Russian Cyber Warfare: The History of Russiaâs State-Sponsored Attacks across the World by Charles River Editors
Author:Charles River Editors
Language: eng
Format: epub
Publisher: Charles River Editors
Published: 2019-02-26T16:00:00+00:00
The Election of 2016
Before analyzing the Russian interference in the United States presidential election of 2016, it is worth assessing the precedent and possible motives that may have guided the Kremlin to conduct it. In 1996, before the majority of Russiaâs population was connected to the internet, the United States conducted low-tech version of election interference to secure the victory of the embattled incumbent, Boris Yeltsin. The initiative included on-the-ground support for the Yeltsin campaign by American-funded groups like the National Endowment for Democracy, the National Democratic Institute, and the International Republican Institute. Later, in 2006, the National Endowment for Democracy gave a $23,000 grant to an organization that employed Alexei Navalny, a future political nemesis of President Putin.[115] As late as 2016, the NED gave 108 grants totaling $6.8 million to organizations in Russia for purposes such as "engaging activistsâ and âfostering civic engagement.â[116] Thus, regardless of evidence of Russian interference, it is entirely feasible that influencing domestic American politics would have been on the Kremlin's âwish listâ for years leading up to 2016.
Russia is thought to have âhackedâ the 2016 election through two primary means: leaking confidential information that damaged the Hillary Clinton campaign and conducting an influence campaign using online news and social media platforms. According to American intelligence reports, in the months leading up to the election, Russian hackers infected more than 30 computers and stole more than 50,000 emails from the Democratic National Committee, ostensibly in an effort to sway the vote in favor of Republican candidate Donald Trump. Reports suggest that the campaign began with spear-phishing, which involved sending infected emails to targeted victims to gain access to their online accounts and computers. Russian military officers Ivan Sergeyvich Yermakov and Aleksey Viktorovich, of Russiaâs intelligence agency, the GRU, are suspected to have sent a spear phishing email to John Podesta, Hillary Clintonâs campaign chairman. The email contained a phony password reset link that allowed hackers to gain access to Podestaâs email credentials.[117] An estimated 300 other members of the Clinton campaign were targeted using the same techniques.
Then, in April 2016, using the stolen login information of a Democratic Congressional Campaign Committee employee, the hackers gained access to the organization's network and installed X-Agent malware, a backdoor toolset that allows hackers to record keystrokes, take screenshots, and exfiltrate files from infected systems back to a single command and control center. This was considered to be a âsignature toolâ of Fancy Bear.[118]
The hackers used the access they had gained to aggregate information that damaged the Clinton campaign, launching the webpage DCLeaks in June 2016 and sharing the information with platforms such as Wikileaks.[119] Leaked internal memos that illustrated the degree to which the DNC was financially dependent on the Clinton Foundation, along with other embarrassing information, prompted the resignation of Debbie Wasserman Schultz, the DNC chairwoman, on the eve of the DNCâs convention in July 2016.[120] After Trumpâs victory in November 2016, a serious investigation into the perpetrators of the hacks and whether or not they had colluded with Russian intelligence units was launched under Special Counsel Robert Mueller.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26603)
The Fifty Shades Trilogy & Grey by E L James(19087)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19070)
Shot Through the Heart by Mercy Celeste(18944)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17125)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17005)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16885)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16833)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16459)
The Subtle Art of Not Giving a F*ck by Mark Manson(14359)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14147)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13655)
Scorched Earth by Nick Kyme(12778)
Drei Generationen auf dem Jakobsweg by Stein Pia(10970)
Suna by Ziefle Pia(10894)
Scythe by Neal Shusterman(10344)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(9751)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(9737)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(9692)
