Trump Says China Is Meddling In US Elections

White House claims that China is meddling in the midterms do not ring true to experts and cybersecurity firms that have long tracked Beijing’s digital espionage operations and propaganda campaigns.

“I’m not aware of anything credible that ties directly to any targeting from China to election influence,” said Ron Bushar, chief technology officer of FireEye, a cybersecurity firm that has tracked Chinese hackers for years.

“There’s certainly no evidence of Russia-style online manipulation or hacking and doxing,” said Adam Segal, a cyber and China expert at the Council on Foreign Relations.

President Donald Trump aired the idea last month that Russia isn’t the only country attempting to undermine the US democratic process.In a speech at the United Nations last week, he alleged that “China has been attempting to interfere in our upcoming 2018 election coming up in November against my administration.”

Vice President Mike Pence echoed those remarks in a speech Thursday. “China has initiated an unprecedented effort to influence American public opinion, the 2018 elections and the environment leading to the 2020 presidential elections,” he said at the Hudson Institute.

Neither Trump nor Pence explicitly accused China of mounting the types of social media trolling efforts or multiple, coordinated cyberattacks that the US has accused Russia of carrying out during the 2016 race. But Trump has likened the behavior of the two countries, saying last month that China is “trying to meddle in our elections. And we’re not going to let that happen. Just as we’re not going to let that happen with Russia.”

Yet China watchers have not seen any effort from Beijing to execute a disinformation campaign or propaganda effort to tilt the midterm elections one way or the other. 

Plenty of evidence exists, of course, that Chinese hackers have infiltrated US businesses and international human rights groups and are continuing to carry out operations to steal American intellectual property. But the cyber researchers say there’s no sign yet that its hackers have turned their attention on the US political process in any kind of concerted campaign to undermine Trump.

Those include the experts at FireEye, a firm whose work has included uncovering operations to infiltrate American corporations and law firms to steal intellectual property or to hack nonprofits and think tanks to learn of potential policy changes. 

In 2015, the company identified a Chinese hacking group it believed was responsible for the massive breach of the Office of Personnel Management, in which highly sensitive security clearance documents on more than 20 million current and former federal employees were stolen. 

More recently, the firm discovered suspected Russian and Iranian digital influence operations taking place on Facebook and Twitter. It also has uncovered what it calls a massive North Korean hacking operation aimed at stealing millions of dollars from banks around the world.

Some of the evidence the administration has offered, such as an ad in the Des Moines Register, is a normal reaction to the ongoing trade war between Trump and China, CFR’s Segal said. And despite Trump’s claims, he added, China does not seem to have decided yet whether it wants Trump reelected. He suggested the White House is attempting to divert attention from Russia’s hacking activities to give Trump more ammunition in his trade battle with China or to help distract from domestic political and legal issues. 

Recorded Future, a cybersecurity firm that in August said it detected a hacking operation originating from a top university in China to steal US business and government secrets, also cast doubt on the White House claims.
“We have not observed such behavior against US elections even if we’re observing much Chinese activity at large,” said Christopher Ahlberg, Recorded Future’s CEO.

In her own remarks on the subject this week, Homeland Security Secretary Kirstjen Nielsen offered a more nuanced depiction of Trump’s charges, saying the alleged Chinese operation is subtler, longer term and “more holistic” than Russia’s in 2016.
While the Kremlin wanted to create chaos, Nielsen argued Tuesday 2nd Oct. at an event hosted by The Washington Post, Beijing is more interested in a “longer game” of influencing American public opinion about China.

Meanwhile, she said, DHS has seen no sign of attempts to hack election equipment from China, or anyone else. “We currently have no indication that a foreign adversary attempts to disrupt our election infrastructure,” Nielsen said.

Dmitri Alperovitch, chief technology officer at the firm CrowdStrike, which investigated the Russian breach of the Democratic National Committee, said at the same event that China has surged back with cyberattacks on US industry during the past year and a half. That uptick follows a decline after Washington and Beijing struck a deal in 2015 to ban cyber theft for economic purposes. But, Alperovitch said, “We’re not seeing much on elections.”

Politico

You Might Also Read:

Hacking The Vote:

Will Russian Hackers Affect this Year's US Election?:

 

« Oil And Gas Cyber Attacks Soaring
Moscow Challenges The Hague About Alleged Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Mastercard

Mastercard

MasterCard is a leading global payments solutions company that serves consumers and businesses in over 210 countries and territories worldwide.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Fifosys

Fifosys

Fifosys is a professional technology infrastructure specialist, delivering a broad portfolio of high quality technical and strategic managed services.

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.