Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Election 2020: The devastating social impact of bad bots

By Pascal Podvin
voting election
November 2, 2020

As we head into the final day before the 2020 election, disinformation on social media continues to make headlines as a means to sway public opinion and to discourage people from voting. For example, swing states have been targeted with evolving disinformation tactics in an attempt to influence what happens in the voting booth, while Black and Latino voters have been flooded with messages aimed to depress turnout by fueling cynicism and distrust in the political process.

Clearly, we’ve made little meaningful progress since the last U.S. presidential election.  As the 2016 campaigns were heating up, the major social media sites were barraged with Russian-operated posts in favor of Donald Trump, and an estimated 126 million Americans, roughly one-third of the nation’s population, received automated Russian-backed content on Facebook.

As the percentage of society and average time spent daily engaging on social media continues to rise, disinformation can have a staggering impact.

Why hasn’t meaningful progress been made to stop the spread of disinformation on social media platforms? Two words - bad bots. 

Our online world largely revolves around social media channels including Twitter, Facebook, YouTube and Instagram, and research shows that these sites are regularly abused by bad actors deploying automated bots. According to Carnegie Mellon, bots drive 10 to 20% of the conversation on social media, particularly related to natural disasters, elections, and other loaded issues and events.

When hundreds, even thousands, of different social accounts post the same message, or an image is posted and re-posted at the same time, these are the actions of bot operators accessing fake profiles to try to sway public opinion at-scale. While major social media companies have taken steps to find and deactivate fake accounts and delete bot-generated posts, automated influence continues to seep into the national debate.

It’s time to deplatform these bad actors.

Artificial Intelligence (AI) is actively being used to identify tell-tale signs of bot behavior by analyzing characteristics. For example, identifying:

  • Suspicious posting patterns such as an account creating hundreds of posts in an hour or posting all night long.
  • Inconsistencies between post and profile such as  a profile written in one language posts in another.
  • Politically triggered hashtags or posts behaving anomalously such as an identical post and associated hashtags showing-up simultaneously across hundreds of accounts.

But spotting bot behavior is not enough. These behaviors occur after the fact — after the fake accounts are created and are doing damage by spreading disinformation.

It is time for social media companies to seize control and deplatform bad bots. Becoming more proactive about stopping bad bots at the login stage is essential to stemming the spread of disinformation.

But fighting bots hasn’t been an easy task. Some of the brightest minds in the industry have been trying for years to master the cat-and-mouse game, with bot operators finding ingenious ways to work around each new wave of defenses that are implemented.

Most bot defense techniques rely on historical data to make decisions about the future. Examples include blocking known bad IP addresses and leveraging rate controls to slow down excessive requests. Even machine learning pattern searching is based on data from the past applied to the present. To increase efficacy, businesses have been forced to layer multiple rule-dependent techniques with greater complexity within their operations.

It’s time to flip the bad bot-fighting paradigm on its head. Instead of looking for bad bots and creating rules based on past behaviors, what if you just looked for humans?  And only let in traffic if you could verify with absolute certainty as human activity. Think of this as the zero-trust philosophy to mitigating bots: all requests are considered guilty until proven innocent.

Instead of having to apply and update a rules-dependent system which is always a step behind, modern detection methods can identify the unmistakable evidence trail left by automated bots when they interact with websites, mobile apps, and APIs. This approach, combined with mitigation methods that inflict financial damage on attackers and slow them down through exponentially difficult mathematical challenges, has been proven to provide not only immediate efficacy but efficacy that persists in the long term.

KEYWORDS: cyber security election security nation-state security social media

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pascal podvin

Pascal Podvin, CEO of Kasada, has been making his mark in Silicon Valley startups since 1991 and as a cybersecurity expert since 2014. With deep knowledge of U.S., European, and Asian markets, he has driven hyper-growth businesses of up to $100 million, consistently leading the way to optimal exits. Prior to joining Kasada, he held CRO and CEO positions with SaaS enterprise software companies. Based in New York City, Pascal is passionate about sales, strategic alliances, and customer engagement, as well as for driving VC funding. As the founder of the “Café du eCommerce,” Podvin federated an international community of eCommerce professionals dedicated to shaping the future of the industry.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • voting election

    63% of government workers are worried that cyberattacks will impact the integrity of the upcoming US election

    See More
  • bots

    How to shut down bad bots once and for all

    See More
  • Voting2

    CISA says there's no evidence of election fraud; 2020 election was the most secure in American history

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing