Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | Michaels & Byers

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=NQOU7mzCTSQ



Duration: 0:00
13 views
0


What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That’s the question Virginia Tech’s Alan Michaels and Jared Byers explore through their multi-year research project, “Use and Abuse of Personal Information: The Politics Edition.”

With support from 130 students across 21 majors, Michaels and Byers create realistic digital personas—complete with phone numbers, emails, and physical addresses—and sign them up across 1,400 political campaigns. Their goal? Understand how political organizations treat personal data: whether it’s used ethically, shared with third parties, or even exposed through insecure systems.

The findings are both fascinating and concerning. Their data shows that candidates across the political spectrum often prioritize fundraising above all else. The language and targeting vary, but the endgame is consistent: solicit donations and votes. And yes—these candidates frequently share or leak personal data. Sometimes it’s deliberate, sometimes it’s sloppy, and occasionally it’s the result of potential breaches.

The team examines differences in how data is handled based on whether an identity donates or not, or whether it’s tied to in-state versus out-of-state addresses. They even explore how generative AI and psychometric modeling can craft convincing personalities for these fake identities—tools that can just as easily be used for political influence campaigns and psychological manipulation.

But this project isn’t about political sides—it’s about accountability. The research remains strictly apolitical, letting the data speak for itself. Michaels and Byers are careful to avoid influencing public opinion through misinformation, focusing instead on documenting the reality of digital privacy in modern campaigning.

As more of the political playbook shifts into the digital arena, this session at Black Hat USA 2025 pushes attendees to confront an uncomfortable truth: the cost of participation in political life may include the exploitation of your digital identity.

___________Guests:

Alan Michaels, Professor and Director, Spectrum Dominance Division at Virginia Tech | On LinkedIn: https://www.linkedin.com/in/alan-michaels-1066814/

Jared Byers, Research Associate at Virginia Tech National Security Institute | On LinkedIn: https://www.linkedin.com/in/jared-byers-8a477324b/

Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/

Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/

___________

Episode Sponsors

ThreatLocker: https://itspm.ag/threatlocker-r974

BlackCloak: https://itspm.ag/itspbcweb

Akamai: https://itspm.ag/akamailbwc

DropzoneAI: https://itspm.ag/dropzoneai-641

Stellar Cyber: https://itspm.ag/stellar-9dj3

___________

Resources

Session: Use and Abuse of Personal Information -- Politics Edition: https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529

Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25

ITSPmagazine Webinar: What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference

Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage

Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf

Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us

___________

KEYWORDS

sean martin, marco ciappelli, alan michaels, jared byers, black hat, privacy, politics, data, ai, research, event coverage, on location, conference




Other Videos By ITSPmagazine


2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | E-V-E GRC Origin Story
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-04Leading Without Losing Yourself | A Conversation with Avani Desai | The Soulful CXO Podcast with ...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-03Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | Michaels & Byers
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human ...
2025-07-30Creative Storytelling in the Age of AI: When Machines Learn to Dream & the Last Stand of Creativity
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Tre...
2025-07-30What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Convers...
2025-07-30Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | Sean Metcalf