Google Bans Ads Linking To Hacked Political Content

Google is taking action to prevent major interference in the 2020 US Presidential election, by blocking advertising that contain hacked political content. The new rules will come into effect on September 1. 

Once enforced, third-party entities won't be able to purchase ad space inside the Google Ads platform that link directly or indirectly to hacked content that was obtained from a political entity. Ads linking to news articles or other pages discussing the hacked political content are allowed, as long as the article or page to which the ad links does not link itself to the hacked political content.

The move appears designed to prevent a re-run of the lead-up to the last election, when damaging materials were leaked online by Russian hackers and then published and republished by third-party sites to help scupper Democrat hopes.
Twitter has since 2018 banned the spread of all hacked content on its platform including anything political-related.

The Google Ads Hacked political materials policy will applied first to ads covered by the tech giant’s US election ads policy. Google says the rules apply to the following: “Ads that directly facilitate or advertise access to hacked material related to political entities within scope of Google's election advertising policy. This applies to all protected material that was obtained through the unauthorized intrusion or access of a computer, computer network, or personal electronic device, even if distributed by a third party.”

Google will, however, allow “discussion of or commentary on” any hacked content as long as the ad or landing page doesn’t allow direct access to it. Any entity violating the policy will be notified seven days before their account is suspended.

Google also announced a policy to ban advertisers that try to conceal their identities whilst promoting social, political and other issues. This follows last November’s announcement that it was restricting political advertising to ban deepfake content and “ads or destinations making demonstrably false claims that could significantly undermine participation or trust in an electoral or democratic process.” It has also limited targeted advertising to “age, gender, and general location.”

Even with these new steps, US tech giants could be fighting a losing battle against misinformation ahead of the election, which could be the most divisive and hotly contested in living memory. Google said it will begin enforcing this second policy on September 1, 2020 in the United States, and on October 1, 2020, in all other countries.

 

Google Blog:     Axios:        ZDNet:         Infosecurity Magazine

You Might Also Read: 

Facebook: Hate Speech, Fake News & Bias:

 

« Essential Books For Learning About Cyber Security
WEBINAR: How to achieve security visibility at scale in the AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

ESTsecurity

ESTsecurity

ESTsecurity provides intelligent security threat management solutions to make a safer world.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.