Friday, May 30, 2008

Conversational Terrorism

Someone posted this link in the channel...

I think it is both funny and true, so why not read it and learn the tactics of our opponents?


All of the techniques listed in this document have actually been witnessed, told to us by someone else, or dreamed up. They are described in first person for clarity of motive.

The intent of detailing and naming these insidious tactics is so that the reader may AVOID USING THEM, to quickly recognize if someone else is using them, and for fun. There is much humor in the way people (consciously or unconsciously) conversationally cheat.

It is hoped that exposing these tactics will help muzzle the growing abuse in our conversational landscape. Give copies to both perpetrators and victims (only NOT for profit use).

The examples are overblown in an attempt to be both clear and funny. Use your imagination to think of how you (perish the thought) and others have used these techniques in the past.

They have been grouped by major category, with the best (worst!) saved for last.


Read on...


No comments: