Military Review

Does Russia need cyber command?

16
In late July, Russian President Vladimir Putin signed the "Fundamentals of the state policy of the Russian Federation in the field of international information security for the period up to 2020 year."


The document was partly conceived as a response to the “International Strategy for Cyberspace Action” adopted in 2011 by the United States. In it, for the first time, the United States equated acts of computer sabotage with traditional military actions, reserving the right to respond to them by all means, including the use of nuclear weapons. weapons. The creation of this document became necessary due to the fact that the information security doctrine signed by President Putin in the 2000 year needed to be adapted.

“After all, new threats have appeared,” said Natalya Kasperskaya, CEO of Infowatch, a Russian company that produces corporate information protection tools.

The Russian "answer" looks more peaceful than the American. As follows from the text, Moscow intends to fight threats in the network not with methods of intimidation, but with the strengthening of international cooperation.

The document highlights four main threats to the Russian Federation in the field of the IIB. The first is the use of information and communication technologies as an information weapon for military-political purposes, for carrying out hostile actions and acts of aggression. The second is the use of ICT for terrorist purposes. The third is cybercrime, including illegal access to computer information, the creation and distribution of malicious programs. The fourth reflects a purely Russian approach. We are talking about the use of Internet technologies to "interfere in the internal affairs of states", "disturbing public order", "inciting hostility" and "promoting ideas that incite violence." The authorities of the Russian Federation forced the events of the Arab Spring to draw attention to this threat, demonstrating the potential of all social networks for organizing and coordinating anti-government actions.

As for the first point, the Americans believe that, according to the criterion of efficiency-cost, information technologies for influencing the enemy significantly exceed traditional weapons systems.

All the leading countries of the world pay considerable attention to the development of the theory and practice of applying the methods of information warfare. However, successful confrontation in this area is possible only if such a system is managed from a single center.

The fact is that in order to achieve high combat effectiveness of informational confrontation, an integrated approach is needed when a multitude of sometimes formally weakly connected methods of influencing an adversary are used to solve one task. This sets as the key task of coordinating the actions of a large number of disparate forces and facilities using various methods and techniques.

The variety of forms of informational confrontation implies the involvement of practically all the main state structures, as well as various non-state entities, in one form or another.

An important feature of such a war is the wide use of the enemy’s resource. By acting on its information system on the basis of the principles of reflexive control, one can achieve the desired actions from the opposite side, which in practice is often referred to as provocation. However, this is a normal and very effective practice of such a war.

A similar approach is applied to neutral and even friendly organizations and structures, which it is undesirable to inform them about their involvement in information operations for one reason or another.

Last year, the Center for Analysis of Strategies and Technologies published the book Aliens Wars, which primarily notes how enormously the role of psychological support for military operations has grown. Absolutely all armed conflicts are accompanied by massive propaganda attacks in the media.

In June of this year, the North Atlantic Alliance decided to create a cybernetic rapid reaction force of the alliance. “We have reached an agreement on the creation of an alliance’s rapid response team in the field of cyber security,” the NATO Secretary General stressed. “NATO’s common cyber defense system will be operational by the fall.” NATO already has its own “computer fortress” - the Alliance's Cybersecurity Center in Tallinn (Estonia).

In early July, information appeared that the idea of ​​creating an analogue of the American "cyber command" of the Russian Defense Ministry, which had matured for the last one and a half years, would acquire its form in the form of a whole separate branch of troops.

Improving the methods of conducting information-psychological war has already led to the natural separation of hostilities in the information space into operations carried out by special services and units of the armed forces, and sabotage (essentially partisan) information-psychological disruptive actions carried out permanently involved in information-psychological war volunteers.

Virtual social communities consisting of volunteers are an ideal form of organizing a modern sabotage and reconnaissance formation for conducting a "guerrilla war" in the information space.

Interesting in this regard is the experience of Israel. The origin of the modern Israeli media strategy is associated with the creation in the office of the Prime Minister of the National Directorate of Information to coordinate the propaganda efforts of all government departments (government, army, embassies and others) and various public organizations. The new management, along with government agencies, has come into contact with bloggers and non-governmental organizations. Official agencies coordinated the activities of volunteers on the information front. The communicative function of social networks has been increasingly replaced by propaganda. A spokesman for the IDF has created its own blog and YouTube channel. The Israeli consulate in New York has opened its own Twitter page.

The positions of military photojournalists who took part in all combat operations of the Israeli armed forces and supply the media with necessary materials were introduced to the staff of combat units. No matter what source of information the user chooses, YouTube, Facebook, Twitter, everywhere he faces Israeli propaganda in the form of information. The Arab world was able to counter the Israeli propaganda mainly hacker attacks. However, according to the journalists of the independent Austrian Internet portal, which collaborates with the Vienna newspaper Die Kronen Zeitung, “non-hackers with their cyber attacks are the key to success in the struggle for public opinion.”

Deputy Prime Minister Dmitry Rogozin considers social networks to be one of the elements of cyberwar, including against Russia. Speaking in the framework of the “Civil University” project in Moscow, the deputy head of the government said that even the State Department is engaged in this kind of things in the USA, where a special department has been created. He added that he had met with the head of this unit, who is actively working "on the use of social networks to achieve the US military goals not by military means."

The propaganda wars in social networks clearly confirmed that the formation of world public opinion is more dependent on bright and visible images created and distributed by volunteers who provide the corresponding content of Internet sites. Today, one TV-picture of the event, transmitted by world agencies and repeatedly replicated by volunteers of media wars, can act as an argument for making momentous decisions.
Author:
Originator:
http://peacekeeper.ru/
16 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. Egoza
    Egoza 22 August 2013 07: 36 New
    +2
    a very necessary team! Stop losing already in the propaganda war.
    1. OTTO
      OTTO 22 August 2013 08: 49 New
      +1
      Quote: Egoza
      really needed team

      Только боюсь ,что команда будет вооружена "вражеским" оружием (железом и программами). И нет никакой какой гарантии , что все "закладки" из него будут вычищены.
      1. Aryan
        Aryan 22 August 2013 10: 35 New
        0
        Throw a boot on the control panel?
        Yes / no
        wink
      2. solomon
        solomon 22 August 2013 11: 07 New
        0
        Do not be so pessimistic.
      3. Interface
        Interface 22 August 2013 13: 40 New
        0
        Да в принципе контролировать информационную безопасность на западных сайтах и хостингах не возможно, скажем на youtube. Единственных выход это отделение рунета от остальной сети и отключение "пропагандистских" веб-ресурсов.

        Identification of users by security authorities by means of registration according to passport data (i.e. only security authorities can read personal data, otherwise he is an anonym for us and you). True, the last thought may not appeal to everyone.
    2. denson06
      denson06 22 August 2013 11: 44 New
      0
      Всё верно... думаю все помнят события 08.08.08 в Южной Осетии.. все помнят как работала западная пропаганда.. в Европе люди были вообще не в курсе того, что на самом деле произошло.. несколько недель все было перевернуто с ног на голову.. отголоски этого до сих пор в сознании "западного" населения..
      Не станем забывать и то, кто являлся наставниками и покровителями Грузинской властной элиты в тот период.. кто помогал планировать военные операции.. и то как они отрубили мгновенно весь русскоязычный интернет и все российские каналы для своего населения, где люди, ненароком, могли узнать другую точку зрения.. отличную от "линии партии".
  2. Ulysses
    Ulysses 22 August 2013 08: 01 New
    0
    The Russian "answer" looks more peaceful than the American. As follows from the text, Moscow intends to fight threats in the network not with methods of intimidation, but with the strengthening of international cooperation.

    When all the servers are in the wrong hands, you won’t especially play cyber warfare.

    Virtual social communities consisting of volunteers are an ideal form of organizing a modern sabotage and reconnaissance formation for conducting a "guerrilla war" in the information space.


    На любом более-менее значимом ресурсе подобных "добровольцев" из-за бугра пруд пруди.
    Пора уже обьединяться и давать свой "ответ Чемберлену".
  3. serge-68-68
    serge-68-68 22 August 2013 09: 03 New
    +1
    A bunch of documents on information security of the Russian Federation have already been signed. Another signed. So what?
    About the need to create cyber command, cyber military, etc. only lazy did not write or speak. So what?
    Introduced the press service. Now, to get into the territory of a local military unit, a local journalist is applying for permission already in St. Petersburg. The tramp lasts at least a month. So what?
    Great experience has been gained not only by Israel, but also by the USA. So what?
    Chatterboxes.
    One pleases. Without noise and dust, teams work in special services. But these groups cannot win any war. At best, saboteurs and information thieves. But also bread ...
    1. mirag2
      mirag2 22 August 2013 09: 15 New
      0
      There is nothing to add ... And I would like to. That everything worked, and that economic crimes were added to the list of threats.
  4. Rus2012
    Rus2012 22 August 2013 09: 30 New
    0
    Does Russia need cyber command?

    ... undoubtedly! and without fail!
    There must be cyber independence first!
    The national OS is no worse than Microsoft, we are not bananas in the end ...
  5. Grigorich 1962
    Grigorich 1962 22 August 2013 09: 40 New
    0
    a separate military branch may not be necessary ... but to make another Directorate of the GRU General Staff was more reasonable .....
  6. solomon
    solomon 22 August 2013 11: 05 New
    +1
    Документ отчасти задумывался как ответ на принятую в 2011 году США "Международную стратегию по действиям в киберпространстве". В ней США впервые приравняли акты компьютерных диверсий к традиционным военным действиям, оставив за собой право реагировать на них всеми средствами вплоть до применения ядерного оружия.

    There is no method against scrap if there is no other scrap!
  7. Double major
    Double major 22 August 2013 13: 33 New
    +2
    Well, the teams on our media space are immeasurable. There is no structure that would coordinate our actions, promptly consulted on the reliability of materials received from various sources and laid out, and if necessary, would give its information for distribution. In the Second World War, partisans were led from the center, and this had a tremendous effect ... Well, let alone we will rejoice for our Motherland, we won’t follow us.
  8. ivshubarin
    ivshubarin 22 August 2013 14: 51 New
    +1
    We must prepare for the wars of the future now
  9. Vtel
    Vtel 22 August 2013 15: 29 New
    +1
    Well, yes, about the spies:

    - The media report that the United States spied on Medvedev!
    - What for?
    - For Medvedev.
    - What for?
    “Not for what, but for whom!” For Medvedev!
    - Sense?
    “They themselves cannot understand ...”

    - Chuck, would you go with Anna Chapman in intelligence? - Asks Huck Chuck.
    “I would go with pleasure, Huck.” I would lie with her on the “bottom” somewhere in Paris or London and how the “mole” worked, worked, worked ...

    After the publication of 300 secret documents on Wikileaks, spies and scouts all over the world went on demonstrations and went on a hunger strike in protest against the deprivation of the right to a profession ...

    Inspector Colonel approaches the sentry at the weapons depot:
    - Last name?
    - Ivanov.
    - What are you guarding?
    - Ammunition.
    - And what are you telling me everything, suddenly I'm a disguised spy.
    Automatic queue. Sentinel thoughtfully:
    - Look what a bastard!

    With great tricks, an American spy got into a secret Russian research institute to a computer with secret info and wanted to drop it onto a USB flash drive, but it wasn’t there: there was a 98th Windows that did not see this flash drive point blank and required a driver, but grab a diskette flash drive place somehow
    and it never occurred to me ...

    The Americans decided to lay a giant oil pipeline from Iraq to the United States.
    But there was a Russian spy in their design bureau, now the pipeline passes ... through Ukraine.

    The plant for the production of intercontinental missiles has been converted for the production of crackers. The first clap on a matinee in a kindergarten was shot down by an American spy satellite falling in the area of ​​the South Pole.

    Bormann Muller:
    - Yesterday on Stirlitz a new lie detector was checked. I told him: "Your last name?" He: "Isaev." The device is silent. Me: "Profession?" He: “Russian spy.” The device is silent again.
    Muller:
    - I told you, write a report ... They always send us faulty equipment !!!

  10. The comment was deleted.
  11. scientist
    scientist 22 August 2013 22: 06 New
    0
    Пока Сов.без не признает что Информационная сфера это самостоятельный ТВД как воздушная для ВВС, морская для ВМС и наземная для СВ со всеми атрибутами вся писанина на счет киберкомандований, инф.безопасности останется лишь на бумаге. Спец.службы будут решать свои задачи, военные свои, а СМИ тех кто больше заплатит. Нужно единое командование, четкое понимание угроз и боевых задач, заблаговременная разработка планов информационных операций, дополнения в Закон о мобилизации информационных ресурсов, жесткие методы разработки и принятия на вооружение компонентов информационного оружия и т.д. А то получается все ведомства действуют как "лебедь рак и щука" шуму и средств много, а эффективность "0", у них даже критериев оценки нет.