Electoral Influence: 40yrs Of Kremlin Interference

The most surprising thing about Russian attempts to influence the outcome of November’s US presidential election is that they should have caused surprise. Attempts to rig elections are traditional.

Every country in the post-war Soviet bloc established in eastern Europe became communist as the result of fraudulent elections which, throughout the Cold War, continued to deliver bogus majorities of more than 99%.

Walter Ulbricht, leader of the East German communist party, told his senior party officials after the Second World War: “It’s got to look democratic but we must have everything under our control.”

The KGB also made somewhat less ambitious post-war plans to influence the outcome of elections in the West, especially those of its “main adversary”, the US. Its strategy was the same as that of the recent attempts to undermine Hillary Clinton’s election campaign, to collect and covertly distribute compromising material (some of it fabricated) against candidates it wished to lose.

The recent report by the US intelligence community on “Assessing Russian activities and intentions in recent US elections” cites documents in the Mitrokhin Archive, top secret files smuggled out of Russia in the 1990s by a former senior KGB archivist, who was exfiltrated by MI6 to Britain.

He and I worked together on these extraordinary papers while I was writing a history of KGB foreign operations. They show that, more than 40 years ago, the KGB recruited a Democratic Party activist to report on future president Jimmy Carter’s “campaign and foreign policy plans”.

Probably no American policy-maker at any time during the Cold War inspired as much fear and loathing in Moscow as Ronald Reagan in the early 1980s. The first priority of KGB influence operations (officially known as “active measures”) was to prevent his re-election in 1984.

The main obstacle to the KGB’s covert campaign was Reagan’s almost blameless private life and visible devotion to his wife, Nancy. So the “Centre” (KGB HQ) decided to portray him instead as an out-of-control militarist who threatened to provoke a third world war. “Residencies” (KGB stations) around the world were ordered to popularise the slogan “Reagan means war!”

To assist them, the KGB forged a series of bellicose documents, including a letter to the King of Spain bearing Reagan’s signature, calling on the king to deal promptly and decisively with those obstructing Spanish membership of Nato.

Another of the KGB’s favourite deceptions was bogus documents purporting to reveal secret dealings between the Reagan administration and the apartheid regime in South Africa. 

One such document was planted on the unsuspecting Washington correspondent of the New Statesman, which featured it prominently in its issue of November 5, 1982.

The recent US intelligence report concludes that: “President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election. Russia’s goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency.

“We further assess Putin and the Russian government developed a clear preference for president-elect Trump.”

Computer hacking and the advent of cyber-warfare made it much easier in 2016 for Russian intelligence to collect private information on presidential candidates than during the Reagan era. 

But Russian attempts to influence the outcome of the election were scarcely more successful in 2016 than in 1984. There is no convincing evidence that their efforts made a significant contribution to Clinton’s defeat.

Though largely ineffective, however, Russian interference in US elections remains deeply sinister. Under President Boris Yeltsin in the 1990s, interference declined. Under Putin it is sharply on the rise.

As the US intelligence report also concludes: “Russian efforts to influence the 2016 US presidential election represent the most recent expression of Moscow’s long-standing desire to undermine the US-led liberal democratic order, but these activities demonstrated a significant escalation in directness, level of activity, and scope of effort compared to previous operations.”

Though the report does not mention it, there is also reason to suspect the compromising material (kompromat) collected by Russian intelligence on both Trump and Clinton before the election included, as in the Soviet era, fabricated evidence. The whole wretched story provides further, worrying evidence of a return to the Cold War.

Professor Christopher Andrew, former MI5 official historian, is a convenor of the Cambridge Intelligence Seminar

Times:             How Russian Cyber Power Attacked The US:

 

« Why Hasn't MH370 Been Found?
Cyber Attack Concerns Ahead Of French Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

AgilePQ

AgilePQ

AgilePQ visibly secures IoT devices worldwide to protect the privacy, safety, and well-being of all people.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.