Strategic Communications and Social Media in the Russia Ukraine Conflict
CyberWarinPerspective_Lange_Svetoka_12
CyberWarinPerspective_Lange_Svetoka_12
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
of social cyber attack becomes <strong>in</strong>creas<strong>in</strong>gly important as it is based on manipulated<br />
<strong>in</strong>formation be<strong>in</strong>g spread under false identities to networks of users.<br />
4 Underst<strong>and</strong><strong>in</strong>g <strong>Social</strong> Cyber Attacks<br />
A social cyber attack, as def<strong>in</strong>ed by Dr Rebecca Goolsby, <strong>in</strong>volves act<strong>in</strong>g under false<br />
pretences or anonymously, by ei<strong>the</strong>r releas<strong>in</strong>g a manipulated signal <strong>in</strong>to <strong>the</strong> social<br />
media or by manipulat<strong>in</strong>g an exist<strong>in</strong>g signal <strong>in</strong> order to achieve <strong>the</strong> desired effects:<br />
chaos, panic, mass disorders. This type of cyber attack offers a different view to <strong>the</strong><br />
traditional views on attacks <strong>in</strong> <strong>the</strong> cyber environment, as <strong>the</strong> effects of <strong>the</strong>se attacks<br />
are purely psychological.<br />
Spread<strong>in</strong>g rumours is one of <strong>the</strong> most effective tactics of <strong>the</strong> social cyber attack,<br />
as those can create fear, hate or unfounded hope <strong>in</strong> <strong>the</strong> target audience which<br />
will most likely result <strong>in</strong> real-life action:<br />
Spread<strong>in</strong>g rumours is one<br />
of <strong>the</strong> most effective tactics<br />
of social cyber attack.<br />
for example, mass protests, withdraw<strong>in</strong>g<br />
money from banks, or organised attacks on<br />
certa<strong>in</strong> groups or <strong>in</strong>dividuals whose image<br />
has been portrayed as <strong>the</strong> enemy. 4<br />
<strong>Social</strong> cyber attack can also <strong>in</strong>volve<br />
traditional hack<strong>in</strong>g if <strong>the</strong> <strong>in</strong>formation to be manipulated <strong>and</strong> released needs to be<br />
obta<strong>in</strong>ed or published this way. S<strong>in</strong>ce <strong>the</strong> concept of <strong>the</strong> social cyber attack is very<br />
new, it is often difficult to determ<strong>in</strong>e what activity should be classified as one. One<br />
might argue that <strong>the</strong> key component to social cyber attack is <strong>the</strong> narrative which<br />
drives it. The actions by <strong>the</strong> pro-<strong>Russia</strong>n ‘Cyber Berkut’ (КиберБеркут) <strong>and</strong> its<br />
nemesis, <strong>the</strong> pro-Ukra<strong>in</strong>ian ‘Cyber Hundred’ (Киберсотня) can serve as examples.<br />
Cyber Berkut is frequently <strong>in</strong> <strong>the</strong> news, propagat<strong>in</strong>g <strong>the</strong> <strong>Russia</strong>n political narrative<br />
as well as hack<strong>in</strong>g both <strong>the</strong> Ukra<strong>in</strong>ian Government <strong>and</strong> o<strong>the</strong>r countries. The<br />
group successfully attacked <strong>and</strong> defaced <strong>the</strong> websites of <strong>the</strong> North Atlantic Treaty<br />
Organisation (NATO) <strong>and</strong> <strong>the</strong> NATO Cooperative Cyber Defence Centre of Excellence<br />
(NATO CCD COE), claim<strong>in</strong>g that its activities were <strong>in</strong> retaliation for NATO<br />
support for Ukra<strong>in</strong>e. 5 However, <strong>the</strong> key to Cyber Berkut’s activities is <strong>the</strong> narrative<br />
which it uses to justify <strong>and</strong> promote its activities. Cyber Berkut claimed credit on its<br />
social network<strong>in</strong>g site VKontakte page for hack<strong>in</strong>g electronic advertis<strong>in</strong>g billboards<br />
<strong>in</strong> <strong>the</strong> centre of Kyiv prior to a Ukra<strong>in</strong>ian parliamentary election on 24 October<br />
2014, display<strong>in</strong>g videos of numerous prom<strong>in</strong>ent Ukra<strong>in</strong>ian politicians <strong>and</strong> labell<strong>in</strong>g<br />
<strong>the</strong>m war crim<strong>in</strong>als: 2<br />
[English translation] ‘We Cyber Berkut <strong>in</strong>tend to use every opportunity to<br />
defend <strong>the</strong> <strong>in</strong>terests of Ukra<strong>in</strong>ian citizens from <strong>the</strong> arbitrar<strong>in</strong>ess of nationalist<br />
4 Ibid.<br />
5 The post <strong>and</strong> video can be found here: http://vk.com/wall-67432779_14678<br />
106