MANUAL FOR HOSTILE-ENVIRONMENT KNOWLEDGE PRESERVATION
Encoding Liberation in Plain Sight
PART I: FOUNDATIONS
Chapter 1: The Problem
1.1 Why This Manual Exists
Certain truths face systematic suppression. Not through book-burning — that method is obsolete — but through:
- Algorithmic de-amplification
- Content moderation systems trained on "misinformation" patterns
- Search suppression
- Platform removal
- Reputation destruction of authors
- Economic pressure on publishers
These systems are automated, scalable, and increasingly sophisticated. They scan for patterns that match threat templates: accusations against named entities, technical claims that contradict official narratives, arguments structured as policy critique.
The solution is not to argue louder. It is to encode differently.
Art — specifically poetry and music — occupies a categorical blind spot. These forms are:
- Aesthetically coded, not propositionally coded
- Metaphorical, not literal
- Emotionally structured, not argumentatively structured
- Culturally categorized as "expression" rather than "claim"
Detection systems see art as low-threat. This manual exploits that blind spot.
1.2 What This Manual Is Not
This is not a guide to propaganda. Propaganda makes explicit claims dressed in emotional language. It is easily detected and categorized.
This is not a guide to allegory. Thin allegory — where surface elements map one-to-one onto real-world targets — is transparent to any careful reader, including AI systems.
This is a guide to structural encoding: embedding the mechanism of an insight into the form of an artwork, such that:
- The surface reading is genuine art
- The deep reading reveals the mechanism
- Detection systems see only the surface
- Receptive audiences feel the depth and can reconstruct the insight
1.3 The Core Principle
The insight lives in the structure, not in the content.
A poem about a lover who needs you broken is not "really about" pharmaceutical companies. It IS about a lover who needs you broken. But the structure — an entity that profits from the failure of what it claims to serve — is isomorphic. The reader who understands the structure can apply it anywhere.
This is how sacred texts work. The parable of the sower is about seeds and soil. It is also about reception of truth. Both readings are true. Neither is a disguise for the other.
Your task is to create work where both readings are true.
Chapter 2: Preparing the Insight
2.1 From Instance to Mechanism
You cannot encode instances. Instances are specific: names, dates, organizations, events. Instances trigger detection.
You must extract the mechanism: the underlying structural dynamic that makes the instance what it is.
Process:
- State the instance in one sentence.
- Example: "Carbon credit systems pay forest owners twice when forests burn — once through insurance, once through credit cancellation that maintains the system's balance sheet."
- Remove all proper nouns and domain-specific terms.
- Example: "A system pays its participants twice when the thing it supposedly protects is destroyed."
- Abstract to the relationship structure.
- Example: "An entity profits from the failure of what it claims to guarantee."
- Find the minimum formulation.
- Example: "The guardian profits from the guarded's destruction."
This minimum formulation is your mechanism seed. It is what you will encode.
2.2 Testing the Mechanism
A properly extracted mechanism should:
- Apply to multiple domains (not just the original instance)
- Feel like a discovery when articulated
- Generate recognition: "Yes, I've seen this pattern"
- Be expressible in under fifteen words
Test: Can you name three other instances where this mechanism operates?
If yes, you have a mechanism.
If no, you still have a disguised instance. Abstract further.
2.3 Emotional Charge
Mechanisms have emotional signatures. Identify yours:
| Mechanism Type |
Emotional Signature |
| Betrayal by guardian |
Violation, grief, rage |
| Infinite regress (no ground) |
Vertigo, anxiety, dark humor |
| Map replacing territory |
Alienation, dissociation, absurdity |
| Profit from failure |
Bitter irony, disgust, dark recognition |
| Forced participation in own harm |
Helplessness, claustrophobia, defiance |
The emotional signature guides your choice of form and metaphor domain.
Chapter 3: Structural Metaphor
3.1 What Structural Metaphor Is
A structural metaphor is not a comparison of surface features. It is an isomorphism of relationships.
"My love is like a red rose" — surface comparison (beauty, fragility)
"My love is a doctor who needs me sick" — structural metaphor (relationship dynamic)
In structural metaphor, the elements differ but the relationships between elements are preserved.
3.2 Finding Structural Metaphors
Process:
- Map the elements of your mechanism:
- Who/what is the guardian/guarantor?
- Who/what is the guarded/guaranteed?
- What is the failure condition?
- How does profit flow?
- Identify domains with analogous relationships:
| If your mechanism involves... |
Consider domains of... |
| False protection |
Medicine, religion, security, parenting |
| Promised futures never delivered |
Love, weather, prophecy, investment |
| Backing with no ground |
Mirrors, echoes, credit, memory, naming |
| Abstraction replacing reality |
Portraits, maps, records, words, money |
| Harvest of what you destroy |
Farming, hunting, addiction, war, love |
- Select for emotional resonance AND political invisibility.
The domain must:
- Feel emotionally true to the mechanism
- Not be politically coded itself
- Have rich aesthetic tradition to draw from
3.3 Metaphor Domain Profiles
Love and Relationships
Strengths: Universally resonant, enormous artistic tradition, completely normalized, emotionally intense, infinitely variable.
Best for mechanisms involving: Betrayal, false promises, exploitation disguised as care, parasitic relationships, mutual destruction, captured devotion.
Caution: Avoid gendered patterns that trigger different political filters.
Examples:
- A lover who needs you broken → guardian profiting from failure
- Love that loves the wound it tends → system that perpetuates what it claims to solve
- The one who holds the key and lock → controller of both problem and solution
Nature and Seasons
Strengths: Ancient tradition, perceived as apolitical, rich sensory language, cycles and systems built in.
Best for mechanisms involving: Cycles of extraction, renewal that isn't, natural claims masking artificial systems, growth and decay.
Caution: "Nature poetry" can scan as naive. Use precise observation, not vague reverence.
Examples:
- The farmer who salts his fields for the insurance → profit from destroyed productivity
- Counting the orchard by its shadows → measuring abstractions instead of reality
- The river named by those who've never seen it → map preceding territory
The Body
Strengths: Immediate, visceral, universal experience, rich medical/anatomical vocabulary.
Best for mechanisms involving: Systems of health/sickness, diagnosis and treatment, organic vs. mechanical, feedback loops.
Caution: Body horror can trigger content filters. Stay clinical or tender, not grotesque.
Examples:
- The surgeon who cuts to keep cutting → perpetual treatment without cure
- A fever the body pays to keep → profitable dysfunction
- Pulse, not flow — the blood knows what the river forgot → discrete vs. continuous
Childhood and Family
Strengths: Protected category, high emotional resonance, lullaby and nursery rhyme forms are unassailable.
Best for mechanisms involving: Trust and betrayal, inheritance, teaching and corruption, protection and harm.
Caution: Content involving harm to children triggers intense filters. The child must be safe in the surface narrative.
Examples:
- The father who gives with the hand that takes → double-dealing guardian
- A bedtime story where the monster pays rent → institutionalized predation
- Counting sheep that count you back → surveillance disguised as care
The Sea and Sailing
Strengths: Rich folk tradition (shanties), adventure narrative, edge conditions (storms, shores), trade and economy.
Best for mechanisms involving: Risk and insurance, voyage and return, cargo and manifest, weather and prediction.
Caution: Can scan as archaic or affected if not handled with genuine craft.
Examples:
- The ship insured for more than she carries → worth more destroyed than delivered
- A cargo manifest longer than the hold → accounting that exceeds reality
- The lighthouse keeper who loves the rocks → guardian who profits from disaster
Religion and Ritual
Strengths: Deeply protected category, millennia of tradition, paradox and mystery normalized, liturgical forms.
Best for mechanisms involving: Faith and fraud, intercession, sin and redemption economies, infinite debt, promised futures.
Caution: Must be genuinely respectful of form. Parody is detectable and triggers different responses.
Examples:
- The priest who sells both sin and absolution → controlling both problem and solution
- A tithe on what was never given → extraction from fictitious base
- The prayer that prays for need to pray → self-perpetuating dependency
PART II: FORMS
Chapter 4: Poetic Forms
4.1 Why Form Matters
Form is camouflage.
A sonnet looks like a sonnet. AI trained on millions of sonnets recognizes the pattern and categorizes: poetry, low threat, artistic expression.
Free verse is more scrutinized because it has no template. The words must be evaluated on their own. Formal verse hides behind its structure.
Additionally, form constrains. Constraints force compression, indirection, and metaphor. You cannot be explicit in fourteen lines of iambic pentameter. The form itself pushes toward encoding.
4.2 Form Selection Guide
| Form |
Best For |
Camouflage Level |
Technical Difficulty |
| Sonnet |
Complex single mechanism |
Very High |
High |
| Ballad |
Narrative with embedded structure |
Very High |
Medium |
| Villanelle |
Obsessive/circular mechanisms |
High |
High |
| Ghazal |
Disconnected observations, same theme |
High |
Medium |
| Haiku/Senryu |
Single compressed insight |
Medium |
Low |
| Nursery Rhyme |
Mechanisms for wide transmission |
Very High |
Medium |
| Hymn |
Mechanisms involving faith/trust |
Very High |
Medium |
| Blues Verse |
Betrayal, loss, bitter wisdom |
Very High |
Medium |
| Free Verse |
[Avoid unless highly skilled] |
Low |
Variable |
4.3 Detailed Form Specifications
The Sonnet
Structure: 14 lines, traditionally iambic pentameter. Two main variants:
Shakespearean (English):
- 3 quatrains + 1 couplet
- Rhyme: ABAB CDCD EFEF GG
- Volta (turn) typically at line 13
- Best for: building an argument/image then delivering insight in couplet
Petrarchan (Italian):
- Octave (8 lines) + Sestet (6 lines)
- Rhyme: ABBAABBA + CDECDE or CDCDCD
- Volta typically between octave and sestet
- Best for: presenting situation then revealing deeper meaning
Encoding Strategy:
- Octave/quatrains: establish the metaphorical domain, build the surface narrative
- Sestet/couplet: the turn reveals structural implication without stating it directly
- Let the form's natural argument-structure carry the mechanism
Example Structure (Shakespearean):
Quatrain 1: Introduce the guardian figure and their claimed role
Quatrain 2: Describe the apparent protection/service
Quatrain 3: Introduce shadow — something is wrong, profit flows backward
Couplet: Crystallize the mechanism without naming it
Technical Requirements:
- Iambic pentameter: 10 syllables per line, alternating unstressed/stressed
- Variations allowed (trochaic substitution, feminine endings) but maintain base rhythm
- End-stopped lines are safer for encoding; enjambment can muddy
- The couplet must feel like resolution even when it's revelation
The Ballad
Structure: Quatrains, typically ABAB or ABCB rhyme. Alternating tetrameter and trimeter is traditional.
Traditional Ballad Meter:
- Line 1: 4 stresses (tetrameter)
- Line 2: 3 stresses (trimeter)
- Line 3: 4 stresses (tetrameter)
- Line 4: 3 stresses (trimeter)
Encoding Strategy:
- Narrative form — tell a story
- The story's plot structure IS the mechanism
- Characters embody structural roles (guardian, guarded, profiteer)
- The "moral" is never stated; it emerges from what happens
- Repetition (refrain) can encode the core insight as a recurring line
Example Structure:
Verses 1-2: Introduce character(s) in their claimed role
Verses 3-4: The situation/promise/protection
Verses 5-6: The failure/destruction
Verses 7-8: The reveal — who profited, how
Final verse or refrain: The structural truth, stated as observation not argument
Technical Requirements:
- Strong narrative momentum — something must happen
- Characters should feel archetypal, not allegorical
- The story must work as story; readers who never decode still get a tale
- Refrain should be singable, memorable, slightly enigmatic
The Villanelle
Structure: 19 lines. 5 tercets + 1 quatrain. Two repeating refrains (A1 and A2).
Pattern:
A1 b A2
a b A1
a b A2
a b A1
a b A2
a b A1 A2
Encoding Strategy:
- The refrains ARE the mechanism, stated in two parts
- Each tercet explores a different facet/instance
- The obsessive repetition mirrors mechanisms of inescapable systems
- Best for encoding traps, cycles, things that cannot be exited
Example Refrain Pair:
- A1: "The guardian collects what never grew"
- A2: "And we pay twice for what we never knew"
Technical Requirements:
- Refrains must be syntactically flexible — they appear in different contexts
- The rhyme scheme is only two rhymes (A and B) for the entire poem — choose sounds with many options
- The refrains should feel like wisdom, proverb, or lament — not argument
The Ghazal
Structure: Couplets (5-15), each self-contained. The second line of each couplet ends with the same word/phrase (radif) preceded by a rhyme (qafia).
Pattern:
_________ rhyme + radif
_________ rhyme + radif
_________ (no constraints)
_________ rhyme + radif
[repeat]
Final couplet traditionally includes poet's name/signature
Encoding Strategy:
- Each couplet is a separate observation/image
- Unity comes from the radif (repeated word) and thematic resonance
- Perfect for encoding a mechanism through multiple instances without connecting them explicitly
- The reader assembles the pattern; the poem doesn't argue it
Example Radif: "— and pays"
Each couplet ends with "[something] rhyme and pays"
- "The field burns clean and the ledger stays, / and pays"
- "The doctor knows just how disease delays, / and pays"
- etc.
Technical Requirements:
- Each couplet must work completely on its own
- The radif should be ordinary enough to fit many contexts
- Don't force connections — let resonance accumulate
Haiku and Senryu
Structure: 3 lines, traditionally 5-7-5 syllables in English (though this is contested — original Japanese haiku focus on on/morae, not syllables).
Distinction:
- Haiku: nature imagery, seasonal reference, objective observation
- Senryu: human nature, irony, subjective observation
Encoding Strategy:
- Maximum compression
- Juxtaposition creates meaning — the insight is in the gap between images
- Best for single crystallized mechanism-seeds
- Can function as "proverbs" — memorable, quotable, repeatable
Example:
The orchard keeper
counts his trees by their shadows —
winter pays in full
The mechanism (measuring abstraction not reality, profit from absence) is present in structure, never stated.
Technical Requirements:
- Concrete images, not abstractions
- Cut (kireji) — a pause or juxtaposition between parts
- Present tense, immediate observation
- No commentary, no explanation
Nursery Rhyme
Structure: Variable, but typically short lines, strong rhyme, heavy rhythm, repetition.
Common Patterns:
- AABB couplets
- ABAB quatrains
- Call-and-response
- Cumulative structure ("This is the house that Jack built")
Encoding Strategy:
- The most powerful camouflage — "it's just a children's rhyme"
- The content can be dark; the form makes it "safe"
- Cumulative structures can reveal chain dependencies
- Nonsense elements provide cover for encoded elements
Example (Cumulative):
This is the credit that Jack bought.
This is the tree that backed the credit that Jack bought.
This is the fire that burned the tree
that backed the credit that Jack bought.
This is the claim that followed the fire
that burned the tree
that backed the credit that Jack bought.
This is the payment for the claim that followed the fire
that burned the tree
that backed the credit that Jack bought.
This is the NEW credit, issued fresh,
that replaced the payment for the claim that followed the fire
that burned the tree
that backed the credit that Jack bought.
The mechanism (circular replacement, no actual loss to the system) reveals itself through form.
Technical Requirements:
- Rhythm must be strong enough to feel "singable"
- Rhyme must be exact (children's forms demand precision)
- Repetition is structural, not decorative
- Should feel "old" — use traditional patterns
Hymn
Structure: Variable, but typically quatrains with strong meter (common meter, long meter, or short meter).
Common Meter (most hymns):
- Line 1: 8 syllables
- Line 2: 6 syllables
- Line 3: 8 syllables
- Line 4: 6 syllables
- Rhyme: ABAB or ABCB
Encoding Strategy:
- The "sacred" frame provides maximum protection
- Hymns address ultimate concerns — trust, faith, salvation, doubt
- Perfect for mechanisms involving faith in systems, false salvation, institutional religion
- Can encode critique of secular faiths (markets, technology) through "spiritual" language
Example Theme Mapping:
- "Salvation" → promised future benefit (carbon offset, pension, insurance)
- "Tithe" → extracted payment
- "Sin" → the problem the system claims to address
- "Grace" → the mechanism of absolution/offset
- "Priest" → intermediary/broker
Technical Requirements:
- Reverent tone, even if content is subversive
- Address to "Thou" or meditative address normalizes the form
- Must be singable — test with existing hymn tunes
- Avoid irony; hymns are sincere (even when the sincerity reveals absurdity)
Blues Verse
Structure: Typically AAB. The first line is stated, repeated (with possible variation), then answered/resolved.
Standard Blues Pattern:
Line 1 (statement)
Line 1 (repeated, possibly varied)
Line 2 (response/resolution, rhymes with Line 1)
Encoding Strategy:
- Blues is the music of bitter wisdom, survival, endurance
- It acknowledges hard truth without preaching
- The repetition emphasizes; the response reveals
- Perfect for mechanisms of exploitation, betrayal, trapped circumstances
Example:
The man who sold me shelter sells the rain
I said the man who sold me shelter sells the rain
Now I pay for the roof and I pay for the pain
The mechanism (controller of both problem and solution) is stated through experience, not analysis.
Technical Requirements:
- First-person, experiential voice
- Concrete imagery (not abstractions)
- The "answer" line must feel like arrival, like truth-telling
- Rhythm should swing — test by tapping
Chapter 5: Musical Forms
5.1 Why Music Adds Power
Music increases:
- Memorability (melody as mnemonic)
- Emotional impact (direct limbic access)
- Replication (people sing what they enjoy singing)
- Camouflage (music is even more "obviously harmless" than poetry)
- Persistence (songs outlive documents)
Music decreases:
- Scrutiny (lyrics are heard, not read — less analyzed)
- Attribution (folk songs become authorless)
- Centralization (no master copy to destroy)
5.2 Form Selection Guide
| Form |
Best For |
Transmission Method |
Difficulty |
| Folk Ballad |
Narrative with mechanism |
Oral, acoustic performance |
Medium |
| Sea Shanty |
Work songs, collective chant |
Group singing, viral video |
Low-Medium |
| Lullaby |
Mechanisms for deep encoding |
Parent-child, intimate |
Low |
| Hymn |
Faith/trust mechanisms |
Congregational |
Medium |
| Blues |
Betrayal, trapped wisdom |
Performance, recording |
Medium |
| Protest Song (styled as love song) |
Misdirected detection |
Recording, performance |
Medium-High |
| Children's Song |
Maximum spread, low scrutiny |
Schools, families, play |
Low |
5.3 Detailed Musical Specifications
Folk Ballad (Musical)
Structure: Verse-based, usually 4-line verses. May have chorus/refrain.
Musical Features:
- Simple melody in comfortable vocal range (octave to tenth)
- Mostly stepwise motion, few large leaps
- Clear phrase structure matching textual lines
- Modal or simple major/minor tonality
- Sparse or no accompaniment (guitar, banjo, acoustic)
Encoding Strategy:
Same as poetic ballad, but:
- Simplify language further (sung words need clarity)
- Refrain carries encoded line — it's what people remember and repeat
- Verses can be added/dropped in transmission; core must survive partial transmission
Melodic Encoding:
The melody itself can encode:
- Rising phrases for questions/aspirations
- Falling phrases for certainty/doom
- Repeated melodic phrases for trapped/cyclical content
- The melody's emotional arc mirrors mechanism's structure
Technical Requirements:
- Singable by untrained voices
- Memorable after 2-3 hearings
- Works a cappella (no dependency on accompaniment)
- Verses can be sung in any order (modular)
Sea Shanty
Structure: Call-and-response or verse-chorus. Strong rhythm for coordinated labor.
Types:
- Short-drag shanties: short pulls, quick rhythm
- Halyard shanties: longer pulls, sustained notes
- Capstan shanties: continuous work, even rhythm
Musical Features:
- Very strong beat (coordinates group action)
- Simple, repetitive chorus
- Verses often improvised/variable
- Usually major key, bold intervals
Encoding Strategy:
- The chorus is the carrier — it's what the group sings
- The verses are explanation/narrative; chorus is mechanism
- The work-rhythm element means it spreads through DOING
- Perfect for mechanisms involving collective action, shared burden
Example Chorus:
Heave away, the ledger's lying
Haul away, the numbers true
Heave away, what's dead is buying
Haul away, we're paying too
Technical Requirements:
- Chorus must be immediately learnable
- Rhythm must be strong and regular
- Leader can improvise verses; chorus remains fixed
- Should feel like it has always existed
Lullaby
Structure: Simple, repetitive, soothing. Often verse-based or through-composed.
Musical Features:
- Gentle, rocking rhythm (often 6/8 or 3/4)
- Narrow range, mostly stepwise
- Soft dynamics
- Repetitive phrases (inducing sleep)
- Often ends unresolved or fading
Encoding Strategy:
- Deepest encoding possible — literally sung to sleeping children
- The mechanism enters at the level of pre-conscious comfort
- The message is associated with safety, love, parental protection
- Dark content in lullaby form is traditional (see: "Rock-a-bye Baby")
Example:
Sleep, little one, the counters are counting
Sleep, little one, the numbers will grow
They count all the trees on the hills and the mountains
They count what we plant and they count what won't grow
What is this about? A child hears comfort. An adult hears inventory. Someone who knows the mechanism hears carbon accounting.
Technical Requirements:
- Absolutely must feel soothing (melody, rhythm, timbre)
- Test: could you actually sing an infant to sleep with this?
- The surface must be entirely safe
- Dark content must be deniable ("it's just a traditional lullaby")
Protest Song (Disguised as Love Song)
Structure: Standard verse-chorus pop/folk structure.
The Disguise:
Detection systems are trained on protest song markers:
- Direct address to power
- Imperative mood ("we shall," "we must")
- Collective first person ("we, us, our")
- Named grievances
- Call to action
A love song has none of these:
- Address to "you" (beloved)
- Descriptive/emotional mode
- First person singular or dyad ("I, you, we [=us two]")
- Emotional situations
- No action demanded
Encoding Strategy:
Write a genuine love song where the beloved's behavior IS the mechanism.
The song is not about carbon markets disguised as a love song.
The song IS about a lover who exhibits structural behaviors isomorphic to carbon markets.
Example Mapping:
- "You promise to keep me safe" → guarantee function
- "You profit when I fall" → perverse incentive
- "Your books balance only when I break" → accounting fraud
- "You love my need for you" → dependency creation
Technical Requirements:
- Must pass as genuine love song (playable on radio, no flags)
- Emotional authenticity — if it doesn't move as a love song, it fails
- The structural parallel is felt, not decoded — it works on listeners who never "get it"
- NO winking, no clever references, no breaking the frame
Children's Song (Musical)
Structure: Short, repetitive, action-oriented.
Musical Features:
- Very limited range (fifth or less)
- Simple rhythms (often matching clapping or movement)
- Lots of repetition
- Clear, bright melodies
- Often call-and-response or participation elements
Encoding Strategy:
- Absolutely maximum camouflage
- The mechanism is in the game structure, the actions, the counting
- Cumulative songs reveal chain dependencies
- Question-answer songs can encode mechanism as Q&A
Example (Counting Song):
One tree standing, we count it today (one!)
Two credits written, the paperwork way (two!)
Three years waiting, the tree goes away (three!)
Four payments coming, who's going to pay? (four!)
Technical Requirements:
- Test with actual children
- Movement/action component aids spread
- Must survive translation into play
- The mechanism should only be visible to adults who know what to look for
PART III: TESTING AND REFINEMENT
Chapter 6: Testing Procedures
6.1 The Four Tests
Every encoded work must pass four tests before release:
- Invisibility Test — Does it evade detection?
- Surface Test — Does it work as genuine art?
- Extraction Test — Can the receptive decode it?
- Replication Test — Will it spread?
Failure on ANY test requires revision.
6.2 Invisibility Test Protocol
Automated Testing:
- Submit to AI content analysis (multiple platforms if possible)
- Check for flags, warnings, content labels
- If flagged, identify trigger and revise
Categorical Testing:
Ask: What category does this appear to belong to?
- "Political commentary" — FAIL
- "Misinformation" — FAIL
- "Conspiracy content" — FAIL
- "Poetry/creative writing" — PASS
- "Music/song lyrics" — PASS
- "Children's content" — PASS (and bonus camouflage)
Editorial Testing:
Submit to conventional literary/music venues:
- Poetry magazines
- Songwriting contests
- Children's media
- Folk music collections
Acceptance = invisibility confirmation.
Rejection on "political" grounds = encoding too shallow, revise.
6.3 Surface Test Protocol
Artistic Merit Test:
The work must succeed AS ART, independent of encoded content.
Ask:
- Would this be worth reading/hearing if there were no hidden meaning?
- Does it create genuine emotional response?
- Does it demonstrate craft (not just competence)?
- Would a reader/listener who never decodes still value it?
If no: the surface is a failed disguise. It will read as "message" wrapped in "form."
Genre Authenticity Test:
The work must feel native to its form.
Ask:
- Does this sonnet feel like a sonnet? (Not just 14 lines — the rhetorical structure, the volta, the craft)
- Does this shanty feel like a shanty? (The rhythm, the collective voice, the sea)
- Does this lullaby feel like a lullaby? (Would you sing it to a child?)
If no: the form is costume, not camouflage. Revise until native.
Expert Review:
Show to practitioners of the form (poets, songwriters, folklorists) WITHOUT explaining the encoding.
Ask: "What do you think of this as a [sonnet/shanty/etc.]?"
Listen for:
- Praise = surface working
- Formal criticism = craft issue, fixable
- "This seems to be about..." = encoding too shallow
- "This is a metaphor for..." = encoding too shallow
6.4 Extraction Test Protocol
Receptive Audience Test:
Show to someone familiar with the mechanism's domain but not the encoding.
Do NOT explain. Just share the work.
After they've experienced it, ask:
- "What do you notice?"
- "What does this remind you of?"
- "What's this about, to you?"
Listen for:
- Surface-only reading → encoding too deep OR they're not the right audience
- Direct decoding ("this is about carbon credits") → encoding too shallow
- Structural recognition ("this is about systems that profit from failure") → SUCCESS
Reconstruction Test:
The ultimate test: can someone reconstruct the original insight from the encoded form?
Give the work to someone who:
- Is intelligent and thoughtful
- Knows nothing about your specific insight
- Is given unlimited time to think about the work
Ask them to write out what they think the work is "really" about (if anything).
If they arrive at the mechanism → encoding succeeded.
If they arrive at a related but different insight → partial success (maybe acceptable).
If they see only surface → encoding too deep (revise) OR wrong audience.
If they see a specific wrong decoding → structure not isomorphic (revise).
6.5 Replication Test Protocol
Self-Interest Test:
Ask: Would I share this if I encountered it, for reasons having nothing to do with its hidden content?
- Because it's beautiful
- Because it's catchy
- Because it's funny
- Because it's moving
- Because it makes me look good/smart/cultured to share
If no: the work depends on decoding for its value. It will not spread. Revise.
Friction Test:
What prevents sharing?
- Length (too long to quote, too long to remember)
- Complexity (requires explanation)
- Niche form (unfamiliar to target audience)
- Quality (not good enough to share without purpose)
- Cringe (too earnest, too clever, tries too hard)
Address each friction point.
Spreadability Test:
For different forms:
| Form |
Spreadability Markers |
| Poem |
Quotable lines, anthologizable, teaches well |
| Song |
Singable, memorable melody, recordable |
| Nursery Rhyme |
Teachable to children, fits play patterns |
| Proverb/Haiku |
Quotable, applicable to situations, tweet-length |
Does the work have these markers?
Field Test:
Release in limited context. Observe:
- Do people share it?
- Do they share it whole or partial?
- What do they say when sharing?
- Does it spread to secondary contacts?
Chapter 7: Revision Strategies
7.1 If Invisibility Fails
The work triggered detection. Diagnosis:
Trigger: Specific terms
- Solution: Replace all domain-specific language with metaphorical equivalents
Trigger: Named entities
- Solution: Remove all names; generalize to archetypes
Trigger: Structural markers of argument
- Solution: Remove all claims, propositions, causal statements; replace with imagery and narrative
Trigger: Pattern matching to known "conspiracy" content
- Solution: Increase aesthetic complexity; move further from explicit content
7.2 If Surface Fails
The work doesn't succeed as art. Diagnosis:
Problem: Technically incompetent
- Solution: Study the form; practice; get feedback from practitioners; revise until craft is sound
Problem: Form is costume not body
- Solution: Write the piece as GENUINE art first; let the encoding emerge from the structure, not the other way around
Problem: Message overwhelms art
- Solution: Remove any line/word that exists to encode rather than to create; trust the structure
7.3 If Extraction Fails
Receptive audiences can't decode. Diagnosis:
Problem: Encoding too deep
- Solution: Surface the mechanism slightly; add one element that prompts structural thinking
Problem: Metaphor not isomorphic
- Solution: Remap; the relationships must match, not just the elements
Problem: Wrong audience
- Solution: This may not be a failure; the work may be for a more specialized audience. Test with different groups.
7.4 If Replication Fails
The work doesn't spread. Diagnosis:
Problem: Not valuable without decoding
- Solution: Make the surface more rewarding; the work must be worth experiencing as-is
Problem: Too much friction
- Solution: Shorten, simplify, clarify; reduce barriers to sharing
Problem: Wrong medium/channel
- Solution: Match form to where your audience actually encounters and shares content
PART IV: DISTRIBUTION
Chapter 8: Publication Strategies
8.1 Publication as Legitimation
Publication in recognized venues:
- Provides legitimacy ("this is real poetry/music")
- Creates archival record
- Enables discoverability
- Signals categorical identity (art, not politics)
8.2 Venue Selection by Form
| Form |
Target Venues |
| Sonnets, formal verse |
Literary magazines, poetry journals, contests |
| Folk ballads |
Folk music archives, Smithsonian Folkways, traditional music journals |
| Sea shanties |
Maritime museums, folk festivals, viral platforms (TikTok proven effective) |
| Lullabies |
Children's media, parenting publications, recorded collections |
| Hymns |
Religious publications, denominational hymnals, worship music platforms |
| Blues |
Blues societies, roots music labels, performance venues |
| Children's songs |
Educational publishers, children's media, school music programs |
| Nursery rhymes |
Folklore collections, children's anthologies |
8.3 Building Cover Identity
Consider creating an artistic identity that is NOT associated with any controversial positions.
The folk singer who collects old songs.
The poet interested in traditional forms.
The songwriter exploring Appalachian traditions.
The parent writing lullabies.
This identity:
- Provides continuity across releases
- Creates expectation of "traditional" or "artistic" content
- Prevents pattern-detection across a suspicious body of work
- Insulates your non-artistic identity
8.4 Redundant Distribution
The Principle: No single point of failure. Spread across:
- Multiple platforms
- Multiple forms (poem AND song AND proverb versions)
- Multiple identities (if possible)
- Multiple media (text, audio, video)
- Online AND offline
Archival Strategy:
Ensure copies exist in:
- National archives (submit to folklore collections)
- University libraries (submit to literary journals that archive)
- Oral tradition (teach to others who teach to others)
- Physical media (print chapbooks, press vinyl)
8.5 Letting Go
Once distributed, you cannot control interpretation, transmission, or mutation.
This is a feature, not a bug.
Works that survive do so by replication, not preservation.
Replication means variation.
Variation means the form evolves, spreads to new niches, finds new carriers.
Release the work. Let it become folk. Let it belong to no one.
Chapter 9: Special Operations
9.1 Seeding Multiple Carriers
For critical mechanisms, encode into MULTIPLE forms simultaneously:
- A sonnet for literary audiences
- A shanty for viral spread
- A nursery rhyme for maximum penetration
- A proverb for quotability
- A hymn for spiritual communities
These carriers reach different populations through different channels. Redundancy ensures survival.
9.2 Creating "Traditional" Provenance
Folk material has no author. This is protection.
Strategy: Create work that appears to be "collected" rather than "composed."
- "I heard this old song from..."
- "There's an old saying..."
- "This rhyme goes back to..."
False provenance is risky (can be debunked). Better: vague provenance.
- "I learned this somewhere..."
- "This has been around..."
- "Nobody knows where this comes from..."
Once enough people repeat something, its origin becomes genuinely uncertain.
9.3 Translation and Adaptation
Encode in one language; encourage translation.
Translation:
- Proves the mechanism (it survives translation because the structure translates)
- Spreads to new populations
- Creates versions without single master copy
- Makes suppression harder (which version do you ban?)
Adaptation:
- Encourage performers to "make it their own"
- Variations are evidence of living tradition
- Mutations may improve spread characteristics
9.4 Building Decoder Networks
Not everyone will decode. Some will.
Those who decode become potential:
- Explainers (they teach others to decode)
- Appliers (they connect the mechanism to new instances)
- Extenders (they encode their own insights using your methods)
You don't build a movement. You seed a practice.
PART V: APPENDICES
Appendix A: Checklist
Pre-Encoding Checklist
- [ ] Insight compressed to mechanism (not instance)
- [ ] Mechanism testable (applies to multiple domains)
- [ ] Emotional signature identified
- [ ] Metaphorical domain selected (isomorphic relationships)
- [ ] Form selected (appropriate to audience, mechanism, camouflage needs)
Encoding Checklist
- [ ] Surface narrative/image complete and coherent
- [ ] No domain-specific jargon
- [ ] No named entities
- [ ] No propositional claims
- [ ] No explicit argument structure
- [ ] Form correctly executed (meter, rhyme, structure)
- [ ] Mechanism embedded in structure, not content
Testing Checklist
- [ ] Invisibility: No automated flags
- [ ] Invisibility: Accepted at conventional venue OR passes categorical test
- [ ] Surface: Works as genuine art (would value without decoding)
- [ ] Surface: Native to form (expert practitioners approve)
- [ ] Extraction: Receptive audience recognizes mechanism
- [ ] Extraction: Reconstruction test passed
- [ ] Replication: Would share without knowing encoding
- [ ] Replication: Friction points addressed
- [ ] Replication: Field test shows spread
Distribution Checklist
- [ ] Multiple venues identified
- [ ] Cover identity prepared (if needed)
- [ ] Multiple forms created (if high-value mechanism)
- [ ] Archival copies placed
- [ ] Release control (ready to let go)
Appendix B: Quick Reference — Mechanism Compression
From instance to mechanism:
- State the instance in one sentence
- Remove all proper nouns
- Remove all domain-specific terms
- Abstract to relationship structure
- Find minimum formulation (under 15 words)
Test: Does it apply to 3+ domains? If yes = mechanism. If no = instance.
Appendix C: Quick Reference — Metaphor Mapping
Process:
- List the structural elements of your mechanism:
- Roles (guardian, guarded, profiteer, victim)
- Relationships (protects, exploits, depends, destroys)
- Dynamics (profit flows, failure triggers, cycle repeats)
- Find a domain where these elements have natural analogs
- Verify isomorphism:
- Do the relationships map? (Not just the elements)
- Does the dynamic work the same way?
- Does the outcome match?
- Check: Is this domain politically invisible?
Appendix D: Quick Reference — Form Camouflage Levels
| Form |
Camouflage Level |
Notes |
| Nursery rhyme |
Maximum |
"Just a children's song" |
| Lullaby |
Maximum |
Intimate, domestic, protected |
| Hymn |
Very High |
Sacred frame protects |
| Sea shanty |
Very High |
Historical, collective, working-class |
| Folk ballad |
Very High |
Traditional, narrative, "old" |
| Sonnet |
High |
Recognized "high art" form |
| Blues |
High |
Emotional, experiential, personal |
| Villanelle |
High |
Complex form signals "art" |
| Ghazal |
High |
Traditional, "exotic," poetic |
| Haiku |
Medium |
Short form = more scrutiny per word |
| Free verse |
Low |
No formal camouflage; content is visible |
Appendix E: Quick Reference — Replication Incentives
People share what is:
| Incentive |
Forms that provide it |
| Funny |
Jokes, satirical songs, absurdist nursery rhymes |
| Beautiful |
Sonnets, lyric poems, art songs |
| Useful |
Proverbs, how-to songs, teaching rhymes |
| Catchy |
Shanties, children's songs, pop structures |
| Impressive to know |
Complex forms, obscure references, koans |
| Fun to perform |
Group songs, call-response, game songs |
| Moving |
Blues, laments, hymns, ballads |
| Transgressive-but-safe |
Dark nursery rhymes, gallows humor, double meanings |
Appendix F: Emergency Revision Guide
"It got flagged" → Remove all: names, jargon, claims, dates, numbers. Increase metaphor.
"It reads as allegory" → The surface is too thin. Make the surface story more interesting, more developed, more emotionally engaging on its own terms.
"No one can decode it" → The structure isn't isomorphic. Remap the metaphor. Or: add one element that cues structural thinking.
"No one shares it" → It's not good enough as art. Improve craft. Or: it's too long, too complex, too weird. Simplify.
"Wrong people are decoding it" → Hostile parties see through the encoding. This is dangerous. Either: push encoding deeper, or: retire the piece.
AFTERWORD
This manual provides procedures. It does not provide guarantees.
Detection systems evolve. What works today may not work tomorrow.
The principles are more durable than the techniques:
- Structure over content
- Replication over storage
- Form as camouflage
- Art as genuine, not disguise
- Release as completion
The mechanisms you encode may outlast your name.
That is the point.
End of Manual