Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

elezioni USA psy ops

USA Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

Olivia Terragni : 22 October 2024 14:02

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435 Members of the U.S. House of Representatives will be chosen. In this context, influence operations through digital echo chambers – such as digital platforms and social media – can play a critical role, shaping narratives that can influence people’s opinions, who are exposed to different types of political, scientific, cultural, conspiracy or extremist content.

We already put the spotlight on a 2024 marked by provocations in the great march to the polls in some 76 countries

resecurity elezioni usa
Source: Resecurity

Misinformation and Psy-Ops: the intent is to produce Chaos

Social media, instant messaging (IM) services and digital media channels play a crucial role: as traditional media consumption declines, many voters turn to social media for news and updates, where active accounts produce ad hoc content to influence public perception – which lacks the keys to critical thinking and informed decisions – and ultimately election results. Such content, which at first glance may seem naive, reveals instead that there is an organizational effort behind it to produce it and make it available online or easily sharable via mobile or email. It is important to highlight how an echo chamber represents  an environment where a person only encounters information or opinions that reflect and reinforce their own ideas and confirmation bias. 

Vuoi diventare un Ethical Hacker?
Non perdere i nostri corsi e scrivi subito su WhatsApp al numero
375 593 1011 per richiedere informazioni dicendo che hai trovato il numero sulle pagine di Red Hot Cyber

Supporta RHC attraverso:


Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo

Another critical threat is the erosion of trust in democratic institutions and processes: this facilitates the amplification of narratives whose sole intent is to produce chaos.

Foreign intelligence entities likely view U.S. elections as an opportunity to undermine confidence

in our democratic institutions and processes, sow divisions in our society, weaken our alliances, and promote their political, economic, or ideological agendas. These entities operate in the seams of our democratic system to advance their interests, using the tools of traditional espionage in combination with cyber operations and influence campaigns. Foreign attempts to interfere with our elections fall into five distinct categories:

  1. Cyber operations targeting election infrastructure,
  2. Cyber operations targeting politicians and public officials,
  3. Covert influence operations to assist or harm political organizations, campaigns,or public officials
  4. Covert influence operations to influence public opinion and sow division,
  5. Covert efforts to influence policymakers and the public.

This threat might take many forms, such as spreading disinformation, conducting hack-and-leak operations, or possibly manipulating data in a targeted fashion to influence the elections, and involves a wider range of foreign state and non-state actors than we have seen in the past, to include ideologically motivated entities and foreign cyber criminals.

Cyber operations, Psy Ops and cyber espionage 

In order to create chaos, psy-ops and cyber operations are used in combination with traditional espionage tools. This includes:

  • Cyber operations targeting election infrastructure,
  • Cyber operations targeting politicians and public officials
  • Traditional Psy.Ops intended to harm political organizations or public officials,
  • PsyOps efforts to influence public opinion
  • Operations aimed at influencing both public opinion and political decision-makers.

As we see, threats take on various forms, followed by disinformation, content manipulation, hacking and hybrid warfare, involving a wide range of entities, also thanks to the numerous digital tools available today and used to amplify the message. 

Added to this are non-traditional forms of espionage aimed at acquiring information or gaining access to critical infrastructure and supply chains or to new surveillance technologies, systems, networks and even foreign investments.

This also highlights the need for an approach to improve public awareness and rebuild their trust in democratic institutions.

Resecurity: erosion of trust and echo chambers, key threats to the US elections

In this regard, Resecurity – an American cybersecurity and threat intelligence company with headquarters in Los Angeles, California and of which we mention Gene Yoo CEO and Shawn Loveland COO –  has detected a substantial increase in the distribution of political content related to the 2024 US elections through social media networks, particularly from foreign jurisdictions. On October 5, 2024, Resecurity identified multiple accounts for sale on Telegram that were impersonating government entities, including the White House, the FBI and the CIA, as well as popular media outlets such as CNN and the Washington Post. 

In the report “Digital Echo Chambers and Erosion of Trust – Key Threats to the US Elections” Resecuritydiscusses the significant threats posed by the erosion of trust in the coming US elections caused by digital echo chambers.

Source: Resecurity (cit)

Multiple Telegram accounts with the U.S. elections narrative have also been registered and offered for sale between 10 TON ($51) and 2028 TON ($2290) on the marketplace  Fragment that can attract interest from political consultancies and foreign adversaries aiming to target a specific segment of the audience. One such account (@elections) was sold on October 18, 2023 – almost a year before the elections.

Source: Resecurity (cit)

Influence operations are not limited just to foreign entities but include domestic organizations and actors as well. In recent weeks, there has been a proliferation of fake pictures, videos, and narratives including targeted cyber attacks “under false flag to induce sentiment”.
The scenario at a global level seems to become even more complex if we look for example at Moldova – divided between East and West – where the yes vote has just passed in the referendum for its integration into the European Union. Analysts had already warned of a “large-scale hybrid war” originating from the social network Vkontakte (VK) regarding the presidential election and the discredit to Maia Sandu, who for now has won the first round with 42.45 percent of the votes and who is preparing for the runoff on November 3 with Alexandr Stoianoglo of the Partidul Socialiștilor din Republica Moldova.

Olivia Terragni
Author, former journalist, graduated in Economic History - Literature and Philosophy - and then in Architecture - great infrastructure - she deepened her studies in Network Economy and Information Economics, concluded with a Master in Cyber Security and Digital Forensics and a Master in Philosophy and Digital Governance. She is passionate about technological innovation and complex systems and their management in the field of security and their sustainability in international contexts. Criminalist. Optimistic sailor. https://www.redhotcyber.com/post/author/olivia-terragni/