Security always implies a tradeoff: you sacrifice user convenience in exchange for security. In a computer system, we see this when a VPN is setting up a secure connection, because it often takes minutes to exchange and validate all the credentials passed back and forth in order to establish a secure key. We also see it whenever our computers demand a password or other login information, which verifies that the user has permission to do whatever has been requested. It’s a pain, but it’s necessary.
The Security Unit of the brain serves two key functions: it filters out frivolous information that doesn’t need to reach the rest of your mind’s systems, and it filters out information that contradicts established patterns in the mind. It’s as though some things have a special key required to reach the subconscious, and other things do not. Unfortunately for us, the kind of information required to reprogram the mind is almost always without that key.
Like most people, you don’t have the password to root control of your mind. It’s like being locked out of your own house, or locking your keys inside your car. When security keeps you out of something you own, it’s time to start hacking.
Bypassing the Security Unit
Hypnotists employ the ABS model in order to send information to the subconscious. The ABS Model is as follows:
Absorb attention. When you’re not paying attention, some things slip through, but it’s hard to control. However, things you pay attention to are more likely to be processed and retained than things to which you pay no attention. That’s why it’s so useful to take notes during classes – taking dictated notes and condensing them is a difficult cognitive process that requires focus, and thus you’re more likely to retain that information after the class is over. It’s a case in which you actively mark some data “important” to the Security Unit, and it gets increased priority.
Bypass the Critical Factor. The “critical factor” is the hypnosis term for the Security Unit. As we’ve already noted, the security unit is responsible for filtering inputs against established patterns and discarding them if they do not match. If you want to inject new ideas and patterns into the hardware, you usually have to find a way to bypass the security unit first.
Stimulate the subconscious. Once you get past the security, you have to create inputs that are compelling to the subconscious. Because it’s a pattern and emotion machine, it’s usually best to avoid raw data in favor of stories, visualizations, and rhetorically-driven communications. If you don’t get into the hardware while the security unit is flummoxed, you have a good chance of it reengaging before any real programming is done. On the other hand, once you get in and start manipulating the hardware, it creates a sort of security tunnel you can use to slip past the security more readily and stay inside the hardware longer.
Many, if not most, of the techniques I will lay out are designed around this system. As most exploits revolve around the same basic patterns, so too do most mental exploits revolve around such basic patterns.
I don’t expect you to understand all of this at once, or even for you to immediately believe it. You can choose whether to embrace this now or practice the techniques first, because fundamentally these techniques work on everyone. If you can keep an open mind, which means that you try the techniques and consider the patterns underlying them, then you can increase your control of your subconscious hardware very quickly.