AI-Generated Misinformation - A Growing Concern For 2024 Elections

With less than a month to go until the British General Election and political campaigning well under way up and down the country, there are growing concerns about potential attempts to manipulate voters online. 

Campaigns are running the risk of being breached, exposing personal data, experiencing a financial impact and more, all which could have a negative effect on entire campaign’s credibility.

Cyber security and trust are a top focus around the world in 2024 elections. In  particular, concerns around the use of AI-generated content are coming to prominence ahead of the British parliamentary election. 

According to David Treece, vice president of solutions architecture at Yubico “Because campaigns are built on trust, potential hacks like fraudulent emails or messages sent out impersonating candidates or parties via their social media accounts where they are directly interacting with their audience, could be detrimental to campaigns...

“It’s imperative that candidates take proper steps to protect their campaign and more importantly, to build trust with voters, by adopting modern cyber security practices like multi-factor authentication. Adding a physical layer of security with a hardware security key to online accounts is a crucial component to ensuring that campaigns remain secure.” Treece said. 

According to Yubico's  recent US election survey ' Defending Digital Campaigns and One Poll' which looks at the impact of AI in this election season, 43 per cent of respondents believe that AI-generated content will negatively affect the outcome of the 2024 elections. Furthermore, 52 per cent have already received an email and/or text message appearing to be from a campaign that they suspected was actually a phishing attempt. 

Other Key Findings Include:  

  • 85 per cent of respondents do not have a high level of confidence that political campaigns effectively protect the personal information they collect.
  • Nearly half (42 per cent) of registered voters would like to see campaigns and candidates take precautions to prevent their websites from being hacked.
  • Over a quarter (26 per cent) of respondents indicated they have not completed a transaction making a campaign donation because of concerns about the security of the transaction or how their personal information would be handled

As Generative Artificial Intelligence (GenAI) enabled capabilities become more widely adopted, it is important for election officials to understand how these capabilities could impact the security and integrity of election infrastructure. 

According to a new report from the US cybersecurity agency CISA, GenAI capabilities present many  opportunities for increased productivity, potentially enhancing both election security and election administration. 

However, these same capabilities also carry the increased potential for greater harm, as malicious actors, including foreign nation state actors and cybercriminals, could leverage these same capabilities for nefarious purposes.

Images:  Allison Saeng & Ideogram

You Might Also Read: 

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Protecting Data In The Remote Working Era
Too Many Tools - Cybersecurity Professionals Feel Out Of Control  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

GlobalSign

GlobalSign

GlobalSign is an identity services company providing cloud-based, PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.