Trump Says China Is Meddling In US Elections

White House claims that China is meddling in the midterms do not ring true to experts and cybersecurity firms that have long tracked Beijing’s digital espionage operations and propaganda campaigns.

“I’m not aware of anything credible that ties directly to any targeting from China to election influence,” said Ron Bushar, chief technology officer of FireEye, a cybersecurity firm that has tracked Chinese hackers for years.

“There’s certainly no evidence of Russia-style online manipulation or hacking and doxing,” said Adam Segal, a cyber and China expert at the Council on Foreign Relations.

President Donald Trump aired the idea last month that Russia isn’t the only country attempting to undermine the US democratic process.In a speech at the United Nations last week, he alleged that “China has been attempting to interfere in our upcoming 2018 election coming up in November against my administration.”

Vice President Mike Pence echoed those remarks in a speech Thursday. “China has initiated an unprecedented effort to influence American public opinion, the 2018 elections and the environment leading to the 2020 presidential elections,” he said at the Hudson Institute.

Neither Trump nor Pence explicitly accused China of mounting the types of social media trolling efforts or multiple, coordinated cyberattacks that the US has accused Russia of carrying out during the 2016 race. But Trump has likened the behavior of the two countries, saying last month that China is “trying to meddle in our elections. And we’re not going to let that happen. Just as we’re not going to let that happen with Russia.”

Yet China watchers have not seen any effort from Beijing to execute a disinformation campaign or propaganda effort to tilt the midterm elections one way or the other. 

Plenty of evidence exists, of course, that Chinese hackers have infiltrated US businesses and international human rights groups and are continuing to carry out operations to steal American intellectual property. But the cyber researchers say there’s no sign yet that its hackers have turned their attention on the US political process in any kind of concerted campaign to undermine Trump.

Those include the experts at FireEye, a firm whose work has included uncovering operations to infiltrate American corporations and law firms to steal intellectual property or to hack nonprofits and think tanks to learn of potential policy changes. 

In 2015, the company identified a Chinese hacking group it believed was responsible for the massive breach of the Office of Personnel Management, in which highly sensitive security clearance documents on more than 20 million current and former federal employees were stolen. 

More recently, the firm discovered suspected Russian and Iranian digital influence operations taking place on Facebook and Twitter. It also has uncovered what it calls a massive North Korean hacking operation aimed at stealing millions of dollars from banks around the world.

Some of the evidence the administration has offered, such as an ad in the Des Moines Register, is a normal reaction to the ongoing trade war between Trump and China, CFR’s Segal said. And despite Trump’s claims, he added, China does not seem to have decided yet whether it wants Trump reelected. He suggested the White House is attempting to divert attention from Russia’s hacking activities to give Trump more ammunition in his trade battle with China or to help distract from domestic political and legal issues. 

Recorded Future, a cybersecurity firm that in August said it detected a hacking operation originating from a top university in China to steal US business and government secrets, also cast doubt on the White House claims.
“We have not observed such behavior against US elections even if we’re observing much Chinese activity at large,” said Christopher Ahlberg, Recorded Future’s CEO.

In her own remarks on the subject this week, Homeland Security Secretary Kirstjen Nielsen offered a more nuanced depiction of Trump’s charges, saying the alleged Chinese operation is subtler, longer term and “more holistic” than Russia’s in 2016.
While the Kremlin wanted to create chaos, Nielsen argued Tuesday 2nd Oct. at an event hosted by The Washington Post, Beijing is more interested in a “longer game” of influencing American public opinion about China.

Meanwhile, she said, DHS has seen no sign of attempts to hack election equipment from China, or anyone else. “We currently have no indication that a foreign adversary attempts to disrupt our election infrastructure,” Nielsen said.

Dmitri Alperovitch, chief technology officer at the firm CrowdStrike, which investigated the Russian breach of the Democratic National Committee, said at the same event that China has surged back with cyberattacks on US industry during the past year and a half. That uptick follows a decline after Washington and Beijing struck a deal in 2015 to ban cyber theft for economic purposes. But, Alperovitch said, “We’re not seeing much on elections.”

Politico

You Might Also Read:

Hacking The Vote:

Will Russian Hackers Affect this Year's US Election?:

 

« Oil And Gas Cyber Attacks Soaring
Moscow Challenges The Hague About Alleged Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.