Academia.eduAcademia.edu

Hacks, leaks and disruptions Russian cyber strategies

What is the relationship between cyber activities conducted by Russia at home and abroad? What role do cyber operations play as an instrument of Russia’s coercive diplomacy? How different is Russia from other cyber powers, and how do we know for sure if the Kremlin is behind certain cyberattacks that have been attributed to it? This Chaillot Paper examines these and other key questions as it explores how Russia’s increasingly assertive behaviour in cyberspace has lent new urgency to the debate about cybersecurity in the West. It focuses on what lessons EU member states have learned from recent events, and on how the EU and NATO have responded to these cyber challenges on the diplomatic, political and security fronts. The paper argues that Russia’s aggressive use of cyber tools has led the US and many Europeans states to adopt more defensive cyber strategies, and that as a result Russia may have lost the strategic advantage it has hitherto enjoyed in what is becoming an ever-more contested domain.

CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture 1 Russia’s approach to cyber: the best defence is a good offence 2 Russia’s trolling complex at home and abroad 3 Spotting the bear: credible attribution and Russian operations in cyberspace 4 Russia’s cyber diplomacy 15 Andrei Soldatov and Irina Borogan 25 Xymena Kurowska and Anatoly Reshetnikov 33 Sven Herpig and Thomas Reinhold 43 Elena Chernenko Case studies of Russian cyberattacks 5 The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine Piret Pernik 53 6 Russian cyber activities in the EU 7 Lessons from the Macron leaks 8 The next front: the Western Balkans 65 Jarno Limnell 75 Jean-Baptiste Jeangène Vilmer 85 Oscar Jonsson EU and NATO approaches to cyber threats 9 10 NATO’s responses to cyberattacks 95 Siim Alatalu Protecting and defending Europe’s cyberspace 103 Patryk Pawlak Conclusion: Russia – from digital outlier to great cyberpower 115 Nicu Popescu and Stanislav Secrieru Annex Abbreviations 123 Notes on the contributors 125 Executive summary Russia’s increasingly hostile activities in the cybersphere have lent new urgency to the cybersecurity debate in the West. However, how Russia thinks about cyberspace and exactly what Russia gets up to in this realm is for the most part shrouded in opacity. This Chaillot Paper traces the evolution of Russia’s coercive and diplomatic approaches in the cyber field, examines in detail the instances of cyberattacks that Russia is believed to have conducted in Europe, and explores how states and organisations (in particular the EU and NATO) are adapting to the growing number of cyber intrusions and operations orchestrated by Russia. The Russian cyber challenge is not new. The first known cyberattacks initiated by Moscow against the US military date from 1986 at least. At the time, the Soviet Union, working in collaboration with the East German secret services, acted through West German cyber proxies. Realising the value and the low cost of remotely-conducted cyber intrusions, Moscow sought to overcome its ‘cyber-laggard’ status already in the 1990s, and despite the economic crisis afflicting the country at that time began to develop a sophisticated arsenal of cyber espionage tools. The roots of Russia’s global cyber power lie in its expertise in intelligence gathering as well as in Russian domestic politics. From the early 2000s Russia invested in cyber capabilities to combat Chechen online information campaigns as well as to monitor, disrupt or crack down on the online activism of various Russian opposition groups and independent media. This is when snooping and (dis)information campaigns were coordinated in a systematic way for the first time; trolls and bots were deployed; and the patterns of cooperation between the Russian state and proxy cyber-activists, or ‘patriotic hackers’, as Vladimir Putin once called them, started to develop. This modus operandi was created domestically, but from the late 2000s and early 2010s started to be applied internationally as well. In parallel with numerous hostile acts in cyberspace Russia has been active since the early 2000s in multilateral and regional forums on cybersecurity issues, aspiring to become a norm-setter in this domain. Moscow’s initiatives on the multilateral level have not paid off however. The diverging understanding of what cybersecurity means for Russia and the West partially explains why Moscow’s norm-setting attempts have failed so far. Whereas Russia sees information security and state control of the internet as a priority, Western countries are primarily concerned with the security of personal data and defence of their critical infrastructure. 5 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Russia’s cyber diplomacy has gone hand-in-hand with increasingly assertive behaviour in cyberspace. Quite a number of countries have ended up on the receiving end of Russian cyberattacks, some of them designed to sabotage physical infrastructure (e.g. Georgia, Estonia, Ukraine, Montenegro), and some designed to feed into information campaigns during election periods or at times of heightened diplomatic tensions with Russia (e.g. the US, France, the UK.) International organisations have also been targeted, including the World Anti-Doping Agency (WADA) and more recently the Organisation for the Prohibition of Chemical Weapons (OPCW). And yet all this begs the question: how do we know that Russia is the culprit? While it is true that covering your tracks and conducting false flag operations in the cybersphere is easier than undertaking military false flag operations in the real world, and therefore that Moscow might have been ‘framed’ by adversaries, plenty of indicators point to Russia nonetheless. To begin with, some attacks are so sophisticated and persistent that they are obviously not the work of criminal hackers in search of a quick cyber buck: it is clear that major actors, primarily states, are behind them. This premise often reduces the list of suspects to a rather short one. Moreover, cyber forensics and counter-intelligence activities make it possible to detect bits of code reused in various signature attacks, track hacking groups and establish more precisely the circle of perpetrators. In addition, language, geolocation, details pertaining to the actual times when the hackers were active online, or the stratagem of drawing attackers to ‘honey pots’ and ‘beacons’ (systems and information deliberately planted in order to monitor and track them or even hack them back), have all been used to trace specific cyber intrusions and attacks back to government-affiliated hackers. That is how meticulous cyber forensic investigations relying on the tools described above helped to identify Russia’s two most capable hacking teams: APT28 and APT29. Russia’s cyberattacks have elicited a variety of responses. There have been instances when Western intelligence hacked the Russian hackers themselves, watching in real time how they conducted attacks. In Russia senior intelligence officials working on cyber were arrested for alleged cooperation with Western intelligence agencies. There have been pre-emptive responses to anticipated Russian hacks as well. The French handling of the ‘Macron leaks’ demonstrates how cyberattacks and disinformation operations were successfully deflected by feeding fake documents to the hackers containing deliberately far-fetched and ridiculous information designed to undermine the credibility of the leaks when they subsequently dumped the information online. This pre-emptive response also envisioned engaging the mainstream media to limit the publicity given to the results of criminal hacking activity in cases where there were no major public interests at stake; and ‘naming and shaming’ media outlets that propagate leaks such as Sputnik and RT. All of the above has significant implications for Russia. The country is undoubtedly one of the world’s great cyber powers. It has extremely sophisticated capabilities, and has integrated cyber tools in its foreign and security policy much more extensively than have other international players. But it must be remembered that Russia has achieved this in a context in which many international actors traditionally had something of a laissez-faire approach to cybersecurity, and certainly under-invested in cyber defence 6 Executive summary as a whole, and against cyber threats emanating from Russia specifically. Russia has inadvertently changed this state of affairs, possibly to its own detriment. Russian state cyber actors, but also private companies operating in the cybersecurity field, are now routinely treated with suspicion. The high-profile publicity that Russia has received in recent years as a result of its cyber operations has also spurred NATO and the EU to invest much more intensively in cybersecurity, which is likely to result in an escalation of defensive cyber activities vis-à-vis Russia. It has also led the US and many European states to adopt more assertive cyber strategies. Therefore it may be inferred that Russia’s strategic ‘cyber holiday’ is now over, and that we have entered a new, much more contested phase of cyber geopolitics where the great cyber powers will henceforth adopt a more aggressive, ‘gloves-off’ approach. 7 Introduction: Russia’s cyber prowess – where, how and what for? Nicu Popescu and Stanislav Secrieru On 10 September 1986, Cliff Stoll, a systems administrator at the Lawrence Berkeley National Laboratory in California, called Chuck McNatt at the computer centre of the Anniston Army Depot in Alabama to inform him that a hacker called ‘Hunter’ was breaking into his computer systems. The hacker wanted to extract information from the US Army Redstone Rocket test site on US missile tests related to President Ronald Reagan’s flagship Strategic Defence Initiative, nicknamed ‘Star Wars’. This was one of the first known cyber espionage operations engineered by Moscow, in cooperation with East Germany, against the US military. The hunt for ‘Hunter’ started as a quest to find out who (or what accounting error) generated a 75-cent shortfall, for 9 seconds of phone use, in the Laboratory receipts for computer use by other departments. Lax security practices at the time even in the military establishment meant that computer systems and networks were easy targets for hackers. Users of computers in the inner sanctum of the US military often simply used the word ‘password’ as their password. The CIA, FBI and NSA had not really dealt with hacking before. Intelligence officials were keen to be informed by Stoll, but it was unclear under what department’s jurisdiction such hacking activities fell. US intelligence finally got their act together, and three years later, in 1989, tracked the hackers down and in cooperation with the West German authorities arrested five culprits in and around Hanover. Among them was Hanover University physics student Markus Hess who had teamed up with several other hackers to collect sensitive information which was later sold to the KGB in exchange for $54,000 and quantities of cocaine. The hackers managed to attack 450 US military computers, and supplied the KGB with thousands of pages of printouts of US classified documents, passwords for US military computers, and details of the hackers’ own methods and techniques: how to break into specific (Vax) computers, which networks to use, as well as information on how military networks operated.1 1. Clifford Stoll, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage (New York: Pocket Books, 1989,) 267-366; John Markoff, “West Germans Raid Spy Ring That Violated U.S. Computers”, New York Times, March 3, 1989, https://www. nytimes.com/1989/03/03/world/west-germans-raid-spy-ring-that-violated-us-computers.html; Testimony on Hacking by Cliff Stoll, C-Span, May 15, 1989, https://www.c-span.org/video/?c4594226/epic-testimony-hacking-cliff-stoll-1989 9 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES This case represented a breakthrough in two important ways. On the one hand, it ushered in a new era of cheaper, safer and easier espionage, in which the Soviets turned US technological superiority into a vulnerability. On the other hand, this episode was remarkable for culminating in successful attribution and subsequent arrests. The investigators tracked the hackers by setting up a ‘honeypot’ – thousands of pages of fake documents featuring SDI (Strategic Defence Initiative) in their title were used as a bait to lure the hackers to spend more time online, thereby allowing law-enforcement agencies to track the hackers and ultimately catch them ‘red-handed’. Since then passwords have become more complex, cyber has become a mainstream concern, while cyber operations masterminded by Moscow are forcing businesses, militaries, politicians and diplomats in Europe and North America to scratch their heads in search of effective counter-strategies and responses. This Chaillot Paper seeks to shed some light on the less salient aspects of the current debate on the cyber threats faced by the European Union and its member states. Russia is not the only source of cyber threats with which Europe has to contend. There are plenty of other malicious (state and non-state) cyber actors, such as China, Iran, North Korea, organised crime syndicates and terrorist groups active in the cyber domain. The US, Israel and many European states are also highly active in cyberspace, a realm which has become crucial to ensure national security. All of the above players have their own specialisations, niche capabilities and motives, and each deserves to be examined in their own right. But this Chaillot Paper will only focus on Russia, partly because it constitutes an interesting case of a major power where the cyber component is well integrated in domestic politics as well as in the country’s foreign and security policies. Moreover Russia uses a whole panoply of cyber activities – espionage, cyber surveillance, ‘simple’ and sophisticated hacking operations, magnified through pro-active social media and diplomatic campaigns – to advance its interests as part of a larger ‘hybrid warfare’ strategy. This makes Russia more of a priority for European political leaders and publics than other cyber players. The challenge for Europe is certainly twofold. On the one hand it is vital to understand what is going on at the technical level, but it is also necessary to be able to decipher the political thinking and the strategies behind cyber developments in Russia, as well as to gauge to what extent Russia’s use of cyber tools in its foreign and security policy has been successful. This paper seeks to provide relevant insights by addressing several clusters of questions. One such cluster concerns Russia itself: what is the role of cyber in Russian domestic politics and what is the relationship between cyber activities conducted at home and abroad? How is Russian cyber diplomacy evolving? How different is Russia from other cyber powers? Is Russia in any way distinctive or unique as a cyber actor on the global stage? How do we know for sure if Russia is behind certain attacks? And is credible attribution possible at all? The second cluster of questions deals with the numerous cyberattacks in Europe that have been attributed to Russia. How has use of cyberattacks evolved from the cases of Estonia and Georgia to Ukraine, France and the Western Balkans? How aggressive 10 Introduction: Russia’s cyber prowess – where, how and what for? or, on the contrary, self-restrained has Russia been? The third cluster of questions concerns what lessons EU member states have learned, and in particular how the EU and NATO have been responding to these cyber challenges on the diplomatic, informational, political and security fronts. 11 Russia’s cyber posture chapter 1 Russia’s approach to cyber: the best defence is a good offence Andrei Soldatov and Irina Borogan In the centre of Moscow, on the corner of Lubyanka Square and Myasnitsky Street, stands a rather forbidding-looking building that was once the KGB’s computing centre. Today it houses the Information Security Centre of the Federal Security Service (FSB). The centre, which is the chief cyber branch of the Russian security service, was initially responsible for protecting computer networks and tracking down hackers, but in recent years its remit has been greatly expanded. Its activities now go beyond just protecting the government’s IT networks but also encompass closely monitoring the internet and the media as well as operations overseas. This reflects how far the thinking of the Russian secret services and the Kremlin’s approach to cyber in domestic and foreign policy has evolved since 2000. This chapter will first show how cyber tools were developed to address national security threats and to contain and constrain the opposition. The analysis then explores how the very tactics developed for tackling domestic problems migrated into Russia’s foreign policy toolbox. It will look in particular at how Russia’s penchant for cyber warfare spilled over into US-Russia relations. The concluding part of the chapter will examine the costs of Russia’s cyberwarfare and anticipate future developments in this domain. The roots of Russian cyber policy In 2000, when the brutal military campaign that would become known as the second Chechen war was in full swing, not only the army and secret services, but also the Russian population at large, needed to be convinced why this time the outcome would be different from the first Chechen War, which ended disastrously for the Kremlin when Moscow was forced to withdraw its troops from the rebellious republic. In short, they wanted to hear from the recently installed Russian president, Vladimir Putin, what went wrong then and how it could be fixed. 15 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Vladimir Putin readily offered his explanation, which shifted the blame for military defeat onto the shoulders of independent journalists, thereby betraying deep mistrust of and antagonism towards a free media. The reason, he asserted, was that in the mid-1990s liberal Russian journalists and their foreign counterparts had undermined the war effort.1 The media and other independent sources of information on the conflict therefore needed to be brought under tighter control. This became a key precondition for winning the second Chechen war.2 Thus, the Kremlin developed a new view of the nature of information – and decided to treat it as a weapon.3 In a rare moment of frankness, Sergei Ivanov, the head of Russia’s Security Council who would later become the minister of defence, declared that ‘one must admit the obvious fact that along with the real fighting [in Chechnya] there is a virtual war underway, a media war […].’4 And the Kremlin was determined not to be a passive observer in this information conflict. The problem was addressed at all levels. At the operational level, the war was rebranded as a ‘counterterrorism operation’ and the rules regarding media coverage of ‘counterterrorist activities’ were tightened.5 The accreditation rules for local journalists were made more stringent in violation of existing legislation, while access to Chechnya for foreign journalists was severely curtailed. In less than two years, most Russian media outlets were forced to fall in with the government line – those who did not were subjected to sackings, hostile takeovers and criminal investigations.6 The seizure of the NTV channel which led to a purge of management and an exodus of reporters is the most glaring example of the Kremlin’s campaign to subdue the stillindependent press in the early 2000s.7 On the conceptual level, in 2000 Vladimir Putin signed the Information Security Doctrine, the first policy document of its kind. It itemised an unusually broad list of threats, ranging from the ‘degradation of spiritual values’, to the ‘weakening of the spiritual, moral and creative potential of the Russian population’, as well as the ‘manipulation of information (disinformation, concealment or misrepresentation).’8 It also identified one major source of threat as ‘the desire of some countries to dominate and encroach on the interests of Russia in the global information space.’9 1. See Putin’s interview to the First Channel in 2000. Available on YouTube: https://www.youtube.com/watch?v=ptOEMK5uYQQ 2. “Russia’s Media War Over Chechnya,” BBC, November 19, 1999, http://news.bbc.co.uk/2/hi/world/monitoring/528620.stm 3. See, for instance, the article “Information as a Weapon” published by a pro-Kremlin military expert Alexander Khramchikhin in Nezavisimaya Gazeta, February 13, 2015. 4. David Hoffman, “In Chechnya, Russia Is Also Fighting a Propaganda War,” Washington Post, January 25, 2000, https://www.washingtonpost.com/archive/politics/2000/01/25/in-chechnya-russia-is-also-fighting-apropaganda-war/905c6e0a-1eca-4516-ad84-40a2dcf0ddbe/?noredirect=on&utm_term=.f b36b5ce75af 5. Laura Belin, “Russian Media Policy in the first and second Chechen campaigns,” Paper presented at the 52nd conference of the Political Studies Association, Aberdeen, Scotland, 5-8 April 2002, https://www.infoamerica.org/documentos_pdf/rusia.pdf 6. Ibid. 7. Yevgeny Kiselyov, “The Seizure of NTV 10 Years On,” Moscow Times, April 20, 2011, https:// themoscowtimes.com/articles/the-seizure-of-ntv-10-years-on-6453 8. Russian presidential decree no. 1895, “Doktrina informationnoi bezopasnosti Rossiiskoi Federatsii” [Doctrine of Russian Information Security], September 9, 2000, http://base.garant.ru/182535/ 9. Ibid. 16 Russia’s approach to cyber: the best defence is a good offence These were the rules of engagement as designated by the Kremlin: content generated by journalists and media outlets not under the state authorities’ control could present a threat to the national security of Russia – meaning the political stability of the regime. This included the internet from the very beginning – as early as in 1999 the Russian foreign ministry helped to draft a resolution for the UN General Assembly that warned that information disseminated on the internet could be misused for ‘criminal or terrorist purposes’ and could undermine ‘the security of States.’10 In the Kremlin’s discourse about the internet, the terms ‘information security’, ‘information wars’, and ‘information warfare’ became pervasive. According to one academic researcher, ‘in December 2013 the keyword “information warfare against Russia” in Russian generated more than 700,000 posts in Google and more than 4,000 videos in YouTube.’11 The discourse has been matched by some institutional reshuffling. The cyber intelligence department of the FSB was renamed the ‘Information Security Centre’ (ISC) in 2002 – prior to that it was known as the Directorate of Computer and Information Security (UKIB). Use of such language (‘information security/warfare’ etc) started a global rift between Russian and Western cyber government experts: while the Russians insisted on talking about information warfare, meaning state control of media content, Western experts wanted to talk only about cyberwarfare, which is mostly about protecting a nation’s critical digital networks.12 In the early 2000s, the main players established themselves globally in the cyber arena. In Russia, those were the Russian secret services – the FSB’s Information Security Centre and the Russian electronic intelligence agency, known as the Federal Agency for Government Communications and information (FAPSI) until it was largely absorbed by the FSB in 2003. The generals who ran FAPSI/FSB defined the rules – they wrote the Information Security Doctrine as they dominated the information security branch of Russia’s Security Council. In the US, the first document of this kind (much narrower in its scope than its Russian counterpart), entitled ‘National Policy on Telecommunications and Automated Information Systems Security’ (NSDD-145), was drafted by officials in the Defence Department.13 However, the Russian military, which experienced a sharp drop in budget allocations in the 1990s and a corresponding decline in prestige, did not have much say in cyber affairs until 2013 when the ministry of defence announced plans to create its ‘cyber troops’,14 probably one of the lessons drawn from Russia’s war with Georgia in 2008. 10. United Nations General Assembly, “Resolution on Developments in the Field of Information and Telecommunications in the Context of International Security,” January 4, 1999, http://www. un.org/ga/search/view_doc.asp?symbol=A/RES/53/70&referer=/english/&Lang=R 11. Ieva Berzina, “The Narrative of ‘Information Warfare against Russia’ in Russian Academic Discourse”, Journal of Political Marketing, 17, no. 2 (2018): 162. 12. Pasha Sharikov, “Understanding the Russian Approach to Information Security,” ELN, January 16, 2018, https://www. europeanleadershipnetwork.org/commentary/understanding-the-russian-approach-to-information-security/ 13. Fred Kaplan, Dark Territory. The Secret History of Cyber War (New York: Simon and Schuster, 2016), 1-20. 14. “V Minoborone RF sozdali voiska informatsionnih operatsii” [Russia’s Ministry of Defense set up information troops], Interfax, February 22, 2017, http://www.interfax.ru/russia/551054 17 1 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Internationally, the Kremlin’s approach was defined by the FSB generals at the Security Council (the group led by Vladislav Sherstyuk)15 and the foreign ministry’s Department for New Challenges and Threats (headed by the Kremlin’s special envoy on cybersecurity, Andrey Krutskikh). Intellectual support was provided by Moscow State University’s Information Security Institute, a think tank founded and led by Sherstyuk. However, as things unfolded, it became clear that these state actors presented only the official façade of the Kremlin’s approach to cyber issues. When in the early 2000s the Kremlin was busy clamping down on the media, the Russian secret services were faced with a formidable challenge: pro-Chechen separatist and islamist websites were still functioning. Chechens maintained servers outside Russia and, despite the Kremlin’s best efforts, some Western governments refused to shut the sites down.16 Then, in January 2002, a popular Chechen website affiliated with rebels (www.kavkaz. org) was closed down. It had been attacked by hackers, students in the Siberian city of Tomsk. The local branch of the FSB, the Russian secret police, enthusiastically supported the students’ actions, defending them as the legitimate ‘expression of their position as citizens, one worthy of respect’.17 Outsourcing cyber warfare The attack heralded a new approach. The Kremlin began to outsource hacking operations and cyberattacks to a network of informal actors – activists, criminal groups and possibly even legitimate cyber tech firms. Resorting to this tactic allowed Russia to create plausible deniability and lower the costs (including in reputational terms) and risks entailed by controversial overseas operations.18 Sometimes these actors have been aided and abetted by the secret services – as was clearly the case when the hidden videos and phone conversations of Russian opposition leaders were leaked and widely circulated by informal groups between 2010 and 2016.19 In other cases, government support was much more difficult to detect (at least in the short term) as the Kremlin managed to hide all possible traces which might connect perpetrators with the Russian state. That was the case of the infamous attack on Estonian websites in 2007. On 27 April of that year, Russian hackers attacked the 15. Vladislav Sherstyuk, originally a KGB officer who by the 1990s had become head of the obscure and powerful Third Department of the Federal Agency for Government Communications and information (FAPSI), in charge of spying on foreign telecommunications; in 1998, he was appointed director of FAPSI, and in the 2000s he moved to the Security Council. 16. “Chechen Rebel Website Reopens,” BBC, October 8, 2004, http://news.bbc.co.uk/2/hi/europe/3727266.stm 17. Andrei Soldatov and Irina Borogan, The New Nobility: The Restoration of Russia’s Security State and the Enduring Legacy of the KGB (New York: Public Affairs, 2010), 231. 18. “Russia Denies U.S. and UK Allegations of Global Cyber Attack,” Moscow Times, April 17, 2018, https:// themoscowtimes.com/news/russia-denies-us-and-uk-allegations-of-global-cyber-attack-61195 19. “Kremlin Accused of Opposition Phone Call Leaks,” BBC, December 20, 2011, https://www.bbc.com/news/av/worldeurope-16279131/kremlin-accused-of-opposition-phone-call-leaks; “Navalny’s Private E-Mails Leaked,” Moscow Times, October 27, 2001, https://themoscowtimes.com/news/navalnys-private-e-mails-leaked-10439; “Mikhail Klikushin, Former Russian Prime Minister Caught on Camera Having Sex With Opposition Leader,” Observer, May 4, 2016, http:// observer.com/2016/04/former-russian-prime-minister-caught-on-camera-having-sex-with-opposition-leader/ 18 Russia’s approach to cyber: the best defence is a good offence websites of the Estonian government, parliament, banks, ministries, newspapers, and broadcasters (for more on this, see chapter 5 in this volume on ‘The early days of cyberattacks’, pp. 53-64). Estonian foreign minister Urmas Paet accused the Kremlin of having orchestrated the cyberattacks.20 But Estonia failed to present proof of the Russian government’s involvement, and in September 2007 the country’s defence minister admitted that did not have sufficient evidence to link the attacks to the Russian government.21 However, two years later the plausible deniability cover was blown. In May 2009, Konstantin Goloskokov, one of the activists of the pro-Kremlin Nashi movement (which received state funds), admitted to the Financial Times that he was behind the series of cyberattacks on Estonia in 2007.22 It is not clear why he confessed, but his interview represents circumstantial evidence that via Nashi (which also in 2007 conducted a harassment campaign against the UK’s ambassador in Moscow until it was called off by Russian officials23) the Kremlin was indeed behind the cyber assault on Estonia. The apparent low costs/low risks of such operations paid off. The cyberattacks in Estonia worked, the operation was not costly and Russia was able to claim (for two years at least) plausible deniability. The success of Russia’s cyber warfare strategy is due to two main factors. First, these days Russia’s coercive foreign policy includes an aggressive cyber component: examples include denial-of-service attacks on neighbouring countries as a punishment for actions regarded as running counter to Russian interests;24 the leak of an intercepted phone conversation between Victoria Nuland, the Assistant Secretary of State for European and Eurasian Affairs, and the US ambassador to Ukraine, which then provoked tensions between the US and Europe during the Maidan protests in Kyiv;25 trolling international media to promote Russia’s view on the conflict in Ukraine;26 the hacking of a power plant in Ukraine in 2015;27 and alleged meddling in the US election in 2016.28 20. “Russia Accused of ‘Attack on EU’,” BBC, May 2, 2007, http://news.bbc.co.uk/2/hi/europe/6614273.stm 21. Adrian Blomfield, “Russia Accused over Estonian ‘Cyber-Terrorism’”, The Telegraph, May 17, 2007, https:// www.telegraph.co.uk/news/worldnews/1551850/Russia-accused-over-Estonian-cyber-terrorism.html 22. Charles Clover, “Kremlin-backed Group behind Estonia Cyber Blitz,” Financial Times, March 12, 2009, https://www.ft.com/content/57536d5a-0ddc-11de-8ea3-0000779fd2ac 23. Luke Harding, “Pro-Kremlin Group Told to Stop Harassing British Ambassador”, The Guardian, January 18, 2007, https://www.theguardian.com/world/2007/jan/18/russia.lukeharding 24. Ian Traynor, “Russia Accused of Unleashing Cyberwar to Disable Estonia,” The Guardian, May 17, 2007, https:// www.theguardian.com/world/2007/may/17/topstories3.russia; John Markoff, “Before the Gunfire, Cyberattacks,” New York Times, August 12, 2008, https://www.nytimes.com/2008/08/13/technology/13cyber.html 25. “Ukraine Crisis: Transcript of Leaked Nuland-Pyatt Call,” BBC, February 7, 2014, https://www.bbc.com/news/worldeurope-26079957; “Angela Merkel Fumes at US Diplomat’s Curse of EU”, The Telegraph, February 7, 2014, https://www. telegraph.co.uk/news/worldnews/europe/germany/10624361/Angela-Merkel-fumes-at-US-diplomats-curse-of-EU.html 26. Lucy Fisher, “Russian Leaks Reveal Spin on MH17 Disaster,” The Times, April 19, 2018., https://www.thetimes. co.uk/article/russian-leaks-reveal-spin-on-mh17-disaster-0xgpl0tj0. See for more examples: StopFake.org 27. Kim Zetter, “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid,” Wired, March 3, 2016, https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ 28. “US Punishes 19 Russians over Vote Meddling and Cyber-attacks,” BBC, March 15, 2018, https://www.bbc.com/news/world-us-canada-43419809 19 1 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Second, the growing prominence of the cyber component inevitably began to blur the line between domestic and external policy and led to institutional overlaps. Back in the days of the Soviet Union there was a clear demarcation between actors carrying out disinformation operations inside and outside the country: disinformation campaigns conducted beyond Soviet borders were run by the Active Measures Department of the First Chief Directorate of the KGB and Agency Press News (APN), which never conducted operations inside the country. This changed in the late 2000s and early 2010s when the same informal networks were tasked with attacking the Kremlin’s critics both inside the country and outside. Fancy Bear, a group behind a cyberattack on the US Democratic National Committee (DNC) during the presidential election, was caught targeting Russian independent journalists in September 2016; while the Internet Research Agency in St. Petersburg, a troll farm with links to the Kremlin, engaged in trolling operations in Europe and the US, was tasked with a disinformation campaign after the assassination of prominent Russian opposition politician Boris Nemtsov in Moscow, in the vicinity of the Kremlin, in 2015.29 This approach has at least two ramifications. On the one hand, overlap between domestic and external operations ignites competition between institutions which possess cyber capabilities. Each tries to prove to the Kremlin that it is more useful than the others and thus to secure greater access to the Kremlin’s levers of power and patronage, but also increased funding and privileges.30 On the other hand, it seems that the Kremlin tends to treat every domestic or international crisis in terms of threats to internal political stability – regardless of whether the crisis constitutes a danger to the regime in Moscow or not. As a result Russian cyber foreign policy is largely responsive to crises (e.g. the furore over the removal of the Bronze Soldier statue in Tallinn in 2007) as well as to emerging opportunities (e.g., the Brexit referendum), thus essentially tactical rather than strategic. However, cyber tools are not applied indiscriminately to every crisis or opportunity that arises. Thus, these tactics also make the Kremlin’s moves less predictable as it is hard to anticipate when or where it will strike and which combination of cyber tools it will employ. This is hardly a new strategy, however. 29. “Interview s eks-sotrudnikom ‘fabriki trollei’ v Sankt-Petersburge” [Interview with former employee at troll-farm in Saint Petersburg], DojdiTV, October 14, 2017, https://tvrain.ru/teleshow/bremja_novostej/fabrika-447628/; Dmitri Alperovitch, “Bears in the Midst: Intrusion into the Democratic National Committee,” Crowdstrike blog, June 15, 2016, https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ 30. For more see Andrei Soldatov and Irina Borogan, The New Nobility: The Restoration of Russia’s Security State and the Enduring Legacy of the KGB (New York: Public Affairs, 2010). 20 Russia’s approach to cyber: the best defence is a good offence From Cold War to cyber war The temptation to think that the lessons of the Cold War are applicable to cyber has been popular since the mid-2000s. Government experts of the early 2000s, in Russia as well as the West, believed that the internet could be treated as just another battlefield, where the rules of engagement could be clearly defined.31 Since 2013, Russia, the United States and Europe have been busy putting together a set of international rules called cyber CBMs, or ‘confidence-building measures.’ The person who developed the cyber CBMs concept was Michele Markoff, an experienced American diplomat who had spent half her career in strategic nuclear arms control negotiations. In 1998 she began to specialise in cyber diplomacy and subsequently became a key figure at the Office of Cyber Affairs in the State Department. The career of her Russian counterpart, Andrey Krutskikh, had followed a similar trajectory—from nuclear arms control to cyber. In the 2010s Markoff and Krutskikh represented their respective countries at most of the talks between Russia and the United States on cyberspace.32 Markoff believed that the internet needed to be governed by a set of measures similar to those established to prevent a nuclear war. These controls, in her view, could prevent a cyber conflict from escalating. In June 2013 she secured the US-Russia bilateral agreement on confidence-building in cyberspace.33 As part of the agreement the White House and the Kremlin established a Direct Communications Line that connects the US Cybersecurity Coordinator and the deputy head of the Russian Security Council and could be used ‘should there be a need to directly manage a crisis situation arising from an ICT [information and communications technology] security incident.’ It was the digital era’s equivalent of the Cold War red telephone that connected the presidents of the Soviet Union and the United States in emergencies. The new hotline was even integrated into the existing infrastructure of the Nuclear Risk Reduction Center, located in the Harry S. Truman Building, the headquarters of the US State Department. It was from there at the end of September that Michael Daniel, the Obama administration’s Cybersecurity Policy Coordinator, passed a message to Sergei Buravlyov, deputy secretary of the Russian Security Council and Colonel General of the FSB. ‘This was the first time it was used since it was established’, according to Daniel,34 whose mission was ‘to communicate the US government’s serious concerns 31. Fred Kaplan, Dark Territory: The Secret History of Cyber War (New York: Simon and Schuster, 2016), 273. 32. “Amerikanskii Gosdep podtverdil vstrechu po kiberbezopasnosti s Rossiei” [US State Department confirmed meeting on cyber security], Rosbalt, February 7, 2017, http://www.rosbalt.ru/world/2017/02/07/1589659.html 33. “Fact Sheet: U.S.-Russian Cooperation on Information and Communications Technology Security,” The White House, June 17, 2013, https://obamawhitehouse.archives.gov/the-press-office/2013/06/17/ fact-sheet-us-russian-cooperation-information-and-communications-technol 34. Authors’ interview with Michael Daniel, by phone, May 2017. 21 1 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES about the Russian information operation to attempt to influence the election.’ He declined to comment on how his Russian counterpart received the message, but it was obviously not a diplomatic success. In October 2016 another batch of emails damaging to one of the US presidential contenders was leaked to the press.35 This illustrates how a modern cyber conflict is simply not comparable with a conventional armed or nuclear conflict. When there is a missile launch or preparation for a missile launch, it is impossible for the government to deny responsibility. However, all kinds of informal actors who are not easily detected can launch cyberattacks. Early on the Kremlin realised this and has exploited the opportunity to the full. The costs of cyberwar One of the unforeseen consequences of Russia’s aggressive cyber tactics, combined with its continued denial of any role or involvement in cyberattacks, has been the complete loss of trust in Russia among the Western cyber expert community and Western governments.36 The new climate of mistrust has affected Russian government institutions, including the foreign ministry and law enforcement agencies, the secret services,37 as well as Russian private cybersecurity companies, among which Kaspersky Lab is the most visible example. Kaspersky Lab is facing reputational and financial damage as the company has failed to explain its opaque relationship with the Russian secret services.38 This also creates an environment where Russia is seen as a prime suspect in every cyberattack conducted in the West, with the result that the strategy of plausible deniability no longer works for Russia – although on the plus side (from Moscow’s point of view) this reinforces the perception of Russia as a pugnacious and aggressive foreign policy actor. Russia was the first suspect when the opening ceremony of the Winter Olympic Games in PyeongChang was disrupted by a cyberattack in February. The cyberattacks disabled internet access and broadcast systems, shut down the PyeongChang 2018 website and prevented spectators from printing out their tickets. Cyber experts swiftly concluded that the hackers aimed to disrupt the Olympics and destroy a lot of data on servers rather than steal information using malware dubbed the ‘Olympic Destroyer’. While most security experts were quite cautious about attributing responsibility 35. Amelia Heathman, “Aliens and Arms Deals: the Wikileaks ‘October Surprise’ Data Dumps Have Begun”, Wired, October 12, 2016, https://www.wired.co.uk/article/wikileaks-plans-target-us-election 36. Nikki Haley, “We Can’t Trust Russia”, CNN, July 9, 2017, https://www.youtube.com/watch?v=tRaU07vgh-c 37. Mark Landler and Gardiner Harris, “In Retaliation, U.S. Orders Russia to Close Consulate in San Francisco”, New York Times, August 31, 2017, https://www.nytimes.com/2017/08/31/us/politics/russia-consulate-close-retaliation.html 38. Dustin Volz, “Trump Signs into Law U.S. Government Ban on Kaspersky Lab Software”, Reuters, December 12, 2017, https://www.reuters.com/article/us-usa-cyber-kaspersky/trumpsigns-into-law-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4 22 Russia’s approach to cyber: the best defence is a good offence for the attack to a particular country or government, pundits and commentators pointed the finger at Russia as the most likely culprit. Clearly, Russia can no longer hide behind the mask of plausible deniability as now when cyberattacks occur it is invariably designated as the prime suspect. Looking ahead Apparently, ‘a low cost-low risk’ strategy of using proxies in overseas operations proved to less low cost and deniable than was imagined at the outset. Russia overused plausible deniability to such an extent that the Kremlin is now suspected of being behind any major cyberattack that takes place in the West. But it does not look like the Kremlin has an alternative strategy to fall back on. Moreover, it lacks incentives to find one. On the one hand, the direct costs are not yet very prohibitive,39 while cyberattacks are still considered to be a useful foreign policy tool which helps to keep immediate neighbours under pressure. On the other hand, Russia’s increased assertiveness in cyberspace has led other great powers with wider bandwidth to reassess their vulnerabilities and beef up national cyber defence infrastructures. If Russia wants to remain in the top league of the world’s great cyber powers, it will have to keep pace with others in what looks like a new cyber race. Clearly the Kremlin fully intends to invest in, develop and test new cyber intrusion methods, and thus to preserve its capacity to surprise and harm its opponents in cyberspace and beyond whenever it deems necessary. 39. According to US Special Counsel Robert Mueller’s investigation, GRU agents spent around $95.000 to hack computers in the US and to release the information obtained in this way, while a Russian troll farm spent $1.25 million monthly on ad campaigns. See: “Mueller Indictment against 12 Russian Spies for DNC Hack”, VOX, July 13, 2018, https://www.vox.com/2018/7/13/17568806/mueller-russia-intelligence-indictmentfull-text; “Russia Spent $1.25 million per Month on Ads, Acted Like an Ad Agency”, AdAge, February 16, 2018, http://adage.com/article/digital/russia-spent-1-25m-ads-acted-agency-mueller/312424/ 23 1 chapter 2 Russia’s trolling complex at home and abroad Xymena Kurowska and Anatoly Reshetnikov Political trolling in Russia has reached massive proportions, as evidenced by both investigative journalism revealing the existence of ‘troll factories’1 and ‘big data’ analysis of trolling activity on the internet.2 Russian ‘trolls’ have also been officially charged with Kremlin-orchestrated hacking and interference in other countries’ affairs, most notably elections.3 But what is the philosophy behind trolling, and what is its effect on political communication? This chapter looks at both the internal and external dimensions of Russia’s trolling complex. Within Russia, trolls’ activities serve to neutralise dissident voices on the internet and thereby reduce the potential for anti-regime political mobilisation. Moscow deploys trolls abroad as part of a disruptive and subversive strategy, undermining the liberal order to its advantage. The philosophy behind the trolling complex In 2014, in the midst of the war in the Donbass, when the Russian defence minister Sergey Shoygu was asked whether Russian troops had been deployed in the southeast of Ukraine, he replied cryptically: ‘It is very difficult to look for a black cat in a dark room, especially if it is not there. All the more stupid to look for it there if this cat is clever, brave and polite.’4 The insinuation is that it makes no sense to ask about the existence of the putative cat. If the black cat is there – which, in fact, it is – the cat is clever enough to make its presence undetectable, and hence immune from liability. 1. Alexey Kovalev, “Russia’s Infamous ‘Troll Factory’ Is Now Posing as a Media Empire,” Moscow Times, March 24, 2017, https://themoscowtimes.com/articles/russias-infamous-troll-factory-is-now-posing-as-a-mediaempire-57534; Dmitry Volchek and Daisy Sindelar, “One Professional Russian Troll Tells All,” RFE/RL, March 25, 2015, https://www.rferl.org/a/how-to-guide-russian-trolling-trolls/26919999.html. 2. Oliver Roeder, “What You Found In 3 Million Russian Troll Tweets,” FiveThirtyEight, August 8, 2018, https://fivethirtyeight.com/features/what-you-found-in-3-million-russian-troll-tweets/. 3. “Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election,” https://www. justice.gov/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offenses-related-2016-election 4. Lenta.ru, April 17, 2014, https://lenta.ru/news/2014/04/17/shoygu/; Novaya Gazeta, December 14, 2017, https://www.novayagazeta.ru/articles/2017/12/14/74914-ministr-prevyshe-vsego. 25 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES This anecdote reflects the perverse logic behind trolling. In the popular discourse in today’s Russia, the adjective ‘polite’ is often used as an ironic allusion to the Russian military presence in the Crimea. Russian soldiers in the Crimea have been described both as ‘little green men’, referring to their camouflage, and as ‘polite people’ in an effort to portray them as peaceful and non-interfering in local people’s lives. 5 In this context, Shoygu’s reply simultaneously denies and confirms the presence of Russian troops in the southeast of Ukraine. Evasiveness, prevarication and maintaining ambiguity about the truth is a common political tactic in contemporary Russia, one which is consolidated by political trolling. In lieu of classical propaganda geared to convince and manufacture consent,6 the government’s strategy is to manufacture cynicism that stimulates disengagement. Cynicism is a weapon in this context: political trolling seeks to undermine, or suspend, the normative foundations of key areas and principles of liberal governance (such as, for example, elections, democracy, the right to self-determination), by invoking those principles rhetorically, but also ridiculing and deriding their content in actual practice. The writer Peter Pomeratsev’s formulation, ‘[n]othing is true and everything is possible,’ 7 aptly describes the cynicism underpinning Russia’s trolling complex. Pro-Kremlin trolling customises for regime purposes activities which used to be the domain of private actors. Originally trolling is a recreational activity carried out by relatively privileged private individuals that self-organise.8 Pro-Kremlin trolls tend to be precarious workers who are commissioned to perform specific tasks and whose incentive is therefore not self-expression but the need to earn a living. The classic trolling premise of ‘doing it for the lulz’, that is, for the digital schadenfreude produced by pranks and insults, is adapted to further the political purposes of a regime, which is antithetical to the original trolling ‘ethos’. The method is to reappropriate the liberal values of the freedom of speech and civic engagement to create a semblance of citizenry action. In other words, pro-Kremlin trolling relies on citizens’ critical faculties to get them engaged in a debate. However, they quickly become alienated as they realise that their engagement proves futile in an internet environment characterised by absurd fabrications, red herrings designed to confuse and mislead, politically-charged attacks and even taunts and insults. Dissident voices appear to be yet another mirage which discourages political mobilisation before it can materialise. 5. Roland Oliphant, “Ukraine Crisis: ‘Polite People’ Leading the Silent Invasion of the Crimea,” The Telegraph, March 2, 2014, https://www.telegraph.co.uk/news/worldnews/europe/ukraine/10670547/ Ukraine-crisis-Polite-people-leading-the-silent-invasion-of-the-Crimea.html 6. Edward Herman and Noam Chomsky, Manufacturing Consent: The Political Economy of the Mass Media (New York: Pantheon Books, 2002). 7. Peter Pomerantsev, Nothing Is True and Everything Is Possible: The Surreal Heart of the New Russia (London: Public Affairs, 2015). 8. On trolling see e.g. Gabriella Coleman, Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (London & New York: Verso, 2015); Wendy Phillips, This Is Why We Can’t Have Nice Things: Mapping the Relationship Between Online Trolling and Mainstream Culture (Cambridge, MA & London: MIT Press, 2015). 26 Russia’s trolling complex at home and abroad Techno-authoritarianism: ‘neutrollisation’ in domestic politics Russia uses this approach both at home and abroad. Of course, there are undoubtedly millions of genuine Russia-based supporters of the current regime who disseminate their views in the Russian blogosphere. But trolls do not fall into this category – and they are also quite numerous. We know this because trolling and bot accounts have their identifiable specificities. Bots are easy to pin down and quantify through network analysis because a bot is a software application which runs automated and structurally repetitive tasks at a high rate.9 One study estimates that from February 2014 to December 2015, during a particularly intense period in Russian politics, the activity of bots among accounts actively tweeting about Russian politics exceeded 50%.10 NATO’s Strategic Communications Centre of Excellence (NATO Stratcom COE) assesses that between February and April 2018 only 7% of active users who post in Russian were recognisable as humans or institutions and the remaining 93% were news accounts, bots, hybrid, or anonymous.11 Trolling accounts maintained by humans are more difficult to identify and need to be examined for patterns that diverge from regular users’ behaviour: the absence of personal details, photos, links to other social networks, mentions of relatives and friends, etc.12 Thematically, a typical troll account usually consists of a stream of non-personal and ludicrous content punctuated with frequent political posts. It is usually investigative journalists and former trolls that help with such identifications, as the authors of this chapter explain in a previously published study of this subject.13 Most organised pro-Kremlin trolls work for the Internet Research Agency LLC, commonly known as a ‘troll factory’. The agency was founded in the summer of 2013 in Ol’gino in St Petersburg in the aftermath of two developments: the emergence of social media as a platform for political mobilisation during the Arab Spring, and the nationwide wave of anti-regime protests that took place in Russia between 2011 and 2013. The protests were organised by civil society actors and in particular by the so-called ‘non-systemic’ opposition.14 The scale of anti-regime mobilisation in those years was the highest since the 1990s. The protest movement resulted in a series of programmatic documents, among them the ‘Manifesto of Free Russia’ 9. Lawrence Alexander, “Social Network Analysis Reveals Full Scale of Kremlin’s Twitter Bot Campaign”, Global Voices, April 2, 2015, https://globalvoices.org/2015/04/02/analyzing-kremlin-twitter-bots/. 10. Denis Stukal, Sergey Sanovich, Richard Bonneau and Joshua A. Tucker, “Detecting Bots on Russian Political Twitter”, Big Data 5, no. 4 (December 2017), https://www.liebertpub.com/doi/full/10.1089/big.2017.0038. 11. Robotrolling, 2018/2, https://www.stratcomcoe.org/robotrolling-20182-0. 12. Andrey Soshnikov, “Stolitsa politicheskogo trolling” [The capital of political trolling], Moy Rayon, March 11, 2015, http://mr7.ru/articles/112478/. 13. Xymena Kurowska and Anatoly Reshetnikov, “Neutrollization: Industrialised Trolling as a ProKremlin Strategy of Desecuritization,” Security Dialogue, 49, no. 5 (2018): 345-363. 14. That is, one operating outside of the parliament, as the parliamentary opposition is widely believed to have been co-opted by the regime to perform a largely symbolic function. 27 2 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES published online by Boris Nemtsov, which called for radical political change.15 The government liberalised party legislation and reinstated the direct election of governors as a concession (although, regarding the latter, they also introduced municipal and presidential filters which de facto meant that the federal government retained a lot of control over regional politics). Since then, however, as evidenced by surveys conducted by the Levada Center, the share of Russian citizens that are willing to participate in protests driven by political demands has been slowly decreasing (save for a brief hike in potential participation in the spring and summer of 2017).16 This registered decline was most certainly a result of a complex combination of factors, and the authors do not seek to claim here that institutionalised political trolling was the most important of those. Yet, as becomes obvious from a closer look at the actual practice of pro-Kremlin trolling activities, their main aim was unequivocal: to neutralise potential social mobilisation at its origin. A trolling frenzy in the aftermath of the assassination of Boris Nemtsov in February 2015 shows this mechanism in practice. Nemtsov was an important leader of the Russian ‘non-systemic’ opposition and his assassination could have damaged the Kremlin if the authorities were shown to have been implicated. In March 2015, Novaya Gazeta and Moy Rayon published four leaks containing lists of troll accounts with descriptions of their tasks in connection with the assassination of Nemtsov.17 Trolls were tasked to: spread the view that the authorities did not stand to gain by the assassination and that it was a provocation aimed at creating the impression of the regime’s complicity; portray the opposition as capitalising on the death of their comrade, and thereby incite negative attitudes towards them; insinuate the involvement of Ukrainian individuals; and criticise Western politicians for using Nemtsov’s murder as an excuse to interfere in Russia’s internal affairs. Each post was to include some keywords to facilitate searchability: ‘opposition’, ‘Boris Nemtsov’, ‘assassination of Nemtsov’, ‘provocation’, ‘opposition in Russia’.18 An empirical analysis19 demonstrates the ‘flooding effect’ of the coordinated spread of pre-fabricated messages that the pro-Kremlin trolls subsequently generated. They used highly sensationalist and contradictory content to simulate a public forum that had the appearance of having been generated by ordinary citizens. Their aim was to sow discord and confusion by making it near impossible to separate truth from fiction and intervene in the discussion in a meaningful way. The ambiguity of trolls who maintain the appearance of authenticity makes it particularly difficult to blow the whistle on a troll. A direct confrontation ends up ‘feeding the troll’, i.e. it sucks a user into an endless cycle of irony and ridicule that makes a meaningful exchange impossible. The effect is structural in that it 15. Boris Nemtsov, “Manifest svobodnoy Rossii” [Manifesto of Free Russia], Ekho Moskvy, June 9, 2012, https://echo.msk.ru/blog/nemtsov_boris/897379-echo/. 16. Levada Center, Survey on Protests, May 8, 2018, https://www.levada.ru/en/2018/05/08/protests-2/. 17. Diana Khachatryan,“Kak stat’ troll’hanterom” [How to become a troll-hunter], Novaya Gazeta, March 10, 2015, https://www.novayagazeta.ru/articles/2015/03/10/63342-kak-stat-trollhanterom. 18. Ibid. 19. Kurowska and Reshetnikov, “Neutrollization: Industrialized Trolling as a Pro-Kremlin Strategy of Desecuritization”, 355-57. 28 Russia’s trolling complex at home and abroad prevents political mobilisation from taking off the ground. By using this tactic of neutralisation-by-trolling, or ‘neutrollisation’, the trolls’ puppet masters (possibly affiliated with the Russian authorities) contaminate the internet, thereby undermining it as a space for political engagement and informed debate. Hence, the regime no longer needs to resort to outright coercion or censorship. Out of 60% of the Russian population that use social media, around 80% occasionally encounter information that makes them angry, and around 15% regularly encounter content that is inimical to their views, annoying or objectionable.20 The overwhelming majority of such users choose to ignore such information instead of blocking it, confronting the posters, or contacting the site administrator.21 This may appear to be a sensible strategy. Yet such rudimentary statistics do not provide data about the source of such content, how and where in the social media sphere it has been encountered, and what is the history of handling such information by individual users. In other words, while non-engagement is the most frequent reaction to comments and statements posted by trolls, we need further analysis to understand whether this is an informed choice and to what extent this is an effect of ‘neutrollisation’. Trickster diplomacy Russia applies these methods abroad, too. Pro-Kremlin trolls generate and cultivate a plethora of fake Twitter and Facebook accounts to engineer political disorientation and alienation on the internet outside of Russia. 22 This international strategy mirrors domestic practices of exploiting self-expression on social media. Russia cannot however deploy its ‘neutrollisation’ tactics on a global scale given its current relations with the West. It therefore opts for the role of a playful trickster. A trickster can be defined as an actor who is fully embedded within dominant institutions but subverts them by adopting a cynical and derisive attitude towards them.23 A trickster does not propose any sustainable alternative to the existing order. It acts instead from within it but undermines and corrupts the system. The discourse on multipolarity – or of a polycentric world order in Russian diplomacy parlance – is an example of how Western normative grammar can be twisted in this way. Adopted from the neorealist theory of International Relations conceived in US 20. Levada Center, Survey on Social Media, May 8, 2018, https://www.levada.ru/en/2018/05/08/social-media/ 21. Ibid. 22. Yevgeniya Kotlyar, “Pervoe videointervyu s eks-sotrudnikom amerikanskogo otdela ‘fabriki trolley’” [First videointerview with a former employee of the American department of the ‘troll factory’], Dozhd’,October 26 , 2017, https://tvrain.ru/teleshow/reportazh/oni_sdelali_video_kak_negr_zanimaetsja-448671/; Nicholas Fandos and Kevin Roose, “Facebook Identifies an Active Political Influence Campaign Using Fake Accounts”, New York Times, July 31, 2018, https://www.nytimes.com/2018/07/31/us/politics/facebook-political-campaign-midterms.html. 23. For more on the notion of the trickster as used in mythology, folklore, psychoanalysis and more recently in internet studies, see: https://en.wikipedia.org/wiki/Trickster 29 2 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES academic circles and framed as an alternative to US liberal hegemony, 24 Russia’s narrative of a polycentric world projects an image of Russia as a guardian of the global order standing against the double standards applied by the West. 25 Such parodic re-appropriation is common when ‘humanitarian intervention’ is at stake.26 The alleged use of the Responsibility to Protect (R2P) doctrine to justify the intervention in Georgia in 2008 provides a perfect example of how Russia resorts to exactly such cynical tactics to bend and distort the meaning of a norm. Sergey Lavrov, the Russian foreign minister, never invoked the doctrine as such. He explicitly justified the intervention in terms of the responsibility to protect Russian citizens as stipulated in the Russian constitution, in contrast to the liberal notion of the right to protection of any individual regardless of citizenship. He also ironically alluded to R2P as ‘the term which is very widely used in the UN when people see some trouble in Africa or in any remote part of other regions.’27 In his turn, the Russian representative to the UN, Vitaly Churkin, referred to the R2P doctrine to claim that Georgia had failed to carry out its responsibility to protect its citizens in Abkhazia and South Ossetia. His accusation of double standards is worth quoting: ‘Now it is clear why, for many months, Georgia rejected our urgent proposal that it sign a legally binding document on the non-use of force to settle the South Ossetian conflict … The President of Georgia said that demanding his signature on such a document was absurd, because Georgia does not use force against its own people. Now it appears that it does. How can we not recall the responsibility to protect that we hear so much about in the United Nations?’28 Conclusion The most sinister aspect of ‘neutrollisation’ is that it ultimately exploits and undercuts national and global citizens’ genuine desire for political engagement. But reacting to a troll only creates more chaos, meaning that confrontation is not a viable or effective option. Recognition is relatively straightforward, if not entirely effortless. ‘The EU versus Disinformation’ campaign 29 and the NATO Strategic Communications Centre of Excellence30 initiative on educating the public on how 24. Xymena Kurowska, “Multipolarity as Resistance to Liberal Norms: Russia’s Position on Responsibility to Protect,” Conflict, Security & Development, 14, no. 4 (2014): 489-508. 25. Sergey Lavrov, “Foreign Minister Sergey Lavrov’s Remarks at the 71st Session of the UN General Assembly,” September 23, 2016, http://russiaun.ru/en/news/ga_71sl. 26. Erna Burai, “Parody as Norm Contestation: Russian Normative Justifications in Georgia and Ukraine and their Implications for Global Norms,” Global Society 30(1): 67–77. 27. Sergey Lavrov, “Interview to BBC”, Moscow, August 9, 2008. For analysis see Anatoly Reshetnikov, “Intervention as Virtue, Obligation and Moral Duty: The Meaning of Russia’s Rhetoric on Responsibility During the Georgian and the Crimean Crises”, Russian Politics 2, no. 2 (June 2017): 155–181. 28. United Nations Security Council 5952nd meeting, s/pv.5952, New York, August 8, 2008, 5, http://www.un.org/en/ga/search/view_doc.asp?symbol=S/PV.5952. 29. https://euvsdisinfo.eu/ 30. https://www.stratcomcoe.org/ 30 Russia’s trolling complex at home and abroad to identify trolling is a crucial step forward in this respect. However, the moral panic over trolling and efforts to ‘name and shame’ Russia for its alleged trolling and hacking activities will likely backfire – because this is exactly the reaction that the trolls are looking for. Seasoned internet users know that the best strategy is to ignore trolls, that is, to consciously refuse to be ‘neutrollised’ by resisting the constant stream of innuendo and negative messages propagated by trolls. This is the educational function of anti-trolling campaigns. If a reaction is necessary, it should be as laconic and unemotional as possible to minimise the risk of ‘feeding the troll’ and engendering further provocations. While relevant, such measures are not sufficient for handling Russia’s ‘trickster diplomacy’ because if Russia engages in such diplomacy, it is a direct result of the existing configuration of the international order. Russia resorts to trolling primarily in response to its stigmatisation by the West and as part of its perceived mission to counter the hegemony of the West. Folk wisdom has it that to pacify a trickster one needs to channel its dexterity into solving common problems which transcend the trickster’s grievances. In other words, to ‘outsmart’ it by making it part of the club. In the current strained climate of Russia-West relations, such an option would quickly be labelled as appeasement, legitimisation of aggression, and/or political naiveté. It would also risk undermining the unity of the Western bloc regarding sanctions against Russia, which is the ultimate goal of the Kremlin. For the time being, the West may therefore be stuck with the challenge of dealing with Russia’s ‘trickster diplomacy’. 31 2 chapter 3 Spotting the bear: credible attribution and Russian operations in cyberspace Sven Herpig and Thomas Reinhold How do we know who is behind a cyberattack? What are the tools and techniques that could help to identify the hackers who have conducted a cyber-operation? And why is credible attribution in the case of cyberattacks carried out or masterminded by Russia so challenging? These are the questions which this chapter aims to address in detail. However, before examining the technical, intelligence and geopolitical aspects of attribution, this chapter will first explain what attribution is and why it is important in the domain of cybersecurity Attribution: what it is and what for? The term ‘attribution’ chiefly refers to a concept in international law that describes the process of identifying an attack or operation against a state. It is widely used in debates about the norms and rules of state behaviour and how they apply to cyberspace. Strictly speaking, attribution is usually used in the context of armed attacks and considered as one of the main legal requirements for the right of states to resort to force in self-defence under article 51 of the UN Charter. Any state action that refers to this article has to be justified by the credible identification of the origins of an attack. Only by supplying such evidence, are states deemed to have the ‘inherent right of individual or collective self-defence’ and can therefore take steps towards an appropriate response to stop these threats. Attribution is also used to convince the state’s own government, public, and transnational partner organisations about the origin of a cyberattack. The threshold to convince these parties might be lower than the one required to trigger article 51. In the case of national attribution policymakers and the executive have to be convinced about the origin of an attack in order to legitimise the use of offensive countermeasures. This form of assessment can rely on all technical, geopolitical and 33 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES intelligence data that is available. Transnational attribution refers to convincing allies, bilaterally or as a whole (e. g. through NATO), about the validity of the attribution. This is essential in order to obtain political, diplomatic or other kinds of support from allies. It might not be possible to explicitly use or cite certain intelligence and technical data to convince them, as such data may be too highly classified. Naturally, this might limit the credibility of the attribution analysis. Then there is public attribution which refers to convincing the public with the attribution assessment. Having public backing in a democratic country allows the government to choose from a wider range of policy options. Credible public attribution enables the government to take certain steps, such as expelling diplomats or implementing economic sanctions, or at least facilitates such a response. Unlike in the case of transnational attribution (for which purpose allies might partially share sensitive information), most intelligence information and certain technical data cannot be shared with the public due to its classified and highly confidential nature. And this very limitation might undermine the credibility of public attribution. Attributing a cyber operation Technical aspects of attribution From a technical point of view, measures for attribution need to be articulated in at least two dimensions. The first dimension distinguishes between those measures that can be established in the domestic IT systems and networks of a state (‘inner scope measures’) and those that need to exist or be built up in foreign IT systems (‘outer scope measures’). The second dimension is composed of preventive and reactive measures. Preventive measures constantly observe, collect and store data that could be used to identify an attack that is detected or noticed at a later point in time. Reactive measures can be used to ‘mark and track down an attacker’ during an ongoing operation. Inner and outer scope measures are both crucial to establishing credible attribution. Therefore, each state would need to have implemented its own set of data-gathering measures and/or allow defenders to trail attackers through their systems. This is clearly a challenge in the realm of international relations. Defining international standards for data-gathering measures, cooperation guidelines, information sharing and known communication channels would go a long way towards addressing this challenge and creating a common process to enable an international response. A first step towards such international cooperation has been made by the Budapest Convention on Cybercrime1 which became effective in 2004. Its agreements however do not apply to norms of state behaviour like espionage or military cyber activities and its practical aspects still need additional and more simplified cooperation 1. 34 Council of Europe, Details of Treaty no.185, Convention on Cybercrime, Budapest, November 23, 2001,https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185. Spotting the bear: credible attribution and Russian operations in cyberspace measures. The United Nations had been moving in a similar direction until its group of government experts (UN GGE) failed to reach consensus in 2017.2 Microsoft’s private initiative, the ‘Digital Geneva Convention’, 3 is currently the most recent development in this area. Monitoring and logging A first and essential preventive approach involves technical measures that monitor access to IT systems, the connections and data transferred between them as well as user-performed operations like creating, editing, copying or deleting files. The level of detail of the collected data and the retention period4 play a crucial role because in the absence of these elements investigations of attacks may not be pursued effectively. On the other hand, however, these same elements constitute a sensitive area in terms of data privacy. This issue has recently been debated in Germany, when allegedly Russian attackers broke into the Federal Foreign Office and undermined security mechanisms set in place by the secure government network. 5 The data storage is considered sufficient when logged information covers the entire attack within a specific system. This enables the defender to consolidate a detailed timeline about the attacker’s actions, what the origin of the attack was, what data has been extracted and to which location the stolen data has been transferred.6 Additionally, the logged information needs to be stored in a secure and tamperproof way to prevent attackers from erasing their digital footprints. Computer forensics When an attack has been detected, there is a range of possible reactive measures that can help in identifying the attacker. Besides analysing the collected data to trace the attacker’s operations history, other measures are the search and collection of software or software fragments that attackers have left on the compromised system to perform their unauthorised activities. These tools are often handcrafted and form part of larger toolsets. They are frequently reused for different operations over a period of several years. A software code analysis of these tools can be instrumental in detecting similarities and establishing connections with former incidents. This 2. Adam Segal, “The Development of Cyber Norms at the United Nations Ends in Deadlock. Now What?,” Blog post, Council on Foreign Relations (CFR), June 29, 2017, https://www.cfr. org/blog/development-cyber-norms-united-nations-ends-deadlock-now-what 3. Brad Smith, “The Need for a Digital Geneva Convention,” Microsoft,14 February 2017, https:// blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/ 4. The retention period for stored information can be a critical aspect because sometimes attackers break into systems and create backdoors but then stay silent over a long period of time. When the attack is carried out, the log files only contain data about the ‘strike command’ but not necessarily the more significant information about the break-in itself. 5. Dana Heide, „Will der Bund die Cybersicherheit erhöhen, muss er den Datenschutz opfern“, Handelsblatt, March 14, 2018, http://www.handelsblatt.com/my/politik/deutschland/cybersecurity-will-der-bund-die-cybersicherheiterhoehen-muss-er-den-datenschutz-opfern/21070060.html?ticket=ST-546642-G2ZE5mIzhcUXbO5Jbvle-ap2 6. This is just an example. Usually log files can contain a lot more data and specific information on tampered data, modified executable files etc. 35 3 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES ranges from the language, geolocation or working hours uncovered by this form of assessment to code fragments and linked IT-infrastructures, such as email addresses and device IPs. This analysis therefore helps to identify familiar tactics and hacking approaches, linking them to known malicious actors. Passive tracking Passive tracking gives the defender additional information to potentially identify the attacker. While the attack is still in progress valuable information and evidence can be collected if the defender is able to observe the attacker’s operations. This can be achieved by luring the attacker with so-called ‘honeypots’: systems or flaws that are easy to exploit and therefore will probably be targeted by the attacker. If the attacker takes the bait, the honeypot enables the defender to monitor all of the attacker’s actions.7 A similar approach is the presentation of manipulated documents, relevant data or information that an attacker is potentially looking for and which contain malicious code, specific digital fingerprints or slightly manipulated information that can later be used to identify the data when it resurfaces.8 These so-called ‘beacons’ might also send back the IP address of the systems to which they have been transferred, which could reveal the original location of the attacker. Active tracking Strong evidence about the origin of an attack can be gathered by tracing back the attacker to the IT system where the connections or the controlling commands for the attack originate. Common attack approaches often use a so-called command and control (C2 or C&C) infrastructure, where specific computers are used to coordinate the attack and collect the stolen data. In order to identify the attacker it is necessary to monitor and gather information about user operations from these specific systems either through hacking them or through international cooperation with the states where the compromised devices are located. The former strategy is known as ‘hackback’ or ‘active defence’ and has drawbacks that need to be considered.9 These disadvantages are for example misinterpretations and wrongful attribution due to insufficient information, the risks of falling for deliberately created ‘false flags’ and 7. After incidents, detailed information about the tools of the ‘defending’ side are rarely revealed. Therefore it is difficult to point out a real-world example of honeypot usage. Press reports covering the recent attack against the Federal Foreign Office in Germany however stated that the investigating agencies are aware of the incident and are monitoring the attackers’ activities which may be an indication that tools like honeypots or beacons had been used. For more details see “Cyber-Espionage Hits Berlin - The Breach from the East,” Der Spiegel, March 2018, http://www.spiegel. de/international/germany/cyber-espionage-likely-from-russia-targets-german-government-a-1196520.html. 8. Honeypots can also be installed as a preventive measure but are most effective when tailor-made to a specific attack and its anticipated goals. 9. Thomas Reinhold and Matthias Schulze, „Digitale Gegenangriffe - Eine Analyse der technischen und politischen Implikationen von ,hack backs‘“, August 2017, https://cyberpeace.org/wp-content/uploads/2017/08/AP_Schulze_Hackback_08_2017.pdf. 36 Spotting the bear: credible attribution and Russian operations in cyberspace the question whether the attributed system had been used intentionally for the attack or whether it had been exploited.10 Another approach that enables monitoring an attack but avoids the risks of hack-back is to deliberately become one of the exploited systems that the attacker is using – similar to the honeypot approach. Assembling the puzzle All these approaches can help a defender to collect data and information about the tactics, the tools and the different steps of an attack in order to compare them to known capacities of threat actors and the sophistication and methods attested in former incidents.11 It is important to bear in mind that while each of these individual pieces of information can be a lead to the attacker, they can also be manipulated or crafted to leave misleading tracks which could potentially incriminate a third party. A consolidated and coherent analysis needs data collected through a range of various measures. It is certainly possible to conduct such a technical analysis when time is not a problem.12 While in certain scenarios, such as espionage operations, attribution of an attack might not be time-sensitive, other instances exist where time is a critical factor – for example if a hack-back needs to be conducted. Moreover, during military conflict, time might be of the essence but thorough technical attribution takes time and needs to be complemented by an analysis of the geopolitical context in which the attack takes place as well as by intelligence findings. Intelligence aspects of attribution Obtaining all kinds of intelligence, especially human intelligence and signal intelligence, is crucial to help establish the attribution of cyberattacks. Such intelligence can be gathered through a state’s own means or accessed via shared resources by allies. Intelligence can help to attribute one attack or an entire set of attacks in combination with the technical aspects. If for example a technical attribution analysis reveals that certain cyber operations are linked to each other – e. g. because they rely on the same infrastructure – and intelligence can link one of those operations to the perpetrator, an entire campaign of cyberattacks might be unravelled. The indictment filed by the US Special Counsel investigator Robert Mueller for example, in the inquiry into Russian interference in the presidential election, shows that access to email accounts provided the investigators with useful intelligence, enabling them to connect certain dots.13 Additionally, the public learned 10. A common and slightly overused example is that of a hospital IT system that may have been hacked itself and used by the attacker as a hub to indirectly perform another cyberattack. Any offensive countermeasures that disrupt the hospital’s services would impair important primary tasks and could result in injuries to human life. 11. It is important to point out that although still only a limited number of state actors have sufficient offensive cyber capacities, their number is rising. For example North Korea has developed significant cyber power over the last year with – compared to conventional military armament – few financial resources. 12. An example is the 2013 Mandiant report “APT1: Exposing One of China’s Cyber Espionage Units” which analysed and presented forensically detailed data and evidence about the Chinese state-driven cyber espionage programme about the PLA Unit 61398. See: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf. 13. United States of America v. Internet Research Agency LLC et al., Case 1:18-cr-00032-DLF, filed on 16 February 16, 2018, https://www.justice.gov/file/1035477/download 37 3 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES that America’s National Security Agency is actively tracking various cyber threat actors via signals intelligence tools.14 In the case of the attack on Sony Pictures Entertainment,15 it was rumoured that American intelligence agencies had access to the network from which the attack originated and therefore were swiftly able to attribute it to North Korea. More information was revealed about Dutch intelligence services which were tracking the Russian hacking group ‘Cozy Bear’ at least between 2014 and 2015.16 Hackers from the domestic Dutch intelligence agency AIVD were able to witness and monitor the launch of cyberattacks against the Democratic National Committee17 because they had access to the network from which this operation was launched. AIVD also had access to security cameras monitoring the offices from which those attacks were conducted, conveniently allowing them to compare the pictures taken with those of known spies. This operation is likely responsible for the strongest proof of a Russian cyber aggression that has ever been obtained and found its way into the public sphere. Although crucial to solving the challenge, the intelligence component has been the most underrated aspect in the public debate. The reason for that is the classification of intelligence materials and thus their rare exposure to public scrutiny. After the US presidential elections in 2016, the American intelligence community issued a declassified intelligence report18 that was supposed to convince the public of Russia’s guilt. It however achieved almost the opposite effect because – due to declassification – the public report no longer contained any hard proof of Russian intervention. When asked whether they think Russia attempted to meddle in the 2016 presidential elections, 45% of respondents in the US answered either that they do not know or that it is not true.19 At the end of the day, it is the state’s strategic choice how much it discloses about what it knows and how it obtained its intelligence. Therefore, credible attribution is indeed within the realms of possibility. Whether that proof can be presented to international organisations (e.g. UN, NATO) and/or the public or not is a different story as this would likely mean exposure of the intelligence operation. Revealing such an intelligence operation would decrease the likelihood of it still being effective in the future. If attackers follow the counter-response to their actions closely, they might be able to identify what measures were used to track them down and circumvent/avoid them if possible. 14. Kim Zetter, “Leaked Files Show How the NSA Tracks Other Countries’ Hackers,” The Intercept, March 7, 2018, https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/ 15. Andrea Peterson, “The Sony Pictures hack explained,” Washington Post, December 18, 2014, https://www. washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained 16. Huib Modderkolk, “Dutch Agencies Provide Crucial Intel about Russia’s Interference in US Elections,” de Volksrant, January 25, 2018, https://www.volkskrant.nl/media/dutch-agenciesprovide-crucial-intel-about-russia-s-interference-in-us-elections~a4561913/ 17. Sven Herpig, “Cyber Operations: Defending Political IT-Infrastructures. A comparative problem analysis supported by the Transatlantic Cyber Forum,” Stiftung Neue Verantwortung, June 2017, https://www. stiftung-nv.de/sites/default/files/tcf-defending_political_lt-infrastructures-problem_analysis.pdf. 18. Office of the Director of National Intelligence, “Background to ‘Assessing Russian Activities and Intentions in Recent US Elections’: The Analytic Process and Cyber Incident Attribution,” January 2017, https://www.dni.gov/files/documents/ICA_2017_01.pdf. 19. IPSOS/REUTERS Poll Data, July 18, 2018, https://www.ipsos.com/sites/default/files/ct/ news/documents/2018-07/2018_reuters_tracking_-_russia_7_18_2018.pdf 38 Spotting the bear: credible attribution and Russian operations in cyberspace Geopolitics of attribution Geopolitics might only play a minor role in the attribution of cyber operations but this dimension should not be disregarded. While a thorough analysis of the technical aspects and solid intelligence can clearly provide hard facts and concrete evidence when it comes to attribution, a geopolitical assessment can help validate the overall process of attribution. A geopolitical assessment ultimately focuses on the attacker’s motivation and hinges on two questions: cui bono? (‘who benefits?’) and ‘was it a “false flag ”20 operation?’21 It is rare for an actor to take responsibility for a cyberattack.22 Even then, the admission has to be vetted and treated with a certain amount of scepticism because it might just be part of a deception strategy. Cui bono? asks the question who would directly and most significantly benefit from the attack. Such an analysis can factor in various political aspects, such as ongoing conflicts, current negotiations or recent events. Findings of the technical analysis, such as what documents were stolen and which positions the employees whose computers were breached held in the organisation, add value to an assessment. A major reason why Russia has been blamed for so many attacks in recent years is that it stood to gain from all of them, assuming that Russia’s main goals are to destabilise Western democracies and project power partly in an endeavour by the Kremlin to divert attention from the country’s own domestic problems. The shortcoming of that assumption in terms of attribution is that it is overly broad and therefore involves the risk that Russia is automatically blamed for most cyberattacks. The second aspect of a geopolitical assessment, false flag operations,23 is straightforward because it asks a similar question: who benefits from the cyberattack in a case where another and/or the most obvious actor identified by a cui bono assessment will be blamed for the attack? Many of the indicators examined in a technical analysis, such as timestamps, language configurations, comments or hidden pictures in the code, can be easily manipulated to point in a certain direction. Using a geopolitical cover at the same time makes a false flag operation even more effective. A notable example of this was the alleged Russian cyber operation ‘Olympic Destroyer’ which not only relied on borrowing technical elements from previous North Korean cyber operations but targeted the Winter Olympics in South Korea 24 at a crucial moment in the North Korean-South Korean and American diplomatic relationship. If Russia was indeed behind it, this false flag operation was definitely smart. If North Korea is blamed for the attack, the relationship between the two Koreas would further deteriorate, forcing the United States to devote more of its attention to that part of 20. An attack which while disguising the real perpetrator creates the impression that a third party is behind it. 21. A third aspect could be ‘for lulz’ (for fun). While this kind of motivation has been in sharp decline in the past few years, groups such as Anonymous and LulzSsec have conducted a number of high-profile hacking operations with the apparent goal of ridiculing the victim. 22. Noah Shachtman, “Kremlin Kids: We Launched the Estonian Cyber War,” Wired, March 11, 2009, https://www.wired.com/2009/03/pro-kremlin-gro/ 23. NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), “Mitigating Risks arising from False-Flag and No-Flag Cyber Attacks,” 2015, https://ccdcoe.org/multimedia/mitigating-risks-arising-false-flag-and-no-flag-cyber-attacks.html 24. Andy Greenberg, “Russian Hacker False Flags Work - Even After They’re Exposed,” Wired, February 27, 2018, https://www.wired.com/story/russia-false-flag-hacks/ 39 3 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES the world (instead of towards Russia). If Russia is blamed for the attack, it can further its agenda of power projection and at the same time undermine public confidence in attribution in democratic countries.25 False flag operations add an additional layer of complexity to an already complex phenomenon. Why it is problematic to point to Russia Russia has repeatedly been blamed for cyberattacks in the past decade. Every other operation is currently linked to Russia by politicians, the media or IT security companies.26 Some of the attribution might be correct, some might be wrong. The challenge here is not attribution but credible attribution. Credible attribution does not only mean getting the technical, geopolitical and intelligence aspects of attribution right, it also means convincing the target audience. Whereas attributing the source of an armed attack is possible for missiles or conventional military forces, such attribution is arguably nearly impossible or considered impracticable27 in the case of attacks carried out via cyberspace as described earlier. Cyberspace offers perfect conditions for attackers to obfuscate their tracks and deceive the defenders and forensics. Attackers could use uninvolved third party IT infrastructure – or could fly to a different country with a ‘burner laptop’28 – to conduct an attack. A targeted victim can only immediately identify the last element of the chain of computers used in the attack but not the origin behind it.29 Strong empirical attribution would need to identify every device in the attack chain, and gather and analyse available traces to forensically link them to the real origin of the attack. This is a complex task30 which is challenging even under optimal conditions where every IT system within the described chain contains traces of the attacker and the victim is able to gather these data via international cooperation.31 Such a task will not work in specific conflict situations where an immediate response is necessary and ‘conclusions shortcuts’ are dangerous because the ambiguity and incompleteness 25. Levi Maxey, “False Flags in Cyberspace: Targeting Public Opinion and Political Will,” The Cipher Brief, March 6, 2018, https://www.thecipherbrief.com/false-flags-cyberspace-targeting-public-opinion-political-will 26. See for example the FireEye report from 2014 on the APT28 group; “APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?,” https://www2.fireeye.com/rs/fireye/images/rpt-apt28.pdf as well as the CrowdStrike report from 2016 “Who Is COZY BEAR?,” September 19, 2016, https://www.crowdstrike.com/blog/who-is-cozy-bear/ 27. See the conclusions of the UNIDIR report of the International Security Cyber Issues Workshop Series, 2016, http://www. unidir.org/files/publications/pdfs/report-of-the-international-security-cyber-issues-workshop-series-en-656.pdf 28. A device which is only used for a particular attack and then trashed to hinder attribution. Derived from the concept of a ‘burner phone’. 29. An attack might have several ‘origins’, which are intermediate systems exploited by the attacker to make an uninvolved third party look like the adversary. The ‘real origin’ of an attack is the point where the attack was started by the aggressor. 30. Two case studies that show the complexity of this task, the different sources that have to be taken into account, the technical difficulties and challenges of tying this information together are the final report of Ralph Langner on Stuxnet, “To Kill a Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve’’, The Langner Group, November 2013, https://www.langner.com/wp-content/uploads/2017/03/tokill-a-centrifuge.pdf, as well as the 2013 Mandiant report “APT1 - Exposing One of China’s Cyber Espionage Units,”https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf 31. A good example of the complexity of this task is given in Ralph Langner’s analysis of the Stuxnet incident. See Ralph Langner, “To Kill a Centrifuge”. 40 Spotting the bear: credible attribution and Russian operations in cyberspace of the information about a cyberattack raises the risks of misunderstandings, miscalculations, misinterpretations and wrong responses, especially when other means of crisis communication or confidence-building measures between the adversaries are missing. Besides such ‘hard facts’, prior events have shown that attribution is still ultimately a political decision based on information collated by intelligence and security agencies or influenced by foreign policy interests and considerations32. There are only very few instances in which states based a public response, e.g. sanctions, on the findings of an attribution assessment. One of them was the US response to Russia’s alleged meddling in the 2016 presidential election campaign.33 Additionally, states that are blamed for an attack often distance themselves from the hacking group that conducted the operation and deny any official involvement or control of the group. Even though the UN GGE decided to hold states accountable for cyber operations conducted from within their territory,34 pledging to help the investigation with any means possible will take some pressure off a state that finds itself under suspicion. Plus, linking a cyberattack to a hacker group is one thing, linking that hacker group or a specific incident to a state and especially to a particular governmental or military order as is required by the UN Charter is quite another. Even if due diligence is a commonly accepted principle in cyberspace,35 it is not enforced in the current public debates on potential cyberattacks from Russia. In fact, prior to the establishment of a military cyber unit in 2017, the Federal Security Service (FSB) was responsible for overseeing Russia’s cyber capabilities. From the perspective of the international community and as described earlier in respect to international law, attribution and accusations in specific conflicts need to be based on a credible, evidence-based argumentation that has to be made by the affected state. But so far few cases exist where such evidence that points strongly to Russia had been made public. Two instances which provided the most public information about a state-backed attribution pointing towards Russia are the US Director of National Intelligence’s report36 and the Dutch domestic intelligence AIVD findings.37 In yet another milestone development, several countries – among them the US, the Netherlands and the UK – simultaneously went public in October 2018, jointly attributing cyber operations to the (allegedly) Russian-sponsored GRU hacking unit APT28. The attribution included cyber operations carried out against the World Anti-Doping Agency (WADA) and the Organisation for the Prohibition 32. For instance the hacking attacks against German governmental and parliamentary IT systems from 2015 and 2018 yielded no official reaction against the suggested attackers, whereas a hacking attack against the US-based company Sony Pictures Entertainment from 2014 almost immediately (in terms of days) resulted in US sanctions against North Korea. 33. David E. Sanger, “Obama Strikes Back at Russia for Election Hacking,” New York Times, December 29, 2016, https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html 34. NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), “2015 UN GGE Report: Major Players Recommending Norms of Behaviour, Highlighting Aspects of International Law,” August 31, 2015, https://ccdcoe.org/2015-ungge-report-major-players-recommending-norms-behaviour-highlighting-aspects-international-l-0.html 35. Annegret Bendiek, „Sorgfaltsverantwortung im Cyberraum - Leitlinien für eine deutsche Cyber-Außen- und Sicherheitspolitik“, SWP Berlin, 2016. 36. Office of the Director of National Intelligence, “Background to ‘Assessing Russian Activities and Intentions in Recent US Elections’: The Analytic Process and Cyber Incident Attribution,” January 6, 2017, https://www.dni.gov/files/documents/ICA_2017_01.pdf 37. Huib Modderkolk, “Dutch Agencies Provide Crucial Intel…” 41 3 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES of Chemical Weapons (OPCW). Enabling states to conduct more severe responses to cyberattacks would require public and international attribution. This in turn leads to a Catch-22 situation in intelligence sharing. Pointing the finger at the usual suspect without credible attribution when a cyberattack occurs not only further emboldens Russia in its projection of power (while it continues to deny responsibility) but fails to sufficiently convince the public or the international community. This pattern of accusation and denial underlines again the necessity for binding international rules of state behaviour in cyberspace that include a commitment to the validity of due diligence principles in this domain. This would provide a strong basis for enforceable regimes of international law in cyberspace. 42 chapter 4 Russia’s cyber diplomacy Elena Chernenko Russia has been concerned about the misuse of cyber tools for political, military and criminal purposes for at least the past two decades. This chapter provides an overview of what Russia has tried to achieve internationally with regard to cyber regulations and explains why it has failed in this endeavour so far. It first explores Russia’s early cyber diplomacy initiatives and the motivations behind them. The second part provides a detailed analysis of Russia’s diplomatic efforts in the cyber field at the global, regional and bilateral levels. The chapter concludes by outlining the future orientation of Russia’s cyber diplomacy and anticipating challenges which might lie ahead. The early days of Russian cyber diplomacy The history of Russia’s diplomatic engagements concerning the impact of information and communications technology (ICT) on international stability shows that the stated goal of Moscow’s initiatives was from the beginning to prevent conflicts and a cyber arms race between states.1 Russia put the issue of interference in countries’ internal affairs on the international political agenda by pointing to such risks as early as in 1998 when Moscow introduced the first resolution on ‘Developments in the Field of Information and Telecommunications in the Context of International Security’ in the United Nations General Assembly (UNGA).2 The document, which was adopted without a vote, expressed concern that new technologies and means ‘can potentially be used for purposes that are inconsistent with the objectives of maintaining international stability and security and may adversely affect the security of States.’3 To make the resolution acceptable for most countries, the authors stressed the need to prevent the misuse of information 1. Elena Chernenko, “Cold War 2.0? Cyberspace as the New Arena for Confrontation”, Russia in Global Affairs, 1, April 15, 2013, http://eng.globalaffairs.ru/number/Cold-War-20-15929 2. UN General Assembly, Resolution A/RES/53/70, “Developments in the field of information and telecommunications in the context of international security,” January 4, 1999, http://undocs.org/A/RES/53/70 3. Ibid. 43 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES resources and technologies ‘for criminal or terrorist purposes.’4 In his statements, the Russian foreign minister Igor Ivanov went further and called for another threat to be addressed – that of the militarisation of cyberspace, stressing the potentially devastating effects of cyber weapons. 5 In 1999 Russia introduced a similar resolution but added two points that were important for Moscow: namely, that cyberspace may be misused for military purposes and that the international community should come up with principles on how to mitigate such dangers. But at this point the level of cyber connectivity and vulnerability of states was much lower6 compared to the situation prevailing today (in December 1999 there were 248 million internet users worldwide, by December 2017 this number had surpassed 4 billion) and the acuteness of emerging threats was not as evident or at least not officially recognised by all countries. However, Russia’s diplomatic efforts paid off when in 2009 the United Nations General Assembly adopted another landmark resolution on ‘Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures’.7 But since UNGA resolutions have no binding power this track – although important as a geopolitical barometer – did not yield any practical results. Cyber diplomacy in the UN A more promising approach – from Moscow’s point of view – was the launch of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE) in 2004. Russia (which along with the US was one of the main participants in the group) was hoping that the efforts of this body would lead to the adoption of some kind of rules of behaviour for states in cyberspace.8 The prevention of the militarisation of this domain was not a realistic goal anymore since all major cyber players (including Russia) were actively developing these kinds of potentials.9 So Moscow started acting according to the principle ‘if you can’t prevent it, try to regulate it’. 4. Ibid. 5. Elena Chernenko, «Политическая кибервойна началась» [“The Political Cyber War has Started”], Global Affairs Journal (9 October 2016), http://globalaffairs.ru/global-processes/Politicheskaya-kibervoina-nachalas-18415 6. “Internet Growth Statistics, (1995-2017)”, Internet World Stats – Usage and Population Statistics, https://www.internetworldstats.com/emarketing.htm 7. “Creation of a Global Culture of Cybersecurity and Taking Stock of National Efforts to Protect Critical Information Infrastructures”, Resolution adopted by the General Assembly on 21 December 2009, http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/64/211 8. Sergey Boyko, «Группа правительственных экспертов ООН по достижениям в сфере информатизации и телекоммуникаций в контексте международной безопасности: взгляд из прошлого в будущее» [“United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security: a look from the past into the future”], International Affairs Journal, (August 2016), https://interaffairs.ru/jauthor/material/1718 9. Kenneth Geers, “Strategic Cyber Security”, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), June 2011, https://www.defcon.org/images/defcon-19/dc-19-presentations/Geers/DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf 44 Russia’s cyber diplomacy But the group did not produce significant results until 2013 when it finally drafted a consensus report which aimed at ‘promoting a peaceful, secure, open and cooperative ICT environment’ and stated that ‘cooperative measures that could enhance stability and security include norms, rules and principles of responsible behaviour by states, voluntary measures to increase transparency, confidence and trust among states and capacity-building measures.’10 The report for the first time underlined that ‘international law, and in particular the Charter of the United Nations, is applicable’ in cyberspace and at the same time stated that ‘state sovereignty and international norms and principles that flow from sovereignty apply to state conduct of ICT-related activities, and to their jurisdiction over ICT infrastructure within their territory’. It also provided for a set of recommendations on voluntary confidence-building and capacity-building measures. 2015 was marked by another achievement that Russian diplomats had long hoped for: the next UN GGE report provided the foundation for an internationally recognised governmental cyber code of conduct. The document included eleven basic depoliticised norms, including a determination that states should not knowingly allow their territory to be used for internationally wrongful cyber acts; should not conduct or knowingly support ICT activities that intentionally damage critical infrastructure; and should seek to prevent the proliferation of malicious technologies and the use of harmful hidden functions.11 Moscow hoped to turn this report into a proposal for a new global convention that would be addressed at the UN GA in 2017 but when the group met again in June that year it failed to agree on further steps. Looking ahead, it is unclear if the UN GGE has a future. Bilateral and regional tracks Russia accompanied its multilateral cyber diplomacy with efforts to spur cooperation in the cyber field at both regional and bilateral levels. Its allies became countries that were also mostly concerned with the idea of promoting state sovereignty and tighter government control on the internet. In September 2011 four countries of the Shanghai Cooperation Organisation (SCO) – Russia, China, Tajikistan and Uzbekistan – proposed (also at the UN level) an international code of conduct for information security.12 Later in the same 10. UN General Assembly, Resolution A/68/98, “Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” June 24, 2013, http://www.un.org/ga/search/view_doc.asp?symbol=A/68/98 11. UN General Assembly, Resolution A/70/174, “Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” July 22, 2015, http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174 12. UN General Assembly, “Letter dated 12 September 2011 from the Permanent Representatives of China, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General”, A/66/359, https://ccdcoe.org/sites/default/files/documents/UN-110912-CodeOfConduct_0.pdf 45 4 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES month Russia also presented to the UN a draft of a Convention on International Information Security. Both documents reflect the development of Russian foreign policy thinking with regard to the cyber domain. While Western countries at that time were only using the term ‘cyber security’, which addresses the need to protect software and hardware as well as user’s information from malicious actors, Russia was promoting another term: ‘international information security’. This concept not only encompasses ‘cyber security’ but also focuses on preventing the misuse of information and communication technologies for political purposes. Both the draft Code of Conduct and the draft Convention of 2011 authored by Russia emphasise the importance of state sovereignty and territoriality in cyberspace. The draft Convention also calls for states to acknowledge that aggressive ‘information warfare’ is ‘a crime against international peace and security’ and urges them to refrain from using information and communication technologies (ICTs) ‘to interfere with the internal affairs’ of other countries.13 Some of the main threats listed in this document include actions aimed at undermining the political, economic, and social system of another government, and psychological campaigns carried out against the population of a state with the intent of destabilising society. It also goes into detail about how to prevent military conflicts, as well as the use of the internet by terrorist networks and cybercrime, but the effort to promote non-interference in a country’s internal affairs clearly stands out as one of Russia’s main reasons for drafting the paper. One explanation of such Russian thinking is that the Convention was presented in the midst of a global discussion on what role new technologies – especially social media – played in the wave of popular uprisings that occurred in the Arab countries in 2011, as well as in Iran and some countries in the post-Soviet space before that. A significant number of people who influenced Moscow thinking in the digital domain were convinced that the so-called ‘Arab spring’ and other ‘coloured revolutions’ were inspired and managed from outside and that the internet was one of the tools used to create and foment anti-government sentiment.14 So the goal was to protect the Russian political system from outside manipulation. For that, stricter national legislation was needed – not as intrusive as China’s but resembling it in some ways. One example is the internet blacklist law (that gives the authorities the right to blacklist and shut down certain websites without a trial) adopted in Russia in 2012.15 International agreements were also to be strived for – they should legitimise the right of governments to establish rules in their sovereign cyberspace and ideally record on paper the promise of countries not to use the internet to destabilise other regimes and interfere in their affairs. All members of the Collective Security Treaty Organisation (CSTO) were very much concerned about the same threats and eagerly supported Russian initiatives. During a roundtable discussion in 2013 representatives of the organisation voiced concern 13. Russian Ministry of Foreign Affairs, Convention on International Information Security (Concept), September 22, 2011, http://www.mid.ru/foreign_policy/official_documents/-/asset_publisher/CptICkB6BZ29/content/ id/191666?p_p_id=101_INSTANCE_CptICkB6BZ29&_101_INSTANCE_CptICkB6BZ29_languageId=en_GB 14. Nikolai Patrushev, “The Color Revolutions Will Not Pass in Russia” [An interview with Komsomolskaya Pravda], December 18, 2012, https://www.kp.ru/daily/26003/2929408/ 15. Federal law of Russian Federation no. 139-FZ, https://rg.ru/2012/07/30/zakon-dok.html 46 Russia’s cyber diplomacy that they were losing the ‘information war’ against ‘Western opponents’ and agreed on the need for ‘instruments of counter-propaganda.’16 Russian diplomatic efforts within the BRICS group were also quite successful. In 2015, following an initiative by Moscow, BRICS agreed on the establishment of a working group on cooperation in the ICT sphere.17 In parallel Moscow started to create a network of bilateral agreements aimed at building confidence and enhancing trust between Russia and its partners. In 2013 Russia signed the first ever bilateral cyber agreement – with the US. This set of agreements focused entirely on the technical aspects of cooperation and avoided the issue of content: it provided for the exchange of information between national Computer Emergency Response Teams (CERTs), and the establishing of instant lines of communication on cyber incidents and channels for information exchanges about incidents between the national Nuclear Risk Reduction Centres.18 There were hopes in Moscow that this would be an initial step towards a much more far-reaching treaty with the US, but the conflict in Ukraine that erupted in 2014 put such plans on ice. Since 2015 similar bilateral agreements on confidence-building measures and cooperation in cyberspace have also been concluded with China, India, South Africa, Belarus and Cuba. Russia’s goals for cyber diplomacy Moscow will most probably continue to pursue its goals on a global level – in the UN – as well as on a regional level with like-minded countries, but most actively on a bilateral basis. It is important to mention that Russia has changed or nuanced its position in some respects: Moscow is now publicly acknowledging the importance of the role of other actors in cyberspace – especially business.19 For example the Russian government strongly supported an initiative by the Nornickel group of companies to create an international information security charter for critical industrial facilities. One of the key objectives for President Putin will be the normalisation of the relationship with the United States. In 2017 Moscow proposed to Washington to sign a bilateral agreement on the prevention of dangerous military activities in cyberspace, similar to the US-Soviet Incidents at Sea Agreement of 1972.20 The response from the US side has so far been mixed – Washington initially agreed to consultations but then suddenly postponed them just a day before they were about to start at the end of February 2018 in Geneva. One reason for this hesitant position 16. CSTO summary of the round table of December 19, 2013, http://www.odkbcsto.org/presscenter/detail.php?ELEMENT_ID=3132 17. Declaration of Ufa, (Ufa, Russian Federation), VII BRICS Summit, July 9, 2015, http://static. kremlin.ru/media/events/files/ru/YukPLgicg4mqAQIy7JRB1HgePZrMP2w5.pdf 18. Ellen Nakashima, “U.S. and Russia Sign Pact to Create Communication Link on Cyber Security”, Washington Post, June 17, 2013, https://www.washingtonpost.com/world/national-security/us-and-russia-sign-pact-to-createcommunication-link-on-cyber-security/2013/06/17/ca57ea04-d788-11e2-9df4-895344c13c30_story.html. 19. Andrey Krutskhikh, Interview in Kommersant, April 23, 2018, https://www.kommersant.ru/doc/3611689 20. Ibid. 47 4 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES might be the ongoing investigations in the US about possible Russian meddling in the 2016 presidential elections. In this regard it is noteworthy that in 2017 Moscow also proposed to Washington to sign an agreement on non-interference in each other’s political affairs. But the US administration declined to follow up on this initiative.21 The US ambassador to Moscow, John Huntsman, indicated in March 2018 that Washington might be willing to come back to the idea of consultations on cyber issues with Moscow – provided there is no interference in the November elections.22 But Russian officials vehemently deny the notion that Moscow ever meddled in US internal politics and thus are unwilling to even discuss the idea of giving one-sided guarantees of future non-interference. At the same time, Russia is keen to pursue consultations on possible bilateral agreements in cyberspace with Germany, France, Israel, Japan and South Korea. This list of countries is mentioned in an internal document of the Russian Security Council.23 But given the differences of approach to cybersecurity and accusations of Russian meddling in internal political processes in several of the above-mentioned countries, it is unlikely that the negotiations will yield any quick results. Berlin already cancelled one round of planned consultations, claiming that the Russian government is behind a hacker group called ‘Snake’ that organised a cyberattack on the German ministry of foreign affairs. Russian officials deny this.24 Russia also hopes to rally support for an UNGA resolution by calling for the GGE to be reconvened in 2019. In this matter it especially counts on countries that are members of the CSTO, the SCO and BRICS, and they have voiced preliminary support for Moscow’s position.25The continued and strengthened cooperation on cyber issues with regional organisations – CSTO, SCO, BRICS and the Organisation for Security and Cooperation in Europe (OSCE) – also remains high on the agenda of Russia’s cyber diplomacy. Finally, Russia is also the key actor behind a new convention on countering cybercrime that was presented to the UN two years ago. Russia is not party to the Budapest Convention on Cybercrime of the Council of Europe (mainly because its paragraph 32 allows trans-border access to publicly available stored computer data during cybercrime investigations without prior authorisation).26 The message from Moscow is clear: either the Budapest Convention is adapted (paragraph 32 should be amended 21. John Hudson, “How Secret Talks With Russia To Prevent Election Meddling Collapsed”, BuzzFeed, December 8, 2017, https://www.buzzfeednews.com/article/johnhudson/no-deal-how-secret-talks-with-russia-to-prevent-election#.worZ08JedJ 22. An interview with Ambassador John Huntsman. Kommersant, March 26, 2018, https://www.kommersant.ru/doc/3585482 23. Elena Chernenko, “Russia Is Installing Anti-hacker Programmes”, Kommersant, November 30, 2017, https://www.kommersant.ru/doc/3481987 24. Readout of the joint press-conference of head of Russian MFA Sergey Lavrov and the German minister of foreign affairs Heiko Maas from the 10th of May 2018, May 10, 2018, http://www. mid.ru/foreign_policy/news/-/asset_publisher/cKNonkJE02Bw/content/id/3213546 25. Elena Chernenko and Mikhail Korostikov, “Russia Enters the internet Through the UN”, Kommersant, July 2, 2018, https://www.kommersant.ru/doc/3674882 26. Council of Europe, Convention on Cybercrime, Budapest, November 23, 2001, https://www.coe.int/en/web/ conventions/full-list/-/conventions/rms/0900001680081561; Keir Giles, “Russia’s Public Stance on Cyberspace Issues”, Proceedings of 2012 4th International Conference on Cyber Conflict, Tallinn, 2012, http://www.ccdcoe. org/publications/2012proceedings/2_1_Giles_RussiasPublicStanceOnCyberInformationWarfare.pdf 48 Russia’s cyber diplomacy to specify a voluntary form of cooperation but not a binding one) to attract more signatories (right now 55 countries have signed and ratified it), or a new treaty needs to be adopted. The second option would be preferable for Russia. In 2017 Moscow already presented an alternative document to replace the Budapest Convention.27 Russia’s cyber diplomacy – a double-edged sword The approach adopted by the government of Russia – but also the evolving nature of the risks emanating from the cyber domain – have had two major effects. For quite a long time the dividing lines between different countries were clearly demarcated. Russia and its closest partners (China, members of the CSTO) were promoting the need for global rules of behaviour for governments in cyberspace stressing especially such principles as the sovereignty of states and non-interference in a country’s internal affairs. The US and their allies were very sceptical about these ideas, suspecting that the real motivation behind the other camp’s demands is the wish to legalise censorship and expand governmental control of a free domain.28 But with threats from cyberspace growing (cybercrime, the spreading of terrorist propaganda and hostile acts at state level), more and more Western countries are starting to use similar language calling for more regulation and the right of governments to control information within their jurisdiction. Recently this idea was for the first time publicly endorsed by the UN Secretary General Antonio Guterres, who said that global rules are needed to minimise the impact of electronic warfare on civilians as in his opinion ‘the next war will begin with a massive cyberattack to destroy military capacity ... and paralyze basic infrastructure such as the electric networks.’29 But while we see a growing overlap between Russia and the West in terms of policies and cyber threat perception, the irony of it all is that the negative dynamics in USRussia and EU-Russia relations make the achievement of any global consensus extremely difficult if not impossible. But without cooperation between the main players – including Russia and the Western countries – no regulatory regime in the cybersphere will be effective. 27. Elena Chernenko, “The Virtual Clash of Super Powers,” Kommersant, April 14, 2017, https://www.kommersant.ru/doc/3270136 28. John Markoff and Andrew E. Kramer, “U.S. and Russia Differ on a Treaty for Cyberspace”, New York Times, June 27, 2009, https://www.nytimes.com/2009/06/28/world/28cyber.html 29. “UN Chief Calls For Regulatory Scheme For Cyberwarfare,” Radio Free Europe/Radio Liberty, February 19, 2018, https://www.rferl.org/a/un-guterres-calls-for-cyberwarfare-rules/29049069.html 49 4 Case studies of Russian cyberattacks chapter 5 The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine Piret Pernik This chapter traces the background to and evolution of Russia’s cyber operations against Estonia, Georgia and Ukraine in 2007-2017. Russia has for long employed traditional coercive tools and tactics in its dealings with neighbouring states – threats to cut off energy supplies, capturing political and business elites, co-opting organised crime, disseminating targeted disinformation and propaganda, and manipulating Russian-speaking minorities abroad.1 In recent years Russia has begun to deploy coercive tools in the realm of cyberspace and launch low- and high-end cyberattacks and social media disinformation campaigns.2 In Ukraine Russia seems to have escalated conflict in cyberspace and there is concern that other authoritarian countries who possess cyber and information capabilities may begin to emulate Russia.3 Cyberattacks are difficult to attribute (at least with a high level of confidence) and Moscow has denied the accusations levelled at it on the grounds that countries 1. See “Factbox: Russian Oil and Gas as Political Weapon?”, Reuters, May 2, 2007, https://www.reuters.com/article/us-russiaestonia-energy/factbox-russian-oil-and-gas-as-political-weapon-idUSL0211261020070502; Piret Ehin and Erkki Berg, “Incompatible Identities? Baltic-Russian Relations and the EU as an Arena for International Conflict,“ in Identity and Foreign Policy: Baltic-Russian Relations and European Integration, ed. Piret Ehin and Erkki Berg (Routledge, 2016). For disinformation, propaganda, and the manipulation of Russian-speaking minorities in the Baltic States, see for example, Estonian Foreign Intelligence Service, International Security and Estonia 2017, 16-21, https://www.valisluureamet.ee/pdf/EIB_public_report_ Feb_2017.pdf; Estonian Internal Security Service, Annual Review 2007, 8, https://www.kapo.ee/en/content/annual-reviews. html. For capturing elites and co-opting organised crime in European countries, see Mark Galeotti, “Controlling Chaos: How Russia Manages its Political War in Europe,” European Council on Foreign Relations (ECFR), September 1, 2017. 2. Stephen Blank, a senior fellow for Russia at the American Foreign Policy Council, argues that Russia used cyberattacks against Georgia and Ukraine as coercive tools to compel them to take account of Russian interests. Stephen Blank, “Cyber War and Information War à la Russe,” in Understanding Cyber Conflict: 14 Analogies, ed. George Perkovich and Ariel Levite (Washington, D.C: Georgetown University Press, 2017), https://carnegieendowment.org/2017/10/16/understandingcyber-conflict-14-analogies-pub-72689; For Russia’s cyberattacks and disinformation campaigns against European and North American countries see for example “Moscow is Regaining Sway in the Balkans”, The Economist, February 25, 2017. 3. For instance, Vietnam takes China as a model in developing state censorship including setting up a military unit of internet commentators similar to the Chinese 50 Cent Party. John Reed, “Vietnam army reveals 10,000-strong cyber warfare unit,” Financial Times, December 26, 2017; David Bond, “More countries are learning from Russia’s cyber tactics,” March 15, 2018. 53 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES who have attributed cyberattacks to Russia have not presented enough evidence to support their claims. The EU and NATO have not drawn ‘red lines’ in cyberspace and Russia exploits this ‘strategic ambiguity’ by operating under the threshold of what would be considered the use of force. Russia is also adept at taking advantage of the ambiguity pertaining to the application of international law to cyberspace and the lack of enforcement of voluntary non-binding norms of responsible state behaviour in this domain.4 FIGURE 1 | Russian cyber espionage/attack actors Federal Security Service of the Russian Federation FSB 16th CENTRE 18th CENTRE The 16th Centre is the FSB’s main signals and cyber intelligence unit. The cyber operations of the FSB’s 18th Centre may have targets outside state borders. FSO SPETSSVJAZ The FSO’s Spetssvyaz sub-unit organises national government and military communications and ensures the security of the data transmitted along these channels. TURLA Snake/ Uroburos APT29 The Dukes/ Cozy Bear Foreign Intelligence Service of the Russian Federation SVR In the cybersphere, the SVR’s activity level and capabilities are not comparable to those of the other Russian special services, but the SVR is currently engaged in developing its cyber capabilities. Federal Protective Service of the Russian Federation Cyber criminals and hacktivists APT28 Sofacy/ Fancy Bear GRU Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation 6th DIRECTORATE From Russian territory, the GRU actively carries out cyber and signals intelligence around the world; among the Russian special services, it possesses the best technological capabilities. Data: Estonian Foreign Intelligence Service, 2018. Cyberattack against Estonia (2007) Throughout the 1990s and 2000s the Kremlin attempted to manipulate interpretations of history in the Baltic States (e.g. maintaining that the Baltic States voluntarily joined the USSR in 1940). Already in 2005, following an episode where several World War II memorials in the country were vandalised, Russia accused Estonia of rewriting history, and even of ‘rehabilitating fascism’ and glorifying Nazism. The 2007 cyberattacks must be seen as part of this broader fight between Moscow 4. 54 Robert McLaughlin and Michael Schmitt, “The Need for Clarity in International Cyber Law”, Policy Forum, September 18, 2017, https://www.policyforum.net/the-need-for-clarity-in-international-cyber-law/ The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine and Eastern and Central European countries over war monuments, in this specific instance ‘the Bronze Soldier crisis’. On 26 April 2007 the Estonian government began preparations to relocate this Soviet World War II memorial from the centre of Tallinn to a military cemetery. 5 Unrest and riots involving Russian-speaking youths ensued in Tallinn and Ida-Viru County.6 Russian State Duma members threatened to sever diplomatic relations with Estonia and called on the Estonian government to step down. Russia introduced restrictions on Estonian exports, Russian companies suspended contracts with Estonian firms, Russian rail and port freight transit via Estonia was reduced sharply, and train connections between Estonian and Russia were suspended.7 The members of Nashi, a pro-Kremlin youth group, physically attacked the Estonian ambassador and besieged the embassy facilities in Moscow. Russian information channels went into full-on disinformation mode.8 In addition mobile phone text messages were utilised for spreading disinformation, exhorting the Estonian population to take up armed resistance against the government.9 Russian-language social media platforms and websites called upon volunteers to launch cyberattacks against Estonian political parties and government websites, as well as providing lists of targets, instructions and attack tools.10 Types of cyberattacks: targets, impact, and attribution In this context, cyberattacks against Estonian state institutions, news portals, political parties, banks and other entities commenced on 27 April, a day after the public protests started, and lasted for a period of three weeks until 18 May. Initially the cyberattacks were rather primitive and unsophisticated, mainly consisting of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, website defacements, email spamming and posting of automated comments. However, on 30 April coordinated and sophisticated cyberattacks targeted Estonian critical information infrastructure such as Domain Name Servers (DNS), international routers and the network nodes of telecommunications companies, including the 5. “Russia’s Involvement in the Tallinn Disturbances,” International Centre for Defence and Security, May 11, 2007, https://icds.ee/russias-involvement-in-the-tallinn-disturbances/; for a detailed timeline see “Monument of Contention: How the Bronze Soldier was Removed,” err.news, https:// news.err.ee/592070/monument-of-contention-how-the-bronze-soldier-was-removed. 6. Piret Ehin and Erkki Berg, “Incompatible Identities? ” 7. Compared to 2006, in 2007 Estonian port transit decreased by 15%, and rail transit by 25%. 80-90% of transit comes from Russia. Quarterly Bulletin of Statistics Estonia 2/11, “Statistics Estonia”: 91-102, http://www.stat.ee/valjaanne-2011_eestistatistika-kvartalikiri-2-11; European Parliament, “European Parliament resolution of 24 May 2007 on Estonia”, http:// www.europarl.europa.eu/sides/getDoc.do?type=TA&reference=P6-TA-2007-0215&language=EN&ring=B6-2007-0220 8. For example RTR and Komsomolskaja Pravda spread propaganda. See Estonian Internal Security Service, Annual Review 2007, 8. For examples of Russian propaganda in the internet see Heiki Pääbo,“War of Memories: Explaining ’Memorials War’ in Estonia,” Baltic Security & Defence Review 10 (2008): 22. 9. European Parliament, “European Parliament resolution of 24 May 2007 on Estonia”. 10. Tarmo Ranel, “CERT Eesti tegevuse aastakokkuvõte 2007”, Estonian Information System Authority, https:// www.ria.ee/public/CERT/CERT_2007_aastakokkuv6te.pdf. The Estonian authorities charged an IT student, Dmitri Galushkevich. In addition, Konstantin Goloskokov, a member of the pro-Kremlin Russian youth group Nashi, and Sergei Markov, a State Duma deputy, admitted responsibility for launching cyberattacks. 55 5 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES largest service provider Elion, as well as the state data communication network. The firewalls and servers of public institutions were targeted as well.11 The most serious attacks were launched on 9-15 May against state institutions, telecommunications companies, and the country’s two largest banks (Hansapank and SEB Eesti Ühispank). The attacks primarily affected banking and communications infrastructure: online banking services were inaccessible for all users over a period of two days for up to two hours at a time (and later functioned only partially), in parts of the country DNS services were offline, and three mobile communications operators experienced disruption. As part of an effort to limit the damage caused by the cyberattack, international internet traffic was blocked and users outside Estonia were not able to access online banking and Estonian media and government websites for longer than users in Estonia.12 The government’s ability to communicate effectively and in real time with the media was impaired because its online briefing room was shut down. People were not able to obtain information from websites and email communication with government officials was affected due to the large quantity of spam emails. However, these disruptions were short-lived and did not significantly affect the provision of the government’s communication services. The major inconvenience experienced by ordinary people was their inability to access online banking services, while users outside Estonia were unable to use other e-services because the state portal was inaccessible to them. The Estonian ministry of defence working group that compiled lessons learned from the 2007 cyberattacks suggested that the negative impact of the cyberattacks was marginal mainly because Estonian first responders were able to mitigate the attacks, increase network and server capacity, and take other response measures swiftly and effectively. Had the response not been so professional and efficient, there would have been ‘a critical impact on infrastructure’.13 The financial damage caused by the cyberattack, including the additional costs induced by remedial measures undertaken in the public sector, amounted to about six and a half million Estonian kroons (approximately €415,000). Hansapank’s cybersecurity expert estimated at the time that costs incurred by the biggest bank in Estonia could range from ten million to a billion Estonian kroons (approximately €640,000 to €6.5 million).14 Regarding the attribution of responsibility for the cyberattacks, foreign cybersecurity experts who investigated the 2007 events in Estonia agreed that they were carried out by voluntary or ‘patriotic’ non-state hackers who sympathised with the Russian 11. The volume of the strongest DDoS attacks was approximately 4-5 Mpps (million packets per second). In comparison, in September 2016 the volume of DDoS attacks launched by the Mirai botnet (which was composed primarily of embedded and IoT devices) exceeded 600 Gbps (billion bits per second). See: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46301.pdf. 12. Patrick O’Neill, “The cyberattack that changed the world,” The Daily Dot, May 20, 2016, https://www.dailydot.com/layer8/web-war-cyberattack-russia-estonia/. 13. “Küberrünnete ja küberkaitsealane koondanalüüs“ [Comprehensive Analysis of Cyberattacks and Cyber Defence], Estonian Ministry of Defence, Tallinn, 2007. 14. Kärt Anvelt, “Täismahus: Jaan Priisalu: küberrünnakutest sai Hansapank kahju kuni miljard krooni“ [To the full extent: Jaan Priisalu: Cyberattack inflicted loss of up to a billion kroons on the Hansapank], Eesti Päevaleht, 26 April 2012, http://epl. delfi.ee/news/eesti/taismahus-jaan-priisalu-kuberrunnakutest-sai-hansapank-kahju-kuni-miljard-krooni?id=64309855. 56 The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine government’s views.15 According to officials from the Estonian Computer Emergency Response Team (CERT), Russian-language websites called on volunteers to launch cyberattacks targeting Estonian websites weeks before the start of the cyberattacks that were originally planned for 9 May when Russia celebrates Victory Day.16 Another cybersecurity expert noted that ‘preparations for an online attack’ started ‘in the days leading up to the attack.’17 However, according to Stephen Blank, sources in the Estonian government told him that the planning of street demonstrations and cyberattacks began already in 2006.18 While there is no evidence to support the latter viewpoint, the fact that relatively sophisticated cyberattacks targeted key nodes of critical information infrastructure indicates that some reconnaissance activities were carried out in advance. Apart from the lack of conclusive technical evidence there was little doubt in the eyes of Estonians that the objectives of the cyber campaign aligned with the interests of the Russian government. Several Estonian politicians, for example Urmas Paet, the minister of foreign affairs, said that IP-addresses used for launching the cyberattacks belonged to the Russian government and government officials, including the President’s administration.19 Moreover, only a well-resourced organised crime group or a state actor would have been in a position to identify key targets, and rent sufficiently large botnets to sustain the volume of cyberattacks over such a long period. The Russian authorities implicitly supported the perpetrators because they declined to cooperate on legal issues with Estonian authorities investigating the attacks. This indicates that it was not in the interest of the Russian government to stop the cyberattacks and to punish the perpetrators. Changing perceptions of the 2007 cyberattacks Given the evolution of Russia’s more aggressive cyber espionage and increasingly devastating cyberattacks in the intervening decade, perceptions of the 2007 cyberattacks have changed. It has become a widely-shared view among security experts that Russia is waging a political war aimed at undermining the legitimacy of democratic institutions in liberal democratic countries.20 Accordingly, the 2007 cyberattacks are interpreted by Russian foreign policy analysts and cyber experts as an example of Russia’s coercion employed together with diplomatic, economic, 15. Gadi Evron, “Battling Botnets and Online Mobs: Estonia’s Defense Efforts during the Internet War,” Georgetown Journal of International Affairs 9, no. 1 (Winter/Spring 2008): 122–23, https://ht.transparencytoolkit. org/FileServer/FileServer/whitepapers/botnet/Battling%20Botnets.pdf; See discussion about the involvement of the Russian government in Andreas Schmidt, “The Estonian Cyberattacks”, in ed. Jason Healey, The Fierce Domain - Conflicts in Cyberspace 1986-2012, Atlantic Council, 2013, 19-20. 16. Andreas Schmidt, “The Estonian Cyberattacks”, in ed. Jason Healey, The Fierce Domain - Conflicts in Cyberspace 1986-2012, Atlantic Council, 2013, 6. 17. Gadi Evron, ‘Battling Botnets and Online Mobs: Estonia’s Defense Efforts during the Internet War’. 18. Stephen Blank, “Cyber War and Information War à la Russe”, http://carnegieendowment. org/2017/10/16/cyber-war-and-information-war-la-russe-pub-73399. 19. Välisministri avaldus, May 1, 2007, https://www.valitsus.ee/et/uudised/valisministri-avaldus 20. Political war can be understood as a foreign policy strategy that deploys a mix of traditional and covert instruments of influence (diplomacy, economic measures, intelligence operations, military pressure, organised crime, etc.). Other scholars use the notions of hybrid, non-linear, new generation, asymmetric, non-kinetic, etc. warfare. 57 5 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES information and other tools.21 At the time of the incident, the international media speculated that the attacks were carried out by unorganised non-state actors, who acted spontaneously motivated by nationalism, and that they were not directly supported by the Kremlin. At the same time, several Estonian politicians tried to frame the cyberattacks as a military or existential threat from the very beginning, describing them as ‘cyber war’, ‘cyberterrorism’ and even invoking ‘World War III.’22 The ‘Bronze Soldier crisis’ highlighted the cognitive dimension of cyberattacks, i.e. the way in which cyberattacks can impact perceptions, induce emotions, and potentially even change opinions and behaviour. It is widely recognised today, including by some militaries, that cyberattacks can have a far-reaching psychological impact, in particular when employed in support of information operations.23 In 2007 Jaak Aaviksoo, the Estonian minister of defence, said that the aim of the cyberattacks was to ‘destabilise Estonian society, creating anxiety among people that nothing is functioning, the services are not operable. This was clearly psychological terror in a way.’24 Indeed, the psychological effects on Estonian decision-makers and the population at large can be considered as the most significant consequence of the 2007 cyberattacks. A senior official, a member of the government’s crisis management committee who discussed the situation at an extraordinary meeting, has recalled that the committee was uncertain about the potential impact that the ongoing cyberattacks would have not only on key infrastructure but also on Estonia’s international reputation as a global leader in the development of e-government and the digital society. Had the cyberattacks disabled the provision of vital services on a large scale, public trust in the government and digital infrastructure would have been seriously compromised.25 21. Russia’s actions in Estonia in 2007 are seen as part of its long-term attempt to preserve influence in its near abroad. See for example Michael Connell and Sarah Vogler, “Russia’s Approach to Cyber Warfare,” CAN Corporation, March 2017, https://www.cna.org/cna_files/pdf/DOP-2016-U-014231-1Rev.pdf. Jason Healey and Michelle Cantos write that “The Russian cyber assault on Estonia in 2007 was a blueprint for a geopolitically inspired and just-deniableenough digital disruption.” Jason Healy and Michelle Cantos, “What’s Next for Putin in Ukraine: Cyber Escalation?” in Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers (Tallinn: NATO CCD COE, 2015.) 22. Jaak Aaviksoo, “Tähelepanuta jäänud III maailmasõda,” Eesti Päevaleht, 18 June 2007, http://epl.delfi. ee/news/arvamus/jaak-aaviksoo-tahelepanuta-jaanud-iii-maailmasoda?id=51091172. 23. According to the US Joint Doctrine cyberspace operations create effects in the information environment. Joint Publication 3-12, “Cyberspace Operations,” 8 June 2018, http://www.jcs.mil/Portals/36/Documents/Doctrine/ pubs/jp3_12.pdf?ver=2018-06-19-092120-930. Cyberattacks against Estonia in 2007 can be considered as ‘cyber influence attacks’ with the aim of influencing decision-making or public opinion. See Pascal Brangetto and Matthijs Veenendaal, “Influence Cyber Operations: The Use of Cyberattacks in Support of Influence Operations”, in 8th International Conference on Cyber Conflict, ed. N. Pissanidis, H. Rõigas and M. Veenendaal (Tallinn: NATO CCD COE Publications, 2016), 113–26. The cognitive effects of cyber operations are discussed in Larry Welch, “Cyberspace – the Fifth Operational Domain,” Institute of Defense Analysis, Research Notes, 2011. 24. “Looking West – Estonian Minister of Defense Jaak Aaviksoo,” Jane’s Intelligence Review, October 2007. 25. Interview with Lauri Almann, ICDS, 2013. 58 The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine Cyberattacks against Georgia (2008) The attack Cyberattacks on Georgian websites coincided with the start of the military conflict on 8 August (according to the LEPL Data Exchange Agency the cyberattacks had been planned in advance but started on 9 August).26 Targets of DDoS attacks included 54 Georgian websites, including about 90% of state institution (gov.ge) websites and a large number of .ge domain addresses. Attack methods included website defacements, mass email spamming and malicious payloads on web applications (SQL injections).27 Similarly to what happened during the 2007 Estonian cyberattacks Russian-language internet forums (e.g. StopGeorgia.ru, Xakep.ru) distributed lists of targets, instructions and attack tools. According to the Georgian Computer Emergency Response Team (CERT) the IP addresses and DNS that were used to launch attacks belonged to a Russian organised crime group known as the Russian Business Network (RBN).28 Several cybersecurity experts maintain that RBN was affiliated with the Russian security services (the group ceased their activities shortly after the cyberattacks conducted in Georgia).29 Innovations Compared to Estonia a year earlier, a new feature was a sophisticated cyber espionage campaign conducted around the time that the military conflict occurred. The campaign was discovered by the Georgian authorities several years later, in March 2011. A malware, WIN32/Georbot, collected sensitive and classified information related to national security in the networks of Georgian state institutions, financial and non-governmental organisations. The Georgian authorities attributed the campaign to the Russian security services (and substantiated the allegation with technical evidence which included a web camera screenshot of a person who carried out the campaign).30 Several cybersecurity experts who analysed technical evidence combined with the overall geopolitical and strategic context, believe that the cyberattacks against Georgia during the military conflict were coordinated with Russian military operations.31 This indicates that the perpetrators had links to the Russian military 26. DDoS attacks started on 8 August, but some attacks were also conducted in July, for example, on 19 July the website of the President of Georgia was hit by DDoS attacks. See Eneken Tikk, Kadri Kaska and Liis Vihul, “Georgia 2008”, in International Cyber Incidents: Legal Considerations (Tallinn: NATO CCD COE, 2010). 27. Structured query language (SQL) injections are one of the most prevalent and most dangerous web application hacking techniques. 28. Presentation by Irakli Gvenetadze, LEPL Data Exchange Agency, Garmisch-Partenkirchen, Germany, 12 December 2014. 29. A report by the US Cyber Consequences Unit implied that DDoS attacks were executed via RBN botnets and servers. Other security experts also identified the use of RBN infrastructure and tools. See John Markoff “Before the Gunfire, Cyberattacks,” New York Times, August 12, 2008, https://www.nytimes.com/2008/08/13/technology/13cyber.html. 30. LEPL Date Exchange Authority and the Ministry of Justice linked the cyberattacks to “Russian Official Security Agencies”. See “Cyber Espionage against Georgian Government. Georbot Botnet,” CERT.gov.ge, http://dea.gov.ge/uploads/CERT%20DOCS/Cyber%20Espionage.pdf 31. Stephen Blank, “Cyber War and Information War à la Russe.” 59 5 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES or state authorities. Some security experts are of the opinion that the cyberattacks were pre-planned and pre-attack reconnaissance was conducted. 32 The technical report of a cybersecurity company provides evidence for this opinion and attributes the cyberattacks to Russian hackers who have links to the Russian security services.33 Cyber as a tool in military conflict The 2007 attacks against Estonia led to a paradigm shift denoting the expansion of national security and defence into cyberspace, while the Georgian cyberattacks marked the use of cyberattacks as part of military conflicts. The Georgian cyberattacks facilitated a radical shift in military thinking – for example, Kenneth Geers, a cyber expert, wrote in August 2008 that all political and military conflicts ‘now have a cyber dimension’.34 Many NATO militaries in the late 2000s recognised cyberspace as a military domain, followed by the NATO declaration at the 2016 Warsaw summit. The document states: ‘[… ]we reaffirm NATO’s defensive mandate, and recognise cyberspace as a domain of operations in which NATO must defend itself as effectively as it does in the air, on land, and at sea.’35 Russia deployed cyberattacks, disinformation and psychological operations as part of its broader ‘information confrontation’ approach and as force multipliers for conventional military operations. The activities of various proxies, Russian state media, military, and security services appear to have been coordinated and occasionally even synchronised. In sum, 15 months after a concerted attempt to undermine Estonian state institutions Russia demonstrated an enhanced ability to outsource cyberattacks to non-state proxies, to effectively coordinate cyber, information and military operations among various actors, and to leverage strategic impact from targeted cyber-espionage operations. 36 Non-kinetic cyber activities supported the achievement of Russia’s strategic and military objectives in Georgia. 32. Ibid. 33. John Leyden, “Russian Spy Agencies Linked to Georgia Cyber-attacks”, The Register, March 23, 2009, http://www.theregister.co.uk/2009/03/23/georgia_russia_cyberwar_analysis/. 34. Kenneth Geers, “Cyberspace and the Changing Nature of Warfare,” SCMagazine, August 27, 2008 https:// www.scmagazine.com/cyberspace-and-the-changing-nature-of-warfare/article/554872/ 35. Warsaw Summit Communiqué, NATO, July 9, 2016, https://www.nato.int/cps/en/natohq/official_texts_133169.htm 36. Piret Pernik, “Hacking for Influence,” ICDS Analysis, February 18, 2018, https://www.icds.ee/fileadmin/media/ IMG/2018/Publications/ICDS_Analysis_Hacking_for_Influence_Piret_Pernik_February_2018.pdf. 60 The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine Cyberattacks against Ukraine (2014-2017) First wave The number of DDoS attacks and website defacements against Ukrainian websites had been increasing since December 2013, but the majority of the cyberattacks were relatively unsophisticated and their impact on digital infrastructure was negligible. In addition to these types of attacks hackers compromised email accounts and broadcast stolen information online, flooded mobile phones with calls and sms messages and sent out mass text messages containing propaganda. Main targets were news portals, media outlets, state institutions, banks and political parties.37 The scale of the cyberespionage campaigns in Ukraine was unprecedented. Cybersecurity companies and experts detected malware affiliated to Russian hackers (Snake/ Uroburos/Turla, RedOctober, MiniDuke, NetTraveler) in Ukrainian networks that had been active since 2010. In 2017 a cybersecurity company, Palo Alto Networks, discovered another Russian cyberespionage operation in Ukrainian networks – the Gamaredon Group that had been active at least since 2013. Another cybersecurity company discovered the Russian cyberespionage campaign Operation Armageddon which according to them had targeted officials in the Ukrainian military and national security establishment in 2013-15. The Ukrainian security services attributed the cyberespionage to their Russian counterparts. Escalation: cyberattacks on infrastructure Apart from cyberattacks against the election infrastructure and the long-term cyber-espionage campaigns, other cyberattacks targeting Ukraine were relatively unsophisticated. This changed in December 2015 when it was first publicly acknowledged that cyberattacks against the energy sector had caused a major power outage. Damaging cyberattacks were carried out also in 2016 against Ukrainian critical infrastructure (the energy sector including the Kyiv power grid, Kyiv airport, and the financial sector including the Treasury, Pension Fund, etc.).38 It seems likely that these attacks were preplanned as already in May 2014 the destructive malware BlackEnergy 2/3 was delivered to six Ukrainian railway companies and in August 2014 the same malware infected the computer systems of regional state institutions. The Ukrainian security services accused the Russian government of being behind these attacks. The cyberattacks that caused the most extensive economic damage were carried out with NotPetya ransomware/wipeware in June 2017 by Russian 37. Glib Pakharenko, “Cyber attacks in the Ukraine: Quantitative Analysis December 2013-March 2014”, (Powerpoint presentation, unpublished). 38. John Leyden, “BlackEnergy Power Plant Hackers Target Ukrainian Banks,” The Register, December 15, 2016, http://www.theregister.co.uk/2016/12/15/ukraine_banks_apt; “Cyber Operations Tracker,” Council on Foreign Relations (CFR), https://www.cfr.org/interactive/cyber-operations#CyberOperations. 61 5 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES military intelligence. These attacks disabled 10% of computers in Ukraine and inflicted financial costs amounting to 0.5% of Ukraine’s GDP.39 Cyberespionage and destructive cyberattacks against the energy and financial sectors required long-term network reconnaissance, were pre-planned and carefully targeted. Some cyberattacks were attributed to pro-Russian and pro-separatist hacker groups (e.g. CyberBerkut, Cyber Riot Novorossiya, Green Dragon).40 One of the most serious cyberattacks for which CyberBerkut admitted responsibility compromised the networks of the Ukrainian Central Election Committee (in April and in May 2014). Information in the election infrastructure databases was destroyed and the hackers deleted log files in order to cover their tracks.41 The attackers also deployed a malware designed to interfere with software that was used to broadcast election results on the Central Election Committee webpage. According to an official of the Ukrainian Computer Emergency Response Team, traces of the Russian Advanced Persistent Threat (APT) 28 (Tsar Team/Sofacy/Sednit/Fancy Bear/Pawn Storm) group were detected in 2014 in the Ukrainian Central Election Committee networks.42 APT28 has been attributed by the US security services and those of many other countries to Russian military intelligence. The New York Times, citing FBI sources, also reported that APT28 was found in hardware on the Ukrainian Central Election Committee servers.43 This evidence suggests that the Russian security services and/or military were involved in the cyberattacks against Ukrainian election infrastructure in 2014. Exchange of information regarding the election results must have been pre-planned between the hackers and the Russian TV station Channel 1 which again suggests that the Russian government was involved.44 Impact In terms of disruption of Ukrainian communication networks the most effective operations were physical attacks against digital infrastructure by Russian military and special forces during the annexation of Crimea. Russian forces cut data cables, took over servers, confiscated mobile phones and seized local radio and TV towers, as well as the Internet Exchange Point in Crimea, and rerouted internet traffic via Russian network nodes. Russian social media companies blocked access to accounts, 39. NotPetya has been attributed to Russian military intelligence by several countries, including Australia, Canada, New Zealand, the UK, the US and Denmark. 40. Cybersecurity experts believe that CyberBerkut has links to the Russian security services. For hactivist groups see Nastia Kostyuk, and Yuri M. Zhukov, “Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events? “, University of Michigan, July 12, 2017, https://scholar.harvard.edu/files/zhukov/files/kz_idf_v25.pdf. 41. Oleksii Baranovskyi et al, “(Cyber)Securing Ukrainian Energy Infrastructure,” Fundacja im. Kazimierza Pulaskiego, Warsaw 2016. 42. Nikolai Koval, “Revolution Hacking,” in Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers (Tallinn: NATO CCD COE, 2015). 43. Andrew Kramer and Andrew Higgins, “In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking,” New York Times, August 16 2017, https://www.nytimes. com/2017/08/16/world/europe/russia-ukraine-malware-hacking-witness.html. 44. The Russian state TV station Channel 1 broadcast the fake graphic, which had clearly been provided by hackers in advance. Andrew Kramer and Andrew Higgins, “In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking,” New York Times, August 16, 2017. 62 The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine webpages, and the blogs of Ukrainian opposition figures. In addition to the physical destruction and disruption of infrastructure and cyberattacks, the Russian military carried out disinformation operations and electronic warfare (EW). They used integrated cyber and electromagnetic capabilities to geo-locate Ukrainian troops and bombarded them and their relatives with demoralising and threatening text messages.45 Russian information operations against Ukraine also took place on an unprecedented scale and according to security experts were successful.46 There was effective, almost real-time coordination of information operations with military operations, special operations, and diplomatic measures. In sum, Russian government cyberattacks against Ukraine incurred extensive economic losses for the country, and damage to digital and critical infrastructure; while Russia’s integrated deployment of information, cyber and EW capabilities was successful. Compared to Georgia in 2008, in Ukraine Russia demonstrated a more sophisticated approach and an increased emphasis on the need to achieve information superiority. Conclusion The cyber-operations campaign conducted by Russia against Estonia in 2007 constituted ‘a blueprint for a geopolitically inspired and just-deniable-enough digital disruption.’47 A comparison of the successive cyberattacks undertaken by Russian hackers against Estonia, Georgia and Ukraine in the period 2007-2017 demonstrates that Russia was able to draw lessons from previous experiences and has over time perfected the use of cyberattacks to support both political warfare and conventional military operations. The Russian military has integrated cyber, EW and information operations capabilities with military operations, and Ukraine was a testing ground for novel approaches. Russia escalated the cyber conflict in Ukraine by conducting destructive cyberattacks against ‘supercritical’ infrastructure (specifically the energy and finance sectors) and causing large-scale economic damage. Russian cyber-operations capability has evolved during the last decade and now plays a key role in the military operational environment and contributes to increasing its asymmetric capability. Russian government cyber actors have undermined democratic institutions, caused great economic loss and damaged critical infrastructure in neighbouring countries and in Western Europe and North America. Destructive malware used by Russian 45. Roger N. McDermott, “Russia’s Electronic Warfare Capabilities to 2025: Challenging NATO in the Electromagnetic Spectrum,” International Centre for Defence and Security (ICDS) Report, September 2017. 46. Vladimir Sazonov et al. (eds.), Russian Information Campaign Against the Ukrainian State and Defence Forces (Tartu: NATO Strategic Communication Centre of Excellence, 2016), https://www.stratcomcoe. org/russian-information-campaign-against-ukrainian-state-and-defence-forces-0. 47. Jason Healy and Michelle Cantos, “What’s Next For Putin in Ukraine?” 63 5 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES APTs has been found in the administrative and business networks of the US energy grid.48 US, UK and Australian intelligence authorities have warned that Russia has infiltrated Western energy, telecommunications and media sectors.49 Security services caution that the purpose of such infiltration is not merely cyberespionage, but that it is motivated by an intent to activate destructive malware at a time of crisis. Given the way in which Russia escalated cyber conflict in Ukraine in 2015-2017, it is possible that if the present political and information confrontation with the West intensifies, the Russian government would not have any qualms about conducting destructive cyberattacks against the West. 48. E.g. BlackEnergy, Havex, CrashOverride. See James Conca, “Here Are The Clever Means Russia Used To Hack The Energy Industry,” Forbes, March 28, 2018, https://www.forbes.com/sites/jamesconca/2018/03/28/how-on-earth-did-russiahack-our-energy-systems/#64f be87d6104; Andy Greenberg, “Hackers Get Direct Access to US Power Grid Controls,” Wired, June 9, 2017, https://www.wired.com/story/hackers-gain-switch-flipping-access-to-us-power-systems. 49. “UK Cyber-defence Chief Accuses Russia of Hack Attacks,” BBC News, November 15, 2017, http://www. bbc.com/news/technology-41997262; “Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices”, US-CERT, April 16, 2018, https://www.us-cert.gov/ncas/alerts/TA18-106A 64 chapter 6 Russian cyber activities in the EU Jarno Limnell In an increasingly digital and interconnected world, in which cyber threats pose a growing danger to the safety and security of EU member state citizens, effectively addressing such threats has become a key priority for the EU. As European Commission President Jean-Claude Juncker pointed out in his 2017 State of the Union address, ‘cyber-attacks can be more dangerous to the stability of democracies and economies than guns and tanks’.1 Nation-states and non-state actors are currently testing the boundaries of the ‘cyber battlefield’ while malicious cyber activities are not only occurring more frequently but are also becoming increasingly sophisticated. Resourceful state-sponsored actors must be understood as the most ubiquitous malicious agents in cyberspace. Defending their networks against such attackers is therefore a primary concern for both commercial organisations and governmental institutions.2 At the same time, nation-states are significantly investing in strengthening their cyber capabilities.3 As stated in the 2018 Munich Security Report, the past few years have been marked by the emergence of a group of countries with superior cyber-capabilities.4 And Russia is foremost among them. This chapter focuses on how Russia employs its cyber capabilities in the EU member states. First, it briefly sketches the evolving cyber threat landscape and the role of cyber in Russia’s hybrid operations. The second part explores Russia’s malicious cyber activities in the EU. The chapter concludes with some practical recommendations on how to beef up cyber defence capabilities in Europe. 1. European Commission, President Jean-Claude Juncker´s State of the Union address 2017, September 13, 2017, https://ec.europa.eu/commission/sites/beta-political/files/soteu-explained_en.pdf 2. European Union Agency for Network and Information Security (ENISA), Threat Landscape Report 2017, January 2018, 7, https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2017 3. Jarno Limnéll, “The Cyber Arms Race is Accelerating – What are the Consequences?”, Journal of Cyber Policy, 1, no.1 (2016): 50-60. 4. Munich Security Conference, Munich Security Report 2018, 51, https://www.securityconference. de/en/discussion/munich-security-report/munich-security-report-2018/ 65 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES The evolving cyber threat landscape When assessing the EU’s security environment it is vital to keep in mind that the current trend in societies and businesses, – as well as in methods of conducting warfare – is a drive towards a convergence between the cyber/virtual world and the physical world. The EU’s endeavour to finalise the Digital Single Market and strengthen the EU’s digital economy is underpinned by an awareness of this convergence between the virtual and physical spheres. The central role of digital platforms and internet-enabled technologies also implies that in today’s world many threats are intertwined and cyber has become a critical component of most hybrid operations. The 2018 Global Risks Report from the World Economic Forum clearly illustrates these growing interconnections between different threats and vulnerabilities.5 The multifaceted cause-effect relationships between different threats and actors, and their constantly morphing interaction, make operating in the security environment even more challenging. The complex and ‘innovative nature’ of today´s threats appears also in hybrid warfare, which ‘intentionally blurs the distinction between the times of peace and war’,6 and in which cyber operations are often a key element. This can be explained by the fact that the anonymity that characterises cyber operations sometimes makes it very difficult to locate and identify the adversary and consequently design the appropriate response (for a detailed analysis, see chapter 3 of this volume on the attribution of cyberattacks, pp. 33-42). In addition, ambiguity pertaining to the legal definition of the digital environment in which cyber capabilities are deployed makes the conduct of malicious cyber activities politically less risky for the perpetrators. One of the associated challenges is the practical application of existing international law to cyberspace, which many states have recognised as a principle but still struggle with operationalising. The lack of clarity on this aspect and unwillingness of some countries to move the debate forward results in a situation whereby ‘little green bytes’ can move freely across borders causing damage equivalent to that wrought by conventional weapons and conflicts.7 An aspect that complicates cyber-enabled operations further is the involvement of non-state actors which allows governments sanctioning an unlawful act to hide behind a veil of plausible deniability. Several such hacker groups have been linked to cyber operations subsequently attributed to Russia. 8 5. World Economic Forum, The Global Risks Report 2018, 5, https://www.weforum.org/reports/the-global-risks-report-2018 6. Aapo Cederberg and Pasi Eronen, “How are Societies Defended Against Cyber Threats?”, Strategic Security Analysis, no. 9, September 2015, https://www.gcsp.ch/News-Knowledge/Publications/How-are-Societies-Defended-against-Hybrid-Threats 7. See e.g. Kenneth Geers, ed., Cyber War in Perspective: Russian Aggression against Ukraine (Tallinn: NATO CCDCOE,2015). 8. For example the hacker groups described as APT28 (also known as Fancy Bear and Sofacy) and APT29 (also known as Cozy Bear and The Dukes). 66 Russian cyber activities in the EU Russia’s objectives and information warfare doctrine Russian theorists and practitioners conceptualise cyber operations within the broader framework of information warfare, a holistic concept that includes computer network operations, electronic warfare, psychological operations and information operations.9 Russia´s National Security Strategy 2020 states that ‘confrontation in the global information arena’ is now intensifying and that achieving information superiority in cyberspace is Russia´s essential goal.10 During the Cold War ‘active measures’ or disinformation and malign influence operations, were well-integrated into Soviet policy and involved virtually every element of the Soviet party and state structure. Today´s hybrid operations are simply the continuation of those measures. In this context, as Russia employs all available means to achieve its national and geostrategic objectives,11 the cyber domain has become one of the primary theatres for Russian military and political operations. What is undeniably new in Russia’s approach is the reliance on new tools and methods specific to the cyber domain. General Valery Gerasimov – who masterminded Russia’s approach to cyber operations12 – confirmed some years ago that ‘the information space opens wide asymmetrical possibilities for reducing the fighting potential of the enemy’.13 The ‘weaponisation of information’ involves the exploitation of social media in particular to disseminate propaganda and disinformation (including factual distortion and fabricated information) in order to manipulate public opinion and achieve certain political ends. Russia´s cyber-enabled activities are deployed to further Moscow’s broader geopolitical aspirations: to assert Russia´s claim to ‘great power’ status; to consolidate its dominance over its self-proclaimed sphere of influence; to destabilise and distract the West to such a degree that it cannot counter Russian actions effectively; and to undermine hostile governments and Western power structures such as NATO and the EU.14 Over the years, Russia has invested steadily in developing its cyber capabilities. The conflict in Ukraine has provided opportunities for Moscow to further refine its cyber and disinformation techniques. Even if it is difficult to ascertain precisely how ‘cyber capable’ a certain state is, Russia is believed to be one of the global leading 9. See e.g. Michael Connell and Sarah Vogler, Russia´s Approach to Cyber Warfare, CNA, September 2016, http://www.dtic.mil/dtic/tr/fulltext/u2/1019062.pdf 10. Security Council of the Russian Federation, National Security Strateg y to 2020, Moscow 2009, 4. 11. See “New Cyber Defence Doctrine Approved by Russian Government”, SC Magazine UK, January 6, 2017. 12. Mark Galeoti, “I’m Sorry for Creating the Gerasimov Doctrine,” Foreign Policy, March 5, 2018, http://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/ 13. Valery Gerasimov, “Tsennost Nauki v Predvidenniye,” Voenno-promyshlenni Kurier, February 27, 2013. 14. See e.g. Mark Galeotti, “Controlling Chaos: How Russia Manages Its Political War in Europe,” Policy Brief, European Council on Foreign Relations (ECFR), September 1, 2017, https://www.ecfr.eu/ publications/summary/controlling_chaos_how_russia_manages_its_political_war_in_europe 67 6 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES players in this domain with several high-profile attacks attributed directly to groups linked to the Russian government. For example, the Russian government has been suspected of sponsoring cyberattacks on energy infrastructure throughout Europe, especially in Ukraine and the Baltic States.15 Russia’s malicious activities against the EU The extensive scope of Russia’s cyber operations is generally recognised by EU policymakers. The European Parliament in November 2016 adopted a resolution stating that Russia’s goal is to distort truths, provoke doubt, divide member states, engineer a strategic split between the European Union and its North American partners, discredit the EU institutions and transatlantic partnerships as well as to undermine and erode ‘the European narrative based on democratic values, human rights and the rule of law’.16 Sir Julian King, European Commissioner for the Security Union, stated openly that ‘there is little doubt’ that the EU is subject to a sophisticated, carefully orchestrated pro-Russian government-led disinformation campaign in Europe.17 A report presented by the Estonian Foreign Intelligence Service in 2018 also asserted that the past few years have shown that the cyber threat against the West is growing and that most of the malicious cyber activity originates in Russia.18 An analysis by the Alliance for Securing Democracy found, for instance, that the Russian government has ‘used cyberattacks, disinformation, and financial influence campaigns to meddle in the internal affairs of at least 27 European and North American countries since 2004.’19 Recently the so-called Five Eyes – the intelligence alliance between the US, UK, Canada, New Zealand and Australia – and several EU member states have openly attributed WannaCry and NotPetya malware attacks to Russia.20 15. Symantec, “Dragonfly: Western Energy Sector Targeted By Sophisticated Attack Group,” October 20, 2017, https://www. symantec.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks; Stephen Jewkes and Oleg Vukmanovic, “Suspected Russia-Backed Hackers Target Baltic Energy Networks”, Reuters, May 11, 2017, https://www.reuters.com/ article/us-baltics-cyber-insight/suspected-russia-backed-hackers-target-baltic-energy-networks-idUSKBN1871W5 16. European Parliament, “European Parliament Resolution of 23 November 2016 on EU Strategic Communication to Counteract Propaganda against it by Third Parties,” 2016/2030(INI), November 23, 2016. 17. ”EU-Kommissar geißelt prorussische Desinformationskampagne”, Zeit online, January 27, 2018. 18. Estonian Foreign Intelligence Service, International Security and Estonia 2018, 52. In a similar vein, the Council on Foreign Relations has found that Putin’s regime appears intent on using almost any means possible to undermine the democratic institutions and transatlantic alliances that have underwritten peace and prosperity in Europe. See: Committee on Foreign Relations United States Senate, “Putin´s Asymmetric Assault on Democracy in Russia and Europe,” January 10, 2018, 8, https://www.gpo.gov/fdsys/pkg/CPRT-115SPRT28110/html/CPRT-115SPRT28110.htm 19. The countries included Belarus, Bulgaria, Canada, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Georgia, Germany, Hungary, Italy, Latvia, Lithuania, Macedonia, Moldova, Montenegro, Norway, Poland, Portugal, Spain, Sweden, Turkey, United Kingdom, Ukraine, and the United States. Oren Dorell, ‘‘Alleged Russian Political Meddling Documented in 27 Countries Since 2004,’’ USA Today, September 7, 2017, https://eu.usatoday.com/story/ news/world/2017/09/07/alleged-russian-political-meddling-documented-27-countries-since-2004/619056001/ 20. Phil Muncaster, “Five Eyes Nations United in Blaming Russia for NotPetya”, Info-Security, February 19, 2018, https://www.infosecurity-magazine.com/news/five-eyes-united-blaming-russia/ 68 Russian cyber activities in the EU Attacks against digital societies and infrastructure In 2017, advanced persistent threats (APTs) of Russian origin received considerable attention in Europe. The German government reportedly suffered a large-scale cyberattack, when the Russian hacking group APT28 placed malware in a government network and infiltrated both the foreign ministry and the defence ministry.21 Also, to cite just a few examples, Norway, Denmark, the Netherlands and Italy have accused Russia of advanced cyber espionage. For example in Norway, according to the Norwegian security service, democratic institutions, the Police Security Service and the country’s Radiation Protection Authority have been targeted.22 German intelligence officials have accused Russia of hacking the German government’s computer networks as well as those of national energy firms.23 These cyber espionage and hacking activities – targeting governments, political entities and EU institutions in order to extrapolate and collect classified information – suggest that sophisticated cyber espionage and data manipulation operations are being conducted in the EU. The most serious risk emanating from these activities is not so much the theft or loss of digital information but rather the fact that it can be manipulated. Manipulation of such data compromises its integrity – the validity of the information can no longer be trusted. Unreliable, manipulated information could pose a serious challenge to judicious political decision-making as well as to societies in the digital era. At the same time, it is often forgotten that the internet relies on physical infrastructure in order to function. Approximately 97% of global communications are still transmitted via transoceanic cables. In a single day, these estimated 213 independent cable systems carry $10 trillion worth of financial transfers and vast amounts of data, including phone and video communications, emails and classified diplomatic and military messages.24 While geopolitical boundaries can be easily and quickly crossed in cyberspace, there are still sovereignty issues tied to the physical cable systems. In sum, undersea cables are vital to digital societies and their importance will increase – also as one method of hybrid influencing. 21. “Germany Admits Hackers Infiltrated Federal Ministries, Russian Group Suspected”, DW, February 28, 2018, https:// www.dw.com/en/germany-admits-hackers-infiltrated-federal-ministries-russian-group-suspected/a-42775517 22. “Norway Blames Russian Hackers for Cyber Attack on Spy Agency, Ministries”, Sydney Morning Herald, February 4, 2017, https://www.smh.com.au/world/norway-blames-russianhackers-for-cyber-attack-on-spy-agency-ministries-20170204-gu5hx4.html 23. “Cyber-Espionage Hits Berlin: The Breach from the East”, Der Spiegel, March 5, 2018, http://www.spiegel.de/international/ germany/cyber-espionage-likely-from-russia-targets-german-government-a-1196520.html“German Intelligence Sees Russia Behind Hack of Energy Firms: Media Report”, Reuters, June 20, 2018, https://www.reuters.com/article/usgermany-cyber-russia/german-intelligence-sees-russia-behind-hack-of-energy-firms-media-report-idUSKBN1JG2X2 24. Rishi Sunak, “Undersea Cables: Indispensable, Insecure”, Policy Exchange, London 2017, 1213, https://policyexchange.org.uk/wp-content/uploads/2017/11/Undersea-Cables.pdf 69 6 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES FIGURE 2 | Submarine telecommunications cables that supply the world’s internet CABLES WORLDWIDE (approx.) of global communications transmitted via cables beneath the oceans estimated independent cable systems trillion in financial transfers per day CABLES IN AND AROUND EUROPE schematic NORTH AMERI GR CA E EN LA ND IA SS RU submarine cable EUROPE I NT LA AT C OC EA N landing point AFRICA Data: policyexchange.org.uk, 2018; European Marine Observation and Data Network, MODnet Human Activities: Telecom cables (schematic routes), 2018. 70 Russian cyber activities in the EU There has been increasing concern in the West (especially in the US and UK) that Russia may interfere with Western undersea communications infrastructure. Recently NATO decided to re-establish a Cold War-era command post in the North Atlantic as Russian submarines increase activity in the vicinity of undersea cables.25 At the same time Russia is investing in and enhancing its maritime capabilities. Intensified Russian interest in civilian internet communications infrastructure is one possible indicator of future plans. These activities (damaging and/or tapping cables) can be seen as another manifestation of Russia´s asymmetric ‘grey zone operations’ – allowing Russia to achieve its objectives from behind a mask of deniability and thus without triggering a strong response. Attacks against digital democracies Elections lie at the heart of the democratic political process. They are seen as nothing less than democracy in practice. The risk of cyber-enabled meddling in European elections is real, and, when assessing the hybrid threat, elections have emerged as key targets. The Italian general election this year, the French presidential election in 2017 (for more detailed analysis, see the chapter on ‘The Macron leaks’ on pp. 73-81 of this volume), the Brexit referendum and US General Election in 2016, to name but a few, have all been subject to influence by malign external agents. It is hard to evaluate precisely how strong or far-reaching an impact these cyber-psychological operations have had, but interfering in European elections is something that should not be tolerated under any circumstances. The interference in the election campaign in France is a good example of how cyber operations include not just hacking and leaks, but the use of fake news and other forms of manipulation. According to several research findings and reports, the interference originated from Russia.26 Russia not only denies responsibility for these activities but claims that European countries were meddling in its presidential election.27 Russian officials have denied hacking France and Germany and have tended to shrug off the wider allegations, with President Vladimir Putin dismissing them as nonsense. Moreover, the Russian government is striking back and saying that ‘a new era of information warfare against Russia is upon us.’28 But Western countries are becoming more vocal in their accusations against Moscow as Russia’s cyber interference in European elections shows no signs of abating. Clearly a set of measures to defend digital democracies against disinformation campaigns, hackers and cyberattacks is urgently required. 25. ”Facing Russian threat, NATO boosts operations for the first time since the Cold War”, Washington Post, November 8, 2017. 26. “Cyber Experts ‘99% Sure’ Russian Hackers are Targeting Macron”, France24, April 27, 2017. 27. ”Russia Accuses Europe of Meddling in Presidential Election”, Politico, 15.2.2018, https:// www.politico.eu/article/russia-accuses-europe-election-meddling/ 28. “Kremlin Slams ’Russophobic’ Allegations that Pin NotPetya Cyber Attack on Russia”, TASS, February 15, 2018, http://tass.com/politics/990154 71 6 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES What next? As all the signs are that hostile cyber activities initiated by Russia will continue, it is important that EU countries take the necessary steps to defend themselves against such attacks. The more digitalised societies in the EU become, the more vulnerable they are to targeted attacks of this nature – and the more effective these cyberattacks will be. In addition to increasing cyber defence and societal resilience to confront different forms of cyber hostility, it is important for European countries to reinforce their cyber capabilities in four distinct areas. Firstly, one defensive strategy is of course the old-fashioned solution, i.e. dedigitalisation; however, states should have recourse to this only where it is absolutely necessary. Elections constitute one area where the use of digital technologies should be reconsidered. For example, even if Finland is one of the most digitalised countries in the world, the Finnish government has recently decided that online voting should not be introduced in general elections as the risks are greater than the benefits.29 In the Netherlands the Dutch government’s approach to dealing with the fear of Russian election hacking has been to abandon electronic vote counting and revert to hand-counted votes, opting for a ‘pen and paper’ election.30 Secondly, the EU´s ‘political cyber playbook’ is currently still a slim volume that needs to be substantially expanded. In order to counteract Russia´s increasing cyber aggression the EU needs to strengthen its political decision-making process and develop practical tools to respond to these hostile cyber activities. Europe must have a stronger deterrent against cyberattacks. The Russian government will continue its state-sponsored cyberattacks because it perceives that it currently can do so with relative impunity. It is in the EU’s interests to develop effective strategies to counter Russia’s cyber operations and have the political courage to act against it. The publication of the EU’s ‘Cyber Diplomacy Toolbox’31 initiative is a step in the right direction, but active deterrence is also necessary.32 Thirdly, the way private sector companies collect and analyse data, create increasingly sophisticated algorithms, develop disruptive technology and build their own global undersea internet cable systems, for example, already reflects their power and influence 29. Oikeusministeriö, Nettiäänestyksen edellytykset Suomessa, Mietintöjä ja lausuntoja 60/2017 [Ministry of Justice, Prerequisites for online voting in Finland, reports and statements, no. 60, 2017.] 30. “Dutch Go Old School against Russian Hacking”, Politico, May 3, 2017, https://www. politico.eu/article/dutch-election-news-russian-hackers-netherlands/ 31. European Council, “Cyber Attacks: EU Ready to Respond with a Range of Measures, Including Sanctions,” Press Release, June 19, 2017, http://www.consilium.europa.eu/en/press/press-releases/2017/06/19/cyber-diplomacy-toolbox/ 32. Jarno Limnéll and Sico van der Meer, “EU Cyber Diplomacy Requires More Commitment”, EUObserver, July 7, 2017, https://euobserver.com/opinion/138456 72 Russian cyber activities in the EU in today’s world.33 Technology companies should be actively consulted and invited to participate in discussions where the EU is making decisions on cybersecurity. Engaging the private sector is an important step in order to strengthen European cybersecurity. Last but not least, if we only prepare ourselves for the cyber-enabled disinformation and influence methods that have been seen and experienced hitherto, we will always be one step behind the attacker. It is vital that European countries are able to both pool and share their experiences of cyberattacks and together to be able to anticipate future cyber threats – and be ready to respond to them. 33. Jarno Limnéll, “Countering Hybrid Threats: Role of Private Sector Increasingly Important. Shared Responsibility Needed,” Hybrid CoE, Strategic Analysis, March 2018, https://www. hybridcoe.fi/wp-content/uploads/2018/03/Strategic-Analysis-2018-3-Limnell.pdf 73 6 chapter 7 Lessons from the Macron leaks Jean-Baptiste Jeangène Vilmer Introduction1 In the long list of attempts by foreign entities to interfere in electoral processes in recent years, the 2017 French presidential election will remain the exception that proves the rule. The coordinated attempt to undermine the electoral campaign of candidate Emmanuel Macron succeeded neither in interfering with the outcome of the election nor in swaying French voters and, for this reason, is especially interesting to study. In the second round run-off Macron defeated the far-right candidate, Marine Le Pen. In using the term ‘the Macron leaks’, we refer here not only to the release on Friday 5 May 2017 — just two days before the second and final round of the presidential election — of gigabytes of data (including 21,075 emails) that were hacked from Emmanuel Macron’s campaign team, but more generally to the orchestrated campaign against him that started months earlier with a series of disinformation operations. The researcher Mika Aaltola, who used the 2016 US presidential election as a reference case, 2 has identified five distinct stages of election meddling. According to this paradigm, the Macron leaks reached only stage three: there was a disinformation campaign, data hacking, large-scale leaking of e-mails and text documents, but no whitewashing or mainstreaming. What was successfully prevented was ‘information laundering,’ the process whereby traces of external meddling are ‘washed’ from the information, stories and narratives manufactured by the hackers.3 1. This chapter is a synthesis of a longer report, The Macron Leaks: A Post-Mortem Analysis, to be published by the CSIS, Washington, D.C. in the autumn of 2018. A Brief focusing on the lessons learned has already been published: Jean-Baptiste Jeangène Vilmer, “Successfully Countering Russian Electoral Interference: 15 Lessons Learned from the Macron Leaks,” CSIS, Washington D.C., 21 June 2018. 2. Mika Aaltola, “Democracy’s Eleventh Hour: Safeguarding Democratic Elections Against Cyber-Enabled Autocratic Meddling,” Briefing Paper 226, Finnish Institute of International Affairs (FIIA), November 2017. 3. Boris Toucas, “Exploring the Information-Laundering Ecosystem: The Russian Case”, Center for Strategic & International Studies, Commentary, August 31, 2017. 75 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES What happened? An orchestrated disinformation campaign against the presidential candidate had started months earlier: it included the dissemination of rumours, fake news and forged documents, a hacking operation and finally the leak of emails and data at a key moment in the election campaign. Step 1: Disinformation campaign It began with rumours and insinuations that intensified in January and February 2017. For example, on 4 February 2017, the Kremlin-affiliated Sputnik news agency published an article presenting Macron as a ‘US agent’ backed by a ‘very wealthy gay lobby.’4 Some political attacks came also from ‘Marine Le Pen’s “Foreign Legion” of American Alt-Right Trolls.’5 Attacks were both political (characterising Macron as an aristocrat who despises the common man, a rich banker, a globalist puppet, a supporter of Islamic extremism and an advocate of uncontrolled immigration, etc.) and personal (including salacious remarks about the age difference between him and his wife, rumours that he was having an affair with his step-daughter, speculation about his sexual orientation, etc.). Last but not least was the ‘#MacronGate’ rumour spread two hours before the final televised debate between Emmanuel Macron and Marine Le Pen, on Wednesday, 3 May at 7:pm (French time). A user with a Latvian IP address posted two fake documents on the US-based forum 4chan, suggesting that Macron had a secret offshore account. It was quickly spread by some 7,000 Twitter accounts, mostly pro-Trump, often with the #MacronGate and #MacronCacheCash hashtags. During the live televised debate, Le Pen herself alluded to it. The rumour was quickly debunked and several media sources decisively proved these documents to be fabricated.6 Step 2: Data hacking and leaking Interestingly, the same people who posted the fake documents on 4chan on Wednesday announced on Friday morning that more were coming.7 Those responsible for ‘MacronGate’ thereby provided evidence that they were the same people responsible for the ‘Macron leaks’ that came out later that day. The hack was performed by phishing attacks. Macron’s team confirmed that their party had been targeted since 4. “Ex-French Economy Minister Macron Could Be ‘US Agent’ Lobbying Banks’ Interests,” Sputnik, February 4, 2017. 5. Josh Harkinson, “Inside Marine Le Pen’s ‘Foreign Legion’ of American Alt-Right Trolls,” Mother Jones, May 3, 2017. 6. “How We Debunked Rumours that Macron Has an Offshore Account,” France 24 – The Observers, May 5, 2017. 7. Chris Doman, “MacronLeaks – A Timeline of Events,” AlienVault, May 6, 2017. 76 Lessons from the Macron leaks January 2017.8 Several attacks were carried out by email spoofing: in one instance, for example, campaign staffers received an email apparently coming from the head of press relations, providing them with ‘some recommendations when [talking] to the press’ and inviting them to ‘download the attached file containing talking points.’9 In total, the professional and personal email accounts of at least five of Macron’s close collaborators were hacked, including those of his speechwriter, his campaign treasurer and two members of parliament.10 The hackers waited until the very last moment to leak the documents: 5 May 2017, only one hour before official campaigning stopped for the period of ‘election silence,’ a 44-hour political media blackout ahead of the closing of the polls. The files were initially posted on Archive.org, then on PasteBin and 4chan. Pro-Trump accounts (William Craddick,11 Jack Posobiec12) were the first to share the link on Twitter, with the hashtag #MacronLeaks, quickly followed by WikiLeaks. Overall, the hashtag ‘#MacronLeaks reached 47,000 tweets in just three and a half hours after the initial tweet.’13 Other fake documents spread on Twitter included emails that were not in the dump, from or to people who did not exist. An obviously fake email, allegedly written by Macron’s Director of General Affairs, included declarations such as ‘my love for Yaoi [Japanese gay manga] and progressive metal prevented me from seeing the truth.’14 This and other obscene statements were retweeted more than 1,000 times. The Macron leaks reveal the following pattern of operation: first, the content is dumped onto the political discussion board of 4chan (/pol/). Second, it is transferred to mainstream social networks like Twitter. Third, it is spread through political communities, notably the US alt-right and French far-right, via ‘catalyst’ accounts, or ‘gurus’ (Craddick, Posobiec), and retweeted by both real people (‘sect followers’)15 and bots. The use of bots was pretty obvious given that some accounts posted almost 150 tweets per hour.16 8. Michel Rose and Eric Auchard, “Macron Campaign Confirms Phishing Attempts, Says No Data Stolen,” Reuters, April 26, 2017. 9. Mounir Mahjoubi, interviewed in Antoine Bayet, “Macronleaks : le responsable de la campagne numérique d’En Marche! accuse les ‘supports’ du Front national,» France Info, May 8, 2017, https://mobile.francetvinfo. fr/politique/emmanuel-macron/video-mounirmahjoubi-patron-de-lacampagne-numerique-d-emmanuelmacron-le-macronleaks-ca-pue-la-panique_2180759.html#xtref=https://t.co/cJLsohjh7U 10. Frédéric Pierron, «MacronLeaks : 5 victimes et des failles de sécurité,» fredericpierron.com blog, May 11, 2017. 11. The founder of Disobedient Media, Craddick is notorious for his contribution to the ‘Pizzagate’ conspiracy theory that targeted the Democratic Party. He was one of the first to spread the rumour about Macron’s supposed secret bank account on Twitter at 9:37 pm. It was quickly retweeted by some 7,000 Twitter accounts, mostly pro-Trump. 12. An infamous American alt-right and pro-Trump troll: https://en.wikipedia.org/wiki/Jack_Posobiec 13. Ben Nimmo, Naz Durakgolu, Maks Czuperski and Nicholas Yap, “Hashtag Campaign: #MacronLeaks. Alt-right Attacks Macron in Last Ditch Effort to Sway French Election,” Atlantic Council’s Digital Forensic Research Lab, 6 May 2017. 14. Josh Caplan, (@joshdcaplan) (@BreitbartNews), May 2017, https://twitter.com/joshdcaplan/ status/860868394534522880/photo/1?tfw_creator=%40Slatefr&tfw_site=Slatefr&ref_src=twsrc%5Etfw&ref_ url=http%3A%2F%2Fwww.slate.fr%2Fstory%2F145221%2Fle-macronleaks-est-une-fakenews 15. The ‘gurus’/’sect followers’ mechanism has been described by Lion Gu, Vladimir Kropotov and Fyodor Yarochkin, “The Fake News Machine: How Propagandists Abuse the Internet and Manipulate the Public,” A Trendlabs Research Paper, Trend Micro, 2017, 42. 16. Nimmo et al., “Hashtag Campaign”. 77 7 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Who did it? Attribution is a complex and sensitive issue. At the time of writing, more than a year after the incident, France still has not publicly attributed the attacks to any particular perpetrator. On June 1, 2017, Guillaume Poupard, the head of the French National Cybersecurity Agency (ANSSI), declared that ‘the attack was so generic and simple that it could have been practically anyone.’17 The expert community, however, has pointed to the Kremlin. There were several reasons to justify this attribution. First, the email address ([email protected]) initially used to upload the files on Archive.org is registered with the same German webmail provider that was implicated in the 2016 cyberattack against Angela Merkel’s party,18 which was attributed to APT28, a cyberespionage group linked to Russia’s Main Intelligence Directorate, better known by its Russian acronym GRU.19 Of course, this alone does not prove anything as GMX Mail has over 11 million active users. Second, all of the Excel bookkeeping spreadsheets that were leaked contained metadata in Cyrillic and indicate that the last person to have edited the files is an employee of the Russian information technology company EUREKA. Among the company’s clients are several government agencies, including the Russian Federal Security Service (FSB).20 However, it is difficult to infer anything from this connection as it could very well be a false flag operation pointing to Moscow. Third, Putin’s confidant Konstantin Rykov, sometimes nicknamed the ‘chief troll’, who boasted of his role in securing Trump’s election, also acknowledged having failed in the case of France: ‘We succeeded, Trump is president. Unfortunately Marine did not become president. One thing worked, but not the other.’21 It was no secret that Macron’s opponent, Marine Le Pen, was the Kremlin’s favoured candidate. In 2014, her party, the Front National, received a loan of €9.4 million from the First Czech-Russian Bank in Moscow. One month before the election, Le Pen travelled to Moscow to meet with Putin; she claimed that it was their first meeting, but in reality it was their third.22 This suggests that the Kremlin made a major ‘investment’ in the Front National.23 None of these facts proves anything, but the available evidence, taken together, does point in the direction of Moscow. With one notable exception: the user responsible 17. Andrew Rettman, “Macron Leaks Could Be ‘Isolated Individual’, France Says,” EU Observer, June 2, 2017. 18. Sean Gallagher, “Evidence Suggests Russia Behind Hack of French President-Elect,” Ars Technica, May 8, 2017. 19. Feike Hacquebord, “Pawn Storm Targets German Christian Democratic Union,” TrendLabs Security Intelligence Blog, May 11, 2016. 20. Gallagher, “Evidence Suggests Russia Behind Hack of French President-Elect”. 21. Konstantin Rykov in a mediametrics.ru interview, in the documentary directed by Paul Moreira, “La guerre de l’info: au cœur de la machine russe” 2017, https://www.arte.tv/ fr/videos/075222-000-A/guerre-de-l-info-au-coeur-de-la-machine-russe 22. According to Pierre Malinowski, former adviser to Jean-Marie Le Pen, interviewed in the documentary “La guerre de l’info.” 23. Ibid. 78 Lessons from the Macron leaks for ‘Macron Gate’ two days before the leak, may in fact be an American neo-Nazi hacker, Andrew Auernheimer.24 Given the well-known alliance that exists between the Kremlin and American far-right movements, 25 these two hypotheses are not incompatible. Why did it fail? Ultimately, the whole operation did not significantly influence French voters. This outcome can be attributed to a combination of structural factors, luck, as well as good anticipation and reaction by the Macron campaign staff, the government and civil society, especially the mainstream media. Structural reasons Compared with other countries, especially the US and the UK, France presents a less vulnerable political and media environment for a number of reasons. First, the election of the president is direct, making any attempt at interference in the election in favour of one of the candidates more obvious. Furthermore, the French election has two rounds, which creates an additional difficulty for the attackers as they do not know in advance who will make it to the second round. Additionally, this permits voters to mobilise in the event of an unexpected result after the first round. In addition, the French media environment is pretty resilient: there is a strong tradition of serious journalism, the population refers mostly to mainstream sources of information, while tabloid-style outlets and ‘alternative’ websites are less popular than they are in the US and in the UK. Finally, cartesianism plays a role: rationality, critical thinking, and a healthy scepticism are part of the French DNA and are encouraged from primary school and throughout one’s professional life. The element of luck In this story, as in any success story, good luck has a part to play: the Macron team was lucky that the hackers and other actors involved in this operation made a number of mistakes. First, they were overconfident. They overestimated their ability to shock and mobilise online communities, underestimated the resistance and the intelligence of the 24. David Gauthier-Villard, “U.S. Hacker Linked to Fake Macron Documents, Says Cybersecurity Firm,” Wall Street Journal, May 16, 2017. 25. Casey Michel, “America’s Neo-Nazis Don’t Look to Germany for Inspiration. They Look to Russia”, Washington Post, August 22, 2017. 79 7 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES mainstream media and, above all, they did not expect that the Macron campaign staff would react – let alone react so cleverly (see below). They also overestimated the interest of the population in an operation that ultimately revealed nothing. They assumed that creating confusion would be enough, and that the content of the leaks would somehow be secondary. But, as it became obvious that the thousands of emails and other data were, at best, boring and, at worst, totally ludicrous, the public lost interest. Second, the idea to launch the offensive just hours before the electoral silence period was a double-edged sword: the goal was certainly to render Macron unable to defend himself, and to mute the mainstream media. And maybe, because the leaks did not contain anything interesting, they decided to play up the announcement of the revelation rather than the content itself. In any case, this choice of timing did not leave provocateurs with sufficient time to spread the information. Third, the attack also suffered from cultural clumsiness. Most of the catalyst accounts (and bots) were in English because the leaks were first spread by the American alt-right community. This was not the most effective way of penetrating a French-speaking population. It also likely alienated some French nationalist voters who are not inclined to support anything American. Learning from others Paris somehow learned from the mistakes witnessed during the American presidential campaign: disdain for and an attitude of benign neglect towards disinformation campaigns, reluctance to address and frame the hacking of the Democratic National Committee (DNC), a delayed response, etc. In January 2017, the defence minister acknowledged that ‘our services are having the necessary discussions on this subject, if only to draw lessons for the future.’ Relying on the relevant actors Two bodies played a particularly crucial role. First, the National Commission for monitoring the presidential electoral campaign (CNCCEP), a special body set up in the months preceding every French presidential election and serving as a campaign watchdog. Second, the National Cybersecurity Agency (ANSSI), whose mission was two-fold: to ensure the integrity of electoral results and to maintain public confidence in the electoral process. In addition, the campaign managers were quick to reach out to law enforcement authorities and report the hack. As a consequence, on Friday night, as the leak was underway and only hours after the initial dump, the public prosecutor’s office in Paris opened an investigation. 80 Lessons from the Macron leaks Raising awareness ANSSI and the CNCCEP alerted the media, political parties and the public about the risk of cyberattacks and disinformation during the campaign. ANSSI proactively offered to meet and educate the campaign staffs of all candidates in the very early stages of the election: in October 2016, it organised a workshop. All but one party (the Front National) participated. Showing resolve and determination From the start of the electoral campaign, the French government promptly signalled its determination to prevent, detect and, if necessary, respond to foreign interference, both publicly and through more discreet and diplomatic channels. The minister of defence said that ‘by targeting the electoral process of a country, one undermines its democratic foundations, its sovereignty’ and that ‘France reserves the right to retaliate by any means it deems appropriate.’26 The minister of foreign affairs said that ‘France will not tolerate any interference in its electoral process.’27 A similar message was conveyed directly by the minister to his Russian counterpart and by President Hollande to President Putin. Beat hackers at their own game ANSSI raised the level of security for voting infrastructures by securing the whole electoral process chain to ensure its integrity. Following ANSSI’s recommendation, the ministry of foreign affairs announced at the beginning of March 2017 the end of electronic voting for citizens abroad because of an ‘extremely high risk’ of cyberattacks. As the hacks could not be avoided, the En Marche!28 team set up traps: ‘You can flood the emails of your employees with several passwords and logins, both real and fake, that the [hackers] spend a lot of time trying to understand them,’ explained Mounir Mahjoubi, the digital manager of Macron’s campaign team.29 This diversionary tactic, which involves creating fake documents to confuse the attackers with irrelevant and even sometimes deliberately ridiculous information, is called ‘cyber blurring’ or ‘digital blurring’. It was successful in shifting the burden of proof on to the attackers: the Macron campaign staff did not have to justify potentially compromising information contained in the Macron leaks; rather, the hackers had to justify why they stole and leaked information which seemed, at best, useless and, at worst, false or misleading. 26. Ibid. 27. Martin Untersinger, “Cyberattaques: la France menace de ‘mesures de rétorsion’ tout État qui interférerait dans l’élection,” Le Monde, 15 February 2017. 28. The name of Emmanuel Macron’s political movement is La République en Marche! (REM), sometimes shortened to En Marche! 29. Mounir Mahjoubi, interviewed in Raphaël Bloch, “MacronLeaks: comment En Marche a anticipé les piratages “, Les Echos, May 10, 2017. 81 7 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES The importance of strategic communication During the entire campaign, the En Marche! team communicated openly and extensively about its susceptibility to a hacking attack, and then very soon about the hacking operation itself. When the leaks finally happened, En Marche! reacted in a matter of hours. At 11:56 pm on Friday 5 May, only hours after the documents were dumped online and 4 minutes before the electoral media blackout went into effect, the campaign staff issued a press release.30 The robust and continuous presence of the Macron campaign staff on social media enabled them to respond quickly to the spread of the information. They systematically responded to posts or comments that mentioned the ‘Macron Leaks.’ The campaign’s injection of humour and irony into their responses increased their visibility across different platforms. The En Marche! press release says that the leaked documents ‘reveal the normal operation of a presidential campaign.’ In fact, nothing illegal, let alone interesting, was found. In addition, Macron’s team was very engaged with traditional media outlets, stressing their responsibility for professional reporting. On Friday night, Macron’s team referred the case to the CNCCEP which issued a press release the day after, asking ‘the media not to report the content of this data, especially on their websites, reminding them that the dissemination of false information is a breach of law, notably criminal law.’31 The majority of traditional media sources responded to this call by choosing not to report on the content of the leaks. Undermining propaganda outlets On April 27, Macron’s campaign confirmed that it had denied RT and Sputnik accreditations to cover the rest of the campaign. Even after the election, both outlets have been banned from the Élysée presidential palace and foreign ministry press conferences. The decision is justified on two grounds. First, these outlets are viewed as propaganda organs for the Kremlin – this is not only Macron’s position, expressed clearly during the campaign and most famously in front of President Putin at the Versailles press conference only weeks after the election, but it has been the position of the European Parliament as early as November 2016.32 Second, attendance at these press conferences is by invitation only so there is no need for French institutions to justify their exclusion of these news outlets. 30. En Marche!, Communiqué de Presse, « En Marche a été victime d’une action de piratage massive et coordonnée », May 5, 2017, https://en-marche.fr/articles/communiques/communique-presse-piratage 31. Commission nationale de contrôle de la campagne électorale en vue de l’élection présidentielle, « Recommandation aux médias suite à l’attaque informatique dont a été victime l›équipe de campagne de M. Macron, » May 6, 2017, http://www.cnccep.fr/communiques/cp14.html 32. European Parliament resolution of 23 November 2016 on EU strategic communication to counteract propaganda against it by third parties (2016/2030(INI)). 82 Lessons from the Macron leaks Conclusion Overall, structural factors as well as an effective, proactive strategy allowed the French authorities to successfully mitigate the damage of the Macron leaks. But the threat persists. Therefore, in the last year, the Macron administration took additional steps: first, in January 2018, the president announced his intention to pass legislation on the issue of ‘fake news’ by the end of the year. In March 2018, the minister of culture, Françoise Nyssen, revealed further details about the ‘fake news’ bill,33 which was renamed in May from a law “Against false information” (contre les fausses informations) to a law “relating to the fight against information manipulation” (relative à la lutte contre la manipulation de l’information). It has yet to be passed. Second, in March 2018,34 the minister of culture committed to double her ministry’s allotted budget for media and information literacy, increasing it from €3 to €6 million. Third, the foreign ministry’s Policy Planning Staff (Centre d’analyse, de prévision et de stratégie, - CAPS) and the defence ministry’s Institute for Strategic Research (Institut de recherche stratégique de l’Ecole militaire, of which the author is the director), launched an inter-ministerial working group on what we refer to as ‘information manipulation.’ The final product is a report including concrete recommendations for all actors – states, civil society and digital platforms.35 For France, our main recommendation is the creation of an inter-ministerial structure entirely devoted to detecting and countering information manipulation. 33. Françoise Nyssen, Speech at the “Assises du journalisme” (annual gathering of French media professionals), Tours, March 15, 2018, http://www.culture.gouv.fr/Presse/Discours/Discours-de-Francoise-Nyssenprononce-a-l-occasion-des-Assises-internationales-du-journalisme-de-Tours-jeudi-15-mars-2018 34. Ibid. 35. J.-B. Jeangène Vilmer, Alexandre Escorcia, Marine Guillaume, Janaina Herrera, Information Manipulation: A Challenge for Our Democracies, report by the Policy Planning Staff (CAPS) of the Ministry for Europe and Foreign Affairs and the Institute for Strategic Research (IRSEM) of the Ministry for the Armed Forces, Paris, August 2018. 83 7 chapter 8 The next front: the Western Balkans Oscar Jonsson For many years now, countries in the Western Balkans have been on a steady, albeit slow, path towards membership of Europe’s two main regional organisations: the EU and NATO.1 Until 2014, Russia was not perceived as a major obstacle vis-à-vis their Western integration. Since the annexation of Crimea, however, Russia has reemerged as a disruptive actor and a problem for the EU in the region. For Russia, the enlargement of the EU and NATO represents a strategic setback, and hindering, and potentially reversing, this process is a primary objective for the Kremlin. The Western Balkans has thus become an arena for increasing geopolitical competition between Russia and the EU and the US. As Russia’s economy has faltered under the impact of declining oil prices and Western sanctions and the country has become increasingly isolated on the international stage, Moscow’s strategy since 2014 has been characterised by disruption and manipulation. In this competition, cyber tools are a key instrument enabling Russia to promote its political agenda. Russia has repeatedly employed cyber tools to punish, disrupt and disinform. Large-scale cyberattacks have been carried out either discretely or as a part of complex hybrid operations in combination with other coercive means. Cyberattacks seek not only to cause widespread disruption but also to undermine partners’ confidence in the targeted states and increase the potential cost of integrating them. Russia has been especially effective in the information-psychological arena, where Russian narratives have received significant amplification through social media, Russian-language websites and dissemination in local media outlets. The informationpsychological domain is key for eroding support for the EU and NATO in the region and increasing polarisation between pro-EU and pro-Russian factions. 1. Albania, the former Yugoslav Republic of Macedonia (FYROM), Montenegro and Serbia are candidate countries to the EU. The latter two are currently engaged inmembership negotiations. Albania and FYROM obtained conditional opening of accesion negotiaitons. Bosnia and Herzegovina, and Kosovo have the status of potential candidates. Albania and Montenegro are NATO-members, FYROM received an invitation in 2018 to join NATO, while Bosnia and Herzegovina is an aspirant country; Serbia has an individual partnership action plan with NATO. See European Commission, “A Credible Enlargement Perspective for and Enhanced EU Engagement with the Western Balkans”, 2018, https://ec.europa. eu/commission/sites/beta-political/files/communication-credible-enlargement-perspective-western-balkans_en.pdf 85 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Cyberattacks and espionage Countries in the region have been frequently targeted by malicious activities. The most notable of these was the alleged theft of the entire Serbian national identity database in late 2014. The hackers were apparently motivated by grievances that the Serbian police were lax on Albanian cyber criminals.2 A month later, Serbia faced its largest cyberattacks – in the form of distributed denial-of-service (DDoS) attacks – so far, targeting the majority of Serbian media websites.3 Many of the targeted webpages were knocked offline for hours and the hackers claimed to be working for Albanian interests. Other cyberattacks that occurred in the region included: the Serbian justice ministry’s website being hacked with calls for civil resistance;4 DDoS attacks on the OSCE’s Freedom of the Media website after the organisation publicised criticism of Serbia;5 cyberattacks against Kosovar journalists;6 as well as a denial-of-service (DoS) attack on Bosnian, Albanian and Serbian media outlets.7 Cyberattacks and cyber intrusions are thus a common occurrence, which increases the opportunities for Russia to conduct them in the knowledge that they cannot be attributed to Moscow with any degree of certainty. However, in the Western Balkans, Montenegro has been the most notable target of cyberattacks and cyber espionage with a Russian footprint. Such activity increased notably as Montenegro embarked on its path to NATO membership; Montenegro concluded association negotiations with NATO in May 2016 and joined the Alliance in June 2017. The Montenegrin government saw the number of cyberattacks increase from 22 in 2013 to over 400 in 2017, where the state institutions and media were the most frequent targets.8 A report for the public administration ministry concluded that ‘the severity and sophistication of cyberattacks affecting Montenegro during 2016 were reflected in the increased number of identified attacks on infrastructure and cyber espionage cases, as well as through phishing campaigns which targeted civil servants.’9 The ministry also mentioned an increase in the hacking of banks and private companies. 2. Pierluigi Paganini, “Serbia – Hackers claimed to have stolen the entire national database,” Security Affairs, December 13, 2014, https://securityaffairs.co/wordpress/31068/cyber-crime/serbia-hackers-stolen-national-database.html 3. Mike Walker, “The Cyber-attacks and Fears of Cyber-war to Come,”InSerbia, 21 October 21, 2014, https://inserbia.info/today/2014/10/the-cyber-attacks-and-fears-of-cyber-war-to-come/ 4. Nemanja Cabric, “Serbs Detain ‘Anonymous’ Cyber Warrior for Sabotage”, Balkan Insight, March 9, 2012, <http://www.balkaninsight.com/en/article/serbs-detain-anonymous-cyber-warrior-for-sabotage> 5. Marija Ristic, “Hacker Attacks ‘Try to Censor’ OSCE Website,” Balkan Insight, June 4, 2014, <http://www.balkaninsight.com/en/article/osce-website-under-cyber-attack> 6. Die Morina, “Kosovo Authorities “Failing to Punish Journalists’ Attackers,” Balkan Insight, February 24, 2017, <http://www.balkaninsight.com/en/article/safety-of-journalists-in-kosovo-02-24-2017> 7. OSCE, “Hacker Attacks on Media Websites Endangers Media Freedom, Says OSCE Representative,” October 21, 2014, https://www.osce.org/fom/125709 8. Dusica Tomovic and Maja Zivanovic, “Russia’s Fancy Bear Hacks its Way Into Montenegro,” Balkan Insight, March 5, 2018, <http://www.balkaninsight.com/en/article/russia-s-fancy-bear-hacks-its-way-into-montenegro-03-01-2018> 9. Dusica Tomovic, “Montenegro on Alert Over Rise in Cyber Attacks,” Balkan Insight, January 10, 2017, http://www.balkaninsight.com/en/article/montenegro-on-alert-over-cyber-attacks-01-09-2017 86 The next front: the Western Balkans On the day of the parliamentary elections, 16 October 2016, large-scale DDoS attacks targeted state webpages and network infrastructure, as well as the websites of proNATO and pro-EU political parties, civil society webpages and electoral monitors’ webpages.10 Several state institution websites were brought down by the attacks, as well as the webpages of pro-governmental parties. The website of the electoral watchdog, the Center for Democratic Transition, also became inaccessible. Montenegrin media claimed that the attack was carried out by the same Russian hackers that interfered with the 2016 US elections.11 This claim was echoed by the cybersecurity group Trend Micro, who identified APT28 (Advanced Persistent Threat 28) as the actor responsible for the attacks.12 APT28 is also known as Fancy Bear and is a hacking group directed by the GRU, the Russian military intelligence agency. They gained notoriety for leaking the Democratic National Committee’s emails in the 2016 US election campaign, but also for carrying out cyberattacks against the German parliament and the French television channel TV5. The government in Podgorica directly accused Russia of intervening in the Montenegrin election.13 This should also be seen in conjunction with the attempted coup in Montenegro that took place on election day. On the same day as the cyberattacks, the Montenegrin authorities arrested twenty people with Serbian, Montenegrin and Russian citizenship. Notably, Russian GRU intelligence officers Eduard Shirokov (alias Shishmakov) and Vladimir Popov were identified as the organisers of the coup, which sought to assassinate the prime minister.14 Both Shirokov and Popov were intercepted in Serbia in possession of Montenegrin special forces uniforms and are being prosecuted in absentia for their involvement in the coup attempt.15 Twelve people have been indicted in Montenegro and are awaiting trial. In January 2017, the Montenegrin ministry of defence was targeted by a spear phishing attack (a targeted attempt to steal data and/or install malware). Emails that appeared to come from the EU and NATO had attachments that enabled hackers to upload a malware called Gamefish, which has been a signature method used by APT28.16 Gamefish is a Trojan virus that allows access to the computer at hand so that its data can be exfiltrated.17 The data can be used for intelligence purposes, but also for targeting in cyberattacks. 10. Vesko Garcevic, “Congressional Testimony to Committee on Senate Select Intelligence,” June 28, 2017. 11. Dusica Tomovic, “Montenegro on Alert Over Rise in Cyber Attacks”, Balkan Insight, January 10, 2017, http://www.balkaninsight.com/en/article/montenegro-on-alert-over-cyber-attacks-01-09-2017 12. “Update on Pawn Storm: New Targets and Politically Motivated Campaigns, Trend Micro, January 12, 2018, https://blog. trendmicro.com/trendlabs-security-intelligence/update-pawn-storm-new-targets-politically-motivated-campaigns 13. Dusica Tomovic, “Montenegro on Alert Over Rise in Cyber Attacks,” Balkan Insight, January 10, 2017, http://www.balkaninsight.com/en/article/montenegro-on-alert-over-cyber-attacks-01-09-2017 14. Vesko Garcevic, “Congressional Testimony to Committee on Senate Select Intelligence,” June 28, 2017,. 15. Dimitar Bechev, “The 2016 Coup Attempt in Montenegro: Is Russia’s Balkans Footprint Expanding?,” Foreign Policy Research Institute, April 12, 2018, https://www.fpri.org/article/2018/04/ the-2016-coup-attempt-in-montenegro-is-russias-balkans-footprint-expanding 16. Pierluigi Paganini, “Russia-linked hacker group APT28 continues to target Montenegro”, Security Affairs, June 7, 2017, http://securityaffairs.co/wordpress/59820/hacking/apt28-targets-montenegro.html 17. Chris Bing, “APT28 targeted Montenegro’s government before it joined NATO, researchers say”, CyberScoop, June 6, 2017, https://www.cyberscoop.com/apt28-targeted-montenegros-government-joined-nato-researchers-say/ 87 8 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Subsequently, in February 2017, a DDoS-attack larger than the ones targeting the elections was launched. The main targets were again the government, state institutions, and pro-government media. The Montenegrin government stated that ‘the scope and diversity of the attacks and the fact that they are being undertaken on a professional level indicates that this was a synchronised action’.18 Three cybersecurity firms – FireEye, Trend Micro and ESET – concluded that the February attacks also came from APT28.19 Neither of the cyberattacks had any large-scale impact on the course of Montenegrin politics. Montenegro joined NATO on 5 June 2017 and has since aligned itself closely with the Western camp, as demonstrated for example by its expulsion of a Russian diplomat/intelligence agent after the poisoning of Sergei Skripal. Nonetheless, cyberattacks are a tool which Russia might again deploy in the future against Montenegro and their effects could be more destructive the next time around. disinformation and strategic communications Another sphere that Russia exploits for political purposes is the media. Russian disinformation and propaganda is implemented through a myriad of actors, including Russian embassies, state-owned media, hackers, the Internet Research Agency and faux civil society organisations. A leaked intelligence report from FYROM showed how Russian intelligence services were coordinating the activities of Russian journalists and Rossotrudnichestvo, the state agency for Russian compatriots living abroad.20 The Center for Euro-Atlantic Studies, a Serbian think tank, recently concluded that 51 different pro-Kremlin organisations were active in Serbia.21 This multitude of actors allow for both ambiguity and the creation of an echo chamber-effect that is amplified in social media. The most important part of the Russian toolkit is Sputnik Serbia (Srbjia), which has emerged as a crucial outlet for the Russian narrative not only in Serbia, but also in the wider Western Balkans region. Another government-connected actor is Russia Beyond the Headlines (RBTH), a government-sponsored news agency that is part of TV Novosti, which also owns RT. RBTH launched a mobile application that is available in Macedonian, Serbian and Slovenian. Moreover, in Serbia and other Serbian-speaking part of the region, key pro-Russian outlets include Fakti, IN4S, Pravda.rs, Princip, Sedmica, Srbin.info, and Vostok. 18. Dusica Tomovic, “Montenegro on Alert over New Cyber Attacks,” Balkan Insight, February 21, 2017, http:// www.balkaninsight.com/en/article/montenegro-govt-on-alert-over-new-cyber-attacks-02-21-2017 19. Dusica Tomovic and Maja Zivanovic, “Russia’s Fancy Bear Hacks its Way Into Montenegro,” Balkan Insight, March 5, 2018, http://www.balkaninsight.com/en/article/russia-s-fancy-bear-hacks-its-way-into-montenegro-03-01-2018. 20. Luke Harding et al, “Russia actively stoking discord in Macedonia since 2008, intel files say,” The Guardian, June 4, 2017, https://www.theguardian.com/world/2017/jun/04/russia-actively-stokingdiscord-in-macedonia-since-2008-intel-files-say-leak-kremlin-balkan-nato-west-influence 21. Center for Euro-Atlantic Studies (CEAS), “Eyes Wide Shut: Strengthening Russian Soft Power in Serbia: Goals, Instruments, and Effects” , May 2016, https://www.ceas-serbia.org/en/ceas-publications/study-eyes-wide-shut 88 The next front: the Western Balkans The narratives vehicled by the media and internet portals are a mix of the more general pro-Russian, pro-Orthodox, anti-EU and anti-NATO rhetoric as well as more specific narratives, for example promoting Russian military cooperation and warning against Albanian expansionism.22 The West is blamed for inciting unrest23 and ‘Colour Revolutions’ in the Balkans and trying to topple Miroslav Dodik, the leader of Republika Srpska in Bosnia.24 The EU is furthermore depicted both as trying to impose foreign values and standards on the people of the Balkans, but also as disunited, chaotic, dysfunctional and not worth joining.25 The Russian approach to the information-psychological sphere has been effective, as attested by the extent to which the Russian narrative has been echoed and magnified in local media and in opinion polls. Sputnik Serbia and RBTH have become key linchpins for news reporting in the region and their stories are republished daily in Serbian, Montenegrin and Bosnian outlets.26 The number of media outlets taking a pro-Russian stand has recently grown from a dozen to over a hundred and Sputnik has emerged as the most quoted foreign source.27 In Serbia, Sputnik provides online stories and news to over 20 radio stations.28 Sputnik and RBTH have managed to acquire this predominant role due to the edge that they have over other, less well-resourced news outlets at a time of massive structural transformation in the media industry. This is also reflected in the recent decline in the operations of Tanjug, the former Yugoslavian and now Serbian press agency. Sputnik allows its articles to be reproduced for free, which makes it easy and cheap for journalists to republish an already well-written article articulating the Russian narrative. Furthermore, Sputnik articles often have a sensationalist angle, an asset in today’s era of click-bait journalism. Opinion polls in Serbia demonstrate that Russia has been successful in strengthening its image: 42% of Serbians see Russia as their most supportive partner, while only 14% indicate the EU.29 Similarly, 64% of Serbs see NATO as a threat, even though military cooperation is significantly closer with NATO than with Russia. In 2016, Serbia had 125 military-to-military exchanges with NATO compared to only four 22. Dusica Tomovic, “Pro-Russian Montenegrins Publish New Anti-Western Media”, Balkan Insight, October 18, 2017, <http://www.balkaninsight.com/en/article/pro-russian-montenegrins-publish-new-anti-western-media-10-17-2017> 23. Nenad Zorić, “Nije ruska propaganda — Balkan je namerno nestabilan” [It’s not Russian propaganda - the Balkans are deliberately unstable], Sputnik Serbia, December 7, 2015,, https://rs-lat.sputniknews. com/komentari/201512071101643828-Nije-ruska-propaganda-Balkan-je-namerno-nestabilan/. 24. “‘Sputnjik’: Postoji tajni plan za rušenje Dodika” [Sputnik: There is a secret plan to destroy Dodik], Blic, November 23, 2015, https://www.blic.rs/vesti/politika/sputnjik-postoji-tajni-plan-za-rusenje-dodika-kulminacija-napada-posle-bozica/hlvxvc5. 25. US Senate Committee on Foreign Relations, “Putin’s Asymmetric Assault on Democracy in Russia and Europe”, January 10. 2018, https://www.foreign.senate.gov/imo/media/doc/FinalRR.pdf 26. John Cappello, “Russian Information Operations in the Western Balkans,” Foundation for the Defence of Democracies, February 2, 2017, http://www.defenddemocracy.org/mediahit/john-cappello-russian-information-operations-in-the-western-balkans/ 27. US Senate Committee on Foreign Relations, “Putin’s Asymmetric Assault on Democracy in Russia and Europe,” January 10, 2018. 28. Andrew Byrne, “Kremlin-Backed Media Adds to Western Fears in Balkans,” Financial Times, March 19, 2017, https://www.ft.com/content/3d52cb64-0967-11e7-97d1-5e720a26771b 29. US Senate Committee on Foreign Relations, “Putin’s Asymmetric Assault on Democracy in Russia and Europe,” January 10, 2018. 89 8 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES with Russia.30 While Russian aid, trade and foreign direct investment is of a lesser order of magnitude than that provided by the EU, most Serbians believes that Russia is their main benefactor.31 It is easier to sell cooperation with Russia than with the West to the Serbian people – despite the fact that Serbia is on an accession trajectory to the EU. This is not to argue, however, that Russia has managed to reverse the strategic alignments in the region through its use of disinformation and strategic communication. As a matter of fact, many of the states in the Western Balkans are closer to the EU in terms of both economics and their accession process. However, the fact that Russia, despite weaker ties in the region, has managed to maintain its popularity, and increase local distrust of the EU, even though the EU contributes significantly more to the region than Russia, is a sign of how successful its strategy has been.32 Russia’s success in projecting this subversive influence, however, primarily reflects pragmatism on the part of the local actors who have no problem in playing Russia and Europe off against each other to advance their own interests. Looking ahead: Russia’s future strategy Russia will likely continue to seek to hinder or reverse Western integration in the region using whatever tools are at its disposal. A defining dynamic of the future competition is EU and NATO-accession. In February 2018, the EU adopted a new strategy for the Western Balkans which emphasised that the EU is open to accession, with a perspective of EU membership for Serbia and Montenegro by 2025. The country that is at greatest risk of future cyberattacks is Montenegro: it has been the hardest hit so far and its networks are likely the most infected with malware used by the hackers. As Skopje and Athens made progress on the name dispute dossier,33 FYROM was invited to join NATO and received a conditional date to kick off accession negotiations with the EU. In this case, the Russian approach is likely to mirror that adopted towards Montenegro, with more extensive cyberattacks and disinformation campaigns unfolding in the coming year. Serbia is less likely to face significant Russian opposition in its bid to join the EU. Rather, Russia is likely to be content with having a state within the EU that is relatively sympathetic to Russia (and that could be more useful to it inside than outside of the EU). Another means of hindering Western integration is stirring 30. Kaitlin Lavinder, “Russia Ramps Up Media and Military Influence in Balkans,” The Cipher Brief, October 13, 2017, https://www.thecipherbrief.com/russia-ramps-media-military-influence-balkans 31. “Moscow is regaining sway in the Balkans,” The Economist, February 25, 2017, https://www.economist.com/news/ europe/21717390-aid-warplanes-and-propaganda-convince-serbs-russia-their-friend-moscow-regaining-sway 32. European Parliament, “Russia in the Western Balkans,” At A Glance, July 2017, http://www.europarl. europa.eu/RegData/etudes/ATAG/2017/608627/EPRS_ATA%282017%29608627_EN.pdf 33. “Macedonia to hold referendum on name change on 30 September”, Euractiv, July 31, 2018, https://www.euractiv. com/section/enlargement/news/macedonia-to-hold-referendum-on-name-change-on-30-september/ 90 The next front: the Western Balkans up secessionist sentiments and ethnic discontent. The most likely target for such a strategy is Republika Srpska in Bosnia, whose secessionist claims the Russian government supports.34 Both the leader of Republika Srpska and pro-Russian media are pushing for a referendum on independence.35 Provoking more tensions in the already strained relations between Serbia and Kosovo is another likely future tactic aimed at obstructing the EU’s efforts to bring the sides closer. This could particularly be the case if Kosovo makes further progress towards UN membership. The use of cyber tools to coerce and disinform is likely to increase given Russia’s interest in thwarting the process of Western integration in the region, as well as the fact that digital connectivity in the region is on the rise. Resorting to cyber operations will not in itself alter the strategic reality in the Western Balkans, but the use of cyber tools and weapons will remain a cost-effective way for Russia to create societal disruption and tarnish the image of the EU. 34. Misha Savic and Gordona Filipovic, “Europe’s Next Separatist Time Bomb Is Ticking,” Bloomberg, November 16, 2017, https://www.bloomberg.com/news/articles/2017-11-16/europe-s-next-separatist-time-bomb-is-ticking-in-the-balkans 35. Seth Cropsey and Kevin Truitte, “Bosnia: They’re at It Again,” National Review, July 7, 2017, https:// www.nationalreview.com/2017/07/bosnia-russian-interference-renewed-putin/ 91 8 EU and NATO approaches to cyber threats chapter 9 NATO’s responses to cyberattacks Siim Alatalu Since NATO was founded in 1949, the tasks of the Alliance have evolved, reflecting the key international security challenges of the day while maintaining the commitment to the core task of collective defence. For most of its history, NATO’s role has first and foremost been to provide military security for its constituent nations where they are geographically located – in Europe and North America. Cyber, however, which is of a global and real-time nature by definition, could bring distant threat actors and acts close to home for NATO and vice versa, thereby inducing the Alliance to develop a fully-fledged strategy to also counter challenges from far away. 2017 saw two global outbreaks of malware1 attacks, known as WannaCry and NotPetya, which caused economic damage on an unprecedented scale – and in unprecedented areas. NATO was confronted with the resurgence of an old foe – Russia – this time in cyberspace. 2 NATO’s thinking on cyber since 9/11 NATO is not a novice when it comes to dealing with cybersecurity issues. In fact, the word ‘cyber’ first entered NATO vocabulary in November 2002 when at the Prague Summit the Heads of State and Government (HOSG) of the then 19 Allies agreed to ‘strengthen [their] capabilities to defend against cyber-attacks’,3 after a number of NATO websites had suffered cyberattacks in the years before.4 The Prague Summit 1. “Software that may be stored and executed in other software, firmware or hardware that is designed to adversely affect the performance of a computer system”: Michael N. Schmitt, ed., Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge University Press, 2017.) 2. “Environment formed by physical and non-physical components to store, modify, and exchange data using computer networks” (Tallinn Manual 2.0) 3. “Prague Summit Declaration”, November 21, 2002, http://www.nato.int/docu/pr/2002/p02-127e.htm 4. Jason Healey and Klara Tothova Jordan, “NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow”, IssueBrief, Atlantic Council, September 2014, https://www.files.ethz.ch/isn/183476/NATOs_Cyber_Capabilities.pdf 95 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES was the first meeting of NATO’s leaders since the 9/11 terrorist attacks and was therefore transformational in many ways for both individual Allies and for NATO as a whole. The rather limited attention paid by NATO to cyber in 2002 may seem surprising by today’s standards. While the internet was already a global public good at the time, in 2002 its effects on how society works were markedly different from today. The number of people connected online was only 587 million or 9.4% of the global population,5 compared to 3.553 billion or 53.8% in 2017.6 For sure, cyberspace was not foreseen as a theatre (or as an enabler) for military operations – and not therefore as an arena in which NATO might have to engage. Rather, attention was more focused on national efforts7 to tackle emerging, and mainly domestic, cyber-related challenges to governments, induced by individuals rather than by organised, national or trans-border entities which NATO as an organisation reflected. Today, every second person on the planet is connected online – representing roughly a sixfold growth since 2002. However, what matters is not just the number of people who have access to the internet, but more importantly what connectivity allows users and indeed the range of different online devices to achieve in cyberspace in terms of speed and effects. This is what makes cyber relevant for NATO, and NATO relevant in the new cyber threat landscape, not least for its member states. After 2002 NATO continued to take a laissez-faire approach to cyber issues.8 Of course, there were imminent and grave challenges for it to tackle on behalf of its members such as, inter alia, terrorism and military operations in Afghanistan. However, this state of affairs was to change quickly and notably in 2007 when massive, wellcoordinated and politically motivated cyberattacks were launched against Estonia’s government and other infrastructure. The attacks were informally 9 but virtually universally attributed to Russia,10 and the episode acted as a wake-up call for the Alliance. Already at their Bucharest Summit in April 2008, the NATO HOSG were far more explicit on the Alliance’s way forward in cyber, as reflected in their approval of NATO‘s first Policy on Cyber Defence and commitment to develop ‘the structures and authorities to carry it out’. 5. “Internet World Stats. Usage and Population Statistics”, retrieved from https://www.internetworldstats.com/emarketing.htm 6. “Global and Regional ICT Data”, retrieved from https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx 7. Siim Alatalu, “NATO’s New Cyber Domain Challenge,” in 2016 International Conference on Cyber Conflict (CyCon U.S.) Proceedings, ed. Aaron Brantly and Paul Maxwell (Washington, DC., 2016), 1-8. 8. Meaning cyber not being considered a strategic task on its own but rather a support function which is handled routinely as necessary. 9. Attribution was difficult due to the lack of hard evidence, while the ‘defendant’ refused to comply with Estonia’s request for legal assistance and a bilateral investigation. 10. John Arquilla, “Twenty Years of Cyberwar,” Journal of Military Ethics, 12, no. 2 (2013): 81-82. 96 NATO’s responses to cyberattacks The HOSG stated in the Bucharest Summit Declaration that: ‘Our Policy on Cyber Defence emphasises the need for NATO and nations to protect key information systems in accordance with their respective responsibilities; share best practices; and provide a capability to assist Allied nations, upon request, to counter a cyber-attack. We look forward to continuing the development of NATO’s cyber defence capabilities and strengthening the linkages between NATO and national authorities’.11 At the following Summit in 2009, the Strasbourg and Kehl Summit declaration devoted even more attention to cyber defence policy, including mentioning more new potential threats such as non-state actors. The establishment of two new NATO structures was announced:, the Cyber Defence Management Authority (CDMA),12 which was charged with coordinating cyber defence activities throughout NATO’s civilian and military bodies, and the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). Furthermore, the HOSG acknowledged the importance of international cooperation in this domain, including with non-NATO countries that are recognised as ‘partners’.13 Such step-by-step enhancement continued at the next Summits in Chicago (2012) and Wales (2014). In Wales, NATO adopted one of the underlying ideas of the 2013 Tallinn Manual, i.e. that existing international law applies in cyberspace. The Tallinn Manual had been published by the NATO CCDCOE and relied on the expert opinion of an international group of legal experts. Politically it meant that most Western countries recognised that there was no need for a new international legal convention or other agreement to regulate cyberspace. Concurrently, the HOSG also adopted the principle that Article V of the Washington Treaty also applies in cyberspace. This meant that a cyberattack against one Ally could be considered an attack against all Allies. At its 2016 Warsaw Summit the Alliance opened up a whole new paradigm and a new role for itself, by declaring cyberspace a domain of operations. Accordingly, Alliance militaries are developing a doctrine to integrate cyber operations in support of conventional operations through cyberspace, at an equivalent level of interoperability that it has developed in traditional areas of warfare. In Warsaw too the HOSG also made another important decision on cyber policy, called the Cyber Pledge, where they inter alia committed to developing ‘the fullest range of capabilities to defend our national infrastructures and networks.’14 Naturally, implementing the aforementioned agreements in 29 countries spanning three continents needs time and one might even speculate that in Warsaw NATO achieved the necessary consensus to fulfil its mandate. This, however, might need 11. “Bucharest Summit Declaration”, April 3, 2008, http://www.nato.int/cps/en/natolive/official_texts_8443.htm 12. Today called the Cyber Defence Management Board (CDMB). 13. “Strasbourg/Kehl Summit Declaration,” April 4, 2009, http://www.nato.int/cps/en/natolive/news_52837.htm?mode=pressrelease 14. NATO, “Cyber Defence Pledge”, July 8, 2016, https://www.nato.int/cps/en/natohq/official_texts_133177.htm 97 9 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES to be reconsidered. The events in cyberspace that unfolded in the summer of 2017 – in particular the WannaCry and NotPetya malware attacks – also raised the game again for NATO. New questions have been tabled by experts that relate to information sharing, practical cooperation in cyber defence with likeminded nonNATO countries, technical safety standards and, finally, the attribution of malicious cyber acts to the actors. Russia as a cyber threat Like NATO, Russia is not a novice in cyber either – to say the least. One of the military lessons that might be gleaned from Russia’s history is the tradition of taking territory and ensuring it will never return to status quo ante. Russia has demonstrated that it still applies this lesson in conventional warfare (it has its military boots-onthe-ground in virtually every hotspot in the former Soviet Union) and it has also developed an equivalent for cyberspace – ‘people-with-bytes-online’, referring to the so-called ‘troll factories’ or the Advanced Persistent Threats (APTs) associated with its intelligence services. For a military planner the analogy is obvious – in order for NATO to gain hold of the new domain it has embraced in recent years, it will now need to establish itself in it, including by delivering on the core tasks of collective defence, crisis management and cooperative security.15 With NATO-Russia relations frozen and Russia currently showing no sign of having any intention of withdrawing from Crimea or Eastern Ukraine, threats from cyberspace are ever-more relevant, and involve a broader set of potential targets. Since Russia invaded Ukraine and annexed Crimea in early 2014, all NATO nations and some of the Alliance’s partners have imposed economic sanctions on the country, in the hope of persuading Moscow to reverse its actions. To date, however, the sanctions have not led the Kremlin to abide by its international obligations, although they appear to have at least deterred Russia from moving deeper into Ukraine militarily. Given the constraints it faced in using its military power against Ukraine and NATO allies, Russia began to rely more on coercive cyber tools. As an example, Russia has made headlines (including by being publicly blamed for cyberattacks) for resorting to cyber tactics in order to for instance meddle with the US, French and probably other elections, to fuel protest movements and to spread fake news – all as part of its strategy to derail the unity of the West, including NATO and the EU. While these can be considered offensive and disrespectful actions in their own right, events took a more severe turn in July 2017. The outbreak of the so-called NotPetya malware attack wrought most havoc in Ukraine where it crippled banking, power, airport and transport services. However, the malware eventually had global ramifications. According to one estimate it has cost companies around the world 15. Siim Alatalu, “NATO’s New Cyber Domain Challenge”. 98 NATO’s responses to cyberattacks an estimated $1.2 billion in revenues.16 On 16 February 2018 Australia, Canada, Denmark, Japan, New Zealand, the United Kingdom and the United States17 became the first countries (later followed by others) to formally attribute NotPetya to Russia. Politically, this event signals the birth of a global coalition of the willing, including two out of three nuclear powers in NATO, joined by several Allies as well as by NATO’s closest non-NATO partners in cyber issues. Their demonstrated ability to collectively attribute cyberattacks to other states, including a nuclear power if need be, proved that sharing technical information is doable in a short timeframe if there is sufficient political will. Furthermore, on 12 March 2018 the British prime minister made a statement accusing Russia of having poisoned its former double agent Sergei Skripol, now a UK citizen living on British soil. Giving Russia a deadline of ‘tomorrow midnight’ to explain, the articles heralding the prime minister’s statement hinted that the UK was considering countermeasures against Russia’s actions, which might include cyberattacks.18 Within days, the UK gained the political support of all NATO members of the UN Security Council as well as of the entire Alliance by way of a statement by NATO Secretary General Jens Stoltenberg. Some legal experts have already speculated that the UK’s room for manoeuvre in terms of undertaking such countermeasures may be constrained by its obligations under international law, and that these may also limit NATO’s actions.19 It is thus appropriate to ask what NATO could and should do in response to the new and more complex threat picture we have seen unfold in recent months and years. Is there anything NATO can do about NotPetya-style events at all? What follows vis-àvis Russia after the attribution? Given the specifics of the UK assassination attempt and the statements subsequently made by the British prime minister and the NATO Secretary General, should such new and uncharted waters in international relations be left to individual, directly concerned Allies, or involve the entire Alliance and eventually its whole deterrence posture? To some extent, the discussion is not new, as it is reminiscent of the aftermath of the cyberattacks against Estonia in 2007. At that time, however, NATO had far less expertise in cyber affairs than it has today. What have changed are the speed and possible effects of cyberattacks, leaving essentially no target immune. The perpetrators of so-called APTs, too, have gained a lot of experience over time. While the fairly 16. Fred O’Connor, “NotPetya Still Roils Company’s Finances, Costing Organizations $1.2 billion in Revenue”, Cybereason, November 9, 2017, https://www.cybereason.com/blog/notpetya-costs-companies-1.2-billion-in-revenue 17. An example of the official attributions, by the United States can be read on the White House website: https://www.whitehouse.gov/briefings-statements/statement-press-secretary-25/ 18. Gordon Rayner, “Theresa May’s Ultimatum to Vladimir Putin: Russian Leader Given 24 Hours to Answer for Nerve Agent Attack on Spy,” The Times, March 13, 2018. 19. “Only states that are injured may impose countermeasures: This means that a victim state’s allies may not impose ‘collective countermeasures’ on the wrongdoing state if only the victim state was actually injured.” Ashley Deeks, “Prime Minister May’s Use-of-Force Claim: Clarifying the Law That Governs the U.K.’s Options’, Lawfare, March 13, 2018, https://lawfareblog.com/prime-minister-mays-use-force-claim-clarifying-law-governs-uks-options 99 9 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES quick formal attribution on NotPetya (7-8 months, considering the technical, legal and political complexity and the demonstrated concerted action by governments, is in general not too long) can be considered a success story, the follow-up towards Russia has not been as clear. NATO responses and limits To try to respond to those questions, it is worth taking a closer look at some of the critical issues that shape NATO’s cyber posture. Today, NATO needs to deal with at least the following real-time challenges in regard to cyber: • A new type of a hyperconnected world and a rapidly evolving online threat environment where, to quote a modern proverb, ‘we are all virtual neighbours’. In this new cyber threat landscape, geography, physics and distances, which still continue to play a major role in conventional warfare, do not have the same significance. In cyberspace, NATO has no geographic depth. At the same time, in an increasingly complex cyber world, new ‘Fulda’ or ‘Suwalki Gaps’20 – or, for example, unpatched zero-day vulnerabilities in tech talk – can be quick to emerge in cyberspace. • The proliferation of increasingly complex cyberattacks: by now, there really are no limits to what might constitute a cyber weapon and how it could be used. While it is necessary, as suggested by the Estonian Foreign Intelligence Service in its 2018 Yearbook, 21 to also ‘continue to be attentive to North Korean ransomware and other means of financial frauds, and Chinese industrial espionage’, the main cyber threat to NATO as such will likely continue to be posed by Russia. The Estonian document – remarkable in itself as probably the first instance of the secret service of a NATO country making its cyber threat assessments public – highlights that ‘Russia emphasises the importance of cyber warfare and espionage as equal to the conventional military capability. In doing so, Russia has become one of the world’s leading players in the field of cyber espionage’.22 • The resurgence of an old enemy who, despite having lost the overall technological and arms race with the West in the 1980s, has continued to develop its offensive skills and has never lost the competitive edge it always enjoyed in the domain of applied sciences. • Today’s NATO Command Structure (NCS) is almost a decade old, designed in 2009 during the heyday of joint out-of-area operations in Afghanistan, Iraq and other theatres of war outside of NATO territory.23 As a result, NATO has demonstrated commendable power projection capacity, such as rapid deployability of forces and mission sustainability, as 20. For more information, see e.g. Zamira Rahim, “The Suwalki Gap: The Most Vulnerable Stretch of Land in Europe”, Time Magazine, March 15, 2017, http://time.com/4675758/suwalki-gap-europe-photos/ 21. Estonian Foreign Intelligence Service, International Security and Estonia 2018, https://valisluureamet.ee/pdf/raport-2018-ENG-web.pdf . 22. Ibid. 23. The NATO Command Structure is currently under review. “NATO Defence Ministers Take Decisions to Strengthen the Alliance”, NATO, February 15, 2018, https://www.nato.int/cps/en/natohq/news_152125.htm 100 NATO’s responses to cyberattacks well as conducting exercises in all parts of the Alliance. At the same time, today the NCS has no ‘one-stop-shop’ for cyber expertise. The NATO Communications and Information Agency (NCIA) and the NATO CCDCOE, neither of which are a part of the NCS, are but two examples of NATO’s permanent and structural commitment to dealing with cyber defence. Only in November 2017 (a year and 4 months after the Warsaw Summit) did NATO’s defence ministers agree to launch a cyber operations capability at the Supreme Headquarters Allied Powers in Europe (SHAPE) and it will take time before it becomes fully operational. What are the next steps for NATO? Against this challenging background, what should the Alliance do? First, there needs to be a clear understanding within the Alliance of how cyber fits into its overall deterrence posture. Negative attitudes surrounding this issue are frequently expressed in statements like ‘deterrence will not work in cyber’ and ‘a cyberwar will not take place’. Of course, it is to be hoped that no adversary will seek to provoke NATO in an endeavour to test the credibility of its deterrence posture all the way to the nuclear option. At the same time, however, the 2014 Wales statement on Article V’s applicability (a discussion born from the attacks on Estonia already carried out in 2007) to what occurs in cyberspace did not stop North Korea from spreading its WannaCry malware or Russia from interfering in the US elections or spreading the NotPetya ransomware. Designing a cyber deterrence posture will require identifying how and where NATO works best for its Allies as a provider of practical cyber capabilities. Nations themselves are by definition responsible for their own cyber resilience while they may also be owners of offensive cyber capabilities. At the same time the EU can provide a platform for, for example, exchanging information and forging a consensual ‘soft’ response to malicious cyber activities such as imposing sanctions or travel restrictions on the responsible nations and individuals. Officials in the Alliance capitals might wish to consider when and how NATO will be called to action, as in the domain of cyber NATO’s collective defence guarantee might need to be activated more quickly than in the other domains. Secondly, cyber would need to fully become part and parcel of NATO’s ‘war machine’. No military conflict in the future will be fought without including cyber and/or electronic warfare as part of the plan of campaign. On the other hand, it cannot be ruled out that cyber offences could acquire lethal effects, thereby inducing nations to exercise their right to resort to kinetic self-defence and countermeasures. Therefore, while NATO today conducts exercises at all levels of its military structure to deal with military threats, the focus of its cyber defence exercises could and should try more to integrate the worlds of war and peace, defend both military and civilian critical infrastructure and train participants in both technical skills and strategic 101 9 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES level decision-making. A good example to follow could be the NATO CCDCOE’s cyber defence exercise Locked Shields. It is important to recognise that insight into and knowledge of offensive cyber capabilities is essential to ensure effective defence against cyber threats and attacks. Thirdly, NATO’s particular advantage in cyber defence could stem from cooperation with its partner countries and with other international organisations, especially the European Union. Neither the Alliance nor the Union is an island on its own when it comes to cyber threats and vulnerabilities. The EU can do a lot in areas that are relevant for NATO, such as cybersecurity certification of devices imported into and used in European markets. Dependence on non-EU and non-NATO software could become a critical national security concern, as illustrated by for instance the Kaspersky case in the US.24 As highlighted by the recent attributions, there could be a global will for cooperation between NATO and non-NATO countries as any of them could become a target, as well as a bridgehead for further spreads of malicious cyber activities, as demonstrated by the WannaCry and NotPetya attacks. Finally and as food for thought – NATO has partnership agreements on different levels with around 70 countries, whereas the EU has a total of 139 delegations whose mission is to represent the EU and its citizens in forging relations with other countries and organisations from around the world. These could become useful when considering that at least since the Estonian Presidency the EU, according to the so-called Cyber Diplomacy Toolbox, deems it critical to liaise with countries where malicious cyber activities might originate.25 At the end of the day, to effectively address a global problem it is imperative to collaborate with likeminded partners around the world and it is clear that the two organisations can fruitfully complement each other in this regard. 24. “Trump Signs into Law U.S. Government Ban on Kapersky Lab Software,” Reuters, December 12, 2017, https://www.reuters.com/article/us-usa-cyber-kaspersky/trump-signs-intolaw-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4 25. For a useful brief read on the Toolbox, see Katriina Härmä and Tomaš Minarik, “European Union Equipping Itself against Cyber Attacks with the Help of Cyber Diplomacy Toolbox,” CCDCOE, September 18, 2017, https:// ccdcoe.org/european-union-equipping-itself-against-cyber-attacks-help-cyber-diplomacy-toolbox.html 102 chapter 10 Protecting and defending Europe’s cyberspace Patryk Pawlak Ukrainian Constitution Day in 2017 was not just a day for celebration. On 27 June, several networks critical for the functioning of Ukraine’s public services – including the Central Bank of Ukraine, the Kyiv metro, the international airport, and the radiation monitoring system at the Chernobyl nuclear plant – were hit by yet another malware attack named ‘NotPetya’. The malware spread quickly across the world, infecting more than 12,500 computers in at least 65 countries, including in the European Union. This episode clearly demonstrates that building resilience against digital threats is not only a technological challenge but also a political one. The very nature of the cyber domain facilitates this process: cyber armies do not need to be moved across borders; cyber weapons can be purchased on the darknet relatively cheaply; and the application of international law to cyberspace and norms of state behaviour is still contested. With geography and distance no longer offering security from criminals and enemies, the digital walls of Europe are under constant attack from state and non-state actors alike. Whereas the primary responsibility for national security – including in cyberspace – lies with individual member states, the EU has demonstrated that it can and does add value in this domain, primarily through bolstering capacities, law enforcement cooperation, and strengthening international coalitions. Faced with mounting pressure and growing expectations on the part of EU citizens,1 the European Commission has proposed several initiatives that aim to increase the cyber resilience of all member states, eliminate the weakest links, and strengthen Europe’s resilience. Internally, the EU has reinforced its institutional set-up and legal frameworks to counter cyber threats. In addition, the EU’s international engagement – through the EU 1. European Commission, “Europeans’ Attitudes Towards Cyber Security,” Special Eurobarometer, Report 464a, June 2017, https://ec.europa.eu/digital-single-market/en/news/special-eurobarometer-europeans-attitudes-towards-cyber-security 103 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES institutions and member states – promotes EU values and stability in cyberspace through developing norms of responsible state behaviour, assuring respect for existing international law, promoting confidence-building measures (CBMs), and supporting cyber capacity building in partner countries. There are, however, limits to what can be achieved within the existing institutional set-up. As demonstrated by the NotPetya case, collective attribution is still a hotly debated issue among the member states, despite ongoing initiatives undertaken by the European External Action Service (EEAS) aimed at closing the existing gap in the understanding of issues linked to attribution and operational capacities to attribute malicious activities. Several legislative measures proposed by the Commission also depend on the Council and European Parliament reaching common positions in a timely fashion in order to avoid any delays in their implementation. The aim of this chapter is to provide an overview and scrutinise steps that have been taken by the European Union and its member states to increase resilience and deter digital threats, including those allegedly originating from Russia. Taming kittens, pandas and bears Malicious activities against the networks of the EU institutions and member states are now the new normal. Over the past several years, the Computer Emergency Response Team for the EU institutions, bodies and agencies (CERT EU) has reported several attacks by state and non-state actors alike – often bearing innocent-sounding names like ‘pandas’ or ‘kittens’ (see Figure 3). Their aim is to challenge the EU’s interests at home (e.g. via cyber disruption, espionage, hacktivism, and the propagation of radicalisation and violent extremism online) and abroad (e.g. via cyber operations conducted against EU’s partners and allies). The threat comes in many shapes and from numerous directions: • In January 2018, open sources reported multiple Distributed-Denial-of-Service (DDoS) attacks against Dutch financial institutions including ABN Amro, ING, Rabobank, and the Dutch tax office.2 The Dutch single sign-on service, DigiD, and the Ministry of Infrastructure and Water Management were also disclosed as victims of these attacks. • Threat actors like APT28 and Turla are suspected of having repeatedly targeted foreign affairs and security entities in the European Union.3 In their annual security environment assessment for 20184 the Estonian Foreign Intelligence Service – which also hosts the National Communications Security Authority – linked APT28 to the Russian military 2. Laurens Cerulus, “Dutch Tax Authority, Banks Face Coordinated Cyberattack,” Politico, January 29, 2018, https://www.politico.eu/article/dutch-tax-authority-banks-under-cyberattack/ 3. See for instance: FireEye, “APT28: A Window into Russia’s Cyber Espionage Operations,” Special Report, 2014, https:// www.fireeye.com/blog/threat-research/2014/10/apt28-a-window-into-russias-cyber-espionage-operations.html 4. Estonian Foreign Intelligence Service, International Security and Estonia 2018, https://valisluureamet.ee/pdf/raport-2018-ENG-web.pdf. 104 Protecting and defending Europe’s cyberspace intelligence GRU, Snake (Turla) to the Federal Security Service FSB, and APT29 to the FSB and the foreign intelligence service SVR. • Throughout 2017 and 2018 the information systems of organisations dealing with European defence (military data) and foreign affairs (embassies, think tanks) were targeted by several actors likely based in China and Russia. For instance, UK think tanks specialising in international security and defence issues were hacked by China-based groups in 2017, according to the Crowdstrike cybersecurity company, who also said it investigated the breaches. 5 • The Turkish hacker team ‘ZoRRoKin’ is responsible for opportunistic defacement attacks against EU domains.6 Addressing such malicious activities is challenging, primarily due to the difficulties with attribution. ‘False flags’7 are becoming a standard part of the toolkit for nationstate hackers. Instead of simply hiding their identity, they paste a new, invented and borrowed one over it. Russian hackers in particular have lately experimented with such devious ‘digital mask-swapping’ techniques. Olympic Destroyer – a malware associated with attacks during the 2018 PyeongChang Winter Olympics – has been simultaneously attributed by different cybersecurity researchers to North Korea, Russia and China.8 Eventually, such tactics undermine efforts towards more credible attribution and increase the risks of misinterpretation and escalation of conflicts in cyberspace, which further highlights the need for adequate digital forensics capabilities. In order to contribute to reducing the risk of unintended miscalculation and escalation, the EU has been an active supporter of the processes led by the ASEAN Regional Forum (ARF) and Organisation for Security and Cooperation in Europe (OSCE) aimed at the development of confidence-building measures (CBMs). Protecting digital societies As a consequence of growing digitalisation, the risks to European societies have increased. The last five years have clearly demonstrated the extent to which cybercrime (e.g. ransomware, online fraud), attacks on critical infrastructure (e.g. energy plants in Germany, transportation networks in Sweden), or online disinformation – also known as information manipulation – can all have a dramatic impact on the proper functioning of societies. 5. Gordon Corera, “UK Think Tanks Hacked by Groups in China, Cyber Security Firm Says,” BBC, February 28, 2018, https://www.bbc.com/news/uk-43172371 6. Janene Pieters, “Turkish Hacker Groups Focus Cyberattacks on Dutch Websites,” NL Times, March 14, 2017, https://nltimes.nl/2017/03/14/turkish-hacker-groups-focus-cyberattacks-dutch-websites-incl-nl-times 7. A false-flag is a diversionary or propaganda tactic that consists of deceiving an adversary into thinking that an operation was carried out by another party. See: Mauno Pihelgas, ed., Mitigating Risks Arising from False-flag and No-flag Cyber Attacks, NATO Cooperative Cyber Defence Centre of Excellence, 2015. 8. See for instance: Andy Greenberg, “‘Olympic Destroyer’ Malware Hit Pyeongchang Ahead of Opening Ceremony,” Wired, December 2, 2018, https://www.wired.com/story/olympic-destroyer-malware-pyeongchang-opening-ceremony. 105 10 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Consequently, the EU’s approach has evolved to include a mix of instruments focused on security of critical infrastructure, integrity and freedom of democratic institutions and processes, as well as protection of personal assets and information.9 The 2017 Joint Communication on Resilience, Deterrence and Defence – a document complementing the 2013 EU Cybersecurity Strategy – embraced these strategic challenges under three broad objectives: building EU resilience to cyberattacks based on a ‘collective, wide-ranging approach’, creating effective cyber deterrence by putting in place credible measures to dissuade criminals and hostile states, and strengthening international cooperation to promote global cyber stability.10 FIGURE 3 | Malicious activities China 9 groups APT1 code name: Unit 61398, Comment Crew Information technology, aerospace, public administration, satellites and telecommunications, scientific research and consulting, energy, transportation, construction and manufacturing, etc. APT3 code name: UPS Team Aerospace and defence, construction and engineering, high tech, telecommunications, transportation APT10 code name: Menupass Team Construction and engineering, aerospace, and telecom firms, and governments in the US, Europe, and Japan APT12 code name: Calc Team Journalists, government, defence industrial base APT15 code name: Ke3chang, Mirage, Metushy, Vixen Panda Government ministries across Europe APT16 Japanese and Taiwanese organisations in the high-tech, government services, media and financial services industries APT17 code name: Tailgator Team, Deputy Dog US government, and international law firms and IT companies APT18 code name: Wekby Aerospace and defence, construction and engineering, education, health and Biotechnology, high tech, telecommunications, transportation APT30 Members of the Association of Southeast Asian Nations (ASEAN) 9. The Caucasus, particularly Georgia, eastern European countries and militaries, NATO and other The Commission Communication on the EU Strategic Approach to Resilience defines resilience as ‘the ability of an European security organisations and defence firms individual, a household, a community, a country or a region to withstand, adapt and quickly recover from stress and shocks’. 10. European Commission, «Joint Communication on Resilience, Deterrence and Defence: Building Strong Cybersecurity for the EU,» Join (2017) 450 final, September 13, 2017, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=JOIN:2017:450:FIN Targeted intrusions against the US Democratic National Committee Western European governments, foreign policy groups and other similar organisations 106 Protecting and defending Europe’s cyberspace Members of the Association of Southeast Asian Nations (ASEAN) Russia 3 groups APT28 code name: Fancy Bear, Sofacy, Pawn Storm, Tsar Team The Caucasus, particularly Georgia, eastern European countries and militaries, NATO and other European security organisations and defence firms APT29 code name: Cozy Bear, the Dukes Targeted intrusions against the US Democratic National Committee Western European governments, foreign policy groups and other similar organisations code name: Turla, Snake, Uroburos, Venomous Bear Likely campaign against federal institutions in Germany, including the Foreign Ministry North Korea 3 groups APT37 code name: Reaper, Group123, ScarCruft Primarily South Korea – though also Japan, Vietnam and the Middle East – in the chemicals, electronics, manufacturing, aerospace, automotive and healthcare sectors code name: Lazarus, BlueNoroff, Hidden Cobra Suspected group behind the Sony hack Iran 2 groups APT33 Multiple industries – headquartered in the United States, Saudi Arabia and South Korea APT34 Variety of industries, including financial, government, energy, chemical, and telecommunications in the Middle East code name: Charming Kitten, Flying Kitten Individuals of interest to Iran in the fields of academic research, human rights and media Data: EUISS, 2018. Critical information infrastructure Reports of attacks on critical infrastructure are increasing in scope and frequency. For instance, in March 2018, the US CERT (under the Department of Homeland Security) together with the FBI issued a joint Technical Alert that provided information on a Russian threat actor (DragonFly) targeting US government entities as well as organisations in the energy, nuclear, commercial, water, aviation, and critical manufacturing sectors since at least March 2016. Similar activities were observed across the EU. In an effort to ensure a minimum level of preparedness across the EU, the Network Information Security (NIS) Directive requires each member state to adopt a national strategy on the security of network and information systems, including measures to ensure high levels of security in critical sectors such as banking, energy, transportation, healthcare or digital infrastructure, as well as a governance framework, a list of actors tasked with the implementation of the strategy and a risk assessment plan. 107 10 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Furthermore, each member state is expected to designate a Computer Security Incident Response Team (CSIRT) and provide adequate resources for cross-border cooperation. In an effort to stimulate strategic and operational cooperation among EU stakeholders, the NIS Directive also established a NIS Cooperation Group and CSIRT network. In addition, given the potential wide-ranging impact of cyber incidents and crises, in 2017 the European Commission proposed a set of measures that form a cooperation framework for the Union in the event of large-scale incidents and crises. The so-called Blueprint for providing ‘an effective process for an operational response at Union and member state level to a large-scale cyber incident’, endorsed by the Council in June 2018, describes the objectives and modes of cooperation between the member states and the EU institutions, bodies and agencies in specific cases and scenarios that will be tested during the crisis-management exercises.11 Democratic infrastructure The experience of the United States and several European countries with alleged Russian interference in or attempts to influence the outcome of their national elections have elevated the protection of democratic institutions and processes into an international issue.12 While disinformation often relies on the information obtained through hacking databases, email accounts or other information sources, it is the weaponisation of such information for the purpose of large-scale disinformation that poses a danger to free and fair electoral processes. In that context, the 2019 European Parliament elections will be an important test case. A frequently low degree of participation13 and the local nature of the European election campaigns makes them more fragmented, which in turn allows for more targeted, contextualised, and convincing disinformation. A low turnout-low investment-high stakes combination potentially makes the 2019 elections an attractive target: their outcome will influence the EU’s institutional set-up and might change the future direction of the Union’s crucial foreign and security policy decisions – including the EU’s position on bilateral relations with Russia. Considering the negative impact of such measures on trust in democratic institutions and citizens’ ability to take informed and free decisions, the European Commission published the Communication on Tackling Online Disinformation in April 2018. The Communication called for an EU-wide Code of Practice on Disinformation, the creation of an independent European network of fact-checkers and the support of member states in ensuring the resilience of elections against cyber threats.14 The NIS 11. Council of the European Union, “Council Conclusions on EU Coordinated Response to Large-Scale Cybersecurity Incidents and Crises,” June 26, 2018, http://data.consilium.europa.eu/doc/document/ST-10086-2018-INIT/en/pdf 12. It is worth noting that many of the problems linked to the security of election systems, for instance, had been addressed already in 2013 in the OSCE ODIHR’s Handbook for the Observation of New Voting Technologies. 13. The 2014 elections witnessed the lowest turnout since 1979 with an average turnout of 42.54%, but as low as 25% in some of the countries in Central and Eastern Europe. 14. European Commission, “Communication on Tackling Online Disinformation: a European Approach,” COM(2018) 236 final, April 26, 2018, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52018DC0236 108 Protecting and defending Europe’s cyberspace Cooperation Group15 engaged in the mapping of existing European initiatives on the cybersecurity of network and information systems used for electoral processes and in July 2018 delivered a compendium of practical recommendations and measures to secure election life-cycles.16 Societal infrastructure Despite extensive discussions about the political consequences of malicious operations, practice shows that criminal justice and law enforcement instruments remain the most effective way of punishing the perpetrators.17 This is particularly relevant in a context where the ‘crime-as-a-service’ model of cybercrime is gaining in popularity, with various elements of criminal infrastructure and services available for purchase on the darknet. Several reports suggest that some of the online organised groups operating in such markets are connected to the Russian government.18 In an effort to adapt to a rapidly evolving digital and data-driven environment as well as to minimise the potential negative consequences of cyberattacks, the EU has taken steps to increase the cost of operations for cyber criminals – both in terms of financial costs and circumscribing their activities. The 2013 Directive on Attacks Against Information Systems, for instance, introduced minimum standards in the definitions of criminal cyber offences and corresponding sanctions. In 2018, the European Commission has proposed legislation to facilitate and accelerate law enforcement and judicial authorities’ access to electronic evidence through the introduction of the European Production Order and the European Preservation Order.19 It is expected that these two instruments will significantly strengthen the existing European Investigation Order and the Mutual Legal Assistance agreements. Furthermore, the EU has strengthened its data protection regime. The General Data Protection Regulation (GDPR) in force since May 2018 imposes a breach notification requirement that obliges any company or institution processing personal information to notify the relevant authorities within 72 hours of any data breach that is likely to result in a risk to the rights and freedoms of individuals. This is particularly relevant in the context of election interference as it implies, for instance, that any potential breach to the databases of electoral campaign teams will need to be notified rather than kept secret out of fear of incurring reputational damage. 15. See: https://ec.europa.eu/digital-single-market/en/nis-cooperation-group 16. NIS Cooperation Group, Compendium on Cyber Security of Election Technolog y, CG Publication 03/2018, July 2018. 17. In February and July 2018, the US Department of Justice publicly released an indictment accusing Russian companies and citizens of influence operations targeting the political process of the United States. 18. See for instance: John Leyden, “Russia is Struggling to Keep its Cybercrime Groups on a Tight Leash,” The Register, June 6, 2017, https://www.theregister.co.uk/2017/06/06/russia_cyber_militia_analysis/ 19. European Commission, “Proposal for a Regulation on European Production and Preservation Orders for Electronic Evidence in Criminal Matters,” COM(2018) 225 final, 17 April 2018. 109 10 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Strengthening resilience of partners and allies The EU recognises that its vulnerability derives in part from the weak links in its security environment. Several intelligence and media reports suggest that Russia is actively involved in malicious operations against EU’s partners and allies in Ukraine, Georgia or the Western Balkans. Consequently, cyber capacity building in partner countries and regions has become one of the strategic building blocks of the EU’s cyber diplomacy.20 The specific actions taken by the EU aim at building the foundations of cyber resilience, including through support for development of national cybersecurity strategies and policies, establishing or reinforcing national Computer Emergency Response Teams (CERTs), and putting in place national systems for effective cyber crisis management.21 The Global Action on Cybercrime Extended (GLACY+) – one of the EU’s flagship projects implemented jointly with the Council of Europe – offers assistance in developing policies, strategies, and strengthening law enforcement and criminal justice legal frameworks in third countries.22 Furthermore, the EU has launched a number of projects focused specifically on increasing the resilience of critical information infrastructure and networks supporting the vital services of selected priority countries worldwide, including the ENCYSEC project (Enhancing cybersecurity, protecting information and communication networks) and the CB4CyberResilience project (Capacity Building and Cooperation to enhance Cyber Resilience). In addition, the Joint Communication on the ENP Review prioritises the Eastern partners in the area of cybersecurity and cybercrime.23 Under the umbrella of the Support Group of Ukraine (SGUA), the EU has implemented a series of TAIEX24 actions using the expertise of member states to assist Ukraine to strengthen its cybersecurity capacity for the protection of critical infrastructure. Their focus is primarily on establishing an appropriate legislative framework and implementable strategy, developing public-private partnerships and organisational aspects in national cybersecurity, and strengthening the technical ability and skills of CSIRTs.25 At the same time, the EU initiatives on cybercrime aim to support the adoption of 20. Council of the European Union, “Council Conclusions on EU External Cyber Capacity Building Guidelines,” 10496/18, June 26, 2018. 21. Patryk Pawlak and Panagiota Nayia Barmpaliou, “Politics of Cybersecurity Capacity Building: Conundrum and Opportunity,” Journal of Cyber Policy 2, no. 1 (March 2017): 123-144. 22. Patryk Pawlak, “Cyber Resilience,” in After the EU Global Strateg y - Building Resilience, ed. Florence Gaub and Nicu Popescu (Paris: EU Institute for Security Studies, 2017), 17-20. 23. European Commission, Joint Communication on Review of the European Neighbourhood Policy, Join (2015) 50 final, November 18, 2015, http://eeas.europa.eu/archives/docs/enp/ documents/2015/151118_joint-communication_review-of-the-enp_en.pdf 24. TAIEX is the Technical Assistance and Information Exchange instrument of the European Commission. TAIEX supports public administrations with regard to the approximation, application and enforcement of EU legislation as well as the sharing of EU best practices towards the countries under the EU neighbourhood policy and the countries engaged in enlargement negotiations. 25. Efforts at strengthening Ukraine’s cyber capacities are also implemented by NATO. See for instance, Patryk Pawlak, “Building Capacities for Cyber Defence,” Issue Alert no. 26, EUISS, November 2017, https:// www.iss.europa.eu/sites/default/files/EUISSFiles/Alert%2026%20Cyber%20development.pdf 110 10 Protecting and defending Europe’s cyberspace the standards proposed in the Council of Europe Convention on Cybercrime (the Budapest Convention) and focus, inter alia, on improving mutual legal assistance for international cooperation and electronic evidence, strengthening the role of 24/7 points of contact, and promoting practical measures for public-private partnerships.26 FIGURE 4 | Cyber-related projects implemented by the Council of Europe with EU funding Kosovo* iPROCEEDS | Cybercrime@IPA Serbia Belarus iPROCEEDS, Cybercrime@IPA Montenegro Ukraine Cybercrime@EAP I & II & III Cybercrime@EAP I& II & III Turkey iPROCEEDS, Cybercrime@IPA iPROCEEDS, Cybercrime@IPA Bosnia & Herzegovina iPROCEEDS, Cybercrime@IPA Georgia Cybercrime@EAP I & II & III, Project on Cybercrime in Georgia Croatia Cybercrime@IPA iPROCEEDS, Cybercrime@IPA CyberSouth Albania Azerbaijan Tunisia Morocco Dominican Republic Cybercrime@EAP I & II & III Armenia GLACY, GLACY+, CyberSouth GLACY+ Costa Rica GLACY+ Tonga Algeria CyberSouth Cape Verde GLACY+ Senegal Ghana GLACY, GLACY+ CyberSouth Lebanon CyberSouth Nigeria GLACY+ GLACY+ GLACY, GLACY+ Cybercrime@EAP I & II & III Jordan Cybercrime@EAP I & II & III Mauritius iPROCEEDS, Cybercrime@IPA South Africa Project on Cybercrime in Georgia 0.8 Cybercrime@EAP I 0.9 Cybercrime@IPA GLACY+ € 0.22 million Cybercrime@EAP II CyberCrime@EAP III GLACY, GLACY+ GLACY Chile completed GLACY, GLACY+ Moldova the former Yugoslav Republic of Macedonia PROJECTS Philippines GLACY, GLACY+ Sri Lanka 1.2 2.8 CyberSouth 3.33 GLACY 3.35 iPROCEEDS 5.56 ongoing 13.35 GLACY+ *This designation is without prejudice to positions on status, and is in line with UNSCR 1244/1999 and the ICJ Opinion on the Kosovo declaration of independence. Source: European Commission, Operational Guidance for the EU’s International Cooperation on Cyber Capacity Building, 2018. Reinforcing international consensus International engagements have also become an important element of the EU’s response to malicious cyber activities. As stated in numerous Council conclusions, the primary objective of EU policy is to support and promote ‘a global, open, free, 26. Author’s interview with a European Commission official. 111 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES stable and secure cyberspace where human rights and fundamental freedoms and the rule of law fully apply for the social well-being, economic growth, prosperity and integrity of our free and open societies’. The EU also maintains that ‘international law, including international conventions such as the Council of Europe Convention on Cybercrime and relevant conventions on international humanitarian law and human rights (…) provide a legal framework applicable in cyberspace.’27 There is, therefore, a clear divergence of views between the EU and Russia, as Moscow not only pursues policies limiting access to a free and open internet at home and curbing the freedom of expression, but also promotes the idea of two new international legal instruments: one to tackle cybercrime (Russia has not signed the Budapest Convention) and the other to regulate state relations in the cyber domain (modelled on the Code of Conduct proposed to the United Nations by the Shanghai Cooperation Organisation). The EU has taken several steps to promote its vision of cyberspace internationally. The 2015 Council conclusions on cyber diplomacy elaborate the EU’s position on a range of issues such as norms of responsible state behaviour, internet governance, global competitiveness or the promotion and protection of human rights online. Simultaneously, the EU has been working on strengthening international response and deterrence capacities. In 2017, the member states agreed to develop a joint EU diplomatic response to malicious cyber activities, the Cyber Diplomacy Toolbox, accompanied by the implementing principles and follow-up activities focused on attribution of malicious cyber incidents. Options for action range from statements by the Council or the High Representative, to Council conclusions and adoption of restrictive measures, among others.28 Finally, the EU has also developed a Cyber Defence Policy Framework for cyber protection of the CSDP missions and operations, and encourages cooperation between member states through projects implemented in the framework of the Permanent Structured Cooperation (PESCO). 29 Closer strategic cooperation with NATO has been initiated in 2016 via a EU-NATO cyber defence information-sharing agreement. In April 2018, the Council of the European Union adopted conclusions on malicious cyber activities which stressed that ‘the use of ICTs for malicious purposes is unacceptable as it undermines [the EU’s] stability, security and the benefits provided by the Internet and the use of ICTs’. Even though the document did not explicitly attribute NotPetya to Russia – although several EU member states have done so unilaterally – it recalls the EU’s established view that existing international law applies to cyberspace. More importantly, it incorporates into the EU’s acquis two norms proposed by the UN Group of Governmental Experts, namely that (a) states 27. European Commission, “Joint Communication on Resilience, Deterrence and Defence: Building Strong Cybersecurity for the EU,” Join (2017) 450 final, September 13, 2017. 28. Council of the European Union, “Council Conclusions on Cyber Diplomacy,” 6122/15, February 11, 2015, http://data.consilium.europa.eu/doc/document/ST-6122-2015-INIT/en/pdf 29. For instance: the ‘Cyber Threats and Incident Response Information Sharing Platform’ project will develop more active defence measures, potentially moving from firewalls to more active measures; Cyber Rapid Response Teams (CRRTs) will allow member states to help each other to ensure a higher level of cyber resilience and to collectively respond to cyber incidents. 112 Protecting and defending Europe’s cyberspace must not use proxies to commit internationally wrongful acts using ICTs, and should ensure that their territory is not used by non-state actors to commit such acts; and (b) states should not conduct or knowingly support ICT activities contrary to their obligations under international law, and should not knowingly allow their territory to be used for malicious activities involving ICTs. Building a malware-proof construction The EU Global Strategy reaffirmed the EU’s intention to be a ‘forward-looking cyber player’ with the focus on protecting critical assets and promoting a free and secure global Internet. To fully achieve that objective, the whole-of-society and whole-of-government approaches cannot be just a bumper sticker but need to be fully embraced through concrete policies and matched with adequate resources – in terms of budgets, manpower and political leadership. This can be achieved through a reinforced effort in the following five areas: 1. Building the culture of cyber resilience by promoting cyber hygiene and awarenessraising at all levels of society and across governments. This goes beyond initiatives focused on improving digital skills, training or adopting standards to ensure that awareness of digital risks, vulnerabilities and potential countermeasures becomes part of the DNA within institutions, companies, and among the individual users, including by developing proper risk analysis and mitigation strategies. 2. Reinforcing joint action and deterrence capabilities through further work on operationalising the concept of attribution and an EU cyber sanctions regime in the framework of the EU Cyber Diplomacy Toolbox. While attribution and possible countermeasures are a national competence, a better mutual understanding of the methodology and processes guiding the decision-making processes in each of the member states is required for more effective collective attribution and cooperation at the EU level, in particular with regard to the imposition of the restrictive measures. 30 Concrete initiatives could also focus on strengthening digital forensics capacities and methods. 3. Building confidence and trust between states by improving transparency on the member states’ practice and approach to the application of the existing international law in cyberspace. This can be achieved by making public and clarifying national laws, doctrines and strategies adopted by individual countries. Eventually, this would contribute to the emergence of a common strategic cyber culture among the EU member states, as has been the case in other security domains. 4. Strengthening global cyber resilience through partnerships with other international and regional organisations (OSCE, NATO, AU, World Bank) as well as the private sector. The initiatives within the OSCE and ARF – where Russia is also a participating 30. For instance, only a few states – UK, US, Canada, Australia, New Zealand and Denmark – publicly attributed the destructive NotPetya cyberattacks to Russia. 113 10 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES state – might prove particularly useful in clarifying positions and resolving conflicts, in particular through further work on measures and mechanisms increasing transparency in the cyber domain. 5. Supporting alternative venues for dialogue on cyber-related issues, including through building on the already existing track 2.0 engagements such as the Trianon Dialogue31 or establishing new formats for informal exchanges between experts. 31. A permanent structure for fostering interaction between French and Russian civil societies established in 2017. 114 Conclusion: Russia – from digital outlier to great cyberpower Nicu Popescu and Stanislav Secrieru Currently the world appears to be in the grip of ‘cyber hysteria’. Formerly perceived as a rarefied issue confined to the domain of specialist ‘geeks’, cyber seems to have evolved almost overnight into a mainstream political and security preoccupation. Today’s headlines are dominated by reports about the rise and fall of cryptocurrencies, the risks posed by increasingly sophisticated cyberattacks, great powers’ investments in cyber capabilities, ongoing ‘crypto wars’ and the coming dominance of Artificial Intelligence (AI). Cyber concerns have in recent years become increasingly prominent in (geo-) politics too. These days no major political speech or high-level diplomatic meetings can take place without mentioning or debating cyber challenges. Governments and international bodies are busy drafting documents to address diverse facets of cybersecurity and how the challenge should be tackled. While the alarm about threats emanating from cyberspace and from cyber-related vulnerabilities is justified, the surprise is not. People tend to think of cyber challenges as something new. But in fact the phenomenon is not that new. In April 1965 Time magazine ran a cover story entitled ‘The Cybernated Generation’ reflecting on emerging vulnerabilities stemming from society’s growing reliance on computers. In this pre-cyber world a doomsday scenario of what would happen if the Western world were suddenly to experience a massive computer breakdown was evoked.1 However, in the 1960s such anxieties were overshadowed by the nuclear arms race and the spectre of total annihilation which the use of nuclear weapons could bring about. But as the world embraced the age of the internet in the late 1990s, with the emergence of new computer devices and innovative technologies, cybersecurity challenges made the headlines again. Concern about weapons of mass destruction among the expert community and wider public was now matched by concern about cyber as a ‘weapon of mass disruption.’2 In recent years a series of cyberattacks orchestrated by Russia has raised awareness internationally about how cyber tools can be employed in malign ways. This has 1. Gordon Corera, Intercept: The Secret History of Computers and Spies (London: Weidenfeld & Nicholson, 2015), 67-68. 2. Fred Kaplan, Dark Territory. The Secret History of Cyber War (New York: Simon & Schuster, 2016), 52. 115 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES shifted the cybersecurity debate away from concerns about technological risks to worries about human-induced cyber disruptions that can have direct, immediate and substantial repercussions across a whole range of domains, ranging from the safety of electoral processes to the West’s capacity to use its sophisticated military arsenals. The rise of a great cyber power Post-Soviet Russia was plunged into chaos in the 1990s, as economic shock therapy, hyperinflation, deepening poverty and rampant organised crime took their toll on Russian society. Few could have imagined that in the midst of such sharp economic decline and social crisis Russia would find the resources to invest in cutting-edge cyber tools. But it did. In March 1998, the US military discovered that unidentified hackers had infiltrated computers at the Wright-Patterson Air Force Base in Ohio and downloaded sensitive R&D files. The attack was nicknamed ‘Moonlight Maze’ and it transpired that the hackers had managed to steal 5.5 gigabytes of data. The NSA experts who monitored the hackers’ moves in real time were awed by the sophistication of the operation. To trap the culprit they set up an elaborate ‘honey pot’, which would enable them to attribute the attack with a high degree of precision. The cyber trail led them to an IP address which hosted the Russian Academy of Sciences in Moscow. One month later, a US delegation travelled to Moscow to clarify the matter. A high-ranking military official confirmed the hack, blaming Russia’s intelligence services.3 By the late 1990s, Russia had no need to recruit hackers from elsewhere (as it did back in 1986): it was able to rely on indigenous skills and resources to hack the most advanced cyber nation itself. The technological gap which was supposed to shield the West from economically and technologically backward players in the cyber domain had vanished. From this point on, the instances of Russia-initiated or guided cyberattacks against Western powers and the post-Soviet states increased exponentially. The cyber escalation ladder Throughout the 2000s and 2010s Russia sought to establish itself as a ‘great cyber power’. In this respect its status rests on two pillars. Firstly, Russia significantly boosted its cyber capabilities, be it within state agencies or through the co-optation of ‘rogue’ criminal cyber actors and private IT companies, resulting in a diffuse 3. 116 Fred Kaplan, Dark Territory, 78-88. Protecting and defending Europe’s cyberspace complex network.4 In the 1980s the Soviet Union recruited non-state actors because it lacked hacking skills and expertise. In the 2000s Russia possessed know-how but often hired the services of non-state actors (closely linked to law enforcement institutions) in order to be able to hide behind the mask of ‘plausible deniability’. Secondly, this mastery of cyber capabilities was matched by a strong political will to use them in a more integrated way both for domestic and foreign policy purposes. Up until the early years of the new millennium Moscow was primarily engaged in cyber espionage, but from the mid-2000s onwards the scope of malicious cyber activities significantly widened. The track record of documented cyberattacks conducted or masterminded by Russia makes it possible to distinguish three levels of cyber-offensive operations. The first level concerns classical intelligence-gathering activities in cyberspace. In this Russia is not alone, nor particularly unique. Plenty of other countries rely massively on cyber intelligence. Certainly, Russia’s cyber targets have included a wide array of players such as political parties, law enforcement bodies (e.g. Dutch prosecutors investigating the downing of flight MH17, 5 police officers from Scotland Yard investigating the Skripal poisoning case etc),6 international sports organisations and even the clergy of the Eastern Orthodox Church.7 And even if it seems that more is known in the public domain about the presumed targets of Russian cyber intelligence efforts, it is generally assumed that other cyber powers – whether China, the US or some European states – might be less visible, but are probably not much more reticent than Russia about using cyber intrusions for intelligence purposes. What makes Russia somewhat different from other cyber powers is the way in which it operates at two other levels. Russia is almost unabashed about its integration of cyber intrusions and strategic communications. The data obtained through cyber espionage often feeds the compromised material released ahead of important political or sporting events. A key example is the release by Russian hackers of the medical records of Western athletes stolen from the World Anti-Doping Agency, which happened in the midst of a doping investigation involving Russian sportsmen.8 Bots and trolls are put to use to distribute ‘anonymous leaks’, as happened in the 2016 US and 2017 French presidential elections. The primary aim of such manipulative use of information is to draw attention away from Russia’s own shortcomings or wrongdoings, discredit foreign 4. Anna Shnygina, “How Russia’s War in Georgia Sparked Moscow’s Modern-day Recruitment of Criminal Hackers”, Meduza, August 7, 2018, https://meduza.io/en/feature/2018/08/07/it-s-our-time-to-serve-the-motherland; Kevin Poulsen, “LEGION OF DOOM – This Hacker Party Is Ground Zero for Russia’s Cyberspies”, Daily Beast, August 3, 2018, https://www.thedailybeast.com/this-hacker-party-is-ground-zero-for-russias-cyberspies-3?ref=scroll 5. Interview with Dutch diplomat, April 2018. 6. Robert Mendick, “Russian Cyber Hackers ‘Targeted’ Police Inquiry into Skripal Nerve Agent Attack”, The Telegraph, July 16, 2018, https://www.telegraph.co.uk/news/2018/07/16/russian-cyber-hackers-targeted-police-inquiry-skripal-nerve/ 7. Mark Mazzetti and Katie Benner, “12 Russian Agents Indicted in Mueller Investigation”, New York Times, July 13, 2018, https://www.nytimes.com/2018/07/13/us/politics/mueller-indictment-russian-intelligence-hacking. html; Sam Thielman, “Same Russian Hackers Likely Breached Olympic Drug-testing Agency and DNC”, The Guardian, August 22, 2016, https://www.theguardian.com/technology/2016/aug/22/russian-hackers-worldanti-doping-agency-dnc-hack-fancy-bear; Raphael Satter, “Ungodly Espionage: Russian Hackers Targeted Orthodox Clergy”, AP, August 27, 2018, https://apnews.com/26815e0d06d348f4b85350e96b78f6a8 8. Jethro Mullen and Ivana Kottasova, “Russian Hackers Release Secret Data of 25 More Olympic Athletes”, CNNtech, September 15, 2016, https://money.cnn.com/2016/09/15/technology/wada-olympic-athletes-russian-hackers/index.html 117 10 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES politicians, confuse and mislead public opinion, and derail democratic processes abroad. Neither China, the US nor other cyber powers integrate to such an extent information stolen via cyber means into targeted information campaigns that seek to influence elites or the wider public in other countries, especially at election time. The third level of operations targets critical political and economic infrastructure in physical space or cyberspace. Russia’s cyberattacks have covered a variety of targets, from voter lists and digital mass-media outlets to government websites, banks, electricity distribution networks, hospitals, airports and maritime transport systems. While Russia has not yet crossed the threshold of cyber destruction (e.g., complete destruction of computer networks, sabotage or physical destruction of pipelines, intentionally provoked industrial incidents involving casualties) its offensive operations in cyberspace have temporarily disrupted services provided by banks, ATMs and airports, as well as electricity supplies, the retail sector, and maritime transportation.9 Again, Russia is not the only cyber actor that has used cyber tools to target physical infrastructure. Stuxnet – the virus designed to sabotage the Iranian nuclear centrifuges – is also one such tool. But no other power seems to have used cyberattacks as massively and indiscriminately to disrupt real-world processes as Russia did over the past 15 years in Estonia, Georgia or Ukraine. Russia is undoubtedly one of the world’s great cyber powers, armed with a lot of technical skill and expertise, plus the willingness and readiness to act aggressively in cyberspace. This has certainly helped Russia boost its global profile. But in the process Russia has pushed cyber concerns onto the top of decision-makers’ agendas in the EU and the US, making cyberspace an ever-more contested domain and thus forfeiting the competitive and strategic advantage that it has hitherto enjoyed in this arena. 9. 118 Andy Greenberg, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History”, Wired, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ Annex Abbreviations AI Artificial Intelligence ANSSI French National Cybersecurity Agency (Agence nationale de sécurité des systèmes d’information) Advanced Persistent Threat ASEAN Regional Forum Association of Southeast Asian Nations African Union Brazil, Russia, India, China and South Africa Confidence-building measures Cooperative Cyber Defence Centre of Excellence National Commission for the monitoring of the electoral campaign for the presidential election (Commission nationale de contrôle de la campagne électorale en vue de l’élection présidentielle) Cyber Defence Management Authority Cyber Defence Management Board Computer Emergency Response Team Computer Emergency Response Team for the EU institutions, bodies and agencies Central Intelligence Agency Common Security and Defence Policy Computer Security Incident Response Team Collective Security Treaty Organisation Distributed Denial of Service Democratic National Committee Domain Name System Denial of Service European External Action Service European Neighbourhood Policy Electronic Warfare Federal Agency for Government Communications and Information (Federalnoye Agentsvo Pravitelstvennoi Svayazi I Informatsii) Federal Bureau of Investigation Federal Security Service (Federal'naya sluzhba bezopasnosti Rossiyskoy Federatsii) APT ARF ASEAN AU BRICS CBMs CCDCOE CCNEP CDMA CDMB CERT CERT EU CIA CSDP CSIRT CSTO DDoS DNC DNS DoS EEAS ENP EW FAPSI FBI FSB 123 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES FYROM GDP GGE GRU HOSG ICT IP IT KGB NATO NCIA NCS NIS NSA OSCE R2P R&D RBN RBTH RT SCO SHAPE TAIEX UN UNGA UN GGE 124 Former Yugoslav Republic of Macedonia Gross Domestic Product Group of Government Experts Russian military intelligence agency (Glavnoye Razvedyvatelnoye Upravlenie) Heads of State and Government Information and Communications Technology Internet Protocol Information Technology Committee for State Security (Komitet gosudarstvennoy bezopasnosti) North Atlantic Treaty Organisation NATO Communications and Information Agency NATO Command Structure Network Information Security National Security Agency Organisation for Security and Cooperation in Europe Responsibility to Protect Research and Development Russian Business Network Russian Beyond The Headlines Russia Today Shanghai Cooperation Organisation Supreme Headquarters Allied Powers Europe Technical Assistance and Information Exchange Instrument of the European Commission United Nations United Nations General Assembly United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security Notes on the contributors Notes on the contributors Siim Alatalu joined the NATO Cooperative Cyber Defence Centre of Excellence in January 2015 as Head of International Relations. In 2018 he joined the Centre’s Strategy Branch, where he is in charge of cyber strategy and policy research and training related to NATO and the EU, as well as providing subject matter expertise to the Centre’s other flagship projects. His prior professional career includes several advisory and managerial positions at the Estonian Ministry of Defence since 2001. Irina Borogan is a Russian investigative journalist, co-founder and deputy editor of Agentura.ru, a watchdog that monitors the activities of the Russian secret services. She has co-authored (with Andrei Soldatov) The New Nobility: The Restoration of Russia’s Security State and the Enduring Legacy of the KGB (PublicAffairs, 2010) and The Red Web: The Struggle Between Russia’s Digital Dictators and the New Online Revolutionaries, published in the autumn of 2015 and updated in 2017. Elena Chernenko is Deputy Head of the international desk at Kommersant newspaper (Russia). She is a member of the board of the PIR Center and also a member of the board of the Council on Foreign and Defence Policy (SVOP). Her areas of research interest include cyber diplomacy, non-proliferation and arms control. She holds a PhD in History from the Moscow Lomonossow State University, and has worked in journalism since 2003. Sven Herpig is the project director of the Transatlantic Cyber Forum (TCF), founded by the German think tank Stiftung Neue Verantwortung in Berlin. His research currently focuses on international cybersecurity policy, including government hacking, vulnerability management, resilience policies and the protection of election infrastructures. He previously worked for Germany’s Federal Office for Information Security (BSI) and the information security staff at the Federal Foreign Office. Oscar Jonsson is a PhD candidate at the Department of War Studies, King’s College, London. The subject of his thesis is the Russian understanding of modern warfare. He previously worked as an expert on Russia for the Swedish Armed Forces Headquarters, specialising in ‘hybrid warfare’ and strategic planning. Xymena Kurowska is Associate Professor of International Relations at Central European University, Hungary and Marie Skłodowska-Curie Fellow at Aberystwyth University, UK. She received her doctorate on European security from the European University Institute in Florence. Her current research interests include security theory and practice, Russian society and foreign policy, digital propaganda, and norm contestation in cyberspace. 125 HACkS, LEAkS ANd dISRUPTIONS | RUSSIAN CYBER STRATEGIES Jarno Limnéll is Professor of Cybersecurity at Aalto University, Finland, and an adjunct professor in three other Finnish universities. He is also the CEO of the IoT infrastructure security firm Tosibox. He has been working on security issues for over 20 years, and has a profound understanding of the global threat landscape. He has published extensively on security issues. Patryk Pawlak heads the Brussels office of the EU Institute for Security Studies (EUISS). He is currently involved in several projects focused on the EU’s external cyber capacity building and cyber diplomacy. Since February 2018, he has managed the EU Cyber Direct project aimed at supporting the EU’s cyber diplomacy and resilience-building efforts in six major partner countries (Brazil, China, India, Japan, South Korea, and the United States). In April 2018, he was appointed as a Co-Chair of the Advisory Board of the Global Forum on Cyber Expertise. Piret Pernik is a Research Fellow at the International Centre for Defence and Security (ICDS). Her research focuses on cybersecurity and cyber defence, digital policy and transformation, societal security, and comprehensive security and defence. She has published on national, NATO, and EU cybersecurity policies and strategies. Before joining ICDS in 2013, she worked at the Estonian Ministry of Defence and served as an adviser to the National Defence Committee of the Estonian Parliament. Nicu Popescu is Director of the Wider Europe programme at the European Council on Foreign Relations. He was a Senior Analyst at the EUISS from July 2013 until July 2018, where he specialised in Russia and the EU’s eastern neighbours. He previously worked as advisor on foreign policy and EU affairs for the prime minister of Moldova (2010, 2012-2013), dealing with foreign policy issues as well as domestic reforms. Prior to this, he worked as head of programme and Senior Research Fellow at the European Council on Foreign Relations in London (2007-2009, 2011-2012), and as a Research Fellow at the Centre for European Policy Studies in Brussels (2005-2007). Thomas Reinhold is a fellow of the Institute for Peace Research and Security Policy (IFSH) and member of the Research Advisory Group of the Global Commission on the Stability of Cyberspace. He studied computer science and psychology and his main areas of specialisation are software and hardware security in computer networks, software vulnerability and software security concepts as well as software threat analysis. His research has focused in recent years on cybersecurity, threats in cyberspace, and the rising problems of cyberwar and arms control in this domain. Anatoly Reshetnikov is a PhD researcher and a lecturer at the Department of International Relations of Central European University. His broader research interests include identity politics, conceptual history, linguistic approaches to social analysis, contemporary Russian politics, the concept of responsibility in international relations, and the new institutionalised techniques of political control and resistance, such as political trolling. 126 Protecting and defending Europe’s cyberspace Stanislav Secrieru is a Senior Analyst at the EUISS. He was previously a policy analyst at the Open Society European Policy Institute in Brussels, a Partnership for Peace Research Fellow at the NATO Defence College, a Research Fellow with the Study Programme on European Security at the Institute for European Politics in Berlin, and a Senior Research Fellow at the Polish Institute of International Affairs (PISM). He has also worked on research projects addressing political and security developments in the eastern neighbourhood for the European Council on Foreign Relations (ECFR) and Freedom House. Andrei Soldatov is a Russian investigative journalist, co-founder and editor of Agentura.ru, a watchdog that monitors the Russian secret services’ activities. He has been covering security services and terrorism issues since 1999. He has co-authored (with Irina Borogan) The New Nobility: The Restoration of Russia’s Security State and the Enduring Legacy of the KGB (PublicAffairs, 2010) and The Red Web: The Struggle Between Russia’s Digital Dictators and the New Online Revolutionaries, published in the autumn of 2015 and updated in 2017. Jean-Baptiste Jeangène Vilmer is the director of the Institute for Strategic Research (IRSEM, French Ministry for the Armed Forces), after having served as policy officer working on Security and Global Affairs at the Policy Planning Staff (CAPS) of the French Ministry of Foreign Affairs, and in various academic positions (McGill University Faculty of Law, King’s College London Department of War Studies). He co-authored the CAPS-IRSEM report on Information Manipulation (September 2018). 127 10 European Union Institute for Security Studies 100, avenue de Suffren | 75015 Paris | France | www.iss.europa.eu