Anonymous ID: 5b39e0 Oct. 11, 2018, 9:05 a.m. No.3439073   🗄️.is 🔗kun   >>9150 >>9222 >>9253 >>9597

>>3438891

>>3438964>>3438967>>3439009>>3438996>>3438970>>3438972>>3438980>>3438993>>3438251>>3438599>>3438674>>3438650>>3438645>>3438628>>3438626>>3438624>>3438618>>3438632>>3438657

 

Standard social engineering techniques.

 

Here is a link to download a paper that BHO info czar wrote on it.

 

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585

Excerpt from page 23…

One promising

tactic is cognitive infiltration of extremist groups. By this we do not mean 1960s-style

infiltration with a view to surveillance and collecting information, possibly for use in

future prosecutions. Rather, we mean that government efforts might succeed in

weakening or even breaking up the ideological and epistemological complexes that

constitute these networks and groups.

How might this tactic work? Recall that extremist networks and groups,

including the groups that purvey conspiracy theories, typically suffer from a kind of

crippled epistemology. Hearing only conspiratorial accounts of government behavior,

their members become ever more prone to believe and generate such accounts.

Informational and reputational cascades, group polarization, and selection effects suggest

that the generation of ever-more-extreme views within these groups can be dampened or

reversed by the introduction of cognitive diversity. We suggest a role for government

efforts, and agents, in introducing such diversity. Government agents (and their allies)

might enter chat rooms, online social networks, or even real-space groups and attempt to

undermine percolating conspiracy theories by raising doubts about their factual premises,

causal logic or implications for political action.

Anonymous ID: 5b39e0 Oct. 11, 2018, 9:16 a.m. No.3439253   🗄️.is 🔗kun   >>9328

>>3439073

>>3439150 reformatted for ease of reading.

>>3439222

 

the BEST part!

THAT WAS WRITTEN BY SAMANTHA POWERS HUSBAND.

https://en.wikipedia.org/wiki/Cass_Sunstein

thanks anon!

 

Standard social engineering techniques.

 

Here is a link to download a paper that BHO info czar wrote on it.

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585

Excerpt from page 23…

 

One promising tactic is cognitive infiltration of extremist groups. By this we do not mean 1960s-style infiltration with a view to surveillance and collecting information, possibly for use in future prosecutions. Rather, we mean that government efforts might succeed in weakening or even breaking up the ideological and epistemological complexes that constitute these networks and groups.

How might this tactic work? Recall that extremist networks and groups, including the groups that purvey conspiracy theories, typically suffer from a kind of crippled epistemology. Hearing only conspiratorial accounts of government behavior, their members become ever more prone to believe and generate such accounts. Informational and reputational cascades, group polarization, and selection effects suggest that the generation of ever-more-extreme views within these groups can be dampened or reversed by the introduction of cognitive diversity. We suggest a role for government efforts, and agents, in introducing such diversity.

Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action.