Thursday, September 23, 2004

"Conversational Terrorism

All of the techniques listed in this document have actually been witnessed, told to us by someone else, or dreamed up. They are described in first person for clarity of motive.

The intent of detailing and naming these insidious tactics is so that the reader may AVOID USING THEM, to quickly recognize if someone else is using them, and for fun. There is much humor in the way people (consciously or unconsciously) conversationally cheat.

It is hoped that exposing these tactics will help muzzle the growing abuse in our conversational landscape."

0 Comments:

Post a Comment

<< Home