text
stringlengths 4
429
|
---|
2008 Jason Fritz |
from http://www.globalresearch.ca/index.php?context=va&aid=7987. |
World Wide Military Expenditures. 2007. Retrieved on August 12, 2008, from |
http://www.globalsecurity.org/military/world/spending.htm. |
Wortzel, Larry M. 2007. China |
s Nuclear Forces: Operations, Training, Doctrine, Command, Control, and |
Campaign Planning. US Strategic Studies Institute. Retrieved on December 11, 2007, from |
www.StategicStudiesInstitute.army.mil/. |
Yahoo Implicated In Third Cyberdissident Trial. 2006. Retrieved on March 11, 2008, from |
http://www.rsf.org/article.php3?id_article=17180. |
Yeates, Ed. 2007. Exoskeleton Turns Humans Into Terminators. Retrieved on March 10, |
2008, from http://www.youtube.com/watch?v=h2jlIRKswnQ. |
Yue, Qi and Yue Qin. 2008. China Regime Implicated In Staging Violence In Tibetan |
Protest. Retrieved on April 3, 2008, from http://chinaview.wordpress.com/2008/03/29/ |
photo-china-regime-implicated-in-staging-violence-in-tibet-protest/. |
Zheng, Yongnian and Sow Keat Tok. 2007. |
Harmonious Society |
and |
Harmonious World |
: China |
s Policy |
Discourse under Hu Jintao. Briefing Series, Issue 26, October. China Policy Institute. Retrieved on October 2, |
2008, from |
http://www.nottingham.ac.uk/shared/shared_cpi/documents/policy_papers/Briefing_26_Harmonious_Society |
_and_Harmonious_World.pdf. |
Volume 11, 2009 |
Baltic Security & Defence Review |
Impact of Alleged Russian Cyber Attacks |
By William C. Ashmore * |
During a two week period in April and May of 2007 Estonia was the |
victim of a sustained massive cyber attack on its information infrastructure. |
While the cyber attack was not the first nor was it the largest, it was the |
first cyber attack that was directed at the national security of a country. |
(Davis, 2009) |
The significance of a cyber attack on a small country can be difficult to |
measure for a casual observer. Estonia is a small country that can be seen |
as a model for the future. Estonians have developed and used internet |
technology for voting, education, security and banking (ninety-five percent |
of banking operations are done electronically) (Collier, 2007). It is not |
uncommon to see a sign for free Wi-Fi internet access at a pub, restaurant |
or on public transportation. 1 |
Imagine going to an Automated Teller Machine (ATM), while on a |
business trip, to get money for meals and lodging and the system is down. |
Restaurants and hotels are unable to process your credit card. You try to |
send a message to your bank, your work, and your family but the computer |
servers are all down. The government is unable to communicate with the |
public and its different departments. News agencies are having difficulties |
publishing information. The aftermath of a cyber attack can impact anyone |
that uses the internet, whether it is an individual, business, or government |
that has been affected. By investigating the attack, how it happened, and |
Estonia |
s reaction, states can decide whether their internet defences and |
strategies are adequate. 2 |
The cyber attacks on Estonia have implications for both its allies and |
adversaries. This article is not meant to establish a complete strategy for |
cyber defence but to create a better understanding of how a cyber attack |
can have far reaching consequences beyond the immediate aftermath of a |
targeted infrastructure. What are the implications for Estonia? Is the |
framework of the North Atlantic Treaty Organization (NATO) |
appropriate for cyber defence? Is an attack against one really an attack |
* William C. Ashmore is a Major in U.S. Army. |
Baltic Security & Defence Review |
Volume 11, 2009 |
against all? Does the Organization for Security and Co-operation in |
Europe (OSCE) have the ability to react to cyber attacks? Lastly, does the |
Russian Federation have a coherent cyber strategy that it is willing to use |
and what have been the consequences for Russia? |
Any country that uses the internet as part of its infrastructure needs to be |
aware of the vulnerabilities and consequences of a cyber attack on their |
system. A coherent strategy must include internet defences that are set-up |
in conjunction with technical defences. Currently, legal definitions for |
cyber crimes do not exist in all countries. The international community |
must examine treaties and update them to better define assistance and |
common defence in the event of a cyber attack. Russians have shown the |
ability and the desire to use cyber warfare. Cyber strategy by, in defence of, |
or against Russia affects more than computer networks. Although, attacks |
that originate in China, Japan or the United States may have similar |
implications they are outside of the scope of this article. |
Internet attacks occur on a daily basis throughout the world. How nations |
prepare themselves for an internet attack will determine the impact of a |
cyber attack on their infrastructure. The aim of this article is to achieve a |
greater understanding of the possible Russian cyber strategy and to |
understand the counter measures that can be used to prevent or mitigate |
cyber attacks. This awareness could possibly prevent a tactical defeat |
during conflict when a cyber attack targeting command and control and |
communications infrastructure is blocked. |
1. The media accounts |
Internet trade magazines and mass media reports were used to gather |
evidence on the events surrounding the cyber attack on Estonia. Internet |
sources were a major source of information on the subject of cyber |
security because of the amount of information that is new and has not yet |
been published in books. Several Estonian government officials have |
spoken on the issue of cyber attacks at great lengths. Estonian government |
documents were also used to analyze the Estonian response to the cyber |
attack. Media accounts along with documents from the North Atlantic |
Treaty Organization (NATO) and the Organization for Security and Cooperation in Europe (OSCE) were used to analyze the aftermath of the |
Estonian cyber attack on organizations and other states. Analysis of |
Russian involvement was conducted using western documents. |
Volume 11, 2009 |
Baltic Security & Defence Review |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.