"Information Troops" - A Russian Cyber Command?

نویسنده

  • Keir Giles
چکیده

Appraisals of Russian military performance during the armed conflict with Georgia in August 2008 noted, among other deficiencies, poor performance in Information Warfare (IW). This led to calls in informed commentary for the creation of dedicated “Information Troops” within the Russian armed forces, whose duties would include what we would define as cyber operations. This stemmed from a perception in parts of the Russian Armed Forces that the "information war" against Georgia had been lost. No such entity has appeared in the Russian order of battle, but the public discussion and military comment is informative. Prospects for the appearance of “Information Troops” have been discounted both officially by the FSB and privately by Russian military officers. Arguments put forward against a unit of this kind include the unsuitability of servicemen for advanced cyber operations, and the ready availability and deniability of talented civilian volunteers. But at the same time Russia’s EW troops are seeing their role and profile evolve in a manner which suggests they may be acquiring at least some IW capability. The Russian approach to IW differs from our own, and there are specific perceived internet vulnerabilities which further affect the Russian approach to cyber operations, and prompt Russian pushes for treaty arrangements governing cyberspace. This paper draws on unclassified open-source media and interviews with serving Russian military officers to consider the Russian military view of cyber operations as a subset of information war, and the prospects for creation of “information troops” (whether given this name or not) in the context of ongoing Russian military transformation. Informal links with volunteer and co-opted cyber forces are also considered.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threat Visibility for Cyber Hunters

Multiple branches of the United States military, spearheaded by United States Cyber Command, have embraced threat hunting as a way to defend against more sophisticated adversaries. This white paper explains how Cyber Protection Teams (CPTs) can use wire data to automate detection, speed investigations, and improve the granularity and collection of information. The paper includes examples of thr...

متن کامل

Active cyber defense with denial and deception: A cyber-wargame experiment

In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...

متن کامل

Recommendations on Future Operational Environments Command Control and Cyber Security

—It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of a...

متن کامل

Taxonomies , Ontologies , and Battle Management Languages – Recommendations for the Coalition BML Study Group

Battle Management Language (BML) is defined as an unambiguous language to command and control forces and equipment conducting military operations and to provide for situational awareness and a shared, common operational picture. BML is being designed as a standard representation of a "digitized commander's intent" to be used for real troops, for simulated troops, and for future robotic forces. ...

متن کامل

On Cyber Warfare Command and Control Systems

As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011