Is Moscow Trying To Influence The US Presidential Election?

The unknown identity of a mysterious hacker claiming to be the sole architect behind the infiltration of the Democratic National Committee (DNC) has raised fears that Russia may be trying to influence the US election.

The idea sounds like the work of conspiracy theorists, but both security and foreign policy experts say it fits with a historical pattern of Russian intelligence operations.  

“I think it would naive of us to rule that out,” said Jason Healey, a director at the Atlantic Council who has worked on cyber defenses at the White House.

The hack comes as the Senate is weighing its annual intelligence policy bill, which would establish a committee specifically to counter “active measures by Russia to exert covert influence.”

The firm that investigated the breach for the DNC attributed the attack to the Russian government and most onlookers originally interpreted it as traditional espionage, a straightforward way of gathering intelligence about the American political landscape, something the US itself does.

But things became much murkier when a hacker calling himself or herself “Guccifer 2.0” dumped a trove of documents he claimed were among “thousands” stolen from the committee. The documents have yet to be verified but include opposition research on Donald Trump and a dossier of ways to defend Democratic frontrunner Hillary Clinton against political attacks.

“What appears evident is that the Russian groups responsible for the DNC hack are intent on attempting to influence the outcome of this election,” a spokesman for Democratic presidential candidate Hillary Clinton’s campaign told Bloomberg after the outlet reported that the same hackers behind the DNC breach had infiltrated the Clinton Foundation.

“Significance is more than docs,” tweeted ex-National Security Agency contractor Edward Snowden. “Hacktivists, possibly state-sponsored, now demonstrating intent, and capability, to influence elections.”

For some, handicapping the motivations behind the hack hinges on whether Guccifer 2.0 is who he says he is.

In interviews with Vice’s tech publication, Motherboard, Guccifer 2.0 claims to be Romanian, and to have acted independently.

Asked by Motherboard if he worked for the Russian government, Guccifer 2.0 responded, “No because I don't like Russians and their foreign policy. I hate being attributed to Russia.”

Onlookers are skeptical. For one thing, Guccifer 2.0’s Romanian is reportedly awkward for a native speaker. Others have noted the suspicious timing of Guccifer 2.0’s appearance on the web, the day after the attack was publicly attributed to Russia. There is no apparent documented history of his existence before that day.

The DNC almost immediately fired back, insisting that Guccifer 2.0 was a “misinformation campaign” by the Russian government. The security firm that investigated the breach, CrowdStrike, also said it stands by its assessment that the perpetrators of the breach were Russian government, forensic analysis that has since been backed up by other cyber companies.

Onlookers see two plausible scenarios. In both, the Russian government infiltrated the DNC’s servers.

Under one scenario, Guccifer 2.0 is an independent hacker who also infiltrated the DNC’s systems and subsequently chose to release the documents he stole. If that is the case, some say, then the Russian government was likely engaging in a traditional intelligence-gathering mission, not influence operations.

But if Guccifer 2.0 is a Russian government plant, there’s a possibility that the release of the documents is intended to shift the results of the US election in some way.

“I see as either straight espionage if Guccifer is not connected to Russia or influence operations trying to influence an election if Guccifer is connected to Russia,” Healey said.

Russia has long employed information warfare tactics to bolster their geopolitical position, arguing that it is necessary to counteract “informational aggression from the Atlantic civilization led by the USA.”

“This idea that they are seeking to influence the perception of some kind of issue or change that issue based on information they release or get out” has “a long and storied history,” said Jordan Berry, principal threat intelligence analyst at the security firm FireEye.

The intelligence community and lawmakers are carefully watching Russia’s ability to sow misinformation as a way to advance its own interests.

“Russian cyber actors, who post disinformation on commercial websites, might seek to alter online media as a means to influence public discourse and create confusion,” Director of National Intelligence James Clapper warned in his 2016 threat assessment.

The committee that would be established by the 2017 Intelligence Authorization Act would target Russian activities that are intended to influence either individuals or governments.

According to the bill, that includes everything from the establishment or funding of a front group, covert broadcasting, media manipulation and disinformation campaigns.

Experts cite the vast misinformation campaign that Russia, famous for its propaganda, has launched surrounding the situation in Ukraine, “which is being waged on an unprecedentedly large scale,” according to a Polish report on Russian information warfare strategy.

But whether the Kremlin would use that apparatus to influence the US election is still a matter of speculation. The theory is predicated on the assumption that Russian President Vladimir Putin is a supporter of presumptive Republican nominee Donald Trump.

“It is widely known that Putin greatly favors Donald Trump,” said Scott Borg, director of the nonprofit research institute US Cyber Consequences Unit. “Everything points to this being an attempt to influence an American election by a foreign power in a really dramatic way.”

Trump has spoken repeatedly of his admiration for Putin and has said he intends to ease tensions with Russia, a claim that has raised some eyebrows in the foreign relations community.

The Kremlin has signaled that it is pleased with Trump’s success. In December, Putin said Trump “says he wants to move to another level of relations, to closer and deeper relations with Russia, how can we not welcome that? Of course, we welcome it.”

Trump himself believes the hack was a hoax, perpetrated by the DNC itself.

“We believe it was the DNC itself that did the ‘hacking’ as a way to distract from the many issues facing their deeply flawed candidate and failed party leader,” the GOP standard-bearer tweeted last week.

And even those who say the theory is plausible caution that it should be taken with a grain of salt.

“It seems like an odd way to go about it,” Healey mused. “I have to work backwards, this bro-mance between Putin and Trump, somehow, this is meant to help Trump, but I don’t quite see how it does that?”

The Hill

« Frankenstein’s Paperclips
US & Israel Agree To Co-operate In Cyber Defense »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) is a service of DeIC (Danish e-Infrastructure Cooperation).

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

X4 Technology

X4 Technology

X4 Technology is a leader in finding the very best technology talent for some of the world’s most innovative start-ups and globally recognised brands.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.