tactics:mirroring
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tactics:mirroring [2024/09/21 16:29] – [Common Examples] Humphrey Boa-Gart | tactics:mirroring [2025/09/30 22:44] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 9: | Line 9: | ||
| Here are some common examples of mirroring seen in the wild by [[anonymous: | Here are some common examples of mirroring seen in the wild by [[anonymous: | ||
| - | * An [[hazards: | + | * An [[hazards:agent provocateurs|agent provocateur]] that has infiltrated a group may accuse authentic members of that group of being provocateurs. |
| * Cyberbullies and [[tactics: | * Cyberbullies and [[tactics: | ||
| * People engaged in [[tactics: | * People engaged in [[tactics: | ||
| Line 18: | Line 18: | ||
| These are just some examples, and is by no means an exhaustive list. In every case, the pattern is the same: Deflection away from one's own actions by the use of a scapegoat. | These are just some examples, and is by no means an exhaustive list. In every case, the pattern is the same: Deflection away from one's own actions by the use of a scapegoat. | ||
| - | This is a very common tactic used by gatekeepers. Sometimes they will attack | + | This is a very common tactic used by gatekeepers |
tactics/mirroring.1726936166.txt.gz · Last modified: (external edit)
Find this page online at: https://bestpoint.institute/tactics/mirroring
Find this page online at: https://bestpoint.institute/tactics/mirroring

