海角大神

Modern field guide to security and privacy

In aftermath of the DNC hack, experts warn of new front in digital warfare

Last month's Democratic National Committee leaks underscore the value of data in the hands of nations, hacktivists, and terrorists.

|
Maxim Zmeyev/Reuters
A view of the Kremlin in July through a construction fence

Cybersecurity experts and US officials often point fingers at Moscow after digital attacks that cause a political stir 鈥 from last year's Ukraine grid hack that led to a widespread power outage to the听Democratic National Committee data breach.

But if the Kremlin is indeed behind the DNC hack and helped orchestrate the subsequent WikiLeaks dump of sensitive emails on the eve of the Democrats' convention, Russia has opened a new front in information warfare that may fundamentally change the value of data in national security.

"This is what cyberconflict actually looks like," says James Lewis, a senior fellow at the Center for Strategic and International Studies (CSIS), a Washington think tank. 鈥淭he problem in the US is we鈥檙e very militarized, so we tend to think about attacking infrastructure. The Russian approach is much more political and about trying to manipulate public opinion."

While WikiLeaks founder Julian Assange did not confirm or deny that Russian hackers turned over the DNC email, many cybersecurity and political experts have听.

If the leak originated in Moscow, it would be among the first known听state-backed digital attacks to harness the power of the internet with the aim of manipulating a US presidential election.听

"We鈥檙e very used to seeing hacktivists grabbing and spilling information to build up their hacker cred," said Scott Donnelly, an analyst at the cybersecurity firm Recorded Future. 鈥淭his is very different because this is very likely a nation-state taking information and spilling it. That鈥檚 not something that鈥檚 been done."

From the 2014 Home Depot hack that compromised millions of credit card numbers to last year's听massive听Office of Personnel Management breach that exposed vast amounts of sensitive information belonging to听government employees, the frequency and severity of data breaches only seems to be worsening.听

But instead of replicating the typical hacking or digital spying playbook, the DNC hack is more听akin to a tactic of Islamic State supporters who publish lists full of Americans鈥 names and personal information or North Korea-backed hackers who breached Sony Pictures in 2014 to force the cancellation of a movie criticizing North Korean leader Kim Jong Un.

It's more about exposing information 鈥 even if it's already public or seemingly听innocuous on its own 鈥 to create an instrument for propaganda, terror, or sewing discontent.听

"The world we live in has gone from a cybersecurity crisis where an adversary can steal your data to one where the adversary can become telepathic," says Tom Kellermann, chief executive at Strategic Cyber Ventures, a firm that invests in cybersecurity startups. "They鈥檙e trying to change hearts and minds now through stolen data."

It also appears Moscow is increasingly relying hacking to fulfill an ambitious global agenda 鈥撎齛nd undercut the US.听

Last summer, the cybersecurity firm Trend Micro warned the US government that suspected Russian hackers targeted the personal data of 2,600听people听considered among the most influential in Washington. And in May, Germany鈥檚 national intelligence service said Russian hackers were behind a massive breach of the country鈥檚 parliament and ruling party. The cybersecurity firm听Arbor Networks tied听a string of cyberattacks intended to听听in Ukraine鈥檚 2014 election to听CyberBerkut, a pro-Russian hacktivist group.

"A lot of us think it was a test case to see what they could actually get away with," says Vince Houghton, the curator at the International Spy Museum and a historian who specializes in technological intelligence.听"They鈥檝e been practicing this for a little while."

Intelligence experts and security investigators have also previously blamed Kremlin-backed hackers for breaking into unclassified听听and State Department.

But former military intelligence analyst-turned-journalist James Bamford this week that the information leaking tactics allegedly used by Russia mirrored US espionage tactics in the Cold War, including President Harry S. Truman's so-called "Campaign of Truth" aimed at publicly smearing the Soviet Union through snooping and infiltration.听

Dr. Houghton also cited Italy's 1948 presidential election, when he said the CIA and State Department helped Rome's Western-friendly government defeat the insurgent听communists. "This is what intelligence agencies do," he said. 听

Yet, there are few comparable examples in the Digital Age.

WikiLeaks first听听known for leaking hundreds of thousands of sensitive State Department diplomatic cables and video footage of US soldiers killing civilians in Iraq.听Now, experts say that governments have figured out how to use WikiLeaks to their own advantage. And the US, appears to be struggling to cope with that dynamic.

鈥淭hat鈥檚 something that we need to do our homework on,鈥 said Mr. Lewis of CSIS. 鈥淚t鈥檚 not a war and it鈥檚 not military, but you have to punch back.鈥

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to In aftermath of the DNC hack, experts warn of new front in digital warfare
Read this article in
/World/Passcode/2016/0810/In-aftermath-of-the-DNC-hack-experts-warn-of-new-front-in-digital-warfare
QR Code to Subscription page
Start your subscription today
/subscribe