NSA: All Signs Point to Russian Hacking

Are all the right questions being asked regarding presidential candidates relationships with the Kremlin? What is the real relationship that Trump and his organization has with Russia? Further, what about what the Hillary camp did prior to the elections? Video and transcript from MEMRI on the Hillary Camp.

Russian Foreign Ministry Spokesperson: People from Clinton’s Elections Team Visited Moscow Many Times

Russian Foreign Ministry spokesperson Maria Zakharova said that meetings with various personnel on the elections teams of both U.S. presidential candidates was “normal diplomatic practice,” and implied that the American outrage regarding Russian contacts with President-elect Trump’s team in the buildup to the elections was groundless. Asked about contacts with Hillary Clinton’s team, Zakharova said: “They came to Moscow many times.” She was speaking on a Russia 1 post-elections talk show on November 13.

The NSA also announced it was inside Russia infrastructure.

 CyberWire: Many countries afford criminals a safe harbor, and the criminals are emboldened by this. Attackers continue to exploit human trust, Mandia said, and there activities will continue to reflect geopolitical conditions. He noted that the Syrian Electronic Army became active after the US declared a redline over the Assad regime’s anticipated use of chemical weapons. He doesn’t regard this as an accident. Looking at the two biggest competitors of the US in cyberspace, Mandia saw more capability in China, but more hacking from Russia. He thought that Chinese hacking has actually declined. But “Russia’s dialed it up a notch.” Beginning in 2014 Mandia saw a dip in Russian OPSEC as hacking tools were increasingly shared by government and criminals. He also saw less attention being paid to manual deletion of hackers’ tracks from victim systems. He concludes from this that “the Russians know what they’re looking for, and they’re operating at a scale where they don’t have manual resources available.” The large scale and high operational tempo of Russian hacking has led them to build capability at the cost of stealth and evasiveness. Turning to the cybercriminal underworld, he notes the rise in extortion. He sees this as in part a response to enhanced credit card security. As card security got better, criminals realized they had more lucrative options. It’s also not particularly risky, he said—it’s proving difficult to penetrate the anonymity of those who hold data for ransom. The attackers’ methods are indiscriminate: most attacks are what Mandia called “spray and pray” operations, not targeted work. A great deal of ransomware is being spread with automated spearphishing.

What about the matter of Russian war crimes in Syria, Crimea and Ukraine? Of note, Russia just terminated the membership of the International Criminal Court.

BusinessInsider: The leader of the National Security Agency says there shouldn’t be “any doubt in anybody’s mind” that there was “a conscious effort by a nation-state” to sway the result of the 2016 presidential election.

Adm. Michael Rogers, who leads both the NSA and US Cyber Command, made the comments during a conference presented by The Wall Street Journal in response to a question about WikiLeaks’ release of nearly 20,000 internal emails from the Democratic National Committee.

“There shouldn’t be any doubt in anybody’s minds,” Rogers said. “This was not something that was done casually. This was not something that was done by chance. This was not a target that was selected purely arbitrarily. This was a conscious effort by a nation-state to attempt to achieve a specific effect.”

Rogers did not specify the nation-state or the specific effect, though US intelligence officials say they suspect Russia provided the emails to WikiLeaks after hackers stole them from DNC servers and the personal email account of Hillary Clinton’s campaign manager, John Podesta.

At least two different hacker groups associated with the Russian government were found inside the networks of the DNC over the past year reading emails, chats, and downloading private documents. Many of those files were later released by WikiLeaks.

The hack of Podesta’s private Gmail address was traced by cybersecurity researchers to hackers with Russia’s foreign intelligence service, the GRU, because the group made an error during its campaign of “spear phishing” targets — tricking them into clicking on malicious links or give up their passwords. The researchers found that the group had targeted more than 100 email addresses that were associated with the Clinton campaign, according to The New York Times.

The Obama administration in October publicly accused Russia of being behind the hacks.

“The US intelligence community is confident that the Russian Government directed the recent compromises of emails,” reads a statement from the Department of Homeland Security. “These thefts and disclosures are intended to interfere with the US election process.”

Sen. Lindsey Graham of South Carolina said on Tuesday that he wants the Senate to open an investigation into whether the Russian government meddled in the US election. Russian President Vladimir Putin has repeatedly denied his country was behind the hacks.

Thanksgiving Day Terror. Black Swan Exercise

Related reading: Predicting Future Military Threats: Implications of the Black Swan

Donald Trump’s transition team is getting a helping hand from the Obama administration on national security matters.

The administration is giving the president-elect and a select few of his top advisers sensitive intelligence briefings.

And, in addition, Trump and his team will take part in two so-called ‘black swan’ exercises that simulate a domestic or national security emergency.

The exercises are intended to help an incoming administration learn how to manage a crisis in real time in case there is some kind of global or domestic emergency in the first days of a Trump presidency.

A black swan exercise would, for example, ensure that a fledgling Trump administration knows how to activate the proper federal agencies to maintain stability.

According to a briefing book from the nonpartisan Center for Presidential Transition, in 2008 the Bush administration hosted two black swan exercises for then president-elect Obama’s national security team. More here from ABC.

Black Swan operations and exercises have been practiced also in the United Kingdom.

**** What is on the horizon regarding terror?

Islamic State is urging its followers to carry out acts of terrorism in New York City during the upcoming, Macy’s Thanksgiving Day Parade.  Jamie Schram writes in this morning’s (Nov. 14, 2016) New York Post, that “ISIS is offering a detailed how-to on using trucks as weapons of mass destruction — noting that the Macy’s Thanksgiving Parade would be an ‘excellent target.”

Rumiyah2(1).jpg

MEMRI: On November 11, 2016, Al-Hayat, one of the media centers of the Islamic State (ISIS), released the third issue of its monthly magazine Rumiyah featuring an article calling on lone wolves in the U.S. and Europe to use trucks to target large outdoor conventions, crowded streets, outdoor markets, festivals, parades, and political rallies. The article also emphasized the importance of using trucks in terrorist attacks, and provided suggestions on “ideal vehicles” to use and tactical tips for the preparation and planning of attacks.

Rumiyah3.jpg

The article, titled “Just Terror Tactics,” features images of rental trucks from companies such as Hertz and U-Haul, as well as a picture showing the Macy’s Thanksgiving Day Parade in New York City. It begins by highlighting the “destructive capability” of motor vehicles and referring to the Bastille Day attack in Nice, France on July 14, 2016. While praising the Nice attacker, the article states: “This was superbly demonstrated in the attack launched by the brother Mohamed Lahouaiej-Bouhlel who, while traveling at the speed of approximately 90 kilometers per hour, plowed his 19-ton load-bearing truck into crowds celebrating Bastille Day in Nice, France, harvesting through his attack the slaughter of 86 Crusader citizens and injuring 434 more.”

Rumiyah4(1).jpg

The article stresses the importance of using a vehicle that can inflict maximum damage, and describes the “ideal” vehicles for lone wolf attacks as “load-bearing trucks, large in size, reasonably fast in speed or rate of acceleration, heavy in weight, double-wheeled, possessing a slightly raised chassis.” The article continued: “If accessible, [vehicles] with a metal outer frame which are usually found in older cars [should be used], as the stronger outer frame allows for more damage to be caused when the vehicle is slammed into crowds, contrary to newer cars that are usually made of plastics and other weaker materials.”

Providing suggestions on how to acquire the vehicle, the article noted that buying it is the “easiest” option; however, it also mentioned renting, borrowing from relatives and acquaintances, hotwiring, and carjacking as additional options. Under “applicable targets” the article listed: “Large outdoor conventions and celebrations, pedestrian-congested streets, outdoor markets, festivals, parades and political rallies.”

The article further emphasized that in order to inflict maximum damage, attackers should consider targeting “any outdoor attraction that draws large crowds,” stating that “it is not conditional to target gatherings restricted to government or military personnel only. All so-called ‘civilian’ (and low-security) parades and gatherings are fair game and more devastating to Crusader nations.”

As for “preparation and planning,” the article recommended “assessing vehicle for roadworthiness, filling vehicle with a sufficient amount of fuel, mapping out the route of the attack, surveying the route for obstacles, such as posts, signs, barriers, humps, bus stops, dumpsters, and if accessible, a secondary weapon should be attained.”

The article also provided ideas for attackers to use in order to declare their affiliation to ISIS to “have their motives acknowledged” such as writing “ISIS will remain” or “I am a soldier of the Islamic State” on pieces of papers and throwing them out of the vehicle’s window during the attack.

The article concludes by instructing attackers to stay inside their vehicles until they are no longer movable and then to start shooting pedestrians, first responders and security forces until they are killed.

****

Black Swan exercises are those that prepare for the unexpected and several events worldwide have been part of these operations.

1. Electromagnetic Pulse (EMP) or Solar Burst

As The Heritage Foundation highlighted in the documentary 33 Minutes,[3] an EMP attack could throw America back to the pre-Industrial Revolution era. A powerful solar burst would have the same impact. Should either event occur, people would have little time to react, and the damage would be incalculable.

If the U.S. were to lose power for any prolonged period of time, given the sheer number of people located in the interior of the country, mass starvation and death would become a reality. Most experts consider these events as highly unlikely ones, so little investment or planning is done related to them.

2. Pandemic Virus

Although the U.S. has prepared for a pandemic influenza outbreak, little preparation has gone into other potential viruses. More importantly, it is the unknown virus or “super virus” that represents a Black Swan for America. Recall that it was less than 30 years ago that AIDS first began embedding itself in North America. If a far more deadly and communicable virus hits America, the U.S. would quickly expend its existing resources.

3. Nuclear or Radiological Event

The U.S. has extensive knowledge of what would happen if a nuclear or radiological explosion occurred in a major American city. Theory, however, is a poor replacement for the reality of large numbers of deaths, burn victims, and physical debris. As former Vice President Dick Cheney wisely concluded, because of the sheer consequences, even a 1 percent chance of such an event occurring requires the nation to expend the necessary resources to prevent it.

4. Super-Volcanic Eruption

Seismic activity around the Yellowstone caldera is monitored, but tectonic shifts miles below the surface could result in the buildup of pressure and a super-volcanic eruption. The volcano beneath Yellowstone previously erupted, causing destruction as far away as California, Iowa, and Louisiana. An eruption, though unlikely given current readings, could have truly catastrophic consequences.

5. Nor’Easter/Hurricane

Hurricanes strike America with a fair degree of frequency. A Black Swan event would be a Nor’easter combined with a powerful hurricane that strikes New York City in the same manner as Hurricane Katrina struck New Orleans. Between the massive flooding and wind damage, New York City could sustain casualties and physical destruction well in excess of Katrina.

How Prepared Is the U.S.?

The honest and unfortunate answer to that question is unknown and, despite attempts to ascertain that answer, will not be known if existing policy remains in place. A Black Swan by definition becomes a Black Swan because it results in catastrophic outcomes. This “delicate” balance between preparing for events and not being able to prepare adequately for all events represents the ultimate risk-based decision making.

From 2003 to 2011, the U.S. Department of Homeland Security (DHS) distributed roughly $40 billion in funding to states and localities across America. Despite years of reporting requirements, DHS is fundamentally unable to state with any degree of certainty which capabilities exist, where those capabilities exist, the level of those capabilities, and the remaining capability needs. DHS knows it has funded the acquisition of many things, but specifics beyond that are unquantifiable.

Specifically, to gain a full accounting, Congress should:

  • Be fiscally responsible. Rather than continue to spread federal funds using an “inch thick and a mile wide” mentality, Congress should target federal funds at the highest-risk states, cities, and counties where the funds could meaningfully increase the security of Americans, including reducing the number of high-risk cities that are eligible for special funding.
  • Examine cooperative agreements. The need for equality downplays the need for the grant structure and invites another approach—such as the use of cooperative agreements, where the federal government and the states can sit down as true and equal partners and negotiate outcomes at the beginning and then direct funds to achieve those desired outcomes without the need for yearly applications.
  • Appoint a Black Swan commission. Rather than wait until after a catastrophic event has occurred, Congress should appoint an independent commission for the express purpose of analyzing the threats of a potential Black Swan, identifying existing capabilities, and making recommendations on how best to correct errors made thus far and accelerate closing the gap between where the nation stands today and where it needs to be tomorrow. The commission must have the independence and resources to quickly do its job after a full review of the status quo.

Expect the Unexpected

If the catastrophe in Japan has taught any lessons, it is that America must prepare for the unexpected with as much vigor as it prepares for the expected. Because a Black Swan can be so catastrophic, in many ways the ideal role for the federal government is to lead an effort surrounding those events. With the nation’s current fiscal challenges, conserving resources for catastrophic events is more vital than ever. More here from Heritage.

Trust Even Less on the Internet Thanks to Real Russian Trolls

Daily, I am asked if this is true or that is true….admittedly it is getting harder each day to vet stories for accuracy and to dissect them for what is accurate and other parts being flatly false. That is what trolls do, mix accuracy with falsehoods so the reader assumes it is all factual….ah not so much.

So, what sites to do visit often and have come to rely on them? InfoWars or Zerohedge? Well what about people that are curiously appearing to be friends with you on Facebook or new followers on Twitter? Take caution and read carefully below, you reliance on truth and accuracy just got harder. Even some in the media are being punked.

Related reading: KGB Model: Army of Russia Trolls vs. America

Related reading: Even Russian Diplomats in DC are Trolling Obama Admin

Related reading: Are you Sick of Hearing About Russia? Putin Loves it

Here we go and hat tip to these fellas for taking many months of investigation to sound the warnings.

****   

Trolling for Trump: How Russia Is Trying to Destroy Our Democracy

Trump isn’t the end of Russia’s information war against America. They are just getting started.

WotR: In spring 2014, a funny story crossed our social media feeds. A petition on whitehouse.gov called for“sending Alaska back to Russia,” and it quickly amassed tens of thousands of signatures. The media ran a number of amused stories on the event, and it was quickly forgotten.

The petition seemed odd to us, and so we looked at which accounts were promoting it on social media. We discovered that thousands of Russian-language bots had been repetitively tweeting links to the petition for weeks before it caught journalists’ attention.

Those were the days. Now, instead of pranking petitions, Russian influence networks online are interfering with the 2016 U.S. election. Many people, especially Hillary Clinton supporters, believe that Russia is actively trying to put Donald Trump in the White House.

And the evidence is compelling. A range of activities speaks to a Russian connection: the theft of emails from the Democratic National Committee and Clinton campaign officials, hacks surrounding voter rolls and possibly election machines, Putin’s overt praise for Trump, and the curious Kremlin connections of Trump campaign operatives Paul Manafort and Carter Page.

But most observers are missing the point. Russia is helping Trump’s campaign, yes, but it is not doing so solely or even necessarily with the goal of placing him in the Oval Office. Rather, these efforts seek to produce a divided electorate and a president with no clear mandate to govern. The ultimate objective is to diminish and tarnish American democracy. Unfortunately, that effort is going very well indeed.

Russia’s desire to sow distrust in the American system of government is not new. It’s a goal Moscow has pursued since the beginning of the Cold War. Its strategy is not new, either. Soviet-era “active measures” called for using the “force of politics” rather than the “politics of force”to erode American democracy from within.  What is new is the methods Russia uses to achieve these objectives.

We have been tracking Russian online information operations since 2014, when our interest was piqued by strange activity we observed studying online dimensions of jihadism and the Syrian civil war. When experts published content criticizing the Russian-supported Bashar al Assad regime, organized hordes of trolls would appear to attack the authors on Twitter and Facebook. Examining the troll social networks revealed dozens of accounts presenting themselves as attractive young women eager to talk politics with Americans, including some working in the national security sector. These “honeypot” social media accounts were linked to other accounts used by the Syrian Electronic Army hacker operation. All three elements were working together: the trolls to sow doubt, the honeypots to win trust, and the hackers (we believe) to exploit clicks on dubious links sent out by the first two.

Related reading: U.S. charges three suspected Syrian Electronic Army hackers

 

The Syrian network did not stand alone. Beyond it lurked closely interconnected networks tied to Syria’s allies, Iran and Russia. Many of these networks were aimed at U.S. political dissenters and domestic extremist movements, including militia groups, white nationalists, and anarchists.

Today, that network is still hard at work, running at peak capacity to destroy Americans’ confidence in their system of government. We’ve monitored more than 7,000 social media accounts over the last 30 months and at times engaged directly with them. Trump isn’t the end of Russia’s social media and hacking campaign against America, but merely the beginning.  Here is what we’ve learned.

The Russian Social Media Approach: Soviet Union’s “Active Measures” On Steroids

The United States and its European allies have always placed state-to-state relations at the forefront of their international strategies. The Soviet system’s effort to undermine those relations during the Cold War, updated now by modern Russia, were known as “active measures.”

A June 1992 U.S. Information Agency report on the strategy explained:

It was often very difficult for Westerners to comprehend this fundamentally different Soviet approach to international relations and, as a result, the centrality to the Soviets (now Russians) of active measures operations was gravely underappreciated.

Active measures employ a three-pronged approach that attempts to shape foreign policy by directing influence in the following ways: state-to-people, people-to-people, and state-to-state. More often than not, active measures sidestep traditional diplomacy and normal state-to-state relationships. The Russian government today employs the state-to-people and people-to-people approaches on social media and the internet, directly engaging U.S. and European audiences ripe for an anti-American message, including the alt-right and more traditional right-wing and fascist parties. It also targets left-wing audiences, but currently at a lower tempo.

Until recently, Western governments focused on state-to-state negotiations with Putin’s regime largely missed Russian state-to-people social media approaches. Russia’s social media campaigns seek five complementary objectives to strengthen Russia’s position over Western democracies:

  • Undermine citizen confidence in democratic governance;
  • Foment and exacerbate divisive political fractures;
  • Erode trust between citizens and elected officials and democratic institutions;
  • Popularize Russian policy agendas within foreign populations;
  • Create general distrust or confusion over information sources by blurring the lines between fact and fiction
  • In sum, these influence efforts weaken Russia’s enemies without the use of force. Russian social media propaganda pushes four general themes to advance Moscow’s influence objectives and connect with foreign populations they target.

    Political messages are designed to tarnish democratic leaders or undermine institutions. Examples include allegations of voter fraud, election rigging, and political corruption. Leaders can be specifically targeted, for instance by promoting unsubstantiated claims about Hillary Clinton’s health, or more obviously by leaking hacked emails.

Financial propaganda weakens citizen and investor confidence in foreign markets and posits the failure of capitalist economies. Stoking fears over the national debt, attacking institutions such as the Federal Reserve, and attempts to discredit Western financial experts and business leaders are all part of this arsenal.

In one example from August, Disneyland Paris was the site of a reported bomb scare. Social media accounts on Twitter reported that the park had been evacuated, and several news outlets — including Russian propaganda stations RT and Sputnik — published alarming stories based on the tweets, which escalated in hysteria as the afternoon stretched on. In fact, the park had not been evacuated. But that didn’t stop Disney’s stock from taking a temporary hit. This fluctuation could be exploited by someone who knew the fake scare was coming, but we do not have access to the data that would allow us to know whether this happened.

disney

Social issues currently provide a useful window for Russian messaging. Police brutality, racial tensions, protests, anti-government standoffs, online privacy concerns, and alleged government misconduct are all emphasized to magnify their scale and leveraged to undermine the fabric of society.

Finally, wide-ranging conspiracy theories promote fear of global calamity while questioning the expertise of anyone who might calm those fears. Russian propaganda operations since 2014 have stoked fears of martial law in the United States, for instance, by promoting chemtrails and Jade Helm conspiracy theories. More recently, Moscow turned to stoking fears of nuclear war between the United States and Russia.

For the Kremlin, this is not just focused on the outside world. Russian news organizations bombard Russian citizens with the same combination of content. Steve Rosenberg, a BBC News correspondent in Moscow, filmed the Russian domestic equivalent of this approach on November 1, showing Russian language news headlines inciting fears such as impending nuclear war, a U.S.-Russia confrontation in Syria, and the potential for an assassination of Donald Trump.

russia_active_measures

The Confluence of Information and Cyberspace

Russian active measures use a blend of overt and covert channels to distribute political, financial, social, and calamitous messages (see above). During the Soviet era, “white” active measures were overt information outlets directly attributable to the Central Committee of the Communist Party of the Soviet Union. Today, RT and Sputnik push Kremlin-approved English-language news on television and the Internet. These outlets broadcast a mix of true information (the vast majority of content), manipulated or skewed stories, and strategically chosen falsehoods. RT’s slogan, “Question More,” aptly fits their reporting style — seeding ideas of conspiracy or wrongdoing without actually proving anything.

This “white” content provides ammunition for “gray” measures, which employ less overt outlets controlled by Russia, as well as so-called useful idiots that regurgitate Russian themes and “facts” without necessarily taking direction from Russia or collaborating in a fully informed manner.

During the Cold War, gray measures used semi-covert Communist parties, friendship societies, and non-governmental organizations to engage in party-to-party and people-to-people campaigns. Today, gray measures on social media include conspiracy websites, data dump websites, and seemingly credible news aggregators that amplify disinformation and misinformation.

Conspiracy sites include outlets such as InfoWars and Zero Hedge, along with a host of lesser-known sites that repeat and repackage the same basic content for both right- and left-wing consumers. Sometimes, these intermediaries will post the same stories on sites with opposite political orientations.

Data dump websites, such as Wikileaks and DC Leaks, overtly claim to be exposing corruption and promoting transparency by uploading private information stolen during hacks. But the timing and targets of their efforts help guide pro-Russian themes and shape messages by publishing compromising information on selected adversaries.

The people who run these sites do not necessarily know they are participants in Russian agitprop, or at least it is very difficult to prove conclusively that they do. Some sites likely receive direct financial or operational backing, while others may be paid only with juicy information.

Sincere conspiracy theorists can get vacuumed up into the social networks that promote this material. In at least one case, a site described by its creator as parody was thoroughly adopted by Russian influence operators online and turned into an unironic component of their promoted content stream, at least as far as the network’s targeted “news” consumers are concerned.

A small army of social media operatives — a mix of Russian-controlled accounts, useful idiots, and innocent bystanders— are deployed to promote all of this material to unknowing audiences. Some of these are real people, others are bots, and some present themselves as innocent news aggregators, providing “breaking news alerts” to happenings worldwide or in specific cities. The latter group is a key tool for moving misinformation and disinformation from primarily Russian-influenced circles into the general social media population. We saw this phenomenon at play in recent reports of a second military coup in Turkey and unsubstantiated reports of an active shooter that led to the shutdown of JFK Airport. Some news aggregators may be directly controlled by Russia, while other aggregators that use algorithmic collection may be the victims of manipulation.

“Black” active measures are now easier to execute than they were for the Soviets. During the Cold War, according to the 1992 USIA report, these included:

… the use of agents of influence, forgeries, covert media placements and controlled media to covertly introduce carefully crafted arguments, information, disinformation, and slogans into the discourse in government, media, religious, business, economic, and public arenas in targeted countries.

Black active measures create both risks and costs. Agents deployed into the West must avoid detection or risk state-to-state consequences. The KGB’s Cold War efforts to keep these operations secret bore significant financial costs while producing little quantifiable benefit. Stories were difficult to place in mainstream media outlets, and the slow process made it challenging to create momentum behind any one theme.

On social media, this process is far easier, more effective, and relatively difficult to attribute. Without stepping foot in America, Russia’s coordinated hackers, honeypots, and hecklers influence Americans through people-to-people engagement.

Hackers provide the fuel for themes and narratives. Initially, hackers concentrated on defacements, denial of service, and misinformation posted on compromised social media accounts. By 2015, the Kremlin’s hacking efforts were much more sophisticated, coalescing into two distinct, competing hacking collectives: Fancy Bear (APT 28), possibly operated by Russian military intelligence (GRU), and Cozy Bear (APT 29), possibly operated by Russia’s foreign intelligence service (FSB).

The most notorious Russian-linked hacker, using the handle Guccifer2.0, targets current and former U.S. government officials, American security experts, and media personalities by seeking access to their private communications and records. Former Secretary of State Colin Powell and Clinton campaign chairman John Podesta provide two current examples, but there will be many more to come. Today, Guccifer2.0 posts threats of election meddling this coming Tuesday.

guccif
Guccifer 2.0 Warning on Election Posted to Social Media

In addition to phishing and cracking attacks, these hackers are aided by honeypots, a Cold War term of art referring to an espionage operative who sexually seduced or compromised targets. Today’s honeypots may include a component of sexual appeal or attraction, but they just as often appear to be people who share a target’s political views, obscure personal hobbies, or issues related to family history. Through direct messaging or email conversations, honeypots seek to engage the target in conversations seemingly unrelated to national security or political influence.

These honeypots often appear as friends on social media sites, sending direct messages to their targets to lower their defenses through social engineering. After winning trust, honeypots have been observed taking part in a range of behaviors, including sharing content from white and gray active measures websites, attempting to compromise the target with sexual exchanges, and most perilously, inducing targets to click on malicious links or download attachments infected with malware.

One of us directly experienced how social media direct messages from hackers or influencers seek to compromise or sway a target by using social engineering to build a rapport. Operators may engage the target’s friends or acquaintances, drawing them into conversations to encourage trust. Once conversations are started, an agent of influence will be introduced into the group and will subsequently post on Russian themes from grey outlets or introduce malicious links.

When targets click on malicious links, Fancy Bear and Cozy Bear extract personal information from public officials, media personalities, and American experts and selectively dump the content obtained at opportune times. The goal is to increase popular mistrust of political leaders and people with expertise or influence in specific circles of interest to Russia, such as national security. In some cases, experts criticizing Russia have had their computers mysteriously compromised by destructive malware and their research destroyed.

Online hecklers, commonly referred to as trolls, energize Russia’s active measures. Ringleader accounts designed to look like real people push organized harassment — including threats of violence — designed to discredit or silence people who wield influence in targeted realms, such as foreign policy or the Syrian civil war. Once the organized hecklers select a target, a variety of volunteers will join in, often out of simple antisocial tendencies. Sometimes, they join in as a result of the target’s gender, religion, or ethnic background, with anti-Semitic and misogynistic trolling particularly prevalent at the moment. Our family members and colleagues have been targeted and trolled in this manner via Facebook and other social media.

Hecklers and honeypots can also overlap. For instance, we identified hundreds of accounts of ostensibly American anti-government extremists that are actually linked to Russian influence operations. These accounts create noise and fear, but may also draw actual anti-government extremists into compromising situations. Based on our observations, the latter effort has not been widely successful so far among anti-government extremists, who tend to stay in their own social networks and are less likely to interact with Russian influence accounts, but our analysis points to greater overlap with networks involving American white nationalists.

Russia’s honeypots, hecklers, and hackers have run amok for at least two years, achieving unprecedented success in poisoning America’s body politic and creating deep dissent, including a rise in violent extremist activity and visibility. Posting hundreds of times a day on social media, thousands of Russian bots and human influence operators pump massive amounts of disinformation and harassment into public discourse.

This “computational propaganda,” a term coined by Philip Howard, has the cumulative effect of creating Clayton A. Davis at Indiana University calls a“majority illusion, where many people appear to believe something ….which makes that thing more credible.” The net result is an American information environment where citizens and even subject-matter experts are hard-pressed to distinguish fact from fiction. They are unsure who to trust and thus more willing to believe anything that supports their personal biases and preferences.

The United States disbanded the U.S. Information Agency after the Cold War and currently fields no apparatus to detect and mitigate Russia’s social media influence campaign. As seen in America’s disjointed counter narratives against the Islamic State, efforts to create any kind of U.S. information strategy are plagued by disparate and uncoordinated efforts strewn among many military, diplomatic, and intelligence commands. American cyber operations and hacking reside separately with the National Security Agency. Russia, on the other hand, seamlessly integrates the two efforts to devastating effect.

After Election Day: What to do about Russia’s Active Measures?

The most overwhelming element of Russia’s online active measures over the last year relate to the presidential campaign of Donald Trump. Russian promotion of Trump not only plagues Clinton, but likely helped sideline other GOP candidates in early 2016 with a more traditional anti-Russia view of foreign policy. It is impossible to assess whether Donald Trump is even fully aware of these efforts, let alone complicit. Setting aside that question for a moment, some readers will immediately ask how we are so sure all this activity goes back to Russia?

There are a number of technical indicators, most tellingly the synchronization of messaging and disinformation with “white” outlets such as RT and Sputnik, as well as the shocking consistency of messaging through specific social networks we have identified.

Dmitri Alperovich of the cyber-security firm Crowdstrike first attributed the DNC hacks to Russia. He explained in a recent War on the Rocks podcast:

The important thing about attribution…is that it’s not that much different from the physical world. Just like someone can plan a perfect bank heist and get away with it, you can do that in the cyber-domain, but you can almost never actually execute a series of bank heists over the course of many years and get away with it. In fact, the probability of you not getting caught is miniscule. And the same thing is true in cyber-space because eventually you make mistakes. Eventually you repeat tradecraft. It’s hard to sort of hide the targets you’re going after…

There are other, less subtle indications as well, for instance, a notification from Google: “We believe we detected government backed attackers trying to steal your password. This happens to less than 0.1% of all Gmail users.” When one of us receives these messages, we feel confident we’re on the right trail.

Foreign Spies on our College Campuses

International Espionage on Campus

Bishop/CB: The idyllic American university campus conjures the image of a safe and open academic environment where students spend four or more years learning new ideas and preparing for future careers.  Professors challenge eager students to open their minds to old and new perspectives in science, mathematics, business, and of course, the arts and humanities.  Universities nurture an atmosphere where academics and scientists can engage in groundbreaking research, make advances in technology, and publish on novel theories and discoveries.

For many students, college may be the first time they are living on their own, allowing them to explore not only academic freedom but personal freedom. For parents coping with their children leaving home, some comfort is found in the expectation that while students are on campus the university will be actively taking measures to protect them from physical harm and risks that could affect their future.  Parents don’t realize that for some students, college may be the first time students are exposed to the clandestine world of international espionage.

Espionage knows no boundaries.  Foreign intelligence officers and spies lurk wherever there is information of value to be had or people with access to it. Information does not have to be a government secret for a foreign intelligence service to want to steal it.  Nation states play the Great Game to gain an advantage, whether political or economic, over their adversaries.  And there is plenty of information of value on American college campuses to attract the attention of adversary nations.  From advanced research in sciences and technology to professors with access to U.S. government officials, American universities are a target-rich environment for intelligence collection, intellectual property theft, and the illicit transfer of research and technology.   The welcoming nature of American universities—from unlocked entrances to university facilities, minimal investigation into the backgrounds of students enrolling in classes, and open admission to conferences, seminars, and other campus events—creates the perfect opportunity for undercover foreign intelligence officers or their human sources to slip onto campus and search for students who have potential for entering sensitive positions in the U.S. government or landing jobs with American companies engaged in the development and production of emerging and advanced technologies.

While the threat of espionage may not be apparent to parents and students, American universities have little excuse for not knowing about it.  Federal law enforcement agencies like the FBI regularly attempt to advise universities of the potential espionage threats on campus, and the media also has reported extensively on them.  The risks are real, knowable, and preventable, and universities that ignore the threats could face potentially devastating consequences to their reputations, relationships, and financial well being.  For students who do not fully appreciate the risk and get wrapped up on the wrong side of the clandestine world, the impact on their futures can be tremendous and irreversible.  Espionage on campus and the often-related illicit transfer of research and technology from school laboratories also contribute to immediate and long-term decline of U.S. national security interests and the competitive advantage the United States possesses in sciences and technology.  The university campus has been part of the Great Game chessboard for years. This is nothing new and not much has changed.

In 1930s Great Britain, five college students with communist sympathies came under the spell of espionage at the University of Cambridge.  Donald MacLean, Guy Burgess, Anthony Blunt, John Cairncross, and Kim Philby were in their undergraduate years when the NKVD, the Soviet precursor to the KGB, recruited them to serve the communist cause.  At the time, none of the students had access to information of value or persons of interest, but the NKVD believed these men, who came from the right social class, would find their way into positions of influence and access. They all did.

MacLean landed key positions in the UK’s foreign office, the equivalent of the U.S. Department of State.  Burgess held positions with the foreign office, the BBC, and MI6.  Blunt spent some time in MI5, served as the Surveyor of the King’s Pictures, and used his standing in academic and social circles to spot other potential Soviet spies. Cairncross made the rounds at MI6 and Bletchley Park, the precursor to the UK’s Government Communication Headquarters (GCHQ).  Kim Philby was the prize of the five.  While starting his espionage as a freelance journalist in the Spanish Civil War, which gave him access to pro-Franco forces—the ideological enemies of the Soviet Union—Philby returned to the UK and entered MI6.  There, he steadily rose through the ranks, eventually overseeing MI6’s counterintelligence operations against the Soviet Union. The Cambridge spies, most notably Philby, are still considered to be some of the most damaging spies in UK espionage history. The notoriety of these men is well known in England, and their association with the University of Cambridge as the Cambridge Ring or Cambridge Five will forever be remembered.

American universities have not been immune to the espionage efforts of foreign intelligence services.  In 1984, a student-spy working for the Cuban intelligence service and studying at Johns Hopkins University “spotted” Ana Montes as a potential Cuban recruit.  After being introduced to Cuban intelligence officers, Montes agreed to spy for Cuba while still a graduate student at Johns Hopkins.  She later became an intelligence analyst at the Defense Intelligence Agency (DIA), focusing on Cuban issues.  She was arrested in 2001 and sentenced to 20 years in prison.

Other known espionage or technology/research theft cases affecting the American university community include:

  • In 2002, Qingqiang Yin, a former Cornell University researcher was arrested before boarding a flight to Shanghai from New York.  He was carrying numerous bacteria samples and yeast cultures belonging to the university.  The FBI investigation revealed Yin was seeking a job with a research facility in China and offered to bring the bacteria and yeast cultures to China for commercial enzyme production.  He was sentenced to 12 months’ imprisonment for conspiracy to defraud the U.S. government.
  • In 2006, Carlos Alvarez, a psychology professor at Florida International University, admitted during a plea hearing that he had been a Cuban spy for nearly 30 years, gathering and transmitting information about Cuban exile groups to Cuban intelligence agents.  His wife Elsa, also a professor, admitted knowing of her husband’s conduct.  They were sentenced to five and three years’ imprisonment, respectively.  
  • In 2012, the FBI arrested 12 deep-cover Russian SVR intelligence officers who were engaged in espionage against various American targets.  One of the SVR officers was Cynthia Murphy, a.k.a. Lydia Guryeva, who while studying for a master’s degree at Columbia University, was tasked by the SVR to develop relationships with classmates and professors who have or will acquire access to secret information and to report on their backgrounds and characteristics, providing assessments on their vulnerability for recruitment as spies. The SVR also directed Guryeva to collect information on students seeking employment with the CIA.  After pleading guilty to failing to register as an agent of a foreign government, the United States returned Guryeva (and the other deep-cover officers) to Russia in exchange for prisoners held there. 
  •  
  • In 2013, Hua Jun Zhao, a Chinese research assistant at the Medical College of Wisconsin, was arrested and charged with economic espionage after stealing cancer research compounds and shipping them to China, where he allegedly planned to take them to a Chinese university for further development.  He pleaded guilty to the lesser charge of illegally downloading research data and was sentenced to time served (four-and-a-half months).
  •    Image result for Hua Jun Zhao
  • Since 2004, the Chinese government has opened numerous Confucius Institutes at universities across the world, including approximately 64 institutes at American universities.  While the stated mission of the institutes is to promote the study of Chinese language and culture abroad, concerns have been raised about the ulterior motives of these institutes.  Allegations have also surfaced that the institutes may be Trojan Horses used by the Chinese government to conduct espionage activities. Regardless of the public evidence available on the alleged intelligence function of these institutes, from this former intelligence officer’s perspective, they are the perfect front for penetrating American universities and targeting their students.  

Again, these are only examples of the espionage threats facing American universities.  These incidents and others have been well documented in the public domain, and American universities dedicated to risk management should know about them, if not for their own protection, then for the benefit of their donors and students and U.S. national security.

Today’s American university receives funding from a variety of sources, including alumni, businesses, philanthropic organizations, and federal and state governments.  Research grants from the public and private sectors are a significant source of income for universities, and donors want the university to reap the benefits of their contributions.  No donor wants to see years of research and funding illegally diverted to a foreign government or competitor.  A university that does not take this risk seriously could begin to see expected research grants and contributions being provided to other schools or facilities, especially when the U.S. government is the funding source.

Universities should also consider the disruption a law enforcement investigation into espionage on campus can have on its day-to-day operations, reputation, and ability to maintain investor (philanthropic) confidence.  The media will undoubtedly provide thorough coverage of an espionage investigation, the accuracy of which is not guaranteed.

Investigators will be removing and combing through files and records.  Computers may be seized, and electronic files of all kinds will be requested.  Interviews of those with knowledge of the incident or perpetrators will be required, and if a public trial takes place, there will be more disruption and publicity.  A university wanting to maintain or salvage its reputation after the uncovering of espionage on its campus will find it advantageous if it can truthfully state it has been cooperating with law enforcement on the investigation rather than have a story surface that the university was one of the obstacles law enforcement had to overcome in order to put an end to the espionage. Having the university’s name negatively associated with a foreign espionage investigation is not the kind of publicity a university will find easy to overcome.
For students, the consequences of becoming entangled in espionage could be severe.   Students make easy targets, and their idealism and naiveté can often get in the way of their judgment.  Once a student is recruited as a spy, his opportunities for reversing course without consequence are limited.  One only needs to look at the choices made by Glenn Duffie Shriver, an American just out of college and living in China, who was slowly manipulated by Chinese intelligence to seek employment with the CIA.  Shriver was arrested and sentenced to four years’ imprisonment after pleading guilty to conspiracy to commit unlawful conveyance of national defense information.  Shriver was released from prison in 2013, but he will be forever remembered as a Chinese spy.  Not a great resume builder.

From a national security perspective, espionage on campus also contributes to the perpetual and long-term decline of the United States’ competitive advantage over its adversaries.  The technology and research lost to other countries through espionage and theft robs the American economy of the commercial and economic benefits it would have derived in terms of jobs, profits, and scientific and technological advancement.  The stolen knowledge increases the commercial and economic standing of the countries that committed the theft to the detriment of the United States.  If the stolen technologies and research have military, defense, or security applications, then the losses also contribute to the threats the United States faces from countries and adversaries who seek to challenge or harm its national security interests.

Universities are a soft target for espionage and offer potentially lucrative rewards for our adversaries’ intelligence targeting efforts.  Every loss resulting from espionage or foreign theft at an American university is a gain for the adversaries of the United States. These risks and potential consequences transcend the inerrant concept of the open, academic environment.

Fear of Russia, Tiny Estonia Trains Citizens for War Skills

In part from Free Beacon:

The service, known in Estonia as Kaitsepolitseiamet or “Kapo,” produces an Annual Review summarizing trends and internal threats to Estonia. The 2015 Annual Review, released last week, includes sections on cyber security, preventing international terrorism, and fighting corruption, among other issues.

However, the first page of the report makes it clear what the service considers the top threat to Estonian and European security: “In the context of Russian aggression, the security threat arising from a weakening of the European Union is many times greater than that arising from the refugees settling in Estonia.”

“This is the most important point,” Martin Arpo, Kapo’s deputy director general, told the Washington Free Beacon. “For Estonia, the report is a reminder: let’s think about real security threats, and not imaginary ones. The migration crisis is bringing focus away from real threats not only in Estonia but in Europe, as well. The only hope for Putin to fulfill his ambitions is that Europe and NATO are split or have controversies inside. The refugee crisis is really the only serious topic that can bring these controversies.”

The first page of the report references the Gerasimov Doctrine, a vision of war through non-military means published by Russian Chief of General Staff Valeriy Gerasimov in early 2013. More here.

****

Spooked by Russia, Tiny Estonia Trains a Nation of Insurgents

Members of the Estonian Defense League set off for a patrol competition near the town of Turi in central Estonia. The events, held nearly every weekend, are called war games, but they are not intended to be fun. Credit James Hill for The New York Times

NYT’s/TURI, Estonia — Her face puffy from lack of sleep, Vivika Barnabas peered down at the springs, rods and other parts of a disassembled assault rifle spread before her.

At last, midway through one of this country’s peculiar, grueling events known as patrol competitions, she had come upon an easy task.

Already, she and her three teammates had put out a fire, ridden a horse, identified medicinal herbs from the forest and played hide-and-seek with gun-wielding “enemies” in the woods at night.

By comparison, this would be easy. She knelt in the crinkling, frost-covered grass of a forest clearing and grabbed at the rifle parts in a flurry of clicks and snaps, soon handing the assembled weapon to a referee.

A team loaded and removed cartridges from rifle magazines in a timed test. Credit James Hill for The New York Times

“We just have to stay alive,” Ms. Barnabas said of the main idea behind the Jarva District Patrol Competition, a 24-hour test of the skills useful for partisans, or insurgents, to fight an occupying army, and an improbably popular form of what is called “military sport” in Estonia.

Continue reading the main story

The competitions, held nearly every weekend, are called war games, but are not intended as fun. The Estonian Defense League, which organizes the events, requires its 25,400 volunteers to turn out occasionally for weekend training sessions that have taken on a serious hue since Russia’s incursions in Ukraine two years ago raised fears of a similar thrust by Moscow into the Baltic States.

Estonia, a NATO member with a population of 1.3 million people and a standing army of about 6,000, would not stand a chance in a conventional war with Russia. But two armies fighting on an open field is not Estonia’s plan, and was not even before Donald J. Trump, the Republican presidential candidate, said European members of NATO should not count on American support unless they pay more alliance costs.

Since the Ukraine war, Estonia has stepped up training for members of the Estonian Defense League, teaching them how to become insurgents, right down to the making of improvised explosive devices, or I.E.D.s, the weapons that plagued the American military in Iraq and Afghanistan. Another response to tensions with Russia is the expansion of a program encouraging Estonians to keep firearms in their homes.

The Jarva competition entailed a 25-mile hike and 21 specific tasks, such as answering questions of local trivia — to sort friend from foe — hiding in a bivouac deep in the woods and correctly identifying types of Russian armored vehicles. On a recent weekend, 16 teams of four people had turned out, despite the bitter, late fall chill. The competition was open to men, women and teenagers.

Ms. Barnabas and her three teammates had spent the night hiding in a nest lined with pine needles and leaves on the forest floor, while men playing the occupying army stomped around, firing guns in the air and searching for them. Contestants who are found must hand over one of the 12 “life cards” they carry, which detracts from their final score.

“It’s cold and you lie on the ground, looking up at the stars and hearing shooting and footsteps nearby,” said Ms. Barnabas, a petite woman who is also a coordinator for the league in her day job. She was swathed in a few layers of long underwear and camouflage.

“It wasn’t so bad because we slept cuddled together,” she said, flirtatiously, of her female team. The footsteps came and went, and the women stayed quiet. “They didn’t find us.”

A team demonstrated its first-aid skills during the competition. Members bring their rifles and rucksacks packed with camping comfort foods like salami, Snickers bars and Gatorade, as well as first-aid kits.

Encouraging citizens to stash warm clothes, canned goods, boots and a rifle may seem a cartoonish defense strategy against a military colossus like Russia. Yet the Estonians say they need look no further than the wars in Iraq and Afghanistan to see the effectiveness today, as ever, of an insurgency to even the odds against a powerful army.

Estonia is hardly alone in striking upon the idea of dispersing guns among the populace to advertise the potential for widespread resistance, as a deterrent.

“The best deterrent is not only armed soldiers, but armed citizens, too,” Brig. Gen. Meelis Kiili, the commander of the Estonian Defense League, said in an interview in Tallinn, the capital.

A team of military cadets won the competition. Credit James Hill for The New York Times

The number of firearms, mostly Swedish-made AK-4 automatic rifles, that Estonia has dispersed among its populace is classified. But the league said it had stepped up the pace of the program since the Ukraine crisis began. Under the program, members must hide the weapons and ammunition, perhaps in a safe built into a wall or buried in the backyard.

For the competitions, members bring their rifles and rucksacks packed with camping comfort foods like salami, Snickers bars and Gatorade, as well as first-aid kits.

But why bother with the stocking caps, the hidden ammunition and the rucksacks if, under Article 5 of the NATO charter, the United States is obliged to send the full might of its military hurtling into Estonia in an attack?

The Estonian government says that ignores Article 3, which stipulates that each member should also prepare for individual defense. But skeptics cite another reason: fears that the United States and Europe might not have the stomach for a confrontation with Russia, even though they are currently building up their military presence in the Baltics. That would leave Estonia to fend for itself.

A member of the team that placed second sank to the ground to recuperate after crossing the finish line. Credit James Hill for The New York Times

Whatever the reason, training for underground warfare is going ahead here, where partisans are still glorified for fighting the Nazis and Soviets in World War II.

“The guerrilla activity should start on occupied territory straight after the invasion,” General Kiili said. “If you want to defend your country, we train you and provide conditions to do it in the best possible way.”

Members of the community also take part in the drills.

The competition to identify edible and medicinal herbs, for example, was run by a high school biology teacher. The fire department staged a competition to put out a small blaze in a barrel. A horseback-riding school for children tested moving a “wounded” colleague by horse.

Jaan Vokk, a retired corporal with the Estonian Army, ran the competition to identify armored vehicles on a slide show on his laptop. “Sometimes it feels like they are getting us ready for something,” he said ominously, while quizzing a teenage girl in camouflage to identify Russian tanks.

The girl was ready, rattling off the names as pictures flashed on the computer screen — “T-72 main battle tank, BTR-80 armored personnel carrier” — and earning a nearly perfect score.

“Partisan war is our way,” Mr. Vokk said. “We cannot equal their armor. We have to group in small units and do a lot of destruction of their logistics convoys. We needle them wherever we can.”

Mr. Vokk served with the army in Afghanistan, where, he said, he gained an appreciation for the effectiveness of I.E.D.s.

“They scared us,” he said. “And a Russian is just a human being as well. He would be scared.”