Google Bans Ads Linking To Hacked Political Content

Google is taking action to prevent major interference in the 2020 US Presidential election, by blocking advertising that contain hacked political content. The new rules will come into effect on September 1. 

Once enforced, third-party entities won't be able to purchase ad space inside the Google Ads platform that link directly or indirectly to hacked content that was obtained from a political entity. Ads linking to news articles or other pages discussing the hacked political content are allowed, as long as the article or page to which the ad links does not link itself to the hacked political content.

The move appears designed to prevent a re-run of the lead-up to the last election, when damaging materials were leaked online by Russian hackers and then published and republished by third-party sites to help scupper Democrat hopes.
Twitter has since 2018 banned the spread of all hacked content on its platform including anything political-related.

The Google Ads Hacked political materials policy will applied first to ads covered by the tech giant’s US election ads policy. Google says the rules apply to the following: “Ads that directly facilitate or advertise access to hacked material related to political entities within scope of Google's election advertising policy. This applies to all protected material that was obtained through the unauthorized intrusion or access of a computer, computer network, or personal electronic device, even if distributed by a third party.”

Google will, however, allow “discussion of or commentary on” any hacked content as long as the ad or landing page doesn’t allow direct access to it. Any entity violating the policy will be notified seven days before their account is suspended.

Google also announced a policy to ban advertisers that try to conceal their identities whilst promoting social, political and other issues. This follows last November’s announcement that it was restricting political advertising to ban deepfake content and “ads or destinations making demonstrably false claims that could significantly undermine participation or trust in an electoral or democratic process.” It has also limited targeted advertising to “age, gender, and general location.”

Even with these new steps, US tech giants could be fighting a losing battle against misinformation ahead of the election, which could be the most divisive and hotly contested in living memory. Google said it will begin enforcing this second policy on September 1, 2020 in the United States, and on October 1, 2020, in all other countries.

 

Google Blog:     Axios:        ZDNet:         Infosecurity Magazine

You Might Also Read: 

Facebook: Hate Speech, Fake News & Bias:

 

« Essential Books For Learning About Cyber Security
WEBINAR: How to achieve security visibility at scale in the AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

tmc3

tmc3

tmc3 is an award-winning, people-centric consultancy that is transforming cyber security from an overhead into an organisational enabler.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).