Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat U...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=6VKFxPiPkDI



Duration: 0:00
5 views
0


What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That’s the question Virginia Tech’s Alan Michaels and Jared Byers explore through their multi-year research project, “Use and Abuse of Personal Information: The Politics Edition (https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529) .”


With support from 130 students across 21 majors, Michaels and Byers create realistic digital personas—complete with phone numbers, emails, and physical addresses—and sign them up across 1,400 political campaigns. Their goal? Understand how political organizations treat personal data: whether it’s used ethically, shared with third parties, or even exposed through insecure systems.


The findings are both fascinating and concerning. Their data shows that candidates across the political spectrum often prioritize fundraising above all else. The language and targeting vary, but the endgame is consistent: solicit donations and votes. And yes—these candidates frequently share or leak personal data. Sometimes it’s deliberate, sometimes it’s sloppy, and occasionally it’s the result of potential breaches.


The team examines differences in how data is handled based on whether an identity donates or not, or whether it’s tied to in-state versus out-of-state addresses. They even explore how generative AI and psychometric modeling can craft convincing personalities for these fake identities—tools that can just as easily be used for political influence campaigns and psychological manipulation.


But this project isn’t about political sides—it’s about accountability. The research remains strictly apolitical, letting the data speak for itself. Michaels and Byers are careful to avoid influencing public opinion through misinformation, focusing instead on documenting the reality of digital privacy in modern campaigning.


As more of the political playbook shifts into the digital arena, this session at Black Hat USA 2025 pushes attendees to confront an uncomfortable truth: the cost of participation in political life may include the exploitation of your digital identity.


___________

Guests:


Alan Michaels, Professor and Director, Spectrum Dominance Division at Virginia Tech | On LinkedIn: https://www.linkedin.com/in/alan-michaels-1066814/


Jared Byers, Research Associate at Virginia Tech National Security Institute | On LinkedIn: https://www.linkedin.com/in/jared-byers-8a477324b/


Hosts:
Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/


Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/


___________


Episode Sponsors


ThreatLocker: https://itspm.ag/threatlocker-r974


BlackCloak: https://itspm.ag/itspbcweb


Akamai: https://itspm.ag/akamailbwc


DropzoneAI: https://itspm.ag/dropzoneai-641


Stellar Cyber: https://itspm.ag/stellar-9dj3


___________


Resources


Session: Use and Abuse of Personal Information -- Politics Edition: https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529


Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25


ITSPmagazine Webinar: What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar (https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference) | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference


Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage


Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf


Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us


___________


KEYWORDS


sean martin, marco ciappelli, alan michaels, jared byers, black hat, privacy, politics, data, ai, research, event coverage, on location, conference




Other Videos By ITSPmagazine


2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | E-V-E GRC Origin Story
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-04Leading Without Losing Yourself | A Conversation with Avani Desai | The Soulful CXO Podcast with ...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-03Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat U...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream & the Last Stand of Creativity
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | Sean Metcalf