Just So You Know: Foreign Threat Actors Likely to Use a Variety of Tactics to Develop and Spread Disinformation During 2024 U.S. General Election Cycle
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are issuing this announcement to raise awareness of the efforts posed by foreign threat actors to spread disinformation in the lead up to, and likely in the days following, the 2024 U.S. general election. Foreign threat actors are knowingly disseminating false claims and narratives that seek to undermine the American people's confidence in the security and legitimacy of the election process
The FBI and CISA have no information suggesting malicious cyber activity against U.S. election infrastructure has compromised the integrity of voter registration information, prevented an eligible voter from casting a ballot, impacted the integrity of any ballots cast, or disrupted the ability to count votes or transmit unofficial election results in a timely manner. However, foreign adversaries may use false or misleading narratives that indicate otherwise to further their objectives of undermining American public confidence in democratic processes and institutions.
While foreign malign influence operations and disinformation targeting American elections are not new, the proliferation of generative artificial intelligence (AI)-enabled tools is exacerbating pre-existing tactics. Generative AI-enabled tools have lowered the barrier for foreign malicious actors to conduct more sophisticated influence campaigns. We are seeing foreign actors use these tools to develop and distribute more compelling synthetic media messaging campaigns and inauthentic news articles, as well as synthetic pictures and deepfakes (video and audio) at greater speed and scale across numerous US- and foreign-based platforms. These efforts to develop content are designed to undermine voter confidence and to entice unwitting consumers of the information to discuss, share, and amplify the spread of false or misleading narratives.
Foreign threat actors use a variety of methods, often in tandem, to knowingly spread and amplify false or misleading claims about voting processes and results, including false claims that the processes or results have been compromised by malicious cyber activity to cast doubt on the legitimacy or outcome of the vote. These actors use commercial firms, paid influence, witting and unwitting Americans, publicly available and dark web media channels, online journals, messaging applications, spoofed websites, emails, text messages, and fake online personas on U.S. and foreign platforms to spread and amplify these false claims.
In previous public service announcements, the FBI and CISA raised awareness about tactics that could be used in foreign malign influence operations to undermine public confidence in elections. Those announcements highlighted foreign threat actors' use of publicly available voter registration information as "evidence" to falsely claim that a cyber operation compromised voting systems or altered election results. Similarly, foreign threat actors may falsely claim that ransomware or distributed denial of service incidents impacting election offices could impact the security or accuracy of vote casting or counting processes.
Russian Influence Efforts
As part of efforts to combat foreign actors who are seeking to interfere in and influence U.S. elections, the Department of Justice (DOJ), in collaboration with federal partners, has taken a series of actions to degrade Russian threat actors' capabilities to conduct these malign influence campaigns.
In July 2024, the DOJ, in coordination with U.S. and international partners, exposed a covert Russian government-operated, AI-enhanced social media bot farm using specialized software to create fictitious social media personas at scale. In September 2024, the DOJ took steps to disrupt Russian government-directed foreign malign influence campaigns by seizing more than 32 internet domains controlled by Russian government malign influence actors. The DOJ also indicted employees of a Russian state-controlled media outlet who covertly funded and directed a U.S.-based company that deployed nearly $10 million to disseminate pro-Russian narratives to a U.S. audience.
Over the course of these actions, the DOJ seized website domains that Russian malign influence actors created and deliberately designed to look like legitimate mainstream news websites (see below for examples). Many of the seized domains employed "cybersquatting," — a method of registering a domain intended to mimic another person's or company’s domain. The images below are screen captures of articles produced by these Russian government actors. These examples include websites such as "washingtonpost.pm", and "fox-news.in," which are not the real websites of the Washington Post and Fox News
Russian government or proxy-created fake media websites falsely presenting as prominent U.S. news outlets with
propaganda messaging and articles to further the threat actors’ intended messaging and goals.
Russian malign influence actors also created fake social media profiles posing as U.S. citizens to direct users to these fake news websites and purchased social media advertisements to drive traffic to the specific fake articles on the fake news site. The Appendix at the end of this document provides a compilation of websites that the FBI, Department of State, or Department of Treasury have previously publicly attributed to Russian malign influence actors, as well as websites and social media accounts that the Intelligence Community has attributed to Russian malign influence actors.
Iranian Influence Efforts
In addition to Russia, Iran is also undertaking influence operations as it has in past election cycles, including through its cyber apparatus, targeting current and former U.S. government officials, members of the media, nongovernmental organizations, and individuals associated with U.S. political campaigns. Iran is probably using generative AI and inauthentic personas to hide its hand and attempt to sow discord during the 2024 U.S. election cycle. On September 27, 2024, the DOJ charged three Iranian nationals identified as employees of the Islamic Revolutionary Guard Corps (IRGC), for a wide-ranging hacking conspiracy targeting current and former U.S. officials. The three IRGC employees are alleged to have conspired to hack into accounts of current and former U.S. officials, members of the media, nongovernmental organizations, and individuals associated with U.S. political campaigns. That indictment further alleged that in June 2024, the IRGC conspirators engaged in a "hack-and-leak" operation, in which they sought to weaponize campaign material stolen from a U.S. Presidential campaign. Additionally, the FBI, U.S. Cyber Command, the Department of Treasury, and the United Kingdom's National Cyber Security Centre have previously disseminated a Joint Cybersecurity Advisory that includes a list of malicious domains used by cyber actors working on behalf of the IRGC, which is linked below. We have also seen Iranian actors use similar tactics as Russian malign influence actors where they create inauthentic news sites posing as a legitimate media organization (see example below).
Iranian government or proxy-created website presenting as a fake local news organization, which uses
propaganda messaging and articles to further Iran's intended messaging and goals.
Recommendations
We urge the American public to critically evaluate the sources of the information they consume and to seek out reliable and verified information from trusted sources, such as state and local election officials. Specifically, we recommend the American public take the following precautions:
Educate yourself and others on the tactics of foreign malign influence operations, including the use of generative AI and deep-fakes, and their goal to undermine American public confidence in U.S. democratic institutions and processes. Greater public awareness may help limit the spread of foreign malign influence campaigns.
Seek out information from trusted, official sources, such as state and local election officials, and verify
reported claims through trusted, official sources before sharing such information.
To better understand what you are viewing, know the media and social media company policies and citation rules to denote or disclose content created or doctored with generative AI tools. When viewing content, consider who produced it and look for labels that may identify the content as AI-generated.
Consider reporting information concerning suspicious or criminal activity, to include the distribution of knowingly false information regarding the time, place, or manner of elections designed to deprive individuals of their right to vote, to their local FBI field office.
Role of the FBI and CISA in Elections
The FBI and CISA coordinate closely with federal,state, and local election partners and provide services and information to safeguard U.S. voting processes and maintain the resilience of U.S. elections. The FBI, alongside DOJ prosecutors, is responsible for investigating and prosecuting election crimes, foreign malign influence operations, and malicious cyber activity targeting election infrastructure and other U.S. democratic institutions. The FBI does not investigate, collect, or maintain information on U.S. persons solely for the purpose of monitoring activities protected by the First Amendment. CISA, as the Sector Risk Management Agency for Election Infrastructure, is the federal government lead for working with critical infrastructure owners and operators, including the election infrastructure community, to ensure the security and resilience of election infrastructure from physical and cyber threats.
Victim Reporting and Additional Information
We encourage the public to report information concerning suspicious or criminal activity, to include the distribution of knowingly false information regarding the time, place, or manner of elections designed to deprive individuals of their right to vote, to their local FBI field office (www.fbi.gov/contact-us/field).
For additional assistance to include common terms and best practices, such as media literacy, please visit the following websites:
Appendix A: Websites and Accounts Operated by Russian Malign Influence Actors
The following websites the U.S. Government either attributes to or assesses are highly likely to be operated by Russian malign influence actors. Websites denoted with an asterisk have previously publicly attributed to Russian malign influence actors by the FBI, Department of State, or Department of Treasury.
50statesoflie.com*
uschina.online*
washingtonpost.ltd*
50statesoflie.media*
uschina.press*
usareally.com*
acrosstheline.press*
warfareinsider.us*
welt.ltd*
artichoc.io*
waronfakes.com*
welt.ws*
bild.work*
washingtonpost.pm*
welt.media*
electionwatch.io*
delfi.top*
spiegel.work*
electionwatch.live*
afrinz.ru*
nd-aktuell.net*
faz.ltd*
africanstream.media*
nd-aktuell.pro*
forward.pw*
americanfront.info*
nd-aktuell.co*
fox-news.in*
vip-news.org*
obozrevatel.ltd*
grenzezank.com*
begemot.media*
milliyet.com.co*
holylandherald.com*
syncreticstudies.com*
albayan.me*
honeymoney.info*
eramedia.com*
gulfnews.ltd*
honeymoney.press*
fortruss.blogspot.com*
faz.agency*
infobrics.org*
geopolitica.ru*
sueddeutsche.ltd*
lemonde.ltd*
globalresearch.ca*
sueddeutsche.cc*
leparisien.ltd*
inforos.ru*
tagesspiegel.ltd*
levinaigre.net*
anticrisis.cc*
fraiesvolk.com*
lexomnium.com*
webkamerton.ru*
fraiepozition.store*
liesofwallstreet.com*
katehon.com*
fraiepozition.site*
liesofwallstreet.io*
journal-neo.org*
bild.bz*
meisterurian.io*
novaresistencia.org*
lefigaro.me*
mypride.press*
odnarodyna.org*
70-putin-freunde.de*
oneworld.press*
onmedia.io*
freikorps.press*
pravda-ua.com*
openrevolt.info*
jfriecorp.press*
rbk.media*
orientalreview.org*
sieben-fragen-putin.de*
rrn.media*
thered.stream*
tonline.life*
rrn.world*
ritmeurasia.org*
tonline.today*
shadowwatch.us*
rt.com*
t-onlinr.life*
spicyconspiracy.info*
ruptly.tv*
t-onlinr.live*
spicyconspiracy.io*
riafan.ru*
t-onlinr.today*
spiegel.agency*
fznc.world*
delfi.today*
sueddeutsche.co*
strategic-culture.org*
spiegel.fun*
tagesspiegel.co*
unitedworldint.com*
spiegel.today*
tribunalukraine.info*
tsargrad.tv*
winter-is-comming.de*
truthgate.us*
bild.llc*
reuters.cfd*
Ukrlm.info*
bild.ws*
reuters.cyou*
bild.vip*
repubblica.icu*
repubblica.world*
socialharmony.de*
manabalss.li*
musubalss.org*
spiegel.ink*
sueddeutsche.online*
dailymail.cam*
dailymail.cfd*
delfi.life*
repubblica.life*
spiegeli.life*
spiegeli.live*
spiegeli.today*
reuters.sbs*
blld.live*
itcb.life*
dekommnt.live*
ukcommunity.vip*
spiegelr.live*,
spiegelr.today*
spiegelr.life*
50StatesOfLie <X account>
t-onlinl.life*
foxnews.cx*
AcrossTheLine11 <X account>
t-onlinl.live*
inforos.ru*
alhiwar.cc
alhiwar.me
t-onlinl.today*
infosco.org*
bostontimes.org
sueddeutsche.life*
southfront.org
besuchszweck.org
sueddeutsche.today*
allons-y.social
brennende_frage <X account>
sueddeutsche.site*
brennendefrage.com
brennendefrage.cc
atlanta-observer.com
alternativereport.us
carsondispatch.com
atlantabeacon.org
candidat.news
centernewscentral.com
antifashist.com
candidat_news <X account>
centerpointbeacon.com
american-freedom.org
capitolpulse.org
civiccentury.org
civiccommentary.org
conservativecompass.org
conservativecontext.com
civiccorner.org
conservativecorridor.com
democracydive.com
civiccreed.com
conservativecourier.org
daybreakdigest.org
civiccurrent.com
cropmarketchronicles.cc
derrattenfanger.io
civiccurve.com
cropmarketchronicles.us
derrattenfanger.net
conservativecamp.org
dc-free-press.org
DragonflyTimes <X account>
conservativecatch.org
deintelligenz.com
epochpost.org
conservativechannel.org
deintelligenz.io
flagstaffpost.com
conservativecircuit.com
democracydepth.com
flyoverbeacon.com
derglaube.online
democracydrive.org
franceeteu.today
derleitstern.cc
derbayerischelowe.info
franceeteu <X account>
derleitstern.com
derglaube.com
freedomfacade.com
arbeitspause.org
freedomfixture.com
freedomforge.info
freedomfoundry.info
freemediaforum.info
gopguardian.com
governancegaze.com
grunehummel.com
GruneHummel <facebook Name>
hauynescherben.net
hauynescherben.press
hauynescherben <X account>
heartlandharbor.org
heartlandhaven.org
heartlandheadlines.net
heartland-inquirer.org
honestcitizens.org
houstonpost.org
il_corrispondente.com_ <instagram Name>
il-corrispondente.com
rybar <telegram Name>
corrispondente.io
interventionist.cc
interventionist.com
interventionist.us
Intrvntnst <X account>
kaputteampel.cc
kaputteampel.com
KaputteAmpel <X account>
kbsf-tv.com
lansingtribune.org
la-sante.info
laterrasse.io
laterrasse.online
leaderledger.net
lebelligerant.com
lebelligerant.io
lebelligerant <X account>
le-continent.com
lesfrontieres.media
lesfrontieres <X
southfront.press
lavirgule.news
lesifflet.cc
lesifflet.net
LexOmnium <X account>
libertylagoon.org
libertylantern.org
libertylaunch.org
libertylectern.org
libertypressnews.com
libertyvoice.info
lonestarcrier.com
madison-gazette.org
maplechronicles <telegram Name>
meriblood <telegram Name>
miastagebuch.com
nationalcrier.com
nationalmatters.org
nationalnarrative.org
nationnotebook.com
newscenterpress.org
news-front.su
strategic-culture.su
orientalreview.su
journal-neo.su
noticiasbravas.com
notrepays.today
observateurcontinental.Fr
omnam.life
oraclenews.org
partyperspective.com
patrioticpage.com
patrioticparade.com
patrioticpioneer.com
patrioticpulse.info
phoenixpatriot.org
policypaddock.com
policypassage.com
policypatch.com
policypath.org
policypeak.org
policyplatform.info
policyporch.org
politicalpioneer.com
politicalplot.org
politicalporch.com
politicostream.com
politnavigator.news
politnavigator <telegram Name>
politnavigator <X account>
politnavigator <youTube Name>
polskikompas.com
pulsepress.org
purplestatepost.com
raleigh-herald.com
Rattenfangernet <X account>
red-blue-tribune.com
redstategazette.com
redstatereport.net
republicrally.com
republicrange.com
republicregard.com
republicreview.net
republicripple.com
republicroot.com
republicroots.org
republicrundown.com
rightrealm.net
rightresonance.org
rightrevival.org
rightrundown.com
senatesight.com
signaldaily.org
silverstatesignal.org
southfronteng <telegram account>
southfroneng <X account>
SouthFrontEnThree <facebook>
statestage.org
thearizonaobserver.com
tribunetimes.org
unitytrend.com
ULM_Info <X account>
TruthGateOff <X account>
voice-of,europe.eu
ukraine-inc.info
vanguardviews.com
votervista.net
bild.asia
spiegel.pro
TEXASvsUSA <telegram Name>
topicdujour <telegram account>
dailymail.top
TEXASvsUSA <X account>
interventionist.io
SpConspiracy <X Name>
wanderfalke.net
facts.matter.me
faz.life
naebc.com
sueddeutsche.me
scopestory.com
rybar_force <X account>
rightreview.org
Appendix B: Websites Operated by Iranian Malign Influence Actors
The following websites the U.S. Government either attributes to or assesses are highly likely to be operated by Iranian malign influence actors.