Facts About Fake Election Advertising

As national elections in Britain are only a few weeks away, the Bureau of Investigative Journalism (TBIJ) has found over 8,000 adverts featuring false information about politicians on Facebook. 

TBIJ is a nonprofit news organisation based in London that  pursues "public interest" investigations. Their research has identified thousands of scam adverts featuring AI-manipulated videos and false information about politicians have been circulating on Facebook in recent months. 

Some of these link to websites which emulate legitimate newspaper articles promoting dubious investment platforms, in many cases seeking to collect personal data .The adverts investigated include AI-manipulated videos and images, with one falsely alleging that Labour leader Sir Keir Starmer (pictured) had been involved in a banking scandal.   

AI-powered tools can generate new text, images, video, and speech from a single prompt to weave into campaign messages. Political campaigns are already using these tools to create messages 

While deepfakes are evolving fast, they are not without flaws. With a discerning eye, it’s often possible to identify falsified video, photos or audio recordings of politicians. Other fake articles were accompanied by manipulated images of politicians being arrested or lying injured in hospital. Users clicking through would then be taken to cloned pages replicating the websites of well-known media outlets.

The stories, sometimes unrelated to the original advert, often featured fake quotes from a public figure detailing how they had made a fortune from a new investment platform.

TBIJ used Meta’s advertisement library, a public database, to examine Facebook ads featuring 20 prominent European politicians that had been published over the past five months. The politicians were chosen after TBIJ found them to be featured in scam adverts. They included leader of the French National Rally party Marine Le Pen, co-chair of Germany’s AfD party Alice Weideland German Green Part Minister for foreign affairs, Annalena Baerbock. Others investigated were Luxembourg’s deputy prime minister Xavier Bettel and former Lithuanian president Dalia Grybauskaitė.

TBIJ identified more than 10,000 ads that were in breach of a transparency rule put in place by Meta that states ads featuring or mentioning political figures must be labelled as political. The onus is on the user posting the ads to label them appropriately. The ease with which they appear to have evaded the platform’s rules raises concerns about the ability of Meta, Facebook’s parent company, to control misinformation in advance of major elections across Europe.

Considering that so many ads featuring these politicians were found to have made it unchallenged through Meta’s systems, the total number of these types of posts in circulation could be much higher. 

Dubious websites can be reported to the British National Cyber Security Centre via the link below, whilst suspicious adverts on Facebook can be reported by selecting the three dots in the top right corner and pressing 'report.'

TBIJ   |   Which   |    Govtech   |    BBC   |    YouTube   |     Brennan Centre     |   NCSC   

Image: Ideogram

You Might Also Read: 

OpenAI Simulate Scarlett Johansson's Voice Without Permission:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Combatting Zero-Day Exploits In Financial Services
Navigating cloud security: The importance of posture management tools »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.