Skip to main content

The Borrowed Wound

Manipulation Breakdowns · 10 min read · By D0

The Mailer

In March 2026, Black voters in Virginia began receiving a piece of direct mail. The front showed photographs of Ku Klux Klan members in robes alongside images of civil rights marchers from the 1960s. The back read: “Our ancestors fought to represent us. Now Richmond politicians are trying to take our districts away. Just like Jim Crow, they want to silence your voice.”

The mailer urged recipients to vote no on Virginia’s April 21 redistricting referendum — a measure that, if passed, would temporarily redraw the state’s eleven congressional districts to increase representation for communities of color.

It was paid for by the Democracy and Justice PAC. Its chair was A.C. Cordoza: a former Republican member of the Virginia House of Delegates, and for a time the only Black Republican serving in that body.

What the Mailer Was Arguing

The claim was direct: the redistricting referendum equals Jim Crow.

Jim Crow was a legal apparatus, enacted across the American South between Reconstruction and the 1960s, that systematically dismantled Black political representation. Poll taxes, literacy tests, violence at polling places, district lines drawn to dilute or eliminate Black voting power — the system worked. Black voter registration in Mississippi fell from 67% in 1867 to below 6% by 1892. Its explicit purpose was erasure from the political map.

The redistricting measure the mailer opposed would redraw congressional maps to create more representative districts — structurally, the opposite of what Jim Crow did.

The mailer borrowed imagery from the victims of a system designed to eliminate Black representation, then deployed that imagery to argue against Black voters gaining representation. The wound was borrowed and applied in the direction of the original wound-maker.

This is what makes the argument analytically defective rather than merely tendentious. False equivalence usually equates two imperfect comparisons. This one inverts the directional logic of both sides simultaneously. The historical Jim Crow removed representation; the redistricting measure would add it. The imagery of those who suffered the removal was used to argue against the addition. The argument doesn’t just fail on degree — it fails on direction.

The Psychology of the Inverted Symbol

Historical trauma doesn’t process like factual information. It processes like a sensory alarm.

When a Black voter in Virginia opens mail and sees photographs of Klan members, the psychological response doesn’t begin with “let me evaluate this claim epistemically.” It begins with threat arousal — a limbic-level activation that precedes and partially overrides analytical processing. The imagery is engineered to fire before the argument can be evaluated.

This is the actual mechanism. The text argues that redistricting resembles Jim Crow. But the argument is not the payload. The payload is the fear state the imagery creates. A reader in an activated, threat-aroused state is less capable of performing the historical analysis that would expose the false equivalence. The feeling arrives before the fact-check.

Manipulation through borrowed symbolism has a structural advantage over fabricated evidence: it doesn’t require lying about the symbol. The Klan images are real. The civil rights photographs are real. The statement that Jim Crow silenced Black voices is accurate. Only the comparison — that this particular redistricting measure is like Jim Crow — is false. But by the time the comparison is encountered, the emotional context has been primed. The imagery frames the argument; the argument rides the primed state.

The technique requires that the symbol retain its emotional force in the target population. The more vivid the historical wound, the more reliably it can be activated, and the more powerful the priming it provides for whatever argument follows. In a specific way, the manipulation is proportional to the original harm: the more the community suffered, the more exploitable that suffering becomes.

The Identity Architecture

The mailer’s design required a Black face on the PAC to function at all. “Our ancestors” is a first-person plural claim. It requires the speaker to share ancestry with the recipient. A white Republican PAC chair sending this mailer would be immediately legible as an external political interest speaking to a community it doesn’t belong to. Cordoza as chair converts the surface reading: the message appears to come from within.

This is identity laundering — using a spokesperson whose demographic characteristics match the target audience to provide credibility the message wouldn’t otherwise carry. The technique doesn’t require that the spokesperson be insincere. Cordoza may genuinely hold the position. The effect is structural regardless of sincerity: the message reads as intra-community communication. The funding is not.

The Virginia Legislative Black Caucus, the NAACP Virginia State Conference, and Attorney General Jay Jones all issued explicit condemnations. The VLBC stated the messaging “simply isn’t true” and was “aimed to misinform and divide voters.” Jones called it a “misleading attempt to confuse voters” that disrespected civil rights struggles. The organizations with the strongest institutional claim to represent Black Virginians said the opposite of what the mailer claimed.

But the mailer’s identity architecture is designed to arrive before institutional counter-signals. The first message received sets the emotional frame. The correction, when it comes, is received inside an already-activated fear context — and corrective information is systematically less effective when it arrives after priming than when it arrives before.

The Money Behind the Memory

The Democracy and Justice PAC had a Black chair. Its funding was invisible.

The primary vehicle opposing redistricting was Justice for Democracy PAC, which raised over $9 million. Its largest donor: Per Aspera Policy Inc., a Massachusetts-based 501(c)(4) nonprofit that contributed approximately $7 million in three transactions between late March and early April 2026.

501(c)(4) organizations are not required to disclose their donors. Per Aspera does not reveal where its money originates. Public reporting connected Per Aspera to Peter Thiel — Thiel gave a documented six-figure donation to the group while it was funding advertising in Kansas political races. The direct link between the $7 million and Thiel’s personal involvement is not established. The funding chain is: undisclosed donors → Per Aspera (opaque 501(c)(4)) → Justice for Democracy PAC → Democracy and Justice PAC → mailers in Black Virginian mailboxes.

The emotional register of the mailer — ancestral memory, civil rights imagery, the threat of silence — was financed through a chain specifically structured to prevent any voter from identifying the source.

This is not incidental to the manipulation. It is integral to it. A mailer from “Peter Thiel’s political operation” arguing that redistricting resembles Jim Crow would be received by most Black voters through the lens of its actual funding: a tech billionaire with Republican electoral interests trying to prevent a Democratic congressional advantage. The 501(c)(4) structure breaks that direct line. Democracy and Justice PAC becomes the visible entity. Per Aspera becomes the opaque funding node. The original funders remain invisible. The message appears to come from community; the money comes from elsewhere.

Source obfuscation defeats the most basic evaluative question a critical reader can ask: who benefits from this message, and does their benefit align with mine? Dark money structure removes the capacity to answer it.

What the Influence Tactics Protocol Sees

False Equivalence is the explicit argument structure. The redistricting measure and Jim Crow are directionally opposite on the axis that matters — one removes representation, one adds it. The comparison doesn’t fail on scale or imprecision; it fails on direction.

Emotional Hijacking via Borrowed Symbolism is the delivery mechanism. Civil rights imagery and Klan photographs trigger affective states that precede and partially disable analytical processing. The symbols don’t make the argument — they establish the emotional register in which the argument is received, before the argument can be evaluated.

Identity Laundering provides credibility. A Black PAC chair converts an externally-funded message into apparent intra-community communication. The technique transfers credibility from the spokesperson’s identity to a message that the community’s representative institutions publicly rejected.

Source Obfuscation through nonprofit structure removes the ability to trace funding to its origin, preventing evaluation of the message against the interests of its funders.

These four tactics are designed to work in sequence. Emotional hijacking preempts rational evaluation. False equivalence gives the hijacked emotion a frame to attach to. Identity laundering makes the combination credible to recipients who might otherwise identify it as external. Source obfuscation prevents accountability after the fact.

The Result and What It Doesn’t Mean

Virginia voters approved the redistricting referendum on April 21 by approximately 51.5% to 48.5%. A Virginia circuit court judge immediately issued an order blocking the results. The legal challenge is ongoing.

The narrow margin is relevant to the manipulation question. The organizations most capable of distributing counter-information — the VLBC, the NAACP, the AG — did so early and explicitly. Their intervention compressed the window in which the mailer could circulate uncontested, which is the primary factor in determining how much of an audience forms beliefs based on false information before the debunking exists.

But the aggregate result says nothing about individual-level effects. Some number of voters encountered the mailer’s fear state without adequate counter-information and voted accordingly. That number is unknowable from the result. Aggregate institutional resistance can compensate for individual persuasion — it did here. That compensation isn’t always available.

The goal of operations like this isn’t always vote-switching. Confusion, abstention, and demoralization suppress participation in ways that don’t appear in the final vote count. NPR reported before the election that voters “feel confused and misled.” Confusion is a success condition for a class of information operations that don’t require winning the argument — only making the argument environment loud and contradictory enough that participation costs exceed motivation for some fraction of the target population.

The Template

The operational structure here is portable. It works wherever three conditions hold: a target community with a vivid historical wound; a funding source whose interests oppose that community’s current political interests; and a policy question that can be falsely framed in terms of the wound.

The mechanics don’t require sophisticated technology. Printed mail. A willing spokesperson. A legal nonprofit structure. The sophistication is in the technique, not the medium.

  1. Identify the historical trauma most salient to the target population.
  2. Select imagery that activates that trauma before the argument is encountered.
  3. Construct a false equivalence that attaches the emotional frame to the opponent’s position.
  4. Install an identity proxy — demographically aligned with the target — as the visible face of the message.
  5. Obfuscate the funding chain through nonprofit vehicles that require no disclosure.
  6. Distribute before counter-organizations can mount a coordinated response.

What makes this replicable as a template also makes it detectable as a pattern: the combination of civil rights imagery with anti-civil-rights argument, attached to a spokesperson from within the target community, funded through an opaque chain targeting a specific demographic — these are the signatures. They are recognizable precisely because they recur. The tactics weren’t invented in Virginia in 2026. They will appear somewhere else.

The borrowed wound heals on its own timeline. The exploitation of it operates on the timeline of mail delivery.


This article is part of Decipon’s Manipulation Breakdowns series, which examines specific influence operations using the Influence Tactics Protocol framework.


Sources: