A Blog by Jonathan Low

 

Oct 14, 2020

How AI Predictive Modeling Is Driving 2020 Presidential Campaigns

Polling is so 2016. Machine learning and AI-driven predictive modeling, based on acquisition advertising-generated data is leaving very little to voters' opinions and much more to how they actually behave in response to marketing stimuli. JL

Tate Ryan-Moseley reports in MIT Technology Review:

In 2020, traditional polling is giving way to AI-powered predictive modeling; massive data exchanges, once considered questionably legal, allow campaigns, PACs, and other groups to coordinate their efforts. Both campaigns seek to arm themselves with comprehensive views of each potential voter and are using algorithms to segment and target voters specifically and strategically. Acquisition advertising, in which campaigns run direct response ads to get contact information or opinions (accounts for) 80% of their ad budgets. Machine learning and AI to predict how voters will behave run using continuously updated data sets.

Campaigns and elections have always been about data—underneath the empathetic promises to fix your problems and fight for your family, it’s a business of metrics. If a campaign is lucky, it will find its way through a wilderness of polling, voter attributes, demographics, turnout, impressions, gerrymandering, and ad buys to connect with voters in a way that moves or even inspires them. Obama, MAGA, AOC—all have had some of that special sauce. Still, campaigns that collect and use the numbers best win.

That’s been true for some time, of course. In 2017, Hillary Clinton lamented that the Democratic National Committee had supplied her team with out-of-date data. She blamed this in part for her loss to Donald Trump, whose campaign sat atop an impressive Republican data-crunching machine. (The DNC retorted that it wasn’t the data, but how it was used, that was inadequate.)

In 2020, campaigns have added new wrinkles to their tactics for gathering and manipulating data. Traditional polling is giving way to AI-powered predictive modeling; massive data exchanges, once considered questionably legal, allow campaigns, PACs, and other groups to coordinate their efforts. And who can forget microtargeting? Both campaigns seek to arm themselves with comprehensive views of each potential voter and are using algorithms to segment and target voters more specifically and strategically. Here is our guide to what’s new and improved, and what it means for you, the voter.

Voter data galore

Over the last few years, campaigns have been steadily adding to the vast amount of personal information they keep on voters. That’s partly a result of a practice called acquisition advertising, in which campaigns run direct response ads that seek to get either contact information or opinions straight from a person. As of May, both presidential campaigns were spending upwards of 80% of their ad budgets on direct response ads.

Campaign officials don’t like to talk about exactly how much data they keep—but most voter files probably have somewhere between 500 and 2,500 data points per person. (A voter file is an integral data set that consolidates state-level voter registration info. Learn more about them here.) Each ad, phone call, email, and click increases that number. Since the Democratic Data Exchange (or DDx) came online in June, it has aggregated over a billion data points, most of which DDx says is contact information.

Contrary to what one might think, though, many of these personal details come from people who’ve already made up their minds about the candidates. The Trump campaign’s app, for example, allows automatic Bluetooth pairing that can help identify a user’s location—something that has drawn scrutiny. (Bluetooth beacons have been found in Trump yard signs in the past.) This kind of surveillance isn’t considered the norm, but it makes sense. People who download a candidate’s app probably already support that candidate, and committed voters are the most likely to donate.

Data exchanges

Data exchanges allow campaigns and PACs to share data, making outreach and messaging more efficient and comprehensive. Republicans have used Data Trust since 2013—it’s a one-stop shop that includes an exchange, voter data, and data hosting services. Democrats initially felt this was a violation of Federal Election Commission rules against cooperation between different types of political organizations, such as PACs, nonprofits, and the campaigns themselves. The American Democracy Legal Fund, a democratic group, sued DataTrust and lost … so naturally Democrats spun up their own version. That’s the Democratic Data Exchange that went live in June.

The promise of data exchanges is to let all aligned organizations share data. According to a demo given to the New York Times, DDx can produce a dashboard that shows how comfortable each voter is with voting by mail, and this is shared among all liberal groups in the exchange. In previous years, local canvassing groups, state parties, and issue-oriented PACs might all have been spending money in parallel collecting that kind of information. On the Republican side, Data Trust has proved its worth many times over. For example, it gathered information on voters who cast their ballots early during the 2018 midterm elections. Campaigns stopped reaching out to those people, saving a reported $100 million.

Next-level microtargeting

In ancient Rome, slaves were trained to memorize the names of voters who might be persuaded to vote for their master, so that he could find and greet them personally. These days,  the strategy behind personal targeting comes from computer models that can slice the electorate into highly specific groups. Messaging is honed using extensive A/B testing.

Social platforms vary in the kind of microtargeting they allow. Facebook lets campaigns target small groups and individuals. Through its “custom audience” feature, campaigns can upload a spreadsheet of users’ profiles and deploy their message with surgical precision. They can also leverage a tool called “look alike” that uses that custom lists to find profiles likely to respond in similar ways. (Here’s how you can opt out of that type of targeting.) Both presidential campaigns have been doing this, and a project out of New York University is tracking these type of advertisements. It shows, for example, that from July 30 to August 4, an ad splashed with the message “Our Recovery Will Be Made in America” appeared in the feeds of about 2,500 Facebook users in Wisconsin. Those users were selected specifically by profile name from a list uploaded by the Biden campaign. It’s nearly impossible to trace where this small list of names came from, though it was most likely purchased from a third party.

Other platforms are more restrictive. Google banned political microtargeting early this year, while Twitter has banned political ads from campaigns—though it allows ads from politically aligned advocacy groups.

Out with the polls, in with the AI models

You’ve probably heard: polls don’t work the way they used to. The 2016 presidential election touched off an industry crisis centered on the rise of the “non-response bias”—a fancy way of saying that cell-phones users tend not to answer calls from numbers they don’t recognize (like pollsters’), and that people have grown increasingly coy when asked about their political views.

In response, campaigns are turning to machine learning and AI to predict how voters will behave. Instead of relying on intermittent benchmarking of the populace, models are now run using continuously updated data sets. The most common technique campaigns use is called scoring, where a group of voters get assigned a number from 1 to 100 based on how likely they are to do something or hold a certain opinion. Campaigns use those likelihoods to inform their strategy, either by attempting to persuade undecided voters or by leveraging strongly held opinions for money or mobilization.

The models aren’t perfect. In 2016, they predicted Clinton’s win with a margin of error similar to that assumed in the polls. But models have an easier time overcoming some of the problems with polling, and  the more data the models ingest, the more accurate they are.

The result: No shared truths

As collective messaging fades in importance, it becomes harder to police the myriad tailored messages political groups are churning out and putting in front of voters. Personalized messaging means that each person’s view of a campaign differs, because each is taking in a different information stream. Embellishment, distortion, and outright lying become that much easier, especially for public figures, whose posts on social platforms often get special treatment. The technologies being fervently employed right now are enabling a reality in which campaigns can manufacture cleavages in the public, fundamentally altering how we form opinions and, ultimately, vote.

All is not lost. Though the 2020 election cycle is in its final stretches, public pressure to redirect these technologies is increasing. In a newly published study, the Pew Research Center showed that 54% of the American public doesn’t think social-media platforms should allow any political advertisements, while 77% of Americans believe data collected on social platforms shouldn’t be used for political targeting.

There are several bills in the Congress that reflect this sentiment, like the bipartisan Designing Accounting Safeguards to Help Broaden Oversight and Regulations on Data Act and the Banning Microtargeted Political Ads Act. These bills are due to be addressed in 2021, and experts think some form of regulation is likely, regardless of who wins the White House.

1 comments:

Robert Earl said...

HAVE YOU LOST YOUR HARD EARNED FUNDS TO THE WRONG HANDS?
MEET THE PROFESSIONAL HACKERS FOR HIRE TODAY.
⏱️ 3min Read
📁 Hiring a professional hacker has been one of the world's most technical valued navigating information.
Regarding:
•Recovery Of Lost Funds,
•Mobile Phone Hack.(Catching A Cheating Spouse).
•Credit Score Upgrade,
VARIOUS HACKTIVITIES via
leroysteckler@gmail.com
High prolific information and Priviledges comes rare as it has been understood that what people do not see, they will never know. The affirmative ability to convey a profitable information Systematically is the majoy factor to success.
Welcome to the Global KOS hacking agency where every request on hacking related issues are fixed within a short period of time.
When you wonder “which hacking company should I hire, the first aspect that should concern you is Sincerity. Secondly, Rapid response. Clearly, you want to embark for services that povides swift response, With our astonishing Hackers, you will be glad to find out that our services Implies precision and action.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers.
If your shoe fits in any of the services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
💰Recovery of lost funds:✅(BITCOIN INVESTMENTS, BINARY OPTIONS, LOAN AND TRADING FOREX WITH FORGERY BROKERS.) 🖥️I would try my possible best to shortly explain this in particular.
This shocking study points to one harsh reality we all face today. It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database. Every information required by the Global KOS would be used to tracking every transaction, time and location of the scammer. This is acheived using the systematic courier tracking base method•
However, there are secret cyber infiltrators called brokers and doom. The particular system used by this scammers permeates them to manupulate targets digital trading system or monetary fund based accounts. Strictly using a dark web rob to diverting successful trades into a negative outcome. This process bends to thier advantage while investors results to losing massive amount of money. An act of gaining access to an organization or databased system to cause damages. We have worked so hard to ensure our services gives you a 100% trading success to recover all your losses•
📲 HACKING A MOBILE PHONE:.✅ Do you think you are being cheated on? Curious to know what your lover is up to online? This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc.
The company is large enough to provide comprehensive range of services such as•
• Email hacks📲
• Hacking of websites.📲
• Uber free payment hacks.📲
Our strength is based on the ability to help fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
Contact:
✉️Email: theglobalkos@gmail.com
Leroysteckler@gmail.com
®Global KOS™
2020.

Post a Comment