Cyberwar: Enter the Trolls

Savushkina Street, St Petersburg

The great breach in the US government’s database is a classic case of informational smash and grab. But operations to plant misinformation are also worrying for states which care about truth.

Digital wars are being fought in many theatres around the world and in many forms. In the light of the Snowden revelations, citizens who guard their privacy may already feel that their privacy has already been eroded. But recently, the Obama administration conceded that the US federal government had itself fallen victim to a hack on an unprecedented scale, with the security of the details of up to four million former and present employees apparently breached.

The Chinese, who were initially considered the most likely suspects, hotly deny any responsibility for this data smash and grab. Nor is it immediately obvious what the perpetrators’ motives might be. It could be a fishing expedition to establish who has access to real secrets. It could be a more straightforward criminal enterprise, a prelude to identity theft. The initial hack probably happened months ago, for one of the distinguishing features of the digital age is its capacity to host the faceless along with the intimate. This is what lends a more sinister force to the familiar equation of information, truth and power. The ability to extract or insert information that may or may not be true is not new – but it is uniquely facilitated in a digital world.

The phenomenon of the troll factory is a particularly egregious example of its exploitation. A troll factory is not some happy Scandinavian workshop peopled by happy elves, but a profoundly nihilistic and disturbing use of the Internet. The Guardian newspapeer tracked down a building in Savushkina St. in St Petersburg and talked to some of the paid bloggers who work to establish an inoffensive online personality in the comment sections of media outlets, and on social media, and then seed their posts with pro-Putin or pro-government remarks. The Guardian has experienced this kind of organised assault on reports from Ukraine and, presumably because of implications for the Russian-hosted world cup in 2018, on corruption at Fifa.

This kind of trolling is the digital offspring of earlier practices like “astroturfing”, where American corporations would organise letter-writing campaigns to local papers in order to make a lobbying initiative appear to be something that came from the grassroots. It can be an effective way to subvert opinion, and it is almost certainly more effective in the apparently intimate corners of the Internet than in print. 

This is not just a matter for government in Moscow, Beijing or Pyongyang. Non-state movements such as Islamic State adopt them, too. The Internet is a new front in asymmetrical warfare. We’re so used to thinking of soft power as a benign weapon that it requires an effort of will and understanding to see that it can be used in entirely malign ways, domestically as well as externally. Governments need to be where people are listening. Presumably the west is out there trolling too. 

But the BBC World Service built its reputation with honesty and this should be the policy of any British presence on the Internet. It must be out there at least trying to defend the truth without subterfuge against the lies of dictators and extremists everywhere.

Ein News:  

« Top 6 Hacking Tools Security Teams Should Know About
FBI Unable to Monitor ISIS’s Encrypted Communications »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

Phosphorus Cybersecurity

Phosphorus Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.

UMCA Technologies

UMCA Technologies

UMCA Technologies provide an AI-based solution that helps financial institutions reduce and block fraudulent financial transactions and prevent account takeovers in real time.