Daily Bulletin

  • Written by David Glance, Director of UWA Centre for Software Practice, University of Western Australia
image

As one of his parting acts as US President, Barack Obama retaliated against alleged Russian interference in the recent US election by expelling 35 Russian government officials from the US and placing sanctions on Russian security agencies, 3 companies and several individuals.

One of the companies included on the sanctions list was Zorsecurity (also known as Esage Lab) which was set up by a Russian programmer Alisa Shevchenko. According to the White House, Zorsecurity was included because it had provided the GRU (one of Russia’s military intelligence services) “with technical research and development”.

And that was it. Except that Shevchenko has vehemently denied that she has worked for the Russian government stating that “We don’t make malware for the Russian government”.

The difficulty for Shevchenko is that she simply doesn’t know what being placed on a sanctions list means for her personally. To be clear, there was no trial, no evidence presented publicly, nor was there an opportunity to provide a defence, there was simply an accusation and a listing on a public announcement.

What makes this particularly frustrating for Shevchenko is that the company listed doesn’t actually trade any more and so from one perspective the entire matter is moot.

It seems extraordinary that high stakes response to the Russian government and Russian President Vladimir Putin should have on the one hand two of Russia’s secret service agencies, the FSB and GRU and on the other hand a defunct company run at one time by a solitary Russian hacker with a handful of employees.

It has been argued that the evidence put forward to tie the Russian intelligence services with the hack of the Democratic National Committee (DNC) was not definitive enough to prove the link. Evidence for Russian involvement comes essentially from comparing the malware and techniques used by the hackers to previous hacks believed to be by specific groups, in this case from two groups called APT 28 (Aka Fancy Bear) and APT 29 (Aka Cozy Bear). These groups in turn are thought to be associated with the GRU (APT 28) and FSB (APT 29).

Whilst the debate continues of whether the evidence presented is actually sufficient to definitively tie specific groups to the hack, none of the evidence presented ties in with Shevchenko and Zorsecurity.

Shevchenko’s situation highlights the perils of being associated with cybersecurity even if you are one of the good guys, the so-called “White Hat” hackers. She is a self-taught and talented programmer who specialises in finding “zero-day” exploits. Whilst these exploits can, and are, used by criminals and spies, they can also be used to probe weaknesses in corporate networks as part of what is called penetration testing. In fact, Shevchenko has publicly contributed to finding and reporting vulnerabilities in energy management software and Microsoft Windows.

It is possible that some of her software or exploits were used by the GRU and FSB (and others) in gaining access to the DNC and other targets, however that is a different matter to her, or the company actively working with these agencies. Given the large number of companies and people who could potentially be involved with hacking on behalf the Russian services, it seems gratuitous that the US would single out a solitary female hacker to shoulder the entire blame.

The irony here is that in his rush to publicly be seen to respond to Russian hacking, Obama has sought to punish a female programmer working in cybersecurity. A key tenant of his presidency was to try and boost the participation of women in the tech industry with his own secret service agency the NSA employing hackers in their ongoing struggle to recruit real talent.

Not only is Shevchenko in a minority of women working in this area of programming but she has been extremely active in engaging in conferences and the open source community to develop and contribute software, knowledge and expertise. Alisa Shevchenko was also one of the founders of a community “hack space” Neuron Hackspace. None of this particularly suggested an idealogue dedicated to the hacking of the DNC.

Inadvertently perhaps, Obama has sent a clear message of the dangers for cybersecurity experts in becoming collateral damage in the political battles between the US, Russia and China. Just possibly, he has also just reinforced the extra dangers for women who stand out from the crowd?

In an additional irony, it may be that incoming US President Donald Trump will come to Shevchenko’s aid. He has indicated that he may reverse Obama’s sanctions against the Russians, especially if the Russians collaborate with the US against terrorism.

Authors: David Glance, Director of UWA Centre for Software Practice, University of Western Australia

Read more http://theconversation.com/why-did-us-president-obama-seek-to-punish-female-russian-hacker-alisa-shevchenko-71321

Business News

A Guide to Finance Automation Software

When running a business, it is critical to streamline certain processes to maintain efficiency. Too much to spent manually on tasks can wind up being detrimental to the overall health of the organis...

Daily Bulletin - avatar Daily Bulletin

Top Tips for Cost-effective Storefront Signage

The retail industry is highly competitive and if you are in the process of setting up a retail store, you have come to the right place, as we offer a few tips to help you create a stunning storefront...

Daily Bulletin - avatar Daily Bulletin

How Freight Forwarding Simplifies Global Trade Operations

Global trade operations are becoming increasingly complex due to international regulations, customs procedures, and the sheer scale of global logistics. For businesses looking to expand internation...

Daily Bulletin - avatar Daily Bulletin