Start your day with intelligence. Get The OODA Daily Pulse.
With Vladamir Putin’s “landslide” victory in the Russian Presidential election in the rearview mirror (the victory extends Putin’s autocratic rule through 2030, which will be his 18th year as president), we provide some situational awareness RE: Putin’s ongoing, global cyber and disinformation offensives – and the drone swarm attacks that are proving the 21st Century organizing principle of his barbaric land war in Ukraine, the first in mainland Europe since WWII.
In our September 2021 analysis of the Russian Duma Election, a smart voting app, removed by U.S. tech giants, threatened Putin’s United Russia Party. In that election year, Russian Opposition Leader Alexei Nevalny was still alive and the Organization for Security and Cooperation in Europe (OSCE), for the first time since 1993, was not be able to observe the election due to restrictions imposed by Russian authorities. This year, both the OSCE and Nevalny were unable to bear witness to the “voting” process. Following are some insights on the election from credible global sources:
Amid ‘Repression And Intimidation,’ Putin Posts ‘Record’ Election Win
Fire, ink, Noon against Putin: How Russians resisted illegitimate elections
“…the assault involved 150 drones and missiles…”
March 29th – Ukraine says Russian drone and missile attacks damage power facilities: Massive Russian missile and drone attacks hit thermal and hydropower plants in central and western Ukraine overnight, officials said on Friday, in the latest barrage targeting the country’s already damaged power infrastructure. Kaniv hydropower plant was among the targets along with the Dnister plant, which is located on the Dnister River, flowing through neighboring Moldova, President Volodymyr Zelenskiy said. Last week, Russia also hit Ukraine’s largest dam, the DniproHES in the southern Zaporizhzhia region, eight times during a massive overnight attack. Regional officials said Russian forces had also attacked infrastructure overnight into Friday in the Kamianske district near the city of Dnipro. At least one person was wounded.
March 25th – In Overnight Drone Strikes, Moscow Keeps Up Assault On Ukraine’s Energy Grid: Fresh Russian drone strikes continued to target Ukraine’s energy and civilian infrastructure on March 25, causing blackouts in several regions and the capital, Kyiv. Air-raid signals sounded in the morning hours in Kyiv and several large explosions were reported. Officials reported that falling ballistic-missile debris had damaged a residential building and that at least 10 people were injured across the city. Air-raid warnings were also heard in nine other regions, including Kherson, Mykolayiv, Odesa, and Dnipropetrovsk. Russian drones overnight struck the southern city of Mykolayiv. The city’s mayor, Oleksandr Sienkevych, wrote on Telegram that 11 civilians were injured and several residential buildings damaged by “falling debris.”
March 22nd – Ukraine Hit By Widespread Blackouts After Massive Russian Assault: Many parts of Ukraine were experiencing blackouts after a massive wave of Russian strikes on March 22 targeted Ukraine’s energy infrastructure, killing at least four people, hitting the country’s largest dam, and temporarily severing a power line at the Zaporizhzhya nuclear plant. President Volodymyr Zelenskiy said the assault involved 150 drones and missiles and appealed again to Ukraine’s allies to speed up deliveries of critically needed ammunition and weapons systems.
‘We Were Outmanned’: Ukrainian Drone Operator Recounts Bloody Battle Of Avdiyivka: Ukrainian drone operator “Riko” recalls dropping explosives on Russian units even as control of Avdiyivka was being lost to them in February. His goal in the fight for the strategic city in the Donetsk region was to “hurt the enemy as much as possible.” This aerial specialist left a comfortable life in the Czech Republic to join Ukraine’s fight against the full-scale Russian invasion.
Writing with Invisible Ink: Russia’s Newest Disinformation Tactic
Dubbed ‘Invisible Ink,’ Alethea reports on Russia’s increased sophistication in disinformation campaigns, and the network itself signals a shift in Russia’s information operations objectives
In February and March 2024, Alethea identified 5,314 accounts on X (formerly Twitter) and 81 websites that we assess are seeking to divide Americans and amplify Russian propaganda—specifically counter-Ukraine messaging—ahead of the 2024 U.S. Presidential Election. Based on both the content shared and the behaviors of these assets, we believe that this network is leveraged by Russia’s main military intelligence directorate, commonly known as the GRU. We assess that this activity is a continuation of a persistent Russian influence operation known as Doppelgänger, which was initially exposed in 2022. This network is using a new tactic, which Alethea dubs “Invisible Ink,” an amplification tactic. The network appears to be evading detection by researchers, security firms, and its targets by copying and pasting specific tweet URLs in lieu of retweeting or posting, requiring threat intelligence teams to know the exact tweet URL to ID amplification accounts.
Background: Doppelgänger is a persistent influence campaign first publicly exposed in 2022 and currently active primarily on X which promotes narratives intended to undermine support for Ukraine among the U.S. and its allies, which—based on Alethea’s findings—is likely leveraged by the GRU. It has previously been linked to Structura and Social Design Agency, two Russian entities. The campaign’s main feature is the amplification of clones of legitimate news websites on social media by automated accounts, often known as “bots.” Throughout the investigation, Alethea identified links shared by Doppelgänger assets to Observateur Continental and EuroBRICs, part of the broader InfoRos network which was sanctioned by the U.S. Department of the Treasury in 2021 due to its affiliation with the GRU. This network targets conservative voters in the United States, and, to a lesser degree, Germany and France.
Why it Matters: The accounts in this network pose as conservative voters and amplify opposition to military aid funding to Ukraine. Past Russian information operations targeted both sides of the political spectrum to foment existing societal divisions. In this network, we assess that the operation targets more specific segments of the U.S. electorate in advance of the 2024 presidential election to promote candidates and policies favorable to Russian military objectives in Ukraine.
For the full report from Alethea, go to this link.
Two Russians sanctioned by the US for an alleged disinformation campaign
The disinformation network referred to as ‘Doppelganger’…is characterized as the largest and most doggedly persistent Russian-sponsored malign network.
From The Record: “The U.S. Treasury Department announced on Wednesday that it is sanctioning two Russian nationals and two companies for a disinformation campaign that allegedly sought to ‘impersonate legitimate media outlets.’ The sanctions name Ilya Andreevich Gambashidze and Nikolai Aleksandrovich Tupikin as the founders of two Russia-based companies that U.S. officials believe are involved in a ‘persistent foreign malign influence campaign at the direction of the Russian Presidential Administration.’ Why it matters:
Russia’s election-manipulation efforts aim to undermine Ukraine aid, NSA says
Thanks to AI, “They can have one person cranking out a lot of material.”
Russia, which has worked to sway U.S. elections since at least 2016, will focus this year on undermining U.S. political support for Ukraine, a top National Security Agency official said. “I think where we diverge in this election cycle is Russia is very motivated to make sure that the focus on support to Ukraine is disrupted. I think you’ll see the themes of their activities all pushed through a lens of ‘what is going to erode support for Ukraine’,” Rob Joyce, the NSA’s outgoing cybersecurity director, told reporters… Russia spends upwards of $1.5 billion per year to sway people’s opinions to support Russian interests, according to an October analysis from the Lithuanian think tank Debunk.org. That money goes, among other things, to produce televised propaganda via channels like RT and set up fake social media profiles.
Meanwhile, X/Twitter has far fewer safeguards to protect the service from manipulation by Russia and China since Elon Musk’s takeover in 2022, former employees and others have warned. For example, as many as one-third of the X interactions connected to one tweet from U.S. President Joe Biden about assassinated Russian dissident Alexei Navalny were fake, according to a recent report from risk analyst Ian Bremmer’s GZero media.
But Russia also uses information gathered from hacking to bolster specific narratives, such as the use of hacked DNC emails in the 2016 election to tip the race in favor of Donald Trump. Earlier this month, Germany said Russia used an intercepted phone call to attempt to divide Ukraine’s Western allies—which German officials characterized as an act of “information war.” Joyce warned that the rise of new consumer-facing AI tools, like ChatGPT, will allow Russia and other actors to scale up its disinformation efforts.
Researchers spot updated version of malware that hit Viasat
A new variant of the wiper malware used to disrupt Ukrainian military communications at the onset of the Russian invasion [has] emerged…demonstrating what researchers describe as the continuing development of a tool used to carry out one of the most notable cyberattacks of the war…[last week] a new variant of that malware was uploaded to VirusTotal, a malware information-sharing platform, and spotted by Tom Hegel, principal threat researcher at SentinelOne. Dubbed “AcidPour” by Hegel and his colleagues, the new variant is concerning because it has new features and could be used as part of a “larger service disruption by Russia” and wipe the contents of not just modems but a range of other devices, Hegel told CyberScoop in an email Monday.
Russian military intelligence may have deployed wiper against multiple Ukrainian ISPs
A group calling itself “Solntsepek” claimed credit on March 13 for disruptive attacks on four Ukrainian internet service providers: Triacom, Misto TV, Linktelecom, and KIM, claiming that they “provide Internet to government agencies, parts of the Armed Forces of Ukraine, as well as the TCC,” according to a machine translation of the message posted to the group’s Telegram channel. Solntsepek — an apparent hack-and-leak front controlled by Russian military intelligence (GRU) — claimed responsibility for a major attack on Kyivstar, Ukraine’s largest telecommunications provider, in December. Illia Vitiuk, the head of the Security Service of Ukraine’s (SBU) cybersecurity department, said at the time that the attack had been carried out by the Russian military intelligence hacking unit known widely as Sandworm. Juan Andrés Guerrero-Saade and Tom Hegel, researchers with SentinelOne’s SentinelLabs, first identified on Monday what’s likely an updated version of AcidRain, the malware used by the Russian military to disable thousands of KA-SAT modems associated with Viasat as the country’s armed forces invaded Ukraine on Feb. 24, 2022. The new variant, dubbed “AcidPour,” displayed an expanded set of capabilities and potential targeting capabilities.
AcidRain | A Modem Wiper Rains Down on Europe
The AcidRain assessment from Sentinel Labs:
“A lot of people are helping us in OSINT (open-source intelligence gathering) delivering…truth on Russian war crimes in Ukraine to Russian audiences [countering] the constant lies [of the] Russian media.”
– Victor Zhora
Zhora referenced the “IT Army” — a broad collection of volunteers who have joined a Telegram channel that shares potential targets and updates on cyber issues, such as possible distributed denial-of-service targets — but he did not talk about offensive hacking efforts reportedly coordinated through the Ukrainian defense ministry in conjunction with Ukrainian cybersecurity expert Yegor Aushev, as reported by Reuters. Zhora said …that IT Army volunteers are conducting other operations besides offensive actions. “A lot of people are helping us in OSINT,” he said, referring to open-source intelligence gathering, “in delivering of truth, of real content on Russian war crimes in Ukraine to Russian audiences which is hidden behind constant lies behind Russian media.”
…the Russian deployment of drone swarms in Ukraine serves as a stark reminder of the rapidly evolving nature of warfare…
The implications of Russian drone swarm capabilities extend beyond the immediate tactical advantages on the battlefield. They signal a shift towards a future where autonomous systems play an increasingly central role in conflict, raising critical questions about the nature of warfare, the ethics of autonomous weapons, and the global balance of power:
Such campaigns are not merely technical feats but strategic operations aimed at…potentially pre-positioning for future cyber conflicts.
Russian cyber operations have demonstrated a sophisticated approach to human targeting, social engineering, and cyber espionage, reflecting a deep understanding of the digital domain’s strategic importance. These operations reflect a broader trend of increasing brazenness and proficiency in Russian cyber activities. The evolution of these tactics, including the shift towards more sophisticated social engineering techniques and the execution of complex cyber espionage campaigns, poses significant challenges to global security and stability. The adaptability and resourcefulness of Russian cyber operations necessitate a vigilant and dynamic from the international community.
These efforts are not isolated incidents but part of a broader strategy to undermine adversaries, gather intelligence, and influence global events in Russia’s favor:
NOTE: This OODA Loop Original Analysis was partially generated with the cognitive augmentation of and in collaboration with ALTzero Project – MattGPT.
The Drone Swarm Architecture Will Transform U.S. Warfighting Capacity: Lieutenant General (ret.) Clint Hinote, U.S. Air Force and Major General (ret.) Mick Ryan, Australian Army – Special Advisors to the Special Competitive Studies Project (SCSP) – have co-authored a paper on “Uncrewed systems—which are now undergoing a form of Cambrian Explosion in capability, quality, and quantity…these systems are disrupting how combatants are considering risk, cost, and authority on the modern battlefield.” Find their framing and insights here.
The Defense Intelligence Agency on the Iranian-backed Drone Power of Russia and the Houthis: Two recently declassified Defense Intelligence Agency (DIA) reports extensively detail the Iranian-backed drone capabilities fueling the reconfiguration of global warfare into a drone swarm architecture – fueling what John Robb has framed as the future: asymmetric, non-nation-state kinetic capabilities organized into drone swarms enhancing the ability for warfighting capabilities “networked tribes” and “global guerrillas” usurping that of traditional military doctrine and the monopoly on the threat of violent conflict traditionally held exclusively by nation-states.
Drones and Port Security: OODA Network Members John P. Sullivan and George W. Davis, along with co-author Tom Adams, have penned a report based on a geospatial security assessment for the Port of Brownsville, Texas (which “holds the distinction of being the sole deep-water port situated directly on the US-Mexico border”). Details of the report here.
The Network Swarm Attack on Israel and the Escalating Global Networked War: Intelligence Failure? Black Swan? Gray Rhino? Systemic Failure? An entropic, sclerotic Israeli political system? The geopolitical and regional power context for the recent surprise, large scale and violent Hamas attack on Israel may prove to be “all of the above”. What is clear is the attack was designed as a large-scale, kinetic, and digital “network swarm” – which now opens up a new, “formal” kinetic front in the ongoing, global networked war in the Middle East. Swarm dynamics are a crucial mental model – which we apply here to the Hamas network swarm attack on Israel.
Russian Invasion of Ukraine: Russia’s aggression against Ukraine prompts global repercussions on supply chains and cybersecurity. This act highlights potential threats from nations like China and could shift defense postures, especially in countries like Japan. See: Russia Threat Brief
Israel and Gaza: The horrors of war in the region are also giving rise to uncertainty in markets, but for now it seems the war will not spread throughout the Middle East. Many initiatives between Israel and Arab/Persian nations have been stalled due to the war.
Economic Weakness in China: China’s economy faces dim prospects exacerbated by disasters, COVID-19, and geopolitical tensions. Amid limited financial transparency, some indicators suggest China’s economic growth is severely stunted, impacting global economic stability. See: China Threat Brief
Networked Extremism: The digital era enables extremists worldwide to collaborate, share strategies, and self-radicalize. Meanwhile, advanced technologies empower criminals, making corruption and crime interwoven challenges for global societies. See: Converging Insurgency, Crime and Corruption
Food Security and Inflation: Food security is emerging as a major geopolitical concern, with droughts and geopolitical tensions exacerbating the issue. Inflation, directly linked to food security, is spurring political unrest in several countries. See: Food Security
Demographic Time Bomb: Industrialized nations face demographic challenges, with a growing elderly population outnumbering the working-age demographic. Countries like Japan and China are at the forefront, feeling the economic and social ramifications of an aging society. See: Global Risks and Geopolitical Sensemaking
Geopolitical-Cyber Risk Nexus: The interconnectivity brought by the Internet has made regional issues affect global cyberspace. Now, every significant event has cyber implications, making it imperative for leaders to recognize and act upon the symbiosis between geopolitical and cyber risks. See The Cyber Threat
Embracing Corporate Intelligence and Scenario Planning in an Uncertain Age: Apart from traditional competitive challenges, businesses also confront external threats, many of which are unpredictable. This environment amplifies the significance of Scenario Planning. It enables leaders to envision varied futures, thereby identifying potential risks and opportunities. All organizations, regardless of their size, should allocate time to refine their understanding of the current risk landscape and adapt their strategies. See: Scenario Planning