recommended reading

Do Democrats have the edge in tech skills?

In the wake of unexpected losses last month, Republicans are going through the classic stages of grief. Some are denying that conservatism was their downfall. Most are depressed at the prospect of another four years of an Obama administration. A few, including some pollsters who missed the mark badly, are bargaining to keep their jobs. All are angry — at the results, at the fact that they didn't see it coming, and at the position in which the party now finds itself: badly trailing Democrats when it comes to the technological and political savvy required to run and win campaigns.

Many Republicans say that there is a skills gap between the two parties, based on neglect within their own ranks and advances on the Democratic side. Acceptance, and adapting to overcome the deficit, will be critical to rebuilding the Grand Old Party.

It's impossible to deny that President Obama's campaign ran the far superior technological operation. The technophiles who built a start-up-like atmosphere of 40 or so programmers and data crunchers are achieving something approaching a mythical status in postelection media coverage. In the space of less than two years, they created groundbreaking voter-identification tools, turnout models, and a get-out-the-vote system that helped squeeze every last ballot out of the Democratic coalition.

Mitt Romney's team and the Republican National Committee, put simply, did not equal those efforts. The early scapegoat after Election Day was something called Project ORCA, a voter-turnout system the Romney campaign planned to use to make sure their voters headed to the polls. That system failed on several fronts. No one beta-tested the product; passwords given to volunteers didn't work; the program crashed on Election Day.

In the annals of the conservative blogosphere, the creators of Project ORCA, an as-yet-unknown group of Romney and outside staffers, are part of the reason Republicans lost. It's something of a parlor game among Republican strategists, especially those involved in the technical side of the business, to guess which of their colleagues is at fault for ORCA's failure. It's a fool's errand; according to up-to-date tallies compiled by The Cook Political Report's David Wasserman, Obama beat Romney by more than 4.6 million votes, a margin far greater than even the best GOTV program could make up.

But it's clear that Obama's team was generations more advanced than Romney's. In a close race, turnout makes a difference; the investments Democrats have put into their technological tools have paid off, and will continue to do so.

Some Republicans worry that their trouble goes deeper than the bells and whistles of a nifty computer program. The party faces a lack of high-quality campaign managers, strategists with the track record of running and winning statewide elections who haven't left the business to open their own consulting firms.

Democrats, some Republicans worry, have a raft of capable managers able to deploy to key Senate and gubernatorial battlegrounds and provide a guiding hand. And there is a small number of top-notch Republican managers. Party leaders pointed to Mac Abrams, who ran Sen. Dean Heller's campaign this year; Justin Brasell, who managed Sen. Mitch McConnell's 2008 campaign; and Jim Barnett, who managed Sen. Scott Brown's unsuccessful reelection bid this year, as examples of the party's best and brightest.

But the roster peters out quickly. While Romney's high command included some of the most respected names in Republican politics, only two of them — Katie Packer Gage and Eric Fehrnstrom — had experience as campaign managers. Gage ran Michigan Gov. Dick Posthumus's 2002 reelection bid, when he lost to Democrat Jennifer Granholm, while Fehrnstrom ran a gubernatorial campaign in 1998 that didn't make it out of the Republican primary.

Holding the title of campaign manager is no guarantee of success, and no indication of future failure, to be sure. But it's an indication, some Republicans have concluded, that their side lags in planning for the basic blocking and tackling it takes to win an election.

The stages of post-campaign grief tend to happen all at once as a party digs out from the emotional letdown of a big loss. But acceptance of the reality of serious talent and skills gaps —- and the motivation to do something about them — is critical to the GOP's resurgence.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.