2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

Part 2 of a series that will analyze critical cyber security aspects during the countdown  to the 2024 US Presidential Election, beginning with Covert Influence Operations, then Nation State Threat Actors, Hactivism and Cybercrime.


Nation-state cyber actors pose a serious foreign influence threat to the upcoming 2024 US Presidential Election, with likely objectives to propagate material that criticises election candidates and government officials, amplifying US societal divisions, and sowing discord amongst US citizens.

With the 2024 US Presidential Election taking place in the midst of the ever-evolving AI ecosystem, nation-states will likely leverage this technology to influence voting behaviour in favour of state interests. Priority cyber targeting throughout the election period may involve the government sector, election-related networks, national and local political parties, and the personal devices of election officials.

Russia 

The Russian Federation is the primary influence threat to the US Presidential Election, with Moscow leveraging a broad array of influence actors to enhance the potency and reach of these efforts and create content that resonates with US audiences, all whilst influencing congressional electoral outcomes, undermining public confidence in the electoral process, and exacerbating sociopolitical divisions.

In recent years, the US political arena has been under direct attack by the Newsroom for American and European Based Citizens (NAEBC), who have consistently attempted to influence diverse demographics on issues related to US politics and elections. Following an FBI probe, US prosecutors indicated that NAEBC played a critical role in Russian efforts to sway the 2016 US election in favour of former President Donald Trump . Based on the current Republican Party’s intentions of reducing support for Ukraine, it is unlikely that the 2024 election proceedings will be spared from this spree of Russian influence activity. 

The Russian disinformation campaign, known as Doppelgänger, should be highlighted as a threat as the influence network already attempted to influence the voting outcome on November 5th. Actors behind the campaign have leveraged AI-generated content, as well as creating 32 fake domains impersonating the Washington Post, to spread disinformation in favour of Russian interests. The campaign likely carries the objective of swaying the US election in favour of the former President Donald Trump, based on the Republican Party’s intentions of reducing financial and defence support for Ukraine, shifting focus to US domestic issues. Although the US Justice Department of Justice indicted two Russian nationals for their involvement, and sanctioned others tied to the campaign, follow-up influence efforts will likely emerge to exert social manipulation whilst eroding public trust in the US media.

Iran

Iranian influence assets also pose a significant threat to the upcoming election with the regime having a multitude of influence networks and propaganda mills at its disposal to disseminate disinformation to shape the information space. Iranian efforts to influence the outcome of the election will likely be shaped by the US-Israeli alliance that is currently acting as a buffer in preventing Tehran from escalating warfare efforts in the Middle East, supporting its Axis of Resistance proxy Hamas in Gaza. 

We have already witnessed this on the lead up to November 5th with OpenAI recently dismantling multiple ChatGPT accounts used by an Iranian influence network, tracked as Storm-2035, as part of an influence operation with what we have assessed to likely carry the objective of generating news articles and social media posts to sow discord amongst US voters and incite violence against US government officials.

China
Chinese influence actors will also likely enter the frame, with the DRAGONBRIDGE network likely to promote narratives regarding US politics, as well as Washington’s domestic and foreign affairs issues. Another pro-China influence campaign to be aware of is HaiEnergy, that regularly releases content critical of US foreign affairs and politicians, whilst praising the policies of the PRC. Chinese influence actors will also likely resort to social media to amplify disinformation content by posting partisan to boost follower counts and generate engagement from platform users. 

TO BE CONTINUED

Craig Watt is a Threat Intelligence Consultant at Quorum Cyber specializing in strategic and geopolitical intelligence.

Image: gguy44

You Might Also Read: 

How AI Will Help Disrupt Elections Around The Globe:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Critical Flaw Exposing Google Cloud Servers
2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.