Russian Hackers, Cold Imaginations


Benjamin Peters

(with Marijeta Bozovic)

Cybersecurity Threats from Russia, Eastern Europe, & Eurasia and the Global Spread of Disinformation University of Kansas

April 2022

Hackersinitiative.yale.edu

Seven Points

  1. What does unmotivated analysis look like? Can we know?
  2. The internet was never Soviet until it suddenly was
  3. The Russian hacker often serves as a convenient Enemy Other
  4. The Russian hacker looks best in high res color, not grayscale
  5. The Russian hacker, while fixed from afar, appears tactically mutable up close
  6. States do not have public frameworks for approaching cyberwar
  7. Russian cybercriminal hackers slow Russian cyberwar hackers
  1. What does unmotivated analysis look like? Can we be sure?
  2. The internet was never Soviet until it was
  3. Russian hacker, a convenient enemy Other

3. Russian hacker, a convenient enemy Other

 

  1. Russian hacker, a convenient enemy Other

 


 

 

 

  1. The Russian hacker looks best in high res color, not grayscale

Russian hackers...

  1. Hybrid Russian-speaking business networks
  2. Guns for hire
  3. State employees and contractors
  4. Agents of chaos E. Citizen hacktivists
  1. Ethical hackers
  2. And others...
  1. Hacker identities are tactically malleable 
  2. States do not yet have public frameworks for cyberwar
  3. Russian cybercriminal hackers slow Russian cyberwar hackers

 

 

 

 

Hackersinitiative.yale.edu

Benjaminpeters.org

@bjpeters ben-peters@utulsa.edu