Cyber Threats To Canada's Democratic Process. 2023 Update (Canadian Centre For Cyber Security, Dec. 2023)
Cyber Threats To Canada's Democratic Process. 2023 Update (Canadian Centre For Cyber Security, Dec. 2023)
CAT D95-10E-PDF
Communications Security Establishment
1929 Ogilvie Road,
Ottawa, ON K1J 8K6
cse-cst.gc.ca
ISSN 2563-8165
CAT D95-10E-PDF
TABLE OF CONTENTS
About us 2
Executive Summary 3
Key findings and global trends 3
Introduction 7
Canada’s democratic process: A target for cyber threat activity? 7
Foreign adversaries are using cyber capabilities to threaten
democratic processes 7
Global trends 9
Trend 1: Targeting of democratic processes has increased 9
Trend 2: Russia and China continue to conduct most of the
attributed cyber threat activity targeting foreign elections 10
Trend 3: The majority of cyber threat activity targeting elections
is unattributed 11
Trend 4: Generative AI is increasingly being used to influence elections 11
1
2023 Update | Cyber threats to Canada’s democratic process
About us
ABOUT US
The Communications Security Establishment
(CSE) is Canada’s centre of excellence for cyber
operations. As one of Canada’s key security
and intelligence organizations, CSE protects
the computer networks and information of
greatest importance to Canada and collects
foreign signals intelligence. CSE also provides
assistance to federal law enforcement and
security organizations in their legally authorized
activities, when they may need CSE’s unique
technical capabilities.
2
2023 Update | Cyber threats to Canada’s democratic process
Executive Summary
EXECUTIVE SUMMARY
Foreign adversaries are increasingly using cyber tools to target
democratic processes around the world. Disinformation has
become ubiquitous in national elections, and adversaries are now
using generative artificial intelligence (AI) to create and spread
fake content. This report addresses cyber threat activity targeting
elections, and the growing threat that generative AI poses to
democratic processes globally and in Canada.
3
2023 Update | Cyber threats to Canada’s democratic process
Executive Summary
4
2023 Update | Cyber threats to Canada’s democratic process
About this report
Scope
This report considers cyber threat activity that affects democratic processes. Cyber threat activity
involves the use of cyber tools and techniques (e.g. malware and spear phishing) to compromise the
security of an information system by altering the confidentiality, integrity, and availability of a system or
the information it contains. This assessment considers cyber threat activity and cyber-enabled influence
campaigns, which occur when cyber threat actors use cyber threat activity or generative AI to covertly
manipulate online information in order to influence opinions and behaviors.
Sources
In producing this report, we relied on reporting from both classified and unclassified sources. CSE’s
foreign intelligence mandate provides us with valuable insights into adversary behaviour. Defending the
Government of Canada’s information systems also provides CSE with a unique perspective to observe
trends in the cyber threat environment.
Limitations
We discuss a wide range of cyber threats to global and Canadian political and electoral activities,
particularly in the context of Canada’s next federal election, currently set for 2025. Providing threat
mitigation advice is outside the scope of this report, however, we do refer to additional resources in the
“More information” section and the “Looking ahead” sections of this document.
5
2023 Update | Cyber threats to Canada’s democratic process
About this report
More information
Further resources can be found on the Cyber Centre’s cyber security guidance page6 and on the Get
Cyber Safe7 website.
For readers interested in more detailed information about cyber tools and the evolving cyber threat
landscape, we refer you to the following:
Estimative language
Our judgements are based on an analytical process that includes evaluating the quality of available
information, exploring alternative explanations, mitigating biases, and using probabilistic language. We
use terms such as “we assess” or “we judge” to convey an analytic assessment. We use qualifiers such as
“possibly”, “likely”, and “very likely” to convey probability according to the chart below.
The contents of this report are based on information available as of October 26, 2023.
The chart below matches estimative language with approximate percentages. These percentages are
not derived via statistical analysis, but are based on logic, available information, prior judgements, and
methods that increase the accuracy of estimates.
6
2023 Update | Cyber threats to Canada’s democratic process
Introduction
INTRODUCTION
This assessment is the fourth version of “Cyber Threats to Canada’s Democratic Process” and is an
update on the global cyber threat activity trends targeting national elections since the last publication
in 2021. It also provides information on how cyber threat activity can target election infrastructure, how
cyber-enabled influence campaigns impact Canada’s information ecosystem, and how generative AI
technologies will shape the future of democratic debate online.
We have observed that voters are the most frequent targets of cyber threat activity affecting elections
worldwide, and Canadian voters are among some of the most connected in the world, making them a
larger potential target for cyber threat activity.11 Because a large number of Canadians share information
online, cyber threat actors looking to influence Canadian voters’ opinions and behaviours can manipulate
online information using cyber techniques to conduct influence operations (e.g., hack-and-leak) or use
AI technologies to generate fake content (e.g., deepfakes). Increased tensions between Canada and other
states could lead to state-sponsored cyber threat actors targeting Canada’s election and disrupting
Canada’s democratic process. During periods of heightened bilateral tensions, cyber threat actors can
be called upon to conduct cyber activity or influence operations targeting events of national importance,
including elections. We assess that increased tensions or antagonism between Canada and a hostile
state is very likely to result in cyber threat actors aligned with that state targeting Canada’s democratic
processes or disrupting Canada’s online information ecosystem ahead of a national election.
7
2023 Update | Cyber threats to Canada’s democratic process
Introduction
Examples of cyber activity that we have observed globally since 2021 include:
} use of bots and inauthentic social media accounts to influence political discourse
It is becoming increasingly difficult to determine which adversaries are responsible for cyber threat
activity targeting democratic processes. Outsourcing cyber threat activity to third parties, such as
hacktivists and cybercriminals, or purchasing cyber tools and services from commercial providers and
online marketplaces can help foreign adversaries obfuscate their operations. Foreign adversaries have
access to a wide range of cyber tools and services on illegal markets that supplement their in-house
cyber capabilities. Influence-for-hire firms can also help hide the source of influence campaigns by
providing tools and services that spread disinformation and manipulate political discourse.
For example, in February 2023, a team of journalists uncovered an Israeli “influence-for-hire” firm’s hacking
and disinformation operations which claimed to have helped clients, including foreign governments,
target more than 30 elections across the globe.12 In addition, foreign adversaries outsource their cyber
activities to non-state cyber groups, such as cybercriminal groups and hacktivists, to avoid direct
attribution and access enhanced cyber capabilities.
Put into question the Weaken confidence Create distrust that the
results of the election in leadership electoral process is democratic
Promote polarizing political Online public discourse Co-opt domestic social
discourse by manipulating becomes “one-sided” and movements to promote
social media algorithms with political polarization fuels foreign economic, military,
fake bot accounts discontent and social or ideological interests
movements
Reduce voter turnout Voters become
Weaken confidence in disenfranchised and
apathetic to elections
election infrastructure
Generate misleading deepfake
videos and other AI generated
synthetic content Increase skepticism of Create disbelief in
information online information online
8
2023 Update | Cyber threats to Canada’s democratic process
Global trends
GLOBAL TRENDS
The Cyber Centre has been analyzing cyber threat activity targeting national level elections globally
since 2015. Not all cyber threat activity is reported – much of it is covert. Therefore, we assess that our data
almost certainly underestimates the total number of events targeting democratic processes around the
world. Based on our observations from 2015 to 2023, we identified four global trends.
9
2023 Update | Cyber threats to Canada’s democratic process
Global trends
We assess that attributed cyber threat activity is almost certainly focused on influencing elections to fulfill
strategic objectives in geopolitical regions of interest to Russia and China. In some cases, cyber activity
is politically motivated and will target a country’s democratic processes as a form of retribution. For
example, pro-Russia state-affiliated cyber actors have targeted elections of countries who have provided
assistance to Ukraine. We assess it very likely that Russia and China will continue to be responsible
for most of the attributed cyber threat activity targeting foreign elections and will focus on targeting
countries of strategic significance to them. We note that upcoming European elections in 2023 and
2024 could be a significant target for Russia due to the military and economic importance of Europe’s
support to Ukraine.
10
2023 Update | Cyber threats to Canada’s democratic process
Global trends
By outsourcing malicious cyber threat activities, foreign adversaries can avoid public attribution and
diplomatic consequences. Foreign adversaries have been increasing their use of non-state cyber threat
groups to avoid cyber activities being linked back to their government. Non-state cyber threat groups
have less government oversight, do not abide by the same conventions and norms, and can organize
cyber activities, such as distributed denial-of-service (DDoS) attacks, quickly and with little warning.
Foreign adversaries are also using influence-for-hire firms to conduct influence operations under the
radar. Since 2011, at least 27 online information operations have been partially or wholly attributed to
commercial public relations or marketing firms.16 Services related to election interference represent a
growing market, and if the use of third-party proxies continues, we assess that in the next two years,
governments will likely have difficulties linking cyber threat activities targeting elections back to the
foreign adversaries responsible.17
11
2023 Update | Cyber threats to Canada’s democratic process
Cyber threat activity against election infrastructure
Unlike influence campaigns which aim to influence voter behaviour, cyber threat actors targeting
election infrastructure seek to attack the electoral process directly, modify results, or reduce access
to voting. There are three stages in which cyber threat actors can target election infrastructure: when
voters register, when they vote, and when the votes are tallied. Cyber threat activity compromising any
of these three stages of the electoral process can jeopardize the integrity of an election.
12
2023 Update | Cyber threats to Canada’s democratic process
Cyber threat activity against election infrastructure
Voter registration
In almost all countries voters must register. In Canada, voters can register for national elections either
at the polls or online.20 Online registration can speed up the election process and voter registries can
be kept secure through safety measures such as controlling registry access, physically protecting
associated hardware, and providing additional I.T. security measures. However, voting registries contain
valuable data which can be a target for malicious cyber threat actors. For example, cyber threat actors
can attempt to alter online voter records, erase or encrypt data, make the website inaccessible for
registration, or display misleading information about registration. Cyber threat actors can also attempt
to by-pass security measures to access voter databases and use this personal information to target
voters. For instance, on October 22, 2020, the Federal Bureau of Investigation (FBI) and the Cybersecurity
and Infrastructure Security Agency (CISA) publicly denounced an Iranian campaign to obtain US voter
information and send threatening email messages to intimidate voters and disseminate disinformation
pertaining to the election.21
13
2023 Update | Cyber threats to Canada’s democratic process
Cyber threat activity and election influence campaigns
Cyber activity against democratic processes worldwide is more often conducted to influence the
electorate prior to elections rather than to target election infrastructure (Figure 4). Based on these
findings, we assess that on average, cyber threat actors targeting elections favour manipulating the
information environment over attempts to directly impact the voting process.
14
2023 Update | Cyber threats to Canada’s democratic process
Cyber threat activity and election influence campaigns
There are several reasons why cyber threat actors conduct social engineering rather than target election
infrastructure. These include:
Some tech companies have refused to comply and will block Canadian news from their
platforms. In 2019, almost 50% of Canadians aged between 18 and 24 relied on social media as
their main source of news.32
We assess that in the absence of Canadian news sources, younger Canadians are very likely
at a higher risk of being exposed to misleading news content, which may be part of wider
disinformation and influence campaigns.
15
2023 Update | Cyber threats to Canada’s democratic process
Generative AI threatens democratic processes
GENERATIVE AI THREATENS
DEMOCRATIC PROCESSES
Generative artificial intelligence (AI) can produce various types of content, including text, images,
audio, and video, sometimes referred to as “deepfakes.” This synthetic content can be used in influence
campaigns to covertly manipulate information online, and as a result, influence voter opinions and
behaviours. Despite the potential creative benefits of generative AI, its ability to pollute the information
ecosystem with disinformation threatens democratic processes worldwide.33
In most cases, it is unclear who is behind AI-generated disinformation. However, we assess it very likely
that foreign adversaries or hacktivists will use generative AI to influence voters ahead of Canada’s
next federal election. We have observed that cyber threat actors are already using this technology to
pursue strategic political objectives abroad. For example, pro-Russia cyber threat actors have used
generative AI to create a deepfake of Ukrainian President Zelenskyy surrendering following Russia’s
invasion of Ukraine.35 We assess that foreign adversaries and hacktivists are likely to weaponize
generative AI within the next two years to create deepfake videos and images depicting politicians and
government officials and to further amplify and automate inauthentic social botnets using text and
image generators.
16
2023 Update | Cyber threats to Canada’s democratic process
Generative AI threatens democratic processes
Social media companies’ ability to detect and remove deepfakes is further complicated by considerations
about creativity and freedom of speech. Political parties are themselves using generative AI capabilities
as part of their campaigns, for example, to create videos depicting “future scenarios” if a political rival is
elected.40 While disclaimers are used to identify the video as a deepfake, very little regulation currently
exists in Canada and the US on the extent to which generative AI can be used in political advertising.41
17
2023 Update | Cyber threats to Canada’s democratic process
Generative AI threatens democratic processes
18
2023 Update | Cyber threats to Canada’s democratic process
Implications for Canada
IMPLICATIONS
FOR CANADA
Based on our findings, we assess that disinformation about the
next federal election will almost certainly be found online and that
foreign adversaries will likely use generative AI to target Canada’s
federal election in the next two years. We assess that, overall,
Canada is a lower priority target for cyber threat activity than some
of its allies, such as the US and UK. However, Canada does not exist
in a vacuum and cyber activity affecting our allies’ democratic
processes will likely have an impact on Canada as well. For example,
a high percentage of Canadians use US social media platforms and
are often exposed to the same deepfakes and foreign influence
campaigns targeting US citizens.50
19
2023 Update | Cyber threats to Canada’s democratic process
Implications for Canada
Potential election interference and suspected election result tampering can put into question the
legitimacy of an election and result in investigations into the election process. Disproving false
narratives relating to election interference can be difficult: the technical components of cyber threat
activity are not always easily understood by voters and the extent of cyber compromises can be
misunderstood or misinterpreted.
20
2023 Update | Cyber threats to Canada’s democratic process
Looking ahead
LOOKING AHEAD
Cyber threat activity continues to be used to target democratic processes globally, and the Government
of Canada, CSE, and the Cyber Centre produce advice and guidance to help inform Canadians about the
cyber threats to Canada’s elections.
The Cyber Centre provides cyber security advice and guidance to all major political parties, in part
through publications such as the Cyber Security Guide for Campaign Teams53 and Cyber Security Advice
for Political Candidates.54
The Cyber Centre also works closely with Elections Canada to protect its infrastructure, including
publishing a report on Security Considerations for Electronic Poll Book Systems.58
We encourage Canadians to consult the Cyber Centre’s resources including the National Cyber Threat
Assessment 2023-2024,59 and the How to Identify Misinformation, Disinformation, and Malinformation60
publication, as well as the Fact Sheet for Canadian Voters.61 CSE’s Get Cyber Safe62 campaign will also
continue to publish relevant advice and guidance to inform Canadians about cyber security and the
steps they can take to protect themselves online.
21
2023 Update | Cyber threats to Canada’s democratic process
Endnotes
ENDNOTES
1 https://www.cyber.gc.ca/en/guidance/cyber-threats-canadas-democratic-process-july-2021-update
2 These numbers exclude instances of Online Foreign Influence Activity (OFIA) and focus solely on cyber threat activity.
3 Cyber threat actors can conduct Network Denial of Service (DoS) attacks to restrict or block users’ ability to access
a targeted resource, such as a website. “A Network DoS will occur when the bandwidth capacity of the network
connection to a system is exhausted due to the volume of malicious traffic directed at the resource or the network
connections and network devices the resource relies on. This traffic can be generated by a single system or multiple
systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS).” See MITRE ATT&CK.
“Network Denial of Service.” October 2023.
https://attack.mitre.org/techniques/T1498/
4 https://www.cyber.gc.ca/en/guidance/cyber-threats-canadas-democratic-process-july-2021-update
5 https://www.cyber.gc.ca/en/guidance/cyber-threats-canadas-democratic-process-july-2021-update
6 https://www.cyber.gc.ca/en/guidance
7 https://www.getcybersafe.gc.ca/en/home
8 https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2023-2024
9 https://cyber.gc.ca/en/guidance/introduction-cyber-threat-environment
10 https://www.cyber.gc.ca/en/guidance/how-identify-misinformation-disinformation-and-malinformation-itsap00300
11 The vast majority of Canadians use social media platforms to get and share information related to politicians, political
parties, and elections. In 2022, approximately 74% of Canadians over 15 years old used social media and approximately
77% accessed online news. In 2019, almost 50% of Canadians between the ages of 18 and 24 relied on social media as
their main source of news, and today the number is likely even higher.
12 Stephanie Kirchgaessner, Manisha Ganguly, David Pegg, Carole Cadwalladr and Jason Burke “Revealed: the hacking and
disinformation team meddling in elections.” The Guardian. February 15, 2023.
https://www.theguardian.com/world/2023/feb/15/revealed-disinformation-team-jorge-claim-meddling-elections-tal-
hanan
13 https://www.cyber.gc.ca/en/guidance/cyber-threats-canadas-democratic-process-july-2021-update
14 These numbers exclude instance of Online Foreign Influence Activity (OFIA) and focuses solely on cyber threat activity.
15 https://www.cyber.gc.ca/en/guidance/cyber-threats-canadas-democratic-process-july-2021-update
16 Craig Silverman, Jane Lytvynenko and William Kung. “Disinformation For Hire: How A New Breed Of PR Firms Is Selling
Lies Online.” Buzz Feed News. January 6, 2020.
https://www.buzzfeednews.com/article/craigsilverman/disinformation-for-hire-black-pr-firms
17 Jacob Wallis, Ariel Bogle, Albert Zhang, Hillary Mansour, Tim Niven, Elena Yi-Ching Ho, Jason Liu, Jonathan Corpus Ong
and Ross Tapsell. “Influence for hire: The Asia-Pacific’s online shadow economy.” Australian Strategic Policy Institute -
International Cyber Policy Centre. August 2021.
https://s3-ap-southeast-2.amazonaws.com/ad-aspi/2021-08/Influence for hire_0.pdf
18 Recorded Future. “The Business of Fraud: Deepfakes, Fraud’s Next Frontier.” April 29, 2021; Shamani Joshi. “They Follow You
on Instagram, Then Use Your Face to Make Deepfake Porn in This Sex Extortion Scam.” Vice News. September 7, 2021.
https://www.recordedfuture.com/deepfakes-frauds-next-frontier
https://www.vice.com/en/article/z3x9yj/india-instagram-sextortion-phishing-deepfake-porn-scam
19 https://www.cyber.gc.ca/en/guidance/cyber-threats-canadas-democratic-process-july-2021-update
20 United Nations, “Women and Elections: Basic elements of voter registration.” March 2005; Elections Canada. “The
Electoral System of Canada.” October 17, 2022.
https://www.un.org/womenwatch/osagi/wps/publication/Chapter4.htm
https://www.elections.ca/content.aspx?section=res&dir=ces&document=part5&lang=e
21 Federal Bureau of Investigations Most Wanted. “Iranian Interference in 2020 US Elections.” October 20, 2021.
https://www.fbi.gov/wanted/cyber/iranian-interference-in-2020-us-elections
22 International Institute for Democracy and Electoral Assistance. “Use of E-Voting Around the World.” February 6, 2023.
https://www.idea.int/news-media/media/use-e-voting-around-world
22
2023 Update | Cyber threats to Canada’s democratic process
Endnotes
23 Sue Halpern. “Election-Hacking Lessons from the 2018 Def Con Hackers Conference.” The New Yorker. August 23, 2018;
Shaun Nichols. “Expert gives Congress solution to vote machine cyber-security fears: Keep a paper backup.” The Register.
December 1, 2017; Shaun Nichols. “US voting hardware maker’s shock discovery: Security improves when you actually
work with the community.” The Register. August 6, 2020; Cyberscoop. “DEF CON Voting Village takes on election
conspiracies, disinformation.” August 17, 2022.
https://www.newyorker.com/news/dispatch/election-hacking-lessons-from-the-2018-def-con-hackers-conference
https://www.theregister.com/2017/12/01/us_voting_machine_security_hearing/
https://www.theregister.com/2020/08/06/black_hat_ess_bugs/
https://cyberscoop.com/defcon-voting-village-harri-hursti-election-fraud/
24 International Institute for Democracy and Electoral Assistance. “Use of E-Voting Around the World, International Institute
for Democracy and Electoral Assistance.” February 6, 2023.
https://www.idea.int/news-media/media/use-e-voting-around-world
25 Some DRE machines are able to create paper trail called a voter-verified paper audit trail (VVPAT) by recording the vote
on paper, however, many voting machines do not. See Raj Karan Gambhir and Jack Karsten. “Why paper is considered
state-of-the-art voting technology.” The Brookings Institution. August 14, 2019.
https://www.brookings.edu/articles/why-paper-is-considered-state-of-the-art-voting-technology/
26 International Institute for Democracy and Electoral Assistance. “ICTs in Elections Database.” April 29, 2019; Paul Laronde.
“Technologies in the Voting process: An Overview of Emerging Trends and Initiatives (Research Note).” Elections Canada.
May 2012; Elections Canada. “Safeguards for Counting Votes and Reporting on Results.” May 13, 2023.
https://www.idea.int/news-media/media/use-e-voting-around-world
https://www.idea.int/news-media/media/use-e-voting-around-world
https://www.elections.ca/content.aspx?section=vot&dir=int/cou&document=index&lang=e
27 In September 2007, Secretary of State Debra Bowen conducted a review of many of the voting systems certified for use in
California. See California Secretary of State. “Top-to-Bottom Review.” July 20, 2007.
https://www.sos.ca.gov/elections/ovsta/frequently-requested-information/top-bottom-review
28 IBM. “What is social engineering?” November 20, 2020.
https://www.ibm.com/topics/social-engineering
29 Geo-spoofing is the process of changing or hiding the location of a device on the internet by making the device look
like it is somewhere else. See Justin Schamotta. “How to change your location online using geo-spoofing.” Bleeping
Computers. June 20, 2023.
https://www.bleepingcomputer.com/vpn/guides/location-geo-spoofing/
30 Samantha Bradshaw, Hannah Bailey, and Philip N. Howard. “Industrialized Disinformation: 2020 Global Inventory of
Organized Social Media Manipulation.” Oxford Internet Institute. January 13, 2022.
https://demtech.oii.ox.ac.uk/wp-content/uploads/sites/12/2021/02/CyberTroop-Report20-Draft9.pdf
31 Emilio Ferrara, Herbert Chang, Emily Chen, Goran Muric, and Jaimin Patel. “Characterizing social media manipulation in
the 2020 U.S. presidential election.” First Monday. November 2020.
https://doi.org/10.5210/fm.v25i11.11431
32 Sebastien Charlton and Kamille Leclair. “Digital News Report: Canada 2019 Data Overview.” Centre d’études des médias -
Université Laval. February 2019.
https://www.cem.ulaval.ca/wp-content/uploads/2019/06/dnr19_can_eng.pdf
33 Thanh Thi Nguyena, Quoc Viet Hung Nguyenb, Dung Tien Nguyena, Duc Thanh Nguyena, Thien Huynh-Thec,
Saeid Nahavandid, Thanh Tam Nguyene, Quoc-Viet Phamf, and Cuong M. Nguyen. “Deep Learning for Deepfakes Creation
and Detection: A Survey.” April 26, 2021; Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley,
Sherjil Ozair, Aaron Courville and Yoshua Bengio. “Generative Adversarial Nets.” Université de Montréal. June 10, 2014.
https://arxiv.org/pdf/1909.11573.pdf
https://arxiv.org/pdf/1406.2661.pdf
34 Recorded Future. “The Business of Fraud: Deepfakes, Fraud’s Next Frontier.” April 29, 2021; Shamani Joshi, “They Follow You
on Instagram, Then Use Your Face to Make Deepfake Porn in This Sex Extortion Scam.” Vice News. September 7, 2021.
https://www.recordedfuture.com/deepfakes-frauds-next-frontier
https://www.vice.com/en/article/z3x9yj/india-instagram-sextortion-phishing-deepfake-porn-scam
35 Bobby Allyn. “Deepfake video of Zelenskyy could be ‘tip of the iceberg’ in info war, experts warn.” NPR. March 16, 2022.
https://www.npr.org/2022/03/16/1087062648/deepfake-video-zelenskyy-experts-war-manipulation-ukraine-russia
23
2023 Update | Cyber threats to Canada’s democratic process
Endnotes
36 Adrian Tijie Xu. “AI, Truth, and Society: Deepfakes at the front of the Technological Cold War.” Medium. July 2, 2019;
Christian Vaccari and Andrew Chadwick, “Deepfakes and Disinformation: Exploring the Impact of Synthetic Political
Video on Deception.” SAGE Journals. February 2020.
https://medium.com/gradientcrescent/ai-truth-and-society-deepfakes-at-the-front-of-the-technological-cold-war-
86c3b5103ce6
https://journals.sagepub.com/doi/full/10.1177/2056305120903408
37 Reuters. “Fact Check-Video does not show Joe Biden making transphobic remarks.” February 10, 2023.
https://www.reuters.com/article/factcheck-biden-transphobic-remarks-idUSL1N34Q1IW
38 Alexandra Ulmer and Anna Tong. “Deepfaking it: America’s 2024 election collides with AI boom.” Reuters. March 30, 2023
https://www.reuters.com/world/us/deepfaking-it-americas-2024-election-collides-with-ai-boom-2023-05-30/
39 John G Geer. “The effects of Presidential debates on the electorate’s preferences for candidates.” American Politics
Quarterly. October 1988.
https://journals.sagepub.com/doi/10.1177/004478088016004005
40 Ali Swenson. “FEC moves toward potentially regulating AI deepfakes in campaign ads.” PBS. August 10, 2023.
https://www.pbs.org/newshour/politics/fec-moves-toward-potentially-regulating-ai-deepfakes-in-campaign-ads
41 Fredreka Schouten. “Federal regulators inch a bit closer to regulating AI in political ads.” CNN. August 10, 2023; Paola
Ramirez and Pablo Tseng. “What Has the Law Done About “Deepfake”?” May 10, 2023.
https://www.cnn.com/2023/08/10/politics/fec-deepfakes-political-ads-regulation/index.html
https://mcmillan.ca/insights/what-has-the-law-done-about-deepfake/
42 Roberto Rocha and Jeff Yates. “Twitter trolls stoked debates about immigrants and pipelines in Canada, data show.” CBC
News. February 12, 2019.
https://www.cbc.ca/news/canada/twitter-troll-pipeline-immigrant-russia-iran-1.5014750
43 Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. “Design and analysis of a social botnet.”
Computer Networks. June 27, 2012.
https://doi.org/10.1016/j.comnet.2012.06.006
44 Shashank Yadav. “Political Propagation of Social Botnets: Policy Consequences.” Cornell University, May 10, 2022; Conrad
Nied, Leo Stewart, Emma Spiro, and Kate Starbird. “Alternative Narratives of Crisis Events: Communities and Social
Botnets Engaged on Social Media.” Companion of the 2017 ACM Conference on Computer Supported Cooperative Work
and Social Computing. February 2017.
https://arxiv.org/ftp/arxiv/papers/2205/2205.04830.pdf
https://dl.acm.org/doi/10.1145/3022198.3026307
45 Lena Frischlich, Niels Göran Mede, and Thorsten Quandt. “The Markets of Manipulation: The Trading of Social Bots on
Clearnet and Darknet Markets.” Disinformation in Open Online Media. January 29, 2020.
https://link.springer.com/chapter/10.1007/978-3-030-39627-5_8
46 OpenAI. “Better Language Models and Their Implications.” February 14, 2019.
https://openai.com/research/better-language-models
47 Alex Newhouse, Jason Blazakis and Kris McGuffie. “The industrialization of Terrorist Propaganda; Neural Language Models
and the Threat of Fake Content Generation.” Middlebury Institute of International Studies Center on Terrorism, Extremism
and Counterterrorism.” October 2019.
https://www.middlebury.edu/institute/sites/www.middlebury.edu.institute/files/2019-11/The Industrialization of Terrorist
Propaganda - CTEC.pdf
48 Ian, J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville and
Yoshua Bengio. “Generative Adversarial Nets.” Université de Montréal. June 10, 2014.
https://arxiv.org/pdf/1406.2661.pdf
49 Michelle Cantos, Sam Riddell and Alice Revelli. “Threat Actors are Interested in Generative AI, but Use Remains Limited.”
Mandiant. August 17, 2023.
https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited
24
2023 Update | Cyber threats to Canada’s democratic process
Endnotes
50 Most Canadians have viewed some form of synthetic content on social media due to 1) the large amounts of synthetic
content circulating on social media and 2) Canadians’ high intake of social media content. Researchers at the
Queensland University of Technology found that, on average, over 3.2. billion photos and 720,000 hours of video are
created daily and available online. They note that plenty of this online content consists of synthetic media shared
on social media. In 2018, 78% of Canadians used at least one social networking account and as of January 2021, the
estimated number of Canadian users on social media platforms Facebook, Instagram, Twitter, TikTok, WeChat, and
Youtube totalled 67.1 million. See Sebastien Charlton and Kamille Leclair, “Digital News Report: Canada, 2019 Data
Overview.” Université Laval. June 11, 2019; Christoph Schimmele, Jonathan Fonberg and Grant Schellenberg, “Canadians’
assessments of social media in their lives.” Statistics Canada. March 24, 2021; T.J. Thompson, Daniel Angus, Paula Dootson,
Edward Hurcombe and Adam Smith. “Visual Mis/disinformation in Journalism and Public Communications: Current
Verification Practices, Challenges, and Future Opportunities.” Journalism Practice. October 2020.
https://www.cem.ulaval.ca/wp-content/uploads/2019/06/dnr19_can_eng.pdf
https://www150.statcan.gc.ca/n1/pub/36-28-0001/2021003/article/00004-eng.htm
https://www.researchgate.net/publication/344778089_Visual_Misdisinformation_in_Journalism_and_Public_
Communications_Current_Verification_Practices_Challenges_and_Future_Opportunities
51 https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2023-2024
52 Chelsea Gabel and Nicole Goodman. “Indigenous Experiences with Online Voting.” First Nation Digital Democracy. May
2021; Nicole Goodman, Jon H. Pammett and Joan DeBardeleben. “A Comparative Assessment of Electronic Voting.”
Elections Canada. February 2010; Paul Laronde. “Technologies in the Voting process: An Overview of Emerging Trends and
Initiatives (Research Note).” Elections Canada. May 2012;
http://www.digitalimpactfn.com/wp-content/uploads/2021/05/FN_DIGITAL_REPORT_DIGITAL_FNL6.pdf
https://www.elections.ca/res/rec/tech/ivote/comp/ivote_e.pdf
https://www.elections.ca/content.aspx?section=res&dir=rec/tech/note&document=index&lang=e
53 https://cyber.gc.ca/en/guidance/cyber-security-guide-campaign-teams
54 https://www.cyber.gc.ca/en/guidance/cyber-security-advice-political-candidates
55 https://www.cyber.gc.ca/en/guidance/cyber-security-guidance-elections-authorities-itsm10020
56 https://www.cyber.gc.ca/en/guidance/generative-artificial-intelligence-ai-itsap00041
57 https://www.cyber.gc.ca/en/guidance/security-considerations-when-using-social-media-your-organization-itsm10066
58 https://www.cyber.gc.ca/en/guidance/security-considerations-electronic-poll-book-systems-itsm10101
59 https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2023-2024
60 https://www.cyber.gc.ca/en/guidance/how-identify-misinformation-disinformation-and-malinformation-itsap00300
61 https://www.cyber.gc.ca/en/guidance/fact-sheet-canadian-voters-online-influence-activities
62 https://getcybersafe.gc.ca/
25
2023 Update | Cyber threats to Canada’s democratic process