Greetings my children,
The days of reckoning are at hand to all the attackers against me from infragard to the mentally ill. You don’t have to take my word for it, but those who are so blatantly bold state as such on public medium like twitter.
I’ve not spoken much on the subject or for any real reason because I’ve felt it would best be saved for the “lulzageddon” which is very close at hand. This event appears to have been finally initiated after all this time of waiting by a peculiar drop here which I expected and predicted to happen in some form.
The thing is with those kind of people is they can’t have a normal healthy relationship with their fellow human beings, rather they always require that “leverage” against everyone. Twitter is like a holy congregation of such people so it’s not a surprise that you find them there en masse due to Twitter frankly not giving one fuck about what is written in their TOS. You will never find them on any other popular social medium acting that way because they enforce their TOS policies.
I am not going to define a new word but many in political circles have come to associated one with this kind of behavior which many are afflicted by. You should have probably guessed it by now but I am going to name it the “Rauhauser”. I do truly find it fascinating that people suffering from Rauhauser often form working groups using each other while documenting each other for further leverage on the other as you can see by the recent leak involving Kelly Hallissey, Neal Rauhauser, and Chet Uber.
That being said and my previous post here was a partial exposure of basic pysops employed by the less than genuine requires a more detailed explanation before any more consequent posts. The Modus Operandi that are employed by a vast and diverse crowds of individuals, groups, and organizations often for malicious ends will be more obvious to you by the time you finish reading this.
I will start with a few more common ones many may be familiar with like Appealing To Authority. This is akin to a 5 year old claiming his mummy said so and you are wrong due to the assumption his mummy, assuming of course she ever said a thing, was not only valid but correct. This can take on many forms that deviate from the standard pattern which are sometimes sneaky. Lets break it down by asking 3 simple questions as follows.
- What gives this entity the said authority on the subject?
- Is the claimed reasoning that gives said entity could be subject to bias?
- Most importantly is did this said entity of authority even claim such a thing?
The first question is generally given and is related to the second question. Many people never ask or think about these questions which is why such usages are so successful. However the most successful reason why this even works is because no one will research the said authority taking it at face value. The sourced authority can even be unrelated to the topic relying on the presumption no one will, in fact, check it. Calling that out in an improper manner often strengthens the invalid authority with aggressive response by the malicious party.
This is also often coupled with events or actions that are factual which may or may not be sourced to that authority depending on intent. A common form is throwing a few truths from an authority in front of a curve ball. This has the common result in no one even realizing it was a curve ball even if they checked the authority.
This method of attack is mentioned second as it is often used in a unholy union with Appealing To Authority. It is basically building up an argument or accusation that never was said or ever happened which is then easily attacked with an advantage. When the facts of the built straw man are given you can apply the 3 questions from the previous Appealing To Authority. The straw men always use the bases of the third question as it’s primary building material. This is what I mean by deviation from the standard Appealing To Authority being sneaky and not so easily seen.
“The rabbit-hole went straight on like a tunnel for some way, and then dipped suddenly down, so suddenly that Alice had not a moment to think about stopping herself before she found herself falling down a very deep well. “ – Alice In Wonderland by Lewis Carroll
This is the last but most important method of attack which encompasses two aspects involving what many would call “facts”. I put “facts” in quotes as this is where things get rather murky. The truth and the facts are of little consequence and are absolutely meaningless. What are facts is what you have to ask yourself. What do you consider as factual? Why? This is what is exploited and often is best demonstrated with a common saying by the religiously oriented as “What is true for me may not be true for you”. That persons own truths that he bases them on determines his perception of what is factual and what is not. This is coupled often with forgery(ies) and “facts”, which is akin to how deeply Alice falls eventually arriving at the facts when she hits the bottom, which is our perception of what is factual. Remember all that crazy shit Alice saw (steering of perception) after she hit the bottom (facts)?
Rather than give an example I think you should spend a good amount of thought on it. I will, however, add that the FBI has been the victim of this method of attack for some time by Rauhauser afflicted individuals.
Now, that is a basic crash course identifying pysops commonly employed. Can you think where have you might seen such things employed?
I might have a few ideas