Spies and Disinformation in the Internet Age
Please put on some speed and have someone watch over new technological developments. Almost 170 years ago in the 1840s, Countess Ada Lovelace, daughter of Lord Byron and a brilliant mathematician, pioneered and worked on a mechanical general purpose computer, considered to be the first computer program, invented even before computers existed. She died young, aged 36, but her influence is immense. She is a foremost role model for women in science, technology, engineering, and mathematics. Equally important, she inspired computer pioneers, especially Alan Turing, considered to be the father of theoretical computer science and artificial intelligence, who helped break the Nazi ciphers code in World War II.
One of the tributes to Lovelace is that the computer language "Ada," created in 1979 on behalf of the U.S. Department of Defense, was named after her. Lovelace may well have understood the astonishing potential for computers and their impact on our lives, but she might have been surprised by the revelations in recent weeks of Russians using various forms of cyberware to gain information and disseminate false information. So-called BlackEnergy malware is said to have been used by Russian cyber-espionage groups in Ukraine to target power facilities and other utilities as well as complex industrial operations.
That interference probably had little or no impact on the 2016 presidential election, nor does it suggest evidence of any Trump-Russian "collusion." But convincing revelations have been presented of the great extent of Russian attempts to gather intelligence and influence opinion in the U.S., as elsewhere – not so much by human individual spies or agents as by other virtual methods, especially social media.
Of course, spies and spycraft are not new. In World War II, various unusual devices were used to obtain information: ravens to deposit and retrieve objects, pigeons to warn of the enemy, cats with electronic transmitters to eavesdrop on conversations.
Intelligence-gathering and subterfuge are familiar in history. The Greeks used the Trojan Horse to enter and destroy the city of Troy and win the ten-year-old war. Today, "Trojans " infect computers, collecting information or making changes in a security system, and have been inserted in the U.S. by hackers probably sponsored by Russian sources.
Gathering intelligence and spying started early in the U.S., when the Second Continental Congress in 1775 set up the Committee of Secret Correspondence to attract foreign support for the American revolutionary cause. The committee, in which Benjamin Franklin was the most active member, employed secret agents abroad to gain intelligence and conduct undercover operations.
Russian spying and attempts at disinformation are not new, but what is new is the sophistication and extent of the devices now employed. Starting in the late 1920s, the Soviet Union used Russian and foreign-born nationals, and U.S. and European citizens, to transmit information of political, military, and industrial nature. It is sufficient to mention a few Americans who acted on behalf of the USSR or were used by it: Earl Browder, general secretary of the U.S. communist party; the group controlled by J. Peters, who recruited agents, the "Ware group"; Alger Hiss; assistant secretary of state Harry Dexter White; assistant secretary of the treasury Elizabeth Bentley; and Julius Rosenberg, executed with his wife Ethel in 1953 for giving nuclear secrets, not to mention others who had infiltrated the U.S. atom bomb project.
Similarly in Britain, the Soviet Union began in the 1930s recruiting communist sympathizers, bright graduates from elite universities. The most notorious were the Cambridge Five: Kim Philby, Guy Burgess, Donald Maclean, John Cairncross, and Anthony Blunt, a leading art historian and surveyor of the queen's pictures who confessed to being a Soviet spy.
A rather enticing and intriguing story was published in February 2018 with allegations about Jeremy Corbyn, Labor Party M.P. for Islington in London since 1983 and now leader of the Labor Party, who met in 1986 and 1987 on at least three occasions with Czech communist "diplomats." The question is whether Corbyn was any kind of informer or simply naïve and innocent in what John Le Carré has called "a cause the world barely remembers." Corbyn, given a code name, COB, was regarded by the Czech spies as a "person of interest" and was contacted by the Czech secret police, which organization was dissolved in 1990, after the Soviet Union ended as did the Czechoslovak Socialist Republic, a satellite state of the Soviet Union.
Spies are still used, even if not as glamorous and notorious as Mata Hari, the Dutch exotic dancer, executed in 1917 as a spy for Germany in World War I, but new technology has replaced the once simple spying devices: invisible ink, secret codes, blind drops on park benches, or in hollow trees. They have been replaced by sophistication, doctored images, falsehoods posted on social media, documents intended to divide and sow discord and confusion among Americans, invention of fake personalities, use of bots, software application that performs an automated task over the internet, "troll farms," and state-sponsored commentators who post deliberately inflammatory or provocative comments.
Noticeable in all this were fake impersonations such as Black Lives Matter activists and white supremacists, fake news, conspiracy theories, hacker attacks, dissemination of disinformation disguised as educational or scientific reports, activism in political blogs, participation in staged political rallies, posing as U.S. activists.
Detection of these activities is obviously difficult. Evidence now available illustrates the role of the Russian organization called the Internet Research Agency. This agency, employing 100 persons and bankrolled by a shadowy figure – the 56-year-old Yevgeny Prigoizhin, former small-time criminal, hot dog street vendor, now restaurant and catering businessman, known as "Putin's chef" – has played a major role as an arm of Russian foreign policy, including financing a Russian "troll factory." IRA instructed its workers in the use of graphics and videos, employing people with coding and social media skills, and some English, to create fake personalities among other tasks. One of those tasks was a false video of a black American woman being killed by a white police officer in Georgia.
A formidable task lies ahead for U.S. institutions, governmental and private. Official government bodies are concerned with protection of national security and the public interest to overcome the foreign targeting of groups, by demography, geography, gender, and political points of view. Perhaps an even greater role must now be played by private U.S. organizations.
No one favors censorship or silencing of dissent, but it is wise to recognize that the internet is now a dangerous place, used for improper purposes, including organizing rallies, protests, and even distribution of bank cards and money transfers. Major companies – Facebook with its 2 billon users, Twitter, and Alphabet's YouTube – are reluctant to remove material, even if they contain falsehoods. They confine themselves mainly to those materials promoting hate speech or child pornography. However, they must do more, to vet their sites more carefully, to limit the use of propaganda tools, to prevent any financing by foreign interests, and to be held more accountable to prevent foreign disinformation campaigns.