Fake News Threatens The German Election

Artificial Intelligence (AI) cyber attacks on prominent individuals and organisations may pose a significant threat to the German election. Once obtained, sensitive data can be used in coordinated hack-and-leak operations, in which stolen material, often altered or taken out of context, is released to undermine the credibility of political candidates or parties. 

Germany is bracing its defences against cyber attacks and disinformation campaigns, particularly from Russia, as it prepares for coming election on 23rd February.

Germany’s domestic intelligence service (BfV) has established a special task force to counter potential cyber attacks, espionage, sabotage and disinformation campaigns ahead of the upcoming election. “Such key political events can always become the target of undue influence by foreign powers seeking to pursue their strategic goals,” the BfV said in a statement.

The task force will include specialists from the intelligence service, federal and state security authorities, as well as international partners. While the BfV has not provided details on how the task force will operate, it stated that it aims to detect malicious activities as early as possible and prevent threat actors from influencing the elections.

Germany has seen a significant increase in hybrid threats, including disinformation, in recent years and the BfV is warning that disinformation and fake news, cyber attacks, espionage and sabotage should be expected.

The methods used are often similar: false information is published on websites and is spread using fake social media accounts. Social media users can comment on posts and share them in seconds. As soon as the false or misleading information starts to circulate, its authors delete the website where it appeared first. But the disinformation remains and may continue to be shared online, in different forms, for many years.

Unlike the US, voting machines or online voting procedures like those used in other countries, which could be targeted by cyber attacks, are not used in Germany, where voters can cast their ballots in polling stations or by post. Only official ballot papers can be used for postal voting.

Consequently, the BfV believe that the technical measures in place make it impossible to directly influence the final official results of the elections by means of cyber attacks. 

However, Germany’s Christian Democratic Union (CDU) was targeted by a large-scale cyber attack in June 2024 that forced the opposition party to temporarily take parts of its IT infrastructure off-line, while in 2023 the German government accused Russian hacking group called APT28, of being responsible for a cyber attacks on Social Democrats (SPD), including Chancellor Olaf Scholz. 

In comment, Craig Watt, a Threat Intelligence Consultant who specialises in strategic and geopolitical intelligence at Quorum Cyber said “Pro-Russian disinformation campaigns will likely capitalise on the political tidal wave that is sweeping across Germany with polls suggesting that the hard-right nationalist Alternative for Germany (AfD) party will become Germany's second largest political force, falling only behind the centre-right CDU/CSU Union parties.
 
Based on their track record, Pro-Russian influence actors will likely attempt to sway voters in favour of the AfD with the party eager to put an end to supplying defence aid to Ukraine whilst reallocating resources to strengthen Germany's armed forces for protection at home.
 
With this in mind, the election outcome carries the potential to impact the entire European continent with Berlin being a key power within the NATO alliance currently ranking second, only after the US, as the largest donor of military aid to Ukraine. With the new Republican Party administration shifting focus domestically, any emerging AfD policies will likely contribute to uncertainties surrounding unity within NATO.
 
It will be critical for the western intelligence community to work together to combat disinformation campaigns that continue to attack the fabric of European democracy whilst preying on European political divisions to influence Western demographics in the direction of NATO-scepticism.”

BfV    |     DW   |   BMI   |   Reuters   |   Politico  |   The Record    

Image: blackpixel

You Might Also Read: 

Undersea Communications Cables Cut:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« The Difference Between Perception & Reality In Email Security
AI Cracks A Long Term Scientific Mystery »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.

Affinity Technology Partners

Affinity Technology Partners

Affinity Technology Partners has been fueling the growth of Nashville, Tennessee businesses and nonprofits with reliable IT services since 2002.

Highway Ventures

Highway Ventures

HIGHWAY Ventures is a startup studio that builds cybersecurity and vertical AI companies in Northwest Arkansas from technology developed within the federal lab ecosystem.