Russia Can Disconnect From The Internet

A two-year-old effort to allow the Russian military to rely solely on internal networks during wartime has apparently blossomed into support for a digitally isolated government and civil society as well, a top advisor to Vladimir Putin said this week.

“Technically, we are ready for any action now,” Herman Klimenko, the Russian President's spokesman on interent issuse, told Russian television station NTV recently. He added that any such move would not be painless.

In 2016, the government began to operate the Closed Data Transfer Segment, an internal intranet for military and other officials. Klimenko seems to have suggested that the Segment could handle traffic for the rest of the country as well.
The Russian government has long worked to reduce dependence on foreign information technology. (Putin has called the Internet a CIA project.) In 2010, Russia launched an effort to create a Linux-based operating system to wean the government from Microsoft products. 

Five years later, the Russian government mandated that digital data on its citizens be stored on Russian soil, a move perhaps also intended to help keep tabs on the population. Last year, Russia announced that it would build an alternative Domain Name System for use by itself, Brazil, India, China, and South Africa.

Klimenko emphasised that moving to an entirely internal Internet would impose unspecified inconveniences for Russia, and would be “painful.”

That’s understatement, says Samuel Bendett, an associate research analyst at CNA and a fellow in Russia studies at the American Foreign Policy Council. Bendett says that digital isolation is technically possible but not necessarily achievable. For one thing, it would have severe consequences for the Russian economy.

“The key phrase here is that it would be a ‘painful process’ were that to happen in the first place. He is saying that the Russian military and government have their own closed Internet systems,” said Bendett. 

“But while the military may function with its own JWICS [Joint Worldwide Intelligence Communications System], isolating the Russian society from the global Internet may be a very difficult, if not impossible, process, considering how much Russian economic and socio-cultural nodes depend on global Internet traffic.”

The announcement follows a series of bellicose statements and moves from the Russian government in recent months. In October of 2017, during the large Zapad military exercise, the Russian government conducted a massive civil defense drill to prepare the population for total war.

Defense One:

You Migh Also Read: 

Russia Will Create Its Own Internet:

Russia Will Build A Separate Internet Directory:


 

 

« Crypto Mining Malware Hits Business
The Resurgent Cyber Threat From Iran »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.