2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

Part 2 of a series that will analyze critical cyber security aspects during the countdown  to the 2024 US Presidential Election, beginning with Covert Influence Operations, then Nation State Threat Actors, Hactivism and Cybercrime.


Nation-state cyber actors pose a serious foreign influence threat to the upcoming 2024 US Presidential Election, with likely objectives to propagate material that criticises election candidates and government officials, amplifying US societal divisions, and sowing discord amongst US citizens.

With the 2024 US Presidential Election taking place in the midst of the ever-evolving AI ecosystem, nation-states will likely leverage this technology to influence voting behaviour in favour of state interests. Priority cyber targeting throughout the election period may involve the government sector, election-related networks, national and local political parties, and the personal devices of election officials.

Russia 

The Russian Federation is the primary influence threat to the US Presidential Election, with Moscow leveraging a broad array of influence actors to enhance the potency and reach of these efforts and create content that resonates with US audiences, all whilst influencing congressional electoral outcomes, undermining public confidence in the electoral process, and exacerbating sociopolitical divisions.

In recent years, the US political arena has been under direct attack by the Newsroom for American and European Based Citizens (NAEBC), who have consistently attempted to influence diverse demographics on issues related to US politics and elections. Following an FBI probe, US prosecutors indicated that NAEBC played a critical role in Russian efforts to sway the 2016 US election in favour of former President Donald Trump . Based on the current Republican Party’s intentions of reducing support for Ukraine, it is unlikely that the 2024 election proceedings will be spared from this spree of Russian influence activity. 

The Russian disinformation campaign, known as Doppelgänger, should be highlighted as a threat as the influence network already attempted to influence the voting outcome on November 5th. Actors behind the campaign have leveraged AI-generated content, as well as creating 32 fake domains impersonating the Washington Post, to spread disinformation in favour of Russian interests. The campaign likely carries the objective of swaying the US election in favour of the former President Donald Trump, based on the Republican Party’s intentions of reducing financial and defence support for Ukraine, shifting focus to US domestic issues. Although the US Justice Department of Justice indicted two Russian nationals for their involvement, and sanctioned others tied to the campaign, follow-up influence efforts will likely emerge to exert social manipulation whilst eroding public trust in the US media.

Iran

Iranian influence assets also pose a significant threat to the upcoming election with the regime having a multitude of influence networks and propaganda mills at its disposal to disseminate disinformation to shape the information space. Iranian efforts to influence the outcome of the election will likely be shaped by the US-Israeli alliance that is currently acting as a buffer in preventing Tehran from escalating warfare efforts in the Middle East, supporting its Axis of Resistance proxy Hamas in Gaza. 

We have already witnessed this on the lead up to November 5th with OpenAI recently dismantling multiple ChatGPT accounts used by an Iranian influence network, tracked as Storm-2035, as part of an influence operation with what we have assessed to likely carry the objective of generating news articles and social media posts to sow discord amongst US voters and incite violence against US government officials.

China
Chinese influence actors will also likely enter the frame, with the DRAGONBRIDGE network likely to promote narratives regarding US politics, as well as Washington’s domestic and foreign affairs issues. Another pro-China influence campaign to be aware of is HaiEnergy, that regularly releases content critical of US foreign affairs and politicians, whilst praising the policies of the PRC. Chinese influence actors will also likely resort to social media to amplify disinformation content by posting partisan to boost follower counts and generate engagement from platform users. 

TO BE CONTINUED

Craig Watt is a Threat Intelligence Consultant at Quorum Cyber specializing in strategic and geopolitical intelligence.

Image: gguy44

You Might Also Read: 

How AI Will Help Disrupt Elections Around The Globe:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« A Critical Flaw Exposing Google Cloud Servers
2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

InfoExpress

InfoExpress

InfoExpress provides network security solutions that enhance productivity and security through better visibility, improved security, and automating device and mobile access to the network.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.