Fake News Threatens The German Election

Artificial Intelligence (AI) cyber attacks on prominent individuals and organisations may pose a significant threat to the German election. Once obtained, sensitive data can be used in coordinated hack-and-leak operations, in which stolen material, often altered or taken out of context, is released to undermine the credibility of political candidates or parties. 

Germany is bracing its defences against cyber attacks and disinformation campaigns, particularly from Russia, as it prepares for coming election on 23rd February.

Germany’s domestic intelligence service (BfV) has established a special task force to counter potential cyber attacks, espionage, sabotage and disinformation campaigns ahead of the upcoming election. “Such key political events can always become the target of undue influence by foreign powers seeking to pursue their strategic goals,” the BfV said in a statement.

The task force will include specialists from the intelligence service, federal and state security authorities, as well as international partners. While the BfV has not provided details on how the task force will operate, it stated that it aims to detect malicious activities as early as possible and prevent threat actors from influencing the elections.

Germany has seen a significant increase in hybrid threats, including disinformation, in recent years and the BfV is warning that disinformation and fake news, cyber attacks, espionage and sabotage should be expected.

The methods used are often similar: false information is published on websites and is spread using fake social media accounts. Social media users can comment on posts and share them in seconds. As soon as the false or misleading information starts to circulate, its authors delete the website where it appeared first. But the disinformation remains and may continue to be shared online, in different forms, for many years.

Unlike the US, voting machines or online voting procedures like those used in other countries, which could be targeted by cyber attacks, are not used in Germany, where voters can cast their ballots in polling stations or by post. Only official ballot papers can be used for postal voting.

Consequently, the BfV believe that the technical measures in place make it impossible to directly influence the final official results of the elections by means of cyber attacks. 

However, Germany’s Christian Democratic Union (CDU) was targeted by a large-scale cyber attack in June 2024 that forced the opposition party to temporarily take parts of its IT infrastructure off-line, while in 2023 the German government accused Russian hacking group called APT28, of being responsible for a cyber attacks on Social Democrats (SPD), including Chancellor Olaf Scholz. 

In comment, Craig Watt, a Threat Intelligence Consultant who specialises in strategic and geopolitical intelligence at Quorum Cyber said “Pro-Russian disinformation campaigns will likely capitalise on the political tidal wave that is sweeping across Germany with polls suggesting that the hard-right nationalist Alternative for Germany (AfD) party will become Germany's second largest political force, falling only behind the centre-right CDU/CSU Union parties.
 
Based on their track record, Pro-Russian influence actors will likely attempt to sway voters in favour of the AfD with the party eager to put an end to supplying defence aid to Ukraine whilst reallocating resources to strengthen Germany's armed forces for protection at home.
 
With this in mind, the election outcome carries the potential to impact the entire European continent with Berlin being a key power within the NATO alliance currently ranking second, only after the US, as the largest donor of military aid to Ukraine. With the new Republican Party administration shifting focus domestically, any emerging AfD policies will likely contribute to uncertainties surrounding unity within NATO.
 
It will be critical for the western intelligence community to work together to combat disinformation campaigns that continue to attack the fabric of European democracy whilst preying on European political divisions to influence Western demographics in the direction of NATO-scepticism.”

BfV    |     DW   |   BMI   |   Reuters   |   Politico  |   The Record    

Image: blackpixel

You Might Also Read: 

Undersea Communications Cables Cut:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« The Difference Between Perception & Reality In Email Security
AI Cracks A Long Term Scientific Mystery »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

AccountabilIT

AccountabilIT

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.