American President Donald Trump has committed a new unfriendly act against Russia. He approved a new “Cyber Security Strategy”, which runs counter to the ideas laid down in the time of his predecessor – Barack Obama. According to this document, the US Department of Homeland Security will receive the widest range of powers to ensure the security of the country’s critical infrastructure. At the same time, Americans can cooperate with cybernetic forces of other countries, which are recognized as their strategic allies.
According to the Strategy, the US military will receive absolute freedom in carrying out military special operations in cybernetic space. They are designed to deter intruders from launching digital attacks against the US. Moreover, the military is exempted from the long approval of the plan for such operations. Which, in fact, are the same as the flight of aviation or a tank breakthrough on the territory of the enemy.
Experts believe that American and British cyber war will soon receive unlimited powers to invisibly attack Russia. Then the objects of aggression in the first place will be its information infrastructure – from power plants and airports to public authorities.
Americans are scared by Cyber 9/11.
Under the Obama administration (as it became known from the materials promulgated by Edward Snowden), the United States was also preparing for such a war. But before the cyber attack began, the military was obliged to consult with the State Department, the intelligence community and other agencies. One of the reasons for this complexity is that cyber attacks should not prevent intelligence-gathering operations in the interests of the States.
Now the military does not need such a long agreement. It is believed that the simplification of the procedure occurred under the pressure of congressmen who fiercely criticized Trump for being weak in regard to “the enemies of America.” Moreover, the document was adopted only two months after the Director of National Intelligence of the United States, Dan Coates, said that he was concerned about the possibility of committing Cyber 9/11 (a terrorist attack against the critical information infrastructure of the United States).
Among the most powerful opponents of the Pentagon in this area, Donald Trump refers four states – Russia, China, Iran and North Korea. “They conducted reckless cyberattacks that damaged the prosperity and security of America … use cyberspace solely as a way to challenge the United States, its allies and partners,” the Strategy says.
Over the ocean, the accused countries are accused. that they allegedly undermine the military domination of the United States and the economic viability of the country, stubbornly steal confidential information from public and private institutions in America. At a press conference, Presidential Adviser on Security Issues John Bolton, despite inquiries from journalists, did not specify which operations will now be conducted by the United States. This question, they say, is completely secret.
Sberbank suffered a lot: hackers stole a trillion from Russia.
Not only the US military is ready to carry out cybernetic attacks against Russia. The UK has similar plans: the Sky News television channel reported that the Royal Defense Ministry and the Government Communications Center are preparing to invest £ 250 million (approximately 22 billion rubles) in the creation of a special unit that will reflect the “cyber threat” from the Russians (this structure will not work less than two thousand people).
NATO Secretary General Jens Stoltenberg also threatened Russia: if our country intends to continue cyber attacks on the member states of the alliance, it will be perceived by them as a military threat. NATO and the European Union have already launched a joint information system on threats in cyberspace, which is aimed specifically against Russia. But surely Western countries use their capabilities not only for preventive strikes. Perhaps this is associated with a sharp increase in the number of cyber attacks on Russia’s critical information infrastructure.
So, Vladimir Putin after the end of the World Cup, said that during the time of mundialya they reflected 25 million cyber attacks. And according to the estimates of the deputy chairman of the board of Sberbank Stanislav Kuznetsov, this year the total damage to Russia from cyber attacks will be 1.1 trillion rubles. And this despite the fact that due to the unwillingness of companies (including large financial ones) to disclose such information, it is usually only known about the fifth part of the state
How significant are threats to Russia’s critical information infrastructure from hacker attacks (including from abroad).
Daria Abramova, Head of Marketing Communications at Orange Business Services in Russia and the CIS: – Number cybercrime in the world regularly grows: if in 2010 there were 3.8 million hacker attacks recorded, in 2016 their number increased to 3.1 billion. And the rapid growth continues. Experts believe that the losses inflicted by cybercriminals on the global economy will amount to about $ 6 trillion by 2021. There are several reasons for this. Firstly, this is the development of the information technologies themselves, the digitalization of banks and financial organizations, the increase in the scale of e-commerce, which attracts the attention of criminals all over the world. Secondly, modern intruders are not alone. Often, they are grouped together, acting very efficiently. Another reason is the insufficient protection measures undertaken by business. The information security of the company in its importance is not inferior to physical security. And requires constant attention. In addition, statistics on 2018 could be affected by the World Cup, during which there was a surge of cyberattacks – including financial organizations.
Alexey Parfentiev, a leading analyst of SearchInform: – State companies that store the most critical data on the population, are, unfortunately, much worse than the banking sector. Inspires optimism the appearance in Russia of the law “On the Security of the Critical Information Infrastructure”, which came into force at the beginning of this year. It assumes special requirements for the organization of protective measures at sites classified as critical infrastructure. This includes, among other things, energy facilities, major banks, and state organizations. The National Coordination Center for Computer Incidents is being created, which will accumulate all information about the attacks and give recommendations on how to avoid them. It is very important that the objects of critical information infrastructure will receive expert support, and not just be responsible for violation of security requirements. I will say that while the law is only rolling. Something is defined in it too widely, something, on the contrary – is too indirect. But the very fact of the adoption of such a document means a very big advance.
Sergey Shutov, head of the Information Security and Analytical Support Department of the company “InfoSecurity” (part of the Softline group of companies) : – Over the past ten years the portrait of a hacker has changed significantly: if earlier they were amateurs who deal with their business more from the sports interest, at the moment we see a target, high-tech, very well funded industry. Targeted / targeted attacks on critical infrastructure are carefully planned and implemented by whole criminal communities in which each participant performs a clear function. As a mechanism in the clock. Also we fix high potential risks, and they are not always calculated in direct financial losses. Take, for example, a major European airport. Most of the actions take place through the central computer. You can imagine the consequences of getting unauthorized access to the central management console by intruders. No aircraft can make a landing, none will take off, no one door, the sensor in the terminal will not work. As a result, an emergency situation. For example, the blocking by informers of the Bristol airport information boards in September of this year virtually completely paralyzed his work. Another example that demonstrates how real the threat is and is high: at the end of 2016, the fact of hacking of the secret computer network SIPRNet was recorded. As a result, the attackers got access to the central control apparatus of combat drones at the US Air Force Base Crick (Nevada).