Japanese imperial strategy distilled all possible influence into three forms—three treasures, three levers, three complete operational approaches.1 The Sword (Push) works through force, confrontation, and boundary-violation. The Jewel (Pull) works through attraction, desire, and resource-offer. The Mirror (Ploy) works through reflection, identity-fusion, and relational manipulation.
Every tactical operation that has ever worked operates through one or more of these three channels. They're not the only possible approaches; they're the only approaches that actually move people. Everything else is elaboration or failure.1
Think of them as three different doors into someone's decision-making system. Push smashes the door. Pull seduces it open. Mirror makes them open the door from the inside, thinking they chose to.
The Sword (Push): Force, confrontation, constraint, dominance-display.1 Activates: Fear (threat-signal), Anger (boundary-violation feels like provocation), Aversion (pain avoidance as motivation) Mechanism: Removes choice through constraint. Target must respond or be overwhelmed. Target state: Submission, compliance, fear-based obedience Cost: High resistance, resentment, loyalty breaks when constraint is removed
The Jewel (Pull): Attraction, promise, resource-offer, status-elevation.1 Activates: Lust (desire-activation), Greed (resource-seeking), Sympathy (belonging-offer) Mechanism: Creates approach-motivation toward something the target wants Target state: Voluntary movement toward the offer, self-motivation Cost: Requires accurate reading of what target actually wants; promise must seem credible
The Mirror (Ploy): Reflection, identity-alignment, belonging-signal, frame-provision.1 Activates: Sympathy (other-resonance), Consistency-Drive (identity-alignment), Pattern-Completion (narrative coherence) Mechanism: Target sees themselves reflected and chooses to align Target state: Identity-fusion with the operative or framework; voluntary self-modification Cost: Requires sustained maintenance; psychological inoculation can break it
Each Treasure operates through a distinct psychological mechanism:
The Sword operates through CONSTRAINT: You remove or threaten to remove something the target needs (freedom, safety, resources, relationship). The target adapts by complying. The mechanism is simple: pain-avoidance. This is the fastest way to move someone (immediate) but creates the weakest loyalty (compliance only while constraint is active).
The Sword has three sub-forms:
The Jewel operates through ATTRACTION: You offer something the target wants (status, pleasure, connection, resources, security). The target moves toward it voluntarily. The mechanism is approach-activation—dopamine-driven seeking. This is slower than Push but creates stronger motivation (the target is actively pursuing, not just avoiding pain).
The Jewel has three sub-forms:
The Mirror operates through IDENTITY-ALIGNMENT: You position yourself as reflecting something the target values or wants to be. The target aligns with you because alignment feels like becoming themselves. The mechanism is narrative coherence—humans move toward alignment with identity. This is slowest (requires time for identity-fusion) but creates deepest loyalty (the target experiences alignment as authentic self-expression).
The Mirror has three sub-forms:
The Three Treasures are not independent. Sophisticated operations sequence them:
Sword → Jewel (Constraint then Offer): Force compliance through Sword, then offer reward for sustained cooperation through Jewel. This breaks down the target's resistance while creating positive association with the operative. Typical cult progression: strict rules (Sword) offer sense of order, then elevated status-promise (Jewel) for deeper commitment.
Jewel → Mirror (Attraction then Identity-Fusion): Attract through offer of something the target wants, then deepen through identity-alignment. Target stops pursuing the offer and starts identifying with the operative/framework. Typical seduction progression: access to status/pleasure (Jewel) followed by "you belong here, this is who you are" (Mirror).
Mirror → Sword (Identity-Alignment then Enforcement): Establish identity-alignment, then enforce compliance through implicit threat of identity-withdrawal. "If you don't comply, you're not who you say you are." This is the deepest form because the threat is internalized—target experiences non-compliance as identity-violation, so they enforce their own constraint.
The most sophisticated operatives understand that sequence matters dramatically. Sword alone creates temporary compliance. But Sword → Jewel → Mirror creates sustainable control—the target moves from fear-based compliance to reward-seeking to voluntary identification.
Modern cult recruitment (documented through exit interviews and investigative analysis) typically follows a precise Three-Treasure sequence:1
Phase 1: Mirror (Identity-Attraction) Recruits encounter the group through initial identity-reflection: "You seem like someone who cares about X. We're people who care about X deeply." The group appears to reflect the recruit's values. Identity-alignment happens before any constraint or demand.
Phase 2: Jewel (Belonging-Offer) As involvement deepens, the group offers belonging, purpose, community. Resources are shared. Status within the group is offered. The recruit is moving toward something attractive, not away from threat.
Phase 3: Sword (Constraint-Enforcement) Once identity and reward-systems are established, constraints appear: time requirements, financial demands, relationship restrictions. But because phases 1-2 have established deep identity-alignment and reward-association, the Sword doesn't feel like oppression—it feels like commitment to values the recruit has already adopted.
The cognitive chain: Identity-alignment (Mirror) → belonging-reward (Jewel) → constraint-as-commitment (Sword) locks into place because each phase makes the next phase feel coherent. The recruit experiences the progression not as exploitation but as deepening engagement with a meaningful community.
PHASE 1: ASSESSMENT Determine which Treasure will be most effective for this target in this moment:
PHASE 2: INITIAL DEPLOYMENT Begin with the Treasure that requires least force or resistance:
PHASE 3: SEQUENCING Once initial Treasure is deployed, assess whether sequencing to a second Treasure increases penetration:
The framework fails when it underestimates resilience and adaptation:
Failure 1: Identity-Resistance — Mirror fails when target's identity is too coherent or stable to accept external reflection. Someone with strong identity-boundary can recognize Mirror as manipulation and reject it. Target thinks: "That's not actually who I am; that's who they want me to be."
Failure 2: Reward-Satiation — Jewel fails when target receives the offered reward and no longer needs the operative. The approach-motivation evaporates. Operatives who rely on Jewel often escalate promises or withhold rewards to maintain motivation.
Failure 3: Constraint-Escape — Sword fails when target's cost-benefit calculation changes (the threat becomes less credible, escape becomes possible, or external support arrives). The compliance drops immediately.
The vulnerability: the Three Treasures assume the target's landscape remains stable. Major environmental change (economic collapse, relational breakthrough, geopolitical shift) can shift which Treasure is effective or render all three ineffective.
Evidence: Historical analysis shows the Three Treasures pattern across centuries of influence operations—military strategy, diplomatic negotiation, cult recruitment, intimate abuse. The consistency suggests the model describes something real about how human motivation actually works.
Tensions:
Open questions:
Lung frames the Three Treasures as a complete tactical system—every possible human influence operates through one or more of these channels. This is useful (it creates a coherent framework) and reductive (it treats complex human behavior as responsive to three levers).
A relational psychology perspective would counter that authentic influence works differently: genuine change comes from connection, understanding, and mutual recognition—not through Sword, Jewel, or Mirror. From this view, the Three Treasures describe manipulation specifically, not influence generally.
The tension reveals: The Three Treasures describe how to move people against their conscious will. When the operative's goals align with the target's actual needs, no Treasure is needed—people move voluntarily. The Treasures become necessary precisely when there's misalignment. Understanding this suggests the framework's utility is inversely proportional to genuine compatibility.
The Three Treasures are the tactical deployment mechanism for FLAG-activation. Sword activates Fear and Anger. Jewel activates Lust and Greed. Mirror activates Sympathy and Consistency-Drive. Where psychology describes the FLAGS as emotional frequencies, behavioral-mechanics describes how to deliberately activate them through specific approaches.
Together, understanding both reveals the complete system: the FLAGS provide the emotional substrate, the Treasures provide the tactical method.
The Three Treasures work because they target predictable personality structures (the Eighteen Links). Sword works on people high in Aversion. Jewel works on people high in Lust, Greed, Status-Seeking. Mirror works on people high in Consistency-Drive, Authority-Deference, Identity-vulnerability.
An operative who understands both the Links and the Treasures can match Treasure to Link-configuration for maximum effectiveness. A person with high Shame-Sensitivity responds powerfully to Mirror (identity-alignment becomes shame-healing). A person with low Autonomy responds powerfully to Sword (external constraint feels less like oppression, more like guidance).
The Three Treasures framework assumes they're deployed by an operative with power advantage against an unsuspecting target. But the framework becomes dangerous when the target understands it. A person who knows they're being approached through Sword, Jewel, or Mirror can recognize the mechanism and resist it.
This doesn't mean the Treasures stop working—they do. But it transforms their function from unconscious activation to conscious negotiation. A target who recognizes Mirror can ask: "Is that actually who I am, or who they want me to be?" A target who recognizes Jewel can ask: "Am I pursuing this because I genuinely want it, or because they're making it attractive?" A target who recognizes Sword can ask: "What's actually dangerous here, and what's just presented as dangerous?"
Is there a form of ethical influence that operates differently from the Three Treasures? Can someone be moved toward good outcomes without Sword, Jewel, or Mirror? What would authentic persuasion look like?
What is the relationship between understanding the Three Treasures and vulnerability to them? Does knowledge of the mechanism create protection, or do sophisticated operatives simply adapt their approach knowing the target has awareness?