JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for POETRYETC Archives


POETRYETC Archives

POETRYETC Archives


POETRYETC@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

POETRYETC Home

POETRYETC Home

POETRYETC  2003

POETRYETC 2003

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Snapshot - SNAPPED! (revision, sorry i was up all night)

From:

Deborah Russell <[log in to unmask]>

Reply-To:

Poetryetc provides a venue for a dialogue relating to poetry and poetics <[log in to unmask]>

Date:

Wed, 24 Dec 2003 11:22:03 -0500

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (146 lines)

Deception - Organization and Execution

Light and sound masking - decoys and disguises behind large-area smoke
screens, yeah deception, properly used, may well be the decisive element for
determining victory or defeat on the poetic front, on the job and at
home,from largest to the smallest, from town to country, from city to
trailer park, to LA, Beverly Hills, San Antonio and sea to shining sea.
Become deception conscious and also intelligence conscious, because in
anyone's opinion accurate intelligence is absolutely crucial for conducting
a successful deception operation. The importance of centralized planning can
not be understated or overstated. Control in operations that involve
camouflage, concealment and deception in a variety of situations and flavors
contributes to many victories and is important and vital to modern day
financial relationships. The measure of success of any deception should be
incorporated into every tactical situation and training for the position to
deceive must include extensive in-depth deception training which advocates
the greater use of dummy positions.  Intelligence is the enemy in the case
of management and government. It is the crucial factor in deciding whether
or not to initiate dummies or continue relations. The benefits of using
guile are clearly and distinctly shown. This poem, this refrain contains a
brief account of the "fog of battle" deception. A simple, yet effective,
part of this program was the concealment of the fact that certain towns and
strategic economic factors are vulnerable. As dummies entered these areas
they were surprised, doe-eyed and easily led astray. There was an
intelligence failure on the part of the dummies, but give credit to the
original failure and incompetence of management. Their well-conceived and
well executed deception operation, with its extraordinarily tight security
measures, fooled entire families, schools, universities and nations. The use
of electronic web warfare is to indicate that despite an improvement in
monitoring capabilities, deception can still be effective and remains an
important part of computer programming.This poem describes a successful
deception operation conceived by a superior mega webmaster and carried out
at the management level with the approval of higher, yet earthbound
authority. The defenders were taken completely by surprise and a significant
feature on the front was captivated by the intricate means employed by
people with little more than a sixth grade reading level. The successful and
repeated use of deception by the multi-plex of dummy management increased
the need for developing further means of deception and secrecy.
Electromagnetic radiation was employed for guidance and the need for
electronic countermeasures increased in order to render poetic positions
ineffective. What emerges is a picture of deception that is in need of a
deception on this ever changing and ever expanding electronic battlefield.
Theorists conclude that the most important means of achieving surprise is
the carrying out of management operations that are based on the principles
of activity, naturalness, diversity, and continuity. This poetry shows how
this theory was put into practice with great success. Historical examples of
successful deception of these various elements that are part of the over all
deception-including secrecy, security, demonstration attacks, and feints are
present in these elaborate operations. As the poems continued to manifest,
methods were continually improved and the scale and diversity of deception
steadily increased. For example, there was greater use of anonymity,
security measures were tightened, management simulation was expanded and
planning became more comprehensive. The successful use of these same tactics
during the previous years, is of current significance under present-day
conditions, and calls for the continued imaginative application of disguise,
camouflage, concealment, and deception. By saving a small number of poets
from defeat, and bringing victory to others,management is able to maintain
control and the element of surprise. This short poem describes a successful
ruse used by the frontal assault of management where fabricated positions of
"importance" were "inadvertently" named and dropped where
impressionable,young poets could retrieve the information. Eventually, the
plans reached the general in command of dummy management. Because the plans
fit in so well with their superior's beliefs about poetic intentions, he
accepted them as true and arranged his defenses accordingly. When the poets
carried out a flanking attack on the management, they achieved nothing but a
slap on the wrist and the dummies again, won a major victory, even so, the
poems became the means to present sonic and olfactory deception,
concealment, and elevate dummy positions to executive status. Some modern
poetry uses elements of darkness to cover covert movement and to create
false impressions of morbidity and others used elements of archaic, romantic
poems which evoke compassion and friendship. The conclusion is that great
care must be exercised in making judgments about poetic intentions because
even though management is working at a level which is "a slice short of a
loaf" they are very good at creating false and endearing
impressions.Information contained in this poem provides an insight into the
types of fortifications that use certain methods of camouflage and
concealment that have historically been proven effective. The actual
deception plan is presented within and between the lines, accentuated with
cadence and embellished with slight rhyme. There is no other reason for
deception but financial gain. This poetic form gives a clear picture of how
deceivers using the simple methods of camouflage are able to organize forces
and allocate resources to conceal the true,display the false, and achieve
surprise in the home, school and office. Camouflage capabilities promote the
integration of and establishes guidance, policies, and responsibilities in
the area of deception and, in doing so, presents a picture of what needs to
be done to deceive poets effectively on the modern home front. The poem
remains very detailed, with many diagrams, tables, and illustrations. The
poem provides a good review of thinking on surprise and deception at the
tactical, operational, and strategic levels. It focuses on surprise, while
concentrating all physical and mental energy on deception. The use of
concealment, imitation, demonstration maneuvers, and disinformation is
composed in detail. The difficulty of carrying out a counter deception
operation is also explored. This poem discusses the deception measures used
at each echelon and evaluates the influence of surprise on the outcome of a
political action similar to the conservative campaign. This is an
interesting poem, because the conflicting elements often used in democratic
campaigns are carried out by force. This particular poem describes one of
the finest historical examples of how an integrated, comprehensive deception
plan contributed to success of management at the expense of all three levels
of the majority of households world-wide, including the estimated worth of
middle, lower middle to low income families. This poetry forms the
definitive English-language source on the deceptive practices used by one of
the most remarkable concealment operations in poetic history, including
false radio nets, camouflaged publishing nets, underground editorial
assembly areas, dummy defensive critique positions, deceptive specialized
broadcasts and news reports. This stanza shows how deception and
infiltration measures varied from front to front and back to back, East to
West and North to South, depending to a great extent on mission, management,
training, evaluation, time and money. Deception can play havoc with poets in
gaining and maintaining the initiative and poetry must place greater
emphasis on the use of this same deception at the ultimate operational
level. To carry out tactical deception operations in various situations
poetry is analyzed and poetic justice is learned and becomes evident and
relative even to deception specialists, who in their now desperate need for
a deception operation to appear completely authentic and viable to the
operational level of all households through radio, newspaper and televised
deceptions, mock-ups, decoys, and any other means realize constant defeat.
Strategic surprise enables everyone to deceive even extremely security
conscious people by well developed,plausible deception covers, and by
practicing good camouflage control. As a result, some poets have been known
to effectively conceal their massive preparations for the offensive and some
have even caught their relatives by surprise. There are over forty different
factors that influence deception efforts, such as the use of smoke or
concealment in public, gathering in assembly areas like schools,
playgrounds, restaurants, large hotels, cruise ships and shopping center
parking lots. Numerous sources show the high degree of standards achieved by
true poetic deception efforts are indeed, highly successful. Although some
poets refuse to believe the over all deception has caused them any personal
grief, it is known that deception has profited by hundreds of billions in US
dollars mostly at their willingness to buy into elevated social status
claims perpetrated by underground editorial assembly units. These poets
practically fool themselves with their personal deception stories because
the claims and social positions fit their preconceptions of success and
notoriety.

Deborah Russell, 12/24/03
Baltimore, MD USA

Dedicated to Roddy:
Walter Hudson, Oct. 24, 1970 - Dec. 24, 2003
Time of Death: 5:05 am

_________________________________________________________________
Worried about inbox overload? Get MSN Extra Storage now!
http://join.msn.com/?PAGE=features/es

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager