Results 1 to 20 of 56

Thread: Russian Info, Cyber and Disinformation (July 2017 to end '17)

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Deleted
    Last edited by davidbfpo; 07-06-2017 at 09:55 PM.

  2. #2
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    This thread title is as follows....

    Russian Info, Cyber and Disinformation

    To ignore and delete information that indicates that a large number of Americans are actively working in that Russian effort for whatever reasons and then push that Russian info warfare, cyber and disinformation on to other Americans in order to influence their decisions and actions using all forms of media is an interesting development....even for SWJ.

    BTW...info posted here was provided to Twitter Support which has since deleted specific accounts that were proven to have been Russian even though they claimed to be US accounts....and were using perfect US English....
    Last edited by davidbfpo; 07-06-2017 at 09:56 PM. Reason: deleted

  3. #3
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Media report that #Russia has ~150 intelligence operatives deployed in the US:
    http://edition.cnn.com/2017/07/06/po...on0610PMStory#


    Alleged largest increase in over 20 years.....matches the massive increase in Europe where in Prague you can run into one every mile or so....as Prague has become the central Russian spy capital....

  4. #4
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Quote Originally Posted by OUTLAW 09 View Post
    I am getting tired of reposting this critical article done by one of the best Russian researchers....

    Crimintern: How the Kremlin uses Russia’s criminal networks in Europe

    By Mark Galeotti
    18th April, 2017
    http://www.ecfr.eu/publications/summ...orks_in_europe
    AND the US Russian crime gang connections just keep on keeping on....

    Russia-born dealmaker linked to Trump assists FBI money laundering probe
    https://www.ft.com/content/159eb2d8-...-0ac7eb84e5f1#

    BTW in the last year FT has done some really good investigative journalism on this topic...sad is that a lot of it is behind a paywall....
    Last edited by davidbfpo; 07-09-2017 at 12:25 PM. Reason: brevity

  5. #5
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Someone's phishing US nuke power stations. So far, no boom.....

    German Federal Security Services are taking this as a serious Russian APT28 warning to the West after their four attacks on the Baltics and Ukraine power grids....they see it as a not so subtle form of escalation....

    BTW...the recent again from Russia malware hacking attack against Ukraine focused on power plants, power grid, fuel (gas) stations, and water/natural gas supply infrastructure and anything that basically used a computer...

    https://www.theregister.co.uk/2017/0...=1499413546138

    Also from NYTs....
    https://www.nytimes.com/2017/07/06/t...ck-report.html

    Don't panic, but attackers are trying to phish their way into machines in various US power facilities, including nuclear power station operators.
    It seems so far whoever behind the campaign has tried phishing and watering-hole attacks, but haven't got beyond corporate networks (which in critical infrastructure should be on separate networks from the operational systems).
    The New York Times got wind of the intrusion attempts, getting a look at a joint Department of Homeland Security/FBI report.
    The money quote from the story appears to be this:
    There is no indication that hackers were able to jump from their victims’ computers into the control systems of the facilities, nor is it clear how many facilities were breached.
    Spokespeople for one of the targets, the Wolf Creek Nuclear Operating Corporation (in charge of a facility near Burlington in Kansas) said it maintained separate networks for corporate and operations systems, so there was no risk to its power stations.
    BTW....what is not being talked about is that in two US nuclear sites the recent malware attack unleashed on Ukraine actually made it into the business computers of the two nuclear power companies....

    BUT here is the problem not talked about...the malware contained a LSADump hack tool designed to collect all passwords and domain controllers allowing for later successful hacks unless ALL passwords were immediately changed and ALL domain servers reconfigured....

    AND where is again that Trump promised US cyber defense plan he stated would be available in 90 days....nowhere to be seen ...we are now 160 days in and still nothing to be seen AND yet he is worried about alleged voter fraud that happens less than the number of Americans hit yearly by lighting........
    Last edited by OUTLAW 09; 07-07-2017 at 08:31 AM.

  6. #6
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Quote Originally Posted by OUTLAW 09 View Post
    Someone's phishing US nuke power stations. So far, no boom.....

    German Federal Security Services are taking this as a serious Russian APT28 warning to the West after their four attacks on the Baltics and Ukraine power grids....they see it as a not so subtle form of escalation....

    BTW...the recent again from Russia malware hacking attack against Ukraine focused on power plants, power grid, fuel (gas) stations, and water/natural gas supply infrastructure and anything that basically used a computer...

    https://www.theregister.co.uk/2017/0...=1499413546138

    Also from NYTs....
    https://www.nytimes.com/2017/07/06/t...ck-report.html



    BTW....what is not being talked about is that in two US nuclear sites the recent malware attack unleashed on Ukraine actually made it into the business computers of the two nuclear power companies....

    BUT here is the problem not talked about...the malware contained a LSADump hack tool designed to collect all passwords and domain controllers allowing for later successful hacks unless ALL passwords were immediately changed and ALL domain servers reconfigured....

    AND where is again that Trump promised US cyber defense plan he stated would be available in 90 days....nowhere to be seen ...we are now 160 days in and still nothing to be seen AND yet he is worried about alleged voter fraud that happens less than the number of Americans hit yearly by lighting........
    "We don't pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said.
    https://www.bloomberg.com/news/artic...-nuclear-site#

    Germans are saying Russian state sponsored APT28 or the GRU hacking division...left their digital fingerprints all over this....
    Last edited by OUTLAW 09; 07-07-2017 at 08:44 AM.

  7. #7
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    BLUF.....

    US tech companies "actively didn't care/want to know" about Russian propaganda or disinformation until 2016 election meddling AND still do not really care as many simply forget they are driven by advertising income and the number of views are what drives them......even if those views are based on fake news, propaganda, disinformation.....via trolling and automated bot nets.....the more the "views" the more the advertising revenue....

    AND secondly, in the case of Twitter the largest single shareholder is a Saudi and the largest single investor is a Russian oligarch....at 1.3B USDs....

  8. #8
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    When one discusses Russian non linear warfare especially cyber and information warfare coupled with Russian black money softpower....it is good to go back to the basics again with the Russian invasion of Ukraine and their military annexation of Crimea....

    It is all intertwined even with the Russian hacking and influence operations during the US 2016 election....

    War in Ukraine Was Years in the Making
    By Vera Zimmerman
    http://www.atlanticcouncil.org/blogs...bKsPiY.twitter

    In a new comprehensive study, “The World Hybrid War: Ukrainian Forefront,” experts from Ukraine’s National Institute for Strategic Studies (NISS) examine the Ukraine-Russia conflict in the context of the global security crisis.

    In the monograph, they conceptualize hybrid war, trace its origins, look at the evolution of Russia’s revanchist ambitions, single out Ukraine’s vulnerabilities and its response, and advocate a new strategy. The authors aim to share Ukraine’s experience of hybrid war with Western readers and leave no doubt about the true nature of Russia’s goals.
    It is a long read (175 pages) but well worth it as it is a comprehensive analysis done by Ukraine itself...
    http://www.niss.gov.ua/public/File/b..._engl_site.pdf

    If the posting on the eight phases of Russia non linear warfare had not been deleted then one could see how this long study parallels the Russian non linear warfare doctrine including Russian cyber and information warfare..

    SOURCES OF HYBRID WAR
    Chapter 1. RUSSIA’S GEOPOLITICAL MESSAGE OF DEFIANCE .................. 13 1.1. Confrontation with the West .................................................. .......... 13 1.2. Victims of Russian hybrid aggression ..............................................20 1.3. Strategic purposes of Russian hybrid aggression against Ukraine .....25
    DISTINCTIVE FEATURES OF RUSSIA’S HYBRID WAR AGAINST UKRAINE
    Chapter 2. WAR ON HOMELAND FRONTLINES ............................................. 35 2.1. Instruments of political influence .................................................. .. 35 2.2. Media support of hybrid war .................................................. ..........40
    Chapter 3. SPECIAL AND DIPLOMATIC OPERATIONS .................................. 45 3.1. Russian secret services activities in Ukraine ..................................... 45 3.2. Diplomatic cover for hybrid aggression ............................................ 52
    Chapter 4. ECONOMIC DIMENSION OF HYBRID AGGRESSION .................59 4.1. Trade warfare as an instrument of economic pressure ......................59 4.2. ”Energy weapon” in the context of hybrid war .................................68
    HYBRID WAR AND HYBRID WORLD
    Chapter 5. WORLD REACTION TO THE RUSSIAN HYBRID WARFARE AGAINST UKRAINE .................................................. ....................... 81 5.1. Role of international security organizations and forums ................... 81 5.2. Economic sanctions policy .................................................. ............88 5.3. Activation of radical and anti-Europe forces in support of Russia ... 100 5.4. Minsk process in the light of world politics .....................................104
    Last edited by OUTLAW 09; 07-07-2017 at 01:01 PM.

Similar Threads

  1. Replies: 201
    Last Post: 07-14-2019, 07:42 PM
  2. North Korea 2017 onwards
    By AdamG in forum Asia-Pacific
    Replies: 158
    Last Post: 07-08-2019, 01:56 PM
  3. Cyber attacks on the USA (catch all)
    By selil in forum Media, Information & Cyber Warriors
    Replies: 119
    Last Post: 04-08-2019, 12:14 PM
  4. Sudan Watch (July 2012 onwards)
    By AdamG in forum Africa
    Replies: 23
    Last Post: 02-09-2019, 11:55 AM
  5. LG Hal Mcmaster, National Security Adviser (2017 onwards)
    By SWJ Blog in forum Politics In the Rear
    Replies: 10
    Last Post: 04-05-2018, 01:35 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •