{"id":1626,"date":"2016-12-19T17:25:06","date_gmt":"2016-12-19T20:25:06","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=1626"},"modified":"2016-12-19T17:25:06","modified_gmt":"2016-12-19T20:25:06","slug":"estamos-en-una-nueva-era-de-espionaje","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=1626","title":{"rendered":"\u00bfEstamos en una nueva era de espionaje?"},"content":{"rendered":"<p>Michael Morell, ex director interino de la CIA, fue interrogado sobre las conclusiones de la comunidad de inteligencia referido a la interferencia de Rusia en las elecciones presidenciales. Su respuesta fue inequ\u00edvoca: El pa\u00eds no est\u00e1 comprendiendo la magnitud de la historia. &#8216;Para m\u00ed, y esto no es para m\u00ed una exageraci\u00f3n, este es el equivalente pol\u00edtico del 11-S&#8217;.<!--more--><\/p>\n<div class=\"grid_8 d1-article article dont-miss-compare-with\">\n<article class=\"\">\n<div class=\"text d1-article-content\">\n<p>This weekend, Michael Morell, the former acting director of the <span class=\"caps\">CIA<\/span>, was asked about the intelligence community\u2019s findings that Russia interfered in the presidential election. His answer was unequivocal: The country isn\u2019t grasping the magnitude of the story,\u00a0<a href=\"https:\/\/www.thecipherbrief.com\/article\/exclusive\/fmr-cia-acting-dir-michael-morell-political-equivalent-911-1091\">he told\u00a0<em>The Cipher Brief<\/em><\/a>.\u00a0\u201cTo me, and this is to me not an overstatement, this is the political equivalent of\u00a09\/11.\u201d<\/p>\n<p>Morell\u2019s comments went even further than what members of Congress\u2014mostly Democrats\u2014have been saying for months: that the Russian-directed cyberattacks are an unprecedented attack on American\u00a0democracy.<\/p>\n<p>In the heat of moment, it\u2019s easy to lose sight of the context around the Russian hacking operation. In spite of the distinctive 21st-century flavor of the digital intrusions, the data breaches that affected Democrats are just a modern example of routine country-on-country spying. What sets them apart, though, is the high profile of their mark\u2014an American presidential election\u2014and the hackers\u2019 willingness to leak stolen information to influence voters\u2019 opinions. Altogether, it\u2019s perhaps one of the greatest examples of a successful espionage operation in\u00a0history.<\/p>\n<p>It\u2019s useful to think of the operation as two distinct parts, says Vince Houghton, the International Spy Museum\u2019s historian and curator. The first part\u2014intrusions into the computer systems of the Democratic National Committee and the personal email of Hillary Clinton\u2019s senior campaign manager, John Podesta\u2014was intelligence-gathering, plain and simple. It\u2019s the sort of activity that every spy agency in the world engages in on a routine basis. Once, this required rifling through others\u2019 mail; later, as technology progressed, it involved tapping phones, and now, it can be done with\u00a0<a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2016\/12\/why-some-people-think-a-typo-cost-clinton-the-election\/510572\/\">a well-crafted phishing email<\/a>.<\/p>\n<p>The second part can be thought of as an enormous, state-on-state\u00a0<a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2014\/03\/doxing-an-etymology\/284283\/\">doxing<\/a>operation. Instead of sitting on the information stolen from the Democrats and using it to inform its policy positions and predict the <span class=\"caps\">U.S.<\/span> government\u2019s moves and motives, the Kremlin appears to have gone one (giant) step further, releasing that information into the wild. The <span class=\"caps\">U.S.<\/span> intelligence community\u00a0<a href=\"https:\/\/www.dhs.gov\/news\/2016\/10\/07\/joint-statement-department-homeland-security-and-office-director-national\">has determined<\/a>that publishing hacked documents through WikiLeaks, DCLeaks.com, and Guccifer 2.0 is \u201cconsistent with the methods and motivations of Russian-directed efforts.\u201d This week,\u00a0<em><a href=\"http:\/\/www.nbcnews.com\/news\/us-news\/u-s-officials-putin-personally-involved-u-s-election-hack-n696146\"><span class=\"caps\">NBC<\/span> News<\/a><\/em>\u00a0and\u00a0<em><a href=\"http:\/\/abcnews.go.com\/International\/officials-master-spy-vladimir-putin-now-directly-linked\/story?id=44210901\"><span class=\"caps\">ABC<\/span> News<\/a><\/em>\u00a0reported that Russian President Vladimir Putin was personally involved in directing the\u00a0operation.<\/p>\n<\/div>\n<\/article>\n<\/div>\n<div class=\"grid_8 d1-article article dont-miss-compare-with\">\n<article class=\"\">\n<div class=\"text d1-article-content\">\n<p>This is where things start to wander into uncharted territory, according to Houghton and Gordon Corera, the <span class=\"caps\">BBC<\/span>\u2019s security correspondent and the author of the espionage-history book,\u00a0<em>Cyberspies<\/em>.\u00a0The release of the surreptitiously gathered information, either to tip an election in one direction or just to sow disorder, is novel\u2014especially in the context of American elections. During the 2008 and 2012 cycles, political campaigns\u00a0<a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2016\/05\/foreign-hackers-may-be-targeting-us-presidential-candidates\/483324\/\">came under cyberattack<\/a>, but if anything was stolen, it was never shared with the\u00a0public.<\/p>\n<p>Despite the unique nature of this intervention, the 2016 cyberattacks square with Russian intelligence techniques reaching as far back as the Cold War. It\u2019s an evolution of the Soviet Union\u2019s \u201cactive measures,\u201d a tactic favored by the <span class=\"caps\">KGB<\/span> that involved covertly spreading politically damaging fictions in order to seed discord in an enemy. Houghton pointed to an example: Operation <span class=\"caps\">INFEKTION<\/span>,\u00a0<a href=\"https:\/\/www.cia.gov\/library\/center-for-the-study-of-intelligence\/csi-publications\/csi-studies\/studies\/vol53no4\/pdf\/U-%20Boghardt-AIDS-Made%20in%20the%20USA-17Dec.pdf\">a Soviet misinformation campaign<\/a>\u00a0in the 1980s that claimed the <span class=\"caps\">U.S.<\/span> Army had created the <span class=\"caps\">AIDS<\/span> virus at a research facility in Maryland. The Soviet Union pushed the story particularly hard in Africa, where <span class=\"caps\">AIDS<\/span> epidemics had broken out in several countries, and where the Kremlin was wrestling with the <span class=\"caps\">U.S.<\/span> for\u00a0influence.<\/p>\n<p>\u201cWhat we\u2019re seeing, essentially, is a long-running, old, traditional struggle, perhaps being conducted in new ways with new technology,\u201d said John Hughes-Wilson, a former British intelligence officer and the author of\u00a0<em>The Secret State<\/em>,\u00a0a history of espionage. \u201cDo you not think the <span class=\"caps\">CIA<\/span> is working hard\u2014I bloody well hope they are, actually\u2014to try and do stuff in Russia? I mean, why do you guys pay your taxpayer\u00a0dollars?\u201d<\/p>\n<p>Given the <span class=\"caps\">CIA<\/span>\u2019s history, it\u2019s not a stretch to assume that the agency is regularly taking covert action overseas, including around elections. Shortly after the <span class=\"caps\">CIA<\/span> was established in 1947, its agents poured money, propaganda, and even threats into Italy during its national elections, for example, in order to keep communist-aligned politicians from coming to power. In 1953, the <span class=\"caps\">CIA<\/span> teamed up with its British counterpart, <span class=\"caps\">MI6<\/span>, to overthrow Iranian Prime minister Mohammed Mossadegh and reinstate the Shah, who had been pushed out of power. And in the years since, it\u2019s\u00a0<a href=\"http:\/\/foreignpolicy.com\/2013\/08\/20\/mapped-the-7-governments-the-u-s-has-overthrown\/\">intervened repeatedly<\/a>\u00a0in other countries\u2019\u00a0affairs.<\/p>\n<p>Part of the reason Russia\u2019s alleged meddling this year seems so shocking is because the tables have turned. \u201cWe\u2019ve bought and sold elections in the past,\u201d says Houghton. \u201cBut now it\u2019s happening to us, and, as an American, that\u2019s different to\u00a0me.\u201d<\/p>\n<p>Even if Russia did aim to help Trump win the election, it\u2019s not clear how big a role the publication of the stolen documents played in swaying voters. But the intrusions certainly created confusion and chaos, and that may be just as useful to the Kremlin. Internal fractionalization could distract the <span class=\"caps\">U.S.<\/span> and allow Russia to act even more boldly on the international stage without fearing American\u00a0repercussions.<\/p>\n<p>\u201cHere, you have an information campaign that\u2019s now pitting the <span class=\"caps\">CIA<\/span> against the <span class=\"caps\">FBI<\/span>, Democrats against Republicans, even Republicans against Republicans. This is perfection. Perfection!\u201d exclaimed Houghton. \u201cIt\u2019s just right out of the\u00a0playbook.\u201d<\/p>\n<p>At this point, there\u2019s no indication (beyond\u00a0<a href=\"http:\/\/www.huffingtonpost.com\/entry\/harry-reid-russia-donald-trump_us_584f0df0e4b0e05aded537cd\">unsubstantiated claims<\/a>\u00a0from outgoing Senate Democratic Leader Harry Reid) that the Trump campaign coordinated with Russia, even if it benefited from its actions. The details about Russia\u2019s aims aren\u2019t entirely clear, because the <span class=\"caps\">CIA<\/span> has found itself\u00a0<a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/fbi-and-cia-give-differing-accounts-to-lawmakers-on-russias-motives-in-2016-hacks\/2016\/12\/10\/c6dfadfa-bef0-11e6-94ac-3d324840106c_story.html\">at odds with the <span class=\"caps\">FBI<\/span><\/a>\u00a0over its assessment that the Kremlin tried to help Trump\u00a0out.<\/p>\n<p>One of the key elements of the <span class=\"caps\">CIA<\/span>\u2019s determination\u2014the claim that\u00a0<a href=\"http:\/\/www.nytimes.com\/2016\/12\/09\/us\/obama-russia-election-hack.html\">the Republican National Committee was hacked, too<\/a>, but that Russian leaders chose not to leak any of that information\u2014is\u00a0<a href=\"http:\/\/www.thesmokinggun.com\/documents\/investigation\/rnc-e-mail-was-hacked-901763\">beginning to look more likely<\/a>. If it turns out to be true, the Trump administration may find itself in a bind going forward. Reince Priebus, who will be Trump\u2019s chief of staff, has been the chairman of the <span class=\"caps\">RNC<\/span> for six years. Internal <span class=\"caps\">RNC<\/span> communications and documents could contain embarrassing details that could hurt Priebus\u2014and which could be held over the administration\u2019s heads as blackmail once it\u2019s in the White\u00a0House.<\/p>\n<p>More information about the cyberattacks is forthcoming: President Obama\u00a0<a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2016\/12\/obama-orders-full-review-of-election-related-hacking\/510149\/\">ordered a review<\/a>\u00a0of election-related hacking last week, and Congress is\u00a0<a href=\"http:\/\/www.nytimes.com\/2016\/12\/12\/us\/politics\/mcconnell-supports-inquiry-of-russian-hacking-during-election.html\">launching multiple investigations<\/a>\u00a0into the developments as\u00a0well.<\/p>\n<p>Unless the probes turn up obvious evidence of collusion between Trump\u2019s team and the Russian hackers, it\u2019s unlikely the president-elect will face any repercussions. The reviews will, however, help inform how high-profile cyberattacks will be treated in the future. President Obama reportedly chose not to respond forcefully to Russian hacking, preferring instead to rebuke Putin in private on the sidelines of at a Group of 20 summit in China,\u00a0<a href=\"http:\/\/www.nytimes.com\/2016\/12\/13\/us\/politics\/russia-hack-election-dnc.html\"><em>The New York Times<\/em>\u00a0reported<\/a>.<\/p>\n<p>So far, it appears that Russia has gotten away with meddling in a <span class=\"caps\">U.S.<\/span> election. That may send a message to other countries that the <span class=\"caps\">U.S.<\/span> won\u2019t lash out after it comes under cyberattack if it\u2019s not politically convenient to do so. But it may also be that the <span class=\"caps\">U.S.<\/span> government just chose not to retaliate in a public\u00a0way.<\/p>\n<p>\u201c<span class=\"caps\">U.S.<\/span> officials I\u2019ve spoken to are cautious of responding \u2018in kind,\u2019 for instance by revealing embarrassing details of where Russian officials place their dirty money,\u201d wrote Corera, the security correspondent, in an email. \u201cThe fear is that doing this might establish a new norm that this kind of activity is now fair\u00a0game.\u201d<\/p>\n<p>The uncertainty surrounding cyberwar norms has a lot to do with how new the phenomenon is. Houghton compared it to the advent of nuclear weapons, when members of Congress struggled to grasp the impact the nuclear age would have on diplomacy and war. Eventually, Houghton said, we\u2019ll look back on 2016 to try and understand the beginnings of the an era defined by online warfare. \u201cThis is going to be something that we\u2019ll study for a long time,\u201d he\u00a0said.<\/p>\n<\/div>\n<\/article>\n<\/div>\n<p><strong>Fuente:<\/strong> <em><a href=\"http:\/\/www.defenseone.com\/technology\/2016\/12\/are-we-new-era-espionage\/133932\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.defenseone.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michael Morell, ex director interino de la CIA, fue interrogado sobre las conclusiones de la comunidad de inteligencia referido a la interferencia de Rusia en&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1626"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1626"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1626\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}