We scan every post, comment, image, and interaction across your entire social media history — then simulate how an opposition researcher would weaponize what they find. Defensive intelligence, delivered before you're on the ballot.
Every candidate has a digital footprint. Most don't know what's in it. Opposition researchers do — and they will find it before you do if you don't look first.
We systematically review your publicly accessible content across Facebook, Instagram, X (Twitter), LinkedIn, YouTube, TikTok, and any other platform where you have a presence — posts, comments, shares, likes, and tagged content. Everything a human opposition researcher would see, captured and flagged for your review. No surprises from your own feed.
For every flagged item, we assess how a skilled opposition researcher or a politically motivated activist might frame it as an attack. A post that seems innocuous to you may look different when selectively cropped, stripped of context, or placed next to a contrasting statement. We show you the attack before your opponent launches it — so you're prepared with a response, not blindsided.
A written briefing report covering flagged content, assessed risk level (low/medium/high), the plausible attack framing, and a recommended response posture for each item. The report is delivered as a private document — not stored in any public or shared system. Your vulnerabilities stay between you and your campaign strategist.
Where content can be deleted, archived, or contextualized without raising new questions, we recommend the appropriate action — and explain the tradeoffs. Deleting a post that's already been screenshotted can backfire; context is everything. We give you practical guidance, not generic advice to "clean up your social media."
Opposition research on down-ballot candidates is no longer the exclusive province of well-funded campaigns. Any motivated opponent, political adversary, or local activist with a few hours and an internet connection can go through years of your social media history. The question is not whether someone will look — it's whether you looked first.
A campaign that knows its own vulnerabilities is a campaign that can address them on its own terms — before they become news. A campaign that doesn't know what's in its own digital record is a campaign that gets surprised. Surprised campaigns lose news cycles; lost news cycles lose elections.
The audit also serves as a baseline inventory — you'll know exactly what your public digital record looks like, which makes managing your campaign communications going forward much easier. No post gets made without awareness of what already exists.
All candidate social media profiles identified and catalogued. You confirm which accounts are active and which are inactive or legacy accounts.
All publicly accessible content reviewed using a structured methodology designed to surface the content opposition researchers specifically look for.
Flagged items assessed and categorized by risk level. Attack framing simulated for medium and high-risk items.
Written briefing report delivered privately. Walk-through call included to discuss findings, remediation options, and response preparation.
The Digital Security Audit is included in Campaign Ready ($10,000) and every tier above it. The Machine retainer includes a refreshed audit at the start of each campaign cycle, recognizing that your digital record continues to grow throughout the election season.
The audit can also be scoped as a standalone engagement for candidates who aren't ready for a full-tier commitment but want to understand their digital exposure before announcing. Contact us to discuss standalone audit pricing. See full pricing for complete tier details.
These services work best alongside this one — most of our campaigns run at least two in tandem.
Your site is the first place opposition researchers go. The audit flags risks before launch — because vulnerabilities caught in draft cost nothing; ones found after cost campaigns.
Your email list is a target. The audit reviews your sender reputation, opt-in hygiene, and list management practices so a compromised list doesn't become a campaign story.
We apply the same research methods to your record that an opponent's team will. Knowing what they'll find — and having a response ready — is the difference between a news cycle and a crisis.
Free 30-minute consultation. We'll discuss your timeline, your platforms, and what the audit process looks like for your specific situation.