Trump Says China Is Meddling In US Elections

White House claims that China is meddling in the midterms do not ring true to experts and cybersecurity firms that have long tracked Beijing’s digital espionage operations and propaganda campaigns.

“I’m not aware of anything credible that ties directly to any targeting from China to election influence,” said Ron Bushar, chief technology officer of FireEye, a cybersecurity firm that has tracked Chinese hackers for years.

“There’s certainly no evidence of Russia-style online manipulation or hacking and doxing,” said Adam Segal, a cyber and China expert at the Council on Foreign Relations.

President Donald Trump aired the idea last month that Russia isn’t the only country attempting to undermine the US democratic process.In a speech at the United Nations last week, he alleged that “China has been attempting to interfere in our upcoming 2018 election coming up in November against my administration.”

Vice President Mike Pence echoed those remarks in a speech Thursday. “China has initiated an unprecedented effort to influence American public opinion, the 2018 elections and the environment leading to the 2020 presidential elections,” he said at the Hudson Institute.

Neither Trump nor Pence explicitly accused China of mounting the types of social media trolling efforts or multiple, coordinated cyberattacks that the US has accused Russia of carrying out during the 2016 race. But Trump has likened the behavior of the two countries, saying last month that China is “trying to meddle in our elections. And we’re not going to let that happen. Just as we’re not going to let that happen with Russia.”

Yet China watchers have not seen any effort from Beijing to execute a disinformation campaign or propaganda effort to tilt the midterm elections one way or the other. 

Plenty of evidence exists, of course, that Chinese hackers have infiltrated US businesses and international human rights groups and are continuing to carry out operations to steal American intellectual property. But the cyber researchers say there’s no sign yet that its hackers have turned their attention on the US political process in any kind of concerted campaign to undermine Trump.

Those include the experts at FireEye, a firm whose work has included uncovering operations to infiltrate American corporations and law firms to steal intellectual property or to hack nonprofits and think tanks to learn of potential policy changes. 

In 2015, the company identified a Chinese hacking group it believed was responsible for the massive breach of the Office of Personnel Management, in which highly sensitive security clearance documents on more than 20 million current and former federal employees were stolen. 

More recently, the firm discovered suspected Russian and Iranian digital influence operations taking place on Facebook and Twitter. It also has uncovered what it calls a massive North Korean hacking operation aimed at stealing millions of dollars from banks around the world.

Some of the evidence the administration has offered, such as an ad in the Des Moines Register, is a normal reaction to the ongoing trade war between Trump and China, CFR’s Segal said. And despite Trump’s claims, he added, China does not seem to have decided yet whether it wants Trump reelected. He suggested the White House is attempting to divert attention from Russia’s hacking activities to give Trump more ammunition in his trade battle with China or to help distract from domestic political and legal issues. 

Recorded Future, a cybersecurity firm that in August said it detected a hacking operation originating from a top university in China to steal US business and government secrets, also cast doubt on the White House claims.
“We have not observed such behavior against US elections even if we’re observing much Chinese activity at large,” said Christopher Ahlberg, Recorded Future’s CEO.

In her own remarks on the subject this week, Homeland Security Secretary Kirstjen Nielsen offered a more nuanced depiction of Trump’s charges, saying the alleged Chinese operation is subtler, longer term and “more holistic” than Russia’s in 2016.
While the Kremlin wanted to create chaos, Nielsen argued Tuesday 2nd Oct. at an event hosted by The Washington Post, Beijing is more interested in a “longer game” of influencing American public opinion about China.

Meanwhile, she said, DHS has seen no sign of attempts to hack election equipment from China, or anyone else. “We currently have no indication that a foreign adversary attempts to disrupt our election infrastructure,” Nielsen said.

Dmitri Alperovitch, chief technology officer at the firm CrowdStrike, which investigated the Russian breach of the Democratic National Committee, said at the same event that China has surged back with cyberattacks on US industry during the past year and a half. That uptick follows a decline after Washington and Beijing struck a deal in 2015 to ban cyber theft for economic purposes. But, Alperovitch said, “We’re not seeing much on elections.”

Politico

You Might Also Read:

Hacking The Vote:

Will Russian Hackers Affect this Year's US Election?:

 

« Oil And Gas Cyber Attacks Soaring
Moscow Challenges The Hague About Alleged Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Chatham House Cyber Conference

Chatham House Cyber Conference

14 June 2023 - Connect with cyber security experts and senior policymakers to explore the role of cyber security in the global economy and how to deliver an open and secure internet.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

CERT.RO

CERT.RO

CERT.RO is the national Computer Emergency Response Team of Romania

Engineering Ingegneria Informatica

Engineering Ingegneria Informatica

Ingegneria Informatica is a leading Italian provider of Information Technology consulting, services and solutions including cyber security.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

QuantLR

QuantLR

QuantLR is enabling the global mass deployment of Quantum Cryptography, by providing the world’s lowest-cost secure Quantum Cryptography solution.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.