Serving size: 95 min | 14,315 words
Makes you react before you reason — decisions driven by fear or outrage instead of evidence.
Makes flawed arguments feel convincing — you accept conclusions without noticing the gaps.
Shapes your opinion before you notice — charged words bypass critical thinking.
Makes you lower your guard — false authority and manufactured kinship bypass skepticism.
Controls what conclusions feel obvious — you only see the story they want you to see.
Hijacks your habits — open loops, rage bait, and identity binding make stopping feel impossible.
32 influence techniques analyzed by XrÆ
This episode of The Remnant with Jonah Goldberg uses 25 influence techniques across approximately 95 minutes. The most prominent patterns are Loaded Language and Trust Manipulation. None of this means the content is wrong — but knowing these patterns helps you listen more critically.
“That's the amount of money in refunds the IRS has flagged for possible identity fraud.”
Amplifies threat of identity fraud through a large dollar figure to create anxiety that motivates purchase of the advertised product.
“It was in the middle of Pete Hegseth or Chesty McBrosif giving a press conference about things going on in Iran.”
The name 'Chesty McBrosif' is a derisive or mocking construction where a neutral reference to the same person would not use this loaded variant.
“And she's become, you know, I think one of the leading, if not the leading political thinker of our time.”
Speaker elevates Arendt's credibility through superlative trust-signaling language ('leading, if not the leading political thinker of our time') rather than presenting evidence for a specific claim.
XrÆ detected 22 additional additives in this episode.
If you got value from this, please return value to OrgnIQ.
OrgnIQ is free for everyone. Contributions of any amount keep it that way.
Return ValueThis tool detects influence techniques in presentation, not errors in content. Awareness is the goal.
Powered by XrÆ 6.14
Purpose-built AI for influence technique detection