Trump Says China Is Meddling In US Elections

White House claims that China is meddling in the midterms do not ring true to experts and cybersecurity firms that have long tracked Beijing’s digital espionage operations and propaganda campaigns.

“I’m not aware of anything credible that ties directly to any targeting from China to election influence,” said Ron Bushar, chief technology officer of FireEye, a cybersecurity firm that has tracked Chinese hackers for years.

“There’s certainly no evidence of Russia-style online manipulation or hacking and doxing,” said Adam Segal, a cyber and China expert at the Council on Foreign Relations.

President Donald Trump aired the idea last month that Russia isn’t the only country attempting to undermine the US democratic process.In a speech at the United Nations last week, he alleged that “China has been attempting to interfere in our upcoming 2018 election coming up in November against my administration.”

Vice President Mike Pence echoed those remarks in a speech Thursday. “China has initiated an unprecedented effort to influence American public opinion, the 2018 elections and the environment leading to the 2020 presidential elections,” he said at the Hudson Institute.

Neither Trump nor Pence explicitly accused China of mounting the types of social media trolling efforts or multiple, coordinated cyberattacks that the US has accused Russia of carrying out during the 2016 race. But Trump has likened the behavior of the two countries, saying last month that China is “trying to meddle in our elections. And we’re not going to let that happen. Just as we’re not going to let that happen with Russia.”

Yet China watchers have not seen any effort from Beijing to execute a disinformation campaign or propaganda effort to tilt the midterm elections one way or the other. 

Plenty of evidence exists, of course, that Chinese hackers have infiltrated US businesses and international human rights groups and are continuing to carry out operations to steal American intellectual property. But the cyber researchers say there’s no sign yet that its hackers have turned their attention on the US political process in any kind of concerted campaign to undermine Trump.

Those include the experts at FireEye, a firm whose work has included uncovering operations to infiltrate American corporations and law firms to steal intellectual property or to hack nonprofits and think tanks to learn of potential policy changes. 

In 2015, the company identified a Chinese hacking group it believed was responsible for the massive breach of the Office of Personnel Management, in which highly sensitive security clearance documents on more than 20 million current and former federal employees were stolen. 

More recently, the firm discovered suspected Russian and Iranian digital influence operations taking place on Facebook and Twitter. It also has uncovered what it calls a massive North Korean hacking operation aimed at stealing millions of dollars from banks around the world.

Some of the evidence the administration has offered, such as an ad in the Des Moines Register, is a normal reaction to the ongoing trade war between Trump and China, CFR’s Segal said. And despite Trump’s claims, he added, China does not seem to have decided yet whether it wants Trump reelected. He suggested the White House is attempting to divert attention from Russia’s hacking activities to give Trump more ammunition in his trade battle with China or to help distract from domestic political and legal issues. 

Recorded Future, a cybersecurity firm that in August said it detected a hacking operation originating from a top university in China to steal US business and government secrets, also cast doubt on the White House claims.
“We have not observed such behavior against US elections even if we’re observing much Chinese activity at large,” said Christopher Ahlberg, Recorded Future’s CEO.

In her own remarks on the subject this week, Homeland Security Secretary Kirstjen Nielsen offered a more nuanced depiction of Trump’s charges, saying the alleged Chinese operation is subtler, longer term and “more holistic” than Russia’s in 2016.
While the Kremlin wanted to create chaos, Nielsen argued Tuesday 2nd Oct. at an event hosted by The Washington Post, Beijing is more interested in a “longer game” of influencing American public opinion about China.

Meanwhile, she said, DHS has seen no sign of attempts to hack election equipment from China, or anyone else. “We currently have no indication that a foreign adversary attempts to disrupt our election infrastructure,” Nielsen said.

Dmitri Alperovitch, chief technology officer at the firm CrowdStrike, which investigated the Russian breach of the Democratic National Committee, said at the same event that China has surged back with cyberattacks on US industry during the past year and a half. That uptick follows a decline after Washington and Beijing struck a deal in 2015 to ban cyber theft for economic purposes. But, Alperovitch said, “We’re not seeing much on elections.”

Politico

You Might Also Read:

Hacking The Vote:

Will Russian Hackers Affect this Year's US Election?:

 

« Oil And Gas Cyber Attacks Soaring
Moscow Challenges The Hague About Alleged Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.