Showing posts with label Bannon. Show all posts
Showing posts with label Bannon. Show all posts

Sunday, August 11, 2019

Hidden Forces Behind Fascist Movements Here and Abroad

by Brian T. Lynch, MSW

Sweeden's war on global fascism is our war too. Some of you might dismiss me as a conspiracy nut when I write that Russians and our own right-wing media are attacking us every day. The article linked to here from the NY Times is illuminating on this subject and supports my observations. And yes... Russia really IS waging a vigorous global war on all Western nations. Donald Trump really IS enabling foreign attacks on U.S. citizens to further his own white nationalist goals.

The Russian goal is to destabilize Western democracies and turn them into fascist-crony capitalist states where super-billionaires like Putin, the richest man who ever lived, can make more money, control more people and destroy more lives for his personal pleasure. This isn't too far from President Trump's own desires.  It is perhaps why he holds Vladimir Putin in such high regard.

Destroying pluralism, establishing global white supremacy, and making the world safe for crony capitalism is also Steve Bannon's vision. He readily admits in his interviews that he wants to break us down so he can remake the world according to his liking. His ideas are aligned with the visions of many on the far right, including rogue billionaires such as Robert Mercer and the Kock brothers. And their visions are aligned with many of Senate and Congressional Republicans who want to control our country.

And so it is that the interests of the political far-right, Vladimir Putin's Russia, rogue international billionaires, and now wealthy totalitarian states like Saudi Arabia, have all converged. The separate interest groups may not be directly coordinating with each other, but they are aligned and working in tandem. The forces arrayed against us are both domestic and foreign, both civilian and military. The methods of attack are the used of wealth and power to take economic controls over national economies and public media domination to conduct military-grade psychological warfare augmented by high-tech, mind-altering media propaganda techniques. We are clearly under attack yet most of us refuse to admit it.

For many who have fallen victim to these attacks, to admit you have been attacked is to admit you have been gullible, vulnerable, and manipulated. It means admitting your ideas might not be entirely your own, that others may have been controlling how you feel about think. Who has the courage to admit to all that?

There are things we can do to take back and hold onto our heritage, our narrative, and our democracy, but first, we have to open our eyes to the global assault we are under. We have to look past partisan politics which is tossed like sand in our eyes so we don't see the big picture. We have to see ultra-partisan citizens as damaged victims in this global war and find ways to reach them. We have to unify and rally ourselves. We have to reject leaders who think we are still operating on the old political paradigms. But it must start by recognizing that we are at war. 

Sunday, September 24, 2017

Why Russia Hacked Voter Registration Databases - Micro-targeted Messaging

by Brian T. Lynch, MSW

What if Presidential candidates could identify the exact swing districts, to the precinct, that they need to win state elections? Imagine how concentrated their campaigns efforts and resources would be, including the ad buys and how those ads are tailored to the voters in those districts.

Welcome to the modern political campaign. The ability to do exactly this grows greatly every election cycle. Highly detailed voting information has not only allowed candidates to geographically concentrate their resources, it has given unscrupulous party operatives a map to devise voter suppression strategies, vote tampering schemes and gerrymandered districts that give their party structural advantages.

This much is well known by the savvy readers here, even if it remains under appreciated by the many voter. Less well understood are the new information technology weapons that were employed in the last election.

Into the" big data" world of our modern political campaigns came a whole set of newly developed propaganda technologies that can exploit a campaigns massive knowledge base. Explaining how just one of these new, information technology weapons work, one called micro-targeting, we can see how the dots are connected in the Russia election scandal now unfolding.

Here is a step by step plan to use modern information technologies to micro-target individual voters in swing districts to manipulate their vote.

Step 1. CREATE BIO-PSYCHO-SOCIAL PROFILES ON POTENTIAL VOTERS: All the publicly shared Facebook and Twitter information voluntarily provided by individual users has unwittingly created the most massive database ever imagined. Marketing companies can use this database to target ads to those most likely to buy certain products. But in politics, companies like Cambridge Analytica can use this data to creates highly accurate bio-psycho-social profiles (BPS profile) on millions of American adults, and use that information to manipulate voting behavior. The ability to create these very accurate, highly predictive individual profiles using a meta-analysis techniques is well established. Researchers have estimated that just 150 "likes" on Facebook, along with self-reported biographical information, can produce a BPS profile for individuals that better predicts their behavior than what their own spouse could predict. These profiles can even predict which words or phrases will elicit specific emotional reactions in a person. Of this profiling data, Paul-Olivier Dehaye, a Swiss mathematician, said, "People just don't understand the power of this data and how it can be used against them."

For those who don't know, Cambridge Analytica is a election data analysis company founded by Robert Mercer, an American billionaire with some very radical ideas. The company was lead by Breitbart's Steve Bannon until he joined the Trump administration. Cambridge Analytica was contracted by the Trump campaign to utilize the company's extensive voter profiles to help get Donald Trump elected in 2016.

Information that Facebook or Twitter does not uniformly obtain is the current voter registration status of users or their voting history. This type of information is only kept in state or county voter registration databases spread throughout the country. For a political campaign to get this type of information they would need to hack into many state and county databases, and do it in a way that doesn't easily trace back to the campaign.

Step 2. HACK SPECIFIC VOTER REGISTRATION FILES: Micro-targeting voters is a huge undertaking requiring a massive amount of computing. It also requires connecting an individual's BPS profile with their current voter registration status and voting history. Micro-targeting voters cannot happen without this information. There is currently no national source for voter registration information, but one has been proposed by Donald Trump's Presidential Advisory Commission of Election Integrity.

Not having a national voter registration system is probably a good thing. A hack of a single database would be far more damaging, and is less likely to be detected. Hacking dozens or hundreds of smaller databases increases the odds of getting caught. Hacks of voter registration files should therefore be limited in number, and the hacks must therefore be targeted at just the right swing districts where micro-targeting has the best odds of changing voting behaviors. The people with the best idea of which voting districts to hack are those within the campaign. The same internal polling numbers used to direct ad buys are the same numbers needed to direct voter registration hacks.

One way to assure that hacking activity can't easily be traced back to a candidate's campaign is to covertly employ third parties to conduct the hacks and supply the stolen information to the data analysis companies. If micro-targeting of voters took place during the 2016 elections, as a growing body of evidence suggests, then there has to be a connection between the micro-targeting and the Russian hacks of voter registration files that took place in 22 states. Some information sharing between the campaign and third party hackers would be required to assure that the information to be obtained is useful.

It is still highly speculative, but not unreasonable, to investigate the connections between the Trump campaign and Russian hacking of the voter registration databases. It is also reasonable to investigate whether any of the stolen information ended up in the databases of companies such as Cambridge Analytica.

Step 3. IDENTIFY INDIVIDUALS IN SWING DISTRICT WHOS VOTING BEHAVIOR CAN BE INFLUENCED BY MICRO-TARGETED MESSAGING: Once a voter's registration information and voting history is matched up with his or her BPS profile, it is a relatively straight forward step to distinguish implacable voters from casual or inconsistent voters. BPS profile characteristic can be used to identify a voters political leanings and the issues they might care about. Another characteristic that micro-targeting requires is that the target must be engaged in social media.

Step 4. BOMBARD TARGETED VOTERS ON THEIR SOCIAL MEDIA WITH SPECIALLY DESIGNED MESSAGES: In the final phase of the operation the object is to create an alternative social media landscape for the targeted voter by bombarding them with fake news stories, tweet storms and biased commentary designed to alter their perceptions of the political environment. These messages are tailored to elicit specific emotional reactions in the subjects. The messages are delivered by a virtual army of trolls (Russia has internet troll farms) and automated bots using fake Facebook or Twitter accounts. If the targeted voter ever shared any doubts about Hillary Clinton on social media, for example, the content of their micro-targeted messages might be designed to amplify those doubts and raise new ones. The purpose is to lessen the likelihood of that voter voting for Hillary. If a person ever "liked" a story about building the border wall, targeted messages might contain outrageous immigration stories to heighten fear and loathing toward immigrants, and to strengthen the voters motivation to vote for Donald Trump. By BPS profiling and micro-targeting people, it is the targeted voters who get manipulated, not the voting machines or the voting process itself.


RESULTS: The psychological and emotional impact of targeted propaganda messaging on individual voters will motivate some to go to the polls and vote for a candidate when they might have otherwise stayed home. Or the messaging may dispirit some voters and cause them to stay home when they would have otherwise cast their ballot. Researchers tell us that people manipulated by these technologies generally don't realize they are being manipulated. Because of the massive computing power available to these election data companies, and the unprecedented social media databases, identifying and targeting voters susceptible to targeted propaganda messaging is capable of directing these attacks on many thousands of voters just before an election. Flipping whole election through this process may be possible. Did micro-targeting flip the 2016 Presidential election to Donald Trump's win? No one knows yet, in part because it is so difficult to prove.

It is my belief that the state voter registration hacks were not done to disenfranchise voters at the polls, but to supplement data needed in order to identify and to micro-target low malleable voters with propaganda messaging. I also suspect targeting information was provided to the Russian hackers who broke into the state voter registration files. I don't know if these are crimes. I certainly hope they are, and I hope the Justice Department Probe is pursuing this line of investigation.

Saturday, March 4, 2017

Propaganda in the Digital Age - Mind Control on a Massive Scale

by Brian T. Lynch, MSW

"World War III will be a guerrilla information war with no division between military and civilian participation." - Marshall McLahun

 I noticed it during the 2016 election. My Twitter and Facebook accounts were awash in anti-Hillary comments. Many comments seemed to piggy-back on my own reservations about her. Other comments were wildly inaccurate and mean-spirited.

I was a Bernie supporter and not happy with the way the DNC and Democratic leadership conducted the primaries. Still, Hillary Clinton seemed the better choice in my view.

When anti-Hillary tweets and messages mirrored my concerns I sometimes "liked" the comments or added my own to support of my views. But then there were many outrageously false anti-Hillary claims. I mostly ignored these, but sometimes took issue. This often lead to debate with some implacable troll on social media. I engaged them not to change their minds (impossible), but to make sure others would be exposed to a reasonable set of facts.

During these internet encounters I noticed a lot of respondents chiming in with "likes" or retweets  supporting the opposition side. The longer the debate, the greater the number of these silent opposition supporters. sometimes as many as 20 or 30 different accounts, Some mute retweeters even continued to piled on days after the conversation ended, and they latched on to randomly stupid or statements made by the original Hillary hater.

That's when I realized something unusual was happening. I assumed these respondents were part of a coordinated system of trolls. I didn't know I was experiencing a technically advanced propaganda attack.  I managed to resist the feeling that the consensus was against me, but did start to wonder if I was talking to myself.

After the election, all these feverish Twitter and Facebook respondents suddenly disappeared. Did anyone else notice that?

Only now am I beginning to learn the full horror of this new cyber based propaganda.

Many of us think of propaganda we think of what spies call "active measures" like dropping fliers from airplanes, broadcasting news on Radio Free Europe, writing op-ed pieces under pseudonyms or stealing and releasing classified documents to publically embarrass adversaries. The Russian connection to the DNC email hacks and subsequent Wikileaks publication appears to be of this sort. It seems a little high tech because the theft was by hacking, but at its root it old style propaganda.  And media attention to it only serves to distraction us to the whole new world of electronic propaganda unleashed during the election.  New, covertly developed, military grade propaganda techniques were used by private corporations, and perhaps foreign actors, to tip our election results on a scale never seen before. The internet was weaponized against us.

COGNITIVE WARFARE:  Cognitive warfare is a toolbox of cyber propaganda techniques that both models mass populations and profiles individuals to change their beliefs or attitudes. It has many aspects and methods that utilize super-computers, massive databases and sophisticated computer algorithms to weaponize information gathered from our digital footprints to use against us.  Some techniques model and manipulate whole societies to bring about social change while other techniques profile and manipulate individuals or groups to alter a person's attitudes and behavior.  These methods go by names such as  Bio-psycho-social profiling, Recoding (of mass consciousness), Strategic drowning (of mainstream media content, for example), micro-targeted propaganda, etc. These propaganda techniques can be highly effective and operate on an emotional level without our specific awareness.

So where to begin? The amount of information needed to fully explain the new propaganda is way beyond the scope of this blog post. It is honestly beyond the scope of my own understanding at this point as well. This article can only serve as an introduction to the topic. At the conclusion I will point you to several lengthy articles that go into more detail.

ALGORITHMS: To understand the basics of cognitive warfare methods we must start with computer algorithms. These are sets of computer code instructions that allow a computer to analyze huge amounts of data and automatically make complex decisions for further action based on their continuous analysis. Algorithms can be simple or mind-bendingly complex, as their use in modern day financial trading illustrates. In the area of financial investments algorithms monitor the markets and social media sites (like Twitter, to see what's trending) and then make split-second decisions on buying and selling stocks. It is estimated that over 70% of all stock trades are computer generated transactions.

But algorithms are ubiquitous in social media as well. From Google's search engine to Twitter's suggestions as to who to follow, algorithms have become our window on the world. As such they have an enormous impact on our outlook. Each of us who searches a term on Google may receive different information in a different order, depending on our digital footprint on the internet. This impacts our thinking. Robert Epstein, of the American Institute for Behavioral Research and Technology says,".. these personalized results impact our opinions and behavioral patterns without our awareness." Of Google he writes, "We are talking about the most powerful mind-control machine ever invented in the history of the human race. And people don't even notice it."

There is much more we need to know about these algorithms running in the background of the cyber world, but for our purposes here it is sufficient to know that a knowledge of them and how to manipulate and exploit them is the basis on which cognitive warfare operates.

BIO-PSYCHO-SOCIAL PROFILING:  When I type "Daily Record" into my iPhone search, my local newspaper site come up. Years ago this wasn't the case. I would get a newspaper with that name in Scotland. We don't think much about the convenience built into our media systems that allows computers to make assumptions about us. These assumptions are based on our digital profile, where we live, where we are presently located, what we have looked up in the past and other such personal information kept in a database about us somewhere. This is the friendly face of social profiling.
Advances in data storage and retrieval systems, sophisticated algorithms, and methods to analyze and manage massive amounts of data allow media platforms to develop comprehensive profiles on us. This allows them to deliver the content we most want to see. Formerly, the level of detail was based on some grouping we fit into, but increasingly it is based on who we are as individuals. This has been  a boon to commercial marketing but it has a very powerful dark side as well.

In the case of Facebook profiles, for example, scientists found that profiles can be correlated across millions of people to produce remarkably accurate individual profiles. When results are combined with data generated by the "like" button people click on approve certain content, the individual profile gets ever more perfect. With just 150 "likes"  our profile can predict personality better than our own spouses can, and with 300 likes it knows a person better they know themselves.

Of this profiling data, Paul-Olivier Dehaye, a Swiss mathematician, said, "People just don't understand the power of this data and how it can be used against them." This level of understand our personality allows those in control of our profiles to send micro-targeted messages to us that subtlety manipulate our feelings and the association with which our emotions are evoked.  For example, if a person is on the fence over how to vote in an election, the people behind the propaganda machines know this about you and can custom tailor messages to that will influence you to vote one way or the other. This technique is called micro-targeted propaganda. There is evidence that this type of propaganda was used in the 2016 election to help elect Donald Trump.

STRATEGIC DROWNING:  This is another tool in the Cognitive Warfare arsenal used to influence public discourse and alter our mass consciousness. While bio-psycho-social profiling targets individuals, this technique targets certain segments of the population or even the whole population at once. The idea behind this technique it to flood the cyber-media network with specific alternative messages that drown out conventional news and information. It exploits the algorithms used by media platforms that bring desired content to us. So, for example, if you type "Jews are" into Google search, it will return answers like, "Why do people hate Jews" I just did the experiment as I write this and the picture below shows the top results.

[EDITORS NOTE 7/15/2017: Following the election the example below no longer holds true if you try it today. The alternative medial narrative emphasis has shifted to other areas of focus, such as Islamic jihadists and sharia law as an alternative to Russia's election tampering and Trump Administration investigations. For a more contemporary example google: "Sarsour is" and then "Linda Sarsour" to see how strategic drowning has altered the search results.]

  Clearly these are unexpected results for most people who might enter the search terms. (Try it yourself, and don't be surprised if your results differ from mine based on your profile.) The result over-represent hate groups and the proliferation of these results are the work of nefarious operators who flood the "media ecosystem." 

Cyber media would normally be dominated by conventional information sources such as The New York Times, Fox News, MSNBC etc., but these sources are swamped with hundreds of thousands of links from much smaller alternative information sites. These links to alternative information are intended to exploit the structure of Google secret algorithms to bring these articles to the top of the search results. This has a psychological impact on us personally and gives a false impression about public consensus in America. It blurs the question as to what is really true.

The operational structure for strategic drowning includes a coordinated network of alternative information websites, referred to as micro-propaganda machines, or MPM's. Each MPM controls a vast warehouse of "bots" which are bogus Facebook and Twitter accounts, etc. These fake accounts exist by the hundreds of thousands. Some are always active to drive public dialogue while some are "sleeper bots." These are held in reserve and triggered en mass by propagandists to overwhelm news cycles or cover up information unfavorable to their goals. It is also used to create trends and alter public discourse, or change public attitudes.  

A picture is worth a thousand words. Jonathan Albright is an assistant professor of communications at Elon University in North Carolina. He analyzed the activity of these MPM's during the 2016 election and was able to create "spatial map" of that activity. The picture created shows the relative dominance of traditional information sources in the media ecosystem, as he calls it, and the impact on that system by MPM's during the election.  The red nodes are alternative information (propaganda) websites and the red lines radiating from them are links or activity of these sites.  


In effect, what you see here is the cognitive warfare battlefield during the last election. This new propaganda arms race is between pro-democracy advocates and their adversaries. It is a war still being waged here and in other Western democracies. It is being waged by both foreign attackers and billionaire Western oligarchs who share converging interests. It is being waged by Russia, who just announced the creation of a new branch of their military calling them "information warfare troops".

 "... Russians have moved into an offensive posture that threatens the very international order." said Ben Rhodes of the Obama Administration last year.

The propaganda war is also being waged by billionaire controlled corporations specializing in this field, companies like Cambridge Analytica. This is essentially a propaganda company featuring Steve Bannon on its board of directors.

This outline of Cognitive Warfare attacks we were subjected to, and are still experiencing as an attack on our journalism institutions, helps make sense of my social media experiences during the election. I see now how I was being stroked, on one hand (micro-targeted), to fan my discontent with Hillary while being made to feel my views were in the minority (strategic drowning) on the other hand. I know now that many of the trolls I encountered were really computer generated cyberbots. All this has caused be to completely rethink my own on-line presence.

I have presented a great deal of information here and a number of quotes and facts without specific attribution. That is because virtually all of the quotes and many of the fact are from the remarkable work of Carole Cadwalladr, published by The Guardian in London. I have vetted her information by going to her original source and found them to be accurate. If you have stayed with me to this point, I urge you to read Ms. Cadwalladr's two article for even more background information. She also outlines the connections between the companies providing propaganda services for the wealthy ideologues funding them and the Trump administration. 

Bibliography

Robert Mercer: the big data billionaire waging war on mainstream
https://www.theguardian.com/politics/2017/feb/26/robert-mercer-breitbart-war-on-media-steve-bannon-donald-trump-nigel-farage
Carole Cadwalladr, 26 February, 2017

Google, democracy and the truth about internet search
https://www.theguardian.com/technology/2016/dec/04/google-democracy-truth-internet-search-facebook
Carole Cadwalladr, 4 December, 2016

The #Election2016 Micro-Propaganda Machine
https://medium.com/@d1gi/the-election2016-micro-propaganda-machine-383449cc1fba#.gl16j8e9c
Jonathan Albright, 18 November, 2016

And for further reading from my blog on algorithms,

Algorithms Hidden Impact on How We Think 
Brian T. Lynch, 9 February, 2016


UPDATE: For the sake of fairness, I returned to Jonathan Albright's website and found an updated analysis of the propaganda machine analysis including left-leaning websites as well, and the full picture of the activity is seen in the following picture. Obviously, there were left-leaning websites competing for a share of the media attention as well. I don't know the nature of the information from these left-leaning sites, or if they were part of a propaganda campaign. I'll share more when I know more.

Counter