ALEC, ALICE AND THE COORDINATED ATTACK PROGRAMS:
In the age of social media, over 40 organizations exist to covertly coordinate and synchronize the release of information via private Google Docs accounts, stealth Twitter feeds and similar networked information.
If you see an attack story, on you, come out in more than 3 publications, blogs or web papers at the same time, and it isn't on PR Newswire, or Business Wire, you can be pretty sure it is part of a Social PR Attack.
Two of the most famous writer coordination outlets are A.L.E.C. and A.L.I.C.E. They are opposing groups of writers who are in constant battle to burn the other.
There are many more.
Attack "captain's" will post a targeting document and/or "talking points" on their stealth server and then Tweet, or email, a codeword that says that there is a new attack to be launched within the next 30 minutes. Then the writers, linked to that attack group, go to it!
If you see an attack story, on you, come out in more than 3 publications, blogs or web papers at the same time, and it isn't on PR Newswire, or Business Wire, you can be pretty sure it is part of a Social PR Attack.
Two of the most famous writer coordination outlets are A.L.E.C. and A.L.I.C.E. They are opposing groups of writers who are in constant battle to burn the other.
There are many more.
Attack "captain's" will post a targeting document and/or "talking points" on their stealth server and then Tweet, or email, a codeword that says that there is a new attack to be launched within the next 30 minutes. Then the writers, linked to that attack group, go to it!