With just $60, researchers found and tracked NATO troops and even tricked them into disobeying orders
U.S. Army photo by William B. King
U.S. Army photo by William B. King
- NATO's Strategic Communications Center of Excellence catfished NATO forces during a military exercise, highlighting key vulnerabilities, Wired reported Monday.
- Using social media, researchers were able to successfully identify 150 soldiers, locate multiple battalions, track troop movements, and even convince service members to leave their posts and engage in other "undesirable behavior."
- The researchers, the so-called "red team" in the exercise, did it all for only $60, demonstrating how easy it is for malign actors like Russia to use online information against allied forces.
Enemies can use social media to not only inexpensively find and target NATO forces - but also manipulate them, new research has concluded.
Researchers with NATO's Strategic Communications Center of Excellence used open source data, primarily social media, to successfully identify 150 soldiers, locate multiple battalions, track troop movements, and even convince service members to leave their posts and engage in other "undesirable behavior" during a military exercise, Wired reported Monday, citing a StratCom report.
And they did it for only $60, demonstrating how easy it is for an aggressor to target NATO with data available online.
The researchers used Facebook, Instagram, Twitter, and other popular social media sites to find valuable information, particularly exploitable information, "like a serviceman having a wife and also being on dating apps," researcher Nora Biteniece explained. It is unclear which forces were targeted.
"Every person has a button. For somebody there's a financial issue, for somebody it's a very appealing date, for somebody it's a family thing," Janis Sarts, the director of NATO's StratCom, told Wired. "It's varied, but everybody has a button. The point is, what's openly available online is sufficient to know what that is."
The Russians, NATO's primary adversary, are particularly skilled at this type of information warfare, which has shown up in the Ukraine.
"The Russians are adept at identifying Ukrainian positions by their electrometric signatures," US Army Col. Liam Collins wrote in Army Magazine last summer.
"In one tactic, soldiers receive texts telling them they are 'surrounded and abandoned.' Minutes later, their families receive a text stating, 'Your son is killed in action,' which often prompts a call or text to the soldiers," he wrote, according to Task & Purpose. "Minutes later, soldiers receive another message telling them to 'retreat and live,' followed by an artillery strike to the location where a large group of cellphones was detected."
The Wall Street Journal reported in 2017 that the Russians were hacking the cellphones of NATO soldiers to "gain operational information, gauge troop strength and intimidate soldiers." At one point, the situation got so bad that Estonian troops were being forced by their superior officers to jump in the lake to enforce the strict "no smartphones" policy.
At the same time, the Russians are trying to better control how their troops use social media, as online activity has threated to give away troops' positions or brought revealed their invovlement in questionable or problematic operations.
For instance, social media posts were used to determine Russian involvement in the 2014 shoot down of passenger flight MH17 over Ukraine, according to Reuters.
Social networks have also offered insight into Russian activities in Syria and elsewhere, so Russia is currently attempting to legislatively ban troops from sharing information online.