text
stringlengths 4
429
|
---|
reality that they may be the target of a cyber attack if they are in opposition |
to the government of the Russian Federation. |
The issue of cyber security is ongoing. As more of the former Soviet |
satellites become more developed with an advanced IT structure they will |
have to face the realities of cyber attacks. Regardless of whether the |
government of the Russia Federation has been involved in any cyber |
attacks, or will be in the future, the reality remains that nations, groups, or |
individuals that are in opposition to Russia may face a cyber attack. The |
cyber attacks will be used to influence public opinion or to influence |
government leaders through the use of cyber pressure. Future conflicts |
that involve the use of force will also see cyber attacks in conjunction with |
combat operations. Currently international agreements and laws are |
inadequate which allows cyber attackers to take advantage of the lack of |
such laws and can conduct acts of civil disobedience on the internet. |
The conflict in Georgia has been a motivator for military reform which |
includes reform in the cyber arena. The Russian government and the |
Russian military will continue to develop systems to improve both their |
offensive and defensive cyber capabilities. Russia will continue to capitalize |
on their diaspora present throughout the world to support their political |
positions but will have to realize that some of that diaspora will be in |
opposition to them and provide private support to organizations and |
nations that have received cyber attacks. Russia |
s active collection of cyber |
Volume 11, 2009 |
Baltic Security & Defence Review |
defence secrets will also be a combat multiplier for them in future conflicts |
either alone in the cyber world or as part of a ground conflict. |
Organizations and nations will be best served by creating a resilient |
defence in depth while educating users and managers of IT systems in best |
practices to counter the threat of a cyber attack. This defence in depth |
includes technical responses to counter the threats while ensuring that their |
IT systems are resilient and become effective after an attack. President |
Bush remarked in 2001 that, |
s time to work together to address the new |
security threats that we all face. And those threats are not simply missiles |
or weapons of mass destruction in the hands of untrustworthy countries. |
Cyber-terrorism is a threat, and we need to work on that together |
(Verton, 2003:248). |
References: |
Aaviksoo, Jaak, 2007 (Nov. 28th). Address by the Minister of Defence of the Republic of |
Estonia, at The Centre for Strategic & International Studies, Washington, D.C. |
Abdullaev, Nabi, 2006 (Oct 31st). New |
Just Russia |
Party Says Putin Knows Best. |
Petersburg |
Times. |
http://www.times.spb.ru/index.php?action_id=2&story_id=19303; |
(accessed |
April 10th, 2009). |
Abreu, Elinor, 2001 (May 10th). Epic cyberattack reveals cracks in U.S. defense, |
(CNN.com, |
2001) |
http://archives.cnn.com/2001/TECH/internet/05/10/3.year.cyberattack.idg/ |
(accessed April 10th, 2009). |
Anon. 2007 (May 12th). A Cyber-Riot. The Economist. p. 55. |
http://lumen.cgsccarl.com/login?url= |
http://search.ebscohost.com/login.aspx?direct=true |
&db=a9h&AN=25048355&site=ehost-live; (accessed December 19th, 2008). |
Baltic News Service, 2009 (March 12th). Estonian Minister Lang Says European |
Arrest Warrant Possible for Cyber Attackers. Baltic News Service. |
https://www.opensource.gov, Document ID EUP20090312010002; (assessed |
April 10th, 2009). |
Bradbury, Danny, 2009 (Feb. 5th). The Fog of Cyberwar. The Guardian. |
http://www.guardian.co.uk/technology/2009/feb/05/kyrgyzstan-cyberattackinternet-acess; (accessed March 22nd, 2009). |
Buranov, Ivan; Vodo, Vladimir and Yegikyan, Seda. 2009 (March 12th). ProKremlin Activist Admits Attack on Estonian Websites, Denies Criminal |
Wrongdoing, Translated by Open Source Centre. Moscow: Konmersant Online. |
Baltic Security & Defence Review |
Volume 11, 2009 |
https://www.opensource.gov, Document ID CEP20090312021013; (accessed |
April 10th, 2009). |
Central Intelligence Agency, page updated as of Dec. 4th, 2008. The World Fact |
Book, |
Estonia. |
https://www.cia.gov/library/publications/the-worldfactbook/geos/ en.html; (accessed December 13th, 2008). |
Collier, Mike, 2007 (Dec. 17th). Estonia: Cyber Superpower. Business Week. |
http://www.businessweek.com/globalbiz/ |
content/dec2007/gb20071217_535635.htm; (accessed August 27th, 2008). |
Collier, Mike, 2007. Estonia: Cyber Superpower. Business Week. |
http://www.businessweek.com/ |
globalbiz/content/dec2007/gb20071217_535635. |
htm?chan=globalbiz_europe+index+page_top+stories. (accessed August 27th, |
2008). |
Conway, Maura, 2007. Information Warfare: Separating Hype from Reality, ed. |
Armistead, Leigh. Washington, D.C.: Potomac Books, Inc. p. 82. |
Cornish, Paul, 2009 (Feb. 2nd). Cyber Security and Politically, Socially and Religiously |
Motivated Cyber Attacks. Brussels: European Parliament. pp. 24-27. |
http://www.europarl.europa.eu/activities/committees/ studies.do?language=EN; |
(accessed February 19th, 2009). |
Council of Europe, Convention on Cybercrime (Budapest, November 23rd, 2001) |
http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm; |
(accessed |
February 19th, 2009). |
Council of Europe, Convention on Cybercrime, Chart of signatures and ratifications, |
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=& |
DF=&CL=ENG; (accessed February 19th, 2009). |
Council of Europe, Convention on Cybercrime: Summary of the treaty, |
http://conventions.coe.int/Treaty/en/Summaries/Html/185.htm; |
(accessed |
February 19th, 2009). |
Davis, Joshua, 2009. Hackers Take Down the Most Wired Country in Europe. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.