text
stringlengths
4
429
2008 Jason Fritz
from http://www.globalresearch.ca/index.php?context=va&aid=7987.
World Wide Military Expenditures. 2007. Retrieved on August 12, 2008, from
http://www.globalsecurity.org/military/world/spending.htm.
Wortzel, Larry M. 2007. China
s Nuclear Forces: Operations, Training, Doctrine, Command, Control, and
Campaign Planning. US Strategic Studies Institute. Retrieved on December 11, 2007, from
www.StategicStudiesInstitute.army.mil/.
Yahoo Implicated In Third Cyberdissident Trial. 2006. Retrieved on March 11, 2008, from
http://www.rsf.org/article.php3?id_article=17180.
Yeates, Ed. 2007. Exoskeleton Turns Humans Into Terminators. Retrieved on March 10,
2008, from http://www.youtube.com/watch?v=h2jlIRKswnQ.
Yue, Qi and Yue Qin. 2008. China Regime Implicated In Staging Violence In Tibetan
Protest. Retrieved on April 3, 2008, from http://chinaview.wordpress.com/2008/03/29/
photo-china-regime-implicated-in-staging-violence-in-tibet-protest/.
Zheng, Yongnian and Sow Keat Tok. 2007.
Harmonious Society
and
Harmonious World
: China
s Policy
Discourse under Hu Jintao. Briefing Series, Issue 26, October. China Policy Institute. Retrieved on October 2,
2008, from
http://www.nottingham.ac.uk/shared/shared_cpi/documents/policy_papers/Briefing_26_Harmonious_Society
_and_Harmonious_World.pdf.
Volume 11, 2009
Baltic Security & Defence Review
Impact of Alleged Russian Cyber Attacks
By William C. Ashmore *
During a two week period in April and May of 2007 Estonia was the
victim of a sustained massive cyber attack on its information infrastructure.
While the cyber attack was not the first nor was it the largest, it was the
first cyber attack that was directed at the national security of a country.
(Davis, 2009)
The significance of a cyber attack on a small country can be difficult to
measure for a casual observer. Estonia is a small country that can be seen
as a model for the future. Estonians have developed and used internet
technology for voting, education, security and banking (ninety-five percent
of banking operations are done electronically) (Collier, 2007). It is not
uncommon to see a sign for free Wi-Fi internet access at a pub, restaurant
or on public transportation. 1
Imagine going to an Automated Teller Machine (ATM), while on a
business trip, to get money for meals and lodging and the system is down.
Restaurants and hotels are unable to process your credit card. You try to
send a message to your bank, your work, and your family but the computer
servers are all down. The government is unable to communicate with the
public and its different departments. News agencies are having difficulties
publishing information. The aftermath of a cyber attack can impact anyone
that uses the internet, whether it is an individual, business, or government
that has been affected. By investigating the attack, how it happened, and
Estonia
s reaction, states can decide whether their internet defences and
strategies are adequate. 2
The cyber attacks on Estonia have implications for both its allies and
adversaries. This article is not meant to establish a complete strategy for
cyber defence but to create a better understanding of how a cyber attack
can have far reaching consequences beyond the immediate aftermath of a
targeted infrastructure. What are the implications for Estonia? Is the
framework of the North Atlantic Treaty Organization (NATO)
appropriate for cyber defence? Is an attack against one really an attack
* William C. Ashmore is a Major in U.S. Army.
Baltic Security & Defence Review
Volume 11, 2009
against all? Does the Organization for Security and Co-operation in
Europe (OSCE) have the ability to react to cyber attacks? Lastly, does the
Russian Federation have a coherent cyber strategy that it is willing to use
and what have been the consequences for Russia?
Any country that uses the internet as part of its infrastructure needs to be
aware of the vulnerabilities and consequences of a cyber attack on their
system. A coherent strategy must include internet defences that are set-up
in conjunction with technical defences. Currently, legal definitions for
cyber crimes do not exist in all countries. The international community
must examine treaties and update them to better define assistance and
common defence in the event of a cyber attack. Russians have shown the
ability and the desire to use cyber warfare. Cyber strategy by, in defence of,
or against Russia affects more than computer networks. Although, attacks
that originate in China, Japan or the United States may have similar
implications they are outside of the scope of this article.
Internet attacks occur on a daily basis throughout the world. How nations
prepare themselves for an internet attack will determine the impact of a
cyber attack on their infrastructure. The aim of this article is to achieve a
greater understanding of the possible Russian cyber strategy and to
understand the counter measures that can be used to prevent or mitigate
cyber attacks. This awareness could possibly prevent a tactical defeat
during conflict when a cyber attack targeting command and control and
communications infrastructure is blocked.
1. The media accounts
Internet trade magazines and mass media reports were used to gather
evidence on the events surrounding the cyber attack on Estonia. Internet
sources were a major source of information on the subject of cyber
security because of the amount of information that is new and has not yet
been published in books. Several Estonian government officials have
spoken on the issue of cyber attacks at great lengths. Estonian government
documents were also used to analyze the Estonian response to the cyber
attack. Media accounts along with documents from the North Atlantic
Treaty Organization (NATO) and the Organization for Security and Cooperation in Europe (OSCE) were used to analyze the aftermath of the
Estonian cyber attack on organizations and other states. Analysis of
Russian involvement was conducted using western documents.
Volume 11, 2009
Baltic Security & Defence Review