www.politico.com
Open in
urlscan Pro
2606:4700:4400::6812:25ea
Public Scan
Submitted URL: https://t.co/KNgZ4m5H7E
Effective URL: https://www.politico.com/news/2022/11/07/6-election-security-threats-to-watch-for-on-election-day-00065277
Submission: On November 07 via manual from US — Scanned from DE
Effective URL: https://www.politico.com/news/2022/11/07/6-election-security-threats-to-watch-for-on-election-day-00065277
Submission: On November 07 via manual from US — Scanned from DE
Form analysis
2 forms found in the DOMGET q
<form class="slide-search__form" action="q" method="get">
<input class="slide-search__input" type="search" name="q" id="searchTerm" aria-label="Search for any story" placeholder="Enter search term...">
<button class="slide-search__run" type="submit" aria-label="Start search"><b class="bt-icon bt-icon--search"></b><span class="icon-text">Search</span></button>
<button class="slide-search__close" id="search-close" type="button"><b class="bt-icon bt-icon--close" aria-label="Close Search"></b></button>
</form>
<form class="form-section">
<input type="hidden" name="subscribeId" value="0000014f-1646-d88f-a1cf-5f46b4be0000">
<input type="hidden" name="processorId" value="0000017d-9aad-d3d7-a37d-9ebf742d0000">
<input type="hidden" name="validateEmail" value="true">
<input type="hidden" name="enhancedSignUp" value="true">
<input type="hidden" name="bot-field" value="" class="dn">
<input type="hidden" name="subscriptionModule" value="newsletter_inline_standard_Huddle - POLITICO" class="dn">
<input type="hidden" name="captchaUserToken" value="" autocomplete="off">
<input type="hidden" name="captchaPublicKey" value="6LfS6L8UAAAAAAHCPhd7CF66ZbK8AyFfk3MslbKV" autocomplete="off">
<div class="sign-up-21--msg sign-up-21--msg-spinner" aria-hidden="true">
<div class="msg-content">
<p>Loading</p>
<svg class="sign-up-21--msg-icon-lg sign-up-21--spinner-icon-lg" xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 24 24" fill="none" stroke="#4D8AD2" stroke-width="1" stroke-linecap="round" stroke-linejoin="round">
<line x1="12" y1="2" x2="12" y2="6"></line>
<line x1="12" y1="18" x2="12" y2="22"></line>
<line x1="4.93" y1="4.93" x2="7.76" y2="7.76"></line>
<line x1="16.24" y1="16.24" x2="19.07" y2="19.07"></line>
<line x1="2" y1="12" x2="6" y2="12"></line>
<line x1="18" y1="12" x2="22" y2="12"></line>
<line x1="4.93" y1="19.07" x2="7.76" y2="16.24"></line>
<line x1="16.24" y1="7.76" x2="19.07" y2="4.93"></line>
</svg>
</div>
</div>
<div class="sign-up-21--msg sign-up-21--msg-completed" aria-live="assertive" aria-hidden="true">
<div class="msg-content">
<p>You will now start receiving email updates</p>
<svg class="sign-up-21--msg-icon-lg" width="48" height="48" viewBox="0 0 48 48" fill="none" xmlns="http://www.w3.org/2000/svg">
<path
d="M44 22.1597V23.9997C43.9975 28.3126 42.601 32.5091 40.0187 35.9634C37.4363 39.4177 33.8066 41.9447 29.6707 43.1675C25.5349 44.3904 21.1145 44.2435 17.0689 42.7489C13.0234 41.2543 9.56931 38.4919 7.22192 34.8739C4.87453 31.2558 3.75958 26.9759 4.04335 22.6724C4.32712 18.3689 5.99441 14.2724 8.79656 10.9939C11.5987 7.71537 15.3856 5.43049 19.5924 4.48002C23.7992 3.52955 28.2005 3.9644 32.14 5.71973"
stroke="#4D8AD2" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
<path d="M44 8L24 28.02L18 22.02" stroke="#4D8AD2" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
</svg>
</div>
</div>
<div class="sign-up-21--msg sign-up-21--msg-already-subscribed" aria-live="assertive" aria-hidden="true">
<div class="msg-content">
<p style="color:#9E352C">You are already subscribed</p>
<svg class="sign-up-21--msg-icon-lg" xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="1" stroke-linecap="round" stroke-linejoin="round">
<path d="M14 9V5a3 3 0 0 0-3-3l-4 9v11h11.28a2 2 0 0 0 2-1.7l1.38-9a2 2 0 0 0-2-2.3zM7 22H4a2 2 0 0 1-2-2v-7a2 2 0 0 1 2-2h3"></path>
</svg>
<a href="/newsletters" style="color:#007BC7;text-decoration:none;margin-top:10px;" target="_top" tabindex="-1"></a>
</div>
</div>
<div class="sign-up-21--msg sign-up-21--msg-error" aria-live="assertive" aria-hidden="true">
<div class="sign-up-21--msg-close">
<svg width="20" height="20" viewBox="0 0 20 20" fill="none" xmlns="http://www.w3.org/2000/svg">
<path id="close" fill-rule="evenodd" clip-rule="evenodd"
d="M17.513 16.6291L10.8839 9.99995L17.513 3.37082L16.6291 2.48694L10 9.11606L3.37088 2.48694L2.487 3.37082L9.11613 9.99995L2.487 16.6291L3.37088 17.513L10 10.8838L16.6291 17.513L17.513 16.6291Z" fill="#000"></path>
</svg>
</div>
<div class="msg-content">
<p style="color:#9E352C">Something went wrong</p>
</div>
</div>
<fieldset class="form-container active">
<div class="form-row row-email">
<div class="form-row-container">
<label class="data-form-label" for="email" aria-hidden="true">Email</label>
<span class="sign-up-21--error-msg"><span class="sign-up-21--exclamation">!</span>Please make sure that the email address you typed in is valid</span>
<div class="form-row-container--input">
<input type="email" name="subscribeEmail" aria-label="Email" placeholder="Your Email" required="">
</div>
</div>
</div>
<div class="form-row row-secondary-questions active">
<div class="sign-up-21--secondary-questions-container">
<div class="form-row-container">
<label class="data-form-label" aria-hidden="true">Industry</label>
<div class="form-row-container--select">
<select class="data-form-select" name="job_industry" required="" aria-label="Industry">
<option value="default" selected="" disabled="">Select Industry</option>
<option value="agriculture">Agriculture</option>,<option value="congress">Congress</option>,<option value="consulting">Consulting</option>,<option value="defense">Defense</option>,<option value="education">Education</option>,<option
value="energy_&_environment">Energy & Environment</option>,<option value="finance">Finance</option>,<option value="food_and_beverage">Food and Beverage</option>,<option value="foreign_government">Foreign Government</option>,
<option value="foundations/non-profit">Foundations/Non-Profit</option>,<option value="government_(non-congress)">Government (Non-Congress)</option>,<option value="healthcare">Healthcare</option>,<option value="labor">Labor</option>,
<option value="law/lobbying">Law/Lobbying</option>,<option value="media">Media</option>,<option value="personal_and_household_goods">Personal and Household Goods</option>,<option value="pharmaceutical">Pharmaceutical</option>,<option
value="political">Political</option>,<option value="public_relations">Public Relations</option>,<option value="real_estate">Real Estate</option>,<option value="retail">Retail</option>,<option value="sole_proprietor">Sole Proprietor
</option>,<option value="technology">Technology</option>,<option value="think_tank">Think Tank</option>,<option value="trade">Trade</option>,<option value="transportation">Transportation</option>,<option value="travel_&_leisure">
Travel & Leisure</option>
</select>
</div>
</div>
<div class="form-row-container">
<label class="data-form-label" aria-hidden="true">Employer</label>
<div class="form-row-container--input">
<input type="text" name="job_employer" required="" aria-label="Employer" placeholder="Employer">
</div>
</div>
</div>
<span class="sign-up-21--notice">
<span style="color:red">*</span> All fields must be completed to subscribe. </span>
</div>
<div class="row-bottom">
<p class="form-policy"> By signing up you agree to allow POLITICO to collect your user information and use it to better recommend content to you, send you email newsletters or updates from POLITICO, and share insights based on aggregated user
information. You further agree to our <a href="https://www.politico.com/privacy" target="_blank">privacy policy</a> and <a href="https://www.politico.com/terms-of-service" target="_blank">terms of service</a>. You can unsubscribe at any time
and can <a href="https://www.politico.com/feedback" target="_blank">contact us here</a>. This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and
<a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply. </p>
<button type="submit" disabled="" class="submit-button"> Sign Up </button>
</div>
</fieldset>
</form>
Text Content
Skip to Main Content POLITICO POLITICO LOGO * Congress Minutes * Pro * E&E News * Search Search SECTIONS * Congress * White House * Magazine * The Agenda * Video * Podcasts * Congress Minutes ELECTIONS * 2022 Election Results * 2022 Election Forecast * 2022 News SERIES * The Fifty * The First 100 Days * Recovery Lab * The Vaccine Race * Women Rule THE EXCHANGE * Women Rule NEWSLETTERS * Playbook * Playbook PM * POLITICO Nightly * West Wing Playbook * The Recast * Huddle * All Newsletters POLITICO LIVE * Live Home * Upcoming Events * Previous Events * About POLITICO Live COLUMNS & CARTOONS * Rich Lowry * Jack Shafer * Matt Wuerker * Cartoon Carousel POLICY * Agriculture * Cannabis * Cybersecurity * Defense * Education * eHealth * Employment & Immigration * Energy & Environment * Finance & Tax * Health Care * Space * Sustainability * Technology * Trade * Transportation EDITIONS * California * Canada * Europe * Florida * New Jersey * New York * Pro FOLLOW US * Twitter * Instagram * Facebook * My Account * Log In Log Out Cybersecurity 6 ELECTION SECURITY THREATS TO WATCH FOR ON ELECTION DAY Hacking threats and disinformation fears loom large as voters head to the polls. The U.S. officials charged with protecting election security say they’re watching for threats from multiple groups and countries. | Joe Raedle/Getty Images By Eric Geller 11/07/2022 04:30 AM EST * * * * Link Copied * * * * The midterms face a bevy of digital threats, from stolen Twitter accounts to hacked election websites, that could spark chaos, confusion and unrest that last long after the polls close. The 2020 presidential election was rife with allegations of voting machine hacks that were later debunked. Yet there are real risks that hackers could tunnel into voting equipment and other election infrastructure to try to undermine Tuesday’s vote. The U.S. has many safeguards protecting voting equipment, so any actual hack would probably be localized, quickly detected and unlikely to affect final results. But as 2020 showed, even an attempt to change votes — or the mere allegation of tampering — could undermine faith in the outcome. The U.S. officials charged with protecting election security say they’re watching for threats from multiple groups and countries. And in recent months, social media companies and cybersecurity researchers have identified Chinese influence operations aimed at the elections. Cybersecurity THE VOTING MACHINE HACKING THREAT YOU PROBABLY HAVEN’T HEARD ABOUT By Eric Geller “More attention to securing voting systems hasn’t eliminated critical technical and human threats to our elections,” said Matthew Weil, executive director of the Bipartisan Policy Center’s Democracy Program. “And this cycle is practice for 2024.” The federal government has worked since 2016 to improve coordination with state and local officials on everything from fixing digital vulnerabilities to promoting trusted sources of information. Biden administration officials say that’s one reason that they’ve seen less foreign interference than in 2016. But as CISA Director Jen Easterly, whose agency leads federal election security efforts, told reporters recently, “The current election threat environment is more complex than it has ever been.” She cited the ways that multiple different threats, from cyberattacks to disinformation to the harassment of election officials, are overlapping. Here are the threats to watch for as the final votes of the midterms are cast. MIS- AND DISINFORMATION Lies and conspiracy theories about the security of election systems are what most worry election supervisors and federal cybersecurity and intelligence officials, because those falsehoods can inflame mistrust that discourages people from voting and provoke anger that spurs people to threaten violence against election administrators. Russia stoked divisions during the 2016 campaign, and federal agencies recently warned that foreign actors may once again spread falsehoods about supposed hacks of election systems. But in recent years, domestic sources of mis- and disinformation have become the more widespread and potent threat. Election-related falsehoods are ubiquitous in right-wing circles, and foreign adversaries eagerly exploit these lies whenever possible. U.S. officials remain on alert for false announcements of a rescheduled election or corrupted ballots from spoofed email addresses and websites purporting to represent election offices; false claims of hacked voter data; or last-minute thefts and leaks of campaign communications. And while disinformation gets a lot of attention because it is spread deliberately, honest poll-worker mistakes at precincts and glitches such as brief voting machine outages can lead to innocent misunderstandings that generate misinformation. CRASHING ELECTION OFFICE AND CAMPAIGN WEBSITES Hackers have one relatively low-tech tool for knocking campaigns off balance and disrupting voters’ access to reliable election information: forcing websites to crash using automated tools that simulate massive floods of people visiting those sites. A few major tech companies, including Cloudflare and Google, offer free protection against these “distributed denial-of-service attacks” to election offices and political campaigns, but many websites remain unprotected. Cybersecurity ‘ABSOLUTELY TERRIFYING PROSPECT’: HOW THE MIDTERMS COULD WEAKEN U.S. ELECTION SECURITY By Eric Geller A Russian DDoS campaign recently knocked several state government websites offline, although those attacks did not specifically target election sites. Fortunately, DDoS attacks only temporarily disrupt sites, and they do not mean there are vulnerabilities in computer networks that would expose servers to more serious types of attacks, such as data theft or corruption. The federal government has urged the public not to overreact to DDoS attacks, noting that election websites run separately from the databases that store vote tallies and registration data. Even so, eleventh-hour website outages could pose problems for political campaigns or election officials hoping to promote critical messages — such as campaign talking points, polling-place updates or encouragements to stay in line — at the last minute. CAMPAIGN SOCIAL MEDIA ACCOUNT HIJACKING Hackers could take over candidates’ or campaigns’ social media accounts on Election Day and make inflammatory comments designed to alienate voters or spread false information about how or when to vote. These impersonation schemes could fuel distrust of the election process and knock campaigns off balance in the home stretch of the contest. The specter of targeted account hijacking isn’t theoretical. Twitter already experienced a massive hack in July 2020 in which a teenager took over accounts belonging to politicians, business leaders and other celebrities — including then-candidate Joe Biden. And now Twitter owner Elon Musk’s initiation of mass layoffs has sparked fears that the cuts could hit the company’s security team. “Account security is especially important in an election — it would be disastrous for candidates to turn into sock puppets,” said Eddie Perez, a board member at the OSET Institute, a nonpartisan election technology nonprofit. Perez was formerly a director of product management at Twitter overseeing a team that handled “civic integrity” issues. CYBERATTACKS ON VOTER REGISTRATION DATABASES States have spent years upgrading the security of their voter registration databases, which form the bedrock of a well-functioning election system. But no technology is perfectly secure, and vulnerabilities likely remain in some states’ networks. Russian hackers breached Illinois’ voter database in 2016, and Iranian hackers penetrated a state database in 2020. MOST READ 1. COTTON PASSES ON 2024 PRESIDENTIAL RUN AFTER CONSIDERING CAMPAIGN 2. GOP GOVERNOR: ‘TERRIBLE IDEA’ FOR TRUMP TO ANNOUNCE CANDIDACY BEFORE CHRISTMAS 3. GOP MEGADONOR: I’M READY TO BACK DESANTIS FOR PRESIDENT IN ’24 4. IN KENTUCKY, CONSERVATIVES WARN OF ‘ROE V. WADE 2.0' 5. THE STATES THAT WILL DETERMINE THE SENATE MAJORITY REMAIN STUBBORNLY CLOSE Hackers with access to a voter registration system could sow chaos in two ways. By tampering with voter data, they could make it more difficult or time-consuming for poll workers to check in voters at polling places. And by stealing voter data, hackers could engage in targeted harassment. Many states do, however, print out paper copies of voter rolls and distribute them to local officials, creating a backup source of information that they can use to check in voters if the electronic database fails or becomes unreliable. Federal officials recently said that cyberattacks on election infrastructure wouldn’t be able to corrupt voter data, disrupt voting or change results. TARGETED VOTER HARASSMENT This relatively novel threat represents an evolution in how foreign governments use hacking campaigns to meddle in U.S. elections. After stealing voter records from a state election database in 2020, Iranian operatives threatened those voters with unspecified consequences if they didn’t vote to reelect then-President Donald Trump. The messages, which contained false allegations of vulnerabilities in election technology, were designed to look like they came from the Proud Boys, a right-wing extremist group. The U.S. government quickly linked Tehran to the emails, warned election officials about them and disclosed the campaign publicly. Federal prosecutors subsequently indicted two Iranian men for the operation. It’s unclear how effective the messages were at convincing victims to vote for Trump, so Tehran and other U.S. adversaries may not try it again. Still, be on the lookout for similarly inflammatory emails. WIRELESS MODEMS ENABLING HACKS OF VOTING MACHINES OR VOTE TALLIES At least seven states and Washington, D.C., use wireless modems to transmit unofficial election-night results to their central offices. These modems use telecommunications networks that are vulnerable to hackers, and malicious actors could exploit them to tamper with unofficial vote data, corrupt voting machines or compromise the computers used to tally official results. “We now have to worry about anybody getting access to a communication network that is fundamentally open,” Matt Blaze, a Georgetown University computer science and law professor who studies voting systems, told POLITICO last month. At least seven states and Washington, D.C., use wireless modems to transmit unofficial election-night results to their central offices. | Joe Raedle/Getty Images These attacks are much more difficult and time-consuming — and thus much less likely to occur — than spreading falsehoods on social media or temporarily taking down websites. And states that use paper ballots and post-election audits would likely catch and correct erroneous results. Even so, temporarily incorrect information could fuel doubts about results, especially if the hackers bragged about their accomplishments. And if subsequent audits that correct digital tampering dramatically change vote tallies, bad-faith actors might seize on those changes to falsely allege fraud. * Filed under: * Cyber Security, * Midterm Elections, * Election Fraud, * Voting Issues, * 2022 Elections POLITICO * * * * Link Copied * * * * HUDDLE A play-by-play preview of the day’s congressional news Huddle A play-by-play preview of the day’s congressional news By signing up you agree to allow POLITICO to collect your user information and use it to better recommend content to you, send you email newsletters or updates from POLITICO, and share insights based on aggregated user information. You further agree to our privacy policy and terms of service. You can unsubscribe at any time and can contact us here. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Sign Up Loading You will now start receiving email updates You are already subscribed Something went wrong Email !Please make sure that the email address you typed in is valid Industry Select Industry Agriculture,Congress,Consulting,Defense,Education,Energy & Environment,Finance,Food and Beverage,Foreign Government,Foundations/Non-Profit,Government (Non-Congress),Healthcare,Labor,Law/Lobbying,Media,Personal and Household Goods,Pharmaceutical,Political,Public Relations,Real Estate,Retail,Sole Proprietor,Technology,Think Tank,Trade,Transportation,Travel & Leisure Employer * All fields must be completed to subscribe. By signing up you agree to allow POLITICO to collect your user information and use it to better recommend content to you, send you email newsletters or updates from POLITICO, and share insights based on aggregated user information. You further agree to our privacy policy and terms of service. You can unsubscribe at any time and can contact us here. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Sign Up SPONSORED CONTENT [Bilder] Das Auto, das Greta Thunberg besitzt, sagt alles I Am Famous [Fotos] Annalena Baerbock: Sie werden nie erraten, mit wem sie derzeit zusammen ist Editors Nation Spiel es für 1 Minute und sieh warum jeder verrückt danach ist. Panzer.Quest [Fotos] Mit 19 Jahren fährt Greta Thunberg dieses Auto Mighty Scoops [Fotos] Werfen Sie einen Blick auf das Auto von Greta Thunberg Fährt im echten Leben Rethink Style [Fotos] Annalena Baerbocks Freund könnte dir bekannt vorkommen Editors Nation [Fotos] Caren Miosga hat einen berühmten Ehemann, von dem nur wenige wissen Authorspick Traumhafte Frauen Dessous-Sets im Angebot! - Hier mehr sehen BH | Suchanzeigen Spiel es für 1 Minute und sieh warum jeder verrückt danach ist. Kein Install. Gratis spielen. www.combatsiege.com Wall St. Legend Warns: "A Big Change Is Coming" Visionary Profit * About Us * Advertising * Breaking News Alerts * Careers * Credit Card Payments * Digital Edition * FAQ * Feedback * Headlines * Photos * POWERJobs * Press * Print Subscriptions * Request A Correction * Write For Us * RSS * Site Map * Terms of Service * Privacy Policy * Do not sell my info * Notice to California Residents © 2022 POLITICO LLC WE CARE ABOUT YOUR PRIVACY We and our partners store and/or access information on a device, such as unique IDs in cookies to process personal data. You may accept or manage your choices by clicking below, including your right to object where legitimate interest is used, or at any time in the privacy policy page. These choices will be signaled to our partners and will not affect browsing data. WE AND OUR PARTNERS PROCESS DATA TO PROVIDE: Store and/or access information on a device. Select personalised ads. Select basic ads. Measure ad performance. Apply market research to generate audience insights. Develop and improve products. Create a personalised ads profile. List of Partners (vendors) I Accept Show Purposes ABOUT YOUR PRIVACY * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * TARGETING COOKIES * SOCIAL MEDIA COOKIES * GOOGLE YOUR PRIVACY We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework. More information List of IAB Vendors STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Cookies Details GOOGLE Google Allowing third-party ad tracking and third-party ad serving through Google and other vendors to occur. Please see more information on Google Ads here. * STORE AND/OR ACCESS INFORMATION ON A DEVICE Switch Label Cookies, device identifiers, or other information can be stored or accessed on your device for the purposes presented to you. * SELECT PERSONALISED ADS Switch Label Personalised ads can be shown to you based on a profile about you. Object to Legitimate Interests Remove Objection * SELECT BASIC ADS Switch Label Ads can be shown to you based on the content you’re viewing, the app you’re using, your approximate location, or your device type. Object to Legitimate Interests Remove Objection * MEASURE AD PERFORMANCE Switch Label The performance and effectiveness of ads that you see or interact with can be measured. Object to Legitimate Interests Remove Objection * APPLY MARKET RESEARCH TO GENERATE AUDIENCE INSIGHTS Switch Label Market research can be used to learn more about the audiences who visit sites/apps and view ads. Object to Legitimate Interests Remove Objection * DEVELOP AND IMPROVE PRODUCTS Switch Label Your data can be used to improve existing systems and software, and to develop new products Object to Legitimate Interests Remove Objection * CREATE A PERSONALISED ADS PROFILE Switch Label A profile can be built about you and your interests to show you personalised ads that are relevant to you. Object to Legitimate Interests Remove Objection List of IAB Vendors | View Full Legal Text Opens in a new Tab Cookies Details Back Button BACK Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Confirm My Choices Allow All