RUSSIAN CYBER STRATEGY AS PART OF FOREIGN POLICY

Similar documents
Russian Information Warfare Trend Analysis

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

The StratCom-Security Nexus

U.S. Sen. Mark R. Warner Transcript March 1, 2018

Asymmetric Warfare Within Hybrid Warfare. Dr Rod Thornton, King s College London

Can Our Election Systems be Trusted?

Ethics in the age of Informatics, Big Data and AI

Can You Spot the Deceptive Facebook Post?

Russian Disinformation War against Poland and Europe.

The combination : an instrument in Russia s information war in Catalonia

Conventional Deterrence: An Interview with John J. Mearsheimer

On Cyber-Enabled IWIO (Information Warfare and Influence Operations)

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity

Case 1:17-cv ESH Document 36-1 Filed 12/08/17 Page 1 of 13 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

RUSSIAN INFORMATION AND PROPAGANDA WAR: SOME METHODS AND FORMS TO COUNTERACT AUTHOR: DR.VOLODYMYR OGRYSKO

Countering Information War Lessons Learned from NATO and Partner Countries. Recommendations and Conclusions

Conspiracist propaganda

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

The Information Revolution and Soft Power

EXCLUSIVE POLLING ON LATEST AMERICAN ATTITUDES TOWARD RUSSIA, VLADIMIR PUTIN & PRESIDENT TRUMP:

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

Introduction to the Cold War

Panel: Norms, standards and good practices aimed at securing elections

44 th. Vienna Seminar WAR AND PEACE IN A DIGITAL AGE

Student Handout: Unit 3 Lesson 3. The Cold War

LEBOHANG MATSOSO TOPIC: BOOK REVIEW OF LAW AND WAR

RUSSIA, UKRAINE AND THE WEST: A NEW 9/11 FOR THE UNITED STATES

Election Hacking: Russian Interference in the 2016 U.S. Presidential Election PRESENTER: JIM MILLER

MIND HACKING : INFORMATION WARFARE IN THE CYBER AGE

200 Days of Donald Trump

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS

COLD WAR ORIGINS. U.S vs. U.S.S.R. Democ./Cap vs Comm.

THE STRANGE PUTIN- KISSINGER FRIENDSHIP

Solutions to the digital trade imbalance

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

Policy Recommendations and Observations KONRAD-ADENAUER-STIFTUNG REGIONAL PROGRAM POLITICAL DIALOGUE SOUTH CAUCASUS

FREE RUSSIA. Plan of information and psychological operation

The Americans (Survey)

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

This Week in Geopolitics

CONSTITUTIONAL LAW MOOT Moot Problem

FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE

Course Descriptions Political Science

The Fragility of Truth: Disinformation and Democracy in the Digital Age. Joseph E. Stiglitz Granada, Spain June 14th 2018

To understand how USA used financial aid to fight Communism in post-war Europe (Marshall Plan) Cold War develops. Aim:

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND?

Security Implications of Russian Strategic Communication and Information Warfare in the Eastern Partnership Countries

USA Update 2018 America in the Age of Trump. Dr. Markus Hünemörder, LMU München you can download this presentation at

Lies, Damned Lies and Russian Disinformation. The Russian Federation. Paul Goble. Executive Summary

THE CHALLENGE OF THE GRAY ZONE. Presentation to the Strategic Multilayer Assessment

Den Haag October 2016

Current Challenges in the Euro-Atlantic Region with a Special Focus on Hybrid Aspects

EU Global Strategy: Empty Wishes, No Real Plan

Global Affairs (GLA) Global Affairs (GLA) Courses. Global Affairs (GLA)

Analysis of the Draft Defence Strategy of the Slovak Republic 2017


Marist College Institute for Public Opinion 3399 North Road, Poughkeepsie, NY Phone Fax

CALL FOR ARTICLES THE CARIBBEAN SECURITY AND STRATEGY CONFERENCE. and

Required Reading for this Unit: Geopolitics. The Nation State. What is Geopolitics?

Ronald Reagan Presidential Foundation & Institute National Defense Survey

WORLD HISTORY WORLD WAR II

NATO and the United States

L9. Electronic Voting

Roundtable to Discuss Russian Involvement in Ukraine s Elections

What do we mean by strategic communications and why do we need it?

Relief Situation of Foreign Economic Relations and Geopolitical Prospects of Azerbaijan

Revising NATO s nuclear deterrence posture: prospects for change

Canada s NATO Mission: Realism and Recalibration. by Hugh Segal

Statement Prepared for the U.S. Senate Committee on Armed Services Subcommittee On Cybersecurity

The Anti-Trump Institutional Coup and the Visible Operatives. James Petras. There are various types of coups: the seizure of executive power by

NATO s tactical nuclear headache

Closed for Repairs? Rebuilding the Transatlantic Bridge. by Richard Cohen

Geopolitical Futures in the Press February

Something new under the Rising Sun: expanding Australia Japan defence cooperation by Hayley Channer, Andrew Davies and Peter Jennings

Fear, Patriotism, Secrets, Propaganda, Control

INFORMATION SERIES Issue No. 427 February 7, 2018

Latvia struggles with restive Russian minority amid regional tensions

from The Four Freedoms Speech

Obama vs. McCain on Peacekeeping By: Josh Rovenger. The end of World War II signified a transition from one era in international

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

National Security Policy. National Security Policy. Begs four questions: safeguarding America s national interests from external and internal threats

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

ROBOTROLLING ISSUE 2 ROBOTROLLING CENTRE OF EXCELLENCE CENTRE OF EXCELLENCE

Security Union and the digital sphere: unpacking securitization processes

Appendix 5 Deterrence as a security concept against ambiguous warfare

INTRODUCTION BACKGROUND. Chapter One

From Straw Polls to Scientific Sampling: The Evolution of Opinion Polling

FRANCE. Geneva Conference 1954

Preventing Conflict Today: Learning from the First World War

Conference RUSSIA S INFLUENCE STRATEGY IN EUROPE: MOSCOW AND EUROPEAN POPULIST PARTIES OF THE FAR-RIGHT AND FAR-LEFT

81st INTER-PARLIAMENTARY MEETING TRANSATLANTIC LEGISLATORS DIALOGUE. Washington D.C., 5 December Joint Statement

Americans and Russians Agree on Priorities for Syria, Differ on Urgency of North Korea

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management

PUBLIC SURVEY 2015 Report Presentation

The Internet and the Tragedy of the Commons

4 Critical Trends in Aerospace, Defense & Security for 2014 and Beyond

Countering Color Revolutions

Why? 21 Unanswered Questions That They Don t Want You To Look Into

Transcription:

1 RUSSIAN CYBER STRATEGY AS PART OF FOREIGN POLICY WHAT YOU NEED TO KNOW

2 MAIN POINTS Russian cyberwarfare policy is not entirely NEW, but is rather a continuation of existing strategies and tactics New domain offers advantages in use of key traditional Russian capabilities including information warfare, active measures, propaganda NOT useful to think of Russian cyber measures as SEPARATE from traditional warfare capabilities rather integrated into traditional forms of warfare, in which cyber domain can act as a force multiplier NEW forms of warfare are cheaper and faster, and conflicts are thus sped up

3 CYBER IS NOT REALLY A NEW DOMAIN, PART OF HISTORIC EMPHASIS ON: Capturing and controlling the narrative Utilization of information resources to include disinformation, propaganda and psychological operations Existential nature of struggle means that they are not seeking to establish a Balance of Power in cyberspace, but rather to control it. Will not accept and recognize limits on their activities.

4 Country Annual Financing in millions of dollars US 7000 9000 China 1500 20,000 UK 450 2000 Russia 300 1000 Germany 250 1000 North Korea 200 4000 Number of Cyber troops Information from Zecurion Analytics, January 2017 *This does not include sub-contractors or private contracts.

5 FROM THE RUSSIAN SECURITY ORGANIZATION MEDUSA, 2016 Russia s Ministry of Defense focused some of its earliest efforts on recruiting both from academic institutions and from hackers who may have arisen from the criminal underground. - The teams were organized into groups known as research squadrons, many of which lay within various Russian ministries and military units. - Some of Russia s earliest cyberattacks were on nearby Baltic states, dating back to a dispute with Estonia in 2007 over the placement of a memorial statue. - Public records show that at least one Russian institution purchased surveillance tools from the private Italian company Hacking Team, which sells products that allow governments to spy on their own citizens. - Over time, the Russian government developed its own offensive cyberweapons, and also bought tools from cybersecurity companies that could be used for surveillance and espionage

6 PART ONE: WHAT IS RUSSIA S CYBERSTRATEGY?

7 TODAY, RUSSIA BELIEVES The cyberdomain is intimately connected with real space and it represents merely another arena for playing out historic conflicts 2017 report, Connell and Vogler: Russian officials are convinced that Moscow is locked in an ongoing, existential struggle with internal and external forces that are seeking to challenge its security in the information realm.

8 FIFTH DOMAIN AS BATTLEFIELD: Anonymity/attribution problem: multiple attack vectors can occur, use of both civilian and military means Speed Irrelevance of geography

9 INFORMATION OPERATIONS ARE A FORCE MULTIPLIER Military generals and analysts refer to use of information technology as remote engagement ; do not need to be present to engage Describes new ways of fighting as asymmetric (cheaper, requires fewer inputs; can be performed by non-state actors; utilization of surprise and non-traditional attacks; advantage is not to defender but to he who acts)

10 GENERAL GERASIMOV, 2013 ARTICLE IN MILITARY THOUGHT urged the adoption of a Western strategy that involved military, technological, media, political, and intelligence tactics that would destabilize an enemy at minimal cost. in the future, wars will be fought with a four-to-one ratio of nonmilitary to military measures. Nonmilitary: efforts to shape the political and social landscape of the adversary through subversion, espionage, propaganda, and cyberattacks.

11 GERASIMOV DOCTRINE When faced with the combination of pressure and interference, a perfectly thriving state can, in a matter of months, and even days, be transformed into an arena of fierce armed conflict, become a victim of foreign intervention, and sink into a web of chaos, humanitarian catastrophe, and civil war.

12 2013 ARTICLE IN MILITARY THOUGHT BY GENERALS BOGDANOV AND CHEKINOV Victory is assured if an opponent s political and economic system is made ungovernable, its population demoralized, and its key militaryindustrial complexes destroyed or damaged beyond repair. Russia seeks INFORMATION SUPERIORITY to be in forefront of military advances, not copying them (development of quantum computing, etc.) Importance of FORECASTING future conflicts and conducting ANTICIPATORY OPERATIONS

13 IMPLICATIONS Russia s actions in cyber are OFFENSIVE and PREEMPTIVE vs. Reactive and defensive Doesn t accept notion that there is a distinction between MILITARY and CIVILIAN targets; military and civilian forces; seek closer and better integration between the two Doesn t consider LOAC and other traditional ways of governing conflict as applicable

14 RUSSIAN ACTIONS HAVE AND DO: Violate sovereignty of other nations (i.e. Seeking to interfere in elections, targeting civilian political officials, releasing private information, political doxing) May be preemptive in nature Seek to destabilize other nations and cause citizens to doubt the legitimacy of their regimes and their elections

15 DNC HACK The DNC breach really hits home on the evolution of the data breach from a sort of petty crime or adolescent act of vandalism to a professionalized tool of global influence being deployed by state-sponsored organizations carefully executing these acts in order to influence national elections with international consequences, says Danny Rogers, CEO of the security firm Teribium Labs.

16 PART TWO: SPECIFICS OF RUSSIA S TACTICS

17 BRANDON VALERIANO: DATABASE OF CYBER CONFLICTS Suggests that many cyber conflicts (including Russia-Georgia more closely resemble COVERT ACTIVITY than they do traditional ARMED CONFLICT) Covert activities may involve things like outsourcing dirty work to hacktivists, cyber criminals

18 USE OF NONMILITARY METHODS, TO INCLUDE Potential of mass demonstrations Special forces activities Information activities Outsourcing of operations to contractors, etc.

19 KEY TERMS: PROVOCATION Taking control of your enemies in secret and encouraging them to do things that discredit them and help you. You plant your own agents provocateurs and flip legitimate activists, turning them to your side While this isn t a particularly nice technique, it works surprisingly well, particularly if you don t care about bloody and messy consequences. (John Schindler)

20 WHAT ARE 'ACTIVE MEASURES'? "influencing the course of world events in favor of the Soviet Union, while discrediting and undermining the influence of the United States. Sowing conspiracy theories, planting false information in foreign newspapers, getting audiences to believe that their government is lying to them, not sharing information. NEW INTERNET ENVIRONMENT good place to continue these traditional Russian strategies and tactics. Michael Weiss: In the current environment, the Kremlin has weaponized money, culture and information.

21 DISINFORMATION KGB General Oleg Kalugin: Strategy 'to drive wedges in the Western community alliances of all sorts, particularly NATO, to sow discord among allies, to weaken the United States in the eyes of the people in Europe, Asia, Africa, Latin America, and thus to prepare ground in case the war really occurs. Most common subcategory of active measures feverish, if believable lies cooked up by Moscow Centre and planted in friendly media outlets to make democratic nations look sinister. (Michael Weiss, Soviet analyst)

22 WHAT THIS LOOKS LIKE FOR THE US: The election is rigged. #notmypresident. The leader is illegitimate. #resist The police cannot be trusted. #Charlottesville #blm #Ferguson Television lies. #fakenews Conspiracy theories: The government PLANNED Parkland massacre in order to implement gun control. Students aren t really students but plants paid by some sinister foreign force.

23 TROLLING Troll: a person who sows discord on social media, by starting quarrels or upsetting people, by posting inflammatory, extraneous or off-topic message in an online community (such as a newsgroup, forum, chat room or blog) with the intent of provoking readers into an emotion response or of otherwise disrupting normal, on-topic discussion, often for the troll's amusement.

24 THE THREAT OF TROLLS Internet Research Agency : employed more than 600 people across Russia implied annual budget of $10m half of which was paid out in cash. Employees were expected to post on news articles 50 times a day. Those who wrote blogs had to maintain six Facebook accounts and publish at least three posts daily. On Twitter, they had to have at least 10 accounts, on which they would tweet 50 times. All had targets for the number of followers and the level of engagement they had to reach. Active during US presidential elections. Many people didn t realizing the twitter accounts they followed were fake.

25 IMPLICATIONS OF SOCIAL MEDIA WARFARE Difficult to distinguish real from fake news Makes ALL news suspect Creates a situation where individuals may be less likely to trust ALL news, as well as all government information This is problematic when mobilizing citizens to evacuate, etc. In a situation of natural disaster or other threat

26 IMAGINE WHAT THEY COULD DO WITH THIS: https://www.youtube.com/watch?v=h153u186oge

27 RECENT REPORT FROM RAND CORPORATION: TRUTH DECAY TREND Increasing disagreement about facts and analytical interpretations of facts and data EXAMPLE Controversy over safety of vaccines, trends regarding criminality in US, climate change Blurring of lines between opinion and fact Increasing volume and importance of OPINION and PERSONAL EXPERIENCE over fact News page columns in New York TImes Personal interest stories (i.e. one immigrant s experience, DACA, etc.) taking up increased percentage of news Declining trust in formerly respected sources of factual informaiton Significant drops in public confidence and trust in government, newspapers, television news, books, the judiciary, and the presidency, as indicated by polls

28 PART THREE: LOOKING TOWARDS THE FUTURE

29 FUTURE THREATS: 1 AI-ENABLED CYBER ATTACKS Artificial intelligence (AI) will be used to: Better gather and aggregate information to be used in spear-phishing attacks; access multiple databases and share information between them Better identify targets who would be likely to respond to spear-phishing AI will make existing cyber attacks efforts like identity theft, DDoS attacks and password cracking more powerful and more efficient.

30 READ MORE Routledge. 2018 Available through Amazon