From Space, China’s Cyber-Warriors, PLA

Image result for pla china cyber  PLA Unit 61398  Operation Shady Rat

Primer: Xi Jinping to visit president Trump, hum…..will this be a topic?

China’s external strategies in cyberspace – as distinct from its internal social control policies – can be divided into two parts: the first, before late 2015; the second, after that point. The most notable transition, from the U.S. perspective, has been the agreement to foreswear commercial cyberespionage.

Less well noted, but of comparable importance, has been the formation of its Strategic Support Force, which has combined the cyber warriors of the Chinese People’s Liberation Army (PLA), its electronic warriors, and a large chunk of those conducting intelligence, surveillance, and reconnaissance, notably from space.

  FreeBeacon

China Pivots its Hackers from Industrial Spies to Cyber Warriors

Levi Maxey:

China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the Pacific.

A Chinese government strategy document published last month by China’s state-owned news agency Xinhua signals that Beijing is building up its military cyber capabilities. It says that China will “expedite the development of a cyber force and enhance capabilities… to prevent major cyber crisis, safeguard cyberspace security and maintain national security and social stability.”

To be sure, the Chinese document acknowledges that its activities in cyberspace could aggravate tensions with the U.S. and other major powers. It says that “the tendency of militarization and deterrence buildup in cyberspace is not conducive to international security and mutual trust” – seemingly a direct response to the April 2015 Pentagon strategy report strongly emphasizing that the U.S. must build up its offensive capabilities to deter adversaries from engaging in malicious activity in cyberspace.

Given China’s past espionage in cyberspace, its move from economic theft towards militarization in the virtual domain represents a pivot that Washington could regard as threatening. While issues of trade and North Korea are likely to consume much of the discussion during this week’s summit between Chinese President Xi Jinping and President Donald Trump, the growth of cyberspace as a battlefield domain could also be a point of focus. What is China’s history in cyberspace in relation to the United States, and what has led to this change in policy?

Chinese leaders perceive cyberspace as a means of advancing economic growth, preserving the Chinese Communist Party, and maintaining stability and national security. Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, argues that Chinese state-sponsored hackers seek to steal foreign technology via cyber espionage, weaken domestic opposition to the regime, and offset U.S. conventional military supremacy.

Despite some instances of political and counter-intelligence collection – such as the 2015 breach of the U.S. Office of Personnel Management and the alleged hacking into the 2008 presidential campaigns of former President Barack Obama and Sen. John McCain (R-Az) – Chinese cyber espionage has focused largely on the theft of intellectual property, trade secrets, and other sensitive commercial information. Its chief aim has been to boost Chinese economic competitiveness.

In 2010, Gen. Keith Alexander, then U.S. Cyber Commander and director of the National Security Agency, said that, “our intellectual property here is about $5 trillion. Of that, approximately $300 billion is stolen over the networks per year.” He called this theft “the greatest transfer of wealth in history.” By 2013, U.S. officials had begun publically decrying China’s economic espionage, only to be faced with denial from Beijing. In 2014, the Department of Justice obtained indictments against five members of the Chinese People’s Liberation Army (PLA), charging them with using computer network operations to commit commercial espionage.

Not long after, the U.S. threated China with sanctions and potential cancellation of a planned summit in September 2015 between President Xi and then-President Obama. Negotiators were quickly dispatched and the event went forward. During the summit both countries announced an accord, commonly referred to as the Xi Agreement, in which they agreed that “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”

The Xi Agreement was shocking in that China implicitly acknowledged having conducted economic espionage in the past and agreed to stop doing it. Many observers were skeptical that the Chinese would abide by the pact, but a report by Mandiant, now a branch of the American cyber security firm FireEye, found a notable decline in Chinese hackers targeting U.S. companies – which suggests that the Chinese were taking the accord seriously.

However, according to Chris Porter, manager of FireEye’s Horizons team, “while appearing as a significant diplomatic victory for the Obama administration, in reality China simply agreed to stop doing operations that it didn’t want to continue anyway.” He notes that Chinese hackers were often moonlighting as for-hire-hackers, sometimes even targeting Chinese companies. At the time, President Xi was in the midst of a robust anti-corruption campaign while also centralizing power, including in cyberspace, under his control.

Porter argues that “Chinese leaders are heeding a lesson about the limitations of cyber espionage that stems from the fall of the Soviet Union: you cannot steal your way to innovation.” China hopes eventually to become a world leader in cutting-edge research, he says, so it “wants to live in a world where patents are respected and its own claims are viewed as legitimate and untainted by accusations of intellectual property theft.”

Martin Libicki, the Keyser Chair of cybersecurity studies at the U.S. Naval Academy, says that ultimately, “A combination of declining returns and increasing risks on the one hand and the prospects of U.S. sanctions on the other led Chinese President Xi Jinping to agree to end Chinese commercial cyber espionage against first the United States, then the United Kingdom, and finally the other G-20 nations.” Chinese hackers are still conducting some business-focused espionage and recently have intensified their targeting of Russian officials and institutions. But they seem focused on gleaning intelligence on military capabilities and on government officials who interact with business executives.

Furthermore, the Chinese People’s Liberation Army (PLA) elevated cyber operations under the Strategic Support Force in December 2015, placing the virtual domain on par with other branches of the military. “The best guess,” Libicki says, “is that Chinese cyber warfare will be focused on supporting conventional military operations as opposed to assuming an independent role in strategic warfare, as U.S. Cyber Command seems to be doing, or to bolster information operations, as Russia seems to be doing.”

The U.S. may use its cyber capabilities for “left-of-launch” missile defense against North Korea – meaning, sabotaging planned missile launches before they happen – and to disrupt ISIS communications.

By contrast, China is consumed by fears of a massive U.S. military intervention in Asia. Beijing is building up its anti-access and area-denial (A2/AD) military strategy in the South China Sea by adding cyber and electronic warfare capabilities meshed into what is referred to as “Integrated Network-Electronic Warfare.” A report published by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn maintains that PLA units responsible for electronic warfare are taking on the role of running computer network operations as well.

China’s “strategy consists of neutralizing the logistics and communications infrastructure that permits U.S. forces to operate so far from home,” Libicki says, and is “pursuing the ability to corrupt U.S. information systems – notably, those for military logistics – and disrupt the information links associated with command and control.”

Such network and electronic attacks could target the U.S. military or regional allies’ early warning radar systems and could cause blind spots in U.S. command and control systems. The PLA could use these blind spots to deploy sorties or launch ballistic missile strikes. It could deliver these capabilities early in hostilities, integrated with technologies that could sabotage U.S. weapons systems, or even U.S. critical infrastructure, so that U.S. forces could not respond in a timely way.

To accomplish effective cyber attacks on U.S. command, control and communications platforms, or any advanced systems, the PLA would have to conduct cyber reconnaissance ahead of time. China has already begun to probe some potential targets, including elements of the U.S. power grid and review the designs of weapons systems such as the F-35 combat aircraft, the Patriot missile defense system, and U.S. Navy littoral combat ships.

“Because China, like other nations, has had far less practice at cyber warfare than cyber espionage, it is harder to anticipate its intentions and plans,” says Libicki. China’s efforts to augment kinetic assaults with cyber and electronic warfare could escalate a conflict by setting up a scenario in which adversaries might view espionage as a step toward war.

 

Unmasker/Leaker, was it Susan Rice?

Primer: On Septmber 12, 1992, Susan Rice married her Stanford romantic interest, Ian Cameron, who was working as a television producer in Toronto for the Canadian Broadcasting Corporation. The couple lived in Canada until 1993, when Rice took a job with the National Security Council in Washington, D.C., under President Clinton.

The 5 Sunday talk shows, Benghazi was due to an video lady, who also told us that Bowe Bergdahl served with honor and distinction…yeah that was Susan Rice….

    

Social media blew up late Sunday night with the notion that Susan Rice was the leaker. Okay, so is there evidence? Well, no smoking gun yet…but where are the dots leading us?

Mike Cernovich is a journalist, documentary filmmaker, wrote a piece that pointed to Ambassador Rice, who was also on president Obama’s national security council at the White House.

Susan Rice, who served as the National Security Adviser under President Obama, has been identified as the official who requested unmasking of incoming Trump officials, Cernovich Media can exclusively report.

The White House Counsel’s office identified Rice as the person responsible for the unmasking after examining Rice’s document log requests. The reports Rice requested to see are kept under tightly-controlled conditions. Each person must log her name before being granted access to them. Upon learning of Rice’s actions, H. R. McMaster dispatched his close aide Derek Harvey to Capitol Hill to brief Chairman Nunes.

 ***

The U.S. intelligence official who “unmasked,” or exposed, the names of multiple private citizens affiliated with the Trump team is someone “very well known, very high up, very senior in the intelligence world,” a source told Fox News on Friday.

Intelligence and House sources with direct knowledge of the disclosure of classified names told Fox News that House Intelligence Committee Chairman Devin Nunes, R-Calif., now knows who is responsible — and that person is not in the FBI.

***

Resurgent writes for us: Susan Rice Sought Trump Data From Intelligence Reports. Is This Why The CIA Wanted Ezra Cohen-Watnick Ousted?

Eli Lake has an explosive report on who in the Obama Administration was seeking Trump staffers’ names in intelligence reports. Turns out it was Susan Rice.

White House lawyers last month discovered that the former national security adviser Susan Rice requested the identities of U.S. persons in raw intelligence reports on dozens of occasions that connect to the Donald Trump transition and campaign, according to U.S. officials familiar with the matter.

The pattern of Rice’s requests was discovered in a National Security Council review of the government’s policy on “unmasking” the identities of individuals in the U.S. who are not targets of electronic eavesdropping, but whose communications are collected incidentally. Normally those names are redacted from summaries of monitored conversations and appear in reports as something like “U.S. Person One.”

Now, there is an interesting other nugget in Lake’s report.

The person charged with investigating the unmasking was Ezra Cohen-Watnick, the National Security Council’s senior director of intelligence. This is relevant because of this report from the Politico.

President Donald Trump has overruled a decision by his national security adviser, Lt. Gen. H.R. McMaster, to sideline a key intelligence operative who fell out of favor with some at the Central Intelligence Agency, two sources told POLITICO. On Friday, McMaster told the National Security Council’s senior director for intelligence programs, Ezra Cohen-Watnick, that he would be moved to another position in the organization.

So the guy who uncovers Rice’s connection suddenly falls out of favor with the CIA, which pressures McMaster to remove him?

Hmmmm . . .

What are the odds of that?

*** More from Bloomberg:

Rice’s requests to unmask the names of Trump transition officials does not vindicate Trump’s own tweets from March 4 in which he accused Obama of illegally tapping Trump Tower. There remains no evidence to support that claim.

But Rice’s multiple requests to learn the identities of Trump officials discussed in intelligence reports during the transition period does highlight a longstanding concern for civil liberties advocates about U.S. surveillance programs. The standard for senior officials to learn the names of U.S. persons incidentally collected is that it must have some foreign intelligence value, a standard that can apply to almost anything. This suggests Rice’s unmasking requests were likely within the law.

The news about Rice also sheds light on the strange behavior of Nunes in the last two weeks. It emerged last week that he traveled to the White House last month, the night before he made an explosive allegation about Trump transition officials caught up in incidental surveillance. At the time he said he needed to go to the White House because the reports were only on a database for the executive branch. It now appears that he needed to view computer systems within the National Security Council that would include the logs of Rice’s requests to unmask U.S. persons.

The ranking Democrat on the committee Nunes chairs, Representative Adam Schiff, viewed these reports on Friday. In comments to the press over the weekend he declined to discuss the contents of these reports, but also said it was highly unusual for the reports to be shown only to Nunes and not himself and other members of the committee.

Indeed, much about this is highly unusual: if not how the surveillance was collected, then certainly how and why it was disseminated.

2nd in Charge at FBI McCabe Under Investigation

Should we be demanding document and evidence preservation? Sure, but as along as there is a pile on, put it out there, eh?

Image result for andrew mccabe

Senate committee targets FBI No. 2 in Trump dossier probe

Sen. Charles Grassley, chairman of the Senate Judiciary Committee, has sent a letter to FBI Director James Comey demanding the story behind the FBI’s reported plan to pay the author of a lurid and unsubstantiated dossier on candidate Donald Trump. In particular, Grassley appears to be zeroing in on the FBI’s deputy director, Andrew McCabe, indicating Senate investigators want to learn more about McCabe’s role in a key aspect of the Trump-Russia affair.

Grassley began his investigation after the Washington Post reported on February 28 that the FBI, “a few weeks before the election,” agreed to pay former British spy Christopher Steele to investigate Trump. Prior to that, supporters of the Hillary Clinton presidential campaign had paid Steele to gather intelligence on Clinton’s Republican rival. In the end, the FBI did not pay Steele, the Post reported, after the dossier “became the subject of news stories, congressional inquiries and presidential denials.” It is not clear whether Steele worked under agreement with the FBI for any period of time before the payment deal fell through.

“The idea that the FBI and associates of the Clinton campaign would pay Mr. Steele to investigate the Republican nominee for president in the run-up to the election raises further questions about the FBI’s independence from politics, as well as the Obama administration’s use of law enforcement and intelligence agencies for political ends,” Grassley wrote in a letter to Comey dated March 28.

Grassley demanded the FBI turn over all its records relating to Steele and the dossier, in addition to “all FBI policies, procedures, and guidelines applicable when the FBI seeks to fund an investigator associated with a political opposition research firm connected to a political candidate, or with any outside entity.”

Image result for andrew mccabe CNBC

But the most noteworthy thing about Grassley’s letter is its focus on McCabe. Grassley noted that McCabe is already under investigation by the FBI‘s inspector general for playing a top role in the Hillary Clinton email investigation even though McCabe’s wife accepted nearly $700,000 in political donations arranged by a close Clinton friend, Virginia Gov. Terry McAuliffe, for her run for state senate in Virginia.

“While Mr. McCabe recused himself from public corruption cases in Virginia…he failed to recuse himself from the Clinton email investigation,” Grassley wrote, “despite the appearance of a conflict created by his wife’s campaign accepting $700,000 from a close Clinton associate during the investigation.”

Now, Grassley wrote, there could be a problem with McCabe’s participation in the Trump-Russia probe. If McCabe had a conflict being too close to Clinton, how could he then investigate Trump? A key passage from Grassley’s letter:

Mr. McCabe’s appearance of a partisan conflict of interest relating to Clinton associates only magnifies the importance of those questions. That is particularly true if Mr. McCabe was involved in approving or establishing the FBI‘s reported arrangement with Mr. Steele, or if Mr. McCabe vouched for or otherwise relied on the politically-funded dossier in the course of the investigation. Simply put, the American people should know if the FBI’s second-in-command relied on Democrat-funded opposition research to justify an investigation of the Republican presidential campaign.

Grassley followed with a dozen questions, all targeted at McCabe. Has McCabe been involved “in any capacity” in investigating alleged collusion between TrumpWorld and Russia? Has McCabe been involved in surveillance or intercepts of any sort in the case? Has McCabe “made any representations to prosecutors or judges” regarding the Steele dossier? Has McCabe had any interactions with Steele himself? Did McCabe brief anyone in the Obama administration on the Trump-Russia investigation? Was McCabe ever authorized by the FBI to speak to the media about the case? Did he ever do so without authorization? Has anyone in the FBI raised questions about McCabe’s possible Clinton-Trump conflict of interest? Has any complaint been filed about it? Has anyone at the FBI recommended or requested that McCabe recuse himself from the Russia-Trump investigation?

****

McCabe’s background:

Director James B. Comey has named Andrew G. McCabe executive assistant director of the FBI’s National Security Branch. Mr. McCabe most recently served as the assistant director of the Counterterrorism Division.

Mr. McCabe began his career as a special agent with the FBI in 1996. He first reported to the New York Division, where he investigated a variety of organized crime matters. In 2003, he became the supervisory special agent of the Eurasian Organized Crime Task Force, a joint operation with the New York City Police Department.

In 2006, Mr. McCabe shifted his focus to counterterrorism matters when he was promoted to FBI Headquarters as the unit chief responsible for extraterritorial investigations of Sunni extremist targets. He later served as the assistant section chief of International Terrorism Operations Section One (ITOS-1), where he was responsible for the FBI’s counterterrorism investigations in the continental United States.

In 2008, Mr. McCabe was promoted to assistant special agent in charge of the Washington Field Office’s Counterterrorism Division, where he managed several programs, including the division’s National Capital Response Squad, Rapid Deployment Team, Domestic Terrorism Squad, Cyber-CT Targeting Squad, and the Extraterritorial Investigations Squads. He received the FBI Director’s Award for his work on the 56th presidential inauguration.

In September 2009, Mr. McCabe was selected to serve as the first director of the High-Value Interrogation Group. In May 2011, he returned to the Counterterrorism Division at FBI Headquarters as deputy assistant director to oversee the international terrorism investigation program.

Before entering the FBI, Mr. McCabe worked as a lawyer in private practice. He received a Bachelor of Arts degree from Duke University in 1990 and Juris Doctor from Washington University School of Law in 1993. In 2010, Mr. McCabe was certified by the Director of National Intelligence as a senior intelligence officer.

Bomb in Briefcase, Train Station, Russia, Multiple Deaths

Reuters is reporting:

General view of emergency services attending the scene outside Sennaya Ploshchad metro station. REUTERS/Anton Vaganov

Surveillance cameras in St Petersburg’s metro system may have captured images of the person suspected of organizing Monday’s deadly train blast, Russian news agency Interfax quoted a source as saying.

“Images of the suspected organizer of the metro blast were captured on metro station cameras,” the source said.

The explosive device may have been left in a briefcase in a metro train carriage, the source added. Russian President Vladimir Putin said on Monday the government was considering all possible causes for the blasts in St Petersburg’s metro system, including terrorism. Russian security agencies found an explosive device at a metro station in central St Petersburg and made it safe, the National Anti-Terrorist Committee said in a statement on Monday.

 The Committee also said that nine people were killed and 20 injured in the blast, which took place as a train traveled between the “Sennaya Ploshchad” and “Tekhnologichesky Institut” stations.

At least nine people were killed and 20 were injured when an explosion tore through a train carriage in the St.Petersburg metro system on Monday, the Russian National Anti-Terrorist Committee said.

Interfax news agency quoted an unnamed source as saying the blast, which occurred when the train was between two stations, was caused by a bomb filled with shrapnel.

President Vladimir Putin, who was in the city for a meeting with Belarus’s leader, said he was considering all possible causes for the blast, including terrorism and was consulting with security services.

Ambulances and fire engines descended on the concrete-and-glass Sennaya Ploshchad metro station. A helicopter hovered overhead as crowds gathered to observe rescue operations.

“I appeal to you citizens of St. Petersburg and guests of our city to be alert, attentive and cautious and to behave in a responsible matter in light of events,” St Petersburg Governor Georgy Poltavchenko said in an address.

An attack on St Petersburg, Russia’s old imperial capital, would have some symbolic force for any militant group, especially Islamic State or Chechen secessionist rebels. Attacks in the past have largely concentrated on Moscow, including an attack on an airport, a theatre and in 2010 a metro train.

Video showed injured people lying bleeding on a platform, some being treated by emergency services and fellow passengers. Others ran away from the platform amid clouds of smoke, some screaming or holding their hands to their faces.

A huge hole was blown open in the side of a carriage with metal wreckage strewn across the platform. Passengers were seen hammering at the windows of one closed carriage. Russian TV said many had suffered lacerations from glass shards and metal.

Russia has been the target of attacks by separatist Islamist Chechen militants in past years. Islamic State, which has drawn recruits from the ranks of Chechen rebels, has also threatened attacks across Russia in retaliation for Russian military intervention in Syria.

The Russian air force and special forces have been supporting President Bashar al-Assad in fighting rebel groups and Islamic State fighters now being driven out of their Syrian strongholds.

ALL STATIONS CLOSED

St. Petersburg emergency services at first said that there had been two explosions. But a source in the emergency services later said that there had been only one but that the explosion had occurred in a tunnel between stations.

The blast occurred at 2.40 p.m., well shy of the evening rush hour.

Authorities closed all St. Petersburg metro stations. The Moscow metro said it was taking unspecified additional security measures in case of an attack there.

Russia has been on particular alert against Chechen rebels returning from Syria and wary of any attempts to resume attacks that dogged the country several years ago.

At least 38 people were killed in 2010 when two female suicide bombers detonated bombs on packed Moscow metro trains.

Over 330 people, half of them children, were killed in 2004 when police stormed a school in southern Russia after a hostage taking by Islamist militants. In 2002, 120 hostages were killed when police stormed a Moscow theatre to end another hostage-taking.

Putin, as prime minister, launched a 1999 campaign to crush a separatist government in the Muslim southern region of Chechnya, and as president continued a hard line in suppressing rebellion.

*** Update:

Photo of the person looking for criminal investigation in connection with the bombing […] One of the blasts came from a device filled with shrapnel, Sky News reported. An unexploded device turned up at a different subway station rigged with shrapnel and up to 2.2 pounds of explosives, according to the Interfax news agency.

 

When is it Enough for Putin and Russia?

Image result for russian hacking NBC

FBI: Russian Citizen Pleads Guilty For Involvement In Global Botnet Conspiracy

The summary below for the most part echoes the same testimony delivered by 6 panel members in two separate hearings before the Senate on March 30, 2017.

Two particular panel witness members were Clint Watts and Thomas Rid. (videos included)

There are several experts and those in media commentary that say there is no evidence of Russian intrusions. But there IS in fact evidence and attribution does required a long time to investigate, collaborate and convey, which is why the FBI has taken so long to provide. There are countless private corporations in the cyber industry, not tied to government in any form. They are hired to protect systems, investigate intrusions and research hacks and variations of interference both nationally and globally.

The United States is hardly the only victim of Russian intrusion, as Europe and the Baltic States are having the exact issues. But Americans rarely pay attention to anything outside the United States.

So, when is enough…enough for Putin? No one knows and due to the constant successes listed so far, there is very little reason for ‘active measures’ of asymmetric warfare tactics to cease….it is cheap ad effective and for the most part anonymous. The mission objective by the Kremlin is division, chaos, leaked propaganda and repeat….works doesn’t it.

Image result for russian hacking  DailyMail

Related reading: America Is Ill-Prepared to Counter Russia’s Information Warfare

Propaganda is nothing new. But Moscow is frighteningly effective—and worse is on the way.

***

What the Russians want: How Russia uses cyber attacks and hybrid warfare to advance its interests

What, exactly, do the Russians want? Their very active cyber operations obviously serve state goals, but what are those goals, and how can they inform a Western response?

ITSEF’s second day opened with a panel on Russian hybrid warfare—a combination of cyberattack and  information operations with both conventional and irregular military operations. Larry Hanauer, of the Intelligence and National Security Alliance, chaired a discussion among the Hoover Institution’s Herb Lin, Lookout’s Mike Murray, and LIFARS CEO Ondrej Krehel.

Policy driven by resentment.

Hanauer’s opening question was open-ended: what are Russia’s policy goals, and how does it use hybrid warfare to advance them? The panel was in agreement that the key to understanding Russian actions in cyberspace is to recognize them as driven by resentment. Lin called that resentment “longstanding.” It stems from the collapse of the Soviet Union at the end of the Cold War and Russia’s treatment internationally since then. Russian leaders and a substantial set of the Russian population views that treatment as disrespectful, contemptuous.

Russia has a very long tradition of using deception and propaganda, Lin said, and he added that the country doesn’t draw clear lines between peace and war. “It’s always war, even below the level of armed conflict.” The long-term goal is restoration of Russia’s place in the world. Creation of chaos through the dissemination of fake news and other information operations is simply battlespace preparation. Cyber, he added, gives you low-cost tools you didn’t have before. “It’s an attack on brainspace, and we’re all in the attack surface.”

Murray agreed, noting one current success of Russian information operations. We’ve been distracted from their intervention in Syria by news and fake news surrounding the US elections.

One of the more prominent features of the Russian way of cyber warfare is their willingness and ability to use criminal organizations for operational purposes. During the Cold War, Krehel explained, “if you did harm to the US, you were a hero.” Among other possibilities, that harm could be reputational or it could be economic, and criminals are well-adapted to inflicting those kinds of harm. There’s a view now, among Russian leaders, that they can expose personal information of essentially all Americans, and that this will yield a comprehensive picture of American finances down to the individual level. It’s very important to the Russian government, Krehel observed, to understand what the US can afford, and what capabilities we’re investing in, and all manner of data go into building up that picture. Lin: agreed that Russian espionage aggregates data in ways that render those data more valuable than the simple loss would impose on any single victim.

As a side note on the Russian President, the panel appeared to agree, as one member put it, that we now see one man, President Putin, who is able to use the resources of a modern nation-state to redress a deeply held personal grievance.

Chaos as statecraft.

This general orientation, according to Murray, can be encapsulated by noting that all war, to Russia, is about political ends. There’s no separation of politics from the economy or business. The increase in chaos we see in Western news, information, and political culture is, from a Russian point of view, a desirable thing.

And chaos serves tactical as well as strategic ends. Krehel expanded on this by asserting that Russia wants chaos because it doesn’t have the funding, the financial resources, of, say, the US. Thus Russian security services hand intelligence over to criminal groups. “A normal government doesn’t hand over its political agenda to criminal groups,” he said, but Russia’s does.

Murray offered an evocative story: “The number two guy in Russia has two pictures on his desk: one of Putin, and the other of Tupac Shakur.” So there’s a kind of gangster ethos at the highest levels. And whie using criminal gangs as cutouts also affords an obvious form of deniability, we shouldn’t be deceived.

In response to Hanauer’s question about who might be the leading cyber actors in the Russian government, Krehel said that they were the organizations one would expect, with the FSB and GRU occupying prominent positions. Different units within the government do cooperate—resource and manpower constraints make this inevitable—and in those services “loyalty is high, and rated very highly.”

You cheated them. Expect payback.

There’s also a common motivation, and Russian information operations play into it, especially domestically. “Russia believes all of you in this room cheated them,” Krehel said, and this theme is consciously exploited to the population as a whole, but particularly to the security services. “So the GRU’s big objective is to cripple you financially. And then they want to make you look ridiculous.”

Lin agreed. “That’s an accurate picture of how it works on the ground. Russia is a thugocracy, a state of organized crime.” He has seen reports (unconfirmed reports, he stressed, but he also clearly thought them plausible) that there are formal memoranda of understanding from the FSB to criminal gangs, outlining what the gangs can expect in return for services. “Other governments have done this, but it’s a way of life in Russia. The line between intelligence services and gangs is very vague.”

There’s no such thing as a win-win, Lin said, in the Russian worldview. “To Russia, it’s always win-lose.” Hanauer noted that this seemed a point of difference between Russia and China, and Lin agreed. Where there have been agreements of a sort between the US and China moderate conduct in cyberspace, Lin thinks there’s little evidence that such deterrent or confidence building agreements will have much effect in US-Russian relations.

Protect what’s important? Everything’s important (to the Russians).

Asked about defensive measures, Lin said that, “while there’s a logic to saying, ‘protect what’s important,’ to a good intelligence agency there’s never too much data.”

There are preferences for certain kinds of targets, which Krehel enumerated: first, oil, second, pharma, and a distant third, tech. Tech was less actively prospected because of Russian confidence that “they’re so much better at tech than we are.” Lin agreed, and said there was some basis for that confidence. “In the physics community, for example, we’ve long noted the sophistication of Russian physicists. They have great theoretical insight.”

Humiliation as statecraft, and the commodity tools used to do it.

Murray said he’d recently heard someone lamenting that he missed the Chinese, who just stole without embarrassing you. “That says a lot about Russian operations.”

Turning to the embarrassment inflicted during the US elections, Hanauer asked what kinds of tools the Russians were using for their attacks? Lin answered that the most consequential hack—Democratic Party operative John Podesta’s email—was phishing, a very basic approach.

Krehel said that, during the run-up to the election, he observed the Democratic and Republican National Committee networks being equally pressured by the Russians, the former more successfully than the latter. The approach in both cases focused on human engineering.

The Russian services, Murray explained, focus on engineering end-to-end systems. “‘PowerShell’ is the magic word for Russian coding.” There’s an emphasis on the least common denominator—phishing, PowerShell, darkside commodity tools—in effect a startup mentality. “All their tools are malleable and in motion, all the time.”

Critical infrastructure and acts of war.

Hanauer asked about the much-feared prospect of an attack on US critical infrastructure. Are we seeing, he asked, Russian attacks on US critical infrastructure? And if and when we do, would these be acts of war? “If they’re not trying [to hit US critical infrastructure]” Lin said, “then someone over there should be fired.” In Murray’s view, “Everyone’s trying to figure out the act-of-war line.” He reviewed briefly the history of Russian attacks (a coordinated mix of criminal and intelligence service attacks) on the Ukrainian power grid. He thought Russia would be more circumspect about doing such things to the US grid because, of course, the US is potentially a more dangerous adversary than Ukraine. But he also thought that if the Russians came to believe such attacks would be useful, they wouldn’t hesitate to undertake them.

– See more at: https://thecyberwire.com/events/sinet-itsef-2017/what-the-russians-want-how-russia-uses-cyber-attacks-and-hybrid-warfare-to-advance-its-interests.html#sthash.FnUREpYT.dpuf