text
stringlengths 4
429
|
---|
country (Baltic News Service, 2009). Aleksandr Gostev, director of the |
Kaspersky Lab |
s Global Research and Analysis Team, explains that hackers |
who participate in a distributed denial of service attack violate the Russian |
Criminal Code (Article 274, Violation of the Rules Governing the Use of |
Computers, Computer Systems, or Networks Thereof) and can be imprisoned for |
four years for violating the code. But he also states that the article is rarely |
used (Buranov, Vodo & Yegikyan, 2009). The examples of Russian citizens |
admitting to participating in the Estonian cyber attacks are grounds for |
Volume 11, 2009 |
Baltic Security & Defence Review |
Russian citizens to be arrested in other parts of Europe if Russia fails to |
uphold its own laws. |
Similar actions occurred in the Georgian cyber attacks. Messages were |
posted on Russian hacker forums on how to participate in shutting down |
Georgian websites. The website StopGeorgia.ru was also established as a |
private forum to coordinate the denial of service attacks. Jeff Carr, a |
network security expert and cyber analyst, established an all volunteer |
group to investigate the cyber attacks. Throughout the course of the |
investigation, which they named Project Grey Goose, no evidence was found |
to implicate the Russian government. This was just another example of a |
hactivist movement which had the collective power to conduct a cyber |
attack against a government. (Melikishvili, 2008/2009) |
The Project Grey Goose investigation has looked at hactivists and how they |
can independently conduct cyber attacks. It also focused on a criminal |
gang known as the Russian Business Network (R.B.N.). The R.B.N. is based |
in St. Petersburg and engages in criminal cyber activities. According to |
Don Jackson, the director of threat intelligence at Secure Works, some of |
the cyber attacks used against Georgian websites originated from |
computers under the control of the R.B.N. As is the case with any cyber |
attacks it is very difficult to establish who is completely responsible or if |
there is any Russian government sanctioned involvement. (Markoff, 2008a) |
This article has already noted that there are other groups involved with |
cyber attacks against former Soviet satellites. The evidence of Russian |
government involvement will now be investigated (Davis, 2009). Indeed, |
some statements made by Russian government officials suggest Russian |
government involvement in cyber attacks. Prior to the cyber attacks in |
Estonia the Russian government protested the movement of the Russian |
memorial, the Bronze Soldier, to the Estonian government. The Russian |
government warned how disastrous the move would be to Estonia. What |
followed were the protests and the cyber attacks. (Davis, 2009) |
The head of the Russian Army Centre for Military Forecast, Colonel |
Anatoly Tsyganok, made comments to the Russian news outlet, Gazeta, |
about the cyber attacks on Estonia. He believes that there was nothing |
wrong with the attacks because there are no international agreements |
established. Colonel Tsyganok also believes that NATO couldn |
t do |
Baltic Security & Defence Review |
Volume 11, 2009 |
anything to stop the attacks, and that they were highly successful. |
(prygi.blogspot.com 9, 2008) |
The most telling example of Russian government involvement in cyber |
warfare was with Herman Simm selling IT secrets to the Russian Foreign |
Intelligence Service that was discussed earlier in this article. This examples |
shows that the government of the Russian Federation is actively seeking |
information on cyber defences and is willing to pay large sums of money |
(Mr. Simm is accused of selling cyber security secrets for millions of |
dollars) to receive information on cyber security. (Melikishvili, 2008/2009) |
There are also cases where cyber attacks were used against people who are |
in opposition to the Russian government. One such example is with Gary |
Kasparov, Russian opposition party leader, had his website shut down for |
two weeks due to denial of service attacks during the Russian presidential |
campaign. John Palfrey, a researcher at Harvard Law School, believes that |
several organizations in Russia who plan to protest, or act in opposition to |
the Russian government, are subjected to cyber attacks in an attempt to |
control the information that is getting to the public. (Greenberg, 2008) |
Another example of Russian government complicity is the lack of |
assistance or interest in tracking down those responsible for the cyber |
attacks against governments of former Soviet satellites (Davis, 2009). The |
evidence of government involvement remains circumstantial, but certain |
facts are clear concerning cyber security and former Soviet satellites. If |
there is opposition to Russian Federation policy than that country that is in |
opposition is likely to be subject to a cyber attack and it has been shown |
that the Russian Federation actively collects information on other |
countries cyber defences. |
10. The future of Russian cyber warfare |
The perception exists among different nations (some of those nations have |
been discussed earlier in this study) that the government of the Russian |
Federation has been involved in cyber attacks. This section will examine |
future trends concerning the use of cyber attacks by, or sanctioned by, the |
Russian Federation government. The cyber attacks against Estonia and |
Georgia have forced Russia to evaluate its future cyber strategy. In |
examining the Russian focus on improving its cyber strategy some |
Volume 11, 2009 |
Baltic Security & Defence Review |
conclusions can be drawn about the future of Russian cyber warfare. |
(Panarin, 2008) |
As with many countries that have an advanced IT system, a sub-culture of |
hacking has developed. Even though the state sponsored university in St. |
Petersburg produces computer programmers that are highly regarded it is |
believed that most of the hackers are young and not educated at the |
university level. The reason behind the growth of Russian computer |
hackers is the prestige and monetary reward that hacking garners in a |
growing IT infrastructure. (Varoli, 2000) |
The criminal organization, R.B.N., has been able to conduct its cyber |
activities with little interference from the Russian Federation government. |
The R.B.N. is very difficult to track on the internet as they are able to |
locate their activities from several different locations. The group has been |
involved in several different types of criminal cyber activities such as the |
use of malware, identity theft, and child pornography. Without any |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.