Friday, December 5, 2025

Part I: Handling "blowback" on Guerrilla Warfare Exploits


 Years ago, I wrote an operating system in assembly language. The key to quick implementation was building the code around a debugger. Later in my guerrilla warfare advertising exploits, I anticipated a "blowback debugger" to handle offended clients. For example, take my Elvira campaign for LBMS.

Axiom: When you make people laugh, their logical mind takes second place and they're looking for an excuse to like you.

LBMS CEO John Bantleman (now in San Francisco) agreed to pay the whopping sum of $1000 to use Elvira's image in a series of ads for CASE (COMPUTER-ASSISTED SOFTWARE ENGINEERING). Elvira was then on television in Southern California, billing herself as "misteress of the night." I still can't believe we got her for a mere $1000.

She generated a lot of business for LBMS. As I remember, John closed a $200K order with one company, the CEO of which was a lady. After inking the deal, that lady CEO was chastizing John for "objectification of women" in his use of Elvira. John was ready for the conversation. He simply looked at her and said, "Would we be having this conversation at all if I hadn't run the Elvira ads?" She blinked and then laughed.

Remember, if you do guerrilla advertising, THERE WILL BE BLOWBACK.

Tomorrow, I'll share an adventure that could have gotten Oracle sued off the planet.

Sincerely yours,
Rick Bennett
Ad Hit Man

No comments:

Post a Comment

Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?