Category Archives: Cyber Issues

DNC hacking puts Obama in tough spot with Russia

The Hill reports: Pressure is growing on the White House to respond to Russia’s apparent hack of the Democratic National Committee (DNC), placing President Obama in a delicate political position.

Evidence has mounted that the Russian government was behind the theft of tens of thousands of damaging internal emails from the DNC, leading prominent lawmakers from both sides of aisle to call for some form of response.

The ranking members of the House and Senate Intelligence committees and the chairman and ranking member of the Senate Judiciary Committee have all issued calls for Obama to “seek justice” for the alleged attack.

But should Obama publicly point the finger at the Kremlin, it could expose covert intelligence capabilities and damage already touchy discussions over Russia’s behavior in Syria and Ukraine, experts say.

That dynamic reflects one the central challenges the White House faces in responding to cyberattacks. Without any international rules of engagement, officials must weigh a response to each attack individually.

The FBI has opened an investigation into the hack, but because of the risks, experts say, the public is unlikely to ever know the results, even if it is able to prove Russia’s guilt beyond a shadow of a doubt.

Obama has a slate of possible responses at his disposal, but each carries its own set of problems.

“They are really in between a rock and a hard place. Everything they do has a downside,” said Herb Lin, a senior research scholar who studies cyber policy and security at Stanford. [Continue reading…]

Facebooktwittermail

Obama prepares to boost U.S. cyberwarfare capabilities

Reuters reports: The Obama administration is preparing to elevate the stature of the Pentagon’s Cyber Command, signaling more emphasis on developing cyber weapons to deter attacks, punish intruders into U.S. networks and tackle adversaries such as Islamic State, current and former officials told Reuters.

Under the plan being considered at the White House, the officials said, U.S. Cyber Command would become what the military calls a “unified command” equal to combat branches of the military such as the Central and Pacific Commands.

Cyber Command would be separated from the National Security Agency, a spy agency responsible for electronic eavesdropping, the officials said. That would give Cyber Command leaders a larger voice in arguing for the use of both offensive and defensive cyber tools in future conflicts. [Continue reading…]

Facebooktwittermail

For Putin, disinformation is power

Arkady Ostrovsky writes: Fifteen years ago, a few months into his presidency, Vladimir V. Putin told Larry King on CNN that his previous job as a K.G.B. officer had been like that of a journalist. “They have the same purpose of gathering information, synthesizing it and presenting it for the consumption of decision makers,” he said. Since then, he has excelled at using the media to consolidate power inside Russia and, increasingly, to wage an information war against the West.

So the apparent hacking by Russian security services of the Democratic National Committee emails, followed by their publication by WikiLeaks, should come as no great surprise to Americans. It is only the latest example of how Mr. Putin uses information as a weapon. And the Kremlin has cultivated ties with WikiLeaks for years.

It has also used disinformation in its annexation of Crimea and in its war in Ukraine, launched cyberattacks on Finland and the Baltic States, and planted hoax stories in Germany to embarrass Angela Merkel. During the Cold War, the Kremlin interfered in American politics for decades. The K.G.B.’s so-called active measures — subversion, media manipulations, forgery and the financing of some “peace” organizations — lay at the heart of Soviet intelligence.

Then as now, Russia exploited real grievances in the West — discontent with the war in Vietnam and racial tensions in the 1960s; anxiety and fear of Muslim immigrants today. Nevertheless, Mr. Putin’s support of the likes of Donald Trump in America, Brexiters in Britain or the right-wing Marine Le Pen in France does not mean they are his creations. [Continue reading…]

Facebooktwittermail

How hackers could destroy election day

Shane Harris writes: Stealing and leaking emails from the Democratic National Committee could be just the start. Hacking the presidential election itself could be next, a bipartisan group of former intelligence and security officials recently warned. Whoever was behind the DNC hack also could target voting machines and the systems for tabulating votes, which are dangerously insecure.

“Election officials at every level of government should take this lesson to heart: our electoral process could be a target for reckless foreign governments and terrorist groups,” wrote 31 members of the Aspen Institute Homeland Security Group, which includes a former director of the Central Intelligence Agency and a former secretary of Homeland Security.

That echoes warnings computer security experts have been sounding for more than a decade: that the system for casting and counting votes in this country is also ripe for mischief. [Continue reading…]

Facebooktwittermail

FBI said to have taken months to warn Democrats of suspected Russian role in hack

Reuters reports: The FBI did not tell the Democratic National Committee that U.S officials suspected it was the target of a Russian government-backed cyber attack when agents first contacted the party last fall, three people with knowledge of the discussions told Reuters.

And in months of follow-up conversations about the DNC’s network security, the FBI did not warn party officials that the attack was being investigated as Russian espionage, the sources said.

The lack of full disclosure by the FBI prevented DNC staffers from taking steps that could have reduced the number of confidential emails and documents stolen, one of the sources said. Instead, Russian hackers whom security experts believe are affiliated with the Russian government continued to have access to Democratic Party computers for months during a crucial phase in the U.S. presidential campaign, the source said.

As late as June, hackers had access to DNC systems and the network used by the Democratic Congressional Campaign Committee, a group that raises money for Democratic candidates and shares an office with the DNC in Washington, people with knowledge of the cases have said. [Continue reading…]

Facebooktwittermail

Clinton campaign said to be hacked, apparently by Russians

The New York Times reports: Computer systems used by Hillary Clinton’s presidential campaign were hacked in an attack that appears to have come from Russia’s intelligence services, a federal law enforcement official said on Friday.

The apparent breach, coming after the disclosure last month that the Democratic National Committee’s computer system had been compromised, escalates an international episode in which Clinton campaign officials have suggested that Russia might be trying to sway the outcome of the election.

Mrs. Clinton’s campaign said in a statement that intruders had gained access to an analytics program used by the campaign and maintained by the national committee, but it said that it did not believe that the campaign’s own internal computer systems had been compromised.

The Democratic Congressional Campaign Committee, the fund-raising arm for House Democrats, also said on Friday that its systems had been hacked. Together, the databases of the national committee and the House organization contain some of the party’s most sensitive communications and voter and financial data.

Meredith Kelly, a spokeswoman for the congressional committee, said that after it discovered the breach, “we immediately took action and engaged with CrowdStrike, a leading forensic investigator, to assist us in addressing this incident.”

The attack on the congressional committee’s system appears to have come from an entity known as “Fancy Bear,” which is connected to the G.R.U., the Russian military intelligence service, according to an official involved in the forensic investigation. [Continue reading…]

Reuters reports: Several U.S. officials said the Obama administration has avoided publicly attributing the attacks to Russia as that might undermine Secretary of State John Kerry’s effort to win Russian cooperation in the war on Islamic State in Syria.

The officials said the administration fears Russian President Vladimir Putin might respond to a public move by escalating cyber attacks on U.S. targets, increasing military harassment of U.S. and allied aircraft and warships in the Baltic and Black Seas, and making more aggressive moves in Eastern Europe.

Some officials question the approach, arguing that responding more forcefully to Russia would be more effective than remaining silent.

The Obama administration announced in an April 2015 executive order that it could apply economic sanctions in response to cyber attacks. [Continue reading…]

Facebooktwittermail

How vulnerable to hacking is the U.S. election cyber infrastructure?

By Richard Forno, University of Maryland, Baltimore County

Following the hack of Democratic National Committee emails and reports of a new cyberattack against the Democratic Congressional Campaign Committee, worries abound that foreign nations may be clandestinely involved in the 2016 American presidential campaign. Allegations swirl that Russia, under the direction of President Vladimir Putin, is secretly working to undermine the U.S. Democratic Party. The apparent logic is that a Donald Trump presidency would result in more pro-Russian policies. At the moment, the FBI is investigating, but no U.S. government agency has yet made a formal accusation.

The Republican nominee added unprecedented fuel to the fire by encouraging Russia to “find” and release Hillary Clinton’s missing emails from her time as secretary of state. Trump’s comments drew sharp rebuke from the media and politicians on all sides. Some suggested that by soliciting a foreign power to intervene in domestic politics, his musings bordered on criminality or treason. Trump backtracked, saying his comments were “sarcastic,” implying they’re not to be taken seriously.

Of course, the desire to interfere with another country’s internal political processes is nothing new. Global powers routinely monitor their adversaries and, when deemed necessary, will try to clandestinely undermine or influence foreign domestic politics to their own benefit. For example, the Soviet Union’s foreign intelligence service engaged in so-called “active measures” designed to influence Western opinion. Among other efforts, it spread conspiracy theories about government officials and fabricated documents intended to exploit the social tensions of the 1960s. Similarly, U.S. intelligence services have conducted their own secret activities against foreign political systems – perhaps most notably its repeated attempts to help overthrow pro-communist Fidel Castro in Cuba.

Although the Cold War is over, intelligence services around the world continue to monitor other countries’ domestic political situations. Today’s “influence operations” are generally subtle and strategic. Intelligence services clandestinely try to sway the “hearts and minds” of the target country’s population toward a certain political outcome.

What has changed, however, is the ability of individuals, governments, militaries and criminal or terrorist organizations to use internet-based tools – commonly called cyberweapons – not only to gather information but also to generate influence within a target group.

So what are some of the technical vulnerabilities faced by nations during political elections, and what’s really at stake when foreign powers meddle in domestic political processes?

Continue reading

Facebooktwittermail

How the U.S. can retaliate if Kremlin hackers tried to influence the presidential election

Vice News reports: The US intelligence community and private cybersecurity firms say Russia almost certainly hacked the Democratic National Committee and leaked documents that enraged Bernie Sanders supporters, embarrassed Democratic donors and senior party officials, and led to the resignation of DNC chairwoman Debbie Wasserman Schultz.

The US government hasn’t publicly accused Russia of responsibility for the leak, but President Barack Obama noted on Tuesday that Russia has a history of interfering in other countries’ elections.

Now the question is whether the US government is going to do something about it.

If confirmed, Kremlin responsibility for the DNC hack and leak would mark the first time a foreign government has interfered in a US election on this grand a scale.

“If Russian involvement is true, it shows how far they will go to get involved in our internal affairs,” said former US Ambassador to Russia Michael McFaul. “That’s something new. I don’t think anything remotely close to that happened during the Cold War.”

“We all do espionage,” he said, “but it’s one thing to practice intelligence gathering, and another to use those means to affect an electoral outcome.”

McFaul says all the evidence points to Russia deliberately seeking to interfere in a US election on behalf of Donald Trump, a candidate it believes would be more friendly to its interests. [Continue reading…]

Facebooktwittermail

By November, Russian hackers could target voting machines

Bruce Schneier writes: Russia was behind the hacks into the Democratic National Committee’s computer network that led to the release of thousands of internal emails just before the party’s convention began, U.S. intelligence agencies have reportedly concluded.

The FBI is investigating. WikiLeaks promises there is more data to come. The political nature of this cyberattack means that Democrats and Republicans are trying to spin this as much as possible. Even so, we have to accept that someone is attacking our nation’s computer systems in an apparent attempt to influence a presidential election. This kind of cyberattack targets the very core of our democratic process. And it points to the possibility of an even worse problem in November — that our election systems and our voting machines could be vulnerable to a similar attack.

If the intelligence community has indeed ascertained that Russia is to blame, our government needs to decide what to do in response. This is difficult because the attacks are politically partisan, but it is essential. If foreign governments learn that they can influence our elections with impunity, this opens the door for future manipulations, both document thefts and dumps like this one that we see and more subtle manipulations that we don’t see.

Retaliation is politically fraught and could have serious consequences, but this is an attack against our democracy. We need to confront Russian President Vladimir Putin in some way — politically, economically or in cyberspace — and make it clear that we will not tolerate this kind of interference by any government. Regardless of your political leanings this time, there’s no guarantee the next country that tries to manipulate our elections will share your preferred candidates. [Continue reading…]

Facebooktwittermail

Russian cyberattacks likely to increase if they continue to provoke little U.S. response

Defense One reports: In 2015, there were over one million cyber attacks on individuals and companies every day — and that is why even the strongest U.S. response to the theft of the Democratic National Committee emails will do little to deter future state-sponsored attacks, cybersecurity experts say.

The sheer volume and increasing sophistication of network attacks provide plausible deniability to state-sponsored groups, like the APT 28 and APT 29 thought to be behind the DNC hack, says Christopher Porter, of cybersecurity company FireEye.

“One of the key factors that makes these Russian operations doable is that sophisticated criminal groups have APT-like capabilities and go after similar targets,” said Porter, whose company first documented APT 29’s ties to the Kremlin in 2014.“The best criminals use some of the same tools that lower-end states might use.”

Recognizing the valuable cover this provides, the “Russian government has been intentionally blurring the lines between cyber activists, criminals and state-paid hackers,” said Jarno Limnell, vice president for cybersecurity at Insta Group Oy.

This makes it hard to conclusively attribute an attack to a particular government, and all but impossible to respond firmly. So Western countries have thus far remained “fairly quiet” in the face of various Russian provocations, and that has only emboldened Moscow, Limnell said. [Continue reading…]

Facebooktwittermail

FBI probes hacking of another Democratic Party group

Reuters reports: The FBI is investigating a cyber attack against another U.S. Democratic Party group, which may be related to an earlier hack against the Democratic National Committee, four people familiar with the matter told Reuters.

The previously unreported incident at the Democratic Congressional Campaign Committee, or DCCC, and its potential ties to Russian hackers are likely to heighten accusations, so far unproven, that Moscow is trying to meddle in the U.S. presidential election campaign to help Republican nominee Donald Trump.

The Kremlin denied involvement in the DCCC cyber-attack. Hacking of the party’s emails caused discord among Democrats at the party’s convention in Philadelphia to nominate Hillary Clinton as its presidential candidate.

The newly disclosed breach at the DCCC may have been intended to gather information about donors, rather than to steal money, the sources said on Thursday.

It was not clear what data was exposed, although donors typically submit a variety of personal information including names, email addresses and credit card details when making a contribution. It was also unclear if stolen information was used to hack into other systems.

The DCCC raises money for Democrats running for seats in the U.S. House of Representatives. The intrusion at the group could have begun as recently as June, two of the sources told Reuters. [Continue reading…]

Facebooktwittermail

Russia’s motives for hacking the DNC remain unclear

The Washington Post reports: The possibility that Russia is behind an information warfare operation to interfere in the U.S. election has sparked concern among administration officials, but it also generated skepticism that there is a Kremlin master plan to install Donald Trump in the White House, as some political operatives are now alleging.

Intelligence officials, who spoke on the condition of anonymity to discuss an issue under investigation, said there is little doubt that agents of the Russian government hacked the Democratic National Committee, and the White House was informed months ago of Moscow’s culpability.

What is at issue now is whether Russian officials directed the leak of DNC material to the anti-secrecy group WikiLeaks — a possibility that burst to the fore on the eve of the Democratic National Convention with the release of 20,000 DNC emails, many of them deeply embarrassing for party leaders.

The intelligence community, the officials said, has not reached a conclusion about who passed the emails to WikiLeaks. [Continue reading…]

Facebooktwittermail

Trump’s appeal to Russia to hack Clinton’s email, ‘tantamount to treason’ say critics

Politico reports: Donald Trump’s call on Russia to hack Hillary Clinton’s emails has shocked, flabbergasted and appalled lawmakers and national security experts across the political spectrum, with one saying it was “tantamount to treason.”

Few would argue Wednesday that what the Republican presidential nominee said will directly cause Russia to conduct more cyber-espionage against the U.S. than it already is doing. But several described Trump’s statements as dangerous for America’s global standing. Some echoed the Clinton campaign in calling the comments a threat to national security.

“It’s just one more example of the reckless and dangerous comments that Donald Trump makes that compromises American foreign policy objectives,” said Sen. Ben Cardin of Maryland, the ranking Democrat on the Senate Foreign Relations Committee.

Leon Panetta, a former CIA director, told CNN’s Christiane Amanpour that Trump’s comments were “beyond the pale” because he was “in fact asking the Russians to engage in American politics.” Later during a panel at the University of Pennsylvania, Panetta ramped up his rebuke, calling Trump’s remarks a “threat to our national security.”

An aide to House Speaker Paul Ryan, the Wisconsin Republican who has endorsed Trump, added, meanwhile, that “Russia is a global menace led by a devious thug” and that it should stay out of the U.S. election.

“The United States should not tolerate Russian meddling in November’s election,” said House Foreign Affairs Committee Chairman Ed Royce (R-Calif.). “Period.”

Philip Reiner, a former National Security Council official in the Obama administration, called Trump a “scumbag animal.”

“Hacking email is a criminal activity. And he’s asked a foreign government — a murderous, repressive regime — to attack not just one of our citizens but the Democratic presidential candidate? Of course it’s a national security threat,” he added.

And William Inboden, who served on the NSC during the George W. Bush administration, said Trump’s comments were “tantamount to treason.” [Continue reading…]

Facebooktwittermail

Russia’s intelligence services have a long history of fooling Americans

Michael Weiss (alluding to John le Carré’s depiction of the KGB) writes: If Moscow Centre is indeed behind this bit of cyber skulduggery [the DNC hack], then it represents the boldest intrusion ever by a past and present Cold War adversary into America’s political decision-making.

Indeed, the style and purpose of this intrusion bears an uncanny resemblance to old Cold War tradecraft.

An active measure is a time-honored KGB tactic for waging informational and psychological warfare designed, as retired KGB General Oleg Kalugin once defined it, “to drive wedges in the Western community alliances of all sorts, particularly NATO, to sow discord among allies, to weaken the United States in the eyes of the people in Europe, Asia, Africa, Latin America, and thus to prepare ground in case the war really occurs.”

The most common subcategory of active measures is dezinformatsiya, or disinformation: feverish if believable lies cooked up by Moscow Centre and planted in friendly media outlets to make democratic nations look sinister.

As my colleague Peter Pomeranzev and I discovered in researching our report on the Kremlin’s weaponization of money, culture, and information, some of the most famous conspiracy theories to bombinate in backrooms, basements, street corners, college dorms were actually whole-cloth inventions of the Cheka.

For instance, a story suggesting that Jimmy Carter had a “Secret Plan to Put Black Africans and Black Americans at Odds”; that the United States used chemical weapons in the Korean War; that AIDS was an invention of the CIA; that the Jonestown massacre was by U.S. intelligence; that the United States tried to kill Pope John Paul II; that Barry Goldwater and the John Birch Society were in cahoots to mount a coup d’état in Washington, D.C.

Many in 1963 doubted that Lee Harvey Oswald acted alone in murdering John F. Kennedy; but only a precious few ever saw their paranoid Grassy Knoll explanation transformed into a Hollywood blockbuster. American researcher Max Holland found that the KGB fabricated letter that got planted in the Italian newspaper Paese Sera was the first to allege that one of the suspects for the Kennedy assassination, Clay Shaw, a New Orleans businessman, was actually an operative of Langley. The New Orleans district attorney, Jim Garrison, got hold of a copy of that letter and while he never cited it in court, his film version Kevin Costner most certainly did in the paranoid Oliver Stone movie JFK.

Vasili Mitrokhin, a retired KGB archivist who defected to the West and smuggled out six enormous cases of Soviet foreign intelligence files, later recorded that the “KGB could fairly claim that far more Americans believed some version of its own conspiracy theory of the Kennedy assassination, involving a right-wing plot and the U.S. intelligence community, than still accept the main findings of the Warren Commission.” [Continue reading…]

Facebooktwittermail

Spy agency consensus grows that Russia hacked DNC

The New York Times reports: American intelligence agencies have told the White House they now have “high confidence” that the Russian government was behind the theft of emails and documents from the Democratic National Committee, according to federal officials who have been briefed on the evidence.

But intelligence officials have cautioned that they are uncertain whether the electronic break-in at the committee’s computer systems was intended as fairly routine cyberespionage — of the kind the United States also conducts around the world — or as part of an effort to manipulate the 2016 presidential election.

The emails were released by WikiLeaks, whose founder, Julian Assange, has made it clear that he hoped to harm Hillary Clinton’s chances of winning the presidency. It is unclear how the documents made their way to the group. But a large sampling was published before the WikiLeaks release by several news organizations and someone who called himself “Guccifer 2.0,” who investigators now believe was an agent of the G.R.U., Russia’s military intelligence service.

The assessment by the intelligence community of Russian involvement in the D.N.C. hacking, which largely echoes the findings of private cybersecurity firms that have examined the electronic fingerprints left by the intruders, leaves President Obama and his national security aides with a difficult diplomatic and political decision: whether to publicly accuse the government of President Vladimir V. Putin of engineering the hacking. [Continue reading…]

Facebooktwittermail

DNC hack rattles U.S. effort to rein in Russia on Syria

Politico reports: Allegations that Russia is trying to hack the U.S. presidential election are giving ammunition to critics of President Barack Obama’s struggling effort to bring peace to Syria — a case of bruising campaign politics rattling delicate foreign policy.

In recent weeks, Secretary of State John Kerry has been pushing a proposal that reportedly allows for U.S. intelligence and military cooperation with Russia on airstrikes that target terrorist groups in Syria, such as the Al Qaeda-affiliated Jabhat al-Nusra or the Islamic State. The Russians, in return, would be expected to sideline Syrian President Bashar Assad’s air units, which have been blamed for numerous attacks on civilians in the Arab state.

The overall goal is to reduce the killing of civilians and somehow pave a path for a peace settlement in Syria, where hundreds of thousands of people have died since March 2011, a major stain on Obama’s foreign policy legacy.

But the U.S. plan has already drawn criticism inside and outside government ranks. Some naysayers argue it is a slippery slope of a sellout to Russia. Others say that while working with Russia is not a bad idea, America’s unwillingness to use military force against Assad has left the U.S. with little leverage.

Now, claims that Russian-linked hackers were behind the release of thousands of Democratic National Committee emails give skeptics a new reason to urge caution. The hacking is all the more sensational because it appears to aid Republican presidential nominee Donald Trump, who has spoken kindly of Russian President Vladimir Putin and whom the Kremlin’s media apparatus clearly favors in the race against Democrat Hillary Clinton. [Continue reading…]

Facebooktwittermail

All signs point to Russia being behind the DNC hack

Thomas Rid, Professor in Security Studies at King’s College, London, writes: In the wee hours of June 14, the Washington Post revealed that “Russian government hackers” had penetrated the computer network of the Democratic National Committee. Foreign spies, the Post claimed, had gained access to the DNC’s entire database of opposition research on the presumptive Republican nominee, Donald Trump, just weeks before the Republican Convention. Hillary Clinton said the attack was “troubling.”

It began ominously. Nearly two months earlier, in April, the Democrats had noticed that something was wrong in their networks. Then, in early May, the DNC called in CrowdStrike, a security firm that specializes in countering advanced network threats. After deploying their tools on the DNC’s machines, and after about two hours of work, CrowdStrike found “two sophisticated adversaries” on the Committee’s network. The two groups were well-known in the security industry as “APT 28” and “APT 29.” APT stands for Advanced Persistent Threat — usually jargon for spies.

CrowdStrike linked both groups to “the Russian government’s powerful and highly capable intelligence services.” APT 29, suspected to be the FSB, had been on the DNC’s network since at least summer 2015. APT 28, identified as Russia’s military intelligence agency GRU, had breached the Democrats only in April 2016, and probably tipped off the investigation. CrowdStrike found no evidence of collaboration between the two intelligence agencies inside the DNC’s networks, “or even an awareness of one by the other,” the firm wrote.

This was big. Democratic political operatives suspected that not one but two teams of Putin’s spies were trying to help Trump and harm Clinton. The Trump campaign, after all, was getting friendly with Russia. The Democrats decided to go public.

The DNC knew that this wild claim would have to be backed up by solid evidence. A Post story wouldn’t provide enough detail, so CrowdStrike had prepared a technical report to go online later that morning. The security firm carefully outlined some of the allegedly “superb” tradecraft of both intrusions: the Russian software implants were stealthy, they could sense locally-installed virus scanners and other defenses, the tools were customizable through encrypted configuration files, they were persistent, and the intruders used an elaborate command-and-control infrastructure. So the security firm claimed to have outed two intelligence operations.

The Russian spies got their hands on a large number of files from inside and beyond the Democratic National Committee. APT 29 — the suspected FSB-controlled group — had protracted access to the DNC’s email messages, chats, attachments, and more. Russian groups have also targeted Clinton’s wider campaign organisation at least since October 2015. Guccifer 2.0, in an email to The Smoking Gun, even claimed to have “some secret documents from Hillary’s PC she worked with as the Secretary of State.” It is unclear if this assertion is accurate, and indeed it is unclear if all leaked documents are actually sourced from the DNC breach. About three weeks later, on July 5, the FBI’s James Comey assessed that it was “possible that hostile actors gained access to Secretary Clinton’s personal email account.” The DNC intruders are likely to retain or regain some of this access. Moreover, the Guccifer 2.0 account has now been established as venue to distribute leaked documents. More activity, if not escalation, is to be expected.

Second, stolen documents leaked in an influence operation are not fully trustworthy. Deception operations are designed to deceive. The metadata show that the Russian operators apparently edited some documents, and in some cases created new documents after the intruders were already expunged from the DNC network on June 11. A file called donors.xls, for instance, was created more than a day after the story came out, on June 15, most likely by copy-pasting an existing list into a clean document.

Although so far the actual content of the leaked documents appears not to have been tampered with, manipulation would fit an established pattern of operational behaviour in other contexts, such as troll farms or planting fake media stories. Subtle (or not so subtle) manipulation of content may be in the interest of the adversary in the future. Documents that were leaked by or through an intelligence operation should be handled with great care, and journalists should not simply treat them as reliable sources.

Third, the DNC operation is unlikely to remain an exception. The political influencing as well as the deception worked, at least partly. The DNC’s ability to use its opposition research in surprise against Trump has been blunted, and some media outlets lampooned Clinton — not a bad outcome for an operation with little risk or cost for the perpetrators.

Another takeaway: the deception does not have to be executed with perfection; it is sufficient simply to spread doubt. High journalistic standards, paradoxically, work in GRU’s favour, as stories come with the Kremlin’s official denials casting doubt as well as pundits second-guessing even solid forensic evidence. If other intelligence agencies also assess that this operation was a success, even if only a moderate one, then more such false flag influence operations are likely in future elections, especially in Europe.

Democracies, finally, have a double disadvantage. General election campaigns and their ad-hoc organisations offer a soft, juicy target: improvised and badly secured networks, highly combustible content, all combined with a reluctance on the part of law enforcement agencies and private sector companies to wade into what could easily become a high-stakes political mess. [Continue reading…]

While Russia develops its evolving military doctrine, known as New Generation Warfare, it is able to exploit a panoply of useful idiots (most of whom see themselves as stalwart enemies of The Establishment) — a network much more extensive than the Soviets ever had at their disposal.

The prospect of being able to steer the grandest useful idiot of all — Donald Trump — into the Oval Office has presented what appears to be an irresistible opportunity.

Facebooktwittermail

The U.S. could have destroyed Iran’s entire infrastructure without dropping a single bomb

Tech Insider reports: The United States had a top-secret operation that gave it the ability to shut down much of Iran’s infrastructure ahead of a full-scale war, without a single bomb being dropped.

The incredible insight into a highly-classified cyber operation called Nitro Zeus was first exposed in the film “Zero Days” and later corroborated by The New York Times, which interviewed intelligence and military officials who were involved.

The film, directed by Alex Gibney, premieres on Friday.

“We spent hundreds of millions, maybe billions on it,” an anonymous National Security Agency source says in the film. “We were inside, waiting, watching. Ready to disrupt, degrade, and destroy those systems with cyber attacks. In comparison, Stuxnet was a back alley operation. [Nitro Zeus] was the plan for a full scale cyber war with no attribution.”

The source, whose face and voice are concealed throughout the film, is later revealed to be an actor reciting lines from testimony offered to Director Alex Gibney by CIA and NSA employees.

The focus of the “Zero Days” film is on Stuxnet — the world’s first cyber weapon — that was used against Iran’s nuclear facilities. But in researching for the film, Gibney found that malicious software was just one small piece of a much larger puzzle. [Continue reading…]

 

Facebooktwittermail