CSCSSCSCSS
CSCSS
Centre for Strategic Cyberspace + Security Science
+855.237.8767 Global[email protected]
CONTACT
 
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • Who We Are
    • About Us
    • CSCSS International
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS
FacebookTwitterInstagramSoundCloudDelicious
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • Who We Are
    • About Us
    • CSCSS International
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS
June 15, 2017Commentary, David SwanBy David Swan

WRITTEN BY

David Swan

Executive Vice President, Defence Intelligence Group, Chair CSCSS Cyber Intelligence Defence Center
Media Queries
Contact Mara Burger Tel:+44 203514178 x 760
  • Contact Sam Jones SVP for External Relations
  • United Kingdom
    +44 203514178
  • Washington DC
    571.451.0312
RELATED
attack black sea conference Botnet Breach calgary canadian institute CEH china cia Commentary course CSCSS cyber cyber attack Cyber Intelligence Cyberlaw Cyber Security Cybersecurity Cybersecurity and Technology Cyber Threats Finance Cyber War DDoS Dyn Dyn Cyber Attack EC council FBI Geopolitics and International Security hack Hacker hackiing Hacking Intelligence internet Interpole maritime security Mirai Malware NSA penetration testing pen test Ransomeware russia Security Strategy webcast Wikileaks
COMMENTARY

Russia: Are they Really That Bad?

July 15, 2017

A lot of people have asked me ‘why can’t we be friends with Russia’ or ‘are the Russians really that bad?’ and ‘why would they hack us like that?’ As a former Naval Officer the answer is obvious to me, but many governments, including my own, have not disclosed details of typical Russian activity. The average person has little or no idea of how Russia interacts with other nations.

PERSONAL BIAS

As a former Canadian Naval Reserve Officer I was deployed almost exclusively in Canadian waters. Despite staying close to home:

  • I know where Russian spy ships patrol near Canadian waters in both the Atlantic and Pacific Oceans;
  • I have encountered Russian ‘merchant ships’ loaded with antennas, engaged in spying;
  • I know where and how the Russian seamen steal fish on both coasts;
  • I know how Russian ships play ‘chicken’ with Canadian warships, risking collision; and,
  • I have encountered Russians that bribed Canadian officials in order to stay in Canadian ports illegally.

I am sure you get the idea. Russians BAD.

The Russian people may be nice, but that is not who I got to meet.

 

WHAT DOES THIS HAVE TO DO WITH HACKING AND CYBER SPACE

Those observations were all things I saw. When we add historical events from the Cuba Missile Crisis to the Russian bombers probing American airspace in recent weeks plus spy scandals such as the Anna Chapman spy ring, there is a consistent pattern of behavior.

As the Internet was being developed in the 1990’s, Russian academics began to study it, speculating on how the Internet could be used. A great deal of effort was spent looking at how information could be used or molded. Depending on who you are, you could call this Information Warfare, Propaganda or simply ‘manipulation’. Regardless of what you call it, Russian Academics were publishing papers on their ideas, including on how the State could utilize this capability, while the future President Putin was a KGB officer.

The KGB was the Soviet Union’s spy agency. They were considered highly skilled by their competitors, meaning the American Central Intelligence Agency and the British MI6. The KGB made a practice of using the spy agencies from Soviet satellite states and/or criminals when it did not want to get caught.

As Russian Internet research continued, they developed a concept called ‘Reflexive Control’ or RC. In brief, Reflexive Control is the idea of providing an opponent with information so they make the decision you want them to make. RC is not propaganda. It is more nuanced, designed to a ect the decision making processes of its targets.

With the ascension of Vladimir Putin to Prime Minister of Russia in 1999 and his subsequent rise to President, democratic reforms in Russia have been progressively rolled back. Industries that were becoming decentralized and competitive found that some companies were prosecuted by the government to be rolled back into monopolies. The people controlling those companies could have been described as ‘Robber Barons’ in another era. A common feature of these “Robber Barons” is that they toed the Government/Putin line and most of them are personally known to the President. It is believed that many of the industrial barons pay President Putin for his support of their business.

 

What is Russia doing Today?

Russia remains a ‘haven’ for hackers. Russia has not signed any extradition treaties, so hackers live and operate in relative immunity – as long as they hack targets outside of Russia. Edward Snowden, the former NSA contractor, fled to Russia to escape prosecution by the United States. There are many individual pieces of malware and ransomware that have Russian roots. Those roots include Russian criminal hacker consortiums such as the ‘Business Club’. The Business Club developed banking malware. One of the reasons they were so successful is that they refined their criminal operation into a series of specialties needed to collect and launder money while evading police. Successors to the Business Club are known as Criminal Unicorns; criminal organizations that have stolen in excess of USD 1 Billion dollars.

There is ample evidence pointing to the Russians having a robust internet organization designed to generate and promote ‘fake news’. There are easily many hundreds of links, possibly thousands of links, between websites, social media accounts and Russian government publishing houses. This is strong evidence that ‘Reflexive Control’ is alive and being practiced by the Russian government.

Did the Russians ‘hack’ the U.S. election? Probably. They almost certainly did their best to exercise their ‘Reflexive Control’ concepts, and steer the election results.

Russia continues to be the source of a lot of malware targeting industries from banking to the electrical grid.

Russia continues to be a haven for hackers such as Edward Snowden and provides support for Julian Assange, as well as home to major criminal hacker groups such as the Carbanak gang.

To confirm everything else, Russian ships and aircraft are again playing the same stupid games I first observed in the 1970’s.

So to answer the original questions: Russia bad. Oliver Stone got suckered by a spy (Vladimir Putin). No, I don’t believe we can negotiate with Russia. Yes, Russian hackers are still after our money. No, I don’t want to make friends with Russia.

I’d bet a lot of money that Russia is doing more and worse things than I know about.

 

David Swan
Director
Cyber Intelligence Defence Centre

MOST RECENT FROM DAVID SWAN

Russian Trolling

on 11 September 2015, by David Swan

Russian Trolling

on 11 September 2015, by David Swan

Russia: Are they Really That Bad?

on 15 June 2017, by David Swan

Russia: Are they Really That Bad?

on 15 June 2017, by David Swan
electioneuropeGeopolitics and International SecurityHackerHackinginternetrussiausa
About the author

David Swan

David Swan is a recognized subject matter expert in Intelligence. He provides Cyber-Intelligence to the CSCSS executive as well speaking and blogging on intelligence issues.

He has authored reports and case studies on cybersecurity, and the relationship to cyber intelligence on the global stages. He has published papers published that include attack analysis, intelligence updates and GeoPolitical analysis.

Related posts
The Canada-China Cyber Agreement Remains Questionable
December 13, 2017
National Security Consultations
June 23, 2017
The Limitation Game
February 25, 2017
Trump: Geopolitics is More than the Art of the Deal
January 18, 2017
NATO-EU: Cybrid Jawfare?
November 18, 2016
Cyber is Scarier than you Think!
October 19, 2016
ABOUT CSCSS
The Center for Strategic Cyberspace + Security Science is a bipartisan, multilateral, international nonprofit organization headquartered in London, United Kingdom. It seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.
CONTACT US
+44 12342134123
  • London UK
    +44 2035141784
  • Washington, D.C, USA
    + 571.451.0312
  • Middle East + Asia Pacific
    +855.237.8767
  • STAY CONNECTED WITH CSCSS
    [email protected]

Find us on:

FacebookTwitterLinkedinInstagramSoundCloud
TRENDING
  • The Canada-China Cyber Agreement Remains Questionable
    December 13, 2017
  • Webinar : Introduction to Cyber Intelligence
    August 30, 2017
  • WOSU Radio Show -Global Security and Warfare
    July 14, 2017
FEATURED PROJECTS + PROGRAMS
© 2015 Center for Strategic Cyberspace + Security Science / CSCSS