AI-Generated Misinformation - A Growing Concern For 2024 Elections

With less than a month to go until the British General Election and political campaigning well under way up and down the country, there are growing concerns about potential attempts to manipulate voters online. 

Campaigns are running the risk of being breached, exposing personal data, experiencing a financial impact and more, all which could have a negative effect on entire campaign’s credibility.

Cyber security and trust are a top focus around the world in 2024 elections. In  particular, concerns around the use of AI-generated content are coming to prominence ahead of the British parliamentary election. 

According to David Treece, vice president of solutions architecture at Yubico “Because campaigns are built on trust, potential hacks like fraudulent emails or messages sent out impersonating candidates or parties via their social media accounts where they are directly interacting with their audience, could be detrimental to campaigns...

“It’s imperative that candidates take proper steps to protect their campaign and more importantly, to build trust with voters, by adopting modern cyber security practices like multi-factor authentication. Adding a physical layer of security with a hardware security key to online accounts is a crucial component to ensuring that campaigns remain secure.” Treece said. 

According to Yubico's  recent US election survey ' Defending Digital Campaigns and One Poll' which looks at the impact of AI in this election season, 43 per cent of respondents believe that AI-generated content will negatively affect the outcome of the 2024 elections. Furthermore, 52 per cent have already received an email and/or text message appearing to be from a campaign that they suspected was actually a phishing attempt. 

Other Key Findings Include:  

  • 85 per cent of respondents do not have a high level of confidence that political campaigns effectively protect the personal information they collect.
  • Nearly half (42 per cent) of registered voters would like to see campaigns and candidates take precautions to prevent their websites from being hacked.
  • Over a quarter (26 per cent) of respondents indicated they have not completed a transaction making a campaign donation because of concerns about the security of the transaction or how their personal information would be handled

As Generative Artificial Intelligence (GenAI) enabled capabilities become more widely adopted, it is important for election officials to understand how these capabilities could impact the security and integrity of election infrastructure. 

According to a new report from the US cybersecurity agency CISA, GenAI capabilities present many  opportunities for increased productivity, potentially enhancing both election security and election administration. 

However, these same capabilities also carry the increased potential for greater harm, as malicious actors, including foreign nation state actors and cybercriminals, could leverage these same capabilities for nefarious purposes.

Images:  Allison Saeng & Ideogram

You Might Also Read: 

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Protecting Data In The Remote Working Era
Too Many Tools - Cybersecurity Professionals Feel Out Of Control  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Novem CS

Novem CS

Novem CS are bespoke cyber security specialists providing a highly effective and specialised approach to solving your cyber security challenges.