02.12.2015 Views

Strategic Communications and Social Media in the Russia Ukraine Conflict

CyberWarinPerspective_Lange_Svetoka_12

CyberWarinPerspective_Lange_Svetoka_12

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

of social cyber attack becomes <strong>in</strong>creas<strong>in</strong>gly important as it is based on manipulated<br />

<strong>in</strong>formation be<strong>in</strong>g spread under false identities to networks of users.<br />

4 Underst<strong>and</strong><strong>in</strong>g <strong>Social</strong> Cyber Attacks<br />

A social cyber attack, as def<strong>in</strong>ed by Dr Rebecca Goolsby, <strong>in</strong>volves act<strong>in</strong>g under false<br />

pretences or anonymously, by ei<strong>the</strong>r releas<strong>in</strong>g a manipulated signal <strong>in</strong>to <strong>the</strong> social<br />

media or by manipulat<strong>in</strong>g an exist<strong>in</strong>g signal <strong>in</strong> order to achieve <strong>the</strong> desired effects:<br />

chaos, panic, mass disorders. This type of cyber attack offers a different view to <strong>the</strong><br />

traditional views on attacks <strong>in</strong> <strong>the</strong> cyber environment, as <strong>the</strong> effects of <strong>the</strong>se attacks<br />

are purely psychological.<br />

Spread<strong>in</strong>g rumours is one of <strong>the</strong> most effective tactics of <strong>the</strong> social cyber attack,<br />

as those can create fear, hate or unfounded hope <strong>in</strong> <strong>the</strong> target audience which<br />

will most likely result <strong>in</strong> real-life action:<br />

Spread<strong>in</strong>g rumours is one<br />

of <strong>the</strong> most effective tactics<br />

of social cyber attack.<br />

for example, mass protests, withdraw<strong>in</strong>g<br />

money from banks, or organised attacks on<br />

certa<strong>in</strong> groups or <strong>in</strong>dividuals whose image<br />

has been portrayed as <strong>the</strong> enemy. 4<br />

<strong>Social</strong> cyber attack can also <strong>in</strong>volve<br />

traditional hack<strong>in</strong>g if <strong>the</strong> <strong>in</strong>formation to be manipulated <strong>and</strong> released needs to be<br />

obta<strong>in</strong>ed or published this way. S<strong>in</strong>ce <strong>the</strong> concept of <strong>the</strong> social cyber attack is very<br />

new, it is often difficult to determ<strong>in</strong>e what activity should be classified as one. One<br />

might argue that <strong>the</strong> key component to social cyber attack is <strong>the</strong> narrative which<br />

drives it. The actions by <strong>the</strong> pro-<strong>Russia</strong>n ‘Cyber Berkut’ (КиберБеркут) <strong>and</strong> its<br />

nemesis, <strong>the</strong> pro-Ukra<strong>in</strong>ian ‘Cyber Hundred’ (Киберсотня) can serve as examples.<br />

Cyber Berkut is frequently <strong>in</strong> <strong>the</strong> news, propagat<strong>in</strong>g <strong>the</strong> <strong>Russia</strong>n political narrative<br />

as well as hack<strong>in</strong>g both <strong>the</strong> Ukra<strong>in</strong>ian Government <strong>and</strong> o<strong>the</strong>r countries. The<br />

group successfully attacked <strong>and</strong> defaced <strong>the</strong> websites of <strong>the</strong> North Atlantic Treaty<br />

Organisation (NATO) <strong>and</strong> <strong>the</strong> NATO Cooperative Cyber Defence Centre of Excellence<br />

(NATO CCD COE), claim<strong>in</strong>g that its activities were <strong>in</strong> retaliation for NATO<br />

support for Ukra<strong>in</strong>e. 5 However, <strong>the</strong> key to Cyber Berkut’s activities is <strong>the</strong> narrative<br />

which it uses to justify <strong>and</strong> promote its activities. Cyber Berkut claimed credit on its<br />

social network<strong>in</strong>g site VKontakte page for hack<strong>in</strong>g electronic advertis<strong>in</strong>g billboards<br />

<strong>in</strong> <strong>the</strong> centre of Kyiv prior to a Ukra<strong>in</strong>ian parliamentary election on 24 October<br />

2014, display<strong>in</strong>g videos of numerous prom<strong>in</strong>ent Ukra<strong>in</strong>ian politicians <strong>and</strong> labell<strong>in</strong>g<br />

<strong>the</strong>m war crim<strong>in</strong>als: 2<br />

[English translation] ‘We Cyber Berkut <strong>in</strong>tend to use every opportunity to<br />

defend <strong>the</strong> <strong>in</strong>terests of Ukra<strong>in</strong>ian citizens from <strong>the</strong> arbitrar<strong>in</strong>ess of nationalist<br />

4 Ibid.<br />

5 The post <strong>and</strong> video can be found here: http://vk.com/wall-67432779_14678<br />

106

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!