text
stringlengths 4
429
|
---|
concerted effort to stop the R.B.N., and their ability to operate anywhere, |
R.B.N. is an organization that is positioned in Russian cyber activities now |
and in the future. (Markoff, 2008a) |
One example of latitude and scope created by Russian indifference, a |
group identified by a computer security firm as a Russian gang conducted a |
botnet based computer operation operating in Wisconsin. The Russian |
gang was controlling as many as 100000 computers in an effort to steal |
passwords and information. As soon as the system was shut down the |
Russian gang moved its host computer system to a site in the Ukraine. This |
shows how resilient these gangs are when they can relocate their operating |
systems to countries that are out of reach of law enforcement of the |
country that they are targeting. (Markoff, 2008b) |
The Russian responses to the recent cyber attacks are a guide to how they |
will react in the future. Valery Yashenko, vice director of the Institute of |
Information Security Issues at Lomonosov Moscow State University, |
advises the Russian government on the issues of cyber terrorism. |
Yashenko believes that there should be greater international cooperation |
concerning cyber security but does not think that the cyber attack on |
Estonia was of any real consequence. Yashenko indicates that the Russian |
Federation government is only concerned with cyber security matters that |
affect his own government. (Davis, 2009) |
Baltic Security & Defence Review |
Volume 11, 2009 |
Not surprisingly, the Russian Federal Security Service (F.S.B.) is believed |
to employ its own hackers (Varoli, 2000). The manner of recruiting is a |
little different than normal ways of looking for employees. When an IT |
specialist or hacker is caught committing a cyber crime they may receive an |
offer to work for the F.S.B., or face criminal charges. According to a |
Russian computer security specialist hackers that were working for the |
F.S.B. attacked pro-Chechen web sites. According to the same computer |
security specialist the F.S.B. hackers have hacked into opposition |
newspapers in order to control information about the Russian Federation |
government and its leaders. The recruitment of hackers for offensive cyber |
attacks vice cyber defences is an indication of the future Russian |
Federation government cyber strategy. (Varoli, 2000) |
The Russian Federation government has shown the capability for law |
enforcement in cyber space. Laws exist in Russia that make crimes |
committed on the internet punishable under the law. Russia has even |
established a computer crime unit, which it called Department |
which |
operates under the Ministry of Internal Affairs of the Russian Federation |
(MVD). Department |
is responsible for the detection, prevention, |
suppression, and solving crimes involving information technology. In |
2008, Department |
was able to identify 158 computer crimes and shut |
down seven illegal internet operations. The MVD is currently conducting |
Project |
Clean Network |
aimed a combating illegal uses of the internet |
(Ministry of Internal Affairs of the Russian Federation, undated). It |
remains to be seen whether the efforts of Department |
will have any |
negative impact on the R.B.N. or the cyber gangs that support the Russian |
government. |
The Russian Federation Public Chamber 10 organized a discussion on |
Russian information warfare in September 2008 and Just Russia 11 political |
party hosted an international conference on information warfare in |
October 2008. The conclusions of the meeting were that Russia has grossly |
underestimated the role of information warfare and failed to |
champion |
their goals and interests in the world media. (Panarin, 2008) |
Dr. Igor Panarin, the Dean of the Faculty of International Relations of the |
Ministry of Foreign Affairs Diplomatic Academy in Moscow, used the |
information warfare discussions to make several recommendations to the |
Russian government concerning information and cyber warfare. Dr. |
Volume 11, 2009 |
Baltic Security & Defence Review |
Panarin proposes that Russia develop specialized management and |
analytical structures to counter information threats. Dr. Panarin proposes a |
system that has eight key components. (Panarin, 2008) |
The first component is the creation of a Council for Public Diplomacy that |
will develop a single point of view for both the Russian government and |
Russian businesses. Government and business leaders are to be included |
on the council in order to ensure that all activities concerning foreign |
political media are coordinated. The second component is to create an |
advisor to the President of Russia for Information and Propaganda |
Activities in order to coordinate the foreign political information activities |
of the administration of the President, the government, different |
ministries, and the Russian Security Council. (Panarin, 2008) |
The third and fourth components are to create state holding companies, |
one for foreign media affairs and one for the internet. The holding |
companies would be combined between business and government to see |
that Russian political positions were broadcast to the world. The |
information would not just be focused towards ethnic Russians but would |
be focused globally towards economic partners, future partners, |
adversaries, and overall world opinion. (Panarin, 2008) |
The fifth component would be the creation of an information crisis action |
centre in order to ensure that Russia maintains the initiative when |
delivering the state message to the world. The information crisis action |
centre would be responsible for developing talking points and themes that |
would support the government in any crisis. (Panarin, 2008) |
The sixth component would create an information countermeasures |
system that would counter enemy information operations. The information |
countermeasures system would include assets from business and the |
government. The seventh component focuses on a system on |
nongovernmental organizations that would operate throughout the world. |
(Panarin, 2008) |
The final component would consist of a system for training information |
warfare specialists. This system would use existing educational institutions |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.