2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

Part 2 of a series that will analyze critical cyber security aspects during the countdown  to the 2024 US Presidential Election, beginning with Covert Influence Operations, then Nation State Threat Actors, Hactivism and Cybercrime.


Nation-state cyber actors pose a serious foreign influence threat to the upcoming 2024 US Presidential Election, with likely objectives to propagate material that criticises election candidates and government officials, amplifying US societal divisions, and sowing discord amongst US citizens.

With the 2024 US Presidential Election taking place in the midst of the ever-evolving AI ecosystem, nation-states will likely leverage this technology to influence voting behaviour in favour of state interests. Priority cyber targeting throughout the election period may involve the government sector, election-related networks, national and local political parties, and the personal devices of election officials.

Russia 

The Russian Federation is the primary influence threat to the US Presidential Election, with Moscow leveraging a broad array of influence actors to enhance the potency and reach of these efforts and create content that resonates with US audiences, all whilst influencing congressional electoral outcomes, undermining public confidence in the electoral process, and exacerbating sociopolitical divisions.

In recent years, the US political arena has been under direct attack by the Newsroom for American and European Based Citizens (NAEBC), who have consistently attempted to influence diverse demographics on issues related to US politics and elections. Following an FBI probe, US prosecutors indicated that NAEBC played a critical role in Russian efforts to sway the 2016 US election in favour of former President Donald Trump . Based on the current Republican Party’s intentions of reducing support for Ukraine, it is unlikely that the 2024 election proceedings will be spared from this spree of Russian influence activity. 

The Russian disinformation campaign, known as Doppelgänger, should be highlighted as a threat as the influence network already attempted to influence the voting outcome on November 5th. Actors behind the campaign have leveraged AI-generated content, as well as creating 32 fake domains impersonating the Washington Post, to spread disinformation in favour of Russian interests. The campaign likely carries the objective of swaying the US election in favour of the former President Donald Trump, based on the Republican Party’s intentions of reducing financial and defence support for Ukraine, shifting focus to US domestic issues. Although the US Justice Department of Justice indicted two Russian nationals for their involvement, and sanctioned others tied to the campaign, follow-up influence efforts will likely emerge to exert social manipulation whilst eroding public trust in the US media.

Iran

Iranian influence assets also pose a significant threat to the upcoming election with the regime having a multitude of influence networks and propaganda mills at its disposal to disseminate disinformation to shape the information space. Iranian efforts to influence the outcome of the election will likely be shaped by the US-Israeli alliance that is currently acting as a buffer in preventing Tehran from escalating warfare efforts in the Middle East, supporting its Axis of Resistance proxy Hamas in Gaza. 

We have already witnessed this on the lead up to November 5th with OpenAI recently dismantling multiple ChatGPT accounts used by an Iranian influence network, tracked as Storm-2035, as part of an influence operation with what we have assessed to likely carry the objective of generating news articles and social media posts to sow discord amongst US voters and incite violence against US government officials.

China
Chinese influence actors will also likely enter the frame, with the DRAGONBRIDGE network likely to promote narratives regarding US politics, as well as Washington’s domestic and foreign affairs issues. Another pro-China influence campaign to be aware of is HaiEnergy, that regularly releases content critical of US foreign affairs and politicians, whilst praising the policies of the PRC. Chinese influence actors will also likely resort to social media to amplify disinformation content by posting partisan to boost follower counts and generate engagement from platform users. 

TO BE CONTINUED

Craig Watt is a Threat Intelligence Consultant at Quorum Cyber specializing in strategic and geopolitical intelligence.

Image: gguy44

You Might Also Read: 

How AI Will Help Disrupt Elections Around The Globe:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Critical Flaw Exposing Google Cloud Servers
2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

European Organisation for Security (EOS)

European Organisation for Security (EOS)

EOS represents all domains of security solutions and services.providers including ICT information and communications technologies.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

Karate Labs

Karate Labs

Karate is an open-source unified test automation platform combining API testing, API performance testing, API mocks & UI testing.