Is Moscow Trying To Influence The US Presidential Election?

The unknown identity of a mysterious hacker claiming to be the sole architect behind the infiltration of the Democratic National Committee (DNC) has raised fears that Russia may be trying to influence the US election.

The idea sounds like the work of conspiracy theorists, but both security and foreign policy experts say it fits with a historical pattern of Russian intelligence operations.  

“I think it would naive of us to rule that out,” said Jason Healey, a director at the Atlantic Council who has worked on cyber defenses at the White House.

The hack comes as the Senate is weighing its annual intelligence policy bill, which would establish a committee specifically to counter “active measures by Russia to exert covert influence.”

The firm that investigated the breach for the DNC attributed the attack to the Russian government and most onlookers originally interpreted it as traditional espionage, a straightforward way of gathering intelligence about the American political landscape, something the US itself does.

But things became much murkier when a hacker calling himself or herself “Guccifer 2.0” dumped a trove of documents he claimed were among “thousands” stolen from the committee. The documents have yet to be verified but include opposition research on Donald Trump and a dossier of ways to defend Democratic frontrunner Hillary Clinton against political attacks.

“What appears evident is that the Russian groups responsible for the DNC hack are intent on attempting to influence the outcome of this election,” a spokesman for Democratic presidential candidate Hillary Clinton’s campaign told Bloomberg after the outlet reported that the same hackers behind the DNC breach had infiltrated the Clinton Foundation.

“Significance is more than docs,” tweeted ex-National Security Agency contractor Edward Snowden. “Hacktivists, possibly state-sponsored, now demonstrating intent, and capability, to influence elections.”

For some, handicapping the motivations behind the hack hinges on whether Guccifer 2.0 is who he says he is.

In interviews with Vice’s tech publication, Motherboard, Guccifer 2.0 claims to be Romanian, and to have acted independently.

Asked by Motherboard if he worked for the Russian government, Guccifer 2.0 responded, “No because I don't like Russians and their foreign policy. I hate being attributed to Russia.”

Onlookers are skeptical. For one thing, Guccifer 2.0’s Romanian is reportedly awkward for a native speaker. Others have noted the suspicious timing of Guccifer 2.0’s appearance on the web, the day after the attack was publicly attributed to Russia. There is no apparent documented history of his existence before that day.

The DNC almost immediately fired back, insisting that Guccifer 2.0 was a “misinformation campaign” by the Russian government. The security firm that investigated the breach, CrowdStrike, also said it stands by its assessment that the perpetrators of the breach were Russian government, forensic analysis that has since been backed up by other cyber companies.

Onlookers see two plausible scenarios. In both, the Russian government infiltrated the DNC’s servers.

Under one scenario, Guccifer 2.0 is an independent hacker who also infiltrated the DNC’s systems and subsequently chose to release the documents he stole. If that is the case, some say, then the Russian government was likely engaging in a traditional intelligence-gathering mission, not influence operations.

But if Guccifer 2.0 is a Russian government plant, there’s a possibility that the release of the documents is intended to shift the results of the US election in some way.

“I see as either straight espionage if Guccifer is not connected to Russia or influence operations trying to influence an election if Guccifer is connected to Russia,” Healey said.

Russia has long employed information warfare tactics to bolster their geopolitical position, arguing that it is necessary to counteract “informational aggression from the Atlantic civilization led by the USA.”

“This idea that they are seeking to influence the perception of some kind of issue or change that issue based on information they release or get out” has “a long and storied history,” said Jordan Berry, principal threat intelligence analyst at the security firm FireEye.

The intelligence community and lawmakers are carefully watching Russia’s ability to sow misinformation as a way to advance its own interests.

“Russian cyber actors, who post disinformation on commercial websites, might seek to alter online media as a means to influence public discourse and create confusion,” Director of National Intelligence James Clapper warned in his 2016 threat assessment.

The committee that would be established by the 2017 Intelligence Authorization Act would target Russian activities that are intended to influence either individuals or governments.

According to the bill, that includes everything from the establishment or funding of a front group, covert broadcasting, media manipulation and disinformation campaigns.

Experts cite the vast misinformation campaign that Russia, famous for its propaganda, has launched surrounding the situation in Ukraine, “which is being waged on an unprecedentedly large scale,” according to a Polish report on Russian information warfare strategy.

But whether the Kremlin would use that apparatus to influence the US election is still a matter of speculation. The theory is predicated on the assumption that Russian President Vladimir Putin is a supporter of presumptive Republican nominee Donald Trump.

“It is widely known that Putin greatly favors Donald Trump,” said Scott Borg, director of the nonprofit research institute US Cyber Consequences Unit. “Everything points to this being an attempt to influence an American election by a foreign power in a really dramatic way.”

Trump has spoken repeatedly of his admiration for Putin and has said he intends to ease tensions with Russia, a claim that has raised some eyebrows in the foreign relations community.

The Kremlin has signaled that it is pleased with Trump’s success. In December, Putin said Trump “says he wants to move to another level of relations, to closer and deeper relations with Russia, how can we not welcome that? Of course, we welcome it.”

Trump himself believes the hack was a hoax, perpetrated by the DNC itself.

“We believe it was the DNC itself that did the ‘hacking’ as a way to distract from the many issues facing their deeply flawed candidate and failed party leader,” the GOP standard-bearer tweeted last week.

And even those who say the theory is plausible caution that it should be taken with a grain of salt.

“It seems like an odd way to go about it,” Healey mused. “I have to work backwards, this bro-mance between Putin and Trump, somehow, this is meant to help Trump, but I don’t quite see how it does that?”

The Hill

« Frankenstein’s Paperclips
US & Israel Agree To Co-operate In Cyber Defense »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

CESAR

CESAR

CESAR is one of the premier R+D and innovation centers in Brazil and a designated Cybersecurity Competence Center.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.