Cyberwarfare by Russia

Cyberwarfare by Russia includes denial of service attacks, hacker attacks, dissemination of disinformation and propaganda, participation of state-sponsored teams in political blogs, internet surveillance using SORM technology, persecution of cyber-dissidents and other active measures. According to investigative journalist Andrei Soldatov,[1] some of these activities are coordinated by the Russian signals intelligence, which is currently a part of the FSB but has been formerly a part of 16th KGB department, but others are directed by the Russian Ministry of Internal Affairs and the Military of Russia.

Online presence

US journalist Pete Earley described his interviews with former senior Russian intelligence officer Sergei Tretyakov who defected in the United States in 2000. According to him,

Sergei would send an officer to a branch of New York Public Library where he could get access to the Internet without anyone knowing his identity. The officer would post the propaganda on various websites and send it in emails to US publications and broadcasters. Some propaganda would be disguised as educational or scientific reports. ... The studies had been generated at the Center by Russian experts. The reports would be 100% accurate [2]

Tretyakov did not specify the targeted web sites, but made clear they selected the sites which are most convenient for distributing the specific disinformation. During his work in New York City in the end of the 1990s, one of the most frequent disinformation subjects was War in Chechnya.

According to a publication in Russian computer weekly Computerra, "just because it became known that anonymous editors are editing articles in English Wikipedia in the interests of UK and US intelligence and security services, it is also likely that Russian security services are involved in editing Russian Wikipedia, but this is not even interesting to prove it — because everyone knows that security bodies have a special place in structure of our [Russian] state"[3]

Cyberattacks

It has been claimed that Russian security services organized a number of denial of service attacks as a part of their cyber-warfare against other countries,[4] most notably the 2007 cyberattacks on Estonia and the 2008 cyberattacks on Russia, South Ossetia, Georgia, and Azerbaijan.[5] One identified young Russian hacker said that he was paid by Russian state security services to lead hacking attacks on NATO computers. He was studying computer sciences at the Department of the Defense of Information. His tuition was paid for by the FSB.[6]

Speaking on the 2007 cyberattacks, Estonia's defence minister Jaak Aaviksoo admitted he did not possess evidence of official Russian government involvement in cyberattacks.[7]

Concerning the 2008 cyberattacks on Georgia, an independent US-based research institute US Cyber Consequences Unit report stated the attacks had "little or no direct involvement from the Russian government or military". According to the institute's conclusions, some several attacks originated from the PCs of multiple users located in Russia, Ukraine and Latvia. These users were willingly participating in cyberwarfare, being supporters of Russia during the 2008 South Ossetia war, while some other attacks also used botnets.[8][9]

According to Soldatov, a hacker attack on his web site Agentura was apparently directed by the secret services in the middle of the Moscow theater hostage crisis.[1]

In March 2014, a Russian cyber weapon called Snake or “Ouroboros” is reported to have created havoc on Ukrainian government systems.[10]

As reported on October 2014, Russian hackers exploited a bug in Microsoft Windows and other software to spy on computers used by NATO, the European Union, Ukraine and companies in the energy and telecommunications sectors, according to cyber intelligence firm ISight Partners.[11]

The U.S. government concluded after a study that a cyber attack caused a power outage in Ukraine. The Russian hacking group Sandworm or the Russian government were possibly behind the malware attack on the Ukrainian power grid in December 2015.[12][13][14][15][16]

In popular culture

The alleged FSB activities on the Internet have been described in the short story "Anastasya" by Russian writer Grigory Svirsky, who was interested in the moral aspects of their work.[17] He wrote:

"It seems that offending, betraying, or even "murdering" people in the virtual space is easy. This is like killing an enemy in a video game: one does not see a disfigured body or the eyes of the person who is dying right in front of you. However, the human soul lives by its own basic laws that force it to pay the price for the virtual crime in his real life".[18]

See also

References

  1. 1 2 State control over the internet, a talk show by Yevgenia Albats at the Echo of Moscow, January 22, 2006; interview with Andrei Soldatov and others
  2. Pete Earley, "Comrade J: The Untold Secrets of Russia's Master Spy in America After the End of the Cold War", Penguin Books, 2007, ISBN 978-0-399-15439-3, pages 194-195
  3. Is there only one truth? by Kivy Bird, Computerra, 26 November 2008
  4. Cyberspace and the changing nature of warfare. Strategists must be aware that part of every political and military conflict will take place on the internet, says Kenneth Geers.
  5. "www.axisglobe.com". Retrieved 1 August 2016.
  6. Andrew Meier, Black Earth. W. W. Norton & Company, 2003, ISBN 0-393-05178-1, pages 15-16.
  7. Sputnik (6 September 2007). "Estonia has no evidence of Kremlin involvement in cyber attacks".
  8. Siobhan Gorman (18 August 2009). "Hackers Stole IDs for Attacks". WSJ.
  9. "Georgian cyber attacks launched by Russian crime gangs".
  10. The Christian Science Monitor (12 March 2014). "Russia's cyber weapons hit Ukraine: How to declare war without declaring war". The Christian Science Monitor.
  11. Russian hackers target NATO, Ukraine and others: iSight by Jim Finkle, Investing.com, 14 October 2014
  12. "Malware Found Inside Downed Ukrainian Grid Management Points to Cyberattack". Motherboard.
  13. "SANS Industrial Control Systems Security Blog - Potential Sample of Malware from the Ukrainian Cyber Attack Uncovered - SANS Institute". Retrieved 1 August 2016.
  14. "First known hacker-caused power outage signals troubling escalation". Ars Technica.
  15. "Ukraine power grid attacks continue but BlackEnergy malware ruled out".
  16. "U.S. government concludes cyber attack caused Ukraine power outage". 25 February 2016. Retrieved 1 August 2016 via Reuters.
  17. " Grigory Svirsky Anastasya. A story on-line (Full text in Russian)
  18. (Russian) Eye for an eye
  19. "F-Secure - The Dukes".
  20. The Dukes Whitepaper
  21. "Press Release Archive".
This article is issued from Wikipedia - version of the 11/26/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.