Image:Cfp banner 2.28.jpg

E-Deceptive Campaign Practices Draft

From CFPWiki

Jump to: navigation, search

e-Deceptive Campaign Practices 2008

Voters are relying more and more on personal digital devices and cell phones to engage in political decision-making. Deceptive practices tactics that target e-mail, instant message, and cell phone users can compress the timeline for launching successful disinformation and misinformation attacks from days to hours or minutes. Disinformation and misinformation efforts intended to suppress voter participation are a systemic problem that result in reduced voter participation among low-income, minority, young, disabled, and elderly voters. Deceptive techniques deployed in the 2004 and 2006 general elections relied upon telephone calls, direct mail, and canvass literature drops.

The proposed report would identify ways in which new technology may bring deceptive practices on-line; explore the use of data mining to profile and target voters, the use of e-mail, and voice calls to deliver inaccurate or incomplete information to potential voters. The report will explore these issues, review relevant state and federal law, and make recommendations on how to better prepare voters to have their voices heard during the 2008 election process.

Deceptive campaign practices in resent years have involved the use of flyers that informed voters that out standing tickets, late rent, or back child support would disqualify them from participating in elections.

You are invited to comment and provide content on this page by editing it. The goal is too publish a report in the of Fall 2008. You can participate in the discussion by editing this page. If you would like to participate in a topic mailing list on developing the report e-Deceptive Campaign Practices 2008 send a message to mail info@epic.org

==Report Outline==

Contents

What are Deceptive Campaign Practies

  1. History of Deceptive Campaign Practices
  2. Efforts to protect Voting Rights
  3. Election Protection Efforts
  4. Elections 2.0

Ways in which new technology may bring deceptive practices on-line

  1. Use of data mining to profile and target voters and email them misinformation/ deceptive spam email
  2. Compressing the timeline for launching disinformation and misinformation attacks from days to hours or minutes.
  3. Setting up websites that sound official but that are fake and provide misinformation, such as sites for the Secretary of State or local election official
  4. Denial of Service Attacks against legitimate sites. Also could include lapse of domain registration and hosting agreements
  5. Re-routing accurate website addresses to false websites Corrupting RSS Feeds, (Pharming and Phishing attacks that misdirect voters from deceptive e-mail posing as legitimate election official communications.
  6. Using â€œtypo domainsâ€ to create false websites with misinformation
  7. Text messaging misinformation, and cell phone messages (GPS features)
  8. Using Voice Over IP (VoIP) calls or botnet based calls to spread misinformation

Groups that may be targeted

  1. Young people
  2. Voters with obvious political leanings based on their online or offline activity
  3. Not traditionally disenfranchised groups

Why deceptive practices online may be more difficult to trace and the perpetrators more difficult to apprehend

  1. History of the Internet
  2. How it Works: Physical Space v. Cyberspace
  3. Communication and the Internet
  4. Security Challenges

Potential technological means to combat these acts

  1. To target people for these attacks voter registration records are important
  2. Web pages, RSS Feeds, and maybe a U-Tube Video on the threat
  3. Public Awareness

The state of the law covering these types of acts

  1. Voting laws
  2. Criminal laws, e.g. cyber crime,
  3. Civil liability, e.g. for providers
  4. SPAM
  5. Computer Crimes trespass, spyware, malicious activity

Recommendations