Russian journalists Andrei Soldatov and
Irina Borogan wrote their first book, The
New Nobility: The Restoration of Russia's Security State and the Enduring
Legacy of the KGB, in 2010. It was
about the rise of the FSB in the era of Vladimir Putin from the ashes of what
was once the KGB. Five years later, they
wrote second book, The Red Web: The
Struggle Between Russia’s Digital Dictators and the New Online Revolutionaries. This book could easily have been titled The Russian Surveillance State: How Old
Habits Die Hard from Soviet Times to the Present. One would suspect from the title this book
concentrates on just the Internet in post-Soviet Russia, but this book is much
more. Soldatov and Borogan document in
great detail the breadth of the old Soviet KGB technical surveillance
apparatus, how and where it began, and how techniques and equipment have
adapted to the Internet age.
The story begins in a residential district
in southwest Moscow, wherein lies a nineteen-story gray-and-white building known
as Phone Station M9. Half of Russia’s Internet
traffic passes through this building.
The building has another occupant on its eighth floor – the FSB. The FSB is the successor organization to the
Soviet Committee for State Security – the KGB.
Throughout the building are little boxes marked SORM [which is an
acronym for the Russian words for “operative search measures”]. These are the devices which the FSB uses to
monitor Russian web traffic. First
invented by the KGB to monitor telephone calls, these SORM boxes monitor
e-mails, Internet usage, Skype, cell phone calls, text messages and social
networks [Twitter, Facebook, etc.]. It
is with these SORM boxes the Putin regime monitors political opposition. In 1991 Russia inherited a dysfunctional and
broken communications system with barely a connection abroad, and today the Pew
Research Center approximates that 73 percent of those questioned in Russia said
they had online access, compared to 63 percent for China and 87 percent in the
United States. In a country of over 200
million people, that’s a lot of Internet traffic to monitor.
“Prison
of information.” Soldatov and Borogan describe the old
Soviet Union as a “prison of information”.
They describe the infrastructure that was put in place by the Soviet
security apparatus to build this “prison of information”.
-
Marfino [located northeast of Moscow] stood a
building that was once a seminary.
During Stalin's time, this former seminary was transformed into a Soviet
secret research facility. Their mission
was to create a secure telephone system for Stalin. In 1952, while working at Marfino, Vladimir
Fridkin made the Soviet Union's first working copy machine. Three years later, the KGB smashed Fridkin’s copy
machine to bits in order to prevent the copying of "prohibited
materials". Such was the paranoia
of the Communist Party that they had to maintain a stranglehold on information.
-
Kuchino.
In December 1953, eighteen prisoners were transferred from Marfino to
Kuchino, another security service compound twelve miles east of Moscow. It
became the KGB’s main research center for surveillance technologies, including
the all-pervasive Soviet system of phone tapping and communications
interception. They also figured out how to intercept a human voice from the
vibrations of a window. Kuchino was the main research facility for Stalin’s
secret services in the area of special, or “operative,” equipment—ranging from
weapons to radio sets to, most importantly, listening devices. The engineers employed therein, and at the
Scientific Research Institute of Dalny Svyazi in Leningrad, conducted much
research in the field of speech recognition.
-
The Computation Center of the Academy of Sciences on Vavilova Street in Moscow applied computers to the speech
recognition work. This evolved into a
private company called the Speech Technology Center in 1993. With generous funding from the FSB, this
company created technology that could to store many millions of items of
biometric data, such as voice samples and photo images, and match them to
individuals by searching the world’s communication channels, including video
files. The voice recognition technology can identify the speaker, regardless of
language, accent, or dialect, based on physical characteristics of the voice.
-
Kurchatov Institute [which included the
Computation Center] held a prestigious status in the Soviet Union. Much of the work to get the Soviet atom bomb
was done here. Additionally, it worked
on other crucial defense projects, to include laser weapons and development of
Soviet submarines. The Soviet Internet was born here. It was here the Soviets made their first
connection to the Internet. Alexey Saldatov, the father of one of this book’s
co-authors, was a key player in making the Soviet Internet a reality. The elder Soldatov was the head of the
Computation Center. He had done an internship
at the Niels Bohr Institute in Copenhagen. During his time there, he knew of
computer scientists that created a network that connected computers. He had a team of computer programmers that
adapted a bootleg copy of Unix [and called it Demos] to the Soviet’s first
supercomputer with a Soviet-made copy of an IBM mainframe. They created a local area network at Kurchatov. Once they did that, they expanded to a larger
network that connected Kurchatov and the Institute of Informatics and
Automation in Leningrad, 460 miles away. After that, connections were
established with research centers in Dubna, Serpukhov, and Novosibirsk. The
network used ordinary telephone lines.
Almost a year after that first global
Internet connection was made, the abortive Communist coup against Mikhail
Gorbachev took place. The Internet
connection to cities outside of Moscow and beyond the borders of the Soviet
Union proved extremely important because the coup plotters neglected to take
down the computer network. Large amounts
of uncensored information flowed in and out of Moscow, and the coup plotters
unknowingly helped the other side by demonstrating an old way of thinking, to
control radio and TV. The KGB didn’t
think to censor the nascent computer network – it never occurred to them, and
at this time this was a network they couldn’t control. This is ironic because the much of the money
that made the Soviet Internet a reality came from the KGB. The ‘net’ didn’t foil the coup attempt all by
itself, but it was an important new tool in the toolbox against oppression.
Russian
Internet tools.
The Russian security services have quite a few tools in their Internet
suppression toolkit. Among these tools
are:
-
A nationwide system of online
filtering and censorship was put in place by 2012 and has since been
refined. Internet filtering in Russia is
unsophisticated; thousands of sites were blocked/blacklisted by mistake, and
users could easily find ways to make an end-run around it. At the same time,
very few people in Russia were actually sent to jail for posting criticism of
the government online.
-
Distributed denial of service
(DDOS) attacks by “hacker patriots” - when an attacker uses a multitude of
infected computers to access a website at the same time, and the site often
crashes as a result
-
Pro-Kremlin hacktivists and trolls
were hired to attack and harass liberals online
-
SORM devices – the little black
boxes control information online and obstruct a free press and political
opponents. first versions intercepted and
recorded phone calls for the Soviet Union, but now Internet service providers
(ISPs) install the latest generations of SORM onto Internet lines so that the
FSB can intercept content (not just metadata) from email, internet traffic,
mobile calls and voice-over internet such as Skype. All Russian operators and ISPs were required
to install the black boxes, about the size of an old video tape recorder, which
would fit on a rack of equipment, and permit connection to the regional
departments of the FSB.
-
Kompromat - compromising material released to
the public to blackmail activists, embarrass opponents & business rivals,
influence elections, and create confusion.
Kompromat used against journalists and others most likely came from
content that SORM intercepted.
-
Coercion - The main subjects of
Soldatov and Borogan’s book, online service providers including ISPs, media
outlets, aggregators, mail services and social networks, are constantly angling
for a position from which it is safe to conduct business. They are Putin’s
willing executioners. They are told that
if they don’t provide the access to communications that the FSB desires, they
won’t have the ability to do business in Russia. The threat of being dragged into criminal
proceedings – or, indeed, of losing one’s business – serves to activate what is
perhaps the most commonplace survival mechanism in today’s Russia:
self-censorship.
-
Blogger Law – There are many
popular blogs in Russia, and is one of the few areas in cyberspace where lively
and relatively free political debates take place. This was a rewrite of anti-terrorist statutes
that required blogs with 3,000 or more followers to register with the
government. This registration gave
security services a way to track bloggers, intimidate them, or close them
down.
Face
recognition software – The Russians, through a company
called Ladakom-Service, have developed facial recognition software, and have
been using it wherever there are gatherings of large numbers of people, whether
they are sporting events or at the Russian subways. At the entrance to sporting events,
spectators go through metal detectors, ostensibly in efforts to find
weapons. While the spectators are
patted down by security, their pictures are taken. The cameras rapidly capture each face into a
green digital frame and then identify different characteristics of the face,
including such distinctive features as distance between the eyes. A computer
connected to the camera then evaluated each person based on a complex
algorithm, and within seconds the person’s name was established and they were
given a unique number. Near the metal detectors sits an operator with a
laptop. He monitors every face closely.
One window on his screen shows the live camera acquiring the face images,
another part of the screen shows the captured images, and a program was
constantly running to match the captured images with people in a government
passport database, one of the biggest in the country. When the match was
successful, a photograph just taken appeared along the bottom of the screen
with the person’s full identity. The
same company in 2011 had installed this technology in the entrance hall of one
of the busiest metro stations in the city. As people stepped on the subway
escalator, their faces entered a frame and were captured by video cameras. The
images are rapidly linked to their identity in security service databases.
There was no notification to anyone that they were being recorded. The system
is so advanced that a scan of 10 million images would take no more than seven
seconds. The facial images and video are sent to the Metro system’s situation
room, the Interior and Emergencies Ministries, and to the FSB.
Putin’s
“Willing Executioners”. The authors point out that engineers in Soviet
Union [and today’s Russia] are not trained in ethics like medical doctors
are. They were taught to be servants of the
state. These engineers were focused on
the technical needs of the Soviet Union, and they did not [and still do not]
question the uses of their technical creations in service to the state. These people are much more comfortable being
told what to do without question – they have a much better understanding of the
mechanical world than “the often-unruly reality of freedom”. They have little or no understanding of
politics. The authors questioned one
such engineer named Sergei Koval. When
questioned about what he thought about regimes around the world using his
technology to suppress dissent. His
reply - “All this talk about technology
catching dissidents is just bullshit.
It’s typical of the kind of psychological warfare the Americans use
against their opponents. I think all these arguments about human rights are
completely hypocritical. We just come up with the hardware. It’s just technology that is
developed with law enforcement in mind. Sure, you can use it against the good
guys just as easily as you can use it against the bad guys. One way or another,
these governments will be able to use surveillance technology, whether we
supply it or not.… If governments listen in on people’s conversations, it’s not
the microphone’s fault!”
Who
are the “hacker patriots” and Putin’s on-line trolls? During the 2000s the Kremlin had created
large pro-Kremlin youth organizations, which mostly consisted of youth
recruited in Russia’s regions. Two of the most important organizations were
Nashi (“Ours”), the oldest movement, built up under direct guidance of Surkov,
and Molodaya Gvardiya (“Young Guard”), the youth wing of the pro-Kremlin
political party United Russia. These
people aren’t government employees, hence the Kremlin’s ability to maintain the
façade of “plausible deniability” whenever they are accused of stirring up
trouble. A Ukrainian hacktivist group
named CyberBerkut, which consisted of supporters of the country’s former
president Viktor Yanukovych, who had fled to Russia after the Maidan forced him
from office, claimed to have hacked the email accounts of Ukrainian NGOs. They “obtained” emails from Ukrainian NGOs to
“prove” that the targeted NGOs were not only in touch with the US Embassy but
also received funding from American foundations.
“Digital
Sovereignty”.
In the aftermath of Edward Snowden’s disclosures about the practices at
NSA, an idea sprang from the Russian State Duma. The idea was that meant Russian citizens
should be forbidden from keeping their personal data on foreign servers. The pretext of this “fear” of the surrender
of Russian citizens’ data to American intelligence agencies. In order to keep that from happening, the
Kremlin wanted Facebook, Google’s services, Twitter, Gmail, and YouTube to have
their computer servers on Russian soil.
What this really means is that once the servers of these social media
are on Russian soil, the Russian security services can put in their own
internet controls. They wanted the SORM
boxes installed on these social media services.
Since 2011 the FSB complained they had no way to chat messages and
emails on Facebook and Gmail. “Digital
sovereignty” was their ticket to access.
According to the authors, the Russian government announced in March 2015
that Google had indeed located servers in Moscow.
The
Panama Papers.
In 2016 the Organized Crime and Corruption Reporting Project (OCCRP),
which consists of reporters based all over Europe and the former Soviet Union,
from Azerbaijan to Romania to Ukraine to Russia, had gotten their hands on an
extensive trove of documents detailing offshore Panamanian companies that
government officials and oligarchs all over the world—Russians included—used
for illegal purposes, including fraud, tax evasion, and evading international
sanctions. The Russian journalists
identified multi-million-dollar accounts owned by Sergei Roldugin, a personal
friend of Vladimir Putin. Putin saw the
publication of the Panama Papers as a personal attack on him funded by the United
States Agency for International Development [USAID]. The Russians, especially Vladimir Putin,
thinks of USAID as a CIA front organization that plots to undermine the Putin
regime. WikiLeaks claimed the OCCRP
targets Russia and other former Soviet countries and is paid by USAID and
George Soros.
The Bolotnaya
protests. In
2008, Vladimir Putin was constitutionally ineligible to serve a third
consecutive term as Russian president.
Putin sidestepped this constitutional inconvenience by having Dmitri
Medvedev [Russia First Deputy Prime Minister] run in his place. Medvedev appointed Putin as Prime
Minister. Medvedev was/is Putin’s
puppet. In September 2011, Medvedev
announced he wouldn’t run for re-election and endorsed Putin as his
successor. Many people in Russia were
disappointed at this turn of events.
There wasn’t great love for Medvedev since he was part of Putin’s United
Russia machine. The disappointment came
in that this decision [“the castling”] was made by two men behind closed
doors. The Russian electorate wouldn’t
get the chance to make a decision between Putin or Medvedev. These people saw this development as a lost
chance for thaw, liberalization, or democratization, modernization.
Parliamentary elections took place in
December 2011. An organization named
Golos is the only independent election watchdog organization in Russia, and
Golos uncovered voting fraud in the parliamentary elections. The method exposed is known as “carousel
voting”. Voters of United Russia [Putin’s
political party] would go from polling station to polling station and stuff
ballot boxes. These people were given
false identity papers so they could vote at different polling places, and they
had ballots marked for United Russia. In
different parts of the country, election observers reported results that
exceeded 100 percent. The same people who were angered by Medvedev being dumped
were further angered by the exposed vote fraud.
On December 10, fifty thousand protesters against election fraud
gathered on Bolotnaya Island in Moscow.
The protests were mobilized by Twitter and Facebook, technology made in
the West. It was a nightmare for
Vladimir Putin. In his worldview,
everything is vertical – organized from the top down. There’s always [in his view] a “boss” to
reach out and crush when things become inconvenient. But these protests were united by horizontal
methods [think “whack-a-mole”]. Putin
can whack a lot of moles, but he can’t get them all.
The
2016 Election.
Putin believed Hillary Clinton had been a driving force behind the
Bolotnaya protests in December 2011. He also believed that she and her people
at the US State Department were behind most of the Western anti-Russian
moves—from the US sanctions, to the activities of the Russian opposition, to
journalistic investigations exposing corruption in Russia [specifically the
Panama Papers]. The authors listed instances
where Russia used cyber warfare against in-country dissidents, Kremlin
“enemies” in former Soviet states, and other countries they see as opposed to
Russian interests [France, Germany]. The
authors see the Russian meddling in the 2016 as “our turn” to get a taste of
Russian statecraft. Unlike the Chinese
[whose government directly supervises cyberattacks], the Kremlin uses all kinds
of informal actors for plausible deniability - from patriotic hackers, to
Kremlin-funded youth movement activists, to employees of cybersecurity
companies forced into cooperation by government officials. The authors briefly discuss the actions of
Cozy Bear and Fancy Bear, and the havoc these groups created inside the
Democratic National Committee.
Disruptive
tactics.
-
The use of rank-and-file
hacktivists not directly connected to the state in order to help the Kremlin
maintain plausible deniability;
-
Guidance and protection from
criminal prosecution, provided by the president’s administration alongside the
secret services;
-
Hacked information was published
as kompromat (i.e., compromising
materials) online as a way of smearing an opponent.
One has to listen to Putin’s words [and
those of his spokesman Dmitry Peskov] very carefully, because they are very
adept at parsing words. When they emphasize that no Russian government bodies were involved in
hacktivist activities, they have some plausible deniability. The Russian government isn’t directly involved in these
activities. The Russian government
outsources these activities to informal actors—hackers’ groups and
companies. One thing the Russians didn’t
count on was that in May 2016, that the cyber expert community is now able to
deduce the sources of cyberattacks, including those made by Russia. If an
attack could be attributed to a hacking group with a known history of attacking
similar targets and this group’s attacks consistently worked to benefit one
particular country, cyberattack investigators put two and two together and make
a conclusion. After the Russians were
expelled from the DNC computers, they went on to the next step – kompromat. They released the Democrats’ dirty laundry,
as provided to them by WikiLeaks. The
“laundry” that was released is documented here, as it was in newspapers across
this country.
Why
did WikiLeaks side with the Russians? The arrangement was mutually beneficial. In return for WikiLeaks doing the Russians’
dirty work in digging up dirt on the Democrats and helping disrupt the 2016
campaign, the Russians allowed WikiLeaks to re-locate their servers to
Russia. Perhaps this was WikiLeaks way
of protecting their own operations from Western
snooping-interference-penetration [pick your favorite verb, it’ll fit].
Putin’s
Gift. Vladimir
Putin’s gift to the US was cynicism. He
grew up in the Soviet era where officials never trusted the people. People are unreliable who need to be managed
and controlled. Putin and those like him
think that people can’t come together voluntarily to do something for the
common good. People who try to do
something not directed by the government – his
government - are corrupted by either
foreign governments wishing to do Russia harm, or are corrupted by corporations
[greed]. Nobody is to be trusted. Large sections of America distrust government
and the media, and the Russians exploited the distrust. Russian trolls on Facebook, Twitter and
YouTube spread conspiracy theories about Hillary Clinton. Despite the Russian efforts against Clinton
[and all the dirt they found], the authors characterized the election thusly:
“The
Russian hackers did not compromise polling stations, nor did they affect the
critical infrastructure of the United States during the presidential campaign.
Donald Trump found himself in the White House for a number of very serious
reasons, most of them originating in the United States, not from abroad.”
While the US electoral infrastructure was
not compromised, what was compromised was trust – trust in media, trust in
politicians [which wasn’t high to begin with].
The Russians exploited weaknesses in the American system that were
already there. In an article published
last week on the website Project Syndicate, former CIA analyst Kent Harrington
wrote that Russia was able to “stoke discord along economic, racial, and
political lines” by inundating Google and Facebook with automated messages from
tens of thousands of user accounts. And
Harrington also attributes the gullibility of the American body politic to
civic illiteracy. The hacker patriots
and Putin’s online trolls described by Soldatov and Borogan created English-language sites and Facebook pages that closely mimicked
those created by U.S. political activists. Harrington attributes the lack of civics education
in American schools to a decline in the public’s understanding of issues and the
political process, and made them susceptible to disinformation, what is
now referred to as “fake news”.
In
the authors’ view, though, not all hope is lost. The Russians have many technical means at
their disposal to control political thought.
Putin’s people can coerce their opponents, jail them, smear them, harass
them, monitor them, and sometimes kill them. But Putin’s worldview of a vertical power
structure inhibits his regime’s ability to control the Internet in Russia
because Internet content isn’t generated by the owners of websites and social
media. Internet content is generated by
the users, and anyone with a laptop or a cellphone can participate. As much as he would like it to be so,
Vladimir Putin can’t be everywhere. He
would have to control the mind of every single Internet user, which is not
possible. As a final example of Putin’s inability
to control information, the authors cite the “little green men” in
Ukraine. Russian conscript soldiers
serving in Ukraine are doing more damage than Western media in exposing Putin’s
lies about Russian meddling in Ukraine.
These soldiers are doing so by merely posting images they themselves
took in Ukraine. The Internet enabled
these soldiers to do so. If Putin can’t
control his own soldiers, who can he control?
No comments:
Post a Comment