Security

When it comes to hacking societies, Russia remains the master at sowing discord and disinformation online

China can't hold a candle to GRU's shenanigans, says expert

52 Got Tips?

Black Hat While China is the bête noire du jour of the US government, Russia is the master of spreading disinformation, fostering conflict, and derailing discourse online, the Black Hat security conference was told today.

At her Thursday keynote, Stanford Internet Observatory's research manager Renee DiResta explained how Russian military intelligence – the GRU – and the private Internet Research Agency (IRA) were putting the likes of China to shame. Security companies and government agencies have good reason to move their focus from Beijing to Moscow, she warned.

The basic methods of hacking public opinion are fairly simple, DiResta explained. Fake accounts generate content and spam it out on social media to amplify the message. If enough real people pick up and the posts go viral the mainstream media kicks in and amplifies the desired message still further.

In Russia's case, it spreads divisive material, stolen information, and fake news in an attempt to turn Americans against each other, sour civil society, sow doubt, and create distractions, leaving people unsure of what's really going on. This worked. In China's case, it tried to make people like China. This didn't work.

Middle Kingdom middling

DiResta says that, despite having gobs of cash and manpower at their disposal, efforts by China to sway public opinion in its favor weren't very effective. She pointed to the Communist Party's failed effort earlier this year to play up Middle Kingdom's handling of the coronavirus outbreak, a campaign that barely made a blip on social media channels.

"They really didn't do a very good job at getting people to pick up their content and amplify it," DiResta explained. "These are barely agents of influence, this is shockingly poor."

China slams President Trump's TikTok banned-or-be-bought plan in the US

READ MORE

In terms of influence, DiResta likens Chinese Communist Party campaigns to those of Saudi Arabia in the wake of the Jamal Khashoggi killings; fairly basic, heavy-handed stuff that didn't do much to swing public opinion. The tightly controlled media in China simply does not have enough impact on people outside of the Great Firewall, she said.

By contrast, Russia's GRU and IRA are able to sway public opinion thanks to not only being better at spreading clickbait through its networks of sockpuppets, but also having a much simpler objective. While China was trying to polish up its national image on the world stage and push political points, Russia simply wants to divide people along existing social fissures, so they only have to reaffirm what their targets already believe.

"Russians are not trying to tell a story," explains DiResta, "They are simply dividing the population of the adversary."

In a way, this should come as no surprise: in the Soviet Union era, dezinformatsiya was a program implemented by Stalin in 1923 to confuse and befuddle his opponents.

Hacking support

Russian disinformation efforts are also aided by the Kremlin's hackers.

DiResta noted how everyone, from Russian "patriot" trolls to IRA operations and even state media, were fed information that Moscow's miscreants stole from governments and companies in other countries. The swiped info is a particularly effective bait for social media shares, news articles, and broadcast packages, allowing the Kremlin to shift conversations toward the topics it wants people talking about.

"If you can turn people into unwitting content amplifiers, or people who will go out in the streets, that is a very powerful tool," said DiResta. "That is the kind of thing that is happening behind the scenes."

For Americans, this means that we should be spending less time worrying about China's influence operations and more time thwarting Russian efforts to divide the US population and cause chaos, she explained. While Chinese intelligence operations are nothing to sniff at, we are probably doing more harm than good by devoting so much news coverage to Beijing's operations.

"China is a well-resourced state advisory, it has developed significant capabilities," said DiResta. "They are modernizing tactics they have used for decades, but we should not overstate the impact of the efforts. That kind of breathless pumping up in some ways helps the adversary."

Twitter is trying

DiResta had barely finished her keynote when Twitter announced it is identifying accounts of government officials and state-backed media on its platform in the name of transparency.

"Labels will only be applied to accounts from the countries represented in the five permanent members of the UN Security Council: China, France, Russian Federation, the United Kingdom, and the United States," Twitter said in a blog post.

"We believe this is an important step so that when people see an account discussing geopolitical issues from another country, they have context on its national affiliation and are better informed about who they represent."

Interestingly, Twitter said the application of a "state-affiliated media" badge comes whenever "outlets where the state exercises control over editorial content through financial resources, direct or indirect political pressures, and/or control over production and distribution." That means RT gets the label while Blighty's BBC, Canada's CBC, and – strangely enough – the US government's Voice of America doesn't. ®

Sign up to our NewsletterGet IT in your inbox daily

52 Comments

Keep Reading

Oracle Zooms past rivals to run TikTok’s cloud, take stake alongside WalMart and ByteDance investors

Deal dilutes Chinese stake enough for Trump to tentatively approve

ByteDance says it will abide by China's new export laws

TikTok TikTok … the sound of a sale slipping away?

Sueball claims Tesla solar panels are so effective, they started fires at Walmart stores

Supermarket biz wants them torn out at Musk firm's expense

You're not fooling anyone on that vid-conference call: Walmart says shirt sales soaring, pants not pulled up

Oh no, we've been rumbled

Have no idea WTF is going on with the Oracle-Walmart TikTok deal? Don’t sweat it, here’s our latest rundown

Analysis TL;DR: Trump is confusing everything to stay in the spotlight

China takes TikTok-WeChat ding-dong to World Trade Organization, accuses US, India of breaking global rules

One person still believes forced sale is a good idea. Hint: He’s in hospital

Frozen: Bank accounts of suspected Chinese Cisco counterfeiters who exploited pandemic shortages

Cali federal judge admits he can only do so much against businesses based in Middle Kingdom

We need to talk about criminal hackers using Cobalt Strike, says Cisco Talos

Pentesting tool showing up in the hands of baddies, warns threat intel biz

Where China leads, Iran follows: US warns of 'contract' hackers exploiting Citrix, Pulse Secure and F5 VPNs

Please just patch your infrastructure, begs US-CISA

As China trials its Digital Yuan with a giveaway, seven big central banks outline response

Bank of England and US Reserve among those pondering own digital dollars

Tech Resources

Webcast Slide Deck | Three reasons you need a hybrid multicloud

Businesses need their IT teams to operate applications and data in a hybrid environment spanning on-premises private and public clouds. But this poses many challenges, such as managing complex networking, re-architecting applications for the cloud, and managing multiple infrastructure silos. There is a pressing need for a single platform that addresses these challenges - a hybrid multicloud built for the digital innovation era. Just this Regcast to find out: Why hybrid multicloud is the ideal path to accelerate cloud migration.

Has Recent Rapid Cloud Adoption Increased Your Threat Risk?

It’s time to embrace cloud capabilities that can help businesses address speed to market through agility, lower TCO and an increased security posture.

IBM and Nvidia® Solutions Power Insights with the New AI

IBM is well-positioned to help organizations incorporate high-performance solutions for AI into the enterprise landscape.

Breach and Attack Simulation For Dummies

This ebook covers attacks on your network. But not the ones you expect — these are actually coming from you.