Russia’s interference in the 2016 presidential election was an attack on the American people, threatening the integrity and legitimacy of the democratic process, as well as the outcome of the election. And yet, the Intelligence Community Assessment on Russian activity in the election found that this was but the most recent and aggressive expression to date of a longstanding Russian desire to sow chaos and instability in the United States. Russia’s meddling in the 2016 election should be a wake-up call to every American about the diverse ways in which Russian malicious cyberactivity could affect every aspect of their lives.
The so-called information warfare campaign ordered by Russian President Vladimir Putin during the election is part-and-parcel of a longstanding and multi-faceted Russian intelligence strategy that “blends covert intelligence operations—such as cyberactivity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or ‘trolls’” in order to cripple its adversaries. The election is not the first time Russian cyberactors have been successful. Over the past decade, Russian hacking groups—many of which are backed by the government—have successfully deployed a technology-based strategy to infiltrate, tamper with, and steal sensitive information across government, military, banking, and communications systems in the United States and Europe.
The United States remains seriously vulnerable to a range of cybersecurity threats from Russia. If left unchecked, Russian cyberoperations will likely continue to target American institutions, infrastructure, leaders, and citizens. According to former National Security Agency Director Michael S. Rogers, hacking attacks, including those from Russia, are costing the United States “hundreds of billions of dollars” and will lead to “truly significant, almost catastrophic failures if we don’t take action.”
Every American should be deeply concerned about Russia’s attempts to interfere in the 2016 U.S. presidential election, and the potential for Russian actors to interfere with our everyday lives. Below is a sampling of the ways in which Russian groups and individuals are reported to have already attempted to target a variety of U.S. and European institutions, from banking to personal data to government entities.
Banking and finance
Americans rely on banks and financial institutions to protect college savings, retirement accounts, and livelihoods. But U.S. banks and financial institutions have been subjected to numerous attacks by Russian-based hacking groups over the past decade, highlighting key vulnerabilities in the financial security of everyday Americans.
-In May 2015, Russian hackers used malware to target a number of American and international banks, including Bank of America and TD Bank, stealing up to $900 million in one year alone. The full extent to which these malicious Russian programs infiltrated other financial institutions remains unknown.
-The same Russian hackers also reportedly built the largest botnet ever discovered, allowing them to steal login information and password credentials to tens of millions of online accounts, including banking accounts, and costing victims hundreds of millions of dollars.
Personal data
Several hacking schemes have emerged that target personal devices, including phones and computers, in an attempt to obtain sensitive user data and security materials. The examples below illustrate the ways in which Russian hackers exploited programs most Americans use every day in an attempt to gain access to their personal files.
-In February 2015, researchers discovered that Russian hackers had developed iOS malware designed to access users’ personal data on devices with iOS7 software, which at the time still operated on a quarter of iOS devices. Apple sold 130 million iOS devices in 2014 alone, meaning it is possible that millions of these devices could still be affected. In addition to being able to start audio recordings in the background without a user’s knowledge, the malware can collect a user’s text messages, contact lists, pictures, geo-location data, installed app list, process list, and WiFi status.
-In October 2015 and 2016, the same Russian hackers also exploited several zero-day vulnerabilities, or previously unknown software flaws, in Adobe Systems and Microsoft Windows in an attempt to gain access to users’ personal data, which it then used to target other individuals. These attacks occurred with the intent of gaining access to and taking control of individual computers remotely.
Government and military
Russian hacking groups have successfully gained access to a variety of government agency and employee servers. In addition to the threats to national security posed by these attacks, the billions of dollars that are spent by the government to recover from attacks and protect information, particularly classified information, comes out of the pockets of U.S. taxpayers.
The examples below illustrate the dangers posed by the Russian hacking campaign:
-In 2015, a ring of Russian hackers targeted computer servers at the S. Department of State, the White House, and the joint chiefs of staff. As part of the attacks on the State Department and White House, the hackers gained access to highly sensitive information, including details about President Barack Obama’s schedule. Additionally, in the attacks on the email system used by the joint chiefs of staff, the hackers were able to seize control of the system within an hour, allowing them to access the computer credentials of then-Chairman of the Joint Chiefs Martin Dempsey, as well as hundreds of other senior officers. The Pentagon was only able to stop the attack by taking the entire network down. The purpose of the attack was not to spy but to “cause damage and force the Pentagon to replace both hardware and software, which took about two weeks to accomplish.”
Political influence
The Russian government has used different forms of cybercampaigning in an attempt to influence not only American elections, but also to provoke instability by creating feelings of fear and mistrust towards American governance institutions. Russian hackers and trolls have successfully used hacking schemes, propaganda, and well-timed information leaks to achieve their agenda, as evidenced below.
Election and post-election hacks
-In the summer of 2015, two Russian hacking groups accessed the Democratic National Committee, or DNC, network and exposed private information sent over DNC servers. The Office of the Director of National Intelligence, or ODNI, has confirmed that it believes these attacks were designed to influence the outcome of the 2016 election. The hackers then leaked sensitive and private information, which was often misconstrued by the public, in an attempt to discredit the DNC and Democratic presidential candidate Hillary Clinton and help then-Republican presidential candidate Donald Trump.
-In March or April of 2016, Russian hackers also hacked the Democratic Congressional Campaign Committee, or DCCC. As a result, Democratic House candidates around the country fell prey to a Russian influence operation after hackers first released lawmakers’ personal information and later internal party documents, including candidate evaluations.
-Throughout 2016, Russian hackers, who the Federal Bureau of Investigation, or FBI, believes were working for Russian intelligence, infiltrated state voter registration systems in Illinois, Arizona, and Florida. In Illinois, officials claimed that data on fewer than 90,000 people may have been affected. In Arizona, state officials indicated that the hackers were unable to access data in their systems, though U.S. officials indicated that investigators were working on the assumption that hackers were able to access data. And in Florida, federal investigators also indicated that the personal data of Florida voters may have been exposed.
-Following Donald Trump’s electoral success, Russian hackers began targeting individuals associated with liberal think tanks and nongovernmental organizations, or NGOs, in the United States. The security firm Volexity, which investigated the attacks, said that it is likely the attackers were looking for long term access that would give them sensitive information on U.S. policymaking. The Office of the Director of National Intelligence report suggests that national security and foreign policy organizations were the main target, and it argues that the hacking campaign could provide intelligence allowing for future electoral manipulation.
Disinformation campaigns
-In addition to these hacks, the Russian government has been using propaganda groups to target mass media outlets in the United States in an attempt to cause panic and create general feelings of mistrust towards the US government. For instance, prior to and during the election campaign, Russian trolls were likely being paid by the Kremlin to pose as pro-Trump U.S. citizens in an attempt to garner support for the candidate in online forums.
-On September 11, 2014, the U.S. Department of Homeland Security received notice that a chemical plant in Centerville, Louisiana, had exploded. Popular media supported the claim as a YouTube video emerged in which the Islamic State, or IS, took credit for the attack and hundreds of Twitter users spread the news. A fake Facebook account, Louisiana News, reported the story and cited the fake YouTube video as evidence. Authorities quickly discovered the entire event was a hoax, likely playing off of public fear on the anniversary of the September 11, 2001, attacks.
-In December 2014, panic ensued following a fake announcement made on a hacked Yahoo News page that an outbreak of the Ebola virus had occurred in Atlanta and that more than 145 people were infected. The story was supported by a large Twitter campaign and a YouTube video posted showing Centers for Disease Control and Prevention, or CDC, personnel trying to secretly move an Ebola patient. The video was later proven to be faked as well.
International attacks
In addition to some of the attacks on U.S. institutions highlighted here, Russia has carried out many more attacks and influence campaigns around the world, often to devastating effect, as highlighted in the examples below.
-In 2007, following Estonia’s decision to remove and relocate a Soviet World War II memorial statue, hackers unleashed a three-week long wave of cyberattacks on Estonia, disabling the websites of government ministries, political parties, newspapers, banks, and businesses. Cybersecurity experts and Estonian officials identified that many of the internet addresses for the attacks were Russian, and some were from Russian state institutions.
-In 2008, in the lead up to and during the Russian land, sea, and air invasion of Georgia, Russian hackers believed to be backed by the Kremlin carried out coordinated attacks on Georgia’s internet, including attacks on the president’s website as well as communication, finance, and government sites. These attacks effectively blocked communications within the country, preventing citizens from accessing websites for information and instructions as the conflict was underway.
-In 2014, Russia used similar tactics in Ukraine, pairing its invasion of Crimea with cyberassaults on more than 100 government and industrial organizations across Poland and Ukraine, in addition to attacks on the European Commission and Parliament. Since the annexation of Crimea, Russia has continued to launch cyberattacks against Ukraine, targeting military communications, banks, railroads, the mining industry, and the power grid. The cybersecurity firm LookingGlass has dubbed these attacks Operation Armageddon, and have found a correlation between Operation Armageddon attacks and Russian military activity in Ukraine.
Unfortunately, the Europeans have long been the targets of Russian hacking and disinformation campaigns. In addition to the above reports, there is concern that the Russians were spreading disinformation during the recent Brexit vote in the United Kingdom, in addition to working against former Italian Prime Minister Matteo Renzi’s government during the recent referendum on the Italian constitution. There are many other examples of the Russians trying to tip politics their way across Europe. What is particularly alarming about these Russian cybertactics is the fact that Russia is “the only country to date to have combined cyberwarfare with assaults by conventional guns and tanks.” And, as they have had some measure of success using these tactics, it is not likely that Russia will cease using them anytime soon.
Conclusion
Given the examples provided here of Russian hacking, both in the United States and abroad, it is clear that there needs to be a more thorough approach to understanding, preventing, and responding to cyberattacks across all sectors. The United States and Europe are plainly vulnerable to cyberattacks, and as the world continues to become more reliant upon electronic systems, these vulnerabilities will only grow.
In order to better understand the specific attacks outlined here, there must be a deeper investigation into Russia’s cyberabilities, specifically regarding their involvement in the 2016 U.S. presidential election. To better prevent and respond to cyberattacks, U.S. government agencies, as well as other industries such as banking and finance, must develop comprehensive strategies for identifying, preventing, and responding to cyberattacks. It is also important to remember that these attacks are not only against institutions; they are also against ordinary citizens. Even when these attacks directly impact the government, there is a cost to all Americans. Russian hacking is a threat to American democracy and privacy rights. It cannot go unanswered.
About the authors: Michael H. Fuchs is a Senior Fellow at the Center for American Progress. Carolyn Kenney is a Research Associate with the National Security and International Policy team at American Progress. Anna Perina is the Campaign Research Associate for the Center for American Progress Action Fund War Room. Francesca VanDoorn is a policy intern on the National Security and International Policy team at American Progress.
This article was published by the Center for American Progress.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment