Military Review

Does Russia need cyber command?

16
In late July, Russian President Vladimir Putin signed the "Fundamentals of the state policy of the Russian Federation in the field of international information security for the period up to 2020 year."


The document was partly conceived as a response to the “International Strategy for Cyberspace Action” adopted in 2011 by the United States. In it, for the first time, the United States equated acts of computer sabotage with traditional military actions, reserving the right to respond to them by all means, including the use of nuclear weapons. weapons. The creation of this document became necessary due to the fact that the information security doctrine signed by President Putin in the 2000 year needed to be adapted.

“After all, new threats have appeared,” said Natalya Kasperskaya, CEO of Infowatch, a Russian company that produces corporate information protection tools.

The Russian "answer" looks more peaceful than the American. As follows from the text, Moscow intends to fight threats in the network not with methods of intimidation, but with the strengthening of international cooperation.

The document highlights four main threats to the Russian Federation in the field of the IIB. The first is the use of information and communication technologies as an information weapon for military-political purposes, for carrying out hostile actions and acts of aggression. The second is the use of ICT for terrorist purposes. The third is cybercrime, including illegal access to computer information, the creation and distribution of malicious programs. The fourth reflects a purely Russian approach. We are talking about the use of Internet technologies to "interfere in the internal affairs of states", "disturbing public order", "inciting hostility" and "promoting ideas that incite violence." The authorities of the Russian Federation forced the events of the Arab Spring to draw attention to this threat, demonstrating the potential of all social networks for organizing and coordinating anti-government actions.

As for the first point, the Americans believe that, according to the criterion of efficiency-cost, information technologies for influencing the enemy significantly exceed traditional weapons systems.

All the leading countries of the world pay considerable attention to the development of the theory and practice of applying the methods of information warfare. However, successful confrontation in this area is possible only if such a system is managed from a single center.

The fact is that in order to achieve high combat effectiveness of informational confrontation, an integrated approach is needed when a multitude of sometimes formally weakly connected methods of influencing an adversary are used to solve one task. This sets as the key task of coordinating the actions of a large number of disparate forces and facilities using various methods and techniques.

The variety of forms of informational confrontation implies the involvement of practically all the main state structures, as well as various non-state entities, in one form or another.

An important feature of such a war is the wide use of the enemy’s resource. By acting on its information system on the basis of the principles of reflexive control, one can achieve the desired actions from the opposite side, which in practice is often referred to as provocation. However, this is a normal and very effective practice of such a war.

A similar approach is applied to neutral and even friendly organizations and structures, which it is undesirable to inform them about their involvement in information operations for one reason or another.

Last year, the Center for Analysis of Strategies and Technologies published the book Aliens Wars, which primarily notes how enormously the role of psychological support for military operations has grown. Absolutely all armed conflicts are accompanied by massive propaganda attacks in the media.

In June of this year, the North Atlantic Alliance decided to create a cybernetic rapid reaction force of the alliance. “We have reached an agreement on the creation of an alliance’s rapid response team in the field of cyber security,” the NATO Secretary General stressed. “NATO’s common cyber defense system will be operational by the fall.” NATO already has its own “computer fortress” - the Alliance's Cybersecurity Center in Tallinn (Estonia).

In early July, information appeared that the idea of ​​creating an analogue of the American "cyber command" of the Russian Defense Ministry, which had matured for the last one and a half years, would acquire its form in the form of a whole separate branch of troops.

Improving the methods of conducting information-psychological war has already led to the natural separation of hostilities in the information space into operations carried out by special services and units of the armed forces, and sabotage (essentially partisan) information-psychological disruptive actions carried out permanently involved in information-psychological war volunteers.

Virtual social communities consisting of volunteers are an ideal form of organizing a modern sabotage and reconnaissance formation for conducting a "guerrilla war" in the information space.

Interesting in this regard is the experience of Israel. The origin of the modern Israeli media strategy is associated with the creation in the office of the Prime Minister of the National Directorate of Information to coordinate the propaganda efforts of all government departments (government, army, embassies and others) and various public organizations. The new management, along with government agencies, has come into contact with bloggers and non-governmental organizations. Official agencies coordinated the activities of volunteers on the information front. The communicative function of social networks has been increasingly replaced by propaganda. A spokesman for the IDF has created its own blog and YouTube channel. The Israeli consulate in New York has opened its own Twitter page.

The positions of military photojournalists who took part in all combat operations of the Israeli armed forces and supply the media with necessary materials were introduced to the staff of combat units. No matter what source of information the user chooses, YouTube, Facebook, Twitter, everywhere he faces Israeli propaganda in the form of information. The Arab world was able to counter the Israeli propaganda mainly hacker attacks. However, according to the journalists of the independent Austrian Internet portal, which collaborates with the Vienna newspaper Die Kronen Zeitung, “non-hackers with their cyber attacks are the key to success in the struggle for public opinion.”

Deputy Prime Minister Dmitry Rogozin considers social networks to be one of the elements of cyberwar, including against Russia. Speaking in the framework of the “Civil University” project in Moscow, the deputy head of the government said that even the State Department is engaged in this kind of things in the USA, where a special department has been created. He added that he had met with the head of this unit, who is actively working "on the use of social networks to achieve the US military goals not by military means."

The propaganda wars in social networks clearly confirmed that the formation of world public opinion is more dependent on bright and visible images created and distributed by volunteers who provide the corresponding content of Internet sites. Today, one TV-picture of the event, transmitted by world agencies and repeatedly replicated by volunteers of media wars, can act as an argument for making momentous decisions.
Author:
Originator:
http://peacekeeper.ru/
16 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. Egoza
    Egoza 22 August 2013 07: 36
    +2
    a very necessary team! Stop losing already in the propaganda war.
    1. OTTO
      OTTO 22 August 2013 08: 49
      +1
      Quote: Egoza
      really needed team

      I'm only afraid that the team will be armed with "enemy" weapons (hardware and software). And there is no guarantee that all "bookmarks" from it will be cleaned.
      1. Aryan
        Aryan 22 August 2013 10: 35
        0
        Throw a boot on the control panel?
        Yes / no
        wink
      2. solomon
        solomon 22 August 2013 11: 07
        0
        Do not be so pessimistic.
      3. Interface
        Interface 22 August 2013 13: 40
        0
        Yes, in principle, it is not possible to control information security on Western sites and hosting, say on youtube. The only way out is to separate the Runet from the rest of the network and turn off the "propaganda" web resources.

        Identification of users by security authorities by means of registration according to passport data (i.e. only security authorities can read personal data, otherwise he is an anonym for us and you). True, the last thought may not appeal to everyone.
    2. denson06
      denson06 22 August 2013 11: 44
      0
      That's right ... I think everyone remembers the events of 08.08.08 in South Ossetia .. everyone remembers how Western propaganda worked .. in Europe people were not at all aware of what actually happened .. for several weeks everything was turned upside down head .. echoes of this are still in the minds of the "Western" population ..
      Let's not forget who were the mentors and patrons of the Georgian power elite at that time .. who helped plan military operations .. and how they instantly cut off the entire Russian-speaking Internet and all Russian channels for their population, where people, inadvertently, could find out a different point of view .. different from the "party line".
  2. Ulysses
    Ulysses 22 August 2013 08: 01
    0
    The Russian "answer" looks more peaceful than the American. As follows from the text, Moscow intends to fight threats in the network not with methods of intimidation, but with the strengthening of international cooperation.

    When all the servers are in the wrong hands, you won’t especially play cyber warfare.

    Virtual social communities consisting of volunteers are an ideal form of organizing a modern sabotage and reconnaissance formation for conducting a "guerrilla war" in the information space.


    On any more or less significant resource of such "volunteers" from over the hill a dime a dozen.
    It's time to unite and give your "answer to Chamberlain."
  3. serge-68-68
    serge-68-68 22 August 2013 09: 03
    +1
    A bunch of documents on information security of the Russian Federation have already been signed. Another signed. So what?
    About the need to create cyber command, cyber military, etc. only lazy did not write or speak. So what?
    Introduced the press service. Now, to get into the territory of a local military unit, a local journalist is applying for permission already in St. Petersburg. The tramp lasts at least a month. So what?
    Great experience has been gained not only by Israel, but also by the USA. So what?
    Chatterboxes.
    One pleases. Without noise and dust, teams work in special services. But these groups cannot win any war. At best, saboteurs and information thieves. But also bread ...
    1. mirag2
      mirag2 22 August 2013 09: 15
      0
      There is nothing to add ... And I would like to. That everything worked, and that economic crimes were added to the list of threats.
  4. Rus2012
    Rus2012 22 August 2013 09: 30
    0
    Does Russia need cyber command?

    ... undoubtedly! and without fail!
    There must be cyber independence first!
    The national OS is no worse than Microsoft, we are not bananas in the end ...
  5. Grigorich 1962
    Grigorich 1962 22 August 2013 09: 40
    0
    a separate military branch may not be necessary ... but to make another Directorate of the GRU General Staff was more reasonable .....
  6. solomon
    solomon 22 August 2013 11: 05
    +1
    The document was conceived in part as a response to the 2011 US International Strategy for Action in Cyberspace. In it, the United States, for the first time, equated acts of computer sabotage with traditional military actions, reserving the right to respond to them by all means, including the use of nuclear weapons.

    There is no method against scrap if there is no other scrap!
  7. Double major
    Double major 22 August 2013 13: 33
    +2
    Well, the teams on our media space are immeasurable. There is no structure that would coordinate our actions, promptly consulted on the reliability of materials received from various sources and laid out, and if necessary, would give its information for distribution. In the Second World War, partisans were led from the center, and this had a tremendous effect ... Well, let alone we will rejoice for our Motherland, we won’t follow us.
  8. ivshubarin
    ivshubarin 22 August 2013 14: 51
    +1
    We must prepare for the wars of the future now
  9. Vtel
    Vtel 22 August 2013 15: 29
    +1
    Well, yes, about the spies:

    - The media report that the United States spied on Medvedev!
    - What for?
    - For Medvedev.
    - What for?
    “Not for what, but for whom!” For Medvedev!
    - Sense?
    “They themselves cannot understand ...”

    - Chuck, would you go with Anna Chapman in intelligence? - Asks Huck Chuck.
    “I would go with pleasure, Huck.” I would lie with her on the “bottom” somewhere in Paris or London and how the “mole” worked, worked, worked ...

    After the publication of 300 secret documents on Wikileaks, spies and scouts all over the world went on demonstrations and went on a hunger strike in protest against the deprivation of the right to a profession ...

    Inspector Colonel approaches the sentry at the weapons depot:
    - Last name?
    - Ivanov.
    - What are you guarding?
    - Ammunition.
    - And what are you telling me everything, suddenly I'm a disguised spy.
    Automatic queue. Sentinel thoughtfully:
    - Look what a bastard!

    With great tricks, an American spy got into a secret Russian research institute to a computer with secret info and wanted to drop it onto a USB flash drive, but it wasn’t there: there was a 98th Windows that did not see this flash drive point blank and required a driver, but grab a diskette flash drive place somehow
    and it never occurred to me ...

    The Americans decided to lay a giant oil pipeline from Iraq to the United States.
    But there was a Russian spy in their design bureau, now the pipeline passes ... through Ukraine.

    The plant for the production of intercontinental missiles has been converted for the production of crackers. The first clap on a matinee in a kindergarten was shot down by an American spy satellite falling in the area of ​​the South Pole.

    Bormann Muller:
    - Yesterday on Stirlitz a new lie detector was checked. I told him: "Your last name?" He: "Isaev." The device is silent. Me: "Profession?" He: “Russian spy.” The device is silent again.
    Muller:
    - I told you, write a report ... They always send us faulty equipment !!!

  10. The comment was deleted.
  11. scientist
    scientist 22 August 2013 22: 06
    0
    Until the Soviet Bez recognizes that the Information Sphere is an independent theater of operations as air for the Air Force, naval for the Navy and ground for the Land Forces with all the attributes, all the scribbling about cyber commands, information security will remain only on paper. The special services will solve their problems, the military will solve their problems, and the media of those who pay more. We need a unified command, a clear understanding of threats and combat missions, the early development of plans for information operations, additions to the Law on the Mobilization of Information Resources, strict methods of developing and adopting information weapon components, etc. Otherwise, it turns out that all departments act like a "swan, cancer and pike"; there is a lot of noise and money, but the effectiveness is "0", they do not even have evaluation criteria.