It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Interesitng table of strategies for those who wish to know

page: 1

log in


posted on Aug, 2 2013 @ 07:36 PM
Do This [To Get This]

Keep the public ignorant [Less public organization]
Maintain access control [Required reaction to output (prices, sales)]
Create preoccupation [Lower defenses]
Attack the family unit [Control the education of the young]
Give less cash and more credit and dole [More self-indulgence and more data]
Attack the privacy of the church [Destroy faith in this sort of government]
Social conformity [Computer programming simplicity]
Minimize tax protests [Maximum economic data, minimum enforcement problems]
Stabilize the consent [Simplicity coefficients]
Tighten control of variables [Simpler computer input data - greater predictability]
Establish boundary conditions [Problem simplicity / solutions of differential and difference equations
Proper timing [Less data shift and blurring]
Maximize control [Minimum resistance to control]
Collapse of currency [Destroy the faith of the American people in each other]

So far, they are successful, thank you to all who go with their strategy.

edit on 2-8-2013 by FreedomCommander because: (no reason given)

posted on Aug, 2 2013 @ 08:04 PM
the game is so tightly secure that it would take a random string of events unpredicted in their program, such as a computer virus would do to manipulate the system to do what its host wants the virus to do, in order to break the string(cycle) to bring forth a different chain of events.

it would be like a chess master facing an opponent who knows how to play chess but doesn't play by any specific set code to win.

have to strategize as if the game wasn't even there to be played in order to 'win'.

new topics

log in