Mindf*ck: Cambridge Analytica and the Plot to Break America
Rate it:
Open Preview
Kindle Notes & Highlights
3%
Flag icon
The story of Cambridge Analytica shows how our identities and behavior have become commodities in the high-stakes data trade. The companies that control the flow of information are among the most powerful in the world; the algorithms they’ve designed in secret are shaping minds in the United States and elsewhere in ways previously unimaginable. No matter what issue you care about most—gun violence, immigration, free speech, religious freedom—you can’t escape Silicon Valley, the new epicenter of America’s crisis of perception. My work with Cambridge Analytica exposed the dark side of tech ...more
5%
Flag icon
Everything we do, he said, is predicated on understanding exactly who we need to talk to, and on which issues.
5%
Flag icon
Once I understood the basics, I switched from petals to people. VAN was filled with information on age, gender, income, race, homeownership—even magazine subscriptions and airline miles. With the right data inputs, you could start to predict whether people would vote for Democrats or Republicans. You could identify and isolate the issues that were likely to be most important to them. You could begin to craft messages that would have a greater chance of swaying their opinions.
5%
Flag icon
BUT BY DIRECTLY COMMUNICATING select messages to select voters, the microtargeting of the Obama campaign had started a journey toward the privatization of public discourse in America. Although direct mail had long been part of American campaigns, data-driven microtargeting allowed campaigns to match a myriad of granular narratives to granular universes of voters—your neighbor might receive a wholly different message than you did, with neither of you being the wiser.
5%
Flag icon
When campaigns were conducted in private, the scrutiny of debate and publicity could be avoided. The town square, the very foundation of American democracy, was incrementally being replaced by online ad networks. And without any scrutiny, campaign messages no longer even had to look like campaign messages. Social media created a new environment where campaigns could now appear, as Obama’s campaign piloted, as if your friend was sending you a message, without your realizing the source or calculated intent of that contact. A campaign could look like a news site, university, or public agency.
6%
Flag icon
Tech companies began making money from their ability to map out and organize information. At the core of this model was an essential asymmetry in knowledge—the machines knew a lot about our behavior, but we knew very little about theirs. In a trade-off for convenience, these companies offered people information services in exchange for more information—data. The data has become more and more valuable, with Facebook making on average $30 from each of its 170 million American users. At the same time, we have fallen for the idea that these services are “free.” In reality, we pay with our data ...more
6%
Flag icon
More data led to more profits, and so design patterns were implemented to encourage users to share more and more about themselves. Platforms started to mimic casinos, with innovations like the infinite scroll and addictive features aimed at the brain’s reward systems. Services such as Gmail began trawling through our correspondence in a way that would land a traditional postal courier in jail. Live geo-tracking, once reserved for convicts’ ankle bracelets, was added to our phones, and what would have been called wiretapping in years past became a standard feature of countless applications.
6%
Flag icon
The newly formed Cambridge Analytica became that arsenal. Refining techniques from military psychological operations (PSYOPS), Cambridge Analytica propelled Steve Bannon’s alt-right insurgency into its ascendancy. In this new war, the American voter became a target of confusion, manipulation, and deception. Truth was replaced by alternative narratives and virtual realities.
6%
Flag icon
Seemingly out of nowhere, an uprising erupted in America with manic cries of MAGA! and Build the wall! Presidential debates suddenly shifted from policy positions into bizarre arguments about what was real news and what was fake news. America is now living in the aftermath of the first scaled deployment of a psychological weapon of mass destruction.
7%
Flag icon
What became clear in these communications was how early the Russian government had identified the Anglo-American alt-right network, and that it may have groomed figures within it to become access agents to Donald Trump. It showed the connections among the major events of 2016: the rise of the alt-right, the surprise passage of Brexit, and the election of Trump.
7%
Flag icon
Facebook is no longer just a company, I told them. It’s a doorway into the minds of the American people, and Mark Zuckerberg left that door wide open for Cambridge Analytica, the Russians, and who knows how many others. Facebook is a monopoly, but its behavior is more than a regulatory issue—it’s a threat to national security. The concentration of power that Facebook enjoys is a danger to American democracy.
13%
Flag icon
five-factor model of personality, which represents personality as a set of ratings on five scales: openness, conscientiousness, extraversion, agreeableness, and neuroticism. With time and testing, the measurement of these five traits has proven to be a powerful predictor of many aspects of people’s lives.
18%
Flag icon
Insurgencies, by nature, are asymmetric, in that a few people can cause large effects. So catalyzing an insurgency within the belligerent’s organization requires first concentrating resources on a few key target groups. This is optimized by good profiling and identifying the types of people who are both susceptible to new ways of thinking and connected enough to inject our counternarrative into their social network.
18%
Flag icon
The most effective form of perspecticide is one that first mutates the concept of self. In this light, the manipulator attempts to “steal” the concept of self from his target, replacing it with his own. This usually starts with attempting to smother the opponent’s narratives and then dominating the informational environment around the target. Often this involves gradually breaking down what are called psychological resilience factors over several months. Programs are designed to create unrealistic perceptions in the targets that result in confusion and damage self-efficacy. Targets are ...more
18%
Flag icon
But simply degrading morale is often not enough. The ultimate aim is to trigger negative emotions and thought processes associated with impulsive, erratic, or compulsive behavior. This moves a target from mild or passive resistance (e.g., less productivity, taking fewer risks, rumors, etc.) into a re...
This highlight has been truncated due to consecutive passage length restrictions.
18%
Flag icon
People high on the narcissism scale are susceptible because they are more prone to feelings of envy and entitlement, which are strong motivators of rule-breaking and hierarchy-defying behavior. This means these targets will be more likely to develop an exaggerated suspicion of harassment, persecution, victimhood, or unfair treatment. This is the “low-hanging fruit” for initiating the subversion of a larger organization. Later, this learning would serve as one of the foundations for Cambridge Analytica’s work catalyzing an alt-right insurgency in America.
18%
Flag icon
Let’s be clear: These operations are not some kind of therapeutic counseling; they are a form of psychological attack. It’s important to remember that, in a military context, the target’s personal agency or consent is not a concern. The target is the enemy. The choice for the military is often either to send in a drone to incinerate the enemy or to mess with the enemy’s unit to such an extent that they begin to fight among themselves or get sloppy and make exploitable mistakes. If you are a military commander or an intelligence officer, psychological manipulation is the “light touch” approach.
18%
Flag icon
With the advent of social media, suddenly military and security agencies had direct access to the minds and lives of guards, clerks, girlfriends, and runners of criminal and terrorist organizations all around the world. What the social data offered was a trail of detailed personal information that previously would have taken months of careful observation to gather. The targets were in effect creating their own dossiers with rich data that could quicken a psychologist’s assessment of their disposition. This spurred a host of research into psychological profiling that could be automated with ...more
This highlight has been truncated due to consecutive passage length restrictions.
19%
Flag icon
Although there was substantial underdevelopment of traditional telecommunications infrastructure, largely stemming from corruption and the neglectful legacies of colonial administrations, some of the world’s poorest countries had leapfrogged generations of technology, achieving impressive advances in mobile networks.
19%
Flag icon
One unintended consequence of having large pluralities of citizens connected via mobile phone networks was that everybody could be traced, tracked, profiled, and communicated with. Jihadist networks such as ISIS, AQAP, and Boko Haram had already figured this out, taking advantage of easy access to the minds of future conquests. And that turned the rules of warfare upside down.
24%
Flag icon
If we can measure or infer certain traits in individuals using personal data, and then use those same traits to describe a culture, we can chart a distribution, creating an approximate metric for that culture. This framework made it possible for us to propose how we could use personal data found on social media, in clickstreams, or from data vendors to identify, for example, who the most extroverted Italian people are through their patterns of behavior as individual consumers and users. Then, if one wants to shift the culture to make it slightly less extroverted, this data gives us a list of ...more
24%
Flag icon
THE GOAL IN HACKING is to find a weak point in a system and then exploit that vulnerability. In psychological warfare, the weak points are flaws in how people think. If you’re trying to hack a person’s mind, you need to identify cognitive biases and then exploit them. If you walk up to a random person on the street and ask, “Are you happy?” the chances are high that she will say yes. If, however, you walk up to that same person and first ask, “Have you gained weight in the last few years?” or “Are any people from your high school more successful than you?” and then you ask “Are you ...more
25%
Flag icon
What we played with as the questioner was how she was weighting that information, which in turn affected her judgment of that information. We biased her mental model of her life. So which is true? Is she happy or not happy? The answer depends on which information is being pulled to the front of her mind. In psychology, this is called priming. And this is, in essence, how you weaponize data: You figure out which bits of salient information to pull to the fore to affect how a person feels, what she believes, and how she behaves.
25%
Flag icon
We are all affected with cognitive biases, which are the commonly occurring errors in our thinking that generate flawed subjective interpretations of information. It is completely normal for people to process information with bias—in fact, everyone does—and oftentimes these biases are harmless in day-to-day life. These biases are not random in each person. Rather, they are systematic errors, meaning they create patterns in common forms of irrational thinking. In fact, thousands of cognitive biases have been identified in the field of psychology. Some biases are so common and seemingly ...more
25%
Flag icon
For example, the psychologists Amos Tversky and Daniel Kahneman conducted a study that asked participants a very simple question: “Suppose you sample a word at random from an English text. Is it more likely that the word starts with a k, or that k is the third letter?” Most people responded with the former, that words that start with k (e.g., kitchen, kite, or kilometer) are more likely. However, the opposite is true, and one is actually twice as likely in a typical English text to encounter words where the third letter is a k, such as ask, like, make, joke, or take. They tested for five ...more
26%
Flag icon
But Mercer, it seemed, wanted us to attempt an even more ambitious version of profitable disruption. By profiling every citizen in a country, imputing their personalities and unique behaviors, and placing those profiles in an in silico simulation of that society (one created inside a computer), we would be building the first prototype of the artificial society. If we could play with an economy or culture in a simulation of artificial agents with the same traits as the actual people they represented, we could just possibly create the most powerful market intelligence tool yet imagined. And by ...more
26%
Flag icon
The obvious first step was to visit the state and talk to people, to learn how they perceived the world and what mattered to them. We couldn’t generate questions until they had introduced themselves to us, in their own way and in their own environment. Once we had a better feel for what Virginians cared about and how they approached things, we could then structure specific questions for quantitative research. Politics and culture are so intertwined that one cannot usually study one without the other.
26%
Flag icon
In the five-factor model of personality, conservatives tend to display a combination of two traits: lower openness and higher conscientiousness. In the most general way, Republicans aren’t likely to seek out novelty or to express curiosity about new experiences (with closet cases being the obvious exception). At the same time, they favor structure and order, and they don’t like surprises. Democrats are more open but also often less conscientious. This is in part why political debates often center around behavior and the locus of personal responsibility.
27%
Flag icon
It turns out that Republicans can accept a batshit insane candidate, so long as it’s consistent insanity.
27%
Flag icon
In the 1990s, political strategists started buying personal information to use in campaigns. Think about it: If you know what kind of car or truck a person drives, whether they hunt, what charities they give to, and what magazines they subscribe to, you can start to form a picture of that person. Many Democrats and Republicans have a look. And their look was captured in this data snapshot. You can then target potential voters based on that information.
27%
Flag icon
We also got access to census data. Unlike developing nations with less stringent privacy controls, the U.S. government won’t provide raw data on specific individuals, but you can get information, down to the county or neighborhood level, on crime, obesity, and illnesses such as diabetes and asthma. A census block typically contains six hundred to three thousand people, which means that by combining many sources of data, we could build models that infer those attributes about individuals. For example, by referencing risk or protective factors for diabetes, such as age, race, location, income, ...more
28%
Flag icon
I once met the primatologist Jane Goodall, and she said something that always stuck with me. Mingling at a reception, I asked why she researched primates in the wild instead of in a controlled lab. It’s simple, she said: Because they don’t live in labs. And neither do humans. If we are to really understand people, we have to always remember that they live outside of data sets.
28%
Flag icon
Fox News, and all I could think about was how the network was conditioning people’s sense of identity into something that could be weaponized. Fox fuels anger with its hyperbolic narratives because anger disrupts the ability to seek, rationalize, and weigh information. This leads to a psychological bias called affect heuristic, where people use mental shortcuts that are significantly influenced by emotion. It’s the same bias that makes people say things they later regret in a fit of anger—in the heat of the moment they are, in fact, thinking differently.
28%
Flag icon
With their guards down, Fox’s audience is then told they are part of a group of “ordinary Americans.” This identity is hammered home over and over, which is why there are so many references to “us” and direct chatting to the audience by the moderators. The audience is reminded that if you are really an “ordinary American,” this is how you—i.e., “we”—think. This primes people for identity-motivated reasoning, which is a bias that essentially makes people accept or reject information based on how it serves to build or threaten group identity rather than on the merits of the content. This ...more
29%
Flag icon
One of the problems I noticed with the topical political debates on American cable news channels is the lack of nuance in labeling voter constituencies. White voters, Latino voters, women voters, suburban voters, etc., are all frequently discussed as unidimensional and monolithic groups, when in fact the salient aspects of many voters’ identities do not actually reflect the labels that pollsters, analysts, or consultants use to describe them. And this in turn alienates certain people. If you’re a white man living in a trailer, for example, you’re probably going to get angry when you are shown ...more
30%
Flag icon
Harvesting social media data to profile users with an algorithm was just the beginning. Once their behavioral attributes were inferred, simulations could be run to map out how they would communicate and interact with one another at scale.
32%
Flag icon
Moldbug’s views on “truth” influenced Bannon and what Cambridge Analytica would become. Moldbug has written that “nonsense is a more effective organizing tool than the truth,” and Bannon embraced this. “Anyone can believe in the truth,” Moldbug writes. “It serves as a political uniform. And if you have a uniform, you have an army.”
32%
Flag icon
When it comes to what’s happening in other places, Americans will talk about “tribes,” “regimes,” “radicalization,” “religious extremists,” “ethnic conflicts,” “local superstitions,” or “rituals.” Anthropology is for other people, not Americans. America is supposedly this “shining city upon a hill,” a term Ronald Reagan famously popularized, adapting it from the biblical story of the Sermon on the Mount. But when I would see evangelists prophesying the end times and woe unto the nonbelievers, when I watched a Westboro Baptist Church demonstration, when I saw a gun show with bikini-clad ladies ...more
33%
Flag icon
The United States has its own origin myths, its own extremist groups. At SCL, I had the displeasure of watching countless propaganda videos disseminated by ISIS and deadbeat wannabe African warlords. The way members of jihadist cults fetishize their guns is no different from the way members of the NRA fetishize theirs. I knew that if we were going to truly study America, we needed to do it as if we were studying tribal conflict—by mapping out the country’s rituals, superstitions, mythologies, and ethnic tensions.
33%
Flag icon
For example, people kept talking, unprompted, about the seemingly obscure issue of congressional term limits. They’d say over and over that the big problem in Washington is that the politicians stay in office too long and get bought by special interests. At one focus group in North Carolina, a couple of people used the phrase “Drain the swamp,” so he included that in the notes he sent back, too. CA would later study that phrase using multivariate tests on online panels of target voters, to see whether it resonated with voters.
36%
Flag icon
The evidence was clear: The patterns of a social media user’s likes, status updates, groups, follows, and clicks all serve as discrete clues that could accurately reveal a person’s personality profile when compiled together.
37%
Flag icon
One of the challenges for social sciences like psychology, anthropology, and sociology is a relative lack of numerical data, since it’s extremely hard to measure and quantify the abstract cultural or social dynamics of an entire society. That is, unless you can throw a virtual clone of everyone into a computer and observe their dynamics.
37%
Flag icon
They told me, essentially, that Facebook simply let them take it, through apps the professors had created. Facebook wants people to do research on its platform. The more it learns about its users, the more it can monetize them. It became clear when they explained how they collected data that Facebook’s permissions and controls were incredibly lax. When a person used their app, Stillwell and Kosinski could receive not only that person’s Facebook data, but the data of all of their friends as well. Facebook did not require express consent for apps to collect data from an app user’s friends, as it ...more
38%
Flag icon
On Facebook, you could “like” things—pages of brands or topics, along with the posts of friends. The purpose of liking was to allow users a chance to curate their personas and follow updates from their favorite brands, bands, or celebrities. Facebook considers this phenomenon of liking and sharing the basis of what it calls a “community.” Of course, it also considers this the basis of its revenue model, where advertisers can optimize their targeting using Facebook data. The site also launched an API (application programming interface) to allow users to join apps on Facebook, which would then ...more
38%
Flag icon
Previously, the only way one could have acquired such data would have been from your bank or phone company, which are strictly regulated to prevent access to that sort of private information. But unlike a bank or telecom company, social media operated with virtually no laws governing its access to extremely granular personal data.
38%
Flag icon
Although many users tend to distinguish between what happens online from what happens IRL (in real life), the data that is generated from their use of social media—from posting reactions to the season finale of a show to liking photos from Saturday night out—is generated from life outside the Internet. In other words, Facebook data is IRL data. And it is only increasing as people live their lives more and more on their phones and on the Internet. This means that, for an analyst, there’s often no need to ask questions: You simply create algorithms that find discrete patterns in a user’s ...more
38%
Flag icon
Facebook users curate themselves all in one place in a single data form. We don’t need to connect a million data sets; we don’t have to do complicated math to fill in missing data. The information is already in place, because everyone serves up their real-time autobiography, right there on the site. If you were creating a sys...
This highlight has been truncated due to consecutive passage length restrictions.
38%
Flag icon
In fact, a 2015 study by Youyou, Kosinski, and Stillwell showed that, using Facebook likes, a computer model reigned supreme in predicting human behavior. With ten likes, the model predicted a person’s behavior more accurately than one of their co-workers. With 150 likes, better than a family member. And with 300 likes, the model knew the person better than their own spouse. This is in part because friends, colleagues, spouses, and parents typically see only part of your life, where your behavior is moderated by the context of that relationship. Your parents may never see how wild you can get ...more
This highlight has been truncated due to consecutive passage length restrictions.
39%
Flag icon
Psychologists and university researchers soon discovered that MTurk was a great way to leverage large numbers of people to fill out personality tests. Rather than have to scrounge for undergraduates willing to take surveys, which never gave a truly representative sample anyway, researchers could draw all kinds of people from all over the world. They would invite MTurk members to take a one-minute test, paying them a small fee to do so. At the end of the session, there would be a payment code, which the person could input on their Amazon page, and Amazon would transfer payment into the person’s ...more
39%
Flag icon
Users would fill out a wide battery of psychometric inventories, but it always started with a peer-reviewed and internationally validated personality measure called the IPIP NEO-PI, which presented hundreds of items, like “I keep others at a distance,” “I enjoy hearing new ideas,” and “I act without thinking.” When these responses were combined with Facebook likes, reliable inferences could then be made. For example, extroverts were more likely to like electronic music and people scoring higher in openness were more likely to like fantasy films, whereas more neurotic people would like pages ...more
« Prev 1 3