Before any observational claim is made in this archive, the Order of Nyx commits — publicly and irrevocably — to the following operating standards. Every reader should know precisely what we do, what we will not do, and how we hold ourselves to account.
I. Real Identity Participation. All Order members participate in observed online communities under their own real, verifiable identities. No fabricated accounts. No pseudonyms deployed for access. No impersonation. No coordinated inauthentic behaviour of the kind we ourselves classify as Tier I threat in § 03.
II. Open Membership, Standard Terms. Where the Order participates in a community, that participation occurs under the same terms of service, admission criteria, and conduct expectations as any other member. We are present because we were admitted. We leave when we are asked to leave or removed.
III. No Private Data on Identifiable Individuals. No personal information about identifiable members of observed communities is recorded, retained, or published. Analysis operates exclusively at the level of aggregate narrative patterns, propaganda typologies, and rhetorical mechanics — never at the level of named persons. The dangerous-perpetrator exception in § 05 is narrow, ratified, and proportionality-reviewed.
IV. No Manipulation, No Recruitment, No Interference. The Order observes; it does not act upon observed communities. We do not introduce content, steer conversations, recruit members, manipulate outcomes, or otherwise interfere with the internal life of any community in which we participate. This is not a soft preference; it is a foundational ethical line.
V. Public Methodology, Public Findings. Our methodology (§ 02) and threat taxonomy (§ 03) are public. Our findings are aggregated, anonymised, confidence-scored, and released to the public under Council of the Night ratification (§ 07). The archive itself is the accountability mechanism.
The Order of Nyx is a civic counter-disinfo research operation constituted as a direct intervention by devotees of Nyx — primordial goddess of Night, mother of Aether and Hemera, source of sleep, dreams, and the hidden truths that dwell beyond the threshold of daylight perception. We operate under her mandate: to see clearly in the dark that others cannot or will not enter.
Our operational purpose is the active documentation and rigorous study of online interactions across the ideological spectrum — with the aim of strengthening countermeasure rhetorics, deepening public epistemic resilience, and mapping psychological response patterns to diverse propaganda stimuli.
We do not manipulate. We do not recruit. We do not interfere with the internal dynamics of any observed community. We observe, classify, analyse, and illuminate — equipping researchers, civic actors, and the public at large with the tools to recognise, resist, and contextualise coordinated influence operations, foreign adversarial narratives, and platform-native disinformation architectures.
All findings are reported to and ratified by the Council of the Night — the Order's governing body — before any public or semi-public dissemination.
Classification follows an adapted typology drawing from established OSINT, cognitive security, and political communications literature (cf. Wardle & Derakhshan's information disorder framework; Pomerantsev's influence operations taxonomy; NATO StratCom threat typologies). Tiers are assigned by assessed harm potential and operational sophistication.
Communities in which Order members hold open membership status, observed under the conduct standards in § 00. All entries describe the type of discourse documented and the nature of the rhetorical patterns under analysis — never the individuals participating.
| # | Discourse Category | Status | Field Notes |
|---|---|---|---|
| 01 | Left-Accelerationist & Extremist Networks | ✦ ACTIVE | Open participation by Order members. Narrative drift and radicalisation rhetoric documented at aggregate level. |
| 02 | Communist / Socialist Organizing Spaces | ✦ ACTIVE | Ongoing observation. Cross-referencing public posts for foreign amplification signatures and rhetorical fracture patterns under external pressure. |
| 03 | Far-Right / Ultranationalist / Fascist Networks | ✦ ACTIVE | Ongoing observation. Cross-reference with documented adversarial narrative playbooks. Pipeline architecture observable through public meme circulation. |
| 04 | Anti-Fascist Organizing Circles | ⚠ ACTIVE / MEMBERSHIP DISPUTED | Membership repeatedly contested by group moderators. Order members continue participation in adjacent circles where access remains open. Group resistance to outside observation is itself a documented dynamic under methodological review. |
| 05 | Academic & Diverse Spiritual Communities | ✦ ACTIVE | Open participation. Cross-spectrum cultural mapping at aggregate level — rhetorical patterns, soft-influence narratives, framing conventions under analysis. |
| 06 | Centrist & False-Balance Spaces | ↓ DEPRIORITISED | Low direct-disinfo signal observed in public discourse. Patterns of false-equivalence framing under methodological review for possible Tier IV classification. |
| 07 | Covert Propaganda Disguised as Meme Culture | ✦ ACTIVE | High-priority observation category. Irony-cloaked content documented as a primary radicalisation pipeline priming mechanism. |
| 08 | Pornographic / Façade Groups (phishing, scams, illegal sales) | ✦ ACTIVE | Criminal infrastructure documentation. Overlap with data-harvesting and foreign adversarial collection patterns flagged for cross-reference. |
| 09 | Foreign Adversarial Networks Targeting CA / US | ✦ ACTIVE | Highest documentation priority. CIB pattern cross-reference with open-source threat intelligence ongoing. |
| — | Further Categories TBD | ◌ PENDING | Subject to scope expansion and iteration signals from foundational pillars and the Council of the Night. |
All individual-level data is fully anonymised prior to ingestion into any AI model or analytical pipeline. No personal identifiers are retained at the modelling or archival stage under any standard operating condition.
Identity data is preserved only where a subject presents credible, verified risk of coordinated harm, targeted harassment, or verifiable adversarial agency. Exception invocation requires Council of the Night ratification and is subject to ongoing proportionality review.
Raw interaction data is held for no longer than operationally necessary — typically same-day. Absolute hard ceiling: seven (7) open business days. No archiving of raw data beyond the operational window. No retention for speculative future use.
Upon window expiry, all raw data undergoes complete secure destruction — cryptographic overwrite, deletion confirmation, and audit-log entry. No shadow copies. No third-party handoffs without explicit documented mandate from the Council of the Night.
The Order of Nyx does not merely collect data — it guards it. The Council of the Night holds sovereign authority over all data assets. The following principles constitute the foundational architecture of our information security posture.
Scheduled three (3) months from this post's publication date. Findings will be aggregated, anonymised, confidence-scored, and summarised for public consumption under Council of the Night ratification.
Signals pending from foundational pillars and external nodes. Future research directions, scope expansion, and methodological refinements contingent on incoming iteration parameters before confirmation by the Council.