Russian Cyber Campaign Aims To Splinter US Voters

Thousands of Kremlin-linked Twitter accounts are churning out material designed to splinter America along political, racial and religious lines, even as tech executives fielded questions at Capitol Hill on Russian meddling in last year’s US election.

An analysis of 600 Twitter accounts traced by the German Marshall Fund, a think tank, to the Russian government has provided a vivid insight into how the Kremlin is seeking to use social media to undermine Western societies.

In the US recently, the Russian Twitter accounts latched on to a racially tinged row, begun by President Donald Trump, over whether American football players should kneel during the national anthem to protest against perceived police brutality against African-Americans.

As debate surrounding the National Football League kept America’s cable news channels transfixed, the Russian accounts sought to amplify the dispute, pumping out hashtags such as #boycottnfl and #takeaknee.

They then turned their attention to a story involving Michelle Obama, who became the target of a conservative backlash when she declared that “any woman who voted against Hillary Clinton voted against their own voice”. The accounts also pushed messages with the hashtag #Maga, Make America Great Again, Mr Trump’s campaign slogan.

People with inside experience of how Russian state-owned propaganda outfits operate see familiar patterns.

“They thrive on stories of internal US conflict, especially racial and gender-based anxieties,” said Andrew Feinberg, a former reporter for Sputnik News, an outlet identified by US intelligence as a front for Russian agitprop.

US officials say Russia is applying a Cold War propaganda tactic by amplifying issues that already polarise the US. Bret Schafer, of the German Marshall Fund, said that Russian trolls had demonstrated a “desire to latch on to anything divisive”.

Last month Russian-linked accounts sought to intensify calls by alt-right pundits and websites for the removal of HR McMaster, Mr Trump’s national security adviser, from the White House, alleging that he was a puppet of Jewish interests.

Actor Morgan Freeman came under attack this week after he promoted the Committee to Investigate Russia, an activist group that says its mission is to help “Americans recognise and understand the gravity of Russia’s continuing attacks on our democracy”.

Twitter executives told the Senate and House intelligence committees yesterday it had suspended at least two dozen accounts that may have been tied to Russia. But the ranking Democrat on the Senate committee, Mark Warner, said Twitter’s explanations of its actions were “deeply disappointing”.

Senator Warner said the evidence provided over several hours by company executives behind closed doors to committee staff members “was frankly inadequate on almost every level”.

The disclosures by Twitter follow Facebook revelations that some 3000 ads were bought by entities with likely ties to Russia.

Twitter said it also provided congressional investigators with a “round-up” of ads from accounts used by Russia’s state-sponsored news network, RT. The company said in a blog post that RT spent $US274,100 on ads targeted to markets in the US last year.

Twitter provided the ads, which came from three handles used by RT, to investigators. Most tweets from the accounts promoted news stories. Twitter said it has worked harder to detect and prevent spam and “malicious automation.”

But many global cybersecurity analysts have a much larger theory about the endgame of the hacking epidemic: They believe Russia is using the Ukraine as a cyberwar testing ground, a laboratory for perfecting new forms of global online combat.

And the digital explosives that Russia has repeatedly set off in Ukraine are ones it has planted at least once before in the civil infrastructure of the United States.

In that shadow of neglect, Russia isn’t only pushing the limits of its technical abilities, says Thomas Rid, a professor in the War Studies department at King’s College London.

It’s also feeling out the edges of what the international community will tolerate. The Kremlin meddled in the Ukrainian election and faced no real repercussions; then it tried similar tactics in Germany, France, and the United States.

Russian hackers turned off the power in Ukraine with impunity, and, well, the syllogism isn’t hard to complete.

“They’re testing out red lines, what they can get away with,” Rid says. “You push and see if you’re pushed back. If not, you try the next step.”

The Australian:

You Might Also Read:

Hillary Clinton’s Cyber Warfare Warning:

US Presidential Election Hacks Revealed:

« NSA Should Thank Edward Snowden
Businesses Get Better At Detecting Insider Threats »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Augur Security

Augur Security

Augur Security (formerly SecLytics) is the only cybersecurity platform using AI-powered behavioral modeling and agentic automation to reliably predict and block threats before they launch.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.