Electoral Influence: 40yrs Of Kremlin Interference

The most surprising thing about Russian attempts to influence the outcome of November’s US presidential election is that they should have caused surprise. Attempts to rig elections are traditional.

Every country in the post-war Soviet bloc established in eastern Europe became communist as the result of fraudulent elections which, throughout the Cold War, continued to deliver bogus majorities of more than 99%.

Walter Ulbricht, leader of the East German communist party, told his senior party officials after the Second World War: “It’s got to look democratic but we must have everything under our control.”

The KGB also made somewhat less ambitious post-war plans to influence the outcome of elections in the West, especially those of its “main adversary”, the US. Its strategy was the same as that of the recent attempts to undermine Hillary Clinton’s election campaign, to collect and covertly distribute compromising material (some of it fabricated) against candidates it wished to lose.

The recent report by the US intelligence community on “Assessing Russian activities and intentions in recent US elections” cites documents in the Mitrokhin Archive, top secret files smuggled out of Russia in the 1990s by a former senior KGB archivist, who was exfiltrated by MI6 to Britain.

He and I worked together on these extraordinary papers while I was writing a history of KGB foreign operations. They show that, more than 40 years ago, the KGB recruited a Democratic Party activist to report on future president Jimmy Carter’s “campaign and foreign policy plans”.

Probably no American policy-maker at any time during the Cold War inspired as much fear and loathing in Moscow as Ronald Reagan in the early 1980s. The first priority of KGB influence operations (officially known as “active measures”) was to prevent his re-election in 1984.

The main obstacle to the KGB’s covert campaign was Reagan’s almost blameless private life and visible devotion to his wife, Nancy. So the “Centre” (KGB HQ) decided to portray him instead as an out-of-control militarist who threatened to provoke a third world war. “Residencies” (KGB stations) around the world were ordered to popularise the slogan “Reagan means war!”

To assist them, the KGB forged a series of bellicose documents, including a letter to the King of Spain bearing Reagan’s signature, calling on the king to deal promptly and decisively with those obstructing Spanish membership of Nato.

Another of the KGB’s favourite deceptions was bogus documents purporting to reveal secret dealings between the Reagan administration and the apartheid regime in South Africa. 

One such document was planted on the unsuspecting Washington correspondent of the New Statesman, which featured it prominently in its issue of November 5, 1982.

The recent US intelligence report concludes that: “President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election. Russia’s goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency.

“We further assess Putin and the Russian government developed a clear preference for president-elect Trump.”

Computer hacking and the advent of cyber-warfare made it much easier in 2016 for Russian intelligence to collect private information on presidential candidates than during the Reagan era. 

But Russian attempts to influence the outcome of the election were scarcely more successful in 2016 than in 1984. There is no convincing evidence that their efforts made a significant contribution to Clinton’s defeat.

Though largely ineffective, however, Russian interference in US elections remains deeply sinister. Under President Boris Yeltsin in the 1990s, interference declined. Under Putin it is sharply on the rise.

As the US intelligence report also concludes: “Russian efforts to influence the 2016 US presidential election represent the most recent expression of Moscow’s long-standing desire to undermine the US-led liberal democratic order, but these activities demonstrated a significant escalation in directness, level of activity, and scope of effort compared to previous operations.”

Though the report does not mention it, there is also reason to suspect the compromising material (kompromat) collected by Russian intelligence on both Trump and Clinton before the election included, as in the Soviet era, fabricated evidence. The whole wretched story provides further, worrying evidence of a return to the Cold War.

Professor Christopher Andrew, former MI5 official historian, is a convenor of the Cambridge Intelligence Seminar

Times:             How Russian Cyber Power Attacked The US:

 

« Why Hasn't MH370 Been Found?
Cyber Attack Concerns Ahead Of French Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.