>>3438964>>3438967>>3439009>>3438996>>3438970>>3438972>>3438980>>3438993>>3438251>>3438599>>3438674>>3438650>>3438645>>3438628>>3438626>>3438624>>3438618>>3438632>>3438657
Standard social engineering techniques.
Here is a link to download a paper that BHO info czar wrote on it.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585
Excerpt from page 23…
One promising
tactic is cognitive infiltration of extremist groups. By this we do not mean 1960s-style
infiltration with a view to surveillance and collecting information, possibly for use in
future prosecutions. Rather, we mean that government efforts might succeed in
weakening or even breaking up the ideological and epistemological complexes that
constitute these networks and groups.
How might this tactic work? Recall that extremist networks and groups,
including the groups that purvey conspiracy theories, typically suffer from a kind of
crippled epistemology. Hearing only conspiratorial accounts of government behavior,
their members become ever more prone to believe and generate such accounts.
Informational and reputational cascades, group polarization, and selection effects suggest
that the generation of ever-more-extreme views within these groups can be dampened or
reversed by the introduction of cognitive diversity. We suggest a role for government
efforts, and agents, in introducing such diversity. Government agents (and their allies)
might enter chat rooms, online social networks, or even real-space groups and attempt to
undermine percolating conspiracy theories by raising doubts about their factual premises,
causal logic or implications for political action.