Cyberwarfare leaks show Russian army is adopting mindset of secret police

Documents leaked from Vulkan cybersecurity firm also raise questions about role of IT engineers behind information-control project

A consortium of media outlets have published a bombshell investigation about Russia’s cyber-capabilities, based on a rare leak of documents. The files come from NTC Vulkan, a cybersecurity firm in Moscow that doubles as a contractor to Russian military and intelligence agencies.

They reveal how, for years, a group of top Russian IT engineers have been hired to work with Russian military intelligence and a research facility of the FSB, Vladimir Putin’s domestic spy agency. This might seem an unusual mix, and would have been unimaginable before the end of the cold war.

But the documents, which I have reviewed, depict a new world of collaboration between the Russian military and its secret police. And they show how much more aggressive Putin’s siloviki, or security forces, have become since the collapse of the Soviet Union.

Historically, there was never much love between the Russian army and secret police – and for a good reason. The army had never forgotten Joseph Stalin’s murderous purges, and after the revolutionary dictator’s death the KGB (the FSB’s predecessor) retained powers to keep an eye on the military. Nobody likes having someone breathing down their neck.

Russia’s army and its secret police did not just hate each other; they viewed the world through different lenses. Putin’s era brought about new rules and a new mentality, as the Vulkan files make clear.

Take the Amezit project. Vulkan received a contract for the development of Amezit from the Rostov Scientific Institute, one of the very few Russian research facilities directly owned by the FSB. Amezit was developed as a tool that would give an operator the means to take control of all kinds of cyber-traffic in a region – from mobile networks to social media – and, if necessary, to isolate that region from the outside world and create an information blackout.

In a nutshell, Amezit’s goal is information control; not just suppressing independent information, but defining the narrative. A subsection of the project, PRR, was developed to allow the operator to spread disinformation on social media.

It sounds like textbook FSB, which is in charge of conducting surveillance in Russia, and has always considered the free flow of information to be a direct threat to the stability of the government.

But Amezit was not intended for FSB use – the Rostov institute was acting as a front for the Russian military. It was the military that commissioned the development of a system to help its personnel quickly take control over sections of cyberspace.

This might seem the kind of tool the Russian army would want to quickly commission for use in Ukraine. But the documents show that this kind of mindset was adopted by the military six years before Russia’s 2022 invasion.

The leaked files also suggest the Russian army long ago abandoned Soviet-era limitations on offensive weapons only being used in a time of war. The borders between war and peace in Russia are not just blurred, they are nonexistent.

And that makes the present-day army’s mindset much closer to that of the secret police. The military do not have second thoughts about using tools that would introduce censorship and information blackouts, coupled with the spreading of disinformation on Russian soil or anywhere else it may be deployed.

The Vulkan files also raise difficult questions about how much the software engineers who helped build these systems knew about their purpose.

Some of the engineers must surely have understood the significance of the tools they were creating. Their company was licensed by the FSB, with high security clearance. Relevant personnel were fully briefed about the need to protect secrecy, and to ensure they remembered what was at stake. There were even FSB officers in-house.

Some of Vulkan’s programmers were graduates of technical universities such as Bauman, which has a longstanding connection with the military. They were direct products of a peculiar Soviet system for creating engineers who were expected to behave as technical servants of the state’s military-industrial complex.

For decades, Soviet engineers were schooled intensively in technical skills, but the breadth of their education was narrow. They were taught to work on projects without questioning the bigger picture. Rarely, if ever, were they exposed to the humanities. In return for their loyalty, they were treated with respect and paid relatively good salaries.

That education model was never changed after the collapse of the Soviet Union. New generations of engineers emerged, specialising in computer programming. Many were driven not by ideology but anger, having come to blame the west for their loss of social status.

Putin and his military and security services exploited this resource. When government funding was once again poured into military projects, Russian IT engineers made for enthusiastic recruits, and eventually private companies such as Vulkan were launched to fortify military and security research.

But unlike during the cold war, the new generation of engineers are not blinkered specialists trained to work with outdated Soviet technologies. They are well versed in western technology (Amezit would not be possible on exclusively Russian software), well educated and globally connected.

The leak shows that Vulkan’s engineers made a point of frequenting IT conferences around the world. Some of them have left Russia and found jobs in international companies, such as Siemens and Amazon.

Siemens declined to comment on individual employees but said it took such questions “very seriously”. Amazon said it implemented “strict controls”, adding that protecting customer data was its “top priority”.

Interactive

If they have not already, other engineers working for state-sanctioned companies such as Vulkan may still decide to leave Russia, fearing mobilisation into the army for the war against Ukraine.

All of which poses difficult questions. Are some ex-Vulkan employees a security risk? Is it safe or ethical to employ a Russian engineer with a background in information security, which in Moscow often means working for a company such as Vulkan?

Even if an engineer leaves Russia and takes their immediate family with them, they will still have friends and relatives back home, which could make them vulnerable. On the other hand: is it wise, or even fair, to return IT engineers to Russia because of their former employment, given what would await them? The Kremlin, after all, views these engineers as pawns whose duty it is to help the Russian war effort.

  • Andrei Soldatov is the author of The Compatriots: The Russian Exiles Who Fought Against the Kremlin

Contributor

Andrei Soldatov

The GuardianTramp

Related Content

Article image
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
Vulkan engineers have worked for Russian military and intelligence agencies to support hacking operations, prepare for attacks on infrastructure and spread disinformation

Luke Harding, Stiliyana Simeonova, Manisha Ganguly and Dan Sabbagh

30, Mar, 2023 @3:00 PM

Article image
German spy chief says Russian hackers could disrupt elections
Cyber-attacks aim to delegitimise democratic process and elicit political uncertainty, says Bruno Kahl

Kate Connolly in Berlin

29, Nov, 2016 @3:34 PM

Article image
The Guardian view on internet security: complexity is vulnerable | Editorial
Editorial: A huge weakness in wifi security erodes online privacy. But the real challenge is designing with human shortcomings in mind

Editorial

19, Oct, 2017 @6:39 PM

Article image
Russian hackers suspected of Kremlin ties used Windows bug ‘to spy on west’
Cyber-threat intelligence firm iSight says ‘Sandworm Team’ used unknown bugs from 2009 to steal EU and Nato documents

Alec Luhn in Moscow

14, Oct, 2014 @5:41 PM

Article image
Passwords, phones and privacy settings: how to protect yourself online
Stay safer on the internet with these tips on shoring up your digital security, and join our live Q&A on the issue at 2pm today

Zoe Williams

19, Apr, 2016 @10:00 AM

Article image
Erasing your digital footprint: burner phones, Bitcoins and metal wallets
From mobile phones to CCTV, not to mention social media and the internet, becoming digitally invisible takes some doing

Zoe Williams

21, Jun, 2013 @6:43 PM

Article image
Google warns of surge in activity by state-backed hackers
More than 50,000 alerts sent so far this year, including of an Iranian group that targeted a UK university

Dan Milmo Global technology editor

15, Oct, 2021 @12:00 PM

Article image
How tiny Estonia stepped out of USSR's shadow to become an internet titan

The European country where Skype was born made a conscious decision to embrace the web after shaking off Soviet shackles
Eesti keel | Estonian language version

Patrick Kingsley

15, Apr, 2012 @5:51 PM

Article image
Nato must defend western democracy against Russian hacking, say Fallon
UK defence secretary accuses Moscow of ‘weaponising misinformation’ to disable democratic machinery

Ewen MacAskill Defence correspondent

03, Feb, 2017 @8:12 AM

Article image
Why it’s dangerous to blame internet firms for Lee Rigby’s murder
Alan Travis: Outrageous claims by the intelligence and security committee threaten goodwill that exists among internet firms and UK police

Alan Travis, home affairs editor

25, Nov, 2014 @11:51 AM