Might AI Influence Big Elections In 2024?

Computer engineers and IT experts have warned for years that cheap, powerful Artificial Intelligence (AI) tools will allow anyone to create fake images, video and audio that was realistic enough to fool voters and change an election. AI has been an aspect of political campaigning for some time, using data and algorithms to automate tasks such as targeting voters on social media or tracking down donors. 

In 2024 elections all around the world are facing an evolving threat from foreign actors that involves AI generated attacks in ways that have already been used to disrupt elections around the world. There are growing fears amongst government agencies, politicians and the security services of a growing threat. 

Generative AI tools such as Midjourney make it cheap to create convincing deepfakes, whether still images or video,  just as concern is growing about how such material should be used. Manipulated images and videos surrounding elections are nothing new, but 2024 will be the first elections in which sophisticated AI tools that can produce convincing fakes in seconds are just a few clicks away.

In the run-up to the 2016 US presidential election, social media platforms were vectors for misinformation as political activists, foreign influence campaigns and fake news sites worked to spread false information and exploit  divisions. Also in 2016 Russia launched a series of social media disinformation campaigns targeting the US presidential election and recently a number of countries used social media to influence foreign elections around the globe. 

In 2024 elections in the US, United Kingom and other large democracies face the new threat from Generative AI and large language models.

Election season will soon begin in Argentina and Poland in October, Taiwan in January 2024, Indonesia in February, India in April, the European Union and Mexico in June and the US in November. Nine African democracies, including South Africa, will have elections in 2024. Australia and the UK so far don’t have fixed dates, but elections will probably happen in 2024.

Generative AI tools also allow for new techniques of production and distribution, such as low-level propaganda at scale. These have the ability to quickly and easily produce endless reams of text on any topic in any tone from any perspective. The more powerful ChatGPT v.4  was released in March 2023. Other language and image production AIs are around the same age, but so far it isn’t clear how these technologies will change fake information.

Both Russia and China have a history of testing both cyber attacks and information operations on smaller countries before rolling them out at scale.  When that happens, it’s important to be able to accurately identify these tactics. Countering new disinformation campaigns requires being able to recognise them and requires spotting them now.

US election officials have been making a major effort since 2020 to prepare for an expected resurgence of election denial narratives. They've dispatched teams to explain voting processes, hired outside groups to monitor misinformation as it emerges and beefed up physical protections at vote-counting centres. 

However, social media could still be flooded with synthetic images and text and some experts fear voters could reach the point where where they no longer know what is real and what is fake.

Columbia Journalism Review:    DefenseOne:    CBS:    PBS:     Context:    Guardian:    Image: mikhail nilov

You Might Also Read: 

Fighting Fake News Using Machine Learning & Blockchains:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« China Cancels Encryption
The Cybersecurity Skills Gap Is Not Just A Numbers Game »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation. Activity areas include Cyber and Infrastructure Security.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

xdr.global

xdr.global

Xdr.global is a cybersecurity consulting firm, focused on promoting and aligning Extended Detection and Response (XDR) security solutions.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.