As the dust settles on Russian interference in the US election, journalists are confronting an aspect that has received less scrutiny than the hacking, but poses its own thorny questions: Moscow’s ability to steer Western media coverage by doling out hacked documents.
Reporters have always relied on sources who provide critical information for self-interested reasons. The duty, tricky, but familiar, is to publicize information that serves the public interest without falling prey to the source’s agenda, but in this case the source was Russia’s military intelligence agency, the GRU — operating through shadowy fronts who worked to mask that fact — and its agenda was to undermine the US presidential election.
By releasing documents that would tarnish then-US presidential candidate and former secretary of state Hillary Rodham Clinton and other US political figures, but whose news value compelled coverage, Moscow exploited the openness that is the basis of a free press. Its tactics have evolved with each such operation, some of which are still unfolding.
Illustration: Mountain People
Thomas Rid, a professor of security studies at King’s College London who is tracking the Russian influence campaign, said it goes well beyond hacking.
“It’s political engineering, social engineering on a strategic level,” Rid said.
Great powers have long meddled in one another’s affairs, but Russia, throughout last year, developed a previously unseen tactic: setting up fronts to seed into the press documents it had obtained by hacking.
“Doing public relations work in order to get the hacked material out as an exclusive story with the Daily Caller or Gawker or the Smoking Gun, that is new,” Rid said.
That public relations work was initially done by two Web presences that appeared this summer, Guccifer 2.0 and DCLeaks, each posing as activist-hackers in the mold of Julian Assange, the WikiLeaks frontman. Though neither acknowledged it, and the links were not immediately known, online security experts later concluded that both were Russian fronts.
Guccifer 2.0 claimed to be a Romanian “freedom fighter” who had hacked the Democratic National Committee (DNC). Using Twitter’s private message service, the account conducted weeks-long exchanges with journalists, pointing them to certain documents that had been hacked from the DNC and other targets.
“Whoever is doing this understands media. They understand the way that media works and how to manipulate media,” said Sheera Frenkel, a BuzzFeed News reporter who interacted with the fronts throughout the summer.
DCLeaks, established separately and with its own sets of hacked documents, claimed to be “launched by the American hacktivists who respect and appreciate freedom of speech.”
The fronts sold the act by peppering their messages with slang and emojis. When Frenkel asked Guccifer whether it would release more DNC documents, the reply came: “Yeah baby :)”
Journalists who interacted with the accounts say their tone and facility with English varied widely, suggesting each was run by multiple users.
A reporter with Motherboard, a technology site, quizzed Guccifer on the technical aspects of the hacking and on rudimentary Romanian. Guccifer failed both, lending credence to theories that it was a front.
Those suspicions were initially restricted to security experts, trickling out only after firms such as ThreatConnect were able to unmask the fronts in detailed reports.
In July last year, for instance, DCLeaks published e-mails belonging to retired US Air Force general Philip Breedlove. The Intercept, a left-leaning site, covered the e-mails in a story that portrayed Breedlove as trying to foment hostility against Russia. The story did not note Russian links to the hack. Its lead author, Lee Fang, said he had no interactions with DCLeaks and pointed out that the group’s suspected Russian ties were not widely publicized at that time.
Some reporters were offered documents exclusively, a familiar tactic of government press offices and public relations firms that want to shape coverage.
In September last year, DCLeaks contacted Peter Hasson, a reporter at the Daily Caller, a right-leaning Web site, with an offer: password-protected access to hacked e-mails belonging to former US secretary of state Colin Powell.
The Daily Caller’s story also did not note the growing belief that the documents had been hacked by Russia and leaked as part of an influence operation. Hasson said he was unaware of the alleged Russian links at the time.
After awareness grew, the front organizations dropped the pretense. The newest group called itself Fancy Bears Hack Team — a breathtakingly overt reference to “fancy bear,” the name some Western security groups use for GRU hackers.
Tom Cheshire, a reporter with the British network Sky News who has dealt with Fancy Bears, said they behaved “almost more like a PR firm, really” and were “very businesslike,” doling out scoops and trying to shape coverage.
“It’s the sort of horse trading you do with all sorts of sources, really,” Cheshire said, hitting on a key to the operation’s impact: the way that it played within the bounds of established journalistic norms.
Any leak by any source — Russian agent or citizen whistle-blower — poses a similar set of quandaries for reporters.
Do you emphasize the hacking itself in your coverage, knowing that this will undercut the source’s agenda, but could also be a disservice to readers by putting less focus on newsworthy information in the release?
Do you withhold newsworthy documents, even only temporarily, to check their veracity and provenance? What if they have been reported by other outlets that were shown the documents first?
If they did turn out to be hacked as part of a hostile foreign operation, does that really make their contents less newsworthy?
These are old questions for journalists, but they have taken on new urgency with the scale of Russia’s hacking and its aims.
Though the calculus of reporting on agenda-driven leaks might be familiar, one aspect of the Russian operation stands out: the lengths to which the fronts go to mask their identities and motives.
Because the Internet gives any outlet the potential to reach millions, all it takes is one well-placed leak to send the document flying across the Web.
Last year, Russian-linked hackers infiltrated the US Anti-Doping Agency, most likely in retaliation for accusations of state-sponsored doping among Russia’s Olympic athletes, but Fancy Bears struggled to place the stolen documents with US or British news outlets.
Reporters who saw the files said their news value did not outweigh the risk of serving Russian interests. When Fancy Bears offered the files to The Associated Press, the reporters instead published a story on the Russian-linked group itself.
Fancy Bears ultimately persuaded sportswriters with Der Spiegel, a prominent German media outlet, to report on e-mails that appeared to show US athletes requesting medical exceptions to take restricted drugs. The article noted a possible Russian link only in the final lines, alongside a quote from a US official arguing that the leak was intended to distract from state-sponsored doping.
If mainstream outlets pass on a hacking, government-linked fronts can always pass the documents to peripheral outfits who will lend them less weight, but can still send them across social media.
That has often included the Web site InfoWars, which was founded by right-wing radio host Alex Jones and often publishes conspiracy theories.
Guccifer 2.0 approached Mikael Thalen, a writer for InfoWars, with DNC documents that showed Democrats’ plans for attacking Paul Manafort, a campaign manager to US president-elect Donald Trump who had worked on behalf of former Ukrainian president Viktor Yanukovych, a Kremlin ally.
Thalen had come to believe, after many interactions with the front groups, that they “would reach out based on who would best carry the story the way they wanted it carried.”
He feared that Moscow was hoping InfoWars, by publishing the files, would muddy the water around accusations against Manafort, indirectly aiding Trump’s then-flailing campaign. Breaking with InfoWars’ usual reliance on such files, he declined to publish the documents.
Because everyone has secrets, even if it is only a few embarrassing personal e-mails, and because no network is impenetrable, skilled hackers can dig up compromising material on virtually any target.
Democracies, which give privilege to competitive politics and free media, are particularly susceptible.
“An open society is by choice more vulnerable than a closed society to some form of influence operation,” Rid said. “That is why we’re strong, but it’s also why we’re weak.”
The more that journalists and readers understand the motivations of foreign government leakers, he said, the better they would be able to place those leaks in context, undercutting the hackers’ agenda without hiding newsworthy information. He compared this to a healthy body developing antibodies against a disease — foreign influence operations — that cannot be wholly immunized against while maintaining democratic openness.
Still, some media trends — polarization, fake news, the crowd-driven nature of social media — cut against those hopes.
“This polarized election presented itself as a target of opportunity of the first order,” Rid said.
Reporters might at times be hindered by a lack of transparency between media organizations, which are often highly competitive, and prize speed and scoops. This has left reporters vulnerable because they cannot easily pool lessons on spotting foreign operations or, say, warn one another that a certain front is exaggerating the newsworthiness of its latest leak.
“The more light shone on this, the more information you have when dealing with a source, the better decisions you’re going to make,” Cheshire said.
Thalen said he was increasingly turning down leaks that he knows his audience would read avidly and reward with acclaim, but that he considered exaggerated to advance Russian interests. Still, he was unsure it had made much difference.
“A lot of people have swayed their reporting with their biases and I didn’t want to do that,” Thalen said. “People are believing what they want to be true.”
A Chinese diplomat’s violent threat against Japanese Prime Minister Sanae Takaichi following her remarks on defending Taiwan marks a dangerous escalation in East Asian tensions, revealing Beijing’s growing intolerance for dissent and the fragility of regional diplomacy. Chinese Consul General in Osaka Xue Jian (薛劍) on Saturday posted a chilling message on X: “the dirty neck that sticks itself in must be cut off,” in reference to Takaichi’s remark to Japanese lawmakers that an attack on Taiwan could threaten Japan’s survival. The post, which was later deleted, was not an isolated outburst. Xue has also amplified other incendiary messages, including one suggesting
Chinese Consul General in Osaka Xue Jian (薛劍) on Saturday last week shared a news article on social media about Japanese Prime Minister Sanae Takaichi’s remarks on Taiwan, adding that “the dirty neck that sticks itself in must be cut off.” The previous day in the Japanese House of Representatives, Takaichi said that a Chinese attack on Taiwan could constitute “a situation threatening Japan’s survival,” a reference to a legal legal term introduced in 2015 that allows the prime minister to deploy the Japan Self-Defense Forces. The violent nature of Xue’s comments is notable in that it came from a diplomat,
Before 1945, the most widely spoken language in Taiwan was Tai-gi (also known as Taiwanese, Taiwanese Hokkien or Hoklo). However, due to almost a century of language repression policies, many Taiwanese believe that Tai-gi is at risk of disappearing. To understand this crisis, I interviewed academics and activists about Taiwan’s history of language repression, the major challenges of revitalizing Tai-gi and their policy recommendations. Although Taiwanese were pressured to speak Japanese when Taiwan became a Japanese colony in 1895, most managed to keep their heritage languages alive in their homes. However, starting in 1949, when the Chinese Nationalist Party (KMT) enacted martial law
“Si ambulat loquitur tetrissitatque sicut anas, anas est” is, in customary international law, the three-part test of anatine ambulation, articulation and tetrissitation. And it is essential to Taiwan’s existence. Apocryphally, it can be traced as far back as Suetonius (蘇埃托尼烏斯) in late first-century Rome. Alas, Suetonius was only talking about ducks (anas). But this self-evident principle was codified as a four-part test at the Montevideo Convention in 1934, to which the United States is a party. Article One: “The state as a person of international law should possess the following qualifications: a) a permanent population; b) a defined territory; c) government;