Transcripts For CSPAN Russian Hacking 20180112 : vimarsana.c

CSPAN Russian Hacking January 12, 2018

Good morning, ladies and gentlemen. I am isabella, welcome to the Wilson Center. Toill use the moment advertise our Upcoming Event that will happen next week on friday, january 19th, 10 30 to 12 00. We will have a book talk, the ukrainian night and intimate history of revolution. Speaking will be the author of the book, associate professor of history at Yale University as well as a former Wilson Center as during i will also well as a former Wilson Center fellow. I will also take the opportunity to ask you to follow us on twitter and facebook. Read our twoure to excellent blogs. And theses on russia other focuses on ukraine. Todays event, all you need to know about Russian Hackers. We are pleased to have a speaker who is here with us for a few months as an expert at the Canon Institute and an eight investigative journalist and an investigative journalist based in moscow, russia. At theted his career biggest russian news website at the time. After the editor in chief was fired by the publisher on political grounds he left of the publication along with most of its reporters and editors. Focuses of his reporting on the refugee writess in russia, lgbt in russia, Cyber Security, and the Islamic State. He got the gq award in journalism for his reporting about isis. His works have been cited in the new york times, the new yorker, and other respected western publications. He was also the recipient of the most prestigious award in russian journalism today. The founder of the award also happens to be a fellow at canon. We are pleased we have such a strong representation of russian independent journalists. Thank you. Hello, everyone. It is great to see you here. m a reporter now in december after three years of working we have around 10 million unique visitors in the month. I specialized in bacon narrative big narrative stories, stories about isis , how moscowsia workers became Islamic State fighters. Another topic is lgbt programs in russia and radical groups against lgbt like this story. Years ive worked in stories about Russian Hackers , russian hacking activities against russia, all of this stuff. About how article Russian Security services recruit guys from around the country for the Russian Cyber Army. Now in the Canon Institute im working on a book about the history of Russian Hackers from the soviet days to our days. Today i will tell you some stories about that. I did not want to talk a lot about russian hacking in the American Election because you read a lot about this. Want to talk about Russian Hackers and their connections to the government. Elsewhere sometimes a big story is leaked. Employee of the company that provide services to protect against attacks. In august of 2015, she left russia. We met in after this and she showed me documents that told a dramatic and dangerous story about russian Cyber Weapons. Sheebruary of 2015, accompanied an executive in military contracting. The film in demonstrating ukrainian minister of defense and slandered through a russian website. After the demonstration, they job to work with Cyber Weapons. This. Eny when she turned down the offer, that is when problems begin. She was followed by secret services and that is why she went to finland. We met this year for a few months ago. He has changed his name and gotten political asylum in in and and is now working Company Monitoring hacking elections around the world. This is a rare case where the interest of the russian state and Security Services to cyber warfare came into public safe with real names and real ideas. , russian years officials have made many statements from which we can understand. Russia has already its own cyber army. In the structure of Security Services and the minister of hacking and searching. , the defense minister spokesman said russia is developing technologies for conducting cyber war. Years, in mywo research and meetings with Russian Hackers, that showed that hackers and the corporations, the governments, based on two lines. This is a professional selection and a criminal selection. Selection includes can we turn off the lights, please . Competitions where the young programmers around the country compete with each other in programming and coding. Withevent is Popular Security guards because they come to this competition and offer the work. There are School Programming camps in summers and winters when school programmers come from russia. Way to recruit in the moscow screw in the Moscow School is a circle in theg programmers military, which proclaims its goal is to train specialists for security agencies. There are stories about how it is great to work. This is how programmers begin to prepare in schools. It was organized by the teacher of computer sciences. He pointed out that the project was created in order to relieve of source all sorts s who support the american way of life. The other way in professional isection of hackers [indiscernible] in 2013, the Russian Defense minister spoke to the University Directors at the meeting in moscow that he was on a head hunt. The defense minister published advertisement that looked like this. The defense minister published that contacted the most Popular Network in russia. One video can we put out the light please . Thank you. Advertisement video from the ministry of defense. Caricature ofis a the image of the cyber soldier. I can translate some of the words from this video. Graduated from college, if youre a technical specialist, if youre ready to use your knowledge, we give you an opportunity. Members live and comfortable accommodation with apartments furnished with a washing machine, also. In the spring of 2014, the ther of defense Defense Forces of Information Operations for cybernetic confrontation. They were created graduated from technical universities, mathematicians, engineers, began to go there. They indicated their knowledge of programming languages and one of the teachers of this center explains that the main task of our guys is to learn the methods of Cyber Attacks. Had to work out operations of Cyber Attacks in order to use them. One of the documents laid out in the community of scientific indicate that the youth vulnerable networks and software. [indiscernible] the representative of the minister of defense called me and said the agency does not show them to anyone and does not telling one about them and told me that this topic is closed. Not putuote, do yourself aside. The television defense channels [indiscernible] the joke sounds like for every the science quadrants have also been graded. Theve a document from minister of defense a photo of theiers and indicated target is develop an of special software. This is a district in moscow. Russian hackers was born here. He is a good example for hackers destiny in russia now days. He got interested in hacking when he was 13, in the early 2000s. His computer was too weak to play video games, so he had to find Something Else to do. Classmates had started creating websites and his friendsessons would pass them a notebook and he would write out the html code by hand. This turned out to be inventive. It was not long before he got interested in hacking, he told me. He and his friends started hacking classmates websites. Eventually the friend lost interest in hacking, but antons interest only grew. He registered an account with the russian hacking firm where people with a russian Hacking Forum where people discuss Cyber Security news. This forum had several Different Levels and you get access to Different Levels by demonstrating your programming knowledge. Anton got to know several other young hackers and within a few years it would become the best Cyber Security specialists in russia while others would begin getting money illegally. Some people would end in american prisons. [indiscernible] he told me that the hackers hide from police in safehouses across the country. He told that he knows about a few cases when Police Arrested and took the suspects away. This is not your business. One of the russian cyber thattigators told me once ,fter the end of the cold war espionage did not end in russia. In russia there is an intelligence force whose job is to extract information. It is not a secret that the most effective way to do this is technology. In his opinion, hackers can be trolled only he is confident that Cyber Weapons can get out of control. The attacks will not be caused by personal correspondence. Countriese, a vertical infrastructure or its financial system. Usually groups advertise what they want by governor [indiscernible] they operate by the same algorithm. They are not afraid. Other stories about criminal selections. There is the story of one hacker. Roup this is footage from his capture. The light, please. In 2011 and by had stolen 3p millionrubles and 50 from russian banks. This looks like an action movie. The home was searched and they they found luxury diamonds. Chests with outgether, police carried 18 separate regions and 50 different people. The men arrested were mainly the Group Technical experts. The Group Leaders recruited many of the people on an ordinary government related search. The job posting failed to mention the work would be illegal. Every morning except on weekends different people would sit down at their computers in places all across russia and ukraine and get to work. The plane to moscow. , thegust of this year leader of this group, workedtine, told that he for many years after he was caught because of his hacking on banks. All stories by western media about Russian Hackers are about me. In particular the hacking of the National Committee of the Democratic Party in the United States and the correspondence of Hillary Clinton and military objects in the United States. He did not provide any proof in support of this confession. Some observers and me said he was insane. Others that he was desperately trying to save himself with such publicity. If hee key question or heying to make a deal, has already made it in the past like many other hackers. There are stories about Russian Hackers. Some stories will be in my book. Russian hacking activities against the russian government. Thank you. [applause] thank you, so much. I am sure members of our audience have lots of question. I want to ask you a couple questions. You made a distinction between the professional selection of hackers and hackers who work with facilities, so that is a criminal selection. Is there a link between these that they can be separate or how does it mix or interact . Mr. Turovsky it is one world, and professional section and criminal section are the guys are working with government. What are the chances of you and you alluded to it you said it was very likely that will go out of control and in the future. As it happened, do we know about it, and is the likelihood of the people who were trained to work on behalf of the russian government would turn against it and use the tools and go in the other direction . We havevsky in russia, a lead story of Russian Hackers against the government. I think someone will share ut the at group of hackers will share about the group of , around three years. But now they have all been jailed. Other stories, a but the russia, also , theyn Hacker Community e a [indiscernible] because if you works in russia work in russia, you will and in jail. If you are discovered. Mr. Turovsky because in russia, there are a lot of of ambiguity of political departments. Ande really good in they want to find these hackers. Ok. Lets turn to the audience for some questions. I think there is a question right there. Just a second. Will there be a mike coming your way . Hi. Over the last couple of months, there was discussion about commercially Available Software that was used to introduce vulnerabilities into the systems that were using that software. Do you have information on that . That vsky i know ski have a lotper but i know kasperski has a and they guys inside work in hack positions at kasperky toe at make some decisions with this company. Thank you. Abouter if you could talk one of them more wellknown hacks in russia, a personal account, a personal and i think they got someone else, if i am not mistaken. Is there anything new about who hast have done that, and it an example of realworld effects that played into the opposition mobilization and protest against the government. Mr. Turovsky [indiscernible] just recently. Medvedev . Ky the speakers were able to [indiscernible] mr. Turovsky yeah. Or event midget of get of medvedev [indiscernible] howestion about hackers operate with oppositions [indiscernible] but then there was the realworld if it aired when that became public as a motivational tool to we have not seen that level of protests since [indiscernible] mr. Turovsky yeah. Thinkare some groups, i some of these groups were working in government who fromve administration president , a. P. , in russia we would say. His name is in the russian administration. Figure internet. Investigations who makeshe was a man these decisions to have some positions like or some other guys in russia. [indiscernible] hacked some positions his name is and now think he is in jail in germany. I will follow up on that question. If i understood it correctly, a followup question, the video that you were referring to, when they sent it, they sent a drone to take it. That is not hacking. Their research was not based on hacking, but based on Journalistic Research of their record of that were available online. I am wondering i do not know are there hackers who work with the russian opposition . If that is something that happens . Mr. Turovsky [indiscernible] ok. Clarify thank you. But they had mr. Witt nedved dvedevs account, and were able to corroborate pictures of him in public fora wearing those exact items and the items which they worship two, which is not information. It was obtained through hacking. Mr. Turovsky i do not know. We have two more questions. We will take those. Hi. Im a graduate student at georgetown. My questions might seem basic, but you said if you hack in russia, you will either join the government or go to jail. Do you find that the hackers that are sent to jail, just like the adage there is no such thing as a drugfree prison, no such thing as a prison without hackers, do you think it is an effective solution to jail hackers, and doesnt have any onl impact on their impact their goals with her projects . Does jailing these hackers have any effects on the curbing the hacking situation . Mr. Turovsky yeah. This is a big question how jail how people yes, and we have in russia a lot of stories when hackers go to jail, and we have a lot of stories when hackers when on securityworking services because they will not go into jail. Because they want to or because mr. Turovsky they want to. What happens if they go to jail . Can they maybe continue hacking . Mr. Turovsky no. They do not, so they do not have access. Ok. Intevac, we have two back, we in some have two questions. Could you clarify, please, when the government outreach to hackers began. A coupleifferent different dates and authorities. Could you give us an estimate since that day how many hackers the government has recruited and who their primary targets are . Thank you. Mr. Turovsky yeah. I talked about and as i know there is some people working inside around the country. And your question is about main , that i do not know, but like in this American Election, hacking, we can talk here about motivation for these hackers. Maybe espionage around guy, everyry, every journalist who runs a a target as i know from the a. P. Investigation. Journalist experts, political people i am sorry. When would you say this government recruiting really began with intensity . Mr. Turovsky began . Yeah, to get these folks to help. Mr. Turovsky three years, i think. Thank you. Ok, there was one question in the back. We take that and move forward from there. Hi. You mentioned but the criminal and professional hacking organizations, how they were recruited. Are the type of hacking activity and you may have talked about example, for certain types of hacking activities more oriented from the criminal base rather than the professional . For example the criminal base may be a good type of to use for certain activities and use plausible deniability where it could be traced back to the government. Mr. Turovsky yeah. I know, professional popular criminal hackers are good because they need to have a lot of time to explore and find a lot of abilities. Ok, i think we had right there. Mmhmm. Thank you very much for your presentation. Im a journalist and a Research Center at Johns Hopkins university. A

© 2025 Vimarsana