Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Cyberwarfare by Russia includes denial of service attacks, hacker attacks, dissemination of

disinformation and propaganda, participation of state-sponsored teams in political blogs,


internet surveillance using SORM technology, persecution of cyber-dissidents and other
active measures. According to investigative journalist Andrei Soldatov,[1] some of these
activities have been coordinated by the Russian signals intelligence, which is part of the FSB
and was formerly a part of the 16th KGB department, An analysis by the Defense
Intelligence Agency in 2017 outlines Russia's view of "Information Confrontation" or IPb
(informatsionnoye protivoborstvo) as "strategically decisive and critically important to
control its domestic populace and influence adversary states", delineating the term
'Information Confrontation' into two categories of "Informational-Technical" and
"Informational-Psychological" Effects. The former encompasses network operations relating
to defense, attack, and exploitation with the latter relating to "attempts to change people's
behavior or beliefs in favor of Russian governmental objectives."[2]

Online presence

US journalist Pete Earley described his interviews with former senior Russian intelligence
officer Sergei Tretyakov, who defected in the United States in 2000:

Sergei would send an officer to a branch of New York Public Library where he could get
access to the Internet without anyone knowing his identity. The officer would post the
propaganda on various websites and send it in emails to US publications and broadcasters.
Some propaganda would be disguised as educational or scientific reports. ... The studies had
been generated at the Center by Russian experts. The reports would be 100% accurate [3]

Tretyakov did not specify the targeted web sites, but made clear they selected the sites which
are most convenient for distributing the specific disinformation. During his work in New
York City in the end of the 1990s, one of the most frequent disinformation subjects was War
in Chechnya.[citation needed]

According to a publication in Russian computer weekly Computerra, "just because it became


known that anonymous editors are editing articles in English Wikipedia in the interests of
UK and US intelligence and security services, it is also likely that Russian security services
are involved in editing Russian Wikipedia, but this is not even interesting to prove it —
because everyone knows that security bodies have a special place in structure of our
[Russian] state"[4]

Cyberattacks

Main articles: 2007 cyberattacks on Estonia, Cyberattacks during the 2008 South Ossetia
war, and Russian intervention in the 2016 United States presidential election

It has been claimed that Russian security services organized a number of denial of service
attacks as a part of their cyber-warfare against other countries,[5] most notably the 2007
cyberattacks on Estonia and the 2008 cyberattacks on Russia, South Ossetia, Georgia, and
Azerbaijan.[6] One identified young Russian hacker said that he was paid by Russian state
security services to lead hacking attacks on NATO computers. He was studying computer
sciences at the Department of the Defense of Information. His tuition was paid for by the
FSB.[7]

Georgia

Concerning the 2008 cyberattacks on Georgia, an independent US-based research institute


US Cyber Consequences Unit report stated the attacks had "little or no direct involvement
from the Russian government or military". According to the institute's conclusions, some
several attacks originated from the PCs of multiple users located in Russia, Ukraine and
Latvia. These users were willingly participating in cyberwarfare, being supporters of Russia
during the 2008 South Ossetia war, while some other attacks also used botnets.[8][9]

Germany

In 2015 a high-ranking security official stated that it was "highly plausible" that a cybertheft
of files from the German Parliamentary Committee investigating the NSA spying scandal
later published by WikiLeaks was conducted by Russian hackers.[10][11] In late 2016 Bruno
Kahl, president of the Bundesnachrichtendienst warned of data breaches and
misinformation-campaigns steered by Russia.[12] According to him there are insights that
cyberattacks occur with no other purpose than political uncertainty.[13][14] Süddeutsche
Zeitung reported in February 2017 that a year-long probe by German intelligence "found no
concrete proof of [Russian] disinformation campaigns targeting the government."[15] Hans-
Georg Maaßen, head of the country's Federal Office for the Protection of the Constitution,
notes "growing evidence of attempts to influence the [next] federal election" in September
2017 and "increasingly aggressive cyber espionage" against political entities in Germany.[16]
The New York Times reported on September 21, 2017, three days before the German federal
election, that there was little to suggest any Russian interference in the election.[17]

Ukraine

In March 2014, a Russian cyber weapon called Snake or "Ouroboros" is reported to have
created havoc on Ukrainian government systems.[18] The Snake tool kit began spreading into
Ukrainian computer systems in 2010. It performed Computer Network Exploitation (CNE),
as well as highly sophisticated Computer Network Attacks (CNA).[19]

According to CrowdStrike from 2014 to 2016, the Russian APT Fancy Bear used Android
malware to target the Ukrainian Army's Rocket Forces and Artillery. They distributed an
infected version of an Android app whose original purpose was to control targeting data for
the D-30 Howitzer artillery. The app, used by Ukrainian officers, was loaded with the X-
Agent spyware and posted online on military forums. CrowdStrike claims the attack was
successful, with more than 80% of Ukrainian D-30 Howitzers destroyed, the highest
percentage loss of any artillery pieces in the army (a percentage that had never been
previously reported and would mean the loss of nearly the entire arsenal of the biggest
artillery piece of the Ukrainian Armed Forces[20]).[21] According to the Ukrainian army this
number is incorrect and that losses in artillery weapons "were way below those reported"
and that that these losses "have nothing to do with the stated cause".[22]
The U.S. government concluded after a study that a cyber attack caused a power outage in
Ukraine which left more than 200,000 people temporarily without power. The Russian
hacking group Sandworm or the Russian government were possibly behind the malware
attack on the Ukrainian power grid as well as a mining company and a large railway operator
in December 2015.[23][24][25][26][27][28]

2014 Ukrainian presidential election

Pro-Russian hackers launched a series of cyberattacks over several days to disrupt the May
2014 Ukrainian presidential election, releasing hacked emails, attempting to alter vote
tallies, and delaying the final result with distributed denial-of-service (DDOS) attacks.[29][30]
Malware that would have displayed a graphic declaring far-right candidate Dmytro Yarosh
the electoral winner was removed from Ukraine's Central Election Commission less than an
hour before polls closed. Despite this, Channel One Russia "reported that Mr. Yarosh had
won and broadcast the fake graphic, citing the election commission's website, even though it
had never appeared there."[29][31] According to Peter Ordeshook: "These faked results were
geared for a specific audience in order to feed the Russian narrative that has claimed from
the start that ultra-nationalists and Nazis were behind the revolution in Ukraine."[29]

United Kingdom "Brexit" referendum

Main article: Brexit

In the run up to the referendum on the United Kingdom exiting the European Union
("Brexit"), Prime Minister David Cameron suggested that Russia "might be happy" with a
positive Brexit vote, while the Remain campaign accused the Kremlin of secretly backing a
positive Brexit vote.[32] In December 2016, Ben Bradshaw MP claimed in Parliament that
Russia had interfered in the Brexit referendum campaign.[33] In February 2017, Bradshaw
called on the British intelligence service, Government Communication Headquarters,
currently under Boris Johnson as Foreign Secretary, to reveal the information it had on
Russian interference.[34] In April 2017, the House of Commons Public Administration and
Constitutional Affairs Select Committee issued a report stating, in regard to the June 2016
collapse of the government's voter registration website less than two hours prior to the
originally scheduled registration deadline (which was then extended), that "the crash had
indications of being a DDOS 'attack.'" The report also stated that there was "no direct
evidence" supporting "these allegations about foreign interference." A Cabinet Office
spokeswoman responded to the report: "We have been very clear about the cause of the
website outage in June 2016. It was due to a spike in users just before the registration
deadline. There is no evidence to suggest malign intervention."[35][36]

In June 2017 it was reported by The Guardian that "Leave" campaigner Nigel Farage was a
"person of interest" in the United States Federal Bureau of Investigation into Russian
interference in the United States 2016 Presidential election.[37] In October 2017, Members of
Parliament in the Culture, Media and Sport Committee demanded that Facebook, Twitter,
Google and other social media corporations, to disclose all adverts and details of payments
by Russia in the Brexit campaign.[38]

United States
See also: Russian interference in the 2016 United States elections

In April 2015, CNN reported that "Russian hackers" had "penetrated sensitive parts of the
White House" computers in "recent months." It was said that the FBI, the Secret Service, and
other U.S. intelligence agencies categorized the attacks "among the most sophisticated
attacks ever launched against U.S. government systems."[39]

In 2015, CNN reported that Russian hackers, likely working for the Russian government, are
suspected in the State Department hack. Federal law enforcement, intelligence and
congressional officials briefed on the investigation say the hack of the State email system is
the "worst ever" cyberattack intrusion against a federal agency.[40]

In February 2016, senior Kremlin advisor and top Russian cyber official Andrey Krutskikh
told the Russian national security conference in Moscow that Russia was working on new
strategies for the “information arena” that was equivalent to testing a nuclear bomb and
would “allow us to talk to the Americans as equals.”[41]

In 2016, the release of hacked emails belonging to the Democratic National Committee,
John Podesta, and Colin Powell, among others, through DCLeaks and WikiLeaks was said
by private sector analysts[42] and US intelligence services[43] to have been of Russian origin.
[44][45]
Also, in December 2016, Republican and Democratic Senators on the United States
Armed Services Committee called for "a special select committee to investigate Russian
attempts to influence the presidential election."[46][47]

Victim of cyberattack

Trans-Siberian Pipeline explosion

When Russia was still the Soviet Union in 1982, a portion of its Trans-Siberian Pipeline
within its territory exploded, allegedly due to computer malware implanted in the pirated
Canadian software by the Central Intelligence Agency. The malware caused the SCADA
system running the pipeline to malfunction. The "Farewell Dossier" provided information on
this attack, and wrote that compromised computer chips would become a part of Soviet
military equipment, flawed turbines would be placed in the gas pipeline, and defective plans
would disrupt the output of chemical plants and a tractor factory. This caused the "most
monumental nonnuclear explosion and fire ever seen from space". However, the Soviet
Union did not blame the attack on the United States.[48]

In popular culture

Alleged FSB activities on the internet have been described in the short story "Anastasya" by
Russian writer Grigory Svirsky, who was interested in the moral aspects of their work.[49] He
wrote:

"It seems that offending, betraying, or even "murdering" people in the virtual space is easy.
This is like killing an enemy in a video game: one does not see a disfigured body or the eyes
of the person who is dying right in front of you. However, the human soul lives by its own
basic laws that force it to pay the price for the virtual crime in his real life.

You might also like