text
stringlengths
4
429
reality that they may be the target of a cyber attack if they are in opposition
to the government of the Russian Federation.
The issue of cyber security is ongoing. As more of the former Soviet
satellites become more developed with an advanced IT structure they will
have to face the realities of cyber attacks. Regardless of whether the
government of the Russia Federation has been involved in any cyber
attacks, or will be in the future, the reality remains that nations, groups, or
individuals that are in opposition to Russia may face a cyber attack. The
cyber attacks will be used to influence public opinion or to influence
government leaders through the use of cyber pressure. Future conflicts
that involve the use of force will also see cyber attacks in conjunction with
combat operations. Currently international agreements and laws are
inadequate which allows cyber attackers to take advantage of the lack of
such laws and can conduct acts of civil disobedience on the internet.
The conflict in Georgia has been a motivator for military reform which
includes reform in the cyber arena. The Russian government and the
Russian military will continue to develop systems to improve both their
offensive and defensive cyber capabilities. Russia will continue to capitalize
on their diaspora present throughout the world to support their political
positions but will have to realize that some of that diaspora will be in
opposition to them and provide private support to organizations and
nations that have received cyber attacks. Russia
s active collection of cyber
Volume 11, 2009
Baltic Security & Defence Review
defence secrets will also be a combat multiplier for them in future conflicts
either alone in the cyber world or as part of a ground conflict.
Organizations and nations will be best served by creating a resilient
defence in depth while educating users and managers of IT systems in best
practices to counter the threat of a cyber attack. This defence in depth
includes technical responses to counter the threats while ensuring that their
IT systems are resilient and become effective after an attack. President
Bush remarked in 2001 that,
s time to work together to address the new
security threats that we all face. And those threats are not simply missiles
or weapons of mass destruction in the hands of untrustworthy countries.
Cyber-terrorism is a threat, and we need to work on that together
(Verton, 2003:248).
References:
Aaviksoo, Jaak, 2007 (Nov. 28th). Address by the Minister of Defence of the Republic of
Estonia, at The Centre for Strategic & International Studies, Washington, D.C.
Abdullaev, Nabi, 2006 (Oct 31st). New
Just Russia
Party Says Putin Knows Best.
Petersburg
Times.
http://www.times.spb.ru/index.php?action_id=2&story_id=19303;
(accessed
April 10th, 2009).
Abreu, Elinor, 2001 (May 10th). Epic cyberattack reveals cracks in U.S. defense,
(CNN.com,
2001)
http://archives.cnn.com/2001/TECH/internet/05/10/3.year.cyberattack.idg/
(accessed April 10th, 2009).
Anon. 2007 (May 12th). A Cyber-Riot. The Economist. p. 55.
http://lumen.cgsccarl.com/login?url=
http://search.ebscohost.com/login.aspx?direct=true
&db=a9h&AN=25048355&site=ehost-live; (accessed December 19th, 2008).
Baltic News Service, 2009 (March 12th). Estonian Minister Lang Says European
Arrest Warrant Possible for Cyber Attackers. Baltic News Service.
https://www.opensource.gov, Document ID EUP20090312010002; (assessed
April 10th, 2009).
Bradbury, Danny, 2009 (Feb. 5th). The Fog of Cyberwar. The Guardian.
http://www.guardian.co.uk/technology/2009/feb/05/kyrgyzstan-cyberattackinternet-acess; (accessed March 22nd, 2009).
Buranov, Ivan; Vodo, Vladimir and Yegikyan, Seda. 2009 (March 12th). ProKremlin Activist Admits Attack on Estonian Websites, Denies Criminal
Wrongdoing, Translated by Open Source Centre. Moscow: Konmersant Online.
Baltic Security & Defence Review
Volume 11, 2009
https://www.opensource.gov, Document ID CEP20090312021013; (accessed
April 10th, 2009).
Central Intelligence Agency, page updated as of Dec. 4th, 2008. The World Fact
Book,
Estonia.
https://www.cia.gov/library/publications/the-worldfactbook/geos/ en.html; (accessed December 13th, 2008).
Collier, Mike, 2007 (Dec. 17th). Estonia: Cyber Superpower. Business Week.
http://www.businessweek.com/globalbiz/
content/dec2007/gb20071217_535635.htm; (accessed August 27th, 2008).
Collier, Mike, 2007. Estonia: Cyber Superpower. Business Week.
http://www.businessweek.com/
globalbiz/content/dec2007/gb20071217_535635.
htm?chan=globalbiz_europe+index+page_top+stories. (accessed August 27th,
2008).
Conway, Maura, 2007. Information Warfare: Separating Hype from Reality, ed.
Armistead, Leigh. Washington, D.C.: Potomac Books, Inc. p. 82.
Cornish, Paul, 2009 (Feb. 2nd). Cyber Security and Politically, Socially and Religiously
Motivated Cyber Attacks. Brussels: European Parliament. pp. 24-27.
http://www.europarl.europa.eu/activities/committees/ studies.do?language=EN;
(accessed February 19th, 2009).
Council of Europe, Convention on Cybercrime (Budapest, November 23rd, 2001)
http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm;
(accessed
February 19th, 2009).
Council of Europe, Convention on Cybercrime, Chart of signatures and ratifications,
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&
DF=&CL=ENG; (accessed February 19th, 2009).
Council of Europe, Convention on Cybercrime: Summary of the treaty,
http://conventions.coe.int/Treaty/en/Summaries/Html/185.htm;
(accessed
February 19th, 2009).
Davis, Joshua, 2009. Hackers Take Down the Most Wired Country in Europe.