How Russia targets the U.S. military

Politico reports: In the fall of 2013, Veterans Today, a fringe American news site that also offers former service members help finding jobs and paying medical bills, struck up a new partnership. It began posting content from New Eastern Outlook, a geopolitical journal published by the government-chartered Russian Academy of Sciences, and running headlines like “Ukraine’s Ku Klux Klan — NATO’s New Ally.” As the United States confronted Russian ally Bashar Assad for using chemical weapons against Syrian children this spring, the site trumpeted, “Proof: Turkey Did 2013 Sarin Attack and Did This One Too” and “Exclusive: Trump Apologized to Russia for Syria Attack.”

In recent years, intelligence experts say, Russia has dramatically increased its “active measures” — a form of political warfare that includes disinformation, propaganda and compromising leaders with bribes and blackmail — against the United States. Thus far, congressional committees, law enforcement investigations and press scrutiny have focused on Kremlin leader Vladimir Putin’s successful efforts to disrupt the American political process. But a review of the available evidence and the accounts of Kremlin watchers make clear that the Russian government is using the same playbook against other pillars of American society, foremost among them the military. Experts warn that effort, which has received far less attention, has the potential to hobble the ability of the armed forces to clearly assess Putin’s intentions and effectively counter future Russian aggression.

In addition to propaganda designed to influence service members and veterans, Russian state actors are friending service members on Facebook while posing as attractive young women to gather intelligence and targeting the Twitter accounts of Defense Department employees with highly customized “phishing” attacks. The same Russian military hacking group that breached the Democratic National Committee, “Fancy Bear,” was also responsible for publicly posting stolen Army data online while posing as supporters of the Islamic State in 2015, according to the findings of one cybersecurity firm. And the hacking group’s most common target for phishing attacks in the West has been military personnel, with service members’ spouses making up another prominent target demographic, according to another cybersecurity firm. [Continue reading…]

Print Friendly, PDF & Email
Facebooktwittermail