The new russian investigative journalist has written a soon to be published book on governmentsponsored hackers. He talks about Russian Hackers and their Cyber Attacks at the Wilson Center in washington dc. This is one hour. I think we are ready to start. Good morning, ladies and gentlemen. I am isabella, welcome to the Wilson Center. I will use the moment to advertise our Upcoming Events that will happen next week on friday, january 19, 10 30 until 12 00 oclock. We have a book talk on the ukrainian revolution. Marcy sure will be speaking, author of the book and a professor at yale university. Another director for the communist society for the university of maryland and i also take the opportunity to remind and follow us on twitter and find us on facebook for the latest events and publications. Also, please make sure to read our blogs. One focuses on prussia and russia file and the one that focuses on ukraine [inaudible]. To todays event all you need to know about Russian Hackers we are very pleased to have as our speaker who is here with us for a few months as a cannon expert at the Cannon Institute and investigative journalist based in moscow, russia. He works at the russian news website and he studied his career at [inaudible] and works for the biggest russian news work and was fired for political grounds and left along with its reporters and editors and started it independently medusa in 2014. Most of his reporting is on the refugees and the lg tp rights in russia in the Islamic State. In 2015 he got the gq award in journalism about reporting for isis and its connection to russia. His stories have incited in the new york times, the new yorker, the guardian and other respected western publications. I will add that he received the [inaudible] prize which is the most highest russian journalistic award and i will add parenthetically that the founder of it was [inaudible] who also happens to be a fellow here at canon at the moment. We are really pleased that we have such a strong representation of russian independent journalism here. With that, the floor is yours. Hello, everyone. It is great to see you here. My name is [inaudible] and im a reporter. Medusa is one of the regions, independent, in russia to news in russia. [speaking in native tongue] now, in december after three years of working we have alrea already. In medusa i specialized in narrative stories like big stories about isis and influence and links to russia like this example of scout immigrant workers became Islamic State fighters or like my topic lgt problems in russia and political groups against lb gt like the story. The last two years particularly i worked in stories about Russian Hackers. Russian hacking activities against russia for example, this is an article about how Russian Services recruited guys from around the country russian cyber army. Now, in the Cannon Institute and in the book its the history of Russian Hackers from the soviet to today. Today i will tell you stories about them. I dont want to talk a lot about possible russian packings for the American Election and i think the last two years but i want to talk about Russian Hackers and their connections to government. Elsewhere in the world, in russia the [inaudible] were close but a big story leaked and for example this is alexandra shes a former employer that provide services to protect against attacks and in august 2015 she left russia and in a few days after this when she fled russia we met in helsinki and she showed me the documents that told really dramatic and a story about russian Cyber Weapons. By his words in february 2015 she was invited to a company [inaudible] and expert in military company and on a trip to bulgaria and all of the trip turned out to be demonstrations capable of [inaudible]. This is the city of [inaudible]. These are people demonstrating in bulgaria square at the site of the ukrainian minister of defense and then went through the russian website. Up to the demonstration [inaudible] they deny this. He told him that the russians tried to buy this in 1 million. When turned down the offer his problems began. He was taken by interrogated and thats why he went to finland. This year might be two months ago and now he is changed his name and now hes working in Government Companies to hacking in elections around the world and why i tell you about this because its a rare case when there were other interest in russian state and services to cyber warfare came to public space with real men and real ideas. In recent years Russian Military officials have made statements from we cant understand has already gone in the cyber army. [inaudible] we are searching for vulnerabilities and in late 2015 [inaudible] said that question was developing technologies for cyber war. In the last two years might researchers with Russian Hackers showed that the hackers and corporations and government based on two lines and this is professional selection and criminal selection and professional selection includes the simplest can we turn off the lights please . Okay. The competition is like [inaudible] and the Young Program is to run the country compete with each other in programming encoding and these events are popular with security guides because they come to the competition and offer the work for the people. Also they have school camps School Programming in the summer or winters or from russia. Another simple way to recruit hackers is investigating in Moscow School they are working with Young Programmers created by a theory which proclaims goals to train and aid specialist for security agencies and the employers regularly can make it with them and it is great to work and see this. Thats why i began to [inaudible]. It was organized by Computer Sciences [inaudible] in order to resist corrupt or support the american way of life taught modern russia and he wrote that he was saying it was informational technology. Other way in National Selection of hackers is [inaudible]. The Russian Defense at the meeting in moscow that he was a head hunt of colors and as i investigate they published in most network in russia and one video can we put off the lights please . Thank you. This videos minister of defen defense. Defense. This video was a caricature of the image of cyber soldier with i can translate some of from the video if you graduated from college and the technical specialist and if you can note that we give you an opportunity this and they said comfortable recommendation of an apartment burnished and in the spring of 2014 ministry of defense appeared in the Defense ForcesInformation Operations for foundation and they were created and it was used for the country and with mathematicians, programmers, cryptology is, he began to work together. In the [inaudible] one of the teacher of these Training Center explains that the main task is to learn the methods of Cyber Attacks them is a barrier. In addition the students had to walk out of the regions of Cyber Attacks in order to use them. One of the documents laid out in the community of scientifics indicate that it was vulnerable to networks and software. In response to prepare for the visit was with the military. The representative and ministry of defense called me and said that it doesnt show them to anyone and did not tell anyone about them and this topic is closed and dont risk and it doesnt seem to put only yourself aside. Also, to promote the television needed the channel to release the 2014 awad is not in english. About recruits regarded into cyber army and it sounds like for every hole up to use the internet. [inaudible] i have a document from the minister of the best published soldiers computers and educated their development of special software. Other part of relations based on assumptions from criminal in this is some next chapter. This is the district in moscow where it one of Russian Hackers, [inaudible], was born here. Shes a good example for hackers in russia and he got interested in website with was 13 in the early effect then this peter was two weeks to play video games and he needed to find Something Else to do. One of his classmates meanwhile had started creating websites and he heard the lessons was designed to write out the code by hand and this is was how inventive and then i got into the packing system that i was told. Together they started hacking classmate sites and eventually they lost interest but the interest only grew. [inaudible] people discuss the vulnerabilities of Cyber Security news and this form has Different Levels and in this i got to know other young hackers and within a few years these individuals would become the best hackers in russia while other began earning money legally and illegally in some of the people whatever they learned in american prisons and they were offered a choice to go to jail or to walk. [inaudible] the hackers often hide and he was told that he knows about a few cases when Police Arrested hackers and they went to the playstation and they were told this is not your business. One of the instigators told me once that after the cold war [inaudible] raised an Intelligent Service to extract information. However, such good hopes that russian state doesnt cooperate with hacker groups and the in his opinion that hackers can only be controlled if there put in a room [inaudible]. He is confident with Cyber Weapons that the future can get out of control and that the tax will not be caused by size of personal correspondence but one object. For example, is a Critical Infrastructure or Financial System as [inaudible] in iran. Usually groups when they metastasize, specialists or governments completely change the structure but since they made a number of packing but they operate for the same algorithm. They were not afraid. Other stories about criminal selections. [inaudible], the leader of a group and this is footage from the capture of [inaudible]. Polish and cyber recruits the light please. Police and Cyber Security and members began to in 2011 and by 2016 the group had stolen three rubles which is 50 million in russian banks. This is a connection and thats the suspects homes were searched and thrown into police stations. They bought luxury cars like cadillacs, rvs, mercedes. Altogether they got in this operation about 80 separate rates in different regions the people. The men arrested for technical experts and by [inaudible] was involved in this investigation says the Group Leaders recruited many people on ordinary search searches. Both failed to mention that it would be legal and they worked. [inaudible]. Every morning different people would sit down with computers and all across russia they would get to work. Suddenly with the leader of this group they said he wrote for [inaudible] for many years after because of his hacking on things. He said that the weapon by weapon hackers i have performed tasks under supervision of the officers and in particular the hacking of the International Community and the electronic and hacked military in the united states. But he didnt provide proof in support of this confession so some of those in me she was saying she was desperately trying to save himself himself with such publicity. Now was he trying to make a deal about his future or is he already made it like many other hackers. There are stories about Russian Hackers and the stories will be in my book. The hackers are similar to spy novels about Russian Hackers activities against russian government. Thank you. [applause] thank you so much this was a fascinating window into that world. Im sure that members of our audience have lots of questions. I want to ask you a couple questions. For one thing, im wondering, you made a distinction between the professional selection of hackers and hackers who work with the criminal selections. Is there a link between these two worlds or are they completely separate . How does it all mix or interact . I dont separate these. It is one world. Professional selection and criminal selection are the guys who, some of the guys, professional selection are working with government. What are the chances . You alluded to it a little bit but that it is likely that Cyber Weapons will go out of control in the future but what im wondering is as it happens, do we know about it and what is the likelihood that the very people who are trained to work on behalf of the russian government could turn against it and use the tools that they learn their to go the other direction . In russia we have a story for hackers against russian government and i think someone in this auditorium hears about [inaudible], a group of hackers packed russian politicals russian demonstrations around three years but now they are all in jail. In the other stories pressure and in russia hacker communities it is they have a rule to work in the [inaudible] and because if you worked in russia you will and jill that you will be discovered . Okay. Interesting. Because in russia a lot of people [inaudible] political departments there really good in social hackers. They want to find these hackers. You. Okay. Lets turn to the audience for some questions. See theres a question right there. Hold on right there. Waiting for the microphone. Hello. Over the last couple of months there was some discussion about [inaudible] and other commercially Available Software that was used to introduce vulnerabilities into the systems that were using that software and you have information on that. I know that, i dont ever investigate this but i know that has a lot of but i know that he has a lot of their working in [inaudible] and they have the possibility to make some decisions in this company. Yet. Please, right there. Thank you. Might, u. S. Senate staff. I wonder if you could talk about probably one of the more wellknown attacks against russia which was [inaudible] personal account and they also got [inaudible] if i am not mistaken. Is there anything known about who might have done that and obviously it had example of real word affects where that played into the opposition, mobilization and protest against the government . Thank you. Yes, you say in 2011 . [inaudible] [inaudible] yes, yes. We had different accounts hacked by [inaudible]. You say once a question is about hackers operate with oppositio oppositions . [inaudible] yeah, there is some groups i think some of the groups was working in the government have tasks from administrations deep in russia like [inaudible] and in Russian Administration fee is that he is the main and he some investigations told that he was a man who made these decisions to have oppositions like some other guys in russia. You know the hackers name who hacked in question and his name was [inaudible]. I think he is now in jail in germany. I will build up on that question. I think, if i understand correctly, the video that you are referring to of when his people said the drum to look over the state and all that that is not hacking but their research is not based on hacking but based on simply journalistic Forensic Research of the records of sorry, [inaudible] that were available but i am wondering are there, i dont know, hackers who work specifically with those who work in the position . May be. But no. Okay, we have to clarify to you. They also hacked his personal account including the orders he had made for close and sneakers and so on and they were able to cooperate pictures of him public fora wearing those exact items and the addresses for the worship to which is not Public Information but obtained through hacking. Sorry, i dont know who. Okay. Lets see. Two more questions on that side. Lets take those. Hello. My name is sarah, graduate senior at georgetown. My question may seem basic but you did say that if you hack in russia you will either join the government or go to jail. Do you find that the hackers that are sent to jail just like the adage that there is no such thing as a drugfree person and theres no such thing as a prison with no hackers do you think its an effective solution to jail hackers and does it have any real impact on their impact on their goals doesnt make sense or their projects . And on the impact of curbing the hacking situation . This is a big question of how jail and people dont know. Yet, in russia we have a lot of stories of hackers go into jail and we have a lot of stories where they dont publish the stories and the hackers are working on security because they want want to go to jail. Because they want to or because they dont want to okay. What happens if they go to jail . Can they may be continue spirit no. So theyll have asked . No. Okay. Right there in the back we have two questions. Thank you. Good morning. Could you clarify, please, when the government to reach the hackers is his covenant couple different dates and authorities and i know this will be a tough one but could you give us an estimate of how many since that date you decided how many hackers and who they primary targets are. Thank you. Yeah, ten minutes ago i talked about conundrums and as i know three o