text
stringlengths
4
429
and academies to train specialists that would be able to operate at the
diplomatic, management, or individual level. The training system would
Baltic Security & Defence Review
Volume 11, 2009
also include the creation of an Information Special Forces that are highly
trained to for conducting information operations in a crisis. (Panarin, 2008)
Along with the creation of the information warfare system Dr. Panarin
believes that financing for information warfare needs to be increased by
both the Russian government and by Russian businesses. The increased
attention on information warfare is designed to increase Russia
s image
throughout the world and ensure that Russia is prepared for future conflict
in the cyber and information arenas. (Panarin, 2008)
Statements by Russian government officials have been very similar to Dr.
Panarin
s position which makes the future of cyber warfare in Russia
offensively poised. Colonel Aleksandr Drobyshevskiy, head of the Russian
Federation Ministry of Defence Directorate for Press Service and
Information, stated that Georgia won the information war during the
conflict in South Ossetia and there is a need for the development of
information and telecommunications technologies within the Ministry of
Defence. Colonel Drobyshevskiy further advocates the creation of an
information warfare system. (Svobodnaya Pressa, 2009)
Another clue to the future of Russian cyber warfare is the development of
a new information warfare defensive strategy by the Russian Armed Forces
General Staff. Colonel-General Anatoliy Nogovitsyn, Deputy Chief of the
General Staff, stated that leading world powers will be able to conduct fullscale information warfare and that Russia must be prepared (Usov, 2009).
General Nogovitsyn believes that Russia will be involved in a large-scale
information war within two to three years that will be fought in the cyber
world (Litovkin, 2009).
The existence of hackers that support the Russian government and
information specialists within the Russian government have created an
asset that will be used during future cyber conflicts. The Russian
government
s emphasis on developing cyber strategies will enable Russia to
be prepared for future cyber conflict.
11. Countermeasures
We need to examine what can be done to counter cyber crimes and protect
a nation
s IT structure. Cyber countermeasures can be taken at the
international level, followed by cyber defences at the national level, and
Volume 11, 2009
Baltic Security & Defence Review
ending with actions that an individual computer user can make to improve
cyber defence.
The International Telecommunication Union (ITU), the organization
within the UN that is responsible for the international oversight of the
world
s telephone system, is developing a system for oversight of the
internet. The ITU is working towards a convention against cybercrime that
will provide international cooperation on issues concerning internet
communications (Schrank, 2007). Members of the international
community will need to work together in order to track and prosecute
cyber criminals that operate outside of the country that is being attacked.
Nations will also have to work together to share technical data to maintain
cyber defences to keep up with the newest and ever changing cyber
attacks. Hackers routinely share information on new techniques that can
penetrate IT defence structures. Nations need to do the same to protect
their own IT infrastructure, the same IT structure that affects the entire
globe (Lipson, 2002:47-48).
Individual countries can improve their cyber defences within their own
boundaries which would also improve the cyber security of the
international IT system. Countries can make laws making cyber crimes
illegal with punishments and programs that will deter potential cyber
criminals. Governments can create a system that increases co-operation
between the government, businesses, and academic institutions in order to
improve their cyber defences. This co-operation could lead to an IT
infrastructure that is resilient and able to withstand and recover from a
cyber attack with little or no permanent damage to a country
s IT structure.
(Schrank, 2007)
In 8th section the computer user was identified as the weakest link in an IT
system. Some individual countermeasures are easy to accomplish for any
computer user. Actions like keeping antivirus and anti-spyware software up
to date along with updating your web browser and operating system can
greatly enhance your own computer security. Even following safe
computer practices of not opening unknown attachments on emails that
may carry viruses or malware are very instrumental in making the cyber
environment more secure (Secure Works Press Release, 2008). The U.S.
Department of Homeland Security (DHS) has tips for computer users
posted on their website to increase internet security. The main points of
the DHS website are to promote personal responsibility for increasing
Baltic Security & Defence Review
Volume 11, 2009
cyber security and to promote best practices for safe computer usage. The
best practices that DHS advertises are to make cyber security a habit by
following three core practices. The three core practices are to
install antivirus and anti-spyware programs and keep them up to date, install a
firewall and keep it properly configured, and to regularly install updates on
your computer
s operating system
(Homeland Security, 2008). Computer
users are the first line of defence in cyber security and their actions can
help protect the cyber infrastructure that is used by all.
Conclusion
The international system is lacking in its ability to effectively manage issues
of cyber security. The Russian Federation is perceived by the international
community as a country that engages in or supports groups that are
involved in cyber crime. International and regional organizations along
with countries that interact with the Russian Federation have to deal with a