Is Moscow Trying To Influence The US Presidential Election?

The unknown identity of a mysterious hacker claiming to be the sole architect behind the infiltration of the Democratic National Committee (DNC) has raised fears that Russia may be trying to influence the US election.

The idea sounds like the work of conspiracy theorists, but both security and foreign policy experts say it fits with a historical pattern of Russian intelligence operations.  

“I think it would naive of us to rule that out,” said Jason Healey, a director at the Atlantic Council who has worked on cyber defenses at the White House.

The hack comes as the Senate is weighing its annual intelligence policy bill, which would establish a committee specifically to counter “active measures by Russia to exert covert influence.”

The firm that investigated the breach for the DNC attributed the attack to the Russian government and most onlookers originally interpreted it as traditional espionage, a straightforward way of gathering intelligence about the American political landscape, something the US itself does.

But things became much murkier when a hacker calling himself or herself “Guccifer 2.0” dumped a trove of documents he claimed were among “thousands” stolen from the committee. The documents have yet to be verified but include opposition research on Donald Trump and a dossier of ways to defend Democratic frontrunner Hillary Clinton against political attacks.

“What appears evident is that the Russian groups responsible for the DNC hack are intent on attempting to influence the outcome of this election,” a spokesman for Democratic presidential candidate Hillary Clinton’s campaign told Bloomberg after the outlet reported that the same hackers behind the DNC breach had infiltrated the Clinton Foundation.

“Significance is more than docs,” tweeted ex-National Security Agency contractor Edward Snowden. “Hacktivists, possibly state-sponsored, now demonstrating intent, and capability, to influence elections.”

For some, handicapping the motivations behind the hack hinges on whether Guccifer 2.0 is who he says he is.

In interviews with Vice’s tech publication, Motherboard, Guccifer 2.0 claims to be Romanian, and to have acted independently.

Asked by Motherboard if he worked for the Russian government, Guccifer 2.0 responded, “No because I don't like Russians and their foreign policy. I hate being attributed to Russia.”

Onlookers are skeptical. For one thing, Guccifer 2.0’s Romanian is reportedly awkward for a native speaker. Others have noted the suspicious timing of Guccifer 2.0’s appearance on the web, the day after the attack was publicly attributed to Russia. There is no apparent documented history of his existence before that day.

The DNC almost immediately fired back, insisting that Guccifer 2.0 was a “misinformation campaign” by the Russian government. The security firm that investigated the breach, CrowdStrike, also said it stands by its assessment that the perpetrators of the breach were Russian government, forensic analysis that has since been backed up by other cyber companies.

Onlookers see two plausible scenarios. In both, the Russian government infiltrated the DNC’s servers.

Under one scenario, Guccifer 2.0 is an independent hacker who also infiltrated the DNC’s systems and subsequently chose to release the documents he stole. If that is the case, some say, then the Russian government was likely engaging in a traditional intelligence-gathering mission, not influence operations.

But if Guccifer 2.0 is a Russian government plant, there’s a possibility that the release of the documents is intended to shift the results of the US election in some way.

“I see as either straight espionage if Guccifer is not connected to Russia or influence operations trying to influence an election if Guccifer is connected to Russia,” Healey said.

Russia has long employed information warfare tactics to bolster their geopolitical position, arguing that it is necessary to counteract “informational aggression from the Atlantic civilization led by the USA.”

“This idea that they are seeking to influence the perception of some kind of issue or change that issue based on information they release or get out” has “a long and storied history,” said Jordan Berry, principal threat intelligence analyst at the security firm FireEye.

The intelligence community and lawmakers are carefully watching Russia’s ability to sow misinformation as a way to advance its own interests.

“Russian cyber actors, who post disinformation on commercial websites, might seek to alter online media as a means to influence public discourse and create confusion,” Director of National Intelligence James Clapper warned in his 2016 threat assessment.

The committee that would be established by the 2017 Intelligence Authorization Act would target Russian activities that are intended to influence either individuals or governments.

According to the bill, that includes everything from the establishment or funding of a front group, covert broadcasting, media manipulation and disinformation campaigns.

Experts cite the vast misinformation campaign that Russia, famous for its propaganda, has launched surrounding the situation in Ukraine, “which is being waged on an unprecedentedly large scale,” according to a Polish report on Russian information warfare strategy.

But whether the Kremlin would use that apparatus to influence the US election is still a matter of speculation. The theory is predicated on the assumption that Russian President Vladimir Putin is a supporter of presumptive Republican nominee Donald Trump.

“It is widely known that Putin greatly favors Donald Trump,” said Scott Borg, director of the nonprofit research institute US Cyber Consequences Unit. “Everything points to this being an attempt to influence an American election by a foreign power in a really dramatic way.”

Trump has spoken repeatedly of his admiration for Putin and has said he intends to ease tensions with Russia, a claim that has raised some eyebrows in the foreign relations community.

The Kremlin has signaled that it is pleased with Trump’s success. In December, Putin said Trump “says he wants to move to another level of relations, to closer and deeper relations with Russia, how can we not welcome that? Of course, we welcome it.”

Trump himself believes the hack was a hoax, perpetrated by the DNC itself.

“We believe it was the DNC itself that did the ‘hacking’ as a way to distract from the many issues facing their deeply flawed candidate and failed party leader,” the GOP standard-bearer tweeted last week.

And even those who say the theory is plausible caution that it should be taken with a grain of salt.

“It seems like an odd way to go about it,” Healey mused. “I have to work backwards, this bro-mance between Putin and Trump, somehow, this is meant to help Trump, but I don’t quite see how it does that?”

The Hill

« Frankenstein’s Paperclips
US & Israel Agree To Co-operate In Cyber Defense »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

TeKnowledge

TeKnowledge

TeKnowledge enables governments and enterprises around the world to navigate the challenges with digital transformation today and tomorrow with elite cybersecurity protection and managed services.