Josephine Wolff
Cybersecurity Initiative Fellow, 2016
Ever since the 2016 elections, U.S. government officials have gotten steadily bolder about divulging specific information about Russia鈥檚 attempted interference. Their hope, presumably, is to raise awareness about what was going on but also to deter any future such activity by naming and shaming the individuals and organizations involved. It鈥檚 an almost unprecedented effort to publicly reveal the machinations of a foreign government鈥檚 cyber operations鈥攆ar more detailed and more extensive than, for instance, the indictments that have been filed against Chinese intelligence officers. But as a about Russia鈥檚 latest hacking efforts makes very clear, this approach isn鈥檛 working at all.
Microsoft鈥檚 findings show Russian intelligence officers shifting their focus to encompass conservative American think tanks that have advocated for sanctions against Russia or stronger human rights protections overseas. Russian military officers apparently created phishing sites that mimicked the actual websites for groups such as the Hudson Institute and the International Republican Institute and could be used to capture credentials. What the perpetrators did with those stolen credentials remains unclear, but probably they hoped to infiltrate the internal communications and files of the people who worked for (or with) those institutions and find some way to use that information to their advantage鈥攚hether by leaking it to the public, using it for blackmail, or leveraging it to shape international negotiation strategies.
Going after think tanks is far from the scariest or most ambitious thing Russian intelligence has done in recent years. Much of the Microsoft report is pretty ho-hum, in fact. But this story is important because it demonstrates that Russian intelligence, far from being deterred by the attempts the United States has made to reveal its online operations, is instead continuing on in much the same vein as before.
That might seem like an obvious and unsurprising outcome given the U.S. government鈥檚 fairly tepid response to Russia鈥檚 involvement in the 2016 elections, but it鈥檚 actually some of the first concrete evidence we have that public naming and shaming of foreign officials is not an effective deterrence strategy when it comes to cyber-espionage.
The public naming and shaming efforts began with implicating broad groups, such as the Russian government and its intelligence arm. First, there was a released in January 2017. Next came a series of congressional hearings and a much more detailed detailing how Russians had tried to influence public opinion during the elections. That indictment named 13 Russian individuals and three Russian companies that allegedly purchased political advertisements on social media sites, helped organized political rallies, and promoted election-related hashtags in the months leading up to the 2016 U.S. elections. And then, in July, came an even more damning describing how 12 Russian intelligence officers had hacked into Hillary Clinton鈥檚 campaign, as well as the Democratic Congressional Campaign Committee and the Democratic National Committee.
Those charges are, of course, largely symbolic鈥攏o one is likely to end up in prison or even standing trial because of them鈥攂ut they seemed to represent an alternative deterrence strategy to stronger sanctions or kinetic attacks. That deterrence strategy was built on the assumption that the Russian government, or at least individuals working for it, would not want to continue their activities if they knew it would lead to a very public unmasking and criminal charges. In a world where we still don鈥檛 know very much about what does and does not work when it comes to negotiating international cyber conflicts, it was perhaps worth a try. But as this week鈥檚 news makes clear, months after those indictments were trumpeted by every major publication in the United States, Russia is pursuing its online espionage efforts more boldly and broadly than ever.
From an educational and awareness standpoint, these indictments (like the recently released Microsoft report) are still useful and informative documents that reveal a lot about how Russia鈥檚 online operations work and who is behind them. As a tool to deter similar behavior in the future, however, it鈥檚 not clear they have helped at all.
Just because naming and shaming isn鈥檛 a sufficient deterrent doesn鈥檛 mean it鈥檚 not worth doing鈥攂ut it does mean we also need to explore other options for responding to this type of activity. Congressional proposals to would be one possible way forward. Another might be responding in-kind with cyber-espionage or sabotage efforts directed at Russian targets that might lessen Putin鈥檚 enthusiasm for making every-day use of these tactics. That might mean releasing embarrassing information about the Russian government, but it could also involve going after their computer infrastructure鈥攖argeting their servers and networks in ways that might have a more lasting impact than just taking down their (easily replaceable) phishing websites one by one. In fairness, it鈥檚 not clear how effective these tactics would be either, long term. There鈥檚 still a lot we don鈥檛 know about the best ways to respond to Russia鈥檚 online activity and it鈥檚 right to be cautious moving forward and to assess the outcomes carefully鈥攂ut it鈥檚 very clear that what we鈥檙e doing now is not working, and it鈥檚 time to try something new.
This article in , a collaboration among , , and .