94 lines
5.4 KiB
Plaintext
94 lines
5.4 KiB
Plaintext
|
|
||
|
A SYSTEMATIC APPROACH TO ONE ON ONE MAGICKAL ASSAULT
|
||
|
|
||
|
|
||
|
Magickal assualt, one person contending with another, is a tricky subject.
|
||
|
This article covers one solution to the problem. It is by no means the only
|
||
|
one, but it does work.
|
||
|
|
||
|
The first step is to obtain some sort of talismanic link with the individual
|
||
|
who is the object of the attack. This link will act as the conductive medium
|
||
|
through which the attack will flow. Talismanic links may be divided into three
|
||
|
types; Physical, Mental and Astral.
|
||
|
|
||
|
A physical link is some material item related in some way to the object
|
||
|
individual. By tradition, a strand of hair or a nail paring is best.
|
||
|
Handwriting is also good, especially if it is something that the object
|
||
|
individual concentrated on as produced it. This puts more of "himself" into
|
||
|
it, relating it strongly to his own mind. Items of personal property will also
|
||
|
work, the more personal or favored, the better.
|
||
|
|
||
|
The second type is the mental link. This is easily obtained if the object
|
||
|
individual is known to the attacker. Pet expressions, recalled with their
|
||
|
pronunciation and intonation, are excellent, since they conjure the image of
|
||
|
the object individual, his habits, and manners to mind. Ideas or problems
|
||
|
which concern the object individual should be considered. If these are very
|
||
|
important to him, enough that he keeps them ever in his mind, they will work.
|
||
|
|
||
|
The last is closely related to the second. This is the Astral or emotional
|
||
|
link. If there exists a mutual emotional tie between attacker and attacked,
|
||
|
regardless of its nature, then a link is established. Some feeling toward a
|
||
|
third party, which is the same for both persons, is also usable, although in
|
||
|
such cases great care must be taken to keep the wrong person from being
|
||
|
harmed.
|
||
|
|
||
|
The choice of link depends on the attacker. It is he who must work with it so
|
||
|
he should pick the type that seems best suited to him and his purposes. The
|
||
|
degree of sucess depends on the ability of the attacking Magickian to work
|
||
|
with his tools. Once the link is obtained, the attack may begin.
|
||
|
|
||
|
The first step of the attack itself is to establish identity between the
|
||
|
attacker and the link, thence proceeding to identification of the attacker-
|
||
|
link-object individual. First, consider the link strictly as an object, an
|
||
|
"item" in the universe. Examine it as one would a rock. Note its size and
|
||
|
shape, its concepts and ideas, its nature and substance. View it objectively,
|
||
|
then move toward contemplating of the mental, or purely conceptual nature of
|
||
|
the link. Think of the item as if you were in the place of the object
|
||
|
individual. What does He think of this? What ideas does this hold for Him? See
|
||
|
the link as an extension of the object individual himself would see it.
|
||
|
|
||
|
The next step is to strenghten the link until its existence is as automatic
|
||
|
as possible. This is accomplished by brute concentration. The mind is made to
|
||
|
operate in harmony with that of the object individual's. With effort and a
|
||
|
little time, the mind of the attacker falls into the groove, as it were, in
|
||
|
the area concerned with the link.
|
||
|
|
||
|
Once this automatic synchronous linking action is obtained, the actual
|
||
|
substance of the attack may begin. The energies basic to the nature of the
|
||
|
attack are superimposed onto the link. The best energies for the purposes are
|
||
|
ones which have some harmony with the link itself. The only limits of degree
|
||
|
are those inherent in the attacker. The assualt is as irritating or
|
||
|
devastating as the Magickian is weak or strong in the area in which he is
|
||
|
operating.
|
||
|
|
||
|
A Magickal attack executed along the lines given above has several
|
||
|
advantages. Since the attack comes against the object indiviual from a source
|
||
|
within him, it evades many, if not all Magickal defences. The source of the
|
||
|
damaging energies appears to the object individual to be internal. Familiars
|
||
|
do not recognize it as alien and so do not leap to the defence. Also,
|
||
|
talismanic protections fail since they need not be passed.
|
||
|
|
||
|
Further, owing to the internal nature of the attack, it is hard to detect
|
||
|
while in progress. The object individual may sense the same energies but since
|
||
|
the source is apparently some part of himself he does not immediately realize
|
||
|
the true threat is external. Thus even as his mind itself tries to counter it
|
||
|
seeks an origin in the wrong place.
|
||
|
|
||
|
Finally, since the nature of the method of attack places the attacker within
|
||
|
the object individuals mind, albeit only to a small degree, the attacker may
|
||
|
be able to establish a feedback loop. This feedback loop generates energies in
|
||
|
harmony with those of the attack, but the point of origin shifts to within the
|
||
|
object individual's own mind. This allows the attacker to depart the area, cut
|
||
|
the link, and let the attack continue automatically. This feedback loop would
|
||
|
ingrain itself in the object individual's mind until its original source and
|
||
|
the source of the attack become lost. It eliminates the chance discovery.
|
||
|
Also. since the feedback loop would be made by another mind's artifice, the
|
||
|
object individual would find it harder to destroy once he found it.
|
||
|
|
||
|
As was said before. this is not THE WAY, it is but one. Each individual has
|
||
|
his own way of operating, so it is best to find one's own methods. If nothing
|
||
|
else, the above may form a guide by which another may forge his own weapons
|
||
|
and draw his own plans of attack.
|
||
|
|
||
|
L aus F
|