You are here

Conspiracy Theories: Causes and Cures,

Primary tabs

SizeSeedsPeersCompleted
344.81 KiB000
This torrent has no flags.


.
.

.
.
Conspiracy Theories: Causes and Cures,
.
.
This is the actual paper-in pdf of the plan to infiltrate Conspiracy Theory sites. I looked to see if it was here already, but didn't see it. if it's here, I apologize for reupping it
.
.
In a 2008 academic paper, President Barack Obama’s appointee to head the Office of Information and Regulatory Affairs had advocated “cognitive infiltration” of groups that advocate “conspiracy theories” like the ones surrounding 9/11.

Cass Sunstein, a Harvard law professor, co-wrote an academic article entitled “Conspiracy Theories: Causes and Cures,” in which he argued that the government should stealthily infiltrate groups that pose alternative theories on historical events via “chat rooms, online social networks, or even real-space groups and attempt to undermine” those groups.

As head of the Office of Information and Regulatory Affairs, Sunstein is in charge of “overseeing policies relating to privacy, information quality, and statistical programs,” according to the White House Web site.

Sunstein’s article, published in the Journal of Political Philosphy in 2008 and recently uncovered by blogger Marc Estrin, states that “our primary claim is that conspiracy theories typically stem not from irrationality or mental illness of any kind but from a ‘crippled epistemology,’ in the form of a sharply limited number of (relevant) informational sources.”

By “crippled epistemology” Sunstein means that people who believe in conspiracy theories have a limited number of sources of information that they trust. Therefore, Sunstein argued in the article, it would not work to simply refute the conspiracy theories in public — the very sources that conspiracy theorists believe would have to be infiltrated.

Sunstein, whose article focuses largely on the 9/11 conspiracy theories, suggests that the government “enlist nongovernmental officials in the effort to rebut the theories. It might ensure that credible independent experts offer the rebuttal, rather than government officials themselves. There is a tradeoff between credibility and control, however. The price of credibility is that government cannot be seen to control the independent experts.”

Sunstein argued that “government might undertake (legal) tactics for breaking up the tight cognitive clusters of extremist theories.” He suggested that “government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action.”

“We expect such tactics from undercover cops, or FBI,” Estrin writes at the Rag Blog, expressing surprise that “a high-level presidential advisor” would support such a strategy.

Estrin notes that Sunstein advocates in his article for the infiltration of “extremist” groups so that it undermines the groups’ confidence to the extent that “new recruits will be suspect and participants in the group’s virtual networks will doubt each other’s bona fides.”

Sunstein has been the target of numerous “conspiracy theories” himself, mostly from the right wing political echo chamber, with conservative talking heads claiming he favors enacting “a second Bill of Rights” that would do away with the Second Amendment. Sunstein’s recent book, On Rumors: How Falsehoods Spread, Why We Believe Them, What Can Be Done, was criticized by some on the right as “a blueprint for online censorship.”

Sunstein “wants to hold blogs and web hosting services accountable for the remarks of commenters on websites while altering libel laws to make it easier to sue for spreading ‘rumors,’” wrote Ed Lasky at American Thinker.
.
.
.
This part (below) is the ABSTRACT from the front cover. The enclosed pfd is 30 pages
.
.
.
Many millions of people hold conspiracy theories; they believe that powerful people have worked together in order to withhold the truth about some important practice or some terrible event. A recent example is the belief, widespread in some parts of the world, that the attacks of 9/11 were carried out not by Al Qaeda, but by Israel or the United States. Those who subscribe to conspiracy theories may create serious risks, including risks of violence, and the existence of such theories raises significant challenges for policy and law. The first challenge is to understand the mechanisms by which conspiracy theories prosper; the second challenge is to understand how such theories might be undermined. Such theories typically spread as a result of identifiable cognitive blunders, operating in conjunction with informational and reputational influences. A distinctive feature of conspiracy theories is their self-sealing quality. Conspiracy theorists are not likely to be persuaded by an attempt to dispel their theories; they may even characterize that very attempt as further proof of the conspiracy. Because those who hold conspiracy theories typically suffer from a crippled epistemology, in accordance with which it is rational to hold such theories, the best response consists in cognitive infiltration of extremist groups. Various policy dilemmas, such as the question whether it is better for government to rebut conspiracy theories or to ignore them, are explored in this light.
.
.
enjoy
.
.