The race for power and the competition for government foothold is getting more sophisticated and fiercer with the evolution and use of Artificial Intelligence. Attack and defense in the political arena relies on surveillance, smear campaigns and the use of big data that is intertwined with conventional media and social media. A military grade AI infrastructure is becoming a common player in a combat where a timely command and control and decision making are essential.
The first step in having a functional Artificial Intelligence system is having the infrastructure of databases that store and enable the collection of information on candidates, judges, election inspectors, jury candidates, observers, postal service workers, social media interactions and voters. It is done with the pretext of campaign and registration management and is funded by millions of dollars that come from donations and PACs.
The second layer of a political AI is the integration of algorithms that classify, slice and dice, monitor, alert and disseminate this information for the political use. If a party has the access to more comprehensive databases and algorithms then the other party it has a major advantage on competing for the power. That party has a huge advantage in affecting public opinion via the information that is pushed in media and social media. It can be used for electoral litigation, smear campaigns, riot instigation, riots bail outs, cover ups, propaganda, political prosecution and ballot harvesting.
In 2016 and thereafter the Democrat party contracted (among others) and used the same people, media companies and Information Technology companies that the Intelligence community contracted and used. A symptomatic smoking gun was the cluster of irregularities of NSA downstream queries used during the election year and the “Crossfire” investigations and the amount of related unmasking done by the Obama administration before and after inauguration date. Even after losing the elections the same systems can be used for presidency subversion or a soft coup.
One of the companies that was contracted both by the FBI and the DNC at the same time was Crowdstrike where the FBI deliberately refused to grab the servers because of threats of lawfirms like Perkins Coie or other lawyers which some of them worked for or with the DOJ and IC. The other reason that the FBI didn’t want to investigate the DNC servers and the Weiner Notebook was the threat of exposing their complicity. IC complicity in meddling in elections may also expose the increasing power of weaponizing the use AI in elections and the erosion of first and fourth amendments by politically motivated bureaucrats. The methodology and plan of action are well documented in David Brock’s papers and other documents.
Media Matters has already secured access to raw data from Facebook, Twitter, and other social media sites. we have also put in place the technology necessary to automatically mine white nationalists message boards and alt-right communities for our archive.
We will now develop technologies and processes to systematically monitor and analyze this unfiltered data. (p. 11)
Our “Vault” – a 16-Terrabyte, full-searchable video archive (created in conjuction with a firm that recently commercialized a Defense Advanced Research Projects Agency – DARPA development), built from monitoring candidate media appearances. (p. 24)
David Brock entourage may label every outlet or person that disagrees or debunks their narrative white nationalist, alt-right, conspiracy theorist, “Uncle Tom” ot any other vilifying expression. This method enables derailing students, journalists, rioters and IC members actions in a mode that the end justifies the means and is the basis of tribalism, factionism, and cancel culture. The cancel culture is incorported in the AI algorithms, search engine manipulation, polls manufacuring and shadow banning.
One of the reasons that Democrat lawmakers refused to join the China Task Force in congress is because the CCP have learned from their methods and developed a similar technology as means of expanding digital authoritarianism of using the same AI concepts to control their people and oppress Uyghurs and Tibetan people. Both share the same goal of removing the president from office. The preferential knowledge transfer of AI methodology of ex intelligence community workers to a preferred party or to China was covered up using excuses of national security or a claim that these allegations are part of conspiracy theory.
Data is the oil of the 21th century.Today it is almost impossible to move a business forward or initiate a power grab without data.
Cookbok: David Brock’s Memo
Related Links and Sources
Election Infrastructure Security at CISA