April 19, 2024 at 08:04AM
The US government has issued guidance to enhance election infrastructure resilience against malign influence operations from China, Russia, and Iran. Tactics include using fake online accounts, enlisting individuals to promote narratives, and laundering influence through proxy entities. The agencies advise debunking narratives, securing systems, and working with trusted sources to counter these efforts.
Based on the meeting notes provided, it is clear that the US government has issued new guidance to help election infrastructure stakeholders increase their resilience against malign influence operations intended to undermine trust in democratic institutions. The guidance identifies China, Russia, and Iran as state-sponsored threat actors known for employing various tactics such as the use of fake online accounts, enlisting individuals to promote their narratives, and utilizing proxies to launder influence narratives through both overt and covert methods.
Furthermore, foreign malign influence campaigns have focused on undermining public confidence in the US election process since 2016, with threat actors employing tactics including the use of fake social media personas, engaging with real individuals, and employing AI tools to spread malign influence content. These actors have also created and spread false evidence of cyber and physical incidents, paid influential individuals and organizations, and leveraged social media platforms to increase belief in their campaigns.
To prepare for and respond to foreign malign influence operations, election officials and other stakeholders are advised to proactively debunk potential malign influence narratives, direct audiences to official websites and trusted sources of information, train staff to respond to suspected AI-generated media, and establish relations with local media and community leaders. Additionally, they are advised to secure systems, accounts, and public-facing assets using various techniques such as making social media accounts private, using strong cybersecurity protocols, including multi-factor authentication, and using non-repudiation and authentication techniques to mark their content.
It is emphasized that defending the democratic process is the responsibility of all stakeholders.