text
stringlengths
4
429
concerted effort to stop the R.B.N., and their ability to operate anywhere,
R.B.N. is an organization that is positioned in Russian cyber activities now
and in the future. (Markoff, 2008a)
One example of latitude and scope created by Russian indifference, a
group identified by a computer security firm as a Russian gang conducted a
botnet based computer operation operating in Wisconsin. The Russian
gang was controlling as many as 100000 computers in an effort to steal
passwords and information. As soon as the system was shut down the
Russian gang moved its host computer system to a site in the Ukraine. This
shows how resilient these gangs are when they can relocate their operating
systems to countries that are out of reach of law enforcement of the
country that they are targeting. (Markoff, 2008b)
The Russian responses to the recent cyber attacks are a guide to how they
will react in the future. Valery Yashenko, vice director of the Institute of
Information Security Issues at Lomonosov Moscow State University,
advises the Russian government on the issues of cyber terrorism.
Yashenko believes that there should be greater international cooperation
concerning cyber security but does not think that the cyber attack on
Estonia was of any real consequence. Yashenko indicates that the Russian
Federation government is only concerned with cyber security matters that
affect his own government. (Davis, 2009)
Baltic Security & Defence Review
Volume 11, 2009
Not surprisingly, the Russian Federal Security Service (F.S.B.) is believed
to employ its own hackers (Varoli, 2000). The manner of recruiting is a
little different than normal ways of looking for employees. When an IT
specialist or hacker is caught committing a cyber crime they may receive an
offer to work for the F.S.B., or face criminal charges. According to a
Russian computer security specialist hackers that were working for the
F.S.B. attacked pro-Chechen web sites. According to the same computer
security specialist the F.S.B. hackers have hacked into opposition
newspapers in order to control information about the Russian Federation
government and its leaders. The recruitment of hackers for offensive cyber
attacks vice cyber defences is an indication of the future Russian
Federation government cyber strategy. (Varoli, 2000)
The Russian Federation government has shown the capability for law
enforcement in cyber space. Laws exist in Russia that make crimes
committed on the internet punishable under the law. Russia has even
established a computer crime unit, which it called Department
which
operates under the Ministry of Internal Affairs of the Russian Federation
(MVD). Department
is responsible for the detection, prevention,
suppression, and solving crimes involving information technology. In
2008, Department
was able to identify 158 computer crimes and shut
down seven illegal internet operations. The MVD is currently conducting
Project
Clean Network
aimed a combating illegal uses of the internet
(Ministry of Internal Affairs of the Russian Federation, undated). It
remains to be seen whether the efforts of Department
will have any
negative impact on the R.B.N. or the cyber gangs that support the Russian
government.
The Russian Federation Public Chamber 10 organized a discussion on
Russian information warfare in September 2008 and Just Russia 11 political
party hosted an international conference on information warfare in
October 2008. The conclusions of the meeting were that Russia has grossly
underestimated the role of information warfare and failed to
champion
their goals and interests in the world media. (Panarin, 2008)
Dr. Igor Panarin, the Dean of the Faculty of International Relations of the
Ministry of Foreign Affairs Diplomatic Academy in Moscow, used the
information warfare discussions to make several recommendations to the
Russian government concerning information and cyber warfare. Dr.
Volume 11, 2009
Baltic Security & Defence Review
Panarin proposes that Russia develop specialized management and
analytical structures to counter information threats. Dr. Panarin proposes a
system that has eight key components. (Panarin, 2008)
The first component is the creation of a Council for Public Diplomacy that
will develop a single point of view for both the Russian government and
Russian businesses. Government and business leaders are to be included
on the council in order to ensure that all activities concerning foreign
political media are coordinated. The second component is to create an
advisor to the President of Russia for Information and Propaganda
Activities in order to coordinate the foreign political information activities
of the administration of the President, the government, different
ministries, and the Russian Security Council. (Panarin, 2008)
The third and fourth components are to create state holding companies,
one for foreign media affairs and one for the internet. The holding
companies would be combined between business and government to see
that Russian political positions were broadcast to the world. The
information would not just be focused towards ethnic Russians but would
be focused globally towards economic partners, future partners,
adversaries, and overall world opinion. (Panarin, 2008)
The fifth component would be the creation of an information crisis action
centre in order to ensure that Russia maintains the initiative when
delivering the state message to the world. The information crisis action
centre would be responsible for developing talking points and themes that
would support the government in any crisis. (Panarin, 2008)
The sixth component would create an information countermeasures
system that would counter enemy information operations. The information
countermeasures system would include assets from business and the
government. The seventh component focuses on a system on
nongovernmental organizations that would operate throughout the world.
(Panarin, 2008)
The final component would consist of a system for training information
warfare specialists. This system would use existing educational institutions