As #MuellerDay rages on with the @HouseIntel hearing this afternoon, let's remember that beyond partisan positions at play is a real threat to our democracy and to democracies worldwide that the #MuellerReport detailed.
For tech & democracy followers, three things to recall that the #MuellerReport confirmed about illegal activities by the Russian government around 2016: 1) It featured sophisticated cybercrimes 2) They used cryptocurrency to hide identities 3) They targeted specific groups online
1) It was a sophisticated hacking operation that exploited cyber vulnerabilities built into our systems and against which campaigns have a uniquely challenging time defending.
Volume 1 of the report details how the GRU conducted a "large-scale spearfishing campaign" to access troves of campaign and personal data. How did this work?
For the non-cyber-geeks, spear-fishing is sending e-mails to *targeted* individuals getting you to click on a link or open an attachment that installs malware on your computer. They spoofed google.com domain names to make them look realistic.
With access to Clinton Campaign, @DNC, and @dccc systems, they used custom-built malware, developed by Military Unit 26165 to "log keystrokes, take screenshots, and gather other data about the infected computers (e.g., file directories, operating systems)." (Vol. 1, p.38)
Then, another piece of custom malware (known as "X-Tunnel") installed through the spear-fishing opened an encrypted "tunnel" from DCCC and DNC networks to GRU-controlled computers to exfiltrate all the data.
These were sophisticated actors of the Russian military up against the minimal cyber defenses of campaigns and political parties. We're in an era of information warfare, and influencing the info space is right from the Russian playbook throughout Europe. (See Crimea).
2) The Russian military used the cryptocurrency bitcoin to "purchase computer infrastructure used in hacking operations." (p. 37). They even "mined" bitcoins themselves for the very purpose, stored them on an exchange platform CEX.io, & disguised purchases.
3) The Russian military targeted specific groups based on information available on tech platforms--in an era of burgeoning data, the info available on all of us poses an increasing influence and info warfare threat.
There is work (and a lot of it!) remaining to counter authoritarian influence in our institutions and society and shore up resilience in the information warfare age. I hope members of Congress on both sides of the aisle take up this threat seriously.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Heading into the midterms, nearly 30 percent of major-party candidates in Senate races and 1/5 in House races now have #TikTok accounts. Natsec concerns remain.
I told @Cat_Zakrzewski,“It’s very clear that TikTok is not ready for the onslaught of political content...And there’s a question whether TikTok — being owned by a Chinese company — can ever really be ready for handling U.S. political content responsibly.” washingtonpost.com/technology/202…
National security concerns around data security on #TikTok and the enormous surface area for Chinese censorship/propaganda remain unresolved.
But that hasn't stopped US politicians from experimenting with the platform to reach its expansive base of young voters.
US candidate @DoreenBogdan is running on a platform of a “Trusted, Connected Digital Future” against Russia’s Rashid Ismailov, a former Telecom Minister and Huawei VP who is likely to support the emerging autocratic view of the future internet.
The @ITU is the world’s oldest UN agency (formerly the International Telegraph Union) and is a technical standards body where engineers and tech companies—but also governments—convene and vote on the protocols for emerging technologies from #6G to #AI. securingdemocracy.gmfus.org/introductory-v…
The Biden admin and #TikTok have drafted a preliminary agreement to resolve national security concerns but face hurdles over the terms, as the platform negotiates to keep operating in the United States without major changes to its ownership structure. nytimes.com/2022/09/26/tec…
I've written previously about what the threats of #TikTok are to democratic societies for @SecureDemocracy.
There are two main ones:
1⃣ Data exfiltration
2⃣ Information manipulation
And for @lawfareblog on what the US and its democratic partners -- many of whom like Australia🇦🇺 have raised and continue to raise similar concerns -- should be doing. lawfareblog.com/way-forward-us…
To outcompete autocrats, democracies need affirmative strategies & a positive vision for emerging technology.
Over the last 10 months ASD partnered w/@ISDglobal@Demos@SNFAgoraJHU on *The Good Web Project* to articulate a vision for an Internet compatible w/liberal democracy.🧵
Democratic tech cooperation is on the rise, from the Quad 🇦🇺🇮🇳🇯🇵🇺🇸Critical & Emerging Tech Working Group, to the proposed EU-US Trade & Tech Council.🇪🇺🇺🇸
But while there is a growing consensus among developed democracies on what they are pushing against, there is considerably less understanding of what they are striving for.
And wide-ranging differences across the democratic spectrum on technology issues complicate coherence.
It remains to be seen how much the platform will reconstitute itself, but the foreign influence implications of a Russia-based host of Americans’ speech are deeply troubling.
According to @AdamSculthorpe, the Parler website domain is registered with Epik, which services Gab, InfoWars, and The Daily Stormer. Extremist sites connect beyond the surface layer of the internet.
As @washingtonpost writes, "The report from the Alliance for Securing Democracy at the German Marshall Fund lays out steps U.S. officials need to take to compete with China in the race for emerging technologies" @Joseph_Marks_@TonyaJoRiley
Democracies and autocracies are engaged in a contest for the soul of the Internet.
Just as our current Internet of mobile apps was a step change from the world of dial-up, the "Future Internet" will have just as significant impacts on our information environment & our democracy.