Hacktivism – a challenge to national security within information society
Issues of cyber threats and cyberterrorism. Phenomenon of dynamic information-communication development of the modern society. The factors that gave rise to cyberterrorism. Hacktivists as people who commit acts of cyberterrorism without financial gain.
Рубрика | Государство и право |
Вид | статья |
Язык | английский |
Дата добавления | 06.04.2019 |
Размер файла | 18,0 K |
Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже
Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.
Размещено на http://www.allbest.ru/
Hacktivism - a challenge to national security within information society
Акопов Григорий Леонидович
доктор политических наук
Аннотация
This article examines the issues of cyber threats and cyberterrorism. The explanation for this phenomenon is the dynamic information-communication development of the modern society. The article examines the factors that gave rise to cyberterrorism. A special attention is given to the so-called hacktivists - those who commit acts of cyberterrorism without financial gain, but rather to support their political ideas; a number of specific examples of hacktivist activity are being presented. As a result, the governments today are forced to concentrate harder about creation of a cyber-shield to ensure information safety. Among the main conclusions the author substantiates the need to place cyber security as the corner stone of every nation. To ensure information and cyber security and counteract these threads, the author recommends forming cyber forces based on scientific brigades. cyberterrorism information communication hacktivist
Ключевые слова: cyberterrorism, cyber threat, cyber forces, hacker attacks, hacktivism, information sovereignty, cyber shield, information security, cyber security, information society
Abstract
This article examines the issues of cyber threats and cyberterrorism. The explanation for this phenomenon is the dynamic information-communication development of the modern society. The article examines the factors that gave rise to cyberterrorism. A special attention is given to the so-called hacktivists - those who commit acts of cyberterrorism without financial gain, but rather to support their political ideas; a number of specific examples of hacktivist activity are being presented. As a result, the governments today are forced to concentrate harder about creation of a cyber-shield to ensure information safety. Among the main conclusions the author substantiates the need to place cyber security as the corner stone of every nation. To ensure information and cyber security and counteract these threads, the author recommends forming cyber forces based on scientific brigades.
Keywords: cyberterrorism, cyber threat, cyber forces, hacker attacks, hacktivism, information sovereignty, cyber shield, information security, cyber security, information society
The modern society is experiencing an ever-growing threat of cyber-attacks, and even though we have already written on the potential and real dangers of transformation from hackers into political terrorists [1], the development of political technologies within modern information society forces us to once again return to this subject.
It is noteworthy that the policy of cyberterrorism, as many other modern political technologies, is developed by the United States. As stated in the report No. RL30735 by the Congressional Research Service of the US Congress: “There are some “cyber threats” that give rise to a general concern. Cyberterrorism includes: political and economic destabilization, sabotage, theft of military and civil assets and resources for political purposes” [2].
It is of no surprise that during disagreements between the United States and the Russian Federation on the issues of Ukraine power struggle and Crimean referendum, the official internet resources of the branches of government, mass media, and largest corporate structures encountered a storm of politically motivated attacks from hackers - “hacktivists”. “Hacktivism” as a phenomenon has a number of definitions. Igor Panarin in his book “Information Warfare and Elections” defined “hacktivism” as “disinterested” hacking for the purpose of political activism [3]. In the same book the author rightly stated that modern hackers became sucked into political games.
The official website of the President of the Russian Federation has been a subject to attacks from hacktivists practically since its launch day. “The recent hacker attack on Kremlin.ru became the strongest attempt ever to destabilize the work of the site” [4], and this is considering the fact that the site of the President of the Russian Federation has been regularly attacked for over ten years. Back in December of 2003, the acting head of the Federal Security Service (FSB) at the time told journalists that “throughout this year just the President's site suffered approximately 100,000 computer attacks. More than 730,000 attacks on websites of various branches of the government authority have been registered in 2003” [5].
It is likely that in an attempt to destabilize the economic situation during the attack on the site of the President, the hacktivists virtually simultaneously attacked the site of the Central Bank of the Russian Federation [6]. On the same day the hackers were able to halt the work of the website of the Ministry of Foreign Affairs [7]. Especially viciously the hacktivists attacked the leading Russian mass media websites; for quite some time they were able to block sites such as: Rg.ru (Russian Newspaper), Ria.ru (RIA Novosti), Tass.ru (Russian news agency), Lenta.ru [8], Expert.ru, Rusrep.ru (Russian reporter) [9], Vesti.ru, while the site of “Channel One” 1tv.ru was attacked twice in one day. As was stated on the official page of the “Channel One” in Vk.com social network, the cause for the outage was a DDoS-attack from Kiev [11].
The attacks on the television channels were not limited to their internet portals; Russian TV satellites were also being attacked from the territory of Western Ukraine. The Ministry of Telecom and Mass Communications of the Russian Federation stated that there is information suggesting that all attacks were being executed from the territory of Western Ukraine [12].
A few days prior to these events, the site of the TV channel “Russia Today” became the victim of the hacker attacks. The cyberhooligans cracked the portal and replaced the instances of the word “Russian” with “Nazi” in the titles of all articles in English language [13].
On the night of March 15, 2014 the hacktivists attacked the site of the Crimean Referendum (Referendum2014.ru). According to the press spokesman of the internet resource it was the “latest generation DDoS-attack” [14].
A number of hacks executed between March 12 and 14 of 2014 were accompanied by leaks of information acquired by use of unauthorized intrusions. One of the examples was the “hacker group called “Russian Cyber Command” hacking into an information security site “SearchInform” and publishing a large number of its documents” [15]. The hackers allege that “there is a link between SearchInform and FSB, and claim that the company's products are being used in all major Russian infrastructure companies, including “Veles Capital”, “Rusal”, “Gazprom”, “Sukhoi”, “United Aircraft Corporation”, “Irkut Corporation”, and others” [15].
The Russian media also reported that there have been attacks on other websites of strategically important companies and organizations in the Russian Federation.
The responsibility for most of the attacks was claimed by an international hacking group “Anonymous”, which has previously often taken responsibility for various internet attacks. Anonymous is a hacker movement that advocates “freedom of Internet”. The hackers gained notoriety thanks to a number of large attacks. Thus in May of 2012 the organization took the responsibility for the attacks on the website of the president and the government of the Russian Federation. In the summer of 2011 the Anonymous spread a video message throughout the Internet, in which they called upon their supporters to unite from all over the world and destroy the social network Facebook [16].
The Anonymous group gained most of its notoriety after a number of attacks in defense of the founder of “WikiLeaks” Julian Assange. According to the information of the “NewsInfo” [17], in 2010 the internet portal of a global payment system MasterCard has temporarily suspended its operations due to a cyberattack. The attack on the site was executed in response to Assange's arrest. In addition to that, the hackers have bombarded the website of a payment system PayPal, which refused to accept donations for WikiLeaks, and the site of the Swiss bank Swiss Post Office, which had frozen the Australian's assets.
It should be noted that the first to fall victim to the virtual vigilantes was the site of the Swedish Prosecution Authority, which initiated the pursuit of the WikiLeaks founder on the charges of rape, and the financial service Postfinance of the Swiss Post Office, which had frozen Assange's accounts [18].
In our opinion, the attacks on Assange's adversaries, acts against the Russian Internet resources, and a number of other organized politically motivated attacks demonstrate an objective threat of the union of hacker groups. The virtual society is prepared for organized acts, and there is a growing threat of a real cyberwar.
It is important to consider that more often than not acts of the hacktivists, who fight for certain political ideas, lead to an appropriate response. Thus after the aforementioned attack on the Russian internet resources, the website of NATO became the subject of a cyberattack. [19]. On the same day the hacktivists published the records of an internet correspondence between the leaders of Ukrainian parties Ukrainian Democratic Alliance for Reform and All-Ukrainian Union "Fatherland". The hackers claimed responsibility for this attack on the pages on VK and Facebook [20].
It is hard to disagree with Frank Barnaby, who in his monography “The Future of Terror” claims that a cyberterrorist with a notebook is capable to cause more harm than a terrorist armed with bombs and other explosives [21].
It is namely the international terrorism that actively utilizes computer networks in their operations. Manuel Castells writes on this fact in the second volume “The Power of Identity” [22] of the trilogy “The Information Age: Economy, Society and Culture” [23]. Overcoming spreading of cybercrime is difficult, but not impossible if certain measures are put in place. First and foremost, it is necessary to have a clear and consecutive international policy on countering cyberterrorism. Among the main requirements would be high quality intelligence gathering, as well as joint efforts of law enforcement agencies and armed forces aimed at prevention of technogenic and cybernetic terrorism.
Since computer terrorism is the reality of today, it is necessary to legislatively set the obligation for state and private structures to undertake technical measures that would ensure protection of computer networks as one of the most vulnerable elements of the modern society.
This issue is talked about by other specialists as well. In the publication “Cyber Warriors at War”, Dr. Berg Hyacinthe claims that some military operations within the framework of information warfare require new legislative foundation and specific normative measures to counteract possible information threats. In his opinion, success in the wars of the future is attainable by organizing preemptive strikes and taking decisive military actions, executed in a pentagonal synchrony of modern warfare: “land, sea, air, cyberspace, and outer-space” [24].
It seems that in the coming years Russia would have to implement extreme measures to ensure cyber safety. Similar instructions have already been voiced by the President of Russia Vladimir Putin on January 21, 2013, when he ordered the Federal Security Service to form an anti-hacker system [25]. Most of developed nations are already forming cyber forces, and putting effort in establishing cybersecurity. In 2011, President Barack Obama defined a number of measures necessary to ensure the realization of the cybersecurity strategy [26]. In June of 2013 leaders of the United States and China met to discuss the issues of cyberterrorism [27]. A few months prior, Barack Obama addressed the Congress, and stated that the problem of cyberterrorism is a priority for the United States [28]. In addition to that, his address outlined the strategy to form cyber forces to protect the nation from cyber threats.
The issues of cyber threats were discussed in May 2015 by the representatives of the BRICS nations, raising the questions of cyber security, and agreeing to devise joint strategies in the area of ensuring information security [29].
It is noteworthy that the role of cyberattacks is so great that a strong strategy on countering cyber terrorism can serve as an influential argument in political campaign battles. Thus the Democratic presidential nominee Hillary Clinton in her first official campaign speech on the New York City's Roosevelt Island stated that “No other country is better prepared to meet emerging threats from cyberattacks…” [30]
In July of 2015 during a meeting with her supporters Hillary Clinton stated: “It's not only the Chinese. We know that other governments--Russia, North Korea, Iran--have either directly or indirectly sponsored hacking” [31].
An objective assessment of the reality of cyber threats substantiates the need for a special attention to the process of cyber security and formation of cyber forces to ensure it.
It is likely that in the coming years Russia and a number of other developed nations will form cyber forces. Such forces can consist of scientific brigades which are being created within Russian armed forces. Namely these scientific brigades can provide the armed forces with the highly qualified specialists capable of creating the cyber-shield and cyber-sword to ensure the information sovereignty of their nation.
The need for a cyber-shield is undeniable. According to the statement by special representative for international cooperation on information security Andrey Krutskikh, in 2014 alone there were 74 million cyberattacks launched against Russia [32]. This is certainly the indicator that substantiates the necessity to establish an information barrier, which could counter the activity of hacktivists and ensure cyber security.
Библиография
1. Акопов Г.Л. Хактивизм в процессе информационно-политических конфликтов. Вопросы безопасности. 2014. № 1. С. 24-32.
2. Доклад Исследовательской службы Конгресса RL30735. Кибервойна. Стивен А. Хилдрет. Размещено на веб сайте Infousa.ru. 20 февраля 2003. {Электронный ресурс}. http://www.infousa.ru/information/bt-1028.htm
3. Панарин И.Н. Информационная война и выборы. М.: ОАО «Издательский Дом «Городец»», 2003. - С. 345
4. Сайт президента России атаковали хакеры. [Электронный ресурс]. Доступ: http://www.rg.ru/2014/03/14/kremlin-ddos-site-anons.html. Дата публикации: 14.03.2014.
5. Чекисты отразили около 100 тысяч атак на сайт Президента. {Электронный ресурс}. Размещено на: www.strana.ru. 19.12.2003.
6. Сайт Центробанка подвергся хакерской атаке. [Электронный ресурс]. Доступ: http://www.rg.ru/2014/03/14/centrobank-site-anons.html. Дата публикации: 14.03.2014.
7. Сайт МИД РФ не работает, возможно, его атаковали хакеры. [Электронный ресурс]. Доступ: http://www.interfax.ru/russia/364738. Дата публикации: 14.03.2014.
8. Сайт «Ленты.ру» могли атаковать хакеры из Anonymous. [Электронный ресурс]. Доступ: http://rbcdaily.ru/media/562949990837912 свободный. Дата публикации: 14.03.2014.
9. Сайты "Эксперта" и "Русского репортера" стали объектами хакерской атаки. [Электронный ресурс]. Доступ: http://eliberator.ru/news/detail.php?ID=904 свободный. Дата публикации: 11.03.2014.
10. Хакеры атаковали сервер ВГТРК. [Электронный ресурс]. Доступ: http://www.tltnews.ru/rus_news/32/480939/ свободный. Дата публикации: 13.03.2014.
11. Хакеры второй раз за день обрушили сайт "Первого канала". [Электронный ресурс]. Доступ: http://top.rbc.ru/society/13/03/2014/910974.shtml свободный. Дата публикации: 13.03.2014.
12. Спутники России подверглись атаке хакеров из Украины. [Электронный ресурс]. Доступ: http://www.vladtime.ru/internet/362086-sputniki-rossii-podverglis-atake-hakerov-iz-ukrainy.html свободный. Дата публикации: 14.03.2014.
13. Хакеры второй раз за день обрушили сайт "Первого канала". [Электронный ресурс]. Доступ: http://top.rbc.ru/society/13/03/2014/910974.shtml свободный. Дата публикации: 13.03.2014.
14. Сайт крымского референдума атаковали из США. Российская газета. [Электронный ресурс]. Доступ: http://www.rg.ru/2014/03/16/ref2014-site.html свободный. Дата публикации: 16.03.2014.
15. Поставщик ИБ-решений для «Газпрома», «Русала» и «Сколково» взломан хакерами. Cnews.ru [Электронный ресурс]. Доступ: http://www.cnews.ru/top/2014/03/12/postavshhik_ibresheniy_dlya_gazproma_rusala_i_skolkovo_vzloman_hakerami_564100 свободный. Дата публикации: 12.03.2014.
16. Сайт «Ленты.ру» могли атаковать хакеры из Anonymous. [Электронный ресурс]. Доступ: http://rbcdaily.ru/media/562949990837912 свободный. Дата публикации: 14.03.2014.
17. Владельцу WikiLeaks и арест не помеха. {Электронный ресурс}. http://www.newsinfo.ru/articles/2010-12-08/wikileaks/744696/
18. Хакеры пошли кибер-войной на обидчиков Ассанжа. Правда.Ру. {Электронный ресурс}. Доступно: http://www.pravda.ru/news/world/09-12-2010/1060291-hakeri-0/
19. DDoS-атаку на сайты НАТО устроил «КиберБеркут». НТВ. 16 марта 2014 года. [Электронный ресурс]. Доступ: http://www.ntv.ru/novosti/860377/ свободный.
20. Украинские хакеры выложили в сеть переписку представителей партий "Удар" и "Батькивщина". ИТАР-ТАСС. 16 марта 2014 года. [Электронный ресурс]. Доступ: http://itar-tass.com/mezhdunarodnaya-panorama/1050998 свободный.
21. Barnaby F. The Future of Terror. Granta Books. London. 2007.
22. Manuel Castells. The Power of Identity: The Information Age-Economy, Society, and Culture: 2. Wiley-Blackwell. U.K. 2010.
23. Manuel Castells. The Rise of the Network Society: Information Age: Economy, Society, and Culture v. 1. Wiley-Blackwell. U.K. 2010; Manuel Castells. The Power of Identity: The Information Age-Economy, Society, and Culture: 2. Wiley-Blackwell. U.K. 2010; Manuel Castells. End of Millennium: v. 3: The Information Age: Economy, Society, and Culture. Wiley-Blackwell. U.K. 2010.
24. Berq P. Hyacinthe. Cyber Warriors at War. Xlibris Corporation. 2010.
25. ФСБ поручено создать антихакерскую систему. Вести. 21 января 2013 года. [Электронный ресурс]. Доступ: http://www.vesti.ru/doc.html?id=1010793 свободный.
26. Официальный сайт Президента США. Cybersecurity. 3 апреля 2011. {Электронный ресурс}. Доступ: http://www.whitehouse.gov/administration/eop/nsc/cybersecurity свободный.
27. Обама и лидер Китая Си Цзиньпин решили выстроить новую модель отношений. {Электронный ресурс}. Доступ http://www.newsru.com/world/08jun2013/obamaxi.html свободный. 08.06.2013.
28. Обама считает проблему борьбы с кибертерроризмом-приоритетной для США. {Электронный ресурс}. Доступ: http://internetua.com/obama-scsitaet-problemu-borbi-s-kiberterrorizmom---prioritetnoi-dlya-ssha свободный. Дата публикации: 25.01.2012.
29. Страны БРИКС выработают единые подходы в информбезопасности. РИА Новости. 26 мая 2015. {Электронный ресурс}. Доступ: http://ria.ru/world/20150526/1066519380.html#ixzz3cxPWfJSe свободный.
30. Хиллари Клинтон пообещала американцам защиту от России. LifeNews. Доступ: http://lifenews.ru/mobile/news/155587 свободный. Дата публикации 14 июня 2015 года.
31. Клинтон: Китай и Россия спонсировали хакеров. Доступ: http://vistanews.ru/politics/13018-klinton-kitay-i-rossiya-sponsirovali-hakerov.html свободный. Дата публикации: 8 июля 2015 года.
32. Крутских А.В. Ключевые проблемы обеспечения международной информационной безопасности. Инфофорум. 7 июля 2015 года
Размещено на Allbest.ru
...Подобные документы
Constitutionalism as political and legal theory and practice of development of the constitutional democratic state and civil society. Principles of modern constitutional system of board. Role of society in the course of formation of municipal authority.
реферат [18,5 K], добавлен 07.01.2015The nature and justification of fundamental legal changes in modern society due to the globalization of cultures and civilizations. Directions and features of Ukrainian law, the requirements for the cost of litigation and particularly its improvement.
реферат [18,4 K], добавлен 14.02.2015The foundations of the constitutional system of the Russian Federation. The civil society as the embodiment of balance of private and public interests. Legal and functional character of the civil society. Institutional structure of constitutional system.
реферат [19,5 K], добавлен 07.01.2015Realization of various collective needs of a society concerns to performance of common causes first of all: the organization of public health services, formation, social security, automobiles and communications, etc.
реферат [9,4 K], добавлен 19.10.2004Concept, importance of the Constitution as the fundamental law of the state, the history of development. Features of the constitutions of the leading powers of the European continent. Factors that influence the content of the Constitution of Bulgaria.
реферат [21,4 K], добавлен 14.02.2015The constitution, by the definition of K. Marx, the famous philosopher of the XIXth. Real purpose of the modern Constitution. Observance and protection of human rights and a citizen. Protection of political, and personal human rights in the society.
реферат [19,2 K], добавлен 10.02.2015History of infantilism. Formation of the civil society and development of the lawful state. About the new constitution of Serbia. Introduction of obligatory examination for all state and municipal officials of knowledge of Constitution of the Russia.
контрольная работа [20,1 K], добавлен 10.02.2015Globalization of the theory, ideology and practice of modern constitutionalism on the border of millennia. The development of the constitutional ideas and institutes. Analyze the model of the Ukrainian constitutionalism and its realization in practice.
реферат [25,5 K], добавлен 07.01.2015General characteristics of the personal security of employees. Bases of fight against a corruption in the tax service of Ukraine. Personal safety of the tax police, concept, content, principles. Legislative regulation of non-state security activity.
реферат [24,7 K], добавлен 08.10.2012Concept of development basic law. Protection of freedom through the implementation of the principle of subsidiarity. Analysis of the humanitarian aspects of the legal status of a person. Systematic review of articles of the constitution of Russia.
реферат [21,2 K], добавлен 14.02.2015Проблеми становлення інформаційного суспільства в Україні. Світова електронна мережа правових документів global legal information network. Види і мета юридичної відповідальності в інформаційному праві. Перспективи розвитку загального законодавства.
реферат [25,0 K], добавлен 22.05.2009Study of the problems of local government in Ukraine. Analysis of its budgetary support, personnel policy, administrative-territorial structure. The priority of reform of local self-management. The constitution of Palestine: "the state in development".
реферат [15,9 K], добавлен 10.02.2015Citizenship is as the condition of possession the rights in the antique policy. The Roman jurisprudence about the place and role of the person in the society. Guarantees of the rights and duties of the citizens in the constitutions of states of the world.
реферат [62,5 K], добавлен 14.02.2015"E-democracy" is a public use of Internet technologies Analysis of the problems dialogue information and of the notional device, uniform and available for specialists, facilities of the electronic constitutional court, on-line participation of citizens.
реферат [17,1 K], добавлен 14.02.2015The political regime: concept, signs, main approaches to the study. The social conditionality and functions of the political system in society. Characteristic of authoritarian, totalitarian, democratic regimes. Features of the political regime in Ukraine.
курсовая работа [30,7 K], добавлен 08.10.2012The Constitutional Court about political parties and religious organizations as institutes of the civil society. The party political component of the constitutional system as the subject of the constitutional control. Creation of regional parties.
реферат [24,9 K], добавлен 14.02.2015The characteristics and structure of constitutional law of Ukraine, factors affecting its formation and development, the current trend. Reform and the direction of change of the legal branch of the state. Principles of functioning of constitutional law.
реферат [40,5 K], добавлен 13.02.2015Problems of sovereignty in modern political life of the world. Main sides of the conflict. National and cultural environment of secessional conflicts. Mutual relations of the church and the state. The law of the Pridnestrovskaia Moldavskaia Respublika.
реферат [20,1 K], добавлен 10.02.2015Consideration of sovereignty as a basic constitutional principles of state law (for example, the countries - members of the Commonwealth of Independent States). Legislative support in Ukraine national development in the socio-cultural (spiritual) sphere.
реферат [20,1 K], добавлен 13.02.2015Analyze general, special and single in different constitutionally legal systems of the countries of the world. The processes of globalization, internationalization, socialization, ecologization, humanization and biologization of the constitutional law.
реферат [17,4 K], добавлен 13.02.2015