Earlier this week, the National Republican Campaign Committee was caught red-handed pushing online content aimed at confusing Democrats in hopes of dividing potential 2020 voters against each other. This attack was, however, very clumsy in comparison to the warnings that party leadership, state organizations, and outside activists receive in our conversations with security experts.

Major companies are worried about technology attacks on the 2020 election, and companies like Microsoft are sending out alerts about to state-sponsored hack attempts. Events like these will make the news, and organizations will have to prepare by making sure to secure their election operations.
When you talk to security experts, former FBI members, and campaigns, these kind of attacks aren’t the ones that are the most unsettling. There is another form of attack that’s insidious yet direct. I’ve referred to it in other diaries as “poisoning the water,” while a security adviser in a recent meeting I attended referred to it as “28 Days Later.” No matter what you call it, the desired end result is straight-forward: convince Democratic voters that the system isn’t worth participating in, or encourage rage and disappointment no matter who the Democratic nominee in their district, and for U.S. president.

The effort to undermine our democracy is already well underway. There are thousands of ways ill-doers can try to influence our elections. To try and prepare, I think it is best we work on understanding at least a few of the approaches being used to poison discussion and try to distract Democratic voters.


The Friend Connection

Are you a part of “secret” or “closed” Facebook groups? Joined any DM groups on Twitter? More and more users of social media platforms who are politically active find themselves in hidden, secret, or closed groups, which far too many view as “safe spaces.” According to cybersecurity experts, however, these can be used to manipulate participants, sow discord, and try to fracture groups. In some cases, individuals have found themselves to be targets of outside pressure, as members use supposedly “private” material in public spaces to try and harm other members.


The most common method of abuse in groups such as this uses five steps: entry, harvesting, targeting, manipulation, and splintering.

Step 1: Entry. Using Facebook profiles or Twitter handles, individuals work to get themselves invited into private or secret groups or DM feeds on Facebook. If all members can invite new members, then the larger the group, the easier it is to gain entry. The smaller the group, the harder it is to gain entry. Larger groups also hide members, as most rarely check out who exactly is a member if it is several hundred individuals, or really, anything over 25 members.

Step 2: Harvesting. Once a user has access to a private group, the next item on the list is to harvest, which consists of keeping a constant tally of the membership and the means to contact them. They then begin sending friend requests or start direct communication on Twitter or any other platform. This is a slow means by which to build a relationship with someone who doesn’t really exist, and the account seeking to do harm builds credibility by having more connections with people you know, therefore “they must be okay.”

Step 3: Targeting. No large-scale conversation between human beings is completely unified. It is why several experts say we should focus on being harmonious, rather than unified. It’s okay to disagree now and again and it often doesn’t lead to larger problems, but individuals looking to cause harm to Democratic Party efforts keep track of disputes and conflict in hopes of capitalizing on them later.

Step 4: Manipulation. Once they understand issues which can cause friction, they look at ways to inject, often in direct conversation rather than in the group at large, information which can portray a candidate or a cause as “wrong.” This manipulation is often slow and steady—never so rushed that the listener can quickly sense someone is intending to make them dissatisfied. Often, these manipulations come across as a mix of hope and remorse when talking about a certain candidate. “How can we get them in the right space for X,” “I can’t believe they won’t listen to you,” or a mix of laying out items, pumping up the listener, and defining the action as a letdown. Enough division then leads to …

Step 5: Splintering. At a certain point, the result is: If they won’t listen to you, let’s just do our own thing. What does it matter, they won’t get involved/won’t do it/we know better/and so on.

And then,the cycle begins all over again. This simple method can be injected into campaigns, organizations, or other efforts,over and over and over again. And while we talk about digital efforts, security specialists warn us that more conservative activists are interested in taking this into real campaigns, beginning as volunteers and sometimes “very hard workers” so that early on they can become quickly trusted. Once they’re integrated, the pattern works exactly the same.


much more: https://www.dailykos.com/stories/201...U-so-listen-up