Results 1 to 8 of 8

Thread: The alt-right has a plan to win 2020, and it involves YOU—so listen up liberals

  1. #1 | Top
    Join Date
    Aug 2018
    Posts
    24,892
    Thanks
    4,196
    Thanked 15,334 Times in 9,321 Posts
    Groans
    2
    Groaned 2,825 Times in 2,563 Posts
    Blog Entries
    6

    Default The alt-right has a plan to win 2020, and it involves YOU—so listen up liberals

    Earlier this week, the National Republican Campaign Committee was caught red-handed pushing online content aimed at confusing Democrats in hopes of dividing potential 2020 voters against each other. This attack was, however, very clumsy in comparison to the warnings that party leadership, state organizations, and outside activists receive in our conversations with security experts.

    Major companies are worried about technology attacks on the 2020 election, and companies like Microsoft are sending out alerts about to state-sponsored hack attempts. Events like these will make the news, and organizations will have to prepare by making sure to secure their election operations.
    When you talk to security experts, former FBI members, and campaigns, these kind of attacks aren’t the ones that are the most unsettling. There is another form of attack that’s insidious yet direct. I’ve referred to it in other diaries as “poisoning the water,” while a security adviser in a recent meeting I attended referred to it as “28 Days Later.” No matter what you call it, the desired end result is straight-forward: convince Democratic voters that the system isn’t worth participating in, or encourage rage and disappointment no matter who the Democratic nominee in their district, and for U.S. president.

    The effort to undermine our democracy is already well underway. There are thousands of ways ill-doers can try to influence our elections. To try and prepare, I think it is best we work on understanding at least a few of the approaches being used to poison discussion and try to distract Democratic voters.


    The Friend Connection

    Are you a part of “secret” or “closed” Facebook groups? Joined any DM groups on Twitter? More and more users of social media platforms who are politically active find themselves in hidden, secret, or closed groups, which far too many view as “safe spaces.” According to cybersecurity experts, however, these can be used to manipulate participants, sow discord, and try to fracture groups. In some cases, individuals have found themselves to be targets of outside pressure, as members use supposedly “private” material in public spaces to try and harm other members.


    The most common method of abuse in groups such as this uses five steps: entry, harvesting, targeting, manipulation, and splintering.

    Step 1: Entry. Using Facebook profiles or Twitter handles, individuals work to get themselves invited into private or secret groups or DM feeds on Facebook. If all members can invite new members, then the larger the group, the easier it is to gain entry. The smaller the group, the harder it is to gain entry. Larger groups also hide members, as most rarely check out who exactly is a member if it is several hundred individuals, or really, anything over 25 members.

    Step 2: Harvesting. Once a user has access to a private group, the next item on the list is to harvest, which consists of keeping a constant tally of the membership and the means to contact them. They then begin sending friend requests or start direct communication on Twitter or any other platform. This is a slow means by which to build a relationship with someone who doesn’t really exist, and the account seeking to do harm builds credibility by having more connections with people you know, therefore “they must be okay.”

    Step 3: Targeting. No large-scale conversation between human beings is completely unified. It is why several experts say we should focus on being harmonious, rather than unified. It’s okay to disagree now and again and it often doesn’t lead to larger problems, but individuals looking to cause harm to Democratic Party efforts keep track of disputes and conflict in hopes of capitalizing on them later.

    Step 4: Manipulation. Once they understand issues which can cause friction, they look at ways to inject, often in direct conversation rather than in the group at large, information which can portray a candidate or a cause as “wrong.” This manipulation is often slow and steady—never so rushed that the listener can quickly sense someone is intending to make them dissatisfied. Often, these manipulations come across as a mix of hope and remorse when talking about a certain candidate. “How can we get them in the right space for X,” “I can’t believe they won’t listen to you,” or a mix of laying out items, pumping up the listener, and defining the action as a letdown. Enough division then leads to …

    Step 5: Splintering. At a certain point, the result is: If they won’t listen to you, let’s just do our own thing. What does it matter, they won’t get involved/won’t do it/we know better/and so on.

    And then,the cycle begins all over again. This simple method can be injected into campaigns, organizations, or other efforts,over and over and over again. And while we talk about digital efforts, security specialists warn us that more conservative activists are interested in taking this into real campaigns, beginning as volunteers and sometimes “very hard workers” so that early on they can become quickly trusted. Once they’re integrated, the pattern works exactly the same.


    much more: https://www.dailykos.com/stories/201...U-so-listen-up

  2. #2 | Top
    Join Date
    Jan 2019
    Posts
    52,291
    Thanks
    77,752
    Thanked 23,568 Times in 17,849 Posts
    Groans
    38,677
    Groaned 3,238 Times in 3,042 Posts
    Blog Entries
    8

    Default

    The real danger to free elections is the absolute refusal of the left to allow foto-ID at voting places.

    They want illegals (non-citizens) to vote.

    They already are voting in some Democrat cities.

    Unbelievable that an illegal can vote in a country that he/she is not a citizen of.

    Try that in Mexico.

  3. #3 | Top
    Join Date
    Aug 2018
    Posts
    24,892
    Thanks
    4,196
    Thanked 15,334 Times in 9,321 Posts
    Groans
    2
    Groaned 2,825 Times in 2,563 Posts
    Blog Entries
    6

    Default

    Quote Originally Posted by Earl View Post
    The real danger to free elections is the absolute refusal of the left to allow foto-ID at voting places.

    They want illegals (non-citizens) to vote.

    They already are voting in some Democrat cities.

    Unbelievable that an illegal can vote in a country that he/she is not a citizen of.

    Try that in Mexico.
    let's see some proof illegal aliens are voting

    go

  4. #4 | Top
    Join Date
    Apr 2009
    Posts
    74,838
    Thanks
    15,266
    Thanked 14,432 Times in 12,044 Posts
    Groans
    18,546
    Groaned 1,699 Times in 1,647 Posts
    Blog Entries
    6

    Default

    Quote Originally Posted by reagansghost View Post
    Earlier this week, the National Republican Campaign Committee was caught red-handed pushing online content aimed at confusing Democrats in hopes of dividing potential 2020 voters against each other. This attack was, however, very clumsy in comparison to the warnings that party leadership, state organizations, and outside activists receive in our conversations with security experts.

    Major companies are worried about technology attacks on the 2020 election, and companies like Microsoft are sending out alerts about to state-sponsored hack attempts. Events like these will make the news, and organizations will have to prepare by making sure to secure their election operations.
    When you talk to security experts, former FBI members, and campaigns, these kind of attacks aren’t the ones that are the most unsettling. There is another form of attack that’s insidious yet direct. I’ve referred to it in other diaries as “poisoning the water,” while a security adviser in a recent meeting I attended referred to it as “28 Days Later.” No matter what you call it, the desired end result is straight-forward: convince Democratic voters that the system isn’t worth participating in, or encourage rage and disappointment no matter who the Democratic nominee in their district, and for U.S. president.

    The effort to undermine our democracy is already well underway. There are thousands of ways ill-doers can try to influence our elections. To try and prepare, I think it is best we work on understanding at least a few of the approaches being used to poison discussion and try to distract Democratic voters.


    The Friend Connection

    Are you a part of “secret” or “closed” Facebook groups? Joined any DM groups on Twitter? More and more users of social media platforms who are politically active find themselves in hidden, secret, or closed groups, which far too many view as “safe spaces.” According to cybersecurity experts, however, these can be used to manipulate participants, sow discord, and try to fracture groups. In some cases, individuals have found themselves to be targets of outside pressure, as members use supposedly “private” material in public spaces to try and harm other members.


    The most common method of abuse in groups such as this uses five steps: entry, harvesting, targeting, manipulation, and splintering.

    Step 1: Entry. Using Facebook profiles or Twitter handles, individuals work to get themselves invited into private or secret groups or DM feeds on Facebook. If all members can invite new members, then the larger the group, the easier it is to gain entry. The smaller the group, the harder it is to gain entry. Larger groups also hide members, as most rarely check out who exactly is a member if it is several hundred individuals, or really, anything over 25 members.

    Step 2: Harvesting. Once a user has access to a private group, the next item on the list is to harvest, which consists of keeping a constant tally of the membership and the means to contact them. They then begin sending friend requests or start direct communication on Twitter or any other platform. This is a slow means by which to build a relationship with someone who doesn’t really exist, and the account seeking to do harm builds credibility by having more connections with people you know, therefore “they must be okay.”

    Step 3: Targeting. No large-scale conversation between human beings is completely unified. It is why several experts say we should focus on being harmonious, rather than unified. It’s okay to disagree now and again and it often doesn’t lead to larger problems, but individuals looking to cause harm to Democratic Party efforts keep track of disputes and conflict in hopes of capitalizing on them later.

    Step 4: Manipulation. Once they understand issues which can cause friction, they look at ways to inject, often in direct conversation rather than in the group at large, information which can portray a candidate or a cause as “wrong.” This manipulation is often slow and steady—never so rushed that the listener can quickly sense someone is intending to make them dissatisfied. Often, these manipulations come across as a mix of hope and remorse when talking about a certain candidate. “How can we get them in the right space for X,” “I can’t believe they won’t listen to you,” or a mix of laying out items, pumping up the listener, and defining the action as a letdown. Enough division then leads to …

    Step 5: Splintering. At a certain point, the result is: If they won’t listen to you, let’s just do our own thing. What does it matter, they won’t get involved/won’t do it/we know better/and so on.

    And then,the cycle begins all over again. This simple method can be injected into campaigns, organizations, or other efforts,over and over and over again. And while we talk about digital efforts, security specialists warn us that more conservative activists are interested in taking this into real campaigns, beginning as volunteers and sometimes “very hard workers” so that early on they can become quickly trusted. Once they’re integrated, the pattern works exactly the same.


    much more: https://www.dailykos.com/stories/201...U-so-listen-up
    SEDITION: incitement of resistance to or insurrection against lawful authority.


  5. #5 | Top
    Join Date
    Aug 2018
    Posts
    24,892
    Thanks
    4,196
    Thanked 15,334 Times in 9,321 Posts
    Groans
    2
    Groaned 2,825 Times in 2,563 Posts
    Blog Entries
    6

    Default

    Quote Originally Posted by Earl View Post

    Unbelievable that an illegal can vote in a country that he/she is not a citizen of.


    Quote Originally Posted by reagansghost View Post
    let's see some proof illegal aliens are voting

    go

    ooopsy lol

  6. #6 | Top
    Join Date
    Jul 2006
    Posts
    15,288
    Thanks
    3,870
    Thanked 5,011 Times in 3,467 Posts
    Groans
    1,286
    Groaned 494 Times in 452 Posts
    Blog Entries
    5

    Default

    Keep doiung what you're doing liberals. It's working perfectly. Or do something different. It won't fucking matter. you tards

  7. #7 | Top
    Join Date
    Aug 2018
    Posts
    24,892
    Thanks
    4,196
    Thanked 15,334 Times in 9,321 Posts
    Groans
    2
    Groaned 2,825 Times in 2,563 Posts
    Blog Entries
    6

    Default

    Quote Originally Posted by tinfoil View Post
    Keep doiung what you're doing liberals. It's working perfectly.

    I hear ya

  8. #8 | Top
    Join Date
    Dec 2016
    Posts
    40,213
    Thanks
    14,475
    Thanked 23,679 Times in 16,485 Posts
    Groans
    23
    Groaned 585 Times in 561 Posts
    Blog Entries
    3

    Default

    "pushing online content aimed at confusing Democrats". A fluttering leaf will confuse a Democrat. Thread fail.

Similar Threads

  1. Replies: 16
    Last Post: 04-02-2019, 01:34 PM
  2. NUMBERS we should all know ... and Plan for 2020
    By Bourbon in forum General Politics Forum
    Replies: 17
    Last Post: 11-20-2018, 01:25 PM
  3. Will 2020 be the year that liberals reach MAX FEMOCRAT?
    By Русский агент in forum Current Events Forum
    Replies: 1
    Last Post: 12-13-2017, 08:54 AM
  4. APP - A liberal that is making sense. Will other liberals listen?
    By canceled.2021.3 in forum Above Plain Politics Forum
    Replies: 1
    Last Post: 08-23-2017, 05:15 PM
  5. Why nobody should listen to stupid liberals
    By canceled.2021.1 in forum Current Events Forum
    Replies: 1
    Last Post: 09-14-2013, 07:03 PM

Bookmarks

Posting Rules

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •