Submit your essay to the AI-Cybersecurity Essay Prize Competition by January 2, 2025.
The AI-Cybersecurity Essay Prize Competition

Russia‘s strategic culture drives its foreign hacking

Monica Kello explores the cultural forces behind Russia’s foreign cyber operations
Main Top Image
Image created with the assistance of Midjourney

The United Kingdom’s National Crime Agency on December 7 uncovered a years-long cyber campaign by Centre 18 of the Russian Federal Security Service (FSB) to influence democratic processes through ‘hack and leak’ operations. In response, the UK government sanctioned two Russians involved in the operations and summoned the Russian ambassador to the foreign office.

Russia’s reaction was predictable: its foreign ministry released a statement accusing the United Kingdom of making “groundless accusations based on myths”. The UK government had fallen back a familiar playbook: a combination of public shaming and economic penalties targeting individual operatives. Although such measures demonstrate the United Kingdom’s impressive intelligence capabilities, they are highly unlikely to influence the Russian decision-making calculus.

Strategic culture

Russian foreign hacking is propelled by the nation’s strategic culture – collectively held ideas about national security and geopolitical competition that, like culture more broadly, “do not vary in the face of environmental or structural changes” and which are “particular to individual states”. These ideas are generally derived from a nation’s historical experiences over a long period (often centuries or even millennia). To understand Russia’s hacking operations, it helps to examine the cultural forces fuelling them on three levels: the perception of an external existential threat, a sense of national paranoia, and a cult of assertive action.

Existential threat

The notion that Russia is besieged by existential foes dominates the country’s perception of the external security environment. Centuries of wars, difficulties in defending Russia’s borders, and extreme climatic conditions produced what some have referred to as a “militarization of the [Russian] consciousness”. Russian leaders even now often evoke the Soviet Union’s heroic victory over Nazi Germany in World War Two – which Russians refer to as the “Great Patriotic War” – to stir feelings of encirclement. Recent poll data indicates that the Russian public is particularly fearful of NATO (and that NATO should fear Russia).

National paranoia

The belief that Russia is besieged by external enemies and has historically been victimised creates a sense of national paranoia and a psyche of insecurity, both of which are reinforced by the regime to ensure its survival. President Vladimir Putin is not only concerned about losing influence over neighbouring buffer states (such as Ukraine or Belarus) but also about a Western-instigated revolution at home. Zvezda, a media network run by the Russian Ministry of Defence, often reminds Russians that their grandfathers, whose blood “today beats in our veins,” fought fearlessly over centuries to defend the motherland’s right to exist from countless foreigners who “came to us with weapons in their hands”. Cyber operations, like all other Russian aggressions, are seen as serving a defensive function against the enemy’s relentless encroachment.

Intrinsic to this paranoia is the notion of Russian exceptionalism, with roots in the religious heritage of Holy Rus’ (Holy Russia) and Moscow as the ‘Third Rome’. Russia perceives itself as a “shield to defend civilization”. An article by Sergei Lavrov, Russia’s foreign minister, expounded the country’s “special role in European and global history”.

Belief in the existence of a russkiy mir (‘Russian world’) feeds an innate suspicion of the West and its ‘rotten‘ value system. For ‘besieged Russia’, protecting the russkiy mir is an existential mission. This messianic fervour is further reinforced by the bitterness generated by the collapse of the Soviet Union and Russia’s consequent loss of great power status, which over time has produced a “collective trauma”.

Cult of assertive action

The besieged mentality, national paranoia, and belief in exceptionalism contribute to a Russian security culture that values creative thinking, an eagerness to experiment, and a constant drive to exploit opponents’ weaknesses. Military romanticism also feeds into a societal cult of assertive action (although that is always justified as serving defensive purposes). In Russia, action is always preferable to inaction. Or in the words of a Baltic counterintelligence officer, Russia is a country “whose citizenry primarily adheres to a code of force”.

Unanticipated diplomatic fallout from risk-taking is par for the course. Putin himself has referred to the well-known Russian phrase ‘He who doesn’t take risks, never drinks champagne’. Operations need not follow a coherent logic – their seeming irrationality is intentional and serves to sow confusion. Indeed, “chaos is a trait of Russian culture”, according to Alexander Toots, the deputy head of the Estonian domestic intelligence service.

Interference in democracies

This strategic culture orients Russian interference in foreign democracies. Operatives are engaged in a perpetual campaign of subversion. They search for any creative opportunity to undermine their enemies from within and thereby strengthen Russia. The potential international outrage and repercussions that their actions may provoke are, for the most part, disregarded.

The country’s cultural paranoia means that it continually feels assaulted by the West imposing an alternative liberal ideology on its people and making Russia look weak. One of the regime’s biggest fears is information distribution and, concretely, true information that might destabilise the political order at home, especially amidst a decades-long dire economic situation. In response, it relishes psychological cyber operations and political warfare against its adversaries – manipulating people’s beliefs and their confidence in domestic authorities.

Rivalry with the United Kingdom

The United Kingdom is an especially attractive target for this kind of subversion.

Firstly, the British government’s reluctance to investigate Russian interference in the 2016 Brexit referendum may have inadvertently furthered Russia’s objectives and encouraged further interference. Russian military expert Keir Giles astutely observed that “confidence in democracy depends on confidence that it has not been compromised”.

Secondly, there is a long history of intelligence rivalry between the United Kingdom and Russia – think of how British intelligence agencies exposed one of the Soviet Union’s most valuable spies, Klaus Fuchs, and how the KGB ran Kim Philby successfully for years.

Thirdly, the United Kingdom has been at the forefront of the European response to the Russian invasion of Ukraine. For example, it supplied Ukraine with depleted uranium tank shells, which particularly provoked Putin’s ire.

We should not underestimate the cumulative cognitive effects of Russia’s cyber operations. Continuous hacking undermines the resilience of our societies and trust in our political leaders and democratic systems. As part of a new national security bill, the United Kingdom has criminalised sabotage via cyber operations. In 2024 it is also bringing into force new legislation called the ‘Foreign Influence Registration Scheme, a system to register political influence activities in the United Kingdom at the direction of a foreign power.

These are long overdue steps in the right direction, but they won’t discourage Russian cyber operations for the cultural reasons I discussed. The British government itself admitted that Moscow will continue to seek to meddle in its domestic politics using cyber means.

How should the UK government respond? To begin with, it should conduct a transparent probe into the consequences of Russian hacks and leaks to substantiate Foreign Secretary David Cameron’s claim that Russian interference had “failed” and strengthen trust in democratic institutions against Russian campaigns. But more importantly, Russian cultural paranoia can be used against it to frustrate future operations.

 Reverse-engineering cultural paranoia

Mistrust is prevalent within Russian intelligence agencies, which have been beset by failures and humiliation in Ukraine, culminating in mass dismissals. We also know that there is a general unwillingness among intelligence officials to feed realistic assessments up the chain of command, preferring instead to misrepresent the agencies’ achievements to placate superiors.

Among Russian society more broadly, there has been a rise in denunciations among ordinary citizens reminiscent of the Soviet era. The regime has also introduced legislation encouraging informing – a clear sign that it fears internal dissent and its own weakness.

The UK National Cyber Force’s “doctrine of cognitive effect” can capitalise on those trends – the paranoia and its associated tendencies. It might involve, for example, introducing what Richard Harknett and Emily Goldman have called “friction” into the adversary’s operating environment by undermining confidence in systems, technology, and data. It might also include more human-oriented operations which exploit the mistrust that already plagues the FSB by targeting key individual malware developers. It could also seek to undermine the relationships with criminal actors, companies, and other collaborators that the intelligence agencies lean on to conduct sophisticated campaigns.

Keeping Russian operators busy by exploiting their cultural proclivities is likely to be a more effective strategy to address Russian cyber activity than public shaming or targeted sanctions.

Funding for the research presented in this article was provided to ECCRI by UK Research and Innovation (UKRI), as a member of the consortium for the Horizon Europe project Reigniting Multilateralism Through Technology (REMIT). REMIT research is conducted under the umbrella of the European Union’s Horizon Europe research and innovation program, grant agreement No 101094228. UKRI’s support to the project does not necessarily represent an endorsement of its findings. The views expressed in this article are those of the author.

Terms and Conditions for the AI-Cybersecurity Essay Prize Competition

Introduction

The AI-Cybersecurity Essay Prize Competition (the “Competition”) is organized by Virtual Routes (“Virtual Routes”) in partnership with the Munich Security Conference (“MSC”). It is sponsored by Google (the “Sponsor”). By entering the Competition, participants agree to these Terms and Conditions (T&Cs).

Eligibility

The Competition is open to individuals worldwide who are experts in the fields of cybersecurity and artificial intelligence (“AI”). Participants must ensure that their participation complies with local laws and regulations.

Submission Guidelines

Essays must address the question: “How will Artificial Intelligence change cybersecurity, and what are the implications for Europe? Discuss potential strategies that policymakers can adopt to navigate these changes.”

Submissions must be original, unpublished works between 800-1200 words, excluding footnotes but including hyperlinks for references.

Essays must be submitted by 2 January 2025, 00:00 am CET., through the official submission portal provided by Virtual Routes.

Only single-authored essays are accepted. Co-authored submissions will not be considered.

Participants are responsible for ensuring their submissions do not infringe upon the intellectual property rights of third parties.

Judging and Awards

Essays will be judged based on insightfulness, relevance, originality, clarity, and evidence by a review board comprising distinguished figures from academia, industry, and government.

The decision of the review board is final and binding in all matters related to the Competition.

Prizes are as follows: 1st Place: €10,000; Runner-Up: €5,000; 3rd Place: €2,500; 4th-5th Places: €1,000 each. The winner will also be invited to attend The Munich Security Conference

Intellectual Property Rights

The author retains ownership of the submitted essay.

By submitting the essay, the author grants Virtual Routes exclusive, royalty-free rights to use, reproduce, publish, distribute, and display the essay for purposes related to the Competition, including but not limited to educational, promotional, and research-related activities.

The author represents, warrants, and agrees that no essay submitted as part of the essay prize competition violates or infringes upon the rights of any third party, including copyright, trademark, privacy, publicity, or other personal or proprietary rights, breaches, or conflicts with any obligation, such as a confidentiality obligation, or contains libellous, defamatory, or otherwise unlawful material.

The author agrees that the organizers can use your name (or your pseudonym) and an image of you in association with your essay for purposes of publicity, promotion and any other activity related to the exercise of its rights under these Terms.

The organizers may remove any essay-related content from its platforms at any time and without explanation.

The organizers may block contributions from particular email or IP addresses without notice or explanation.

The organizers may enable advertising on its platforms and associated social media accounts, including in connection with the display of your essay. The organizers may also use your Material to promote its products and services.

The organizers may, at its sole discretion, categorise Material, whether by means of ranking according to popularity or by any other criteria.

Data Protection

Personal information collected in connection with the Competition will be processed in accordance with Virtual Routes’ Privacy Policy. Participants agree to the collection, processing, and storage of their personal data for the purposes of the Competition.

Liability and Indemnity

Virtual Routes, MSC, and the Sponsor will not be liable for any damages arising from participation in the Competition, except where prohibited by law.

Participants agree to indemnify Virtual Routes, MSC, and the Sponsor against any claims, damages, or losses resulting from a breach of these T&Cs.

General Conditions

Virtual Routes reserves the right to cancel, suspend, or modify the Competition or these T&Cs if fraud, technical failures, or any other factor beyond Virtual Routes’ reasonable control impairs the integrity or proper functioning of the Competition, as determined by Virtual Routes in its sole discretion.

Any attempt by any person to deliberately undermine the legitimate operation of the Competition may be a violation of criminal and civil law, and, should such an attempt be made, Virtual Routes reserves the right to seek damages from any such person to the fullest extent permitted by law.

Governing Law

These Terms and Conditions are governed by the laws of the United Kingdom, without regard to its conflict of law principles. Any dispute arising out of or in connection with these Terms and Conditions, including any question regarding its existence, validity, or termination, shall be referred to and finally resolved by the courts of the United Kingdom. The participants agree to submit to the exclusive jurisdiction of the courts located in the United Kingdom for the resolution of all disputes arising from or related to these Terms and Conditions or the Competition.