Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

Information Operations Spotlighted at Black Hat as Election Worries Rise

From Russia's "best-in-class" efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.



While the Russian government spends a fraction of the People's Republic of China on overt state-sponsored media properties, the covert activities targeting Western democracies and other rivals is "best-in-class," Renée DiResta, a research manager at the Stanford Internet Observatory, told attendees during an Aug. 6 keynote on information operations at virtual Black Hat USA.

Information operations — including campaigns of disinformation and propaganda — have become increasingly sophisticated, especially from the former Soviet Union, although China is learning quickly, she said. The campaigns often have a number of goals, including distracting attention from a nation's actions, persuading people to a certain point of view, dividing citizens into opposing groups, and entrenching them into hardline opinions.

"Russia is, at the moment, kind of best-in-class for information operations," she told attendees. "They have demonstrated not only a commitment to full-spectrum propaganda, but to far more sophisticated activities [from acting as] agents of influence to media manipulation and then ultimately to network infiltration as well."

As the 2020 US presidential elections approach, a variety of groups are worried about the impact the information operations are currently having on democracies across the globe, from Russian disinformation campaigns leading up to the 2016 election to China's crackdown on information on the protests in Hong Kong to Saudi Arabia's attempts to control the narrative following the assassination of author and writer Jamal Khashoggi.

By far, Russia has the most sophisticated infrastructure for using information as a weapon, DiResta said. Russia has often blended information operations with more traditional hacking, and then used the information it obtains as fodder for future operations, she said. China has traditionally focused its information operations inward, but as part of the economic giant's global push, the government has increasingly used outward-facing information operations, especially overt state-funded publications.

"China has decades of experience in both overt and covert "narrative management" — the government has prioritized it for decades, particularly inward-looking [operations]," she said. "What we are seeing now is how they are taking those inward-facing capabilities and beginning to expand outward, beginning to deploy those same tactics in areas and regions where they want to have influence outside of their borders."

Information operations surged as social media grew in popularity, until today, spreading information is cheap, editorial gatekeepers have largely been eliminated, and companies rely on algorithms to determine what information is interesting enough to spread.

"We wind up at this point with a glut of material," she said. "Algorithms surface and recommend content, rank it, and then they help amplify and disseminate it."

For information operations, however, the most important part is that the algorithms can be gamed to spread memes and disinformation. The largest social media companies — from Facebook to Twitter to YouTube — struggle to define adequate rules and acceptable content for their platforms.

On Aug. 5, for example, Google announced that YouTube had shuttered almost 2,600 YouTube channels in the second quarter as part of its efforts into coordinated information operations by China. In late July, Democrats in the United States called on the Federal Bureau of Investigations to brief lawmakers on disinformation targeting members of Congress.

Information operations tend to follow a particular pattern, DiResta said. State actors create personas, post content, initially seed that content to social networks, and then coordinate with other personas to amplify the content. Success comes when real people start to share the memes and disinformation, especially if the story gets picked up in the mainstream media, she says.

What makes Russian operations so effective is that they are profiling people based on what they are interested in and what content they share with others. The Internet Research Agency, a group funded by the Russian government to carry out disinformation campaigns, ultimately aims to turn people into part of their disinformation infrastructure, she said.

"When you follow an Internet Research Agency page, you are giving them an indication that you are sympathetic to that cause," she said. "What we saw over and over and over again were these attempts to recruit. How can they turn their audience into active participants — unwitting participants — in the operation?"

DiResta expects to see Russia-backed efforts to hack for sensitive political information that can be released, continued attempts to get information on voting machines and voting security efforts, and the infiltration of special-interest groups. Ultimately, the goal will be to undermine confidence in the election.

The United States should prioritize the fight against disinformation because the impact will last long after the election, she said, pointing to a real person's page, almost half of which were memes sent by the Internet Research Agency.

"False stories are internalized by real people, they continue to spread long after active operations have ceased," she said, adding "we can see how people are reacting to this stuff ... but it is extremely difficult to understand the impact of these efforts."

Related Content:

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.