Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireTechnologies & SolutionsCybersecurity News

How $377 million will be lost due to ad fraud in the 2020 US campaign

By Jonathan Marciano
voting election
October 30, 2020

The U.S. Presidential Election has, in many ways, been digital. Spend on digital ads in the race reached $2.9 billion in 2020. This was up sharply from $0.4 billion four years ago, marking the continuing prominence of digital political campaigning since President Obama's campaign manager, David Plouffe heralded the channel as a deciding factor in the election 12 years ago.

However, an increasing challenge for this online ad spend has been ad fraud. In a new study, in association with the University of Baltimore, we see that marketers will $35 billion to digital ad fraud in 2020.

Ad fraud is the practice of fraudulently representing online advertising impressions, clicks, conversion or data events in order to generate revenue. In the case of the political campaigns, often money is spent reaching bots rather than voters.

 

How ad fraud is getting more sophisticated

The impact of bots and ad fraud on digital ad spend has grown as ad fraudsters have become more sophisticated. For the majority of fraudsters, the automation tools used to commit fraud are evolving without them having to do anything about it – fraudsters just have to hide and rewrite certain elements in order to evade more and more tests. In addition, one in five click fraud cases involve VPNs or proxies – disguising the fact that the user clicking on a campaign ad is actually located in countries other than the U.S. – and therefore almost certainly not eligible to vote.

Bot-makers create millions of headless browsers, that can simulate all human-like actions on ads and landing pages, such as mouse movement, page scrolling, and clicks, to load webpages and cause ad impressions, that appear entirely human. Malicious SDKs for advanced and AI-powered click injection are sold in the Dark Web on sale to the public for a fairly low price to perpetrate ad fraud, offering the opportunity in the words of the suppliers to "emulate ad clicks and hijack clicks including Google, and Facebook and organic clicks."

In relation to our findings around digital campaigns, we expect that ad fraud in digital ad spend accounted for $377 million in wasted budget. Some of the findings include that one in five click fraud cases involve VPNs or proxies – disguising the fact that the user clicking on a campaign ad is actually located in countries other than the U.S. – and therefore almost certainly not eligible to vote.

 

How digital campaigns suffered from ad fraud

There are a number of reasons that political campaigning runs into ad fraud problems. Firstly, the need to spend money and fast diminishes accountability. Zach Edwards, who worked on the online digital campaigns for President Obama and Mayor Bloomberg, says: "There is no ad fraud department in most of these buying teams that can be spending "$30,000 to 50,000 a day. In a business ad buy you have an ROI, you have people checking it for months afterwards, and if it didn't pan out you may ask for a refund, whereas in political buying the only day that matters is election day. So, you are spending money as fast as you possibly can. Because the political campaigns are so short, there is no accountability for ad fraud. But because the campaigns dissolve, no one ever checks that, and no-one ever asks for refunds."

Secondly, most spend online for political campaigns is at the end of the U.S. campaign. However, limits set by Google and Facebook, the two safer destinations for ad cash, has meant other more junk ad-fraud prone traffic received late splurges of cash. This type of traffic over inflates its numbers through bot traffic. In the words of Cam Cameron, digital political consultant at Strategic Partners & Media: "There is definitely a too good to be true feeling when I am being pitched by new partners, new websites where they are coming at me telling me they are getting so much traffic - a local news blog will come at you and I will do the math on their area and it does not make sense. I have a lot of questions to ask them, starting with, 'How can you prove you do not have bots and that is not a large proportion of your views or clicks?'"

Thirdly, OTT streaming where campaigns have spent millions of ad dollars, is particularly vulnerable to ad fraud. Fraud rates on OTT inventory stand at 17%, according to almost all estimates. Several OTT ad fraud cases has been discovered in 2020.

Finally, competitor clicks (one party clicking on another ads) are also likely.  This involves opposition campaigns clicking on ads of their competitors to drain ad spend. With pay per click on political keywords costing up to $10 per keyword, this sneaky ad fraud prevents ads from being seen by the intended electorate. This is despite such click fraud being illegal violating the federal Computer Fraud and Abuse Act (CFAA). Under this law, you can go to prison for up to 10 years. Such competitor click fraud has seen a rapid increase during COVID-19 particularly in white collar sectors such as real estate and law firms, under economic pressure. Click fraud is perpetrated to deplete advertisers' budget in an attempt to remove the ad from the search engine results, and damages campaign data.

Bots don't vote, however large sums of campaign spending in 2020 has been spent in reaching them, rather than real voters. In reality, few campaigns think about carrying out post-mortems in digital spend after a campaign. However, seeking answers on whether campaigns reached voters, or bots, represents a crucial analysis to ensure greater efficiency for future political races.

KEYWORDS: crime election security fraud

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jonathan Marciano is Director of Communications for CHEQ, a cybersecurity company in digital media. His expertise ranges from ad fraud, to digital marketing and has managed marketing at several leading SaaS companies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker scammer

    $5.9 billion lost due to fraud in 2021

    See More
  • Golden lock and credit cards on keyboard

    Nearly 90% of businesses saw up to 9% of revenue lost due to fraud

    See More
  • EU data privacy

    Federal deal will allow EU data to be collected in US

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Classified Ad Listing

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!