Might AI Influence Big Elections In 2024?

Computer engineers and IT experts have warned for years that cheap, powerful Artificial Intelligence (AI) tools will allow anyone to create fake images, video and audio that was realistic enough to fool voters and change an election. AI has been an aspect of political campaigning for some time, using data and algorithms to automate tasks such as targeting voters on social media or tracking down donors. 

In 2024 elections all around the world are facing an evolving threat from foreign actors that involves AI generated attacks in ways that have already been used to disrupt elections around the world. There are growing fears amongst government agencies, politicians and the security services of a growing threat. 

Generative AI tools such as Midjourney make it cheap to create convincing deepfakes, whether still images or video,  just as concern is growing about how such material should be used. Manipulated images and videos surrounding elections are nothing new, but 2024 will be the first elections in which sophisticated AI tools that can produce convincing fakes in seconds are just a few clicks away.

In the run-up to the 2016 US presidential election, social media platforms were vectors for misinformation as political activists, foreign influence campaigns and fake news sites worked to spread false information and exploit  divisions. Also in 2016 Russia launched a series of social media disinformation campaigns targeting the US presidential election and recently a number of countries used social media to influence foreign elections around the globe. 

In 2024 elections in the US, United Kingom and other large democracies face the new threat from Generative AI and large language models.

Election season will soon begin in Argentina and Poland in October, Taiwan in January 2024, Indonesia in February, India in April, the European Union and Mexico in June and the US in November. Nine African democracies, including South Africa, will have elections in 2024. Australia and the UK so far don’t have fixed dates, but elections will probably happen in 2024.

Generative AI tools also allow for new techniques of production and distribution, such as low-level propaganda at scale. These have the ability to quickly and easily produce endless reams of text on any topic in any tone from any perspective. The more powerful ChatGPT v.4  was released in March 2023. Other language and image production AIs are around the same age, but so far it isn’t clear how these technologies will change fake information.

Both Russia and China have a history of testing both cyber attacks and information operations on smaller countries before rolling them out at scale.  When that happens, it’s important to be able to accurately identify these tactics. Countering new disinformation campaigns requires being able to recognise them and requires spotting them now.

US election officials have been making a major effort since 2020 to prepare for an expected resurgence of election denial narratives. They've dispatched teams to explain voting processes, hired outside groups to monitor misinformation as it emerges and beefed up physical protections at vote-counting centres. 

However, social media could still be flooded with synthetic images and text and some experts fear voters could reach the point where where they no longer know what is real and what is fake.

Columbia Journalism Review:    DefenseOne:    CBS:    PBS:     Context:    Guardian:    Image: mikhail nilov

You Might Also Read: 

Fighting Fake News Using Machine Learning & Blockchains:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« China Cancels Encryption
The Cybersecurity Skills Gap Is Not Just A Numbers Game »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.