Âé¶¹ÒùÔº


How the Russian government used disinformation and cyber warfare in 2016 election – an ethical hacker explains

How the Russian government used disinformation and cyber warfare in 2016 election – an ethical hacker explains
Credit: AI-generated image ()

The Soviet Union and now Russia under Vladimir Putin have waged a political power struggle against the West for nearly a century. Spreading false and distorted information – called "" after the Russian word for "disinformation" – is an age-old strategy for coordinated and sustained influence campaigns that have interrupted the possibility of level-headed political discourse. Emerging reports that suggest that what happened in the lead-up to the 2016 presidential election may be set to recur.

As an , I have seen firsthand how disinformation is becoming the new focus of cyberattacks. , I suggested that cyberwarfare is no longer just about the technical details of computer . Rather, are rapidly becoming the best hacking tools. With social media, anyone – even Russian intelligence officers and professional trolls – can widely publish misleading content. As legendary hacker Kevin Mitnick put it, "."

Two sets of federal indictments – one in February and another in July – allege in detail how and worked to polarize American and sway the 2016 U.S. presidential election.

Cybersecurity experts in the U.S. knew that the Russian intelligence agencies were conducting these acts of information warfare and cyberwarfare, but I doubt they had any idea how comprehensive and integrated they were – until now.

Russia's propaganda machine duped American voters

The operation was complex. What is publicly known now is perhaps most easily understood in two pieces, the subjects of separate federal indictments.

First, a allegedly assembled a network of troll factories: private Russian companies engaging in . Their employees posed as Americans, created racially and politically divisive social media groups and pages, and developed fake news articles and commentary to build political animosity within the American public.

Second, the Russian military intelligence agency, known by its Russian acronym as the GRU, allegedly to . The Russian hackers downloaded potentially damaging information and and under various aliases including "DCLeaks" and "Guccifer 2.0."

Online trolls manipulated your opinions

The people involved did not fit the . One leading Russian troll factory was a , reportedly with all the trappings of a real corporation, including a graphics department to create incendiary images, a foreign department dedicated to following political discourse in other countries and an IT department to make sure trolls had reliable computers and internet connections. Employees, mostly 18 to 20 years old, were paid as much as for creating fake social media accounts and blogs to distribute disinformation to Americans.

They were employed to take advantage of The Russians saw this as an opportunity to stir up conflict – like poking a stick into a beehive. These trolls were instructed to stir up racial tensions, stage "flash mobs" and – at the same times and locations.

One ex-troll told a Russian independent TV network that his job included writing incendiary comments and creating fake posts on political forums: ", whether it was commenting [on] the news section or on political forums, it didn't really matter." In 2015, well before the 2016 election, the troll-factory network had , producing propaganda videos, infographics, memes, reports, news, interviews and various analytical materials to persuade the public.

America never stood a chance.

An interview with an ex-Russian troll.

Focusing on social media

It's no surprise that these Russian trolls spent most of their time on Facebook and Instagram: get at least some news on social media. The trolls spread out across both platforms, seeking to encourage conflict on any topic that was getting a lot of attention: immigration, religion, the Black Lives Matter movement and other hot-button issues.

When describing how he managed all of the fake accounts, the ex-troll said: ", then you need to be a white guy from Minnesota, you've slaved away all your life and paid your taxes, and then 15 minutes later you are from New York posting in some Black slang."

Then, the indictments reveal, the GRU entered this increasingly fraught online political discourse.

The GRU joins in

Like , the GRU effort allegedly started with a break-in to Democratic National Committee records – but this time it was a digital burglary. It wasn't particularly sophisticated, either, using two common hacking techniques, spearphishing and malicious software.

As the July indictment details, starting in March 2016, sent a series of fake emails, disguised to look real, to more than 300 people associated with Democratic National Committee, the Democratic Congressional Campaign Committee and Hillary Clinton's presidential campaign. One of the targets was Clinton campaign chairman John Podesta, who fell for the scheme and unwittingly handed over more than .

Around the same time, in the Democratic organizations' computer networks. They used techniques and specialized malicious software that Russians had used in other hacking efforts, including against the and the . By April 2016, the hackers had gained access to the Democratic Congressional Campaign Committee systems, exploring servers and secretly extracting sensitive data. They located a Democratic Congressional Campaign Committee staffer who also had privileges in the Democratic National Committee systems, and thereby got into the Democratic National Committee networks too, extracting more information.

When the Democratic National Committee realized there was unusual data traffic in its systems, the group hired a private cybersecurity firm, which in June 2016 publicly announced that its investigation had concluded that . At that point, the Russians allegedly tried to delete traces of their presence on the networks. But they kept all the data they had stolen.

Opposing Hillary Clinton

As early as April 2016, the GRU was allegedly trying to use the Democrats' confidential documents and email messages to stir up political trouble in the U.S. There is evidence that the Russian government, or people acting on its behalf, offered key people in the Trump campaign .

In July 2016, the indictments say, the GRU began releasing many of the Democrats' documents and email messages, , an internet site dedicated to anonymous publishing of secret information.

All of this effort was, according to the indictments, set up to undermine Hillary Clinton in the eyes of the American public. – as the Russian president himself acknowledged while standing next to Trump in Helsinki in July. And the trolls were instructed to go after her savagely: , "Everything about Hillary Clinton had to be negative and you really had to tear into her. It was all about the leaked email, the corruption scandals, and the fact that she is super rich."

The indictments describe in detail how information warfare and cyberwarfare were used as political tools to advance the interests of people in Russia. Something similar may be , too.

Provided by The Conversation

This article was originally published on . Read the .The Conversation

Citation: How the Russian government used disinformation and cyber warfare in 2016 election – an ethical hacker explains (2018, July 30) retrieved 17 August 2025 from /news/2018-07-russian-disinformation-cyber-warfare-election.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Facebook says Kremlin-linked ads ready for public view, but House hasn't released them

69 shares

Feedback to editors