This is the second of a three-part series on the insidious techniques of trolls, spooks, feds, saboteurs, provocateurs, and disinformants. As you read about these dirty tricks, you may have a sense of deja-vu.
This is Part 2 of a three-part series on the insidious techniques of trolls, spooks, feds, saboteurs, provocateurs, disinformants — whatever you wish to call them.
These techniques were posted anonymously on the Internet some time ago. They appear to have been written by a professional troll for the “benefit” of less experienced trolls on how to prevent the sharing of inconvenient facts on political forums. As we pointed out in Part 1, we would normally not publish such material because we cannot verify any of it.
And yet… we feel we have seen every one of these methods in action.
As you read this, you may have a sense of deja-vu. Or you may have witnessed yet other maneuvers not described below. We encourage you to add your own observations to this ongoing collection. We would love to hear from you.
It is probably unnecessary, but we are obliged to make this statement: Far from endorsing these attempts to hijack free and open discourse, we believe that exposing them can help blunt their power to confuse and control. Forewarned is forearmed.
********************************************************************
Note to readers: The following is the text found on the Internet, as discussed above. The source and background are unknown.
********************************************************************
Avoid, Avoid, Avoid
Avoid discussing issues head-on. Rather, get your point across by implying it. Avoid the subject of proof or references documenting your own position.
Deny, Deny, Deny
No matter what evidence is offered, deny it has any relevance, credibility, proof, or logic. No matter what expert is named, deny his or her authority. Deny that statements made by government or other authorities have any meaning or relevance. Deny that witnesses are reliable. Cite studies on eyewitness credibility.
Present False Evidence
Whenever possible, manufacture new “facts” to conflict with opponent presentations.
Invoke Authority
Associate yourself with authority, but avoid specifically discussing your credentials, while implying your authority and expertise. Present your argument with “jargon” and “minutiae” to illustrate you are “one who knows.” Then simply dismiss your opponent’s comments without demonstrating concretely why or citing sources.
Quote Anti-Conspiracy Experts
Depending on the situation, you may find it useful to point out that people have a psychological need to believe in conspiracy. A number of people — psychiatrists, psychologists, sociologists, political scientists, and journalists — have written books and articles on this theme. And some even have shown that humans are hard-wired to find connections between events that do not exist. You should familiarize yourself with this literature, and have a ready arsenal of quotes to post.
Fit Facts to Suit Alternate Conclusions
Think like the attorney who manages to make someone else look guilty of the crime his client is charged with — using the same evidence.
Label it a “Wild Rumor”
Avoid discussing issues by describing all charges, regardless of evidence, as mere rumors and wild accusations. If you can associate the material with the Internet, use this fact to certify it a ”wild rumor.”
Change the Subject
Find a way to sidetrack the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can “argue” with you over the new topic, and polarize the discussion arena in order to avoid discussing more key issues.
Demand Impossible Proof
No matter what evidence is presented, raise the bar. Demand the kind of proof that is impossible for the opponent to come by.
Demand Complete Solutions
Avoid issues by requiring opponents to solve every detail of the issue.
Label it “An Enigma with No Solution”
Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes people to lose interest.
Grasp at Straw Men
Select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way that appears to debunk all the charges, while actually avoiding discussion of the real issues.
Become Indignant
Focus on side issues which can be used to suggest your opponent is critical of some sacrosanct group or theme. This is also known as the “How dare you!” gambit. For example, if your opponent criticizes the Israeli government, call him or her an “antisemite.”
Hit and Run
Briefly attack your opponent — then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon to make new accusations — and never answer any subsequent response.
Goad Opponents
Taunt your opponents. Draw them into emotional responses. Make them lose their cool and become less coherent. Then focus on how “sensitive they are to criticism.”
Question Motives
Twist or amplify any fact which could be used to imply your opponent operates out of a hidden agenda or bias. This avoids discussing issues and forces the accuser on the defensive.
Shoot the Messenger
Label your opponents “kooks,” “right-wing,” “liberal,” “left-wing,” “terrorists,” “conspiracy buffs,” “radicals,” “militias,” “racists,” “religious fanatics,” “sexual deviants,” and so forth. This makes others shrink from supporting you out of fear of gaining the same label.
Play the Victim
Select a minor error of your own that was among many, larger problems pointed out by your opponent. Then take the “high road and “confess” your “honest mistake, discovered in hindsight.” Blame it on bad sources. Then accuse your opponent of blowing it all out of proportion and implying worse things which “just aren’t so.” Later, others can reinforce this on your behalf, and “call for an end to the nonsense.” You have already “done the right thing.” This can garner respect, even sympathy, for “’owning up” to your mistake. And in the meantime, all of your opponent’s proof of the more serious issues will be discarded. People will be tired of the subject and will want to move on.
Dirtiest Trick of All, So Far
There is yet another tactic that seems to be in widespread use in forums on the JFK assassination, and it is the ultimate con: Disinformants earn trust by establishing themselves as conspiracy theorists. They often “prove” it by recycling, then repackaging, the stolen work of others. (Since the information is already out there in the ether, they are not really damaging the cover-up.) Or they may present a new theory,one that sounds good but is actually nonsense.
Once established, they abuse this undeserved trust in many ways, including the following: (a) they discredit the work of real researchers, mostly on their say so, rather than providing proof; (b) they attack the reliability of critical eye-witnesses; and (c) they support key points of the official narrative — points not related to their “own” work. For example, while presenting a theory on JFK’s head wound, they may parenthetically slip in support for the single bullet theory, an issue that does not involve the head.
Many of these people are depressingly mediocre in intellect, and are not very good at what they do in any arena. Their dirty work in the JFK arena is also not very good, and frequently arouses suspicion in other researchers, and even in members of the general public. Often, they contrast themselves with those who openly defend the official story, using the tactics described above. They say, “I’m not a spook. That’s a spook!” And they fiercely support each other, using their large numbers to gang up on their accusers, trying to intimidate them, or to just exhaust them with endless confrontation. In the forums they control, they will have the last word. Fortunately, those who have the last word do not necessarily inspire the last thought.
Selective List of Related WhoWhatWhy stories:
Why We Should be Thankful for the Cold (Not related to Cointelpro, but listed because of the typical examples of disinformation deposited in the Comments following the article.)
Was Tamerlan Tsarnaev a Double Agent Recruited by the FBI?
FBI Sat Back While Snitch Directed Cyber Attacks and potentially Entrapped Others
The Mystery of the Constant Flow of JFK Disinformation
FBI Uses Counterterrorism Authority to Infiltrate and Surveil Peaceful Protests… Again
WHYTV -The FBI, Blacks,and Cointelpro,
William Turner: From G-Man to Newsman
Tribute to the Man Who Exposed the Pentagon Papers
Jeb Bush Family Values: Meth and Dirty Tricks
The US Left: A Short Introduction
The Deaths of JFK, RFK— and the Silence of the Lambs
TVWHY: Russ Baker in St. Paul, Excerpt 1- Troublemakers
Related front page panorama photo credit: Adapted by WhoWhatWhy from Trollface (Azzy10 / Wikimedia – CC BY-SA 4.0)