[spam][crazy] thoughts on infiltration (automated or manual)
are you a homeless hacker mysteriously targeted by a military spy agency? well, take notes! this is high-value classified shit you’re experiencing, - defend trust paths aggressively it seems like once you have a foot in the door it’s very important to defend that foot. even if the reason somebody believes it is totally bogus, make that bogus thing reality if need be. send things in to make sure that foot is never kicked it, and keep up the chatter so the story keeps the door open. this does indeed make a mysterious situation where everybody does irrational things and is scared to talk about it, but it works!
an alternative title for this thread was “how to hack boss” basically you infiltrate him with reality very skillfully
- find modes of influence that are unmoderated the naive infiltrator may go straight for the major communication hubs, but these hubs moderate what people are consciously aware of. instead, look for memes, subconscious behaviors, fads, emotional flows, pets, digital things etc that people will refrain from discussing and may even already avoid discussing. here this avoidance can be amplified similar to protecting trust paths. then of course take the communication hubs after you’re well established in a subtle way
[fumbled expression: the ideal form of influence is a changing of accepted stories and messages established via unmoderated modes. this can be done in careful steps and in ways similar to what already exists, and used to defend and prepare for other approaches [lay the groundwork]]
[obv look for moments and things of greatest opportunity for decisive influence strikes, such as a decision maker or a body responsible for carrying out decisions. errors present. closingish.]
participants (1)
-
Undescribed Horrific Abuse, One Victim & Survivor of Many