Cyberwar: Enter the Trolls

Savushkina Street, St Petersburg

The great breach in the US government’s database is a classic case of informational smash and grab. But operations to plant misinformation are also worrying for states which care about truth.

Digital wars are being fought in many theatres around the world and in many forms. In the light of the Snowden revelations, citizens who guard their privacy may already feel that their privacy has already been eroded. But recently, the Obama administration conceded that the US federal government had itself fallen victim to a hack on an unprecedented scale, with the security of the details of up to four million former and present employees apparently breached.

The Chinese, who were initially considered the most likely suspects, hotly deny any responsibility for this data smash and grab. Nor is it immediately obvious what the perpetrators’ motives might be. It could be a fishing expedition to establish who has access to real secrets. It could be a more straightforward criminal enterprise, a prelude to identity theft. The initial hack probably happened months ago, for one of the distinguishing features of the digital age is its capacity to host the faceless along with the intimate. This is what lends a more sinister force to the familiar equation of information, truth and power. The ability to extract or insert information that may or may not be true is not new – but it is uniquely facilitated in a digital world.

The phenomenon of the troll factory is a particularly egregious example of its exploitation. A troll factory is not some happy Scandinavian workshop peopled by happy elves, but a profoundly nihilistic and disturbing use of the Internet. The Guardian newspapeer tracked down a building in Savushkina St. in St Petersburg and talked to some of the paid bloggers who work to establish an inoffensive online personality in the comment sections of media outlets, and on social media, and then seed their posts with pro-Putin or pro-government remarks. The Guardian has experienced this kind of organised assault on reports from Ukraine and, presumably because of implications for the Russian-hosted world cup in 2018, on corruption at Fifa.

This kind of trolling is the digital offspring of earlier practices like “astroturfing”, where American corporations would organise letter-writing campaigns to local papers in order to make a lobbying initiative appear to be something that came from the grassroots. It can be an effective way to subvert opinion, and it is almost certainly more effective in the apparently intimate corners of the Internet than in print. 

This is not just a matter for government in Moscow, Beijing or Pyongyang. Non-state movements such as Islamic State adopt them, too. The Internet is a new front in asymmetrical warfare. We’re so used to thinking of soft power as a benign weapon that it requires an effort of will and understanding to see that it can be used in entirely malign ways, domestically as well as externally. Governments need to be where people are listening. Presumably the west is out there trolling too. 

But the BBC World Service built its reputation with honesty and this should be the policy of any British presence on the Internet. It must be out there at least trying to defend the truth without subterfuge against the lies of dictators and extremists everywhere.

Ein News:  

« Top 6 Hacking Tools Security Teams Should Know About
FBI Unable to Monitor ISIS’s Encrypted Communications »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

RiskOpsAI

RiskOpsAI

RiskOpsAI (formerly OptimEyes) is an AI/ML driven Integrated Risk Modeling and Decisioning Platform functioning as an advanced GRC/Risk Management Integration Accelerator.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.

InterSources

InterSources

InterSources is a trusted partner, leading the way in Cloud Security, Cybersecurity, PLG Consulting, Digital Transformation, and Professional Services.

Empirical Security

Empirical Security

Empirical builds mathematical models for security data. We maintain the world’s most advanced global models for cybersecurity, and we build local models that respond to your specific context.