Wednesday, April 3, 2019

Espionage and Intrusion Technology in Russia

Espionage and Intrusion technical schoolnology in RussiaNeil McGeever sleuthing and incursion had been happening years before engine room became come to. The cast up in engine room and the dependency on the lucre has made espionage and intrusion simpler and more widespread. Various technology has been verit qualified that wholeows divers(prenominal) slip port of compendium un rightful nurture and signal detection on enemies. Valuable info is existence ga on that pointd and line of descentd online, and entrust continue to incr tranquillity with an emphasis on technology for performing tasks and military operations everyplace the internet. This entropy drive out be intercepted to cater priceless culture.Spying on the public and skiping sensitive information is sure enough breaching the law and unfermented laws atomic number 18 being introduced to entertain the brass and organisations for partaking in these activities. The public prevail the dependabl e to civil and concealing comfortion from these actions and should be obeyed, however there argon trustworthy references when this should be permitted, much(prenominal) as against terrorist groups and organisations. This paper ordain discuss the different technologies being employ to foregather toffee-nosed information and data. It allow for too explain the laws that it affects that exist to protect the public and the fresh laws being introduced to protect the government.Espionage, Intrusion, Technology, ratified, Russia.Russia, and previously the Soviet confederacy, has colossal been recognised as a outlandish knobbed in distinguishing and intrusion on rival countries and organisations since the early 1900s. The Soviet Union active spies in the Cold War to garner information and secrets about the united evinces of America and were previously practice sessiond in World War angiotensin-converting enzyme. This continues immediately but very different, as specia lised technology has been create to nagger and interfere with information, data and communication theory associated with their enemies.Different technology enables different ways of gathering and collecting this information and data. This revolutionary technology allows for quick and good hacking and intrusion, which is nearly impossible to stop when it is happening and difficult to detect who is amenable. It brush aside be performed hundreds and thousands of miles from the mean target so the offender, or offenders, can non be caught close or close to the crime. Most of the technology employ for these activities worldwide was developed in Russia, enabling the Russian government and organisations to easily obtain this technology without having to travel overseas.The Russian secrecy law, the personalised selective information Protection Act, is intended to protect the civil and privacy compensates of the Russian tribe. This should be adhered to by the Russian government, but unfortunately it is non. Russia is a region that enjoys to spy on its take in multitude and it has a mass control trunk in operation to monitor its citizens every move and communication theory (Russias Spying Craze, 2013). The people of Russia argon non happy with this as they should be given a right of privacy in their lives without having all their movements and ph oneness calls monitored and recorded.This document allow for mention cyber-attacks performed by Russia on otherwise nations, and their severity. Technology created and developed by Russian companies that atomic number 18 used by the Russian government and organisations to interfere and hack confidential and private information or data on other countries and its feature people, will likewise be explained. The law to protect the privacy of Russian citizens will also be discussed and how it is side-stepped by the Russian government for their own convenience.Russia is regarded as one of the most active a nd prevalent nations involved in espionage and intrusion. Cyber-espionage is active by Russia to hack and obtain secret information from top departmental government agencies and buildings for their own intelligence. They argon supposedly amenable for hacking and leaking emails from the Democratic National Committee (DNC) to WikiLeaks in 2016 and to let vio of lated the profit at the White House and the State Department activity (Penn-Hall, 2016). The gains and ease of these cyber-attacks on other nations, and because it is difficult to identify who is involved or responsible for the attacks, allows them to continue with this. pack Adams, the CEO and Co-Founder of Infrastructure Defense Inc. (iDefense), regards the Internet as a revolutionary system and declared that Cyberspace has become a upstart foreign battlefield (Constantine, 2012). The internet has no governing torso or police force, which is perfect for executing such(prenominal) attacks and not be detected. Each res publica must jump out on their own or with their allies, to streng indeed their cyber surety and defences, and continuously affright that another nation whitethorn make a significant breakthrough that poses additional threats to them (Interviews, 2001). This makes each country cautious of new and severe attacks that they whitethorn not be able to defend or protect from.Russia has been accused of organising cyber-attacks on many nations. surrounded by 1998 and 2000, a succession of incidents and attacks on the US became known as the moonshine Maze. This was an attack on hundreds of government databases such as the Pentagon, NASA and other agencies by a group of hackers that used specialised computer equipment (Constantine, 2012). The attacks were apparently traced to a mainframe located in Russia, however, they denied this and the perpetrators are supposedly still unknown. Russia has also been accused of a 3-week long cyber-attack on Estonia in 2008. These attacks started when Ru ssia and Estonia were in hostility over Estonias plans to remove a Soviet Union war hi degree in the countrys capital Tallinn. This encouraged Russia to target some of Estonias biggest organisations and corporations such as the president, government ministers, political parties, intelligence service organisations and the banks. Russia again denied involvement with Kremlin spokesman Dmitry Peskov stating that no way could the state be involved in terrorism (Thomas, 2009). Russia are not afraid to attack neighbouring countries, especially when they are much too healthy for lesser nations.More tardily in March 2017, two Russian spies were charged with breaching Yahoo in 2014. This was performed with two other computer hackers and it bear on over half a billion user accounts. It is regarded as one of the king-sizedst data breaches to occur in the United States of America. The Department of Justice start previously charged Russian hackers related to cyber-crime, however this is t he first measure that a criminal case has been brought against Russian government officials (US charges two Russian spies, 2017). Despite these charges, this will not deter Russian government officials and organisations to final stage these activities.Many of the most common and most-used spy and intelligence technology employed today was developed in Russia. This technology was created from ideas the Soviet Union had to instruct and uncover information and intelligence from other countries and from their own people. The Soviet Union wanted many ways of gathering familiarity and information in secrecy, so having various technologies to perform this, allowed to plan for every situation and scenario. One technology would be more useful than another in certain circumstances which prevented the attackers from being discovered and exposed. These technologies put one across all been developed from the late 1980s and upwards after the advancements in computers and other technology su ch as satellites and wired communication. The following will describe the technology used for collecting this information and data.Voice acknowledgement technology was developed by the Speech Technology Centre (STC) in the city of Saint Petersburg. STCs beginnings started from a secret Soviet Union unit that had the backing of the Committee for State Security (KGB) and was developed during the Gulag system under Stalins rule. The roots of the company grew from a neighbouring prison that housed scientists and engineers, which was called the Sharashka Marfino. These scientists and engineers were forced to work to identify voices that were calling to foreign embassies in Moscow.Speech Technology Centre has also started to develop face recognition technologies along with voice recognition. STC announced in December 2012 that it installed the worlds first biometric appointment platform, at a nation-wide level, that combines voice and face appointment capabilities. This new system will allow authorities and governments to store prototypes of suspects and criminals on a large database. STC has also claimed that it has invented algorithms that deliver reliable results even when facial characteristics have undergone corporeal changes, and the systems voice and face modalities can be used together or separately a voice sample or facial image alone is sufficient to make an identification. STC has publicly made it known that its surveillance technology is only used for utilitarianism uses, however they have been made getable to strict and dictatorship government states such as Uzbekistan and Belarus. Most people will be unhappy with these developments as they fear that they will no longer have the right to privacy as their voice may be recorded without consent and that face recognition technology may mistakenly identify them for doing wrong.Another Russian firm have developed a facial recognition app. This involves submitting photos into the app and the app then s earches through Vkontakte, the Russian tender network version of Facebook, to find a match for the photo. The app is believed to have a 70% accuracy rate (Russian facial recognition, 2016). While some have no issues with the release of the app, others have concerns about privacy and the potential manifestation of personal information. The company do not have their own privacy policy but they have produced an acceptable use policy and licensing capital of New Hampshire to use on their American customers. The acceptable use policy states that the app can only be used for lawful purposes and the licensing agreement expects the licensee to establish their own privacy expectations (Chiel, 2016).Intercepting and interfering with private communications by the law has different procedures and standards in Russia compared to other countries. MFI-Soft is a Russian company that develops information credential and telecommunications products for law enforcement agencies, voice over internet protocol (VoIP) carriers and internet dish providers. The company has developed an interception technology capable of storing, detecting and analysing information that travels over the internet. The company also states that it develops products for national security and intelligence agencies and for the military. It is the largest Russian manufacturer of telecommunications traffic interceptors and has developed a deep packet inspection filtering gibe called Perimeter-F.Russia has recently implemented a new law that states that companies must store data associated with Russian citizens on Russian soil. This law is an attempt by Russia to gain control of the internet and to eliminate all the data stored on Russian people from other countries. The authorities want superior coming to online data by domestic security services and to reduce the entryway to the data by other countries. Multi-national companies such as Facebook and Google are not happy with this law as they would have to move massive data to servers within Russia borders and to inform Roskomnadzor, the Russian internet watchdog, about their location (Walker, 2015). This is a massive operation for multi-national companies to accomplish as Russia is a huge country with a population of well over 100 million people.Russia has recently blocked LinkedIn because they didnt comply with the new laws and didnt store information about Russian people on servers inside Russia. Roskomnadzor had discovered that LinkedIn had broken their laws on storing data and acted accordingly. President Putins spokesman Peskov again said that the blockage is in strict unison with the law and that the Kremlin will not intervene or interfere with the censor of LinkedIn (Matthew, 2016). Companies that do not adhere to Russian laws regarding data storage will be punished.The traditional way of bear in minding in on private incoming reverberate calls is done by monitoring the telecom operator. ascribable to the massive and continuous increase in mobile phone use over the years, it is much simpler and effective to intercept phone calls there and then on the spot. Discovery Telecom Technologies (DTT) was established in Moscow and have developed a system that makes this possible. The companys In-Between Interception agreement affiances by imitating a mobile phone tower and draws in the signals that allows the devices operator to secretly listen and record the phone call. It claims to have the Kremlin and the federal Security Service of the Russian Federation (FSB) as some of its clients.Some Russian people are intelligiblely not happy with this surveillance. The Russian government were brought before the European Court of human Rights because of their surveillance and interception of mobile phone communications in accordance with Article 8 of the European Convention on Human Rights (See Appendix A). Roman Zakharov, complained that Russian law did not sufficiently protect against uncertainty and abu se from authorities and that it breached his right to privacy (European Court, 2016). Although this system was aimed at protecting the public and preventing crime, it did not guarantee protecting against abuse. The Court suggested that there was high risk with a system that had direct access to all mobile phone communications. The Court also believed that Russian law did not meet the quality of law requirement and that it was not necessary in a democratic society (Soldatov Borogan, 2013).The Russian government has introduced new laws and revise the Constitution in recent years because of espionage and intrusion, to lessen and prevent these problems in the future. Article 15, paragragh 4 of the Constitution of the Russian Federation delimits that universally-recognized norms of international law, and international treaties and agreements of the Russian Federation shall be a component part of its sound system ( data Protection, 2016). This includes the ratification of the Strasbour g Convention for the Protection of Individuals regarding the Automatic Processing of Personal Data (ETS No. 108) by Russia in 2005.The right to privacy, which includes the privacy of promise and other communications is recognised in Article 23 of the Constitution, and the disposition, use and storage of information about a person without their consent is out(p) in Article 24. The laws and requirements of data security system and privacy are describe in the Federal Law No. 149-FZ on Information, Information Technologies and Data Protection and the Federal Law No. 152-FZ on Personal Data actions (Data Protection, 2016). These laws and articles of the Constitution are implemented to protect the public from the il effective collection of data and intrusion on their life. Individuals have the right to privacy and to only agree to this by giving consent for those.The Russian government are happy to collect information and spy on the public and this was evident in 1995. The Law on Ope rative Search and Seizures was legalised that allowed the FSB to operate a legal interception system called SORM, which enabled authorities to receive information from internet providers and phone operators. This technology allowed the Russian Security Service to monitor emails, phone calls and internet searches. Without consent and with improper use, the Russian people could fight for their right to privacy if they feel they are being violated against.Other laws have been established and signed to protect against international intrusion and surveillance. The President of the Russian Federation, Vladimir Putin, signed the new Federal Law No. 374 on July 6, 2016, on Amending the Federal Law on Counter Terrorism and Select legislative Acts of the Russian Federation Concerning the Creation of Additional Measures Aimed at Countering Terrorism and protect Public Safety. This recently adopted law contains several conditions that specifically outline the rights of intelligence and secret s ervices when observing private electronic communications and allows law enforcement agencies to collect individual computer information.The law describes the requirements about the identification of users and the safeguarding of metadata that is transmitted across networks by operators of telecommunication networks. This law works in parallel with the Federal Law on Information and Information Technology, which is an bargain of network operators, to keep metadata about all connections, transmissions, and receipts of voice information, create verbally texts, images, sounds, video, and other messages transferred through communications networks for three years.Transmitted messages, telephone communication records and other communication information must be saved by network operators for up to six months. The law also enforces providers of information to reputation all information required for the description of received, transferred, or delivered electronic communications to the Fed eral Security Service. Failing to provide this information results in a fine (New Electronic control, 2017). The Russian government are introducing these laws to protect themselves and other agencies from repercussions and from legal action being taken. However, people can bring their case to the European Court if they feel they have been severely and wrongly victimised.In 2012, Russian President Putin signed another bill into law regarding crimes by espionage and state treason. The Russian Federal Security Service (FSS) proposed the bill to set off that espionage and revealing state secrets are a form of state treason. The FSS also wanted the new law to emphasise the need to prosecute people or organisations that are involved in helping international organisations tenanted in antagonistic activities such as state treason. This new formula covers the assistance given to an international organisation by a Russian national targeting the security of Russia, in addition to co-occur rence given to a foreign country or organisation showing aggressive movements against Russia.The support given to foreign countries or organisations that define state treason is explained in Article 2, paragraph 4 of the Law as financial, material, technical, advisory or any other support given to a foreign country or to international or foreign organizations engaged in activities against the security of the Russian Federation (Federal Law No. 190-FZ). Another area of Federal Law No. 190-FZ has been revise to state that any person that gains knowledge of state secrets and discloses such information to a foreign or Russian organisation will be liable for such act, whereas before, it was only persons who had been entrusted with the information that would be liable and prosecuted. This law has also established a new crime for anyone convicted of breaking this law, which may provide a prison endpoint of up to four years or a fine. This new law covers illegal access to state secrets du e to theft, violence and other methods. This punishment for this crime may be a prison term of amongst three to eight years if the person or people are convicted of using more specialised techniques of espionage (Espionage and State Treason, 2017).Russia will continue to spy on other nations and hack confidential information as they will constantly be paranoid and in fear that other countries and organisations are planning terrorism or other attacks against the state. They are also cognisant that rival countries are engaged in spying and intrusion as most of the super power nations of the East and West are involved in this activity. Russia recognises that information is a valued asset, which demand to be protected, whether at peace or at war. When using this information and data correctly, the enemy can be beaten militarily and politically, and without having to occupy the country.New laws will be introduced in the future and the Constitution will be amended as ambiguities will be exposed in Russian laws as an unhappy Russian society will continue to pursue their protection for civil and privacy rights. Also, large corporations, who can seek powerful legal advice will not be intimidated or afraid to stand against the Russian administration. In recent years, the ban on overseas companies and organisations from storing data about Russian people outside of Russia was introduced, however multi-national companies were causing no harm and only storing the data on databases for their own use. Russia just does not want this data in the hands of other groups and organisations out of fear of the knowledge gained from others from this data.Data is the new oil was phrased by Clive Humby in 2006, a UK Mathematician and architect of Tescos Clubcard scheme (Data is the new oil, 2013), to highlight the massive use of technology and storage of data. Data and information collected legally and illegally is a powerful resource for government bodies and organisations. The incr ease in the use of technology and the internet has led to a growth in data stored online. For example, data uncovered may have been used to plan and prepare for arrange attacks against the state, or for criminal gangs and groups to plan their own attacks. Technology used to collect this data will divide opinions, and if the technology is used unlawfully such as secretly collecting data about Russian people, it will cause discontent among the Russian public. This technology will clearly be a benefit for uncovering and capturing criminals but should not be used widespread to collect information on everybody. The Russian government needs to be careful about crossing this dividing line.ReferencesComputerWeekly. 2017. Russian personal data law set to come into force despite fears. ONLINE acquirable at http//www.computerweekly.com/feature/Russian-personal-data-law-set-to-come-into-force-despite-fears. Accessed 19 February 2017.Early Cold War Spies The Espionage Trials That shape Americ an Politics Central Intelligence Agency. 2017. Early Cold War Spies The Espionage Trials That Shaped American Politics Central Intelligence Agency. ONLINE unattached at https//www.cia.gov/depository library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/intelligence-in-recent-public-literature.html. Accessed 19 February 2017.The Guardian. 2017. Spies, sleepers and hitmen how the Soviet Unions KGB never went away World intelligence The Guardian. ONLINE operable at https//www.theguardian.com/world/2014/nov/19/spies-spooks-hitmen-kgb-never-went-away-russia-putin. Accessed 19 February 2017. internationalistic Business times UK. 2017. Russia gets new Putin-approved cybersecurity doctrine following cyberespionage attack fears. ONLINE Available at http//www.ibtimes.co.uk/russia-gets-new-putin-approved-information-security-doctrine-following-cyberespionage-attack-fears-1595050. Accessed 19 February 2017.Roland Heicker. 2010. Emerging Cyber Threats and Russian Views on Information Warfare and Information trading operations . ONLINE Available at http//www.highseclabs.com/data/foir2970.pdf. Accessed 19 February 2017.Chapter 1. The Fundamentals of the Constitutional System The Constitution of the Russian Federation. 2017. Chapter 1. The Fundamentals of the Constitutional System The Constitution of the Russian Federation. ONLINE Available at http//www.constitution.ru/en/10003000-02.htm. Accessed 19 February 2017.Dentons Russias new anti-terrorist law . 2017. Dentons Russias new anti-terrorist law . ONLINE Available at http//www.dentons.com/en/insights/alerts/2016/july/19/russias-new-anti-terrorist-law. Accessed 19 February 2017. hardheaded Law . 2017. Practical Law . ONLINE Available at http//uk.practicallaw.com/2-502-2227a594893. Accessed 19 February 2017. news report Learning Site. 2017. Spies of the Cold War Era History Learning Site. ONLINE Available at http//www.historylearningsite.co.uk/modern-world-history-1918-to-19 80/the-cold-war/spies-of-the-cold-war-era/. Accessed 19 February 2017.Fox News. 2017. Russian facial recognition app sparks interest, fray Fox News. ONLINE Available at http//www.foxnews.com/tech/2016/12/14/russian-facial-recognition-app-sparks-interest-controversy.html. Accessed 19 February 2017.Fusion.net. 2017. Hyper-accurate face recognition tech goes global Fusion. ONLINE Available at http//fusion.net/story/358817/findface-ntechlab-face-recognition-privacy/. Accessed 19 February 2017.Mail Online. 2017. Moscow blocks LinkedIn because it does not store data on citizens on Russian servers Daily Mail Online. ONLINE Available at http//www.dailymail.co.uk/news/article-3946982/Moscow-blocks-LinkedIn-latest-clampdown-Internet-freedoms-does-not-store-data-country-s-citizens-Russian-based-servers.html. Accessed 19 February 2017.International Justice imagination Center. 2017. European Court Russian Interception of Mobile Phone Communications Violates Convention International Justice Resource Center. ONLINE Available at http//www.ijrcenter.org/2016/01/14/european-court-russian-interception-of-mobile-phone-communications-violates-convention/. Accessed 19 February 2017.WIRED WIRED. 2017. 5 Russian-Made Surveillance Technologies Used in the West WIRED. ONLINE Available at https//www.wired.com/2013/05/russian-surveillance-technologies/. Accessed 19 February 2017.The zilch Brief. 2017. Russia, China, and Cyber Espionage The Cipher Brief. ONLINE Available at https//www.thecipherbrief.com/article/tech/russia-china-and-cyber-espionage-1092. Accessed 19 February 2017.Interviews James Adams Hackers FRONTLINE PBS. 2017. Interviews James Adams Hackers FRONTLINE PBS. ONLINE Available at http//www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html. Accessed 19 February 2017.Russia Data Protection 2016 ICLG International Comparative sanctioned Guides. 2017. Russia Data Protection 2016 ICLG International Comparative Legal Guides. ONLINE Available at https//www.iclg.co.uk/practice-areas/data-protection/data-protection-2016/russiachaptercontent1. Accessed 19 February 2017.Russia New Electronic Surveillance Rules world(a) Legal Monitor. 2017. Russia New Electronic Surveillance Rules Global Legal Monitor. ONLINE Available at http//www.loc.gov/law/foreign-news/article/russia-new-electronic-surveillance-rules/. Accessed 19 February 2017.Russia Espionage and State Treason Concepts revise Global Legal Monitor. 2017. Russia Espionage and State Treason Concepts Revised Global Legal Monitor. ONLINE Available at http//www.loc.gov/law/foreign-news/article/russia-espionage-and-state-treason-concepts-revised/. Accessed 19 February 2017.Inquiries Journal. 2017. Cyber Terrorism and IR Theory Realism, Liberalism, and Constructivism in the New Security Threat Inquiries Journal. ONLINE Available at https//www.inquiriesjournal.com/articles/627/cyber-terrorism-and-ir-theory-realism-liberalism-and-constructivism-in-the-new-security-threat. A ccessed 19 February 2017.Timothy L. Thomas. 2008. Nation -State Cyber Strategies Examples from China and Russia. ONLINE Available at http//ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-20.pdf. Accessed 19 February 2017.The Guardian. 2017. Russian data law fuels web surveillance fears World news The Guardian. ONLINE Available at https//www.theguardian.com/world/2015/sep/01/russia-internet-privacy-laws-control-web. Accessed 19 February 2017.Russias Spying Craze. 2017. Russias Spying Craze. ONLINE Available at https//themoscowtimes.com/articles/russias-spying-craze-29105. Accessed 24 February 2017.Data is the new oil Tech giants may be huge, but nothing matches big data. 2017. Data is the new oi

No comments:

Post a Comment