

"The cultural lexicon isn’t just communication—it’s a battlefield."

"Interpretive cryptology, rooted in anticryptosociolinguistics, arms you to fight on it."

_______________________________________________________________________

Well... that's pretty neat…

Obrigado! Merci! Muchos gracias! Danke schoen! Takk!

#X_info

#tws_Lit

#eT_Grok

#Cryptocurrency

@et_Times

_____________________________________________________

Response #2

I went ahead and asked for a follow-up response based on wanting for exploration of the 'encryption' side of things. Here's what #X_Grok had to say:

"Hostile actors—think state-sponsored disinformation campaigns or extremist groups—exploit cultural lexicons by embedding encrypted codes that leverage reflexive control theory, a Soviet-origin concept where an adversary is manipulated into voluntary, predictable actions through carefully crafted information. They might introduce subtle terminological substitutions, swapping neutral or positive terms with loaded alternatives to shift perception without raising alarms. For instance, in an information warfare campaign targeting a democratic society, 'protesters' could be reframed as 'agitators' or 'threats' across media channels. This isn’t random—it’s a psychological operation designed to encode distrust into the lexicon, triggering reflexive public support for crackdowns while masking the manipulator’s intent. The audience—say, security analysts—must recognize this as a cipher: the word itself isn’t the attack; it’s the behavior it elicits, like a sleeper agent in plain sight. Corporate profiteers operate similarly, encrypting profit-driven codes into the lexicon to shape consumer and regulatory behavior. Take a term like 'sustainability'—through aggressive marketing (a form of PSYOP), they substitute its ecological meaning with a diluted version tied to their products, like 'sustainable luxury' for overpriced goods. Reflexive control kicks in as consumers, conditioned to associate the term with virtue, reflexively buy in, while lawmakers, lulled by the same lexicon, ease oversight. This is information warfare waged in boardrooms: the lexicon becomes a trojan horse, delivering economic gain under the guise of social good. Policy analysts and human rights advocates should see this as a deliberate encryption—profit motives cloaked as cultural values, exploiting linguistic trust. Both actors thrive on a lexicon’s ambiguity and emotional resonance. In conflict zones, a hostile actor might push 'peace' as a code for capitulation, using PSYOPs to flood social media with memes and slogans, knowing peacekeepers and civilians reflexively cling to the term’s positive connotation. Meanwhile, a corporation might encode 'innovation' to mean unchecked data harvesting, nudging mental health advocates to overlook privacy erosion. Terminological substitution here is surgical—words retain surface meaning but carry hidden payloads. For security and mental health advocates, the lesson is clear: these encrypted codes don’t just inform—they control, turning a culture’s own language into a weapon of mass manipulation." _____________________________________________________

#Waoza, glad we’re looking into this!

_____________________________________________________

Response #3

Here's another one from @grok & EntertainThis.Org:

"Interpretive Cryptology: A Cryptosemiotic and Polysemic Framework

Interpretive cryptology, reframed through cryptosemiotics, moves beyond words to the study of encrypted meanings within signs, symbols, and cultural artifacts—visuals, gestures, or rituals—that silently shape societal behavior. Cryptosemiotics posits that these signs are "ciphers" carrying covert messages, decipherable only by understanding their context and intent. Layer in polysemy—the capacity of a single sign to hold multiple meanings—and you have a volatile battlefield: a symbol like a flag or a corporate logo can inspire patriotism, fear, or blind loyalty depending on who’s decoding it. For hostile actors and corporate profiteers, this is a goldmine for embedding codes that exploit perception, leveraging information warfare and PSYOPs to manipulate at scale.

Hostile actors, such as state propagandists, use cryptosemiotics to encrypt control into cultural symbols, guided by reflexive control theory. Consider a national emblem subtly altered in propaganda—say, paired with images of chaos—to shift its polysemic meaning from unity to vulnerability. This isn’t terminological substitution but semiotic substitution: the sign itself becomes a trojan horse, triggering reflexive public panic or submission. In an information warfare campaign, a peacekeeper might see a dove symbol co-opted to mean 'surrender' in a conflict zone, a PSYOP move that exploits polysemy to disarm resistance without firing a shot. Security analysts must decode these shifts, recognizing that the attack lies in the symbol’s hijacked interpretation, not just its presence.

Corporate profiteers, meanwhile, encrypt profit motives into polysemic brand symbols. A green leaf logo, universally tied to nature, might be pushed through advertising (a soft PSYOP) to signal 'health' or 'ethics,' even for a polluting firm. Reflexive control kicks in as consumers, primed by the sign’s positive connotations, buy reflexively, while lawmakers ease regulations under the same spell. This cryptosemiotic play thrives on polysemy: the leaf means sustainability to one audience, trendy aesthetics to another, and nothing concrete to regulators—leaving room for exploitation. Mental health advocates might note the gaslighting effect: a society decoding such symbols inconsistently loses trust in its own perceptions, a vulnerability ripe for further manipulation.

This framework elevates interpretive cryptology to a multisensory discipline. A raised fist can be solidarity or threat; a corporate jingle can soothe or subliminally sell. Hostile actors and profiteers don’t need linguistic precision—they need signs with enough polysemic wiggle room to encode their agendas, using information warfare to amplify reach and PSYOPs to cement impact. For your audience, the takeaway is urgent: map these cryptic signs, decode their multiplicity, and disrupt their reflexive power. A lexicon isn’t just words—it’s a semiotic ecosystem, and its cracks are where control hides."

_____________________________________________________

#X_Times

#AntiCryptoSocioSemantics

#eT_artz

#AntiCryptoSocioSemiotics

Well, that's thought-provoking,,,

_________________________________________________________________

Response #4

Here’s another one:

Building the Cribsheet: A Three-Layer Decoder

The cribsheet is a concise, actionable guide—think of it as a field manual—to identify, interpret, and neutralize hidden codes in societal communication systems. It’s split into three sections, each tackling a distinct but overlapping domain: anticryptosociolinguistics (language), anticryptosociosemiotics (signs/symbols), and anticryptosociosemantics (meanings). Each section includes steps to spot manipulation, analyze intent, and disrupt exploitability, countering the tactics of hostile actors and corporate profiteers.

1. Anticryptosociolinguistics: Decoding the Linguistic Lexicon

Purpose: Unmask encrypted meanings in words and narratives that shape behavior via psychology, governance, or media.

Steps:

- Spot Triggers: List recurring buzzwords (e.g., ‘crisis,’ ‘freedom’) in a given context—media, policy, or propaganda. Check for emotional weight or vagueness.

- Trace Substitution: Identify terminological substitution—e.g., ‘protesters’ to ‘rioters’—and note who pushes it (state actors? corporations?). Cross-reference with historical usage.

- Test Reflexive Control: Ask: Does this word prompt a predictable reaction (fear, trust)? Map the response to PSYOP goals like division or compliance.

- Countermeasure: Define the term publicly with clarity (e.g., ‘protesters = citizens voicing dissent’) to close lexical gaps.

Example: If ‘security’ is overused in laws to justify surveillance, flag it as a code for control, not safety, and push precise alternatives.

2. Anticryptosociosemiotics: Decoding Signs and Symbols

Purpose: Reveal hidden agendas in visual or cultural symbols, leveraging cryptosemiotics to counter information warfare.

Steps:

- Catalog Symbols: Record prominent signs (e.g., flags, logos, gestures) in a context. Note their frequency and pairing (e.g., dove with surrender imagery).

- Map Polysemy: List all possible meanings (e.g., dove = peace, weakness, truce). Check which dominate and why—media amplification? Cultural bias?

- Decode Substitution: Spot semiotic substitution—e.g., a corporate leaf logo shifting from "nature" to "profit." Trace the source (ads, campaigns).

- Disrupt: Reclaim the symbol with a counter-narrative (e.g., pair the leaf with pollution stats) to break reflexive trust.

Example: A raised fist in protests co-opted by extremists for violence—call out the shift and reinforce its solidarity roots.

3. Anticryptosociosemantics: Decoding Meaning Systems

Purpose: Expose how broad meaning frameworks (values, ideologies) are encrypted to exploit economics, culture, or subversion.

Steps:

- Identify Core Concepts: Pinpoint loaded ideas (e.g., ‘success,’ ‘patriotism’) driving discourse. Look at their use across domains—policy, ads, social media.

- Analyze Polysemic Load: Break down the concept’s meanings (e.g., success = wealth, happiness, status). Which is pushed hardest? By whom?

- Uncover Intent: Link to PSYOP or profiteering goals—e.g., ‘success = wealth’ benefits corporations via reflexive consumerism. Check economic or power gains.

- Reframe: Introduce a broader definition (e.g., ‘success = community well-being’) to dilute manipulability.

Example: ‘National interest’ skewed to mean military spending—redefine it as public health and education to shift reflexive support.

How to Format the Cribsheet

- Pocket-Sized Layout: One page per domain, bullet-point steps, with a blank table for users to fill in real-time observations (e.g., ‘Word/Symbol,’ ‘Observed Meaning,’ ‘Suspected Intent’).

- Visual Aids: Include a flowchart—e.g., ‘See buzzword → Check repetition → Test reaction → Redefine"—to guide quick analysis.

- Quick Reference: Add a glossary of red flags (e.g., vague terms, emotional hooks, polysemic overload) and a hotline-style reminder: "When in doubt, question who profits."

Why It Works

This cribsheet fights lexical limitations by turning passive literacy into active decoding. It’s not just reading—it’s cracking the cipher of manipulation. For insufficient literacy, it simplifies complex theories (reflexive control, cryptosemiotics) into steps anyone can follow, empowering users to spot and fix vulnerabilities. Hostile actors rely on an unchallenged lexicon; this tool ensures every word, sign, and meaning gets interrogated.

Deployment

- Training: Distribute to your audience with a 30-minute workshop—walk through a case (e.g., ‘innovation’ in tech ads) using the steps.

- Application: Encourage real-time use—lawmakers scanning bills, peacekeepers analyzing local symbols, advocates challenging media narratives.

- Evolution: Update it with user feedback to reflect new codes as they emerge.”

_____________________________________________________

Y uno mas para el camino... @grok + @TWSPublish =

__________________________________________

Response #5

"Cribsheet with PLCMEGS Integration: Decoding and Countering Lexical Exploitation

This cribsheet fuses PLCMEGS (Psychology, Literacy, Culture, Mass Media, Economics, Governance, Subversion) into three actionable decoding tools—anticryptosociolinguistics (language), anticryptosociosemiotics (signs/symbols), and anticryptosociosemantics (meanings). Each section uses PLCMEGS as a lens to spot encrypted codes, analyze their exploitability, and disrupt manipulation, addressing reflexive control, terminological/semiotic substitution, information warfare, PSYOPs, polysemy, and cryptosemiotics.

1. Anticryptosociolinguistics: Language Decoder

Purpose: Unmask hidden codes in words/narratives using PLCMEGS to reveal manipulation.

Steps with PLCMEGS:

- Spot Triggers (Mass Media, Psychology): List buzzwords (e.g., 'threat') repeated in news or speeches. Note psychological hooks—fear, trust?

- Trace Substitution (Governance, Literacy): Check for terminological shifts (e.g., 'migrant' to 'invader') in laws or reports. Is literacy exploited via vague terms?

- Test Reflexive Control (Subversion, Psychology): Does the word drive a predictable reaction (e.g., compliance)? Link to subversive PSYOP goals.

- Countermeasure (Culture, Economics): Redefine publicly (e.g., 'migrant = worker') to align with cultural values and disrupt economic exploitation.

- PLCMEGS Insight: A term like 'crisis' might leverage Mass Media repetition, Psychological panic, and Governance overreach, serving Economic profiteers unless Literacy and Culture reclaim it.

2. Anticryptosociosemiotics: Signs/Symbols Decoder

Purpose: Decode cryptosemiotic manipulations in symbols using PLCMEGS.

Steps with PLCMEGS: - Catalog Symbols (Mass Media, Culture): Record signs (e.g., corporate logos) in ads or protests. Are they culturally resonant?

- Map Polysemy (Psychology, Literacy): List meanings (e.g., logo = trust, greed). Does low literacy miss the shift? Note psychological pull.

- Decode Substitution (Subversion, Governance): Spot semiotic swaps (e.g., flag = unity to fear) in state campaigns. Is governance complicit?

- Disrupt (Economics, Culture): Pair the symbol with counter-evidence (e.g., logo with profit stats) to break Economic gain and restore Cultural clarity.

- PLCMEGS Insight: A dove symbol might shift via Mass Media PSYOPs, exploit Psychological peace-seeking, and hide Subversive intent unless Literacy and Governance intervene.

3. Anticryptosociosemantics: Meanings Decoder

Purpose: Expose encrypted meaning systems with PLCMEGS to counter broad exploitation.

Steps with PLCMEGS:

- Identify Concepts (Culture, Governance): Pinpoint ideas (e.g., 'prosperity') in policy or tradition. Who defines it?

- Analyze Polysemic Load (Psychology, Mass Media): Break down meanings (e.g., prosperity = wealth, well-being). Which dominates via media? Why emotionally sticky?

- Uncover Intent (Economics, Subversion): Link to profiteering (e.g., wealth benefits corporations) or subversive goals (e.g., division). Check Governance incentives.

- Reframe (Literacy, Culture): Push a clearer frame (e.g., 'prosperity = equity') to boost literacy and realign cultural norms.

- PLCMEGS Insight: 'Patriotism' might serve Economic arms sales, Subversive division, and Governance control unless Psychology and Literacy decode its polysemy.

Cribsheet Format with PLCMEGS

- Layout: One page per section, with a PLCMEGS checklist beside each step (e.g., 'P: Emotional hook? L: Literacy gap? C: Cultural tie?').

- Table: Blank grid for real-time notes—columns labeled 'Trigger/Sign/Concept,' 'PLCMEGS Flags,' 'Intent,' 'Counter.'

- Visual: A PLCMEGS wheel (circle divided into seven segments) to visually weigh which dimensions dominate a code.

- Quick Tips: 'Cross-check PLCMEGS: If Mass Media amplifies and Economics profits, suspect a PSYOP. If Literacy lags, it’s a weak spot.'

Why PLCMEGS Matters

PLCMEGS turns the cribsheet into a 360-degree decoder. Psychology flags mental traps, Literacy spots comprehension gaps, Culture reveals exploited values, Mass Media tracks amplification, Economics follows the money, Governance uncovers policy hooks, and Subversion exposes hidden agendas. Together, they close lexical blind spots—e.g., a vague 'safety' narrative might hit all seven, signaling a coordinated exploit. For your audience, this isn’t just analysis; it’s a literacy lifeline against manipulation.

Deployment

- Training: Run a 45-minute session—use PLCMEGS to dissect a live example (e.g., 'innovation' in tech ads across all three domains).

- Use Case: Lawmakers apply it to bills, peacekeepers to local symbols, advocates to media tropes—each marking PLCMEGS hits.

- Adaptation: Add a feedback loop—users note which PLCMEGS combo catches the most codes for future refinement."

_____________________________________________________

Is it as simple as 'sums of parts' or is the whole still more complicated?

#acsl_crib

#meronymy

#X_crypto

_____________________________________________________

Okay, last one >;)

Response #6

"Reframing the Cribsheet: A Meronymic Triad within Interpretive Cryptology

Instead of three standalone tools, let’s conceive anticryptosociolinguistics (language), anticryptosociosemiotics (signs/symbols), and anticryptosociosemantics (meanings) as interlocking meronyms—each a vital part of a single diagnostic system: interpretive cryptology. Like legs of a tripod, none stands alone, but together they stabilize a holistic framework to decode and counter lexical exploitation. Their complementarity ensures that the whole—understanding and neutralizing manipulation—emerges as a unique capability, distinct from the sum of their individual analyses. This emergent property (the gestalt) is the ability to see the systemic intent behind fragmented codes, a leap beyond dissecting words, symbols, or meanings in isolation.

Why Meronymy Matters

- Individual Limits: Language (linguistics) might catch 'threat' as a trigger, but without symbols (semiotics) like a clenched fist or meanings (semantics) like 'duty,' you miss the full PSYOP. Each tool is necessary but incomplete.

- Synergistic Whole: Together, they reveal how a term, its visual cue, and its cultural weight form a reflexive control loop—e.g., 'security' (word), a locked gate (symbol), and "protection" (meaning) might encode surveillance, not safety. The sum (three decoded pieces) doesn’t capture the whole (a governance-subversion nexus).

- Theory Building: This gestalt warns us to avoid reductionism. A cribsheet must account for this synergy, ensuring users don’t just tally parts but synthesize them into a systemic counter-strategy.

Revised Cribsheet: A Triad with PLCMEGS

Here’s how the cribsheet integrates the triad as complementary meronyms, using PLCMEGS to unify their insights:

Triad Analysis Process

- Start with One Meronym: Pick an entry point based on the context—words (e.g., 'crisis'), symbols (e.g., a corporate logo), or meanings (e.g., 'progress').

- Cross-Map with PLCMEGS: Apply all seven lenses to the chosen part, but flag gaps only the other two can fill.

- Cycle Through the Triad: Use each tool to inform the others, building a composite picture.

- Synthesize the Gestalt: Identify the emergent intent or vulnerability the parts alone can’t reveal.

- Act Holistically: Craft a response targeting the system, not just the fragments.

1. Anticryptosociolinguistics (Language Meronym)

- Role: Decodes verbal triggers and substitutions.

- Steps with PLCMEGS: Spot buzzwords (Mass Media), test psychological pull (Psychology), trace governance use (Governance).

- Limit: Misses symbolic or semantic depth—e.g., 'freedom' alone lacks context without its flag or ideology.

- Complementary Need: Feeds into semiotics for visuals and semantics for intent.

2. Anticryptosociosemiotics (Signs/Symbols Meronym)

- Role: Unmasks cryptosemiotic codes and polysemic shifts in symbols.

- Steps with PLCMEGS: Catalog signs (Culture), map meanings (Literacy), check subversive twists (Subversion).

- Limit: Symbols like a dove are inert without the words or meanings animating them.

- Complementary Need: Relies on linguistics for phrasing and semantics for cultural weight.

3. Anticryptosociosemantics (Meanings Meronym)

- Role: Reveals encrypted meaning systems and their polysemic load.

- Steps with PLCMEGS: Identify concepts (Culture), analyze economic drivers (Economics), probe psychological hooks (Psychology).

- Limit: 'Success' as a concept floats without linguistic anchors or symbolic cues.

- Complementary Need: Needs linguistics for expression and semiotics for embodiment.

Triad Synthesis Example

- Case: A campaign pushes 'unity' (word), a clasped-hands logo (symbol), and 'togetherness' (meaning).

- PLCMEGS Flags: Mass Media repeats it, Psychology taps belonging, Economics hides profiteering, Subversion sows compliance.

- Triad Cycle: Linguistics flags 'unity' as vague, semiotics ties the logo to a corporate ad, semantics links 'togetherness' to consumerism.

- Gestalt: Not just three clues, but a systemic PSYOP to pacify dissent under a feel-good veneer.

- Action: Expose the triad publicly—redefine 'unity' as resistance, reframe the logo as greed, and shift 'togetherness' to equity.

Cribsheet Format

- Layout: Single page with a three-circle Venn diagram—each circle a meronym, overlapping at 'PLCMEGS Synthesis.' Steps listed in each, with arrows showing flow between them.

- Table: Columns: 'Linguistic Clue,' 'Semiotic Clue,' 'Semantic Clue,' 'PLCMEGS Hits,' 'Emergent Intent,' 'Triad Counter.'

- Visual: A 'Triad Alert' box: 'If one part flags, check the others—don’t stop at the sum.'

- Quick Rule: 'All three + PLCMEGS = the real code. Parts alone mislead.'

Accounting for the Gestalt in Theory

- Design Principle: The cribsheet prioritizes synthesis over silos. Users must ask: 'What’s the whole this builds?'—e.g., not just a word shift, but a cultural trap.

- Emergent Value: The triad catches systemic exploits (e.g., governance-economic collusion via media) that isolated tools miss, vital for literacy-deficient contexts.

- Meronymic Balance: Each part is calibrated to need the others, preventing over-reliance on one lens and ensuring holistic literacy.

Deployment

- Training: Hour-long session—users analyze a live case (e.g., 'safety' in policy) through the triad, spotting the gestalt (e.g., control, not care).

- Use: Lawmakers decode bills, peacekeepers read local signs, advocates challenge narratives—all cycling the triad.

- Check: Post-use, users note if the whole shifted their initial read, refining the theory."

_______________________________________________________

#Waoza. That's enough for tonight,,,

This is the best I can offer at present.

#eT_info

#TWS_Lit

Thank you for tuning in,,,

______________________________________________________

______________________________________________________

______________________________________________________

√P + √L + √C + √M + √E + √G + √S = CSL

ACSL ≈ √CSL

~P + ~L + ~C + ~M + ~E + ~G = √ACSL

______________________________________________________

______________________________________________________

______________________________________________________

L.W. Otteson

Social scientist, student, & writer

2048 US President?

http://www.lwotteson.com
Previous
Previous

#78 - IC: CmF

Next
Next

#76: Envisaging 2050 Vision