The Art of Manipulation
Attackers look for distraction, fear, hesitation, or lack of confidence before striking.
Similarly, propagandists and disinformation campaigns probe for societal weaknesses, determining which narratives will gain the most traction, trigger the strongest emotions, and spread the fastest.
Understanding these tactics is the first step toward resilience.
This article will explore how criminals and propagandists operate, the similarities in their methods, and the strategies to resist both.
The Criminal "Interview": How Attackers Choose Their Targets
Self-defense expert Marc "Animal" MacYoung describes the criminal interview as the process where an attacker decides whether or not to strike.
The key question a criminal asks is: Can I get away with it?
If the answer is "no"—if the target appears too difficult, aware, or prepared—the criminal will move on.
This is one interview you want to fail.
The Five Types of Criminal Interviews
- Regular (Deceptive Approach)
- The attacker approaches under a friendly pretense—asking for directions, requesting a cigarette, or making small talk. The goal is to distract and assess the victim’s awareness.
- Example: A mugger in a parking lot asks for the time, subtly checking if the target is alert or holding valuables carelessly.
- How to Fail: Keep your distance, be cautious of unnecessary interactions, and politely refuse requests from strangers in isolated areas.
Hot (Emotional Blitzkrieg)- A sudden, aggressive outburst designed to shock the target into submission. The attacker hopes the victim will freeze or comply.
- Example: A robber suddenly yells, "Give me your wallet now!" while charging at the victim.
- How to Fail: Recognize the tactic and prepare to react immediately—whether by escaping, de-escalating, or defending yourself.
Escalating (Boundary Testing)- The attacker starts with small provocations—verbal harassment, standing too close, or inappropriate comments—gradually increasing intensity. If the target does not resist, the situation escalates into an attack.
- Example: A group of teenagers "messing with" a passerby, pushing their boundaries until the situation turns violent.
- How to Fail: Shut down boundary violations early. If someone is invading your space or testing your reactions, firmly assert yourself before the situation worsens.
Silent (Stealth Observation)- The criminal watches the target without interaction, looking for signs of weakness—such as fear, nervousness, or inattention.
- Example: A potential mugger follows a distracted shopper leaving a mall, waiting for the right moment to strike.
- How to Fail: Be aware of your surroundings. If you sense someone watching or following you, acknowledge them confidently and be ready to change direction or seek help.
Prolonged (Long-Term Manipulation)- Used in stalking, scams, and long-term deception, where the attacker builds trust before exploiting the victim.
- Example: A fraudster slowly earns the trust of an elderly victim before stealing their savings.
- How to Fail: Guard personal information and be skeptical of those who try too hard to gain your trust too quickly.
The Disinformation "Interview": How Manipulators Select Their Targets
Just as criminals test victims before an attack, disinformation actors test audiences before launching influence campaigns.
The goal is to find the easiest minds to manipulate.
Here’s how disinformation mirrors criminal interviews:
- Regular → Fake News Disguised as Journalism
- Just as criminals use small talk to deceive, disinformation spreads through fake news websites, misleading headlines, and fabricated statistics disguised as credible sources.
- Example: A "news" site claims a politician was arrested, using an official-looking logo to appear legitimate.
Hot → Viral Misinformation Designed to Trigger Outrage- Like an aggressive attack, false stories are designed to provoke an immediate emotional reaction before facts are verified.
- Example: A social media post claims an election was "rigged," spreading rapidly before fact-checkers can debunk it.
Escalating → Slow Radicalization Through Repeated Exposure- Disinformation actors, like criminals testing boundaries, gradually introduce extreme ideas over time.
- Example: A user starts watching videos about "media bias" and is slowly led into conspiracy theories about global elites.
Silent → Data Collection to Target the Most Susceptible Audiences- Just as criminals observe body language before attacking, disinformation campaigns collect data on users to tailor propaganda for maximum influence.
- Example: Cambridge Analytica harvesting Facebook data to craft personalized political ads.
Prolonged → Large-Scale Influence Campaigns Shaping Perception Over Time- Some disinformation is long-term and strategic, shifting cultural beliefs gradually.
- Example: State-sponsored propaganda influencing opinions on foreign conflicts for years.
Countermeasures: How to "Fail" the Disinformation Interview
To resist disinformation, apply self-defense principles to online manipulation:
- Awareness – Recognize when an influence attempt is happening. If something provokes strong emotions, question its source.
- Deny Engagement – Avoid reacting emotionally or sharing false information, which fuels manipulation.
- Control Your Digital Presence – Be mindful of what personal data you share online, as it can be used to target you with tailored propaganda.
- Respond with Strength, Not Emotion – Use logic, fact-check sources, and avoid outrage-driven reactions.
- Recognize Long-Term Influence Attempts – Be cautious of repeated exposure to the same themes, as they may be part of a coordinated effort.
Conclusion: A World of Invisible Attacks
Both criminals and disinformation actors rely on ignorance, fear, and passivity to succeed.
The best defense is awareness and strategic resistance.
Whether online or in real life, the key to avoiding manipulation is to fail the interview—to signal that you are informed, aware, and difficult to deceive.
By applying critical thinking, skepticism, and self-defense principles, we can protect ourselves and our communities from both physical threats and digital misinformation.
Sources & Further Reading
- Marc MacYoung on Criminal Interviews: http://nononsenseselfdefense.com/interview.htm
- How Disinformation Spreads – MIT Technology Review: https://www.technologyreview.com/
- Cambridge Analytica Scandal – The Guardian: https://www.theguardian.com/news/series/cambridge-analytica-files
- Fact-Checking Resources: https://www.snopes.com/, https://www.politifact.com/
Did you learned something new today? Do you enjoy my work?
Keep it going for just $2! 🎉
Grab a membership, buy me a coffee, or support via PayPal or GoFundMe. Every bit helps! 🙌🔥
BMAC:https://buymeacoffee.com/nafoforum/membership
PP: https://www.paypal.com/donate/?hosted_button_id=STDDZAF88ZRNL
GoFundMe: https://www.gofundme.com/f/support-disinformation-education-public-education-forum