Russian Cyber Campaign Aims To Splinter US Voters

Thousands of Kremlin-linked Twitter accounts are churning out material designed to splinter America along political, racial and religious lines, even as tech executives fielded questions at Capitol Hill on Russian meddling in last year’s US election.

An analysis of 600 Twitter accounts traced by the German Marshall Fund, a think tank, to the Russian government has provided a vivid insight into how the Kremlin is seeking to use social media to undermine Western societies.

In the US recently, the Russian Twitter accounts latched on to a racially tinged row, begun by President Donald Trump, over whether American football players should kneel during the national anthem to protest against perceived police brutality against African-Americans.

As debate surrounding the National Football League kept America’s cable news channels transfixed, the Russian accounts sought to amplify the dispute, pumping out hashtags such as #boycottnfl and #takeaknee.

They then turned their attention to a story involving Michelle Obama, who became the target of a conservative backlash when she declared that “any woman who voted against Hillary Clinton voted against their own voice”. The accounts also pushed messages with the hashtag #Maga, Make America Great Again, Mr Trump’s campaign slogan.

People with inside experience of how Russian state-owned propaganda outfits operate see familiar patterns.

“They thrive on stories of internal US conflict, especially racial and gender-based anxieties,” said Andrew Feinberg, a former reporter for Sputnik News, an outlet identified by US intelligence as a front for Russian agitprop.

US officials say Russia is applying a Cold War propaganda tactic by amplifying issues that already polarise the US. Bret Schafer, of the German Marshall Fund, said that Russian trolls had demonstrated a “desire to latch on to anything divisive”.

Last month Russian-linked accounts sought to intensify calls by alt-right pundits and websites for the removal of HR McMaster, Mr Trump’s national security adviser, from the White House, alleging that he was a puppet of Jewish interests.

Actor Morgan Freeman came under attack this week after he promoted the Committee to Investigate Russia, an activist group that says its mission is to help “Americans recognise and understand the gravity of Russia’s continuing attacks on our democracy”.

Twitter executives told the Senate and House intelligence committees yesterday it had suspended at least two dozen accounts that may have been tied to Russia. But the ranking Democrat on the Senate committee, Mark Warner, said Twitter’s explanations of its actions were “deeply disappointing”.

Senator Warner said the evidence provided over several hours by company executives behind closed doors to committee staff members “was frankly inadequate on almost every level”.

The disclosures by Twitter follow Facebook revelations that some 3000 ads were bought by entities with likely ties to Russia.

Twitter said it also provided congressional investigators with a “round-up” of ads from accounts used by Russia’s state-sponsored news network, RT. The company said in a blog post that RT spent $US274,100 on ads targeted to markets in the US last year.

Twitter provided the ads, which came from three handles used by RT, to investigators. Most tweets from the accounts promoted news stories. Twitter said it has worked harder to detect and prevent spam and “malicious automation.”

But many global cybersecurity analysts have a much larger theory about the endgame of the hacking epidemic: They believe Russia is using the Ukraine as a cyberwar testing ground, a laboratory for perfecting new forms of global online combat.

And the digital explosives that Russia has repeatedly set off in Ukraine are ones it has planted at least once before in the civil infrastructure of the United States.

In that shadow of neglect, Russia isn’t only pushing the limits of its technical abilities, says Thomas Rid, a professor in the War Studies department at King’s College London.

It’s also feeling out the edges of what the international community will tolerate. The Kremlin meddled in the Ukrainian election and faced no real repercussions; then it tried similar tactics in Germany, France, and the United States.

Russian hackers turned off the power in Ukraine with impunity, and, well, the syllogism isn’t hard to complete.

“They’re testing out red lines, what they can get away with,” Rid says. “You push and see if you’re pushed back. If not, you try the next step.”

The Australian:

You Might Also Read:

Hillary Clinton’s Cyber Warfare Warning:

US Presidential Election Hacks Revealed:

« NSA Should Thank Edward Snowden
Businesses Get Better At Detecting Insider Threats »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Caldew Consulting

Caldew Consulting

Caldew specialise in providing information assurance and cyber security consultancy, covering the full spectrum of the security life cycle.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Network Intelligence

Network Intelligence

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Opus

Opus

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

Cyber Brain Academy

Cyber Brain Academy

At Cyber Brain Academy, our mission is to provide high-quality IT certification training for the cyber security workforce.