2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

Part 2 of a series that will analyze critical cyber security aspects during the countdown  to the 2024 US Presidential Election, beginning with Covert Influence Operations, then Nation State Threat Actors, Hactivism and Cybercrime.


Nation-state cyber actors pose a serious foreign influence threat to the upcoming 2024 US Presidential Election, with likely objectives to propagate material that criticises election candidates and government officials, amplifying US societal divisions, and sowing discord amongst US citizens.

With the 2024 US Presidential Election taking place in the midst of the ever-evolving AI ecosystem, nation-states will likely leverage this technology to influence voting behaviour in favour of state interests. Priority cyber targeting throughout the election period may involve the government sector, election-related networks, national and local political parties, and the personal devices of election officials.

Russia 

The Russian Federation is the primary influence threat to the US Presidential Election, with Moscow leveraging a broad array of influence actors to enhance the potency and reach of these efforts and create content that resonates with US audiences, all whilst influencing congressional electoral outcomes, undermining public confidence in the electoral process, and exacerbating sociopolitical divisions.

In recent years, the US political arena has been under direct attack by the Newsroom for American and European Based Citizens (NAEBC), who have consistently attempted to influence diverse demographics on issues related to US politics and elections. Following an FBI probe, US prosecutors indicated that NAEBC played a critical role in Russian efforts to sway the 2016 US election in favour of former President Donald Trump . Based on the current Republican Party’s intentions of reducing support for Ukraine, it is unlikely that the 2024 election proceedings will be spared from this spree of Russian influence activity. 

The Russian disinformation campaign, known as Doppelgänger, should be highlighted as a threat as the influence network already attempted to influence the voting outcome on November 5th. Actors behind the campaign have leveraged AI-generated content, as well as creating 32 fake domains impersonating the Washington Post, to spread disinformation in favour of Russian interests. The campaign likely carries the objective of swaying the US election in favour of the former President Donald Trump, based on the Republican Party’s intentions of reducing financial and defence support for Ukraine, shifting focus to US domestic issues. Although the US Justice Department of Justice indicted two Russian nationals for their involvement, and sanctioned others tied to the campaign, follow-up influence efforts will likely emerge to exert social manipulation whilst eroding public trust in the US media.

Iran

Iranian influence assets also pose a significant threat to the upcoming election with the regime having a multitude of influence networks and propaganda mills at its disposal to disseminate disinformation to shape the information space. Iranian efforts to influence the outcome of the election will likely be shaped by the US-Israeli alliance that is currently acting as a buffer in preventing Tehran from escalating warfare efforts in the Middle East, supporting its Axis of Resistance proxy Hamas in Gaza. 

We have already witnessed this on the lead up to November 5th with OpenAI recently dismantling multiple ChatGPT accounts used by an Iranian influence network, tracked as Storm-2035, as part of an influence operation with what we have assessed to likely carry the objective of generating news articles and social media posts to sow discord amongst US voters and incite violence against US government officials.

China
Chinese influence actors will also likely enter the frame, with the DRAGONBRIDGE network likely to promote narratives regarding US politics, as well as Washington’s domestic and foreign affairs issues. Another pro-China influence campaign to be aware of is HaiEnergy, that regularly releases content critical of US foreign affairs and politicians, whilst praising the policies of the PRC. Chinese influence actors will also likely resort to social media to amplify disinformation content by posting partisan to boost follower counts and generate engagement from platform users. 

TO BE CONTINUED

Craig Watt is a Threat Intelligence Consultant at Quorum Cyber specializing in strategic and geopolitical intelligence.

Image: gguy44

You Might Also Read: 

How AI Will Help Disrupt Elections Around The Globe:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Critical Flaw Exposing Google Cloud Servers
2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.