Bonum Certa Men Certa

The Practice of Ritual Defamation (Relevant to Cancel Mobs)

Summary: Published on April 26, 2021. Reproduced with permission from here.

Written in 1990, this short essay by Laird Wilcox[1] is pertinent today and specially applicable to the defamation of Richard Stallman. The modus operandi described by Wilcox matches seamlessly the procedure adopted by Stallman's attackers. We are reproducing it verbatim from the original[2] with permission from the author. A 5 minutes read worth one or two whole books on the subject.



Note on licensing: This article is an exception to the default CC-BY-SA license of this site. The author did not grant the public copying permission for this article.





The Practice of Ritual Defamation
How values, opinions and beliefs are controlled in democratic societies



by Laird Wilcox - 1990



Defamation is the destruction or attempted destruction of the reputation, status, character or standing in the community of a person or group of persons by unfair, wrongful, or malicious speech or publication. For the purposes of this essay, the central element is defamation in retaliation for the real or imagined attitudes, opinions or beliefs of the victim, with the intention of silencing or neutralizing his or her influence, and/or making an example of them so as to discourage similar independence and “insensitivity” or non-observance of taboos. It is different in nature and degree from simple criticism or disagreement in that it is aggressive, organized and skillfully applied, often by an organization or representative of a special interest group, and in that it consists of several characteristic elements. #aggressive



Ritual Defamation is not ritualistic because it follows any prescribed religious or mystical doctrine, nor is it embraced in any particular document or scripture. Rather, it is ritualistic because it follows a predictable, stereotyped pattern which embraces a number of elements, as in a ritual.



The elements of a Ritual Defamation are these:



  1. In a ritual defamation the victim must have violated a particular taboo in some way, usually by expressing or identifying with a forbidden attitude, opinion or belief. It is not necessary that he “do” anything about it or undertake any particular course of action, only that he engage in some form of communication or expression. #no-deed


  2. The method of attack in a ritual defamation is to assail the character of the victim, and never to offer more than a perfunctory challenge to the particular attitudes, opinions or beliefs expressed or implied. Character assassination is its primary tool. #character-assassination


  3. An important rule in ritual defamation is to avoid engaging in any kind of debate over the truthfulness or reasonableness of what has been expressed, only condemn it. To debate opens the issue up for examination and discussion of its merits, and to consider the evidence that may support it, which is just what the ritual defamer is trying to avoid. The primary goal of a ritual defamation is censorship and repression. #no-debate


  4. The victim is often somebody in the public eye—someone who is vulnerable to public opinion—although perhaps in a very modest way. It could be a schoolteacher, writer, businessman, minor official, or merely an outspoken citizen. Visibility enhances vulnerability to ritual defamation. #vulnerable


  5. An attempt, often successful, is made to involve others in the defamation. In the case of a public official, other public officials will be urged to denounce the offender. In the case of a student, other students will be called upon, and so on. #mob


  6. In order for a ritual defamation to be effective, the victim must be dehumanized to the extent that he becomes identical with the offending attitude, opinion or belief, and in a manner which distorts it to the point where it appears at its most extreme. For example, a victim who is defamed as a “subversive” will be identified with the worst images of subversion, such as espionage, terrorism or treason. A victim defamed as a “pervert” will be identified with the worst images of perversion, including child molestation and rape. A victim defamed as a “racist” or “anti-Semitic” will be identified with the worst images of racism or anti-Semitism, such as lynchings or gas chambers. #exaggeration


  7. Also to be successful, a ritual defamation must bring pressure and humiliation on the victim from every quarter, including family and friends. If the victim has school children, they may be taunted and ridiculed as a consequence of adverse publicity. If they are employed, they may be fired from their job. If the victim belongs to clubs or associations, other members may be urged to expel them. #humiliation


  8. Any explanation the victim may offer, including the claim of being misunderstood, is considered irrelevant. To claim truth as a defense for a politically incorrect value, opinion or belief is interpreted as defiance and only compounds the problem. Ritual defamation is often not necessarily an issue of being wrong or incorrect but rather of “insensitivity” and failing to observe social taboos. #insensitivity


An interesting aspect of ritual defamation as a practice is its universality. It is not specific to any value, opinion or belief or to any group or subculture. It may be used for or against any political, ethnic, national or religious group. It may, for example, by anti-Semites against Jews, or by Jews against anti-Semites; by rightists against leftists or by leftists against rightists, and so on.



The power of ritual defamation lies entirely in its capacity to intimidate and terrorize. It embraces some elements of primitive superstitious belief, as in a “curse” or “hex.” It plays into the subconscious fear most people have of being abandoned or rejected by the tribe or by society and being cut off from social and psychological support systems. #peer-pressure



The weakness of ritual defamation lies in its tendency toward overkill and in its obvious maliciousness. Occasionally a ritual defamation will fail because of poor planning and failure to correctly judge the vulnerability of the victim or because its viciousness inadvertently generates sympathy.



It’s important to recognize and identify the patterns of a ritual defamation. Like all propaganda and disinformation campaigns it is accomplished primarily through the manipulation of words and symbols. It is not used to persuade, but to punish. Although it may have cognitive elements, its thrust is primarily emotional. Ritual Defamation is used to hurt, to intimidate, to destroy, and to persecute, and to avoid the dialogue, debate and discussion upon which a free society depends. On those grounds it must be opposed no matter who tries to justify its use. #emotional




References and Notes





  1. Laird Wilcox.


  2. The Practice of Ritual Defamation (Archived)

Recent Techrights' Posts

Too Hard for IBM to Keep Everybody Silent About How the Company Has Gone South
IBM is busy trying to keep disgruntled or ex workers silent using NDAs
 
Gemini Links 05/04/2026: Playing with Hyprland and Migrating Antenna Filters
Links for the day
Links 05/04/2026: "Confidential Computing" as Proprietary Bundle of False Promises and "The Web Is an Antitrust Wedge"
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, April 04, 2026
IRC logs for Saturday, April 04, 2026
SLAPP Censorship - Part 34 Out of 200: The Necessity of Transparency, Illuminating Garrett's and Graveley's 'Tag-Team' Act, Misusing the British Docket (From Far Away in America) in Efforts to Hide Bad Behaviour
Transparency is paramount
Red Tape at Red Hat (IBM)
Now the guiding principles are the whims and moods of people who peddle buzzwords to manipulate IBM's share prices
The So-called 'AI' (Slop) Companies Will Have the Plug Pulled
It can vastly accelerate this bubble's implosion
Dr. Andy Farnell on a "Technology Plan B"
based around Free software
Windows Lows Across the Mediterranean
Judging by this month's data from statCounter
The Future of the Net is 'in Space'
Gemini Protocol is growing and GemText remains the same, so it's made to endure
Linux Foundation Profits From Scams, Fraud, and Grifting
Don't be misled by the name "Linux Foundation"
Microsoft Transmits Malware and Back Doors to GNU/Linux Servers, Media Points the Finger at Everyone But Microsoft's Servers
Is Microsoft too poor to vet and check what it hosts and transmits?
Gemini Links 04/04/2026: "Fuzz Guy", "Reusing Old Computers with Arch Linux and DWM", and Bubble v10.0 Released
Links for the day
Links 04/04/2026: eBay Scam, "Music Publishers’ X Copyright Lawsuit Officially on Pause"
Links for the day
Links 04/04/2026: Social Control Media Verdict and Bans, Whistleblower (Axel Rietschin) Explains How "Microsoft Vaporized a Trillion Dollars"
Links for the day
Reaching the End/Event Horizon of LLM Slop
Are we moving towards a post-LLMs world?
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, April 03, 2026
IRC logs for Friday, April 03, 2026
Gemini Links 04/04/2026: STXGE and Computer Relationships
Links for the day
SLAPP Censorship - Part 33 Out of 200: Garrett Sued by My Wife and I, Then His Microsoft Acquaintance Files Another Lawsuit and Our Webhost Receives Legal Threats Too
Today we also show how our solicitor Mark Lewis responded to it
Good Friday, Leaving IBM for Good
Even on holidays
Links 03/04/2026: Rejection of More Software Patents and Social Control Media in Several Continents
Links for the day
Malware in Proprietary Software - Latest Additions by Rob Musial
Original published yesterday in gnu.org
Visual Evidence/Documentation of IBM Dying Like the Dinosaurs
IBM has many of these giant white elephants lying around, with some getting demolished
Links 03/04/2026: USPTO’s Latest Greenwashing and Internet Blackouts Impact Journalists in War Zones
Links for the day
SLAPP Censorship - Part 32 Out of 200: Garrett Made Spurious Requests (Later Withdrawn) the Same Week Someone He Later Spoke to by E-mail Sent Threats to Our Webhost
The "plot thickens" because there's a multi-party tag-team act, as confirmed by Garrett after he had sworn on the Bible
IBM is a Dying Company, Nowadays It Kills Red Hat With Slop
when your last day is a national holiday in IBM's country
"Independence Drives" and Community-Run Sites
Independence in reporting is a much-valued trait
When Charlatans Are Only Good at Losing Money and Storytelling (e.g. About Investment in Them)
Wait till a a barrel of oil costs $300
What Apple Fans Are Missing
Apple is a bad company
The "Pale Blue Dot" Moment Had Returned
To many people, the "bitter-sweet" observation of how small we are
Saudi Arabia Does Not Rely Much on Microsoft/Windows
Putting aside politics, this is good for Free software
Almost 12 Years of Exposing Corruption in Europe's Second-Largest Institution
The "unready" President is now an abandoned President
Easter Moon Mission and Its Reminder of IBM's Demise
A lot of NASA operations now rely on GNU/Linux
When Power is Scarce and GNU/Linux Has Power
In Cuba, GNU/Linux has long enjoyed high adoption rates
Don't Totally Dismiss the 'Survivalists'
'Survivalists' or similar terms are used to describe a particular mindset of people who prepare for some really awful scenarios
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 02, 2026
IRC logs for Thursday, April 02, 2026
A Much Better Use of Fuel Than Slop
Something positive for a change
Hoping for Peace
There are still many things to be enjoyed, including nature and kind people
Gemini Links 03/04/2026: "Slide Rule Triple Multiplication" and End of "Picture Pages"
Links for the day
Rumours of Microsoft Layoffs This Season
Just how much trouble is Microsoft in at this point?
GNU/Linux Measured at All-Time High in Sweden
Can 'influencers' have played a role