Results 1 to 8 of 8

Thread: The alt-right has a plan to win 2020, and it involves YOU—so listen up liberals

  1. #1 | Top
    Join Date
    Aug 2018
    Posts
    13,080
    Thanks
    1,785
    Thanked 6,769 Times in 4,359 Posts
    Groans
    2
    Groaned 1,603 Times in 1,437 Posts
    Blog Entries
    3

    Default The alt-right has a plan to win 2020, and it involves YOU—so listen up liberals

    Earlier this week, the National Republican Campaign Committee was caught red-handed pushing online content aimed at confusing Democrats in hopes of dividing potential 2020 voters against each other. This attack was, however, very clumsy in comparison to the warnings that party leadership, state organizations, and outside activists receive in our conversations with security experts.

    Major companies are worried about technology attacks on the 2020 election, and companies like Microsoft are sending out alerts about to state-sponsored hack attempts. Events like these will make the news, and organizations will have to prepare by making sure to secure their election operations.
    When you talk to security experts, former FBI members, and campaigns, these kind of attacks aren’t the ones that are the most unsettling. There is another form of attack that’s insidious yet direct. I’ve referred to it in other diaries as “poisoning the water,” while a security adviser in a recent meeting I attended referred to it as “28 Days Later.” No matter what you call it, the desired end result is straight-forward: convince Democratic voters that the system isn’t worth participating in, or encourage rage and disappointment no matter who the Democratic nominee in their district, and for U.S. president.

    The effort to undermine our democracy is already well underway. There are thousands of ways ill-doers can try to influence our elections. To try and prepare, I think it is best we work on understanding at least a few of the approaches being used to poison discussion and try to distract Democratic voters.


    The Friend Connection

    Are you a part of “secret” or “closed” Facebook groups? Joined any DM groups on Twitter? More and more users of social media platforms who are politically active find themselves in hidden, secret, or closed groups, which far too many view as “safe spaces.” According to cybersecurity experts, however, these can be used to manipulate participants, sow discord, and try to fracture groups. In some cases, individuals have found themselves to be targets of outside pressure, as members use supposedly “private” material in public spaces to try and harm other members.


    The most common method of abuse in groups such as this uses five steps: entry, harvesting, targeting, manipulation, and splintering.

    Step 1: Entry. Using Facebook profiles or Twitter handles, individuals work to get themselves invited into private or secret groups or DM feeds on Facebook. If all members can invite new members, then the larger the group, the easier it is to gain entry. The smaller the group, the harder it is to gain entry. Larger groups also hide members, as most rarely check out who exactly is a member if it is several hundred individuals, or really, anything over 25 members.

    Step 2: Harvesting. Once a user has access to a private group, the next item on the list is to harvest, which consists of keeping a constant tally of the membership and the means to contact them. They then begin sending friend requests or start direct communication on Twitter or any other platform. This is a slow means by which to build a relationship with someone who doesn’t really exist, and the account seeking to do harm builds credibility by having more connections with people you know, therefore “they must be okay.”

    Step 3: Targeting. No large-scale conversation between human beings is completely unified. It is why several experts say we should focus on being harmonious, rather than unified. It’s okay to disagree now and again and it often doesn’t lead to larger problems, but individuals looking to cause harm to Democratic Party efforts keep track of disputes and conflict in hopes of capitalizing on them later.

    Step 4: Manipulation. Once they understand issues which can cause friction, they look at ways to inject, often in direct conversation rather than in the group at large, information which can portray a candidate or a cause as “wrong.” This manipulation is often slow and steady—never so rushed that the listener can quickly sense someone is intending to make them dissatisfied. Often, these manipulations come across as a mix of hope and remorse when talking about a certain candidate. “How can we get them in the right space for X,” “I can’t believe they won’t listen to you,” or a mix of laying out items, pumping up the listener, and defining the action as a letdown. Enough division then leads to …

    Step 5: Splintering. At a certain point, the result is: If they won’t listen to you, let’s just do our own thing. What does it matter, they won’t get involved/won’t do it/we know better/and so on.

    And then,the cycle begins all over again. This simple method can be injected into campaigns, organizations, or other efforts,over and over and over again. And while we talk about digital efforts, security specialists warn us that more conservative activists are interested in taking this into real campaigns, beginning as volunteers and sometimes “very hard workers” so that early on they can become quickly trusted. Once they’re integrated, the pattern works exactly the same.


    much more: https://www.dailykos.com/stories/201...U-so-listen-up

  2. #2 | Top
    Join Date
    Jan 2019
    Posts
    9,037
    Thanks
    15,579
    Thanked 3,989 Times in 3,148 Posts
    Groans
    7,603
    Groaned 521 Times in 489 Posts
    Blog Entries
    2

    Default

    The real danger to free elections is the absolute refusal of the left to allow foto-ID at voting places.

    They want illegals (non-citizens) to vote.

    They already are voting in some Democrat cities.

    Unbelievable that an illegal can vote in a country that he/she is not a citizen of.

    Try that in Mexico.

  3. #3 | Top
    Join Date
    Aug 2018
    Posts
    13,080
    Thanks
    1,785
    Thanked 6,769 Times in 4,359 Posts
    Groans
    2
    Groaned 1,603 Times in 1,437 Posts
    Blog Entries
    3

    Default

    Quote Originally Posted by Earl View Post
    The real danger to free elections is the absolute refusal of the left to allow foto-ID at voting places.

    They want illegals (non-citizens) to vote.

    They already are voting in some Democrat cities.

    Unbelievable that an illegal can vote in a country that he/she is not a citizen of.

    Try that in Mexico.
    let's see some proof illegal aliens are voting

    go

  4. #4 | Top
    Join Date
    Apr 2009
    Posts
    70,844
    Thanks
    12,273
    Thanked 12,734 Times in 10,733 Posts
    Groans
    13,578
    Groaned 1,651 Times in 1,599 Posts
    Blog Entries
    5

    Default

    Quote Originally Posted by reagansghost View Post
    Earlier this week, the National Republican Campaign Committee was caught red-handed pushing online content aimed at confusing Democrats in hopes of dividing potential 2020 voters against each other. This attack was, however, very clumsy in comparison to the warnings that party leadership, state organizations, and outside activists receive in our conversations with security experts.

    Major companies are worried about technology attacks on the 2020 election, and companies like Microsoft are sending out alerts about to state-sponsored hack attempts. Events like these will make the news, and organizations will have to prepare by making sure to secure their election operations.
    When you talk to security experts, former FBI members, and campaigns, these kind of attacks aren’t the ones that are the most unsettling. There is another form of attack that’s insidious yet direct. I’ve referred to it in other diaries as “poisoning the water,” while a security adviser in a recent meeting I attended referred to it as “28 Days Later.” No matter what you call it, the desired end result is straight-forward: convince Democratic voters that the system isn’t worth participating in, or encourage rage and disappointment no matter who the Democratic nominee in their district, and for U.S. president.

    The effort to undermine our democracy is already well underway. There are thousands of ways ill-doers can try to influence our elections. To try and prepare, I think it is best we work on understanding at least a few of the approaches being used to poison discussion and try to distract Democratic voters.


    The Friend Connection

    Are you a part of “secret” or “closed” Facebook groups? Joined any DM groups on Twitter? More and more users of social media platforms who are politically active find themselves in hidden, secret, or closed groups, which far too many view as “safe spaces.” According to cybersecurity experts, however, these can be used to manipulate participants, sow discord, and try to fracture groups. In some cases, individuals have found themselves to be targets of outside pressure, as members use supposedly “private” material in public spaces to try and harm other members.


    The most common method of abuse in groups such as this uses five steps: entry, harvesting, targeting, manipulation, and splintering.

    Step 1: Entry. Using Facebook profiles or Twitter handles, individuals work to get themselves invited into private or secret groups or DM feeds on Facebook. If all members can invite new members, then the larger the group, the easier it is to gain entry. The smaller the group, the harder it is to gain entry. Larger groups also hide members, as most rarely check out who exactly is a member if it is several hundred individuals, or really, anything over 25 members.

    Step 2: Harvesting. Once a user has access to a private group, the next item on the list is to harvest, which consists of keeping a constant tally of the membership and the means to contact them. They then begin sending friend requests or start direct communication on Twitter or any other platform. This is a slow means by which to build a relationship with someone who doesn’t really exist, and the account seeking to do harm builds credibility by having more connections with people you know, therefore “they must be okay.”

    Step 3: Targeting. No large-scale conversation between human beings is completely unified. It is why several experts say we should focus on being harmonious, rather than unified. It’s okay to disagree now and again and it often doesn’t lead to larger problems, but individuals looking to cause harm to Democratic Party efforts keep track of disputes and conflict in hopes of capitalizing on them later.

    Step 4: Manipulation. Once they understand issues which can cause friction, they look at ways to inject, often in direct conversation rather than in the group at large, information which can portray a candidate or a cause as “wrong.” This manipulation is often slow and steady—never so rushed that the listener can quickly sense someone is intending to make them dissatisfied. Often, these manipulations come across as a mix of hope and remorse when talking about a certain candidate. “How can we get them in the right space for X,” “I can’t believe they won’t listen to you,” or a mix of laying out items, pumping up the listener, and defining the action as a letdown. Enough division then leads to …

    Step 5: Splintering. At a certain point, the result is: If they won’t listen to you, let’s just do our own thing. What does it matter, they won’t get involved/won’t do it/we know better/and so on.

    And then,the cycle begins all over again. This simple method can be injected into campaigns, organizations, or other efforts,over and over and over again. And while we talk about digital efforts, security specialists warn us that more conservative activists are interested in taking this into real campaigns, beginning as volunteers and sometimes “very hard workers” so that early on they can become quickly trusted. Once they’re integrated, the pattern works exactly the same.


    much more: https://www.dailykos.com/stories/201...U-so-listen-up
    Quote Originally Posted by jimmymccready View Post
    With the right wing politically motivated mcmorons in the tank for Trump, all Biden has to do is stay the course.
    All those new voters coming across the borer and heading for FL, WI, MI, and PA will make the GOP effort worthless.
    Quote Originally Posted by jimmymccready View Post
    The twenty thousand illegals deported this year on the ICE raids will be about 2% of all them here now and not counting those coming across the border, and heading for FL, WI, MI, and PA. Trump does not stand a chance.

  5. #5 | Top
    Join Date
    Aug 2018
    Posts
    13,080
    Thanks
    1,785
    Thanked 6,769 Times in 4,359 Posts
    Groans
    2
    Groaned 1,603 Times in 1,437 Posts
    Blog Entries
    3

    Default

    Quote Originally Posted by Earl View Post

    Unbelievable that an illegal can vote in a country that he/she is not a citizen of.


    Quote Originally Posted by reagansghost View Post
    let's see some proof illegal aliens are voting

    go

    ooopsy lol

  6. #6 | Top
    Join Date
    Jul 2006
    Posts
    12,870
    Thanks
    3,077
    Thanked 4,135 Times in 2,833 Posts
    Groans
    1,229
    Groaned 456 Times in 417 Posts
    Blog Entries
    5

    Default

    Keep doiung what you're doing liberals. It's working perfectly. Or do something different. It won't fucking matter. you tards
    Quick, send those on-site researchers some computer models

  7. #7 | Top
    Join Date
    Aug 2018
    Posts
    13,080
    Thanks
    1,785
    Thanked 6,769 Times in 4,359 Posts
    Groans
    2
    Groaned 1,603 Times in 1,437 Posts
    Blog Entries
    3

    Default

    Quote Originally Posted by tinfoil View Post
    Keep doiung what you're doing liberals. It's working perfectly.

    I hear ya

  8. #8 | Top
    Join Date
    Dec 2016
    Posts
    20,920
    Thanks
    4,826
    Thanked 11,997 Times in 8,377 Posts
    Groans
    3
    Groaned 323 Times in 312 Posts
    Blog Entries
    2

    Default

    "pushing online content aimed at confusing Democrats". A fluttering leaf will confuse a Democrat. Thread fail.

Similar Threads

  1. Replies: 16
    Last Post: 04-02-2019, 01:34 PM
  2. NUMBERS we should all know ... and Plan for 2020
    By Bourbon in forum General Politics Forum
    Replies: 17
    Last Post: 11-20-2018, 12:25 PM
  3. Will 2020 be the year that liberals reach MAX FEMOCRAT?
    By Русский агент in forum Current Events Forum
    Replies: 1
    Last Post: 12-13-2017, 07:54 AM
  4. APP - A liberal that is making sense. Will other liberals listen?
    By Mohamud Loves Bukkake in forum Above Plain Politics Forum
    Replies: 1
    Last Post: 08-23-2017, 05:15 PM
  5. Why nobody should listen to stupid liberals
    By I Love America in forum Current Events Forum
    Replies: 1
    Last Post: 09-14-2013, 07:03 PM

Bookmarks

Posting Rules

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •