Deepfakes Designed To Mislead Voters

Powerful new Artificial Intelligence (AI) tools will allow anyone to create fake images, video and audio that was realistic enough to fool voters and perhaps sway an election. Now,over 50 countries, representing more than half of the global population, are set to hold elections. At the same time, new technologies such as generative artificial intelligence have proliferated and could be used to shape political narratives. 

Recent research has found a very extensive amount of public fears about the integrity of UK elections and the vulnerability of readers/viewers of false statements and misinformation on social media.

Britain is only months away from a General Election, but now new research suggests worrying levels of public mistrust in the process and polling data suggesting a significant section of the population believe our elections are “manipulated or rigged”. 

There is also evidence from a study into social media suggesting many British voters could be vulnerable to misinformation campaigns, such as the Russian meddling in the 2016 US Election that saw Donald Trump elected to the White House.

  • Russian military intelligence hacked into the Clinton presidential campaign and the Democratic Party and released tens of thousands of private communications in a sweeping conspiracy by the Kremlin to meddle in the 2016 US Election, according to an indictment announced days before President Donald Trump’s summit with Russian President Vladimir Putin.  

In the UK debates over the unfairness of our first-past-the-post system have run for decades. But the evidence from the research project run by the consultancy Thinks Insight  suggests many voters now believe there are more underhand injustices in our democratic process. It reveals a high potential vulnerability amongst voters to AI-produced “Deepfakes” on social media.

  • The study includes startling results from a poll of British adults which found that nearly a third (30%) thought that UK elections are more likely to be “manipulated” or “rigged” than “free and fair”.
  • It also found that 60% of voters are more inclined to agree that “the official version of events often hides the truth” rather than it being “usually accurate”. 
  • More than a third (38%) were more in agreement with the idea that it’s “acceptable to question the validity of the results of elections in the UK” than they were with the idea that “it’s important that we all respect the results of elections in the UK”.

Another survey of a nationally representative sample by a reputable polling company produced similar results, where  participants was shown posts containing misinformation on a mock-up of a social media site, which a significant proportion were prepared to promote by interacting with them.

  • A post telling voters to bring pens to polling stations (to avoid their pencilled vote being rubbed out and changed) was “boosted” by more than a third (35 per cent), as was the idea that tellers outside polling stations were checking who wasn’t voting so they could send in fake voters (34%). 
  • There was even higher interaction with broader misinformation such as a false statistic about child asylum seekers (40%), and misinformation on immigrant hotels (41%).

This study, which included 1,650 participants in all, also looked at the effectiveness of potential remedies to the misinformation.  Another subgroup of 550 participants was shown content warnings on some posts, saying to be careful before sharing because there had been a recent increase in posts with “unverified information” on that topic.  Alarmingly, the experiment showed these had no meaningful effect on slowing the spread of misinformation.

The recently enacted British Online Safety legislation has already made it a criminal offence to exchange deepfake pornographic material and it remains to be seen if the law can be extended to political camaign material. 

techUK:    iNews:   Context:    OUP:    APNews:     THinksInsight:      Image: Hendra Su

You Might Also Read:

British Online Safety Bill Will Restrict Social Media:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Rolling Campaign Of Russian Inspired DDoS Attacks
Is Artificial Intelligence The Answer To The Cybersecurity Skills Shortage? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Samsung Knox

Samsung Knox

Samsung Knox brings multi-layered defence-grade security to your business’s smartphones and tablets.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.