As I understand it, the attack was a successful use of "active measures". The objective 
was to find *extant* rifts in US society and exploit them. This resulted in a sophisticated data 
science driven attack on platforms via technology like Facebook. There are 2 layers to it: 1) the 
primary objective is to sow distrust in US institutions (including voting) and "career 
politicians" and 2) secondarily sow chaos simply to reduce the efficiency of US institutions 
(including the state department's attempts at diplomacy and our military's attempts at whatever it 
is they do).

As the exploits are ongoing, any digital voting *security* must address this 
type of exploit, either directly or dovetailed with other mitigating efforts.


On 8/23/20 9:58 AM, jon zingale wrote:
Thank you. Would you please restate what 'type of exploitation' we saw in
2016? I will think about it this week and hopefully find time to address it,
my Sunday is already pretty backed up.


- .... . -..-. . -. -.. -..-. .. ... -..-. .... . .-. .
FRIAM Applied Complexity Group listserv
Zoom Fridays 9:30a-12p Mtn GMT-6  bit.ly/virtualfriam
un/subscribe http://redfish.com/mailman/listinfo/friam_redfish.com
archives: http://friam.471366.n2.nabble.com/
FRIAM-COMIC http://friam-comic.blogspot.com/

Reply via email to