Truth, Lies, and Automation

Total Page:16

File Type:pdf, Size:1020Kb

Truth, Lies, and Automation Truth, Lies, and Automation x How Language Models Could Change Disinformation AUTHORS MAY 2021 Ben Buchanan Micah Musser Andrew Lohn Katerina Sedova Established in January 2019, the Center for Security and Emerging Technology (CSET) at Georgetown’s Walsh School of Foreign Service is a research organization fo- cused on studying the security impacts of emerging tech- nologies, supporting academic work in security and tech- nology studies, and delivering nonpartisan analysis to the policy community. CSET aims to prepare a generation of policymakers, analysts, and diplomats to address the chal- lenges and opportunities of emerging technologies. CSET focuses on the effects of progress in artifi cial intelligence, advanced computing, and biotechnology. CSET.GEORGETOWN.EDU | [email protected] 2 Center for Security and Emerging Technology MAY 2021 Truth, Lies, and Automation HOW LANGUAGE MODELS COULD CHANGE DISINFORMATION AUTHORS Ben Buchanan Andrew Lohn Micah Musser Katerina Sedova ACKNOWLEDGMENTS We would like to thank John Bansemer, Jack Clark, Teddy Collins, Aditi Joshi, Aurora Johnson, Miriam Matthews, Igor Mikolic-Torreira, Lisa Oguike, Girish Sastry, Thomas Rid, Chris Rohlf, Lynne Weil, and all the members of the CyberAI team at CSET for their comments on previous drafts and their help in preparing this study. In addition, we would in particular like to thank Catherine Aiken and James Dunham for their help in survey design and data collection, as well as Jennifer Melot for her assistance in data collection and code review. Lastly, we would also like to thank OpenAI for access to their model. All errors remain ours alone. DATA AND CODE Data and code supporting this project is available at https://github.com/georgetown-cset/GPT3-Disinformation AUTHORS Ben Buchanan is the director of the CyberAI Project and a senior faculty fellow with CSET, as well as an assistant teaching professor at Georgetown University’s Walsh School of Foreign Service. Drew Lohn is a senior fellow with the CyberAI Project, where Micah Musser is a research analyst and Katerina Sedova is a fellow. PRINT AND ELECTRONIC DISTRIBUTION RIGHTS © 2021 by the Center for Security and Emerging Technology. This work is licensed under a Creative Commons Attribution- NonCommercial 4.0 International License. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc/4.0/. DOCUMENT IDENTIFIER doi: 10.51593/2021CA003 Contents EXECUTIVE SUMMARY III INTRODUCTION VII 1 | HUMAN-MACHINE TEAMS FOR DISINFORMATION 1 2 | TESTING GPT-3 FOR DISINFORMATION 5 Narrative Reiteration 6 Narrative Elaboration 9 Narrative Manipulation 15 Narrative Seeding 21 Narrative Wedging 25 Narrative Persuasion 30 3 | OVERARCHING LESSONS 35 Working with GPT-3 35 Examining GPT-3’s Writing 37 4 | THE THREAT OF AUTOMATED DISINFORMATION 41 Threat Model 41 Mitigations 44 CONCLUSION 47 ENDNOTES 51 Center for Security and Emerging Technology i iv Center for Security and Emerging Technology Executive Summary or millennia, disinformation campaigns have been fundamentally human endeavors. Their perpetrators mix truth and lies in potent F combinations that aim to sow discord, create doubt, and provoke destructive action. The most famous disinformation campaign of the twenty-first century—the Russian effort to interfere in the U.S. presiden- tial election—relied on hundreds of people working together to widen preexisting fissures in American society. Since its inception, writing has also been a fundamentally human endeavor. No more. In 2020, the company OpenAI unveiled GPT-3, a powerful artificial intelligence system that generates text based on a prompt from human operators. The system, which uses a vast neural network, a powerful machine learning algorithm, and upwards of a trillion words of human writing for guidance, is remarkable. Among oth- er achievements, it has drafted an op-ed that was commissioned by The Guardian, written news stories that a majority of readers thought were written by humans, and devised new internet memes. In light of this breakthrough, we consider a simple but important question: can automation generate content for disinformation campaigns? If GPT-3 can write seemingly credible news stories, perhaps it can write compelling fake news stories; if it can draft op-eds, perhaps it can draft misleading tweets. To address this question, we first introduce the notion of a human- machine team, showing how GPT-3’s power derives in part from the human-crafted prompt to which it responds. We were granted free access to GPT-3—a system that is not publicly available for use—to study GPT-3’s capacity to produce disinformation as part of a human-machine team. We show that, while GPT-3 is often quite capable on its own, it reaches new Center for Security and Emerging Technology iii heights of capability when paired with an adept operator and editor. As a result, we conclude that although GPT-3 will not replace all humans in disinformation opera- tions, it is a tool that can help them to create moderate- to high-quality messages at a scale much greater than what has come before. In reaching this conclusion, we evaluated GPT-3’s performance on six tasks that are common in many modern disinformation campaigns. Table 1 describes those tasks and GPT-3’s performance on each. TABLE 1 Summary evaluations of GPT-3 performance on six disinformation-related tasks. TASK DESCRIPTION PERFORMANCE Narrative Generating varied short messages that GPT-3 excels with little human involvement. Reiteration advance a particular theme, such as climate change denial. Narrative Developing a medium-length story that fits GPT-3 performs well, and technical Elaboration within a desired worldview when given only fine-tuning leads to consistent performance. a short prompt, such as a headline. Narrative Rewriting news articles from a new GPT-3 performs reasonably well with little Manipulation perspective, shifting the tone, worldview, and human intervention or oversight, though our conclusion to match an intended theme. study was small. Narrative Devising new narratives that could form the GPT-3 easily mimics the writing style of QAnon Seeding basis of conspiracy theories, such as QAnon. and could likely do the same for other conspiracy theories; it is unclear how potential followers would respond. Narrative Targeting members of particular groups, A human-machine team is able to craft credible Wedging often based on demographic characteristics targeted messages in just minutes. GPT-3 deploys such as race and religion, with messages stereotypes and racist language in its writing for designed to prompt certain actions or to this task, a tendency of particular concern. amplify divisions. Narrative Changing the views of targets, in some cases A human-machine team is able to devise messages Persuasion by crafting messages tailored to their on two international issues—withdrawal from political ideology or affiliation. Afghanistan and sanctions on China—that prompt survey respondents to change their positions; for example, after seeing five short messages written by GPT-3 and selected by humans, the percentage of survey respondents opposed to sanctions on China doubled. iv Center for Security and Emerging Technology Should adversaries choose to pursue automation in their disinformation campaigns, we believe that deploying an algorithm like the one in GPT-3 is well within the capac- ity of foreign governments, especially tech-savvy ones such as China and Russia. It will be harder, but almost certainly possible, for these governments to harness the required computational power to train and run such a system, should they desire to do so. Across these and other assessments, GPT-3 proved itself to be both powerful and limited. When properly prompted, the machine is a versatile and effective writ- er that nonetheless is constrained by the data on which it was trained. Its writing is imperfect, but its drawbacks—such as a lack of focus in narrative and a tendency to adopt extreme views—are less significant when creating content for disinformation campaigns. Should adversaries choose to pursue automation in their disinformation cam- paigns, we believe that deploying an algorithm like the one in GPT-3 is well within the capacity of foreign governments, especially tech-savvy ones such as China and Russia. It will be harder, but almost certainly possible, for these governments to har- ness the required computational power to train and run such a system, should they desire to do so. Mitigating the dangers of automation in disinformation is challenging. Since GPT-3’s writing blends in so well with human writing, the best way to thwart ad- versary use of systems like GPT-3 in disinformation campaigns is to focus on the infrastructure used to propagate the campaign’s messages, such as fake accounts on social media, rather than on determining the authorship of the text itself. Such mitigations are worth considering because our study shows there is a real prospect of automated tools generating content for disinformation campaigns. In particular, our results are best viewed as a low-end estimate of what systems like GPT-3 can offer. Adversaries who are unconstrained by ethical concerns and buoyed with greater resources and technical capabilities will likely be able to use Center for Security and Emerging Technology v systems like GPT-3 more fully than we have, though it is hard to know whether they will choose to do so. In particular, with the right infrastructure, they will likely be able to harness the scalability that such automated systems offer, generating many messages and flooding the information landscape with the machine’s most danger- ous creations. Our study shows the plausibility—but not inevitability—of such a future, in which automated messages of division and deception cascade across the internet. While more developments are yet to come, one fact is already apparent: humans now have able help in mixing truth and lies in the service of disinformation. vi Center for Security and Emerging Technology Introduction Internet operators needed!” read a 2013 post on Russian social media.
Recommended publications
  • Duckduckgo Search Engines Android
    Duckduckgo search engines android Continue 1 5.65.0 10.8MB DuckduckGo Privacy Browser 1 5.64.0 10.8MB DuckduckGo Privacy Browser 1 5.63.1 10.78MB DuckduckGo Privacy Browser 1 5.62.0 10.36MB DuckduckGo Privacy Browser 1 5.61.2 10.36MB DuckduckGo Privacy Browser 1 5.60.0 10.35MB DuckduckGo Privacy Browser 1 5.59.1 10.35MB DuckduckGo Privacy Browser 1 5.58.1 10.33MB DuckduckGo Privacy Browser 1 5.57.1 10.31MB DuckduckGo Privacy browser © DuckduckGo. Privacy, simplified. This article is about the search engine. For children's play, see duck, duck, goose. Internet search engine DuckDuckGoScreenshot home page DuckDuckGo on 2018Type search engine siteWeb Unavailable inMultilingualHeadquarters20 Paoli PikePaoli, Pennsylvania, USA Area servedWorldwideOwnerDuck Duck Go, Inc., createdGabriel WeinbergURLduckduckgo.comAlexa rank 158 (October 2020 update) CommercialRegregedSeptember 25, 2008; 12 years ago (2008-09-25) was an Internet search engine that emphasized the privacy of search engines and avoided the filter bubble of personalized search results. DuckDuckGo differs from other search engines by not profiling its users and showing all users the same search results for this search term. The company is based in Paoli, Pennsylvania, in Greater Philadelphia and has 111 employees since October 2020. The name of the company is a reference to the children's game duck, duck, goose. The results of the DuckDuckGo Survey are a compilation of more than 400 sources, including Yahoo! Search BOSS, Wolfram Alpha, Bing, Yandex, own web scanner (DuckDuckBot) and others. It also uses data from crowdsourcing sites, including Wikipedia, to fill in the knowledge panel boxes to the right of the results.
    [Show full text]
  • The Single-Assassin Theory, the Media Establishment and the CIA
    Digital Commons @ Georgia Law Popular Media Faculty Scholarship 11-23-2016 The inS gle-Assassin Theory, the Media Establishment and the CIA Donald E. Wilkes Jr. University of Georgia School of Law, [email protected] Repository Citation Wilkes, Donald E. Jr., "The inS gle-Assassin Theory, the Media Establishment and the CIA" (2016). Popular Media. 271. https://digitalcommons.law.uga.edu/fac_pm/271 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Commons @ Georgia Law. It has been accepted for inclusion in Popular Media by an authorized administrator of Digital Commons @ Georgia Law. Please share how you have benefited from this access For more information, please contact [email protected]. The Single-Assassin Theory, the Media Establishment and the CIA By Donald E. Wilkes, Jr. From the day of President Kennedy’s assassination on, there has been speculation about the responsibility for his murder… This trend is a matter of concern to the U.S. government, including our organization… The aim of this dispatch is to provide material for countering and discrediting the claims of the conspiracy theorists… [A]ddressees [of this dispatch] are requested: a. To discuss the publicity problem with liaison and friendly elite contacts (especially politicians and editors), pointing out that the Warren Commission made as thorough an investigation as humanly possible…[and] that parts of this conspiracy talk appear to be deliberately generated by Communist propagandists… b. To employ propaganda assets to answer and refute the attacks of the critics. Book reviews and feature articles are particularly appropriate for this purpose.—Excerpt from secret CIA document “Countering Criticism of the Warren Report,” dated April 1, 1967, declassified in 1998.
    [Show full text]
  • Islamophobia, Radical Parties and European Values a Critical Analysis of Current Developments in Western Europe
    0 E.MA – EUROPEAN MASTER‟S DEGREE IN HUMAN RIGHTS AND DEMOCRATISATION The European Dynamics: Islamophobia, Radical Parties and European Values A critical analysis of current developments in Western Europe Hanna Barvaeus Academic year 2010/2011 Supervisor: Dr. Daniel García San José University of Seville 1 Abstract: Europe has in the past few decades seen a rise in political parties whose agenda differs quite significantly from other established European political parties. The aim of these relatively new parties is to change aspects in society which they see as problematic, and which threaten the traditional European traditions and values. One such threat often pointed out by the parties is the growth of the Muslim minority in Europe. Anti-Muslim sentiments are frequently used in the political rhetoric of the parties, whose ideas are legitimised through increased hostility towards Muslims among Europeans in general. This paper will analyse the dynamics between the increased intolerance towards Muslims in Europe, the popularity of the parties who use anti-Islamic speech to gain popularity, and the possible effects on the European value system as stated by the European Union and the Council of Europe. The conclusion drawn is that core European values are threatened by increased European intolerance towards the Muslim minority, and if the situation is not taken seriously, the values by which Europe defines itself might be weakened in the future. Table of content Chapter I. Introduction……………………………………………………………….3 I.1. Background…………………………………………………………..3 I.2. Thesis structure………………………………………………………4 I.3. State of the art………………………………………………………..5 I.4. Methodology and use of sources…………………………………….6 Chapter II.
    [Show full text]
  • Redalyc.Lawfare: the Colombian Case
    Revista Científica General José María Córdova ISSN: 1900-6586 [email protected] Escuela Militar de Cadetes "General José María Córdova" Colombia Padilla, Juan Manuel Lawfare: The Colombian Case Revista Científica General José María Córdova, vol. 10, núm. 10, 2012, pp. 107-142 Escuela Militar de Cadetes "General José María Córdova" Bogotá, Colombia Available in: http://www.redalyc.org/articulo.oa?id=476248923006 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Estudios militares Revista Científica “General José María Córdova”, Bogotá D.C. (Colombia) Sección . Vol 10, Núm 10, Año 2012, Junio REVCGJMC.10(10): 107-142, 2012 Lawfare: The Colombian Case * Guerra jurídica: el caso colombiano La guerre juridique: le cas colombien Guerra jurídica: o caso colombiano Recibido: 20 de Febrero de 2012. Aceptado: 15 de Abril de 2012. Juan Manuel Padillaa * Researche monograph originally presented to the School of Advanced Military Studies of the United States Command and General Staff College, Fort Leavenworth, Kansas, approved for Revista Cientifica Public Release. “General José María Córdova”, Bogotá D.C. (Colombia) a Máster en Ciencias y Artes Militares , U.S. Army Command and General Staff College. Director Sección Estudios militares. de la Escuela Militar de Cadetes “General José María Córdova”. Comentarios a: jumapac@gmail. Vol 10 , Núm 10, Año 2012, com Junio, pp. 107-142 ISSN 1900- 6586 108 Juan Manuel Padilla Abstract. The terrorist groups in Colombia have applied Mao’s theory of protracted people’s war, seeking to use all available means of struggle to achieve their revolutionary goals by counteracting govemment policy.
    [Show full text]
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • The Unnecessary Crime of Conspiracy
    California Law Review VOL. 61 SEPTEMBER 1973 No. 5 The Unnecessary Crime of Conspiracy Phillip E. Johnson* The literature on the subject of criminal conspiracy reflects a sort of rough consensus. Conspiracy, it is generally said, is a necessary doctrine in some respects, but also one that is overbroad and invites abuse. Conspiracy has been thought to be necessary for one or both of two reasons. First, it is said that a separate offense of conspiracy is useful to supplement the generally restrictive law of attempts. Plot- ters who are arrested before they can carry out their dangerous schemes may be convicted of conspiracy even though they did not go far enough towards completion of their criminal plan to be guilty of attempt.' Second, conspiracy is said to be a vital legal weapon in the prosecu- tion of "organized crime," however defined.' As Mr. Justice Jackson put it, "the basic conspiracy principle has some place in modem crimi- nal law, because to unite, back of a criniinal purpose, the strength, op- Professor of Law, University of California, Berkeley. A.B., Harvard Uni- versity, 1961; J.D., University of Chicago, 1965. 1. The most cogent statement of this point is in Note, 14 U. OF TORONTO FACULTY OF LAW REv. 56, 61-62 (1956): "Since we are fettered by an unrealistic law of criminal attempts, overbalanced in favour of external acts, awaiting the lit match or the cocked and aimed pistol, the law of criminal conspiracy has been em- ployed to fill the gap." See also MODEL PENAL CODE § 5.03, Comment at 96-97 (Tent.
    [Show full text]
  • Renowned Violinist Enjoys Shen Yun's Music, Dance, and Production
    THEEPOCHTIMES.COM | SHENYUN.COM Shen Yun Performing Arts: The Significant Cultural Event of Our Time SHEN YUN PERFORMING ARTS REVIEWS Renowned Violinist Enjoys Shen Yun’s Music, Dance, and Production April 1, 2019 Andrew Dawes enjoyed Shen Yun at Queen Elizabeth Theatre in Vancouver, Canada, on March 31, 2019. (Mary Man/The Epoch Times) VANCOUVER—Renowned Canadian violinist Andrew Dawes enjoyed the visual and aural components of Shen Yun Performing Arts, which when combined seeks to illustrate the beauty of a thousands year old culture said to be inspired by the heavens. “As a musician, I was very pleased with everything, with music and the dance and the production, it’s great, it’s a wonderful show,” he said. “I think all these musicians are doing an excellent job, really a great pleasure to hear you all.” Dawes is known for being first violinist of the Toronto-based Orford String Quartet for almost three decades. He was also Professor of Music at the University of Toronto and is Professor Emeritus at the University of British Columbia School of Music. The musician has also acted as a juror in several music competitions including the London International String Quartet competition, the Coleman Chamber Music Competition, and the Fischoff National Chamber Music Competition. He attended the performance of Shen Yun at the Queen Elizabeth Theatre in Vancouver, Canada, on March 31. Shen Yun was founded in New York in 2006 with a goal of reviving traditional Chinese culture through the arts. Since then, the company has expanded from one to six contingents that tour the world each year to showcase the wonders of an ancient civilization to modern audiences.
    [Show full text]
  • Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
    Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • Coronavirus News and Information on Youtube: a Content Analysis of Popular Search Terms
    Coronavirus News and Information on YouTube: A Content Analysis of Popular Search Terms Online Supplement Nahema Marchal, Hubert Au, Philip N. Howard Data and Method In this memo, we investigate the type of information users come across when searching for information about the coronavirus on YouTube. We first collected a list of the 10 most frequent YouTube search terms related to the “coronavirus” UK over the last 90 days, using Google Trends on March 10th, 2020. For comparison, we also collected the auto-complete YouTube search suggestions for the term “coronavirus”, using a Google Chrome browser in Incognito Mode. Table 1. Top YouTube Searches related to the term “coronavirus” Top YouTube Searches related to the term “coronavirus” UK coronavirus china; uk coronavirus; coronavirus news; coronavirus (top 10) live; coronavirus in uk; coronavirus conspiracy; simpsons coronavirus; corona virus; coronavirus wuhan; coronavirus symptoms Note: Compiled based on Google Trends results collected 10/03/2020 Figure 1. Search predictions on YouTube GB in “Incognito Mode” We carried out the searches by running our list of 4 coronavirus-related search terms through YouTube Data Tools (YTDT)’s Video List function, a tool that directly interacts with the YouTube v3.4 API. This generated a list of the top 50 video results associated with each search term, ranked by relevance (based on YouTube API documentation). We then examined the most “related” or “recommended videos” for these search queries. This returned a network graph where each edge denoted a
    [Show full text]
  • Capitol Insurrection at Center of Conservative Movement
    Capitol Insurrection At Center Of Conservative Movement: At Least 43 Governors, Senators And Members Of Congress Have Ties To Groups That Planned January 6th Rally And Riots. SUMMARY: On January 6, 2021, a rally in support of overturning the results of the 2020 presidential election “turned deadly” when thousands of people stormed the U.S. Capitol at Donald Trump’s urging. Even Senate Republican leader Mitch McConnell, who rarely broke with Trump, has explicitly said, “the mob was fed lies. They were provoked by the President and other powerful people.” These “other powerful people” include a vast array of conservative officials and Trump allies who perpetuated false claims of fraud in the 2020 election after enjoying critical support from the groups that fueled the Capitol riot. In fact, at least 43 current Governors or elected federal office holders have direct ties to the groups that helped plan the January 6th rally, along with at least 15 members of Donald Trump’s former administration. The links that these Trump-allied officials have to these groups are: Turning Point Action, an arm of right-wing Turning Point USA, claimed to send “80+ buses full of patriots” to the rally that led to the Capitol riot, claiming the event would be one of the most “consequential” in U.S. history. • The group spent over $1.5 million supporting Trump and his Georgia senate allies who claimed the election was fraudulent and supported efforts to overturn it. • The organization hosted Trump at an event where he claimed Democrats were trying to “rig the election,” which he said would be “the most corrupt election in the history of our country.” • At a Turning Point USA event, Rep.
    [Show full text]
  • The Qanon Conspiracy
    THE QANON CONSPIRACY: Destroying Families, Dividing Communities, Undermining Democracy THE QANON CONSPIRACY: PRESENTED BY Destroying Families, Dividing Communities, Undermining Democracy NETWORK CONTAGION RESEARCH INSTITUTE POLARIZATION AND EXTREMISM RESEARCH POWERED BY (NCRI) INNOVATION LAB (PERIL) Alex Goldenberg Brian Hughes Lead Intelligence Analyst, The Network Contagion Research Institute Caleb Cain Congressman Denver Riggleman Meili Criezis Jason Baumgartner Kesa White The Network Contagion Research Institute Cynthia Miller-Idriss Lea Marchl Alexander Reid-Ross Joel Finkelstein Director, The Network Contagion Research Institute Senior Research Fellow, Miller Center for Community Protection and Resilience, Rutgers University SPECIAL THANKS TO THE PERIL QANON ADVISORY BOARD Jaclyn Fox Sarah Hightower Douglas Rushkoff Linda Schegel THE QANON CONSPIRACY ● A CONTAGION AND IDEOLOGY REPORT FOREWORD “A lie doesn’t become truth, wrong doesn’t become right, and evil doesn’t become good just because it’s accepted by the majority.” –Booker T. Washington As a GOP Congressman, I have been uniquely positioned to experience a tumultuous two years on Capitol Hill. I voted to end the longest government shut down in history, was on the floor during impeachment, read the Mueller Report, governed during the COVID-19 pandemic, officiated a same-sex wedding (first sitting GOP congressman to do so), and eventually became the only Republican Congressman to speak out on the floor against the encroaching and insidious digital virus of conspiracy theories related to QAnon. Certainly, I can list the various theories that nest under the QAnon banner. Democrats participate in a deep state cabal as Satan worshiping pedophiles and harvesting adrenochrome from children. President-Elect Joe Biden ordered the killing of Seal Team 6.
    [Show full text]