Menu
News
All News
Dungeons & Dragons
Level Up: Advanced 5th Edition
Pathfinder
Starfinder
Warhammer
2d20 System
Year Zero Engine
Industry News
Reviews
Dragon Reflections
White Dwarf Reflections
Columns
Weekly Digests
Weekly News Digest
Freebies, Sales & Bundles
RPG Print News
RPG Crowdfunding News
Game Content
ENterplanetary DimENsions
Mythological Figures
Opinion
Worlds of Design
Peregrine's Nest
RPG Evolution
Other Columns
From the Freelancing Frontline
Monster ENcyclopedia
WotC/TSR Alumni Look Back
4 Hours w/RSD (Ryan Dancey)
The Road to 3E (Jonathan Tweet)
Greenwood's Realms (Ed Greenwood)
Drawmij's TSR (Jim Ward)
Community
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Resources
Wiki
Pages
Latest activity
Media
New media
New comments
Search media
Downloads
Latest reviews
Search resources
EN Publishing
Store
EN5ider
Adventures in ZEITGEIST
Awfully Cheerful Engine
What's OLD is NEW
Judge Dredd & The Worlds Of 2000AD
War of the Burning Sky
Level Up: Advanced 5E
Events & Releases
Upcoming Events
Private Events
Featured Events
Socials!
EN Publishing
Twitter
BlueSky
Facebook
Instagram
EN World
BlueSky
YouTube
Facebook
Twitter
Twitch
Podcast
Features
Top 5 RPGs Compiled Charts 2004-Present
Adventure Game Industry Market Research Summary (RPGs) V1.0
Ryan Dancey: Acquiring TSR
Q&A With Gary Gygax
D&D Rules FAQs
TSR, WotC, & Paizo: A Comparative History
D&D Pronunciation Guide
Million Dollar TTRPG Kickstarters
Tabletop RPG Podcast Hall of Fame
Eric Noah's Unofficial D&D 3rd Edition News
D&D in the Mainstream
D&D & RPG History
About Morrus
Log in
Register
What's new
Search
Search
Search titles only
By:
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions, OSR, & D&D Variants
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Menu
Log in
Register
Install the app
Install
Upgrade your account to a Community Supporter account and remove most of the site ads.
Community
General Tabletop Discussion
*Geek Talk & Media
The Difference between Disappearing for Awhile and Becoming Invisible
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Jack7" data-source="post: 5167416" data-attributes="member: 54707"><p>I intend to assist with a DARPA project soon. I consider DARPA to be generally well ahead of the government, and sometimes well ahead of the military as well. Some of their projects are kinda kooky, and are less impressive than others. But a lot that is valuable stems from DARPA projects, and related sub-contracted University R&D projects.</p><p></p><p></p><p></p><p></p><p>No Janx, I cannot post extracts from the paper itself, as I intend to publish it in a book of essays, and maybe as a supplement to the <em>Book of Intelligence Designs</em>. I will share part of the original intro I wrote on it. It is a sort of skeletal synopsis of intent and usage. By the way, maybe you can't track down the guy who hit and run you, but if you make the right contacts, someone can. A PIIN by the way is also a <em>"favors network."</em> Make friends with your contacts, and be as willing to help them with their needs, as you would like them to be in servicing your needs.</p><p></p><p>You can use your own personal PIIN to do or achieve anything you wish. What you choose to do is up to you. I have used my PIIN to gather Intel, to assist with investigations, as a business networking system, to secure editors, to submit papers and projects (and bid upon them), as a brokering network (I used to be a business broker), to contact people, to track down people, for academic and technical research, to contact professors, to keep in touch with old friends, to secure agents, to establish a network of missionaries I help escape from dangerous situations (on occasion), to assist with scientific research and to assist with experiments, to make political contacts, to help fund non-profit projects, to train, and to help generate seed money, to obtain little known or obscure information, etc. What you decide to do with yours is up to you really, depending upon how you structure it, the quality of your contacts, and what you want it to achieve. I would call no use of the PIIN small minded per se, if it assists you in being successful in whatever endeavor you are pursuing. Some goals may be smaller or larger than others, but the PIIN can theoretically assist with any objective. Practice establishing, maintaining, and using your networks will make you a better and more successful networked. And a good network will secure things for you that you will find impossible to secure entirely upon your own. </p><p></p><p>I used to keep different PIINs for different functions. Now I just keep one PIIN, broken into categories, and with contact information, area of expertise, and special notes. This is how I structure my current PIIN, the categories it is broken into, etc. It's based on my same basic categories for the Renaissance Gild as lately I have been redoing and collating my file and papers to make every subject and document "compatible" and of a similar format to every other subject and document. That way I can make my files and documents <em>universal</em>, easy to search, and cross reference for related materials and ideas. Slowly I'm converting all of my documents, ideas, papers, files, etc. into a more information friendly format, that is easier to access, track, search, and utilize. Below is the basic structure of my current PIIN, followed by the original paper intro. I hope that answered your questions. I've been on vacation, so I wrote fast and I'm going to bed now. See ya later. Good luck to ya.</p><p></p><p></p><p style="text-align: center"><strong>THE PIIN</strong></p> <p style="text-align: center"><strong></strong></p> <p style="text-align: center"><strong>PRIVATE (or PERSONAL) INTELLIGENCE AND INVESTIGATIVE NETWORK</strong></p><p></p><p> </p><p>ACADEMIC/SCHOLARLY</p><p> </p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>ARTISTIC</p><p> </p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>AVOCATIONS</p><p></p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>BANKING/ECONOMICS/FINANCE</p><p></p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>BUSINESS/INDUSTRY/SMALL BUSINESS</p><p></p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>GENERAL</p><p></p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>GOVERNMENT/PUBLIC SERVICE</p><p> </p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>LAW ENFORCEMENT/INTELLIGENCE</p><p> </p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>LEGAL</p><p> </p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>MILITARY/INTELLIGENCE</p><p> </p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>PERSONAL BUSINESS AGENT (PBA) or PERSONAL BUSINESS FACILITATOR (PBF)</p><p> </p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>RELIGIOUS</p><p></p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p>SCIENTIFIC </p><p></p><p>Name Contact (Method, Address, Type) Special Note</p><p></p><p></p><p></p><p></p><p><strong>Introduction:</strong></p><p></p><p>In the modern world the individual man and woman will often find themselves in need of a wide range of intelligence, information, and expertise for various purposes necessary to the accomplishment of whatever objectives they desire to pursue, obtain, and fulfill. To this end the establishment and development of a PIIN, or Personal Intelligence and Investigative Network may often prove crucial or even vital to the successful achievement of whatever those desired objectives might be. Because of this fact it is my intention herein to briefly outline the constituent elements of and some of the potential uses of the Personal Intelligence and Investigative Network.</p><p></p><p>First of all, let me summarize the nature of the PIIN. The Personal Intelligence and Investigative Network, like all networks is almost entirely dependent upon a series of established contact points. This is both the strength of the PIIN and the inherent weakness thereof. Therefore it is imperative that high-quality and functionally useful, as well as accurate and practical contact points be created, assessed and reassessed, and maintained over time. This is true whether the contact point is physical, biological, communicative, informational, electronic, or computational. Every asset is a tool and the quality and functionality of those tools are the essential elements in the creation, maintenance, and performance of your PIIN. The Value of any Network is circumscribed by the acute and chronic qualities of those components which within themselves compose the actual circumference and separate elements of that real network. If the components of the network are of inferior grade, if the contacts are defectively impositional or of little practical use, or if the contact points are weak or insecure then the entire network is suspect and prone to failure at any and every point of transmission. The PIIN therefore should avoid both obvious and subtle deficits at all times by being practically and pragmatically useful, flexible, adaptable, in a state of constant positive growth and change, accessible, composed of superior components and contact points, secure, and most of all accurate and reliable.</p><p></p><p>Each and every network is therefore dependent upon the depth and breadth of the human contacts established interior to and exterior to that particular network and subject to the limitations of accuracy and the quality and quantity of valuable information that network can generate. The first real action needed to establish any PIIN and to make it fully functional is the recruitment, development, and maintenance of quality contacts. Contacts are always of the most absolute importance in the establishment of any PIIN. In addition the nature and quality of those contacts should be viewed as central and formative to the capabilities of every other contact point in the configuration and to the network as a whole. After an initial establishment of contacts those contacts should be immediately vetted and/or tested for accuracy and quality. This process of discrimination should be both an immediate tactical and testable undertaking and a long-term strategic process of recurring verification and reverification. Do not expect any particular source to be always accurate, but do not allow any particular source to function in an important role unless it has proven itself capable of both consistent reliability and trustworthiness.</p><p></p><p>After establishing a few reliable and trustworthy contact points the network must grow in order to gain new sources of information and intelligence as well as to develop and generate new capabilities. Therefore always view already established contacts and contact points as generators of new contacts, informants, intelligence and perhaps even secondary and tertiary networks, or sub-networks. Consider as well every potentially useful new contact or acquaintance as a possible future contact point in your greater network. Contact points should also be capable of redundancy and potential verification of information and intelligence gathered from other points along the nexus and for information gathered from sources outside the network. This is to say that contact points are more than simple sources of information; they will also function as multi-capable nodes along the operational structure of the entire network. I will expound upon the importance of and discuss the details regarding contact points later in this paper. For now it is important to remember that contacts and sources provide information and possibly intelligence, but contact points can potentially serve many varied functions, such as; information, intelligence, analysis, communications, coding, encryption, decoding/decryption, collation, research, as reliable and secure relay points, as information nodes, computational capabilities, disinformation and misinformation, and even serve as a sort of network disguise and misdirectional cover or front.</p><p></p><p>Constantly look for, search out and develop new contacts, contact points, information and intelligence sources, and informants in order to successfully grow your network. Your network’s ultimate effectiveness will depend upon both the quality and quantity of your contacts, contact points, and your contact’s network. In the initial stages of building and developing your network concentrate on the quality of your contacts and contact points, but in the larger and long term concentrate upon both the quality and quantity of those contacts and contact points which comprise the elements of your network. Always develop and maintain quality to the greatest degree possible within all elements of your network, but also always grow and encourage quantity in the most consistent manner possible throughout all aspects of your network. This will assure that your network has both great depth and breadth and that it is capable of the widest and most valuable range of flexible and functional capacities possible.</p><p></p><p>It does not matter what the major focus of your network is, what it is most well designed to do, what it in actuality best does, or what the functional intent(s) or objective(s) may be, this introductory advice applies equally well to any possible network you might desire to establish in any field of activity or enterprise. The PIIN is a potentially invaluable tool for both the amateur and professional alike, and no matter the function or objective, the real capabilities of any established PIIN will be determined by the inventiveness, innovation, flexibility, enterprise, imagination and quality of the component parts of the network. And those component parts are composed and arranged by the originator of the network, that individual who is responsible for first establishing the nature and parameters of the own individual PIIN. The originator therefore will establish the genesis of the network and how well it grows and develops in the initial stages, but as the network grows it will develop capabilities never originally imagined by the originator and will eventually become functional in an almost independent sense, as long as quality contacts and sources are developed and as long as those contacts and sources continue to grow and establish new capabilities and contacts of their own. A PIIN begins therefore as an idea and individual construct but over time develops into an almost biological organization of vast capacity. Drawing upon the collective skills and capabilities of the PIIN for whatever is desired or needed makes the PIIN a worthwhile and profitable venture for all individuals associated with that network and because of the potential for continued and even exponential growth the PIIN is an extremely advantageous system of achieving complex objectives rapidly and of multiplying capabilities well beyond the individual level.</p><p></p><p>End Introduction.</p><p></p><p><strong>P.S.:</strong> Some of the above didn't format properly, but I hope it was still readable.</p><p></p><p><strong>P.P.S.:</strong> By the way, I'm starting to integrate some of my internet accounts into the same basic format structure as my PIIN, so that things like Facebook will become part of my PIIN. It multiplies PIIN capabilities even further in that way.</p><p></p><p><strong>P.P.P.S.:</strong> I've also built in-game PIINs. And encourage all of my players to do so as well. If you've got a good DM this can give you good, imaginative practice on how you might build up a useful PIIN in real life. Innovation and imagination are useful in building up good PIINs. Now I really gotta go to bed. See ya.</p></blockquote><p></p>
[QUOTE="Jack7, post: 5167416, member: 54707"] I intend to assist with a DARPA project soon. I consider DARPA to be generally well ahead of the government, and sometimes well ahead of the military as well. Some of their projects are kinda kooky, and are less impressive than others. But a lot that is valuable stems from DARPA projects, and related sub-contracted University R&D projects. No Janx, I cannot post extracts from the paper itself, as I intend to publish it in a book of essays, and maybe as a supplement to the [I]Book of Intelligence Designs[/I]. I will share part of the original intro I wrote on it. It is a sort of skeletal synopsis of intent and usage. By the way, maybe you can't track down the guy who hit and run you, but if you make the right contacts, someone can. A PIIN by the way is also a [I]"favors network."[/I] Make friends with your contacts, and be as willing to help them with their needs, as you would like them to be in servicing your needs. You can use your own personal PIIN to do or achieve anything you wish. What you choose to do is up to you. I have used my PIIN to gather Intel, to assist with investigations, as a business networking system, to secure editors, to submit papers and projects (and bid upon them), as a brokering network (I used to be a business broker), to contact people, to track down people, for academic and technical research, to contact professors, to keep in touch with old friends, to secure agents, to establish a network of missionaries I help escape from dangerous situations (on occasion), to assist with scientific research and to assist with experiments, to make political contacts, to help fund non-profit projects, to train, and to help generate seed money, to obtain little known or obscure information, etc. What you decide to do with yours is up to you really, depending upon how you structure it, the quality of your contacts, and what you want it to achieve. I would call no use of the PIIN small minded per se, if it assists you in being successful in whatever endeavor you are pursuing. Some goals may be smaller or larger than others, but the PIIN can theoretically assist with any objective. Practice establishing, maintaining, and using your networks will make you a better and more successful networked. And a good network will secure things for you that you will find impossible to secure entirely upon your own. I used to keep different PIINs for different functions. Now I just keep one PIIN, broken into categories, and with contact information, area of expertise, and special notes. This is how I structure my current PIIN, the categories it is broken into, etc. It's based on my same basic categories for the Renaissance Gild as lately I have been redoing and collating my file and papers to make every subject and document "compatible" and of a similar format to every other subject and document. That way I can make my files and documents [I]universal[/I], easy to search, and cross reference for related materials and ideas. Slowly I'm converting all of my documents, ideas, papers, files, etc. into a more information friendly format, that is easier to access, track, search, and utilize. Below is the basic structure of my current PIIN, followed by the original paper intro. I hope that answered your questions. I've been on vacation, so I wrote fast and I'm going to bed now. See ya later. Good luck to ya. [CENTER][B]THE PIIN PRIVATE (or PERSONAL) INTELLIGENCE AND INVESTIGATIVE NETWORK[/B][/CENTER] ACADEMIC/SCHOLARLY Name Contact (Method, Address, Type) Special Note ARTISTIC Name Contact (Method, Address, Type) Special Note AVOCATIONS Name Contact (Method, Address, Type) Special Note BANKING/ECONOMICS/FINANCE Name Contact (Method, Address, Type) Special Note BUSINESS/INDUSTRY/SMALL BUSINESS Name Contact (Method, Address, Type) Special Note GENERAL Name Contact (Method, Address, Type) Special Note GOVERNMENT/PUBLIC SERVICE Name Contact (Method, Address, Type) Special Note LAW ENFORCEMENT/INTELLIGENCE Name Contact (Method, Address, Type) Special Note LEGAL Name Contact (Method, Address, Type) Special Note MILITARY/INTELLIGENCE Name Contact (Method, Address, Type) Special Note PERSONAL BUSINESS AGENT (PBA) or PERSONAL BUSINESS FACILITATOR (PBF) Name Contact (Method, Address, Type) Special Note RELIGIOUS Name Contact (Method, Address, Type) Special Note SCIENTIFIC Name Contact (Method, Address, Type) Special Note [B]Introduction:[/B] In the modern world the individual man and woman will often find themselves in need of a wide range of intelligence, information, and expertise for various purposes necessary to the accomplishment of whatever objectives they desire to pursue, obtain, and fulfill. To this end the establishment and development of a PIIN, or Personal Intelligence and Investigative Network may often prove crucial or even vital to the successful achievement of whatever those desired objectives might be. Because of this fact it is my intention herein to briefly outline the constituent elements of and some of the potential uses of the Personal Intelligence and Investigative Network. First of all, let me summarize the nature of the PIIN. The Personal Intelligence and Investigative Network, like all networks is almost entirely dependent upon a series of established contact points. This is both the strength of the PIIN and the inherent weakness thereof. Therefore it is imperative that high-quality and functionally useful, as well as accurate and practical contact points be created, assessed and reassessed, and maintained over time. This is true whether the contact point is physical, biological, communicative, informational, electronic, or computational. Every asset is a tool and the quality and functionality of those tools are the essential elements in the creation, maintenance, and performance of your PIIN. The Value of any Network is circumscribed by the acute and chronic qualities of those components which within themselves compose the actual circumference and separate elements of that real network. If the components of the network are of inferior grade, if the contacts are defectively impositional or of little practical use, or if the contact points are weak or insecure then the entire network is suspect and prone to failure at any and every point of transmission. The PIIN therefore should avoid both obvious and subtle deficits at all times by being practically and pragmatically useful, flexible, adaptable, in a state of constant positive growth and change, accessible, composed of superior components and contact points, secure, and most of all accurate and reliable. Each and every network is therefore dependent upon the depth and breadth of the human contacts established interior to and exterior to that particular network and subject to the limitations of accuracy and the quality and quantity of valuable information that network can generate. The first real action needed to establish any PIIN and to make it fully functional is the recruitment, development, and maintenance of quality contacts. Contacts are always of the most absolute importance in the establishment of any PIIN. In addition the nature and quality of those contacts should be viewed as central and formative to the capabilities of every other contact point in the configuration and to the network as a whole. After an initial establishment of contacts those contacts should be immediately vetted and/or tested for accuracy and quality. This process of discrimination should be both an immediate tactical and testable undertaking and a long-term strategic process of recurring verification and reverification. Do not expect any particular source to be always accurate, but do not allow any particular source to function in an important role unless it has proven itself capable of both consistent reliability and trustworthiness. After establishing a few reliable and trustworthy contact points the network must grow in order to gain new sources of information and intelligence as well as to develop and generate new capabilities. Therefore always view already established contacts and contact points as generators of new contacts, informants, intelligence and perhaps even secondary and tertiary networks, or sub-networks. Consider as well every potentially useful new contact or acquaintance as a possible future contact point in your greater network. Contact points should also be capable of redundancy and potential verification of information and intelligence gathered from other points along the nexus and for information gathered from sources outside the network. This is to say that contact points are more than simple sources of information; they will also function as multi-capable nodes along the operational structure of the entire network. I will expound upon the importance of and discuss the details regarding contact points later in this paper. For now it is important to remember that contacts and sources provide information and possibly intelligence, but contact points can potentially serve many varied functions, such as; information, intelligence, analysis, communications, coding, encryption, decoding/decryption, collation, research, as reliable and secure relay points, as information nodes, computational capabilities, disinformation and misinformation, and even serve as a sort of network disguise and misdirectional cover or front. Constantly look for, search out and develop new contacts, contact points, information and intelligence sources, and informants in order to successfully grow your network. Your network’s ultimate effectiveness will depend upon both the quality and quantity of your contacts, contact points, and your contact’s network. In the initial stages of building and developing your network concentrate on the quality of your contacts and contact points, but in the larger and long term concentrate upon both the quality and quantity of those contacts and contact points which comprise the elements of your network. Always develop and maintain quality to the greatest degree possible within all elements of your network, but also always grow and encourage quantity in the most consistent manner possible throughout all aspects of your network. This will assure that your network has both great depth and breadth and that it is capable of the widest and most valuable range of flexible and functional capacities possible. It does not matter what the major focus of your network is, what it is most well designed to do, what it in actuality best does, or what the functional intent(s) or objective(s) may be, this introductory advice applies equally well to any possible network you might desire to establish in any field of activity or enterprise. The PIIN is a potentially invaluable tool for both the amateur and professional alike, and no matter the function or objective, the real capabilities of any established PIIN will be determined by the inventiveness, innovation, flexibility, enterprise, imagination and quality of the component parts of the network. And those component parts are composed and arranged by the originator of the network, that individual who is responsible for first establishing the nature and parameters of the own individual PIIN. The originator therefore will establish the genesis of the network and how well it grows and develops in the initial stages, but as the network grows it will develop capabilities never originally imagined by the originator and will eventually become functional in an almost independent sense, as long as quality contacts and sources are developed and as long as those contacts and sources continue to grow and establish new capabilities and contacts of their own. A PIIN begins therefore as an idea and individual construct but over time develops into an almost biological organization of vast capacity. Drawing upon the collective skills and capabilities of the PIIN for whatever is desired or needed makes the PIIN a worthwhile and profitable venture for all individuals associated with that network and because of the potential for continued and even exponential growth the PIIN is an extremely advantageous system of achieving complex objectives rapidly and of multiplying capabilities well beyond the individual level. End Introduction. [B]P.S.:[/B] Some of the above didn't format properly, but I hope it was still readable. [B]P.P.S.:[/B] By the way, I'm starting to integrate some of my internet accounts into the same basic format structure as my PIIN, so that things like Facebook will become part of my PIIN. It multiplies PIIN capabilities even further in that way. [B]P.P.P.S.:[/B] I've also built in-game PIINs. And encourage all of my players to do so as well. If you've got a good DM this can give you good, imaginative practice on how you might build up a useful PIIN in real life. Innovation and imagination are useful in building up good PIINs. Now I really gotta go to bed. See ya. [/QUOTE]
Insert quotes…
Verification
Post reply
Community
General Tabletop Discussion
*Geek Talk & Media
The Difference between Disappearing for Awhile and Becoming Invisible
Top