As one of his parting acts as US president, Barack Obama retaliated against alleged Russian interference in the recent American election by expelling 35 Russian government officials from the US and placing sanctions on Russian security agencies, three companies and several individuals.
One of the companies included on the sanctions list was Zorsecurity (also known as Esage Lab), which was set up by a Russian programmer Alisa Shevchenko. According to the White House, Zorsecurity was included because it had provided the GRU (one of Russia’s military intelligence services) “with technical research and development”.
And that was it. Except that Shevchenko has vehemently denied that she has worked for the Russian government, stating: “We don’t make malware for the Russian government.”
The difficulty for Shevchenko is that she simply doesn’t know what being placed on a sanctions list means for her personally. To be clear, there was no trial, no evidence presented publicly, nor was there an opportunity to provide a defence, there was simply an accusation and a listing on a public announcement.
What makes this particularly frustrating for Shevchenko is that the company listed doesn’t trade anymore and so from one perspective the entire matter is moot.
It seems extraordinary that a high stakes response to the Russian government and Russian President Vladimir Putin should have on one hand two of Russia’s secret service agencies, the FSB and GRU, and on the other hand a defunct company run at one time by a solitary Russian hacker with a handful of employees.
It has been argued that the evidence put forward to tie the Russian intelligence services with the hack of the Democratic National Committee (DNC) was not definitive enough to prove the link. Evidence for Russian involvement comes essentially from comparing the malware and techniques used by the hackers to previous hacks believed to be by specific groups, in this case from two groups called APT 28 (aka Fancy Bear) and APT 29 (aka Cozy Bear). These groups in turn are thought to be associated with the GRU (APT 28) and FSB (APT 29).
While the debate continues over whether the evidence presented is sufficient to definitively tie specific groups to the hack, none of the evidence presented ties in with Shevchenko and Zorsecurity.
Shevchenko’s situation highlights the perils of being associated with cybersecurity even if you are one of the good guys, the so-called “white hat” hackers. She is a self-taught and talented programmer who specialises in finding “zero-day” exploits.
While these exploits can, and are, used by criminals and spies, they can also be used to probe weaknesses in corporate networks as part of what is called penetration testing. In fact, Shevchenko has publicly contributed to finding and reporting vulnerabilities in energy management software and Microsoft Windows.
It is possible that some of her software or exploits were used by the GRU and FSB (and others) in gaining access to the DNC and other targets. However, that is a different matter to her, or the company, actively working with these agencies. Given the large number of companies and people who could potentially be involved with hacking on behalf the Russian services, it seems gratuitous that the US would single out a solitary female hacker to shoulder the entire blame.
The irony here is that in his rush to publicly be seen to respond to Russian hacking, Obama has sought to punish a female programmer working in cybersecurity. A key tenant of his presidency was to try and boost the participation of women in the tech industry with his own secret service agency the NSA employing hackers in their ongoing struggle to recruit real talent.
Not only is Shevchenko in a minority of women working in this area of programming, but she has been extremely active in engaging in conferences and the open-source community to develop and contribute software, knowledge and expertise. Alisa Shevchenko was also one of the founders of a community “hack space” Neuron Hackspace. None of this particularly suggested an ideologue dedicated to the hacking of the DNC.
Inadvertently perhaps, Obama has sent a clear message of the dangers for cybersecurity experts in becoming collateral damage in the political battles between the US, Russia and China. Just possibly, he has also just reinforced the extra dangers for women who stand out from the crowd?
In an additional irony, it may be that incoming US President Donald Trump will come to Shevchenko’s aid. He has indicated that he may reverse Obama’s sanctions against the Russians, especially if the Russians collaborate with the US against terrorism.
- David Glance is director of the UWA Centre for Software Practice, University of Western Australia
- This article was originally published on The Conversation