Addressing the question of cunning in politics, 1 name immediately comes to mind: Niccolo Machiavelli – an outstanding typical of the realistic movement and author of the explanation of "extraordinary means". In fact, cunning is as old as the world, we meet it already in the animal kingdom, erstwhile a predator, wishing to stay unnoticed by his sacrifice, moves forward, hiding in the advanced grass. The popular French expression “ruse des Sioux” speaks of “acting a trick like the Sioux” and is synonymous with deception, dissimulation, falsehood, diversion, decoy, camouflage, deception and approach to the victim indirectly. Many mythology has created archetypal figures of cunning—especially the Norse pantheon, who invented a god named Loki, and earlier Greek goddess Metis and the god Protheus, who can take all possible forms.
Already in ancient times – around the same time and in respective cultures – there was a reflection on these topics, showing a kind of global consciousness – Zeitgeist. Between the eighth and 5th centuries B.C.E., the human head matured into the writing of many philosophical, literary, and spiritual works in which cunning took its central place. In China, it was “The Art of War”, or the Sun-Tzu compendium of various military strategies and tactics, in ancient Greece Homer wrote “Iliada” and “Odyssey”, creating the figure of Odysseus—a man of a 1000 tricks, as well as a celebrated Trojan horse, or tool for penetrating an enemy camp that entered permanently into the vocabulary of computer pirates. The first books of the Bible were made in the mediate East. In Deuteronomy chapter 20, verse 10 and 11, in a “biblical”, clear and informative style, the basics of social engineering are presented – in terms of head hacking and secret penetration of the mark system:
10. erstwhile you come to any town to get it, you offer him peace.
11. And if he answers you with peace and opens the gates, then all the people in it will become your follower and service you (UBG).
The dialectic “opening-closure” and the taking of a peaceful identity, allowing the abuse of the trust of another individual in order to force her to open the door and voluntarily abandon her vigilance, are at the heart of the human factor's hacking practice. erstwhile a individual is locked up and cautious, he can be subjected to his siege and forced to surrender, as Deuteronomy recommends in the following verses:
12. But if he doesn't make peace with you, but he'll wage war against you, you will besiege them.
13. And erstwhile the LORD thy God shall deliver them into thine hand, thou shalt kill all man in him with the edge of the sword.
Organising the siege of the mark individual in order to lead to its ‘occupation’ is an example of an indirect strategy – little costly than a frontal attack. Transferred to modern times, to fresh spheres of power – the service sector and the associated bureaucracy – the practice of besieging is called the cognitive lap (Cognitive environment), means a more subtle kind of intellectual harassment, aimed at marginalizing and then excluding the opponent from the economical and information war, theorized in France in peculiar by Christian Harbulot and the School of economical War (EGE).
War has always been not only physical and material, but besides psychological, cognitive, cultural, and semantic. The Greeks and the Romans invented sophistics, rhetoric, demagoguery and the art of persuasion, that is, what was erstwhile called propaganda, renamed liberal context into “strategic communication” and storytelling, i.e. how to tell stories that stimulate emotions and build our reality – Klaus Schwab and Thierry Malleret in their follow-up to the “Great Reset” called it “Great Narration”. (« Narratives share our perceptions, which in turn form our realities and end up up affecting our choices and actions. »)
Reflection on the art of oratorship and verbal skirmishes – and above all on how to win them at all costs – had many offspring. Medieval Christian scholasticism developed kapuistics, whose Jesuit masters were and which became synonymous with idle discussion. In the same spirit, Talmudic Judaism spawned pilpoul – An exercise of defending to the limits the absurdity of seemingly actual reasoning – and it is not crucial whether it is actually actual or logical, it is crucial that it is credible. All cultures and traditions were theorizing their own version of cunning in politics. Islam besides offers respective communication strategies that let proselytes to lull non-Muslim vigilance (couffar) as part of the jihad, or muslim war for global expansion – a key component of the globalist large Reset (cf. Jacques Attali). The most celebrated method is taqiyya, or simulation and concealment of intent, permitted by the Qur'an (Sura 3:28) as a precaution in relations with couffarAnd between the Shiite and Sunni. The another is close to taqiyya muruna, that is, the flexibility to behave during the jihad, allowing Muslims to deviate from the Qur'an's orders, or even to appear to break them. 2 another concepts concern rhetoric: kitman, or a lie by omission; tavriya – plays with double meanings and subliminal messages. These 2 approaches are akin to steganography – the art of hiding 1 message in another, and the management of perception, that is, how to emphasize what is in my hand, and skip what is not – or vice versa (e.g.: how to talk only about trains that are delayed, and never about those that arrive on time). Kitman and tavrija have very circumstantial political applications in image management and reputation management – especially in pre-election periods – for example in measures to prolong the Islamicisation of France, by ensuring Emmanuel Macron's triumph in 2022, without conducting an open run on his behalf and even criticizing him, yet more harshly criticizing his competitors, who, having come to power, could end the process of Islamization. The essence of the message is then included in what is not said.
From a general point of view, cunning in politics involves reversing Kant's categorical imperative and recognising others as a means to an end. This instrumental reductionism in relations with others is supported by techno-science and paradigm of information sciences and communication that emerged after planet War II and began to form dominant ideology and private life. Cybernetics, a discipline invented in the 1940s and 1950s to optimize ballistic calculations, offers a description of the planet as a set of cooperative and controlled systems and abolishes in explanation and practice the boundary between the subject and the subject, the surviving and inanimate – that is, the human and the moving object. Social engineering, within the meaning of computer hacking, relies primarily on so-called. phishing the intent of which is man – to gain his trust, so that he freely opens up and allows to extract information from him or with his consent to make changes in his perception of the world.
Two crucial figures in this field are Kevin Mitnick, who published the book “The Art of Trick. I broke people, not passwords" and Christopher Hadnagy, author of the book "Sociology. The art of gaining power over minds.” erstwhile another individual trusts me erstwhile he opens up to me, he assumes that my code is part of his code, that my words are part of his reality, and even that my words become his reality, they make his reality – just as a small kid takes the words of his parents as absolute truth, or as a hypnotized individual takes the subjective words of a hypnotist as nonsubjective reality. It is crucial that the mark is susceptible to suggestion. Now we realize better where the affirmative connotation is coming from, systematically combined with the concepts of openness and open society (cf. George Soros, a student of Popper) – it is simply a "art" of social engineering and crowd psychology, to be more effective in "raping" him (cf. Le Bon, Tchakhatine).
It is not always adequate to make assurance in the group in order to change social ties, but besides to know how to increase distrust among its members. A classical specified intellectual operation bleuite During the Algerian War, she relied on spreading in the ranks of FLN (National Liberation Front) rumors that they contained secret agents in the service of France: He was accustomed to techniques, manipulation, infiltration, intellectual warfare, and “dirty tricks”, Captain Paul-Alain Léger chose Colonel Amirouche, head of the III Wilai in Kabylia, known for his cruelty and determination. Convincing him that in his sector there were double agents, militants who allied themselves with the French case, he persuaded the Algerian leader to take up the extermination of those whom he considered traitors in his own camp. These cleansings lasted for months and had a devastating effect on moujahid morale. Doubts, suspicions, and paranoia spread like poison both within the ALN FLN ranks and in neighboring winds very effectively, and no French soldier was exposed. Social engineering is most frequently about creating divisions to rule, that is, creating alleged triangular conflicts by playing on relationships of trust, distrust and indifference, and by utilizing the Karpman triangle, or the projective cat-sacrifice-savior system, which weaves the network of relationships in all human groups. The projection strategy is based on representations that do not gotta correspond to reality. religion in non-existent agents had the same effect as if they had actually existed—caused general, leading to bloody cleansing, distrust.
Faith in something that's not there can have the same effect as something that actually is. Fiction can have the same effect on reality as reality itself. Thus, 1 can influence reality from the position of representation of reality – conventional cultures call it "magic" – and it does not substance whether this representation is actual or false. actual agents, however, can be recognized by always seeking to launch specified "bleuite" in human groups, i.e. the epidemic of paranoia and common accusations of belonging to a controlled opposition or belonging to an infiltrated 5th column. The agents of division and demoralization aim both to break the unity of the group and to break the cohesion of the individuals themselves, trying to drive them crazy or depressed. intellectual warfare frequently involves taking control of the opponent's representation strategy to lead him to mistake and yet to self-destruction, which is more economical than a frontal attack. The concept of “educated helplessness”, invented by Martin Seligman in 1975, proved to be effective for the CIA in working on resignation mechanisms and ways of provoking it in others (except for head Control experiments on human guinea pigs). In the communist planet during the Cold War, social engineering was called “political technology” and gave emergence to a Blefu-like “reflective control ” (Рефлексивное управление) – a combination of game theory, or the anticipated calculation of opponent's moves, and camouflage (maskirovka) – means how to confuse my opponent with my intentions to follow a false lead and quit the fight; and the STASI-trained method Zersetzung , which involves bringing the individual into constant uncertainty on all subjects, and in peculiar its relation of trust towards loved ones, so as to drive her into interpretational delusions and persecuting mania, and possibly into depression and suicide.
Lucien Cerise
By Anna Chrołowska, 13 February 2023
https://annachrolowska.substack.com/p/simple-history-politicaltransitionSource:
L’ingénierie sociale, ou la ruse au service de l’utopia – Lucien Cerise