{"id":25815,"date":"2016-07-12T01:31:08","date_gmt":"2016-07-12T08:31:08","guid":{"rendered":"http:\/\/www.backwoodshome.com\/blogs\/ClaireWolfe\/?p=25815"},"modified":"2016-07-12T01:31:08","modified_gmt":"2016-07-12T08:31:08","slug":"on-not-being-the-weakest-link","status":"publish","type":"post","link":"https:\/\/www.clairewolfe.com\/blog\/2016\/07\/12\/on-not-being-the-weakest-link\/","title":{"rendered":"On not being the weakest link"},"content":{"rendered":"<p><a href=\"https:\/\/www.whiterose.us\/elicitation-is-it-happening-to-you\/\" target=\"_blank\">Elicitation<\/a>. Kit Perez wrote an article about it last week. Every one of us should read it. If you haven&#8217;t, I&#8217;ll wait while you do.<\/p>\n<p>&#8230;.<\/p>\n<p>I hadn&#8217;t heard the term, but anybody who&#8217;s been around the <a href=\"http:\/\/www.backwoodshome.com\/blogs\/ClaireWolfe\/2010\/06\/07\/so-what-exactly-is-a-freedom-outlaw\/\" target=\"_blank\">Outlaw<\/a> scene knows the tactic. It&#8217;s a way of getting us to <a href=\"http:\/\/rats-nosnitch.com\/\" target=\"_blank\">snitch on friends<\/a>, give away secrets, or incriminate ourselves without us fully realizing what we&#8217;re doing.<\/p>\n<p>And it works off our ordinary personality traits &#8212; anything from a desire to be polite and helpful to a desire to show how smart and &#8220;with it&#8221; we are. Which is what makes it so insidious.<\/p>\n<p><!--more--><\/p>\n<p>Kit (one of the serious up-and-comers in the freedomista world) gives an example of how somebody might foolishly give info to a &#8220;collector,&#8221; then gives examples and tips on how to detect and deflect elicitation. But she&#8217;s right to conclude that no one article can teach us &#8230; well, to keep our yaps shut.<\/p>\n<p>The example she gives of foolish info-spouting does really show a fool. A braggart, perhaps. Or just somebody with no regard for other people&#8217;s security. It&#8217;s easy to look at that example and say, &#8220;Oh, I wouldn&#8217;t do that!&#8221;<\/p>\n<p>Question is: Would you (or I) do something different but equally dangerous? Under slightly different circumstances? Yielding to a slightly different approach? And would we do it unconsciously or reflexively just because of our personalities?<\/p>\n<p>Like any skilled con artist, a skilled elicitator is good at reading us and customizing his or her approach to who we are. Look again at Kit&#8217;s article and the 10 personality traits the FBI seeks to exploit. Every one of us can spot areas on that list where we <i>aren&#8217;t<\/i> vulnerable, but you can&#8217;t tell me that at least two or three don&#8217;t apply to you.<\/p>\n<p>I can say, for example, that anybody trying to get information from me by appealing to my desire to show off is likely to be out of luck. And much though I like the idea of converting others to my opinion, I can&#8217;t imagine giving away my secrets or anybody else&#8217;s in that cause. On the other hand, I can easily see my desire to be polite and helpful or my desire to give honest answers to seemingly honest questions really screwing me up, especially in a circumstance where I don&#8217;t have much time to think (e.g. cops unexpectedly showing up at the door).<\/p>\n<p>Which is why it&#8217;s a good idea to have rules in place, and to hammer those rules into our own heads, to forestall reflexive folly (&#8220;I&#8217;m sorry; I don&#8217;t talk to police&#8221; or &#8220;I&#8217;d like to help you, but I can&#8217;t&#8221;).<\/p>\n<p>&#8212;&#8211;<\/p>\n<p>Related to elicitation is solicitation. Not the kind for which cops bust scantily-clad women on the streets. But solicitation to commit real crimes.<\/p>\n<p>Again, anybody who&#8217;s been around the Outlaw block a time or two knows all about this in theory. And they&#8217;ve known for generations. Clear back in the 1960s underground, the warning passed from person to person and cell to cell was: &#8220;You can always tell the FBI agent; he&#8217;s the one who&#8217;s forever trying to get you to blow something up.&#8221;<\/p>\n<p>Yet the tactic goes on working &#8212; as we&#8217;ve seen from so many hapless jihadist wannabes getting busted by the very &#8220;friends&#8221; who helped talk them into various evil plots in the first place.<\/p>\n<p>Elicitation helps make solicitation possible. Get to know you. Learn your vulnerabilities. Move from info gathering to targeting you and your friends for some faux plot or another.<\/p>\n<p>&#8212;&#8211;<\/p>\n<p>Both elicitation and solicitation are used all the time by Authoritah. But it doesn&#8217;t take a fed, a narc, or a professional snitch to get us in trouble.<\/p>\n<p>For instance, the guy who elicits information from you might just be some n00b eager to get involved. But such a n00b, however innocent, may be dangerous, and you could encourage his folly by oversharing. Then somebody more sinister comes along and elicits your info from him.<\/p>\n<p>And the weird thing is that even the smartest, most experienced, most sincere people can stumble into trouble just by &#8230; you might as well call it a glitch. A brain fart. A goof. But again, usually a goof that plays on their natural tendencies, perhaps even on their best virtues (e.g. that desire to be helpful).<\/p>\n<p>A couple of years ago someone I&#8217;d known and trusted for years used open email to solicit me to commit a federal crime. Now I know that when this sort of thing happens, the first thing you have to wonder is: <em>Is he in trouble and trying to save his backside by giving them me, instead?<\/em> But in this case, I don&#8217;t think so. On the contrary, he was just trying to facilitate what he perceived to be a beneficial arrangement between friends. He was simply being helpful &#8212; which I have always known him to be. A desire to be helpful, plus a momentary brain fart, resulted in a really, really dumb move by an otherwise smart person. (For the record, I said no thanks to the crime in question.)<\/p>\n<p>&#8212;&#8211;<\/p>\n<p>The other day I was reading one of Michael Connelly&#8217;s Harry Bosch novels, <a  href=\"https:\/\/www.amazon.com\/gp\/product\/0446556726\/ref=as_li_tl?ie=UTF8&#038;camp=1789&#038;creative=9325&#038;creativeASIN=0446556726&#038;linkCode=as2&#038;tag=livifree07-20&#038;linkId=c2cfe8be102d52e7d6379a077613fabb\" target=\"_blank\"><i>The Black Box<\/i><\/a> and I came across these words:<\/p>\n<blockquote><p>It was an investigative standard. The best and fastest way to break a conspiracy was to identify the weakest link in the chain and find a way to exploit it. When one link was broken, the chain would come loose.<\/p><\/blockquote>\n<p>A truism. <i>Of course<\/i> that&#8217;s how it works. It&#8217;s not news. <\/p>\n<p>And even if we&#8217;re not engaged in anything that we ourselves would consider a &#8220;conspiracy,&#8221; we know we live in a world where even the most innocent actions and viewpoints are considered <a href=\"http:\/\/www.in.techspot.com\/news\/security\/nsa-classifies-linux-journal-readers-tor-and-tails-linux-users-as-extremists\/articleshow\/47743699.cms\" target=\"_blank\">&#8220;extreme&#8221;<\/a> or <a href=\"http:\/\/www.networkworld.com\/article\/2220455\/microsoft-subnet\/ridiculous-fbi-list--you-might-be-a-domestic-terrorist-if------.html\" target=\"_blank\">&#8220;terroristic.&#8221;<\/a> We know we live in a surveillance state, where our communications are monitored by people who consider each and every one of us (especially We the Political) to be potential threats. We know our neighbors are encouraged not only to &#8220;see something, say something&#8221; but to imagine &#8220;somethings&#8221; where nothing really exists. <\/p>\n<p>So it is <i>also<\/i> not news that &#8220;they&#8221; really are out to get us. And that even in our innocent actions, &#8220;they&#8221; might be looking for weak links to exploit.<\/p>\n<p>Yet in being blandly confident that we ourselves are too smart to be that weak link, we overlook the fact that we carry our own weakest link within our own character. The link that could break &#8212; and potentially break us and our friends. <\/p>\n<p>Our &#8220;weakest link&#8221; could be something we otherwise count as one of our best virtues (e.g. honesty or a conviction that others are honest and good). Our weakest link could be our naivete, our unpreparedness in a given situation, our momentary tiredness, our unwariness around those we trust, our desire to impress or teach or correct someone else&#8217;s errors.<\/p>\n<p>So what do we do about it? Are we doomed to become sour, paranoid old curmudgeons, trusting no one, communicating only in cryptic, muttered monosyllables?<\/p>\n<p>No. Not hardly. <\/p>\n<p>We just need to know our own weaknesses a little better than most of us generally do, particularly our weaknesses where communication and trust are involved. Then set up some behavioral rules for ourselves &#8212; rules that will stand us in good stead when our natural inclinations might trip us up. <i>Never talk to cops. Never discuss subject X unless it&#8217;s a clear &#8220;need to know&#8221; situation. Encrypt, but never fully trust encryption (because encryption&#8217;s weakest link is the humans using it). Never go along with the guy who&#8217;s most eager to turn violent, no matter how friendly, appealing, or persuasive he is.<\/i> And so on.<\/p>\n<p>We all slip up. Lord knows I have. But knowing ourselves and imposing a few well-defined rules to compensate for our personal weak links can go a long way to keep human fallibility from becoming outright disaster.<\/p>\n<p><strong>Three keys:<\/p>\n<ul>\n<li>Know ourselves.\n<li>Be candid with ourselves about our specific vulnerabilities.\n<li>Establish rules that can kick in during specific situations and\/or moments when we may not have time to think on our feet.\n<\/ul>\n<p><\/strong><\/p>\n<p>&#8212;&#8211;<\/p>\n<p><i>H\/T TSO and JB for links and inspiration<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Elicitation. Kit Perez wrote an article about it last week. Every one of us should read it. If you haven&#8217;t, I&#8217;ll wait while you do. &#8230;. I hadn&#8217;t heard the term, but anybody who&#8217;s been around the Outlaw scene knows the tactic. It&#8217;s a way of getting us to snitch on friends, give away secrets, or incriminate ourselves without us fully realizing what we&#8217;re doing. And it works off our ordinary personality traits &#8212; anything from a desire to be polite and helpful to a desire to show how smart and &#8220;with it&#8221; we are. Which is what makes it<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.clairewolfe.com\/blog\/2016\/07\/12\/on-not-being-the-weakest-link\/\">Continue reading<span class=\"screen-reader-text\">On not being the weakest link<\/span><\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,9,18,23],"tags":[],"class_list":["post-25815","post","type-post","status-publish","format-standard","hentry","category-books-and-movies","category-free-speech","category-mind-and-spirit","category-thuggery-and-bad-law","ratio-natural","entry"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts\/25815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/comments?post=25815"}],"version-history":[{"count":0,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts\/25815\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/media?parent=25815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/categories?post=25815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/tags?post=25815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}