4 October 2018

Assessment of Russia’s Cyber Relations With the U.S. And Its Allies


Summary: Russia frequently employs offensive cyber operations to further its foreign policy and strategic goals. Prevalent targets of Russian activity include the United States and its allies, most recently culminating in attacks on Western national elections by using cyber-enabled information operations. Notably, these information operations have yielded national security implications and the need for proactive measures to deter further Russian offenses.

Text: The United States and its allies are increasingly at risk from Russian offensive cyber operations (OCOs). Based on the definition of the Joint Chiefs of Staff, OCOs are operations which aim “to project power in or through cyberspace[1].” Russia utilizes OCOs to further their desired strategic end state: to be perceived as a great power in a polycentric world order and to wield greater influence in international affairs. Russia uses a variety of means to achieve this end state, with cyber tools now becoming more frequently employed.


Since the 2007 cyber attacks on Estonia, Russia has used OCOs against the United States, Great Britain, France, and others[2]. These OCOs have deepened existing societal divisions, undermined liberal democratic order, and increased distrust in political leadership in order to damage European unity and transatlantic relations. Russian OCO’s fall into two categories: those projecting power within cyberspace, which can relay kinetic effects, and those projecting power indirectly through cyberspace. The latter, in the form of cyber-enabled information operations, have become more prevalent and damaging. 

Throughout the 2016 U.S. Presidential election, Russia conducted an extended cyber-enabled information operation targeting the U.S. political process and certain individuals whom Russia viewed as a threat[3]. Presidential candidate Hillary Clinton, known for her more hawkish views on democracy-promotion, presented a serious political impediment to Russian foreign policy[4]. Thus, Russia’s information operations attempted to thwart Hillary Clinton’s presidential aspirations. 

At the same time, the Russian operation aimed to deepen existing divisions in the society which divided U.S. citizens along partisan lines, and to widen the American public’s distrust in their democratic system of government. These actions also sought to decrease U.S. primacy abroad by demonstrating how vulnerable the U.S. is to the activity of external actors. The political reasoning behind Russia’s operations was to promote a favorable environment within which Russian foreign policy and strategic aims could be furthered with the least amount of American resistance. That favorable environment appeared to be through the election of Donald J. Trump to the U.S. Presidency, a perception that was reflected in how little Russia did to damage the Trump operation by either OCO method.

Russia also targeted several European countries to indirectly damage the U.S. and undermine the U.S. position in world affairs. As such, Russian OCOs conducted in the U.S. and Europe should not be viewed in isolation. For instance, presidential elections in Ukraine in 2014 and three years later in France saw cyber-enabled information operations favoring far-right, anti-European Union candidates[5]. 

Russia has also attempted to manipulate the results of referendums throughout Europe. On social media, pro-Brexit cyber-enabled information operations were conducted in the run-up to voting on the country’s membership in the European Union[6]. In the Netherlands, cyber-enabled information operations sought to manipulate the constituency to vote against the Ukraine-European Union Association Agreement that would have prevented Ukraine from further integrating into the West, and amplified existing fractions within the European Union[7].

These cyber-enabled information operations, however, are not a new tactic for Russia, but rather a contemporary manifestation of Soviet era Komitet Gosudarstvennoy Bezopasnosti (K.G.B.) techniques of implementing, “aktivniye meropriyatiya,” or, “‘active measures’”[8]. These measures aim to “[influence] events,” and to “[undermine] a rival power with forgeries,” now through the incorporation of the cyber domain[9]. 

Russia thus demonstrates a holistic approach to information warfare which actively includes cyber, whereas the Western viewpoint distinguishes cyber warfare from information warfare[10]. However, Russia’s cyber-enabled information operations – also perceived as information-psychological operations – demonstrate how cyber is exploited in various forms to execute larger information operations [11].

Although kinetic OCOs remain a concern, we see that the U.S. is less equipped to deal with cyber-enabled information operations[12]. Given Western perceptions that non-kinetic methods such as information operations, now conducted through cyberspace, are historically, “not forces in their own right,” Russia is able to utilize these tactics as an exploitable measure against lagging U.S. and Western understandings of these capabilities[13]. Certain U.S. political candidates have already been identified as the targets of Russian OCOs intending to interfere with the 2018 U.S. Congressional midterm elections[14]. These information operations pose a great threat for the West and the U.S., especially considering the lack of consensus towards assessing and countering information operations directed at the U.S. regardless of any action taken against OCOs. 

Today, cyber-enabled information operations can be seen as not only ancillary, but substitutable for conventional military operations[15]. These operations pose considerable security concerns to a targeted country, as they encroach upon their sovereignty and enable Russia to interfere in their domestic affairs. Without a fully developed strategy that addresses all types of OCOs including the offenses within cyberspace and the broader information domain overall Russia will continue to pose a threat in the cyber domain.

No comments: