{"id":244,"date":"2008-10-19T22:57:51","date_gmt":"2008-10-20T05:57:51","guid":{"rendered":"http:\/\/www.talesfromthe.net\/jon\/?p=244"},"modified":"2008-10-19T22:57:51","modified_gmt":"2008-10-20T05:57:51","slug":"e-deceptive-campaign-practices","status":"publish","type":"post","link":"https:\/\/2024.thenexus.today\/index.php\/2008\/10\/19\/e-deceptive-campaign-practices\/","title":{"rendered":"&#8220;e-Deceptive Campaign Practices&#8221;"},"content":{"rendered":"<blockquote><p><span style=\"color: #ff0000;\"><\/span><\/p><\/blockquote>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www2.epic.org\/graphics\/epic_top.gif\" alt=\"epic logo\" width=\"442\" height=\"43\" \/><\/p>\n<p>The Electronic Privacy Information Center (EPIC)&#8217;s <a href=\"http:\/\/votingintegrity.org\/pdf\/edeceptive_report.pdf\">Technology and Democracy 2.0<\/a><a href=\"http:\/\/votingintegrity.org\/pdf\/edeceptive_report.pdf\"> report on &#8220;e-Deceptive campaign practices&#8221;<\/a> is getting released on Monday, along with a parallel report from Common Cause and Lawyers Committee for Civil Rights covering the legal and policy issues.\u00c2\u00a0 Contributors include computer security legends like Peter Neumann (of Bell Labs, SRI and comp.risks fame) and Bruce Schneier, Erik Nilsson of Computing Professionals for Social Responsibility, Poorvi Vora of George Washington University, Juan Gilbert of the Human Centered Computing Lab of Auburn University, Lillie Coney of EPIC &#8230; and me.\u00c2\u00a0 Pretty illustrious company.\u00c2\u00a0 Mom will be proud \ud83d\ude42<\/p>\n<p>&#8220;Deceptive campaign practices&#8221; has a very specific meaning in election protection work.\u00c2\u00a0 From <a href=\"http:\/\/epic.org\/privacy\/voting\/e-deceptive.html\">EPIC&#8217;s announcement<\/a>:<\/p>\n<blockquote><p>Deceptive campaigns are      attempts to misdirect targeted voters regarding the voting process for      public elections. Election activity that would be considered deceptive      could include false statements about polling times, date of the      election, voter identification rules, or the eligibility requirements      for voters who wish to cast a ballot. Historically, disinformation and      misinformation efforts intended to suppress voter participation have      been systemic attempts to reduce voter participation among low-income,      minority, young, disabled, and elderly voters. In 2008, millions of new      voters are engaging the political process through Internet      communication, which presents an opportunity to review the technology    and the incident of e-deceptive campaign practices.<\/p><\/blockquote>\n<p><!--more--><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" style=\"float: left; margin-top: 5px; margin-bottom: 5px;\" src=\"http:\/\/www.talesfromthe.net\/images\/cfp_logo_rwb.jpg\" alt=\"CFP logo\" width=\"120\" height=\"120\" \/>This report is in many ways a followup to <a href=\"http:\/\/www.cfp2008.org\/wiki\/index.php\/E-Deceptive_Campaign_Practices:_Elections_2.0\">a workshop that Lillie organized in May at the Computers, Freedom, and Privacy conference<\/a>, where I spoke along with panelists from Common Cause, Aristotle, and the NAACP.\u00c2\u00a0\u00c2\u00a0 One of the things that leapt out at us was that the technology landscape was changing so quickly that people really weren&#8217;t prepared for the new kinds of deceptive attacks &#8212; and voting rights organizations in general needed technologists&#8217; help as we move to a Web 2.0 world.\u00c2\u00a0 While the election&#8217;s only a couple of weeks away, there still is enough time to respond to some of these threats.<\/p>\n<p>The report looks at several categories of attacks, including spoofing, phishing, rumor-mongering, social engineering, and denial of service.\u00c2\u00a0 It also considers several different technologies, for example search engine results: could Google-bombing be used to trick people into going to a fake web site, set up to look like the Secretary of State&#8217;s, but giving incorrect information?<\/p>\n<p>Other technologies we consider include email, instant messaging, web advertising, blogs, VOIP (internet telephony, increasingly used for robocalls) and social network sites.\u00c2\u00a0 Each of the sections has specific recommendations as well, for voters, election administrators, and technology providers.\u00c2\u00a0 By coming at things from a computer security focus, I think the report brings something new and valuable to the table.<\/p>\n<p>In the May workshop, I mentioned that considering things solely in terms of threats and responses risks overlooking opportunities, and we should also be on the alert for ways that these newer forms of communications could be used to combat deceptive campaign practices both online and off.\u00c2\u00a0 The recent case of <a href=\"http:\/\/votersuppressionwiki.wetpaint.com\/page\/Philadelphia%2C+PA%3A+Flyers+Target+Local+Colleges\">deceptive flyers in Philadelphia<\/a> is an excellent example: the DrexelDems quickly <a href=\"http:\/\/www.drexeldems.org\/?q=node\/102\">posted the information on their web site<\/a>, and over a 10-day period this led to significant coverage debunking the myths.*\u00c2\u00a0 The report talks about social network sites&#8217; potential for countering deceptive practices by surfacing and exposing deceptions, and then using viral mechanisms can be used to spread the facts instead of the falsehoods.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"margin-left: 5px; margin-right: 5px; float: right;\" src=\"http:\/\/farm4.static.flickr.com\/3017\/2919278958_0ffeec3063_m.jpg\" alt=\"voter suppression wiki logo\" width=\"150\" height=\"150\" \/>It also briefly touches on this theme of a networked election protection movement, something that both Brad Friedman and I touched on in our <a href=\"http:\/\/meetthebloggers.org\/show_101708.php\">Meet the Bloggers<\/a> appearance last Friday.\u00c2\u00a0 The <strong>Twitter Vote Report<\/strong> project&#8217;s <a href=\"https:\/\/votereport.pbwiki.com\/Partners\">Partners<\/a> page and the somewhat-overlapping list of <a href=\"http:\/\/www.votersuppression.net\/page\/Grassroots+election+protection+initiatives\">grassroots election protection initatives<\/a> on the <strong>Voter Suppression Wiki<\/strong> give an overview of some of the groups in this loosely-linked movement.\u00c2\u00a0 We haven&#8217;t spent a lot of time yet thinking about countering e-deceptive practices yet but as the personal connections and information networks deepen, it&#8217;s a natural next step.<\/p>\n<p>How significant will e-deceptive campaign practices be for the 2008 election?\u00c2\u00a0 It&#8217;s hard to know.\u00c2\u00a0 The successes of online smear and misinformation campaigns implies that at least 5-10% of online users can be deceived; on the other hand, voting information is easier to verify &#8212; and there&#8217;s been so much attention to election fraud that users may be especially attuned to this.\u00c2\u00a0 An added complication is that relatively few members of communities traditional targeted by campaign practices are online; a flyer physically tacked up on a phone pole is a lot more likely to reach and intimidate a voter who doesn&#8217;t have a computer than even the best-designed spoof web site.\u00c2\u00a0 Still, there are a lot of different threats here, and it&#8217;s easy enough to see these adding up to enough votes to make a difference in a close race in 2008.\u00c2\u00a0 So even though we won&#8217;t know the exact impact, it&#8217;s important to consider.<\/p>\n<p>And in the longer term, these threats will only increase.\u00c2\u00a0 The hacking of Sarah Palin&#8217;s email account puts a spotlight on the role of computer security in political campaigns, and so I hope that one of the side effects of this report also helps get more computer security professionals\u00c2\u00a0 and software engineers engaged with election protection beyond voting machines.**\u00c2\u00a0 E-deceptive practices that are prototyped in this election will be refined in 2010 and 2012; now&#8217;s a great time to be thinking about the responses.<\/p>\n<p>jon<\/p>\n<p>* my <a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=237\">How to do better at getting the word out?<\/a> has the details<\/p>\n<p>** Voting machine fraud is incredibly important, of course, but it&#8217;s far from the only threat out there &#8230; as well as deceptive practices, there&#8217;s database error rates, insufficient machines, <a href=\"http:\/\/www.talesfromthe.net\/jon\/?p=243\">confusing ballot design<\/a>, and many others.\u00c2\u00a0\u00c2\u00a0 The computer security and software engineering community has made a huge difference in turning the tide on electronic voting; it&#8217;d be great to see as much impact in other areas as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Electronic Privacy Information Center (EPIC)&#8217;s Technology and Democracy 2.0 report on &#8220;e-Deceptive campaign practices&#8221; is getting released on Monday, along with a parallel report from Common Cause and Lawyers Committee for Civil Rights covering the legal and policy issues.\u00c2\u00a0 Contributors include computer security legends like Peter Neumann (of Bell Labs, SRI and comp.risks fame) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,9,13,14],"tags":[67,124,133,393],"class_list":["post-244","post","type-post","status-publish","format-standard","hentry","category-political","category-professional","category-social-computing","category-social-sciences","tag-cfp08","tag-e-deceptive-campaign-practices","tag-election08","tag-voting-rights"],"_links":{"self":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":0,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/244\/revisions"}],"wp:attachment":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/media?parent=244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/categories?post=244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/tags?post=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}