Gaia Observation

Latest from NxtGen :)

Hive of the Cyclops

Hive of the Cyclops

An Expose on the Industrialisation of Education

Human beings have long valued the application of group activities to better their survival, from hunting as a pack to bring down more powerful predators and quick-witted prey, to the community gathering activities for efficient harvesting of local flora.

This application of group activities includes a natural opportunity for inter-generational…

View On WordPress

Job Slave

An Expose on Employment and Conflict


Human beings have long noted and applied the use of groups to achieve improved efficacy in hunting and gathering for survival.

This habituation to group operations has produced a hierachy of obedience and…

View Post


An Expose on Religion and the Blame Game

Human beings are very similar to their mammalian counterparts in their use of group tactics to maintain hierarchies and other social control systems.


The most common of these is the ‘many against one’…

View Post

Military Slave

An Expose on Militarism in Social Engineering

The human species is a predominantly mammalian species.

Like all mammalian species it is driven to cooperative group activies for survival against other predators and the changeable realities of climate and…

View Post

Distortion And Deception

An Expose on NLP (Neuro Linguistic Programming)

During the late 1980′s it was discovered that perception was heavily influenced by the ability to describe that perception with words.

This implied that words could alter the perception of reality.

This was…

View Post

Time is an illusion

An Expose on Temporal Relativity and the Illusions of Narrative

Most thinking persons are now aware of the nature of spatial relativity, from the highest intellectual discussions from ‘Einsteinian’ discourse, to the commonest awareness of changing…

View Post

Boundaries and Management

An Expose on Networks and Security

Human Beings are habituated to living in social networks.

These networks are of survival value in cooperation but also contain conflicted and hazardous elements due to natural social diversity.

In order to manage these conflicts and hazards the individual will develop labelling schemes for other social individuals to ascribe them levels of access to them within the network.

Thus family members tend to have greater hierarchical access than acquaintances, etc.


This network management style is a direct reflection of the developing child’s management of family members and the conflicts inherent within the family units to which it is exposed.

The first conflict in any child’s life is with the primary care giver as seen in the phenomenon of the ‘terrible twos’.

It is at this stage that the developing child gains value judgements around privacy and intimacy.

Where the child is exposed to larger, and extended family units, the demands for management of access are rapidly prioritised during development.

The method of labelling is based around trust and demonstrated by levels of exposure tolerance otherwise known as security. This security measurement is embedded in the idea of privacy.

Thus the family network is reconfigured into a hierarchy of privacy.

This hierarchy of privacy is further expanded to the wider social network as growth and expansion demand.

This is referred to as ‘well adjusted’ social development.


Effective functioning in a socially diverse environment requires that the hierarchy of privacy is respected by all members of that society.

Where the hierarchy is flouted then conflict will rapidly escalate, leading to ‘crime’ and ‘punishment’.

The labelling of people based on their trustworthiness is often habitual and subconscious.

As a result, mis-labelling can and does occur.

Such mis-labelling often produces great social conflict, and issues of exploitation and abuse.

It is not uncommon for mis-labelling to be fostered, nurtured, and encouraged, as a means of manipulation of the individual, as in corporate marketing, PR, and political rhetoric.

This behaviour is commonly seen in family dynamics with sibling rivalry, parental authoritarianism, and child exploitation (grooming).

The most common examples of such mis-labelling systems being applied in adulthood are Romance, Religion, and Tribalism.

A great deal of the modern issues in society are the result of inappropriate levels of trust, including both excessive trust and excessive mistrust.


As the individual becomes more autonomous and acquires the confidence of socialisation in the larger society, so these hierarchical values are tested both by cultural conventions and by burgeoning sexual development.

The value conflicts that arise are acted out in the wider society as part of the social development of adolescence.

Adolescence is characterised by a prioritised re-evaluation of privacy hierarchies, not just in the social sphere, but also the familial sphere.

This re-evaluation is a core adapatability of the species, allowing for cultural change and development, fostering group sustainability to a changeable environment.

Popular Culture

Due to the advent of the internet, and in particular social networking like facebook, the issues around privacy hierarchies have become centre stage in the minds of the public.

This has produced a great deal of mis-labelling, obfuscation, and confusion, as many vested interests become exposed for their flouting of the hierarchies, and conspiracies to subvert trust for profit driven exploitation.

Most of the public are now aware, even if on a near subconscious level, that their children are being groomed by the mass media, and not fostered to a healthy development.

The Future

It is noticeable that the majority of debate around these issues revolves around government versus people vs corporate gain.

All of these debates are pointless distractions, as they tunnel the vision into the artifice of polarities that has no solution, only continuing conflict of polarised opinions.

The real solution lies in the development of better authentication for privacy labelling and the agreed reinforcement of authentication for the mutual benefit of society as a whole.

This can be easily achieved by the mass discussion of critical thinking, and the relativity of tiered trust within social networks.

The tiering of Trust management must become centre stage in debate, not the puerile arguments over trust vs non-trust.

It is long past time that the public debate grew up perhaps ;)

please read, absorb, and inwardly digest :)