Russian Information Warfare Trend Analysis

Similar documents
The StratCom-Security Nexus

RUSSIAN CYBER STRATEGY AS PART OF FOREIGN POLICY

Conspiracist propaganda

The combination : an instrument in Russia s information war in Catalonia

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO

Countering Information War Lessons Learned from NATO and Partner Countries. Recommendations and Conclusions

Roundtable to Discuss Russian Involvement in Ukraine s Elections

Report. The Gulf Crisis: Demonising Qatar through Fabrication* Dr. Mohamed Erraji** 9 July 2017

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity

On Cyber-Enabled IWIO (Information Warfare and Influence Operations)

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

Current Challenges in the Euro-Atlantic Region with a Special Focus on Hybrid Aspects

Election Hacking: Russian Interference in the 2016 U.S. Presidential Election PRESENTER: JIM MILLER

Lies, Damned Lies and Russian Disinformation. The Russian Federation. Paul Goble. Executive Summary

Can You Spot the Deceptive Facebook Post?

Methods of Psychological Influence on Military Personnel and Civilians in Latvia. Dr.psych., OF-3 Andzela Rozcenkova

Madam Chairperson, Distinguished participants,

ENGLISH PR GRAM DIGSPES JURISPRUDENCE AND POLITICAL, ECONOMIC AND SOCIAL SCIENCES

Chapter 10: An Organizational Model for Pro-Family Activism

The Anti-Trump Institutional Coup and the Visible Operatives. James Petras. There are various types of coups: the seizure of executive power by

Panel: Norms, standards and good practices aimed at securing elections

Canada s NATO Mission: Realism and Recalibration. by Hugh Segal

MIND HACKING : INFORMATION WARFARE IN THE CYBER AGE

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS

CONVENTIONAL WARS: EMERGING PERSPECTIVE

Marcel H. Van Herpen. Putin's Propaganda Machine: Soft Power and Russian Foreign Policy

U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats

PROPAGANDA. Prepared by Thomas G. M. Associate Professor, Pompei College Aikala DK

CyOP: Cyber-Enhanced Influence Operations and Propaganda

Ohio State University

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management

Russian Disinformation War against Poland and Europe.

Den Haag October 2016

Case 1:19-cr ABJ Document 27 Filed 02/08/19 Page 1 of 9 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:17-cv ESH Document 36-1 Filed 12/08/17 Page 1 of 13 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

RUSSIA'S FOOTPRINT IN THE NORDIC-BALTIC INFORMATION ENVIRONMENT PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE

The symbiotic relationship between the media and terrorism

30.2 Stalinist Russia

The Prague Manual. Kremlin Watch Report This report was created with the financial support of the International Visegrad Fund.

Building America s public diplomacy through a reformed structure and additional resources

Countering Violent Extremism. Mohamed A.Younes Future For Advanced Research and Studies

Fake Polls as Fake News:

The Transnational Threats Project at CSIS, in cooperation with the Center on Global Counterterrorism Cooperation. 5 June 2008

U.S. Sen. Mark R. Warner Transcript March 1, 2018

Some Reasons Why International Terrorism Has Not Yet Become the Common Enemy of Mankind

Fake news on Twitter. Lisa Friedland, Kenny Joseph, Nir Grinberg, David Lazer Northeastern University

NATIONAL: FAKE NEWS THREAT TO MEDIA; EDITORIAL DECISIONS, OUTSIDE ACTORS AT FAULT

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS/WASHINGTON POST MAY OSAMA BIN LADEN SURVEY FINAL TOPLINE May 2, 2011 N=654

Towards Elections with Integrity

ROBOTROLLING ISSUE 2 ROBOTROLLING CENTRE OF EXCELLENCE CENTRE OF EXCELLENCE

Cyberspace clickskrieg represents a dramatic. The Internet and Psychological Operations ANGELA MARIA LUNGU. The Information Battlefield

West LA Democratic Club Victory Starts Today! A Report to State of California DNC Members

What do we mean by strategic communications and why do we need it?

Appendix 5 Deterrence as a security concept against ambiguous warfare

DURING WWII THE US AND THE SOVIET UNION HAD JOINED

Key steps for countering Russian propaganda. A toolkit for journalists

Asymmetric Warfare Within Hybrid Warfare. Dr Rod Thornton, King s College London

John Paul Tabakian, Ed.D. Political Science 5 Western Political Thought. Spring 2018 / Fall 2018 Power Point 6

The Fragility of Truth: Disinformation and Democracy in the Digital Age. Joseph E. Stiglitz Granada, Spain June 14th 2018

Resolved: United Nations peacekeepers should have the power to engage in offensive operations.

FREE RUSSIA. Plan of information and psychological operation

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

Conventional Deterrence: An Interview with John J. Mearsheimer

Preventing Conflict Today: Learning from the First World War

Russia s Disinformation Activities and Counter-Measures

California Politics: A Primer, 4 th Edition. Chapter 10

Command and Control in Peace Support Operations Model PAX - Approaching new Challenges in the Modeling of C2

CONSTITUTIONAL LAW MOOT Moot Problem

ELECTIONS AT RISK: GLOBAL THREATS/ LOCAL IMPACT

Soviet Subversion, Disinformation and Propaganda: How the West Fought Against it

Chapter 8: The Use of Force

Modern Terrorism and Counter-Terrorism Strategies

Security Implications of Russian Strategic Communication and Information Warfare in the Eastern Partnership Countries

Written Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016

BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY NATO STUDENT POLICY PAPER COMPETITION Oscar Vejen Lacoppidan

Milton Wolf Seminar 2015 Triumphs and Tragedies: Media and Global Events in 2014 Vienna, Austria, April 19 April 21, 2015

Tracking Russian Online Influence Operations and Possible Points of Disruption with Big Data Cross-Lingual Text Analysis

Modern warfare the battle for public opinion

DEMOCRATIC DEFENSE AGAINST DISINFORMATION

Lecture Five: The United States and Russia As Geopolitical Partners or Rivals

Poll on the Syrian Conflict and Media Trust

World War II. WORLD WAR II High School

PROBLEMS OF CREDIBLE STRATEGIC CONDITIONALITY IN DETERRENCE by Roger B. Myerson July 26, 2018

EDITION DW AKADEMIE #2018 MEDIA DEVELOPMENT. Media and information literacy. A practical guidebook for trainers

The Executive Branch 8/16/2009

Unit 7 - Personal Involvement

Internet Governance Forum Guadalajara, Mexico

World War II. WORLD WAR II High School

What Was the Cold War?

Strategy Research Project

Americans to blame too August 29, 2007

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

Foreign Intervention in Israel s Elections

Case 1:19-cr ABJ Document 27 Filed 02/08/19 Page 1 of 9 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

WHO SAID WHAT? The Security Challenges of Modern Disinformation ACADEMIC OUTREACH. Service canadien du renseignement de sécurité

Supporting a Candidate for Local Elections in B.C. 2018

Democracy in the Digital Era. the people s government

Transcription:

Joel Harding s blog https://toinformistoinfluence.com Joel Harding Russian Information Warfare Trend Analysis

IW at the Three Levels of Warfare Strategic (national resources) Strategic information warfare waged independently could cause an adversary to lose faith in his own data management systems, greatly increasing confusion and difficulty of controlling assets Operational (campaigns) On an operational level, interference with enemy data management systems could create damaging time delays in the enemy's ability to make and implement decisions Tactical (battles) On the tactical level, IW would be able to compliment the use of other systems to reduce danger to friendly forces and increase chances for success

Lexicon Excerpt Disinformation Misinformation Fake News Propaganda

Russian Information Warfare - Tools Propaganda, Disinformation, Fake News State Media RT, Sputnik, RIA Novosti Russian Troll Farm Russian Proxy Sites Useful Idiots, Faux Experts GRU units 26165 and 74455 Information Spetsnaz Russian Information Warfare is usually unethical, immoral, and only sometimes illegal.

Russian IW vs The West Propaganda, Disinformation, Fake News State Media RT, Sputnik, RIA Novosti Russian Troll Farm Russian Proxy Sites Useful Idiots, Faux Experts GRU units 26165 and 74455 Information Spetsnaz Broken Danger Danger News Media Danger GEC, USAGM (fmr BBG) Diplomats, Politicians Cyber Command, NSA Cyber Command US Citizens Not a One on One Conflict. This is asymmetric warfare on a grand scale using common tools in unexpected ways

Propaganda Propaganda is a core component of PSYOP Propaganda is the hammer to PSYOP s carpentry Propaganda information is not objective is used primarily to influence an audience and further an agenda often presents facts selectively encourages a particular synthesis or perception uses loaded language to produce an emotional rather than a rational response

Propaganda Propaganda can be generated and disseminated by Governments Political parties Activist groups Commercial firms The news media Propaganda Comes from the Latin verb propagare, to propagate, or spread Heavily used by mass political movements in the early 20 th century Was a neutral term until the mid-20 th century, when it became pejorative Draws on social psychology and the art of persuasion

Propaganda Principles of Propaganda Appeal to emotion, rather than logic Cast the appeal as we versus them Target groups on an individual level Emphasis on the appeal, not message sponsor Propaganda media Paintings Posters Cartoons Pamphlets Films Radio shows TV shows and commercials Dr. Seuss drew propaganda cartoons to support the war effort in World War II

White, Gray, and Black Propaganda White propaganda Correctly attributes information to the sponsor Example: Voice of America, Radio Free Europe Information provided is truthful, BUT may not necessarily tell the entire story Gray propaganda Not attributed to the actual sponsor (which is deliberately concealed) Information is attributed to an ostensible source deemed more credible to the target Examples: Articles in a newspaper written by an unnamed source Ideas disseminated by other governments, news media outlets, private groups, institutions, or individuals Black propaganda Information is falsely attributed, usually to a hostile source Subversive and provocative; meant to cause embarrassment or trigger a reaction Examples: Forged documents, false stories planted in social media Propaganda of the deed Actions undertaken in large measure to achieve a psychological effect on target audience(s) 1942 Doolittle raid on Tokyo 2011 Raid to kill Osama bin Laden Humanitarian assistance/disaster relief after a catastrophe Economic aid Cultural exchanges

Russian IW in Ukraine 1. Po zakonu The appearance of legality 2. Military capability demonstration 3. Little green men 4. Use of Proxies 5. Targeted, systematic disinformation 6. Electronic warfare 7. Propaganda by deed

Russian IW theorist Igor Panarin s theory of information warfare refers to attempts to influence public opinion in order to gain certain political benefits. That influence can be achieved by information manipulation, disinformation, fabrication of information, lobbying, blackmail, all with the aim of changing the decision-making processes of the adversary. As Panarin put it, the aims of that military strategy include a significant alteration of the direction of its internal or foreign policy and a replacement of the state s leadership with a regime loyal to Russia.

GRU units 26165 and 74455* Hacked email accounts Hacked into computer networks Implanted malware and stole documents Used fake personas to release thousands of stolen files Set up clandestine infrastructure to conduct their cyber operations Misattributed the source of stolen documents provided to Wikileaks and released through other channels Used online clandestine tradecraft to obfuscate links to Russia Sent spearphishing emails to members of the Clinton campaign Used a keylogger to capture keystrokes of DCCC employees Clandestinely exfiltrated stolen files from penetrated networks Published anti-clinton content on social media *Per the 31 JUL 2018 Netyksho et al indictment

Maria Butina The Russian operation that targeted our democratic institutions, and which continues to this day, is fundamentally different from Cold War schemes. Its main thrust isn t data collection, but rather an influence campaign called Active Measures in intelligence parlance designed to change people s behavior, and ultimately to sow discord and push divisions inside the United States. This can take the form of spreading fake news over Facebook to sway voters, as we saw during the 2016 election. It also involves manipulating U.S. political officials, influencers and decision-makers to push a more Russia-friendly political agenda. That s what Butina was attempting.

Russian IW 2014-2016 Firehose of Falsehoods, Dr. Christopher Paul. Cacaphony of bellicose, vicious, divisive clutter Truth was fleeting Facebook, Twitter, social media overwhelmed Existing societal divides exploited Few trusted sources in Crimea, Donbas, Russia Press not trusted

Russian IW 2016-2018 Whack-a-mole social media Ads scrubbed Facebook, Twitter scrub fake identities Fake accounts continue, sanitized Efforts at hiding improved Verification / corroboration possible Blind forwarding continues November 2018 Strategic pause Fewer fake articles, less troll presence, less volume, softer language

Government Counter Foreign Disinformation GEC focused on ISIS RFE/RL out of hide Russian effort Current Time ~ US Advisory Commission for Public Diplomacy Government No education on disinformation or cyber Rogue sites continue on.com and.us

US Private Counter Disinformation Efforts German Marshall Fund Hamilton 68 Universities Columbia Indiana University - Bloomington

Future Efforts To Counter Disinformation 1/2 Artificial Intelligence Identify and Counter Provide correct information to key nodes Education Disinformation, propaganda, fake news Cyber security, safety Fact check Lawfare Update FARA to include propaganda sites Seize unregistered propaganda domains

Future Efforts To Counter Disinformation 2/2 Issue fact sheets whenever possible first Do NOT fight with trolls they wallow in muck and like it