We Are In A New Era Of Espionage

Michael Morell, (pictured) the former acting director of the CIA, was asked about the intelligence community’s findings that Russia interfered in the US presidential election. His answer was unequivocal: The country isn’t grasping the magnitude of the story, he told The Cipher Brief. “To me, and this is to me not an overstatement, this is the political equivalent of 9/11.”

Morell’s comments went even further than what members of Congress, mostly Democrats, have been saying for months: that the Russian-directed cyberattacks are an unprecedented attack on American democracy.

In the heat of moment, it’s easy to lose sight of the context around the Russian hacking operation. In spite of the distinctive 21st-century flavor of the digital intrusions, the data breaches that affected Democrats are just a modern example of routine country-on-country spying.

What sets them apart, though, is the high profile of their mark, an American presidential election, and the hackers’ willingness to leak stolen information to influence voters’ opinions. Altogether, it’s perhaps one of the greatest examples of a successful espionage operation in history.

It’s useful to think of the operation as two distinct parts, says Vince Houghton, the International Spy Museum’s historian and curator. The first part, intrusions into the computer systems of the Democratic National Committee and the personal email of Hillary Clinton’s senior campaign manager, John Podesta, was intelligence-gathering, plain and simple.

It’s the sort of activity that every spy agency in the world engages in on a routine basis. Once, this required rifling through others’ mail; later, as technology progressed, it involved tapping phones, and now, it can be done with a well-crafted phishing email.

The second part can be thought of as an enormous, state-on-state doxing-operation. Instead of sitting on the information stolen from the Democrats and using it to inform its policy positions and predict the US government’s moves and motives, the Kremlin appears to have gone one (giant) step further, releasing that information into the wild.

The US intelligence community has determined that publishing hacked documents through WikiLeaks, DCLeaks.com, and Guccifer 2.0 is “consistent with the methods and motivations of Russian-directed efforts.” NBC News and ABC News reported that Russian President Vladimir Putin was personally involved in directing the operation.

This is where things start to wander into uncharted territory, according to Houghton and Gordon Corera, the BBC’s security correspondent and the author of the espionage-history book, Cyberspies.

The release of the surreptitiously gathered information, either to tip an election in one direction or just to sow disorder, is novel, especially in the context of American elections. During the 2008 and 2012 cycles, political campaigns came under cyberattack, but if anything was stolen, it was never shared with the public.

Despite the unique nature of this intervention, the 2016 cyberattacks square with Russian intelligence techniques reaching as far back as the Cold War.

It’s an evolution of the Soviet Union’s “active measures,” a tactic favored by the KGB that involved covertly spreading politically damaging fictions in order to seed discord in an enemy.

Given the CIA’s history, it’s not a stretch to assume that the agency is regularly taking covert action overseas, including around elections. Shortly after the CIA was established in 1947, its agents poured money, propaganda, and even threats into Italy during its national elections, for example, in order to keep communist-aligned politicians from coming to power.

In 1953, the CIA teamed up with its British counterpart, MI6, to overthrow Iranian Prime minister Mohammed Mossadegh and reinstate the Shah, who had been pushed out of power. And in the years since, it’s intervened repeatedly in other countries’ affairs.

Part of the reason Russia’s alleged meddling this year seems so shocking is because the tables have turned. “We’ve bought and sold elections in the past,” says Houghton. “But now it’s happening to us, and, as an American, that’s different to me.”

Even if Russia did aim to help Trump win the election, it’s not clear how big a role the publication of the stolen documents played in swaying voters. But the intrusions certainly created confusion and chaos, and that may be just as useful to the Kremlin. Internal fractionalisation could distract the US and allow Russia to act even more boldly on the international stage without fearing American repercussions.

“Here, you have an information campaign that’s now pitting the CIA against the FBI, Democrats against Republicans, even Republicans against Republicans. This is perfection. Perfection!” exclaimed Houghton. “It’s just right out of the playbook.”

At this point, there’s no indication, beyond unsubstantiated claims from outgoing Senate Democratic Leader Harry Reid, that the Trump campaign coordinated with Russia, even if it benefited from its actions. The details about Russia’s aims aren’t entirely clear, because the CIA has found itself at odds with the FBI over its assessment that the Kremlin tried to help Trump out.

One of the key elements of the CIA’s determination, the claim that the Republican National Committee was hacked, too, but that Russian leaders chose not to leak any of that information, is beginning to look more likely. If it turns out to be true, the Trump administration may find itself in a bind going forward.

More information about the cyberattacks is forthcoming: President Obama ordered a review of election-related hacking, and Congress is launching multiple investigations into the developments as well.

Unless the probes turn up obvious evidence of collusion between Trump’s team and the Russian hackers, it’s unlikely the president-elect will face any repercussions. The reviews will, however, help inform how high-profile cyberattacks will be treated in the future. President Obama reportedly chose not to respond forcefully to Russian hacking, preferring instead to rebuke Putin in private on the sidelines of at a Group of 20 summit in China, The New York Times reported.

So far, it appears that Russia has gotten away with meddling in a US election. That may send a message to other countries that the US won’t lash out after it comes under cyberattack if it’s not politically convenient to do so. But it may also be that the US government just chose not to retaliate in a public way.

The uncertainty surrounding cyberwar norms has a lot to do with how new the phenomenon is. Houghton compared it to the advent of nuclear weapons, when members of Congress struggled to grasp the impact the nuclear age would have on diplomacy and war. Eventually, Houghton said, we’ll look back on 2016 to try and understand the beginnings of the era defined by online warfare.

“This is going to be something that we’ll study for a long time,” he said.

DefenseOne:           Yes, Russia Weaponised Social Media In The US Elections:

 

« Healthcare Data Breaches In 2017 Will Get Worse
Decent Broadband 'denied' To Millions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

Secucloud

Secucloud

Secucloud GmbH is a provider of high-availability cyber-security solutions, offering a cloud-based security-as-a-service platform, particularly for providers.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

OCM Business Systems

OCM Business Systems

OCM are experts in the safe, secure and responsible disposal of IT & EPoS assets.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.