Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

Information Operations Spotlighted at Black Hat as Election Worries Rise

From Russia's "best-in-class" efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.

While the Russian government spends a fraction of the People's Republic of China on overt state-sponsored media properties, the covert activities targeting Western democracies and other rivals is "best-in-class," Renée DiResta, a research manager at the Stanford Internet Observatory, told attendees during an Aug. 6 keynote on information operations at virtual Black Hat USA.

Information operations — including campaigns of disinformation and propaganda — have become increasingly sophisticated, especially from the former Soviet Union, although China is learning quickly, she said. The campaigns often have a number of goals, including distracting attention from a nation's actions, persuading people to a certain point of view, dividing citizens into opposing groups, and entrenching them into hardline opinions.

"Russia is, at the moment, kind of best-in-class for information operations," she told attendees. "They have demonstrated not only a commitment to full-spectrum propaganda, but to far more sophisticated activities [from acting as] agents of influence to media manipulation and then ultimately to network infiltration as well."

As the 2020 US presidential elections approach, a variety of groups are worried about the impact the information operations are currently having on democracies across the globe, from Russian disinformation campaigns leading up to the 2016 election to China's crackdown on information on the protests in Hong Kong to Saudi Arabia's attempts to control the narrative following the assassination of author and writer Jamal Khashoggi.

By far, Russia has the most sophisticated infrastructure for using information as a weapon, DiResta said. Russia has often blended information operations with more traditional hacking, and then used the information it obtains as fodder for future operations, she said. China has traditionally focused its information operations inward, but as part of the economic giant's global push, the government has increasingly used outward-facing information operations, especially overt state-funded publications.

"China has decades of experience in both overt and covert "narrative management" — the government has prioritized it for decades, particularly inward-looking [operations]," she said. "What we are seeing now is how they are taking those inward-facing capabilities and beginning to expand outward, beginning to deploy those same tactics in areas and regions where they want to have influence outside of their borders."

Information operations surged as social media grew in popularity, until today, spreading information is cheap, editorial gatekeepers have largely been eliminated, and companies rely on algorithms to determine what information is interesting enough to spread.

"We wind up at this point with a glut of material," she said. "Algorithms surface and recommend content, rank it, and then they help amplify and disseminate it."

For information operations, however, the most important part is that the algorithms can be gamed to spread memes and disinformation. The largest social media companies — from Facebook to Twitter to YouTube — struggle to define adequate rules and acceptable content for their platforms.

On Aug. 5, for example, Google announced that YouTube had shuttered almost 2,600 YouTube channels in the second quarter as part of its efforts into coordinated information operations by China. In late July, Democrats in the United States called on the Federal Bureau of Investigations to brief lawmakers on disinformation targeting members of Congress.

Information operations tend to follow a particular pattern, DiResta said. State actors create personas, post content, initially seed that content to social networks, and then coordinate with other personas to amplify the content. Success comes when real people start to share the memes and disinformation, especially if the story gets picked up in the mainstream media, she says.

What makes Russian operations so effective is that they are profiling people based on what they are interested in and what content they share with others. The Internet Research Agency, a group funded by the Russian government to carry out disinformation campaigns, ultimately aims to turn people into part of their disinformation infrastructure, she said.

"When you follow an Internet Research Agency page, you are giving them an indication that you are sympathetic to that cause," she said. "What we saw over and over and over again were these attempts to recruit. How can they turn their audience into active participants — unwitting participants — in the operation?"

DiResta expects to see Russia-backed efforts to hack for sensitive political information that can be released, continued attempts to get information on voting machines and voting security efforts, and the infiltration of special-interest groups. Ultimately, the goal will be to undermine confidence in the election.

The United States should prioritize the fight against disinformation because the impact will last long after the election, she said, pointing to a real person's page, almost half of which were memes sent by the Internet Research Agency.

"False stories are internalized by real people, they continue to spread long after active operations have ceased," she said, adding "we can see how people are reacting to this stuff ... but it is extremely difficult to understand the impact of these efforts."

Related Content:

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Google Cloud Debuts Threat-Detection Service
Robert Lemos, Contributing Writer,  9/23/2020
Shopify's Employee Data Theft Underscores Risk of Rogue Insiders
Kelly Sheridan, Staff Editor, Dark Reading,  9/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26120
PUBLISHED: 2020-09-27
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even witho...
CVE-2020-26121
PUBLISHED: 2020-09-27
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an uploa...
CVE-2020-25812
PUBLISHED: 2020-09-27
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
CVE-2020-25813
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
CVE-2020-25814
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> ...