SlideShare a Scribd company logo
1 of 25
Download to read offline
Russian Approach to Information Warfare 
Jeff Malone 
School of Engineering and IT 
Australian Defence Force Academy 
September 2014
Scope 
•Historical Context 
•Russian Approach to IO 
•Operational Vignettes 
•Emerging Issues
Historical Context
Impact of History and Geography 
•KeyhistoricalinfluencesonRussianapproachtouseandmanipulationofinformationinwarfarearerootedininfluenceofMongolapproachtowarfare andRussiangeography 
•MongolsinRussialargelyfoughtandwonoutnumbered;madeeffectiveuseofdeceptionandintimidation(aprimitivebuteffectivecombinationofPSYOPSandkineticoperations/PPP)asaneffectiveforcemultiplier 
•Mongolseffectivelyemployedthenextanttechnologies(carrierpigeons,dedicatedcommunicationsdispatchriders)toenhancespeedofownC2;alsospecificallytargetedthesameinadversaries 
•Moregenerally,theflatnessofthesteppesmakesitdifficulttoemploynaturalcamouflageandconcealment,placesemphasisonactivedeceptionmeans 
DepictionoftheBattleofKulikovoin1388–aRussianvictoryovertheMongols,usingtheirowntacticsofconcealment,deceptionandambushagainstthem
Revolutionary Era Influences 
•InearlySovietera,keeninterestinuseofpropagandaforbothinternalmobilisationandloyalty,andasaweapontosubvertadversaries 
•Thisalsoentailedtheuseofdisinformation, proxiesandfalse-frontorganisationsforpropagandadissemination 
•Sovietsidentifiedthenemergentmediatechnologies(massnewspapers,radio, cinema)ascriticaldisseminationmeans 
•Correspondinglyrecognisedvulnerabilityofownpopulationtoforeigninfluence,leadingtoastrictregimeofcensorshipandmediacontrolintheSovietstate 
“Wecanandmustwriteinalanguagewhichsowsamongthemasseshate, revulsion,andscorntowardthosewhodisagreewithus.”-V.I.Lenin
Maskirovka 
•EntailsthecoordinatedemploymentofOPSEC,passivecamouflageandconcealment,MILDECandcounter- intelligenceandcounter-ISRactivities 
•Conceptfirstemergesinthe1920s,butisrefinedonthebasisofitsemploymentandoperationalexperienceintheGreatPatrioticWar 
•Particularinterestinrelationshipbetweenmaskirovkaandsurprise, particularlyinthecrucialinitialperiodofwarfaretoachievedecisivevictory; lessonsfromGermansuccessatstartofOperationBARBAROSSA 
•Theconceptisapplicablefromthetacticaluptothenationallevel,andistobeintegratedwithotherinformation- basedactivities 
Diagramillustratingtheenvironmental,technicalandoperationaldimensionsofmaskirovka
Radioelectronic Combat 
•RECemergedintheearly1960sasanoperationalconceptthatintegratedmaskirovka,EW,andoffensive(kinetic)fires 
•Entailsbothdefensive/protectiveandoffensiveactionsandactsasaforcemultiplier 
•KeymissionsinREC: 
•ProtectingfriendlyC2 
•DisruptingadversaryC2 
•ObtainingintelligenceonadversaryRECcapabilities 
•DenyingadversaryintelligenceonfriendlyRECcapabilities 
•Achievingsurpriseintheinitialstageofwar 
•SimilaritytolaterUSconceptsofC3CMandC2W,butprecedesthembyoveradecade 
TheSovietsmadesignificantinvestmentsinRECandREC- enablingcapabilities;picturedhereistheUral,adedicatedC2andRECvesselfortheSovietFarEastPacificFleet
The Military Technical Revolution 
•Term gradually emerged from late 1960s onwards, to describe the impact of emerging information technologies on the conduct of warfare 
•Identifies that the increases in the speed of C2 and the increasing precision of effects would have transformational implications; lessons from Vietnam Conflict and Arab- Israeli wars 
•Key issue for Soviets was that effective Western exploitation of technology would render Soviet numerical advantage irrelevant, lethality of conventional forces would approach those of tactical nuclear weapons 
•Develop the concept of the Reconnaissance Strike Complex, which builds on REC with automated, networked links between C2, sensors and effect generators –NCW in Western terms 
•US response to MTR prompts early thinking about C3CM and an information-based RMA 
The concept of the MTR and RSC was rooted in Soviet fears that Western military integration of information- based technologies would render traditional forces –particularly tank- heavy ground forces –operationally vulnerable and therefore strategically irrelevant
Reception of the 1991 Gulf War 
•Reception of the 1991 Gulf War an important influence on evolution of IO/IW thinking in post-Soviet Russia 
•Success of US C3CM/SEAD campaign seen in some quarters as a validation of MTR/RSC concepts 
•Failure of Iraqi C2 and IADS –closely modelled on Soviet REC principles –leads to questioning of the value of Soviet-era concepts (with counter-argument regarding Iraqi effectiveness in implementing such concepts) 
•Theorists note of the implications of real- time global television reporting on the conflict for mustering domestic and international support 
•Also leads to questioning of whether Soviet command economy could deliver IT underpinning required to implement a MTR in the Soviet armed forces 
Soviet reception of the Gulf War was signally important in shaping post-Soviet views on IO/IW and the implications of the emerging global real-time media environment
Russian Approach to IW
IW in Russian Military Doctrine 
•Current ‘Military Doctrine of the Russian Federation’ promulgated by Presidential edict on 5 February 2010; effectively a statement of defence/military policy for the Russian Federation 
•“Constitutes a system of views officially adopted…for the armed protection of the Russian Federation.” (para 2) 
•Characteristic of contemporary war: “the intensification of the role of information warfare.” (sub-para 12d) 
•“Military action will be typified by the increasing significance of precision, EM, laser, and infrasound weaponry, computer-controlled systems, drones and autonomous maritime craft…” (para 15) 
•Features of modern conflicts: “the prior implementation of measures of information warfare in order to achieve political objectives without the utilisation of military force…” (sub-para 13d) 
•Equipping the armed forces entails: “…develop(ing) forces and resources for information warfare.” (sub-para 41c) 
•Notably does NOT offer a specific definition of ‘information warfare’; this is defined elsewhere in the hierarchy of Russian military concepts and documents
IW in Russian Military Theory 
•A variety of (unclassified) definitions of IW have been offered in Russian open literature 
•“IW is a way of resolving conflict between opposing sides. The goal is for one side to gain and hold an information advantage over the other. This is achieved by exerting a specific information/psychological and information/technical influence on a nation’s decision making system, on the nation’s populace, and on its information resource structures, as well as by defeating the enemy’s control system and his information resource structures with the help of additional means, such as nuclear assets, weapons and electronic assets.” (Russian General Staff Academy definition) 
•“IW is a complex of information support, information counter-measures, and information defence measures, taken according to a single design, and plan, and aimed at gaining and holding information superiority over an enemy while launching and conducting a military action/battle.” (definition published in article by COL S.A. Komov in the journal Military Thought) 
•Emerging (since 2007) concept of Information Strike Operations (transliterated Russian abbreviation: IUO) which extends the REC/RSC concept of operations by incorporating ‘electronic fire’ (an extension of EA arguably including DEWs) and ‘information strike’ (CNO)
SVR Approach to IW 
•Sluzhba Vneshnik Razvedka (SVR) is the Russian Federation’s external intelligence (and covert operations) agency 
•Head of SVR has defined IW as: 
•“…a concept that includes establishing control over other states’ information resources, deterring the development of information technology in countries which are potential enemies, possibly disrupting or completely putting out of operation information networks and communications systems, and developing information weapons and systems for safeguarding the security of a country’s own information structure and information flows.” 
•Suggests a more expansive, national-level approach to IW than a narrowly military one, which specifically includes peacetime measures intended to influence or shape the information environment 
•Includes broader national policy instruments such as export controls, embargoes and ‘information blockades’ to achieve national security outcomes
Information Security Doctrine 
•‘InformationSecurityDoctrineoftheRussianFederation’promulgatedin2000articulatesRussianapproachtotheroleofinformationinnationalsecurity 
•OriginallyadministeredbytheFederalAgencyforGovernmentCommunicationsandInformation(FAPSI–RussianstrategicSIGINTagency);from2003administeredbytheFederalSecurityBureau(FSB–RussianFederationsuccessortotheKGB) 
•Providesabroadoverviewoftheroleofinformationinnationalsecurity,andinformation- basedthreatstothesecurityoftheRussianFederation 
•Specificissuesincludesecurityofgovernmentinformation,cybersecurity,cryptography,mediaoperationandcontrol,andcensorship 
•Roleofinformationinnationalsecurityfurtherdevelopedin2008‘StrategyofInformationSocietyDevelopmentinRussia’and2009‘NationalSecurityStrategy’ 
TheInformationSecurityDoctrineprovidestheoverallframeworkforRussianGovernmentcontrolofinformationandinformationinfrastructurefornationalsecuritypurposes;picturehereisfromaprotestagainstInternetcensorshipinearly2014,thetextreads“censorship”
Operational Vignettes
First Chechen War –1994-96 
•InitialefforttocreateanindependentChechenstateinthewakeofthecollapseoftheSovietUnionin1991;afterseveralyearsofdisorder,resultsin(initiallyundeclared)Russianarmedinterventionin1994 
•ArguablyrepresentedacontinuationofSoviet-erabrute-forceCOIN(aspreviouslydemonstratedinAfghanistan)butnowonaformerSovietterritory 
•Russians–thoughgenerallypoorlyequipped– employREC-typecapabilitiesagainsttheChechens; Chechenssuccessfullyexploitcommerciallyacquiredtechnologies(satellitephones,RFjammers,etc)tosignificanteffect 
•ChechensabletoleverageaccesstoglobalmediaasakeydisseminationmechanismforPSYOPScampaign;Russianperformanceinthisregard–andintryingtodenyChechenaccesstoglobalmedia– regardedaspoor 
•Russianperformanceessentiallyregardedasafailure;arguablydemonstratedrationalefortightenedcontrolsonmediainpost-YeltsinRussia 
RussianCOINoperationsintheFirstChechenWararguablyrepresentedacontinuationoftheheavyhandedapproachtoCOINemployedinAfghanistan
Lessons from Kosovo 1999 
•RussianotadirectprotagonistinOperationALLIEDFORCE,but(arguably) providedsomedegreeofcovertassistancetoSerbia 
•DetectionanddowningofF-117aircraftdemonstratedinnovativeradartechniquescoulddefeatlow-observability(‘stealth’)technologies 
•EffectiveSerbuseofdecoysandcamouflagedemonstratedcontinuingrelevanceofmaskirovkaincounteringanaircampaign 
•NotedthatultimatedecisivefactorincampaignwasnotmilitarydefeatofSerbianarmedforces,butthepoliticalisolation–bothdomesticallyandinternationally–ofSerbleadership 
•DemonstratedtheutilityofInternet(bothdirectlyandviahackinganddefacementofadversarywebpages)asapropagandadisseminationmechanism 
ThedowningofanF-117Nighthawkaircraftdemonstratedthelimitationsoflow-observabilitytechnologywhichhadprovedsousefulinthe1991GulfWar
Second Chechen War –1999-2000 
•Russianinterventionaroseoutofunresolvedissuesfromfirstwar,andinresponsetoterroristattacksattributedtoChechensinRussiaproper 
•MainphaseofoperationsAug1999toMay2000; butinsurgencycontinueduntil2009;RussianmilitaryhandedoperationalleadtosecurityservicesinApr2002 
•RussianemploymentofIWdemonstratedevolutioninRussianapproachtoIWthrough1990s, integratedinformation-technicalandinformation- psychologicalaspects: 
•EnhancedEW,ISRandprecisiontargetingcapabilitiesacquiredsincefirstwarwereeffectivelyemployedwithinanRSCapproach 
•Abletoexertfargreatcontrolofdomesticandglobalmedia(andInternet);wereeffectivelyabletocounterChechennarrativeintheinfosphere 
•Russianexperiencehereshapedfurtherrefinementofmilitary’sapproachtoIWintothe21stcentury 
•Experienceherealsoshapeddevelopmentof‘InformationSecurityDoctrine’releasedin2000 
ChechengraffititauntingRussiantroopsduringtheSecondChechenWar;textreads:“WelcometoHell, Part2”
2007 Estonian Cyber Attacks 
•Significant cyber attacks on Estonian information infrastructure lasted 22 days between April and May 2007; coincided with protests/rioting by Russian ethnic minority in Estonia and economic sanctions by Russian Government 
•Triggered by Estonian government’s decision to relocate a Soviet era monument to Great Patriotic War away from central Tallinn (Estonian capital) 
•Entailed both significant DDOS attacks on Estonian (public and private sector) information infrastructure and defacement of Estonian Government websites 
•Depicted by Russian Government as grass roots activism for which it was not responsible and had no control 
•Despite some circumstantial evidence (IP addresses for launching attacks, dissemination of advice on how to conduct DDOS attacks) full extent of official Russian complicity remains controversial and contested 
A prominent feature of the 2007 Estonian cyber attacks was the hacking and defacement of Estonian government webpages; a common motif in defaced webpages was the replacement of Estonian government symbols with images relating the Soviet era and the ‘Great Patriotic War’
Georgia -2008 
•Rootsofconflictgobacktoimmediatepost-Sovietera;commencedwithGeorgianresponsetoattacksbyRussian-backedseparatistsinOssetia; RussiarespondswithmoregeneralassaultonGeorgia(howeverRussiancyberattacksprecedeactionsbyseparatists) 
•RussiansemployREC-typeactivitiestoundermineGeorgianC2andairdefencecapabilities;someproblemscausedbyUSblackingoutofGPSandpoorperformanceofRussianGLONASSsystem 
•DespitegenerallyoveralloperationalpoorperformancebyRussians,appeartohavelearnedlessonsfromChechenconflicts;inparticularcontrolofaccessbyglobalmediatoconflictarea 
•Cyberattacksconductedbybothsides;effectofRussiancyberattacksonGeorgialesseffectivethaninEstoniabecauseGeorgialess‘wiredup’asanation,thereforelessdependent/vulnerable 
•Arguablyfirstinstancewhere‘kinetic’manoeuvreoperationshavebeendirectlycombinedwithCNOagainstinfrastructuretargets 
AsinEstoniain2007,onefocusofRussian-basedcyberattacksonGeorgiantargetswasthehackinganddefacementofgovernmentwebpages
Ukraine -2014 
•Current on-going operations in Ukraine demonstrate –at least in part –the further evolution of the Russian approach to IW 
•Emphasis of bulk of IW activities thus far has been in the information-psychological domain; involving both overt and covert/proxy activities 
•Campaign has been successful within Russia and annexed portions of Ukraine; distinctly less so elsewhere 
•Has arguably demonstrated the risks of devolved use of social media (e.g.: social media based reporting has seemed to indicate direct separatist involvement in the downing of MH117) 
•Scope of REC/RSC type information-technical activities thus far has been somewhat limited, given the extent of combat operations between Ukraine and Russian/separatist forces; extent of cyber attacks along the lines of those experienced by Estonia and Georgia has been limited 
CounteringimageryassociatedwiththedowningofMH17–apparentlybyRussian-backedUkrainianseparatists– hasnowbecomeamajorchallengefortheRussianIWcampaign
Emergent Issues
Reflexive Control and Psychotronics 
•AdistinctfeatureoftheRussianapproachtoIWhasbeenaspecificfocusonthehumannervoussystemastheultimatetargetofIW-typeactivities 
•Approachstandsastridemoretraditionaldivisionbetween‘information-psychological’and‘information-technical’aspectsofIW 
•ProspectiveIW-typeactivitiesinthisdomainreferredtobytermssuchasReflexiveControl, Psychotronics,andotherterms 
•Potentiallyentailsawiderangeoftechniquesortechnologiestoinduceintendedbehaviourchange: 
•DirectlyinfluencinghumanmentalstatesviainducedEMdirectlytargetingthebrain 
•Impartingsubliminalmessagesbymanipulatinghuman-machineinterfaceinC2/situationalawarenesssystems 
•Weaponisationofpsychedelic,psychotropicorotherpsychoactivesubstances 
•ThechemicalagentemployedbyRussianCTforcesinthe2002Nord-OstTheatrehostagecrisisconceivablyrepresentsanactualoperationalexample 
Theuseofanunknownincapacitatingchemicalagent– leadingtoover100deaths– duringtheNord-OstTheatrehostagecrisiscouldrepresentanactualexampleofthisuniquelyRussianapproachtoIWfocusedonthehumannervoussystem
Conclusion 
•RussianapproachtoIO/IWquitedistincttoUS/WesternAnglophoneone;inparticular, closerassociationbetweenmilitaryIO/IWandtheroleofinformationinoverallnationalsecurity 
•CurrentapproachtoIO/IWbuildsuponhistoricallegacyoftheMongolinfluence,pre- RevolutionaryRussiaandtheSovietperiod 
•Emergenceofmodern(post-Soviet)RussianapproachtoIO/IWhasbeenstronglyinfluencedbybothRussia’sownexperience,andlessonsdrawnfromotherstates(particularlyUS/NATOapplicationofC3CMin1991GulfWarandIO/IWin1999Kosovocampaign) 
•MilitaryIO/IWclosesttoWesternapproach; relationshipbetweenSovietMTRandtheoriginsoftheUSC3CMconcept 
•UniqueaspectsofRussianapproachtoIO/IWrelatetomeasuresintendedtotargetthehumanorganism/nervoussystemdirectly;closestothernationalapproachinthisrespectisarguablysomeaspectsofChineseapproachtoIO/IW 
IWwillbecomeamoreprominentfeaturenotonlyoftheRussianmilitary’sapproachtooperations,butofthenationalsecuritypracticesoftheRussianstateasawhole
References 
•Information Warfare in the Second Chechen War 
•Information Security Doctrine of the Russian Federation 
•Emerging Cyber Threats and Russian Views on IW and IO 
•Anatomy of Russian Information Warfare 
•The Mind Has No Firewall

More Related Content

What's hot

Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Fall of the Soviet Union and end of the Cold War
Fall of the Soviet Union and end of the Cold War Fall of the Soviet Union and end of the Cold War
Fall of the Soviet Union and end of the Cold War HeatherP
 
071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation OverlayMintcho Mintchev
 
Traditional and Non-traditional Security Issues in Bangladesh An Analysis.ppt
Traditional and Non-traditional Security Issues in Bangladesh An Analysis.pptTraditional and Non-traditional Security Issues in Bangladesh An Analysis.ppt
Traditional and Non-traditional Security Issues in Bangladesh An Analysis.pptDrSyamKhan
 
step 1 (1).pptx
step 1 (1).pptxstep 1 (1).pptx
step 1 (1).pptxLainBagz
 
International Security 3
International Security 3International Security 3
International Security 3alw1125
 
Military Decision Making Process (Mar 08) 1
Military Decision Making Process (Mar 08) 1Military Decision Making Process (Mar 08) 1
Military Decision Making Process (Mar 08) 1Thomas cleary
 
Ballistic missile defense system
Ballistic missile defense systemBallistic missile defense system
Ballistic missile defense systemMIT
 
Missile technology
Missile technologyMissile technology
Missile technologyYogesh Garg
 
Civil Military Relations
Civil Military RelationsCivil Military Relations
Civil Military RelationsRaj RANA
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarStanford University
 
Army in multi domain operations 2028
Army in multi domain operations 2028Army in multi domain operations 2028
Army in multi domain operations 2028Neil McDonnell
 

What's hot (20)

Military missiles
Military missilesMilitary missiles
Military missiles
 
ballistic missiles
ballistic missiles ballistic missiles
ballistic missiles
 
Deterrence .pptx
Deterrence .pptxDeterrence .pptx
Deterrence .pptx
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Fall of the Soviet Union and end of the Cold War
Fall of the Soviet Union and end of the Cold War Fall of the Soviet Union and end of the Cold War
Fall of the Soviet Union and end of the Cold War
 
071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay071-332-5000 Prepare an Operation Overlay
071-332-5000 Prepare an Operation Overlay
 
Traditional and Non-traditional Security Issues in Bangladesh An Analysis.ppt
Traditional and Non-traditional Security Issues in Bangladesh An Analysis.pptTraditional and Non-traditional Security Issues in Bangladesh An Analysis.ppt
Traditional and Non-traditional Security Issues in Bangladesh An Analysis.ppt
 
step 1 (1).pptx
step 1 (1).pptxstep 1 (1).pptx
step 1 (1).pptx
 
International Security 3
International Security 3International Security 3
International Security 3
 
Military Decision Making Process (Mar 08) 1
Military Decision Making Process (Mar 08) 1Military Decision Making Process (Mar 08) 1
Military Decision Making Process (Mar 08) 1
 
Proxy wars
Proxy warsProxy wars
Proxy wars
 
Guerra en vietnam
Guerra en vietnamGuerra en vietnam
Guerra en vietnam
 
National_security.pdf
National_security.pdfNational_security.pdf
National_security.pdf
 
Ballistic missile defense system
Ballistic missile defense systemBallistic missile defense system
Ballistic missile defense system
 
Missile technology
Missile technologyMissile technology
Missile technology
 
Adiestramiento militar
Adiestramiento militarAdiestramiento militar
Adiestramiento militar
 
Operation Enduring Freedom
Operation Enduring FreedomOperation Enduring Freedom
Operation Enduring Freedom
 
Civil Military Relations
Civil Military RelationsCivil Military Relations
Civil Military Relations
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
 
Army in multi domain operations 2028
Army in multi domain operations 2028Army in multi domain operations 2028
Army in multi domain operations 2028
 

Viewers also liked

The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...Jeffrey Malone
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian PerspectiveJeffrey Malone
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsJeffrey Malone
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Jeffrey Malone
 
Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceJeffrey Malone
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian PerspectiveJeffrey Malone
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations WorkforceJeffrey Malone
 

Viewers also liked (8)

The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian Perspective
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network Operations
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...
 
Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence Force
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian Perspective
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations Workforce
 

Similar to The Russian Approach to Information Warfare

148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016cacds_ukraine
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber Warpjoyal
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
Lessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptxLessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptxyogeshchoudhary71
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
Military Satellites Summit
Military Satellites SummitMilitary Satellites Summit
Military Satellites Summitcassie111
 
2014 Karles Invitational Conference
2014 Karles Invitational Conference2014 Karles Invitational Conference
2014 Karles Invitational ConferenceJohn Canning
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Jose Gonzalez
 
The Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightThe Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightTed Middleton
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after nextLex Pit
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Manned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyManned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyRichard Lim
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Sharmin Ahammad
 

Similar to The Russian Approach to Information Warfare (20)

Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber War
 
Wizards of-langley
Wizards of-langleyWizards of-langley
Wizards of-langley
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Lessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptxLessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptx
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Military Satellites Summit
Military Satellites SummitMilitary Satellites Summit
Military Satellites Summit
 
2014 Karles Invitational Conference
2014 Karles Invitational Conference2014 Karles Invitational Conference
2014 Karles Invitational Conference
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
 
The Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightThe Sharpest Knife in a Gunfight
The Sharpest Knife in a Gunfight
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after next
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Manned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyManned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. Army
 
Foreig~1 (1)
Foreig~1 (1)Foreig~1 (1)
Foreig~1 (1)
 
Viewgraphs
ViewgraphsViewgraphs
Viewgraphs
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011
 

Recently uploaded

Yale Historical Review Machava Interview PDF Spring 2024
Yale Historical Review Machava Interview PDF Spring 2024Yale Historical Review Machava Interview PDF Spring 2024
Yale Historical Review Machava Interview PDF Spring 2024yalehistoricalreview
 
Item ## 4a -- April 29, 2024 CCM Minutes
Item ## 4a -- April 29, 2024 CCM MinutesItem ## 4a -- April 29, 2024 CCM Minutes
Item ## 4a -- April 29, 2024 CCM Minutesahcitycouncil
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32JSchaus & Associates
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehousesubs7
 
👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...gragfaguni
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s educationSERUDS INDIA
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfSERUDS INDIA
 
"Plant health, safe trade and digital technology." International Day of Plant...
"Plant health, safe trade and digital technology." International Day of Plant..."Plant health, safe trade and digital technology." International Day of Plant...
"Plant health, safe trade and digital technology." International Day of Plant...Christina Parmionova
 
The 2024 World Wildlife Crime Report tracks all these issues, trends and more...
The 2024 World Wildlife Crime Report tracks all these issues, trends and more...The 2024 World Wildlife Crime Report tracks all these issues, trends and more...
The 2024 World Wildlife Crime Report tracks all these issues, trends and more...Christina Parmionova
 
PPT Item # 9 2ndQTR Financial & Inv. Report
PPT Item # 9 2ndQTR Financial & Inv. ReportPPT Item # 9 2ndQTR Financial & Inv. Report
PPT Item # 9 2ndQTR Financial & Inv. Reportahcitycouncil
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31JSchaus & Associates
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgergMadhuKothuru
 
Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...
Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...
Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...VICTOR MAESTRE RAMIREZ
 
World Migratory Bird Day 2024 "Protect insects, Protect Birds"
World Migratory Bird Day  2024 "Protect insects, Protect Birds"World Migratory Bird Day  2024 "Protect insects, Protect Birds"
World Migratory Bird Day 2024 "Protect insects, Protect Birds"Christina Parmionova
 
☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...
☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...
☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...manju garg
 
Item # 7-8 - 6900 Broadway P&Z Case # 438
Item # 7-8 - 6900 Broadway P&Z Case # 438Item # 7-8 - 6900 Broadway P&Z Case # 438
Item # 7-8 - 6900 Broadway P&Z Case # 438ahcitycouncil
 
Tennessee DOT- TEVI Plan coordination & EV
Tennessee DOT- TEVI Plan coordination & EVTennessee DOT- TEVI Plan coordination & EV
Tennessee DOT- TEVI Plan coordination & EVRPO America
 

Recently uploaded (20)

Yale Historical Review Machava Interview PDF Spring 2024
Yale Historical Review Machava Interview PDF Spring 2024Yale Historical Review Machava Interview PDF Spring 2024
Yale Historical Review Machava Interview PDF Spring 2024
 
Item ## 4a -- April 29, 2024 CCM Minutes
Item ## 4a -- April 29, 2024 CCM MinutesItem ## 4a -- April 29, 2024 CCM Minutes
Item ## 4a -- April 29, 2024 CCM Minutes
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie WhitehouseTime, Stress & Work Life Balance for Clerks with Beckie Whitehouse
Time, Stress & Work Life Balance for Clerks with Beckie Whitehouse
 
👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Srinagar Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
Mifepristion Pills IN Kuwait (+918133066128) Where I Can Buy Abortion pills K...
Mifepristion Pills IN Kuwait (+918133066128) Where I Can Buy Abortion pills K...Mifepristion Pills IN Kuwait (+918133066128) Where I Can Buy Abortion pills K...
Mifepristion Pills IN Kuwait (+918133066128) Where I Can Buy Abortion pills K...
 
The Outlook for the Budget and the Economy
The Outlook for the Budget and the EconomyThe Outlook for the Budget and the Economy
The Outlook for the Budget and the Economy
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s education
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
"Plant health, safe trade and digital technology." International Day of Plant...
"Plant health, safe trade and digital technology." International Day of Plant..."Plant health, safe trade and digital technology." International Day of Plant...
"Plant health, safe trade and digital technology." International Day of Plant...
 
The 2024 World Wildlife Crime Report tracks all these issues, trends and more...
The 2024 World Wildlife Crime Report tracks all these issues, trends and more...The 2024 World Wildlife Crime Report tracks all these issues, trends and more...
The 2024 World Wildlife Crime Report tracks all these issues, trends and more...
 
PPT Item # 9 2ndQTR Financial & Inv. Report
PPT Item # 9 2ndQTR Financial & Inv. ReportPPT Item # 9 2ndQTR Financial & Inv. Report
PPT Item # 9 2ndQTR Financial & Inv. Report
 
BioandPicforRepKendrick_LastUpdatedMay2024
BioandPicforRepKendrick_LastUpdatedMay2024BioandPicforRepKendrick_LastUpdatedMay2024
BioandPicforRepKendrick_LastUpdatedMay2024
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 
Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...
Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...
Introduction to The Guidelines for the Long-term Sustainability of Outer Spac...
 
World Migratory Bird Day 2024 "Protect insects, Protect Birds"
World Migratory Bird Day  2024 "Protect insects, Protect Birds"World Migratory Bird Day  2024 "Protect insects, Protect Birds"
World Migratory Bird Day 2024 "Protect insects, Protect Birds"
 
☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...
☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...
☎ ️6378878445 ☎️Cash On Delivery Call Girls In Nandurbar, (Riya) call me [ 63...
 
Item # 7-8 - 6900 Broadway P&Z Case # 438
Item # 7-8 - 6900 Broadway P&Z Case # 438Item # 7-8 - 6900 Broadway P&Z Case # 438
Item # 7-8 - 6900 Broadway P&Z Case # 438
 
Tennessee DOT- TEVI Plan coordination & EV
Tennessee DOT- TEVI Plan coordination & EVTennessee DOT- TEVI Plan coordination & EV
Tennessee DOT- TEVI Plan coordination & EV
 

The Russian Approach to Information Warfare

  • 1. Russian Approach to Information Warfare Jeff Malone School of Engineering and IT Australian Defence Force Academy September 2014
  • 2. Scope •Historical Context •Russian Approach to IO •Operational Vignettes •Emerging Issues
  • 4. Impact of History and Geography •KeyhistoricalinfluencesonRussianapproachtouseandmanipulationofinformationinwarfarearerootedininfluenceofMongolapproachtowarfare andRussiangeography •MongolsinRussialargelyfoughtandwonoutnumbered;madeeffectiveuseofdeceptionandintimidation(aprimitivebuteffectivecombinationofPSYOPSandkineticoperations/PPP)asaneffectiveforcemultiplier •Mongolseffectivelyemployedthenextanttechnologies(carrierpigeons,dedicatedcommunicationsdispatchriders)toenhancespeedofownC2;alsospecificallytargetedthesameinadversaries •Moregenerally,theflatnessofthesteppesmakesitdifficulttoemploynaturalcamouflageandconcealment,placesemphasisonactivedeceptionmeans DepictionoftheBattleofKulikovoin1388–aRussianvictoryovertheMongols,usingtheirowntacticsofconcealment,deceptionandambushagainstthem
  • 5. Revolutionary Era Influences •InearlySovietera,keeninterestinuseofpropagandaforbothinternalmobilisationandloyalty,andasaweapontosubvertadversaries •Thisalsoentailedtheuseofdisinformation, proxiesandfalse-frontorganisationsforpropagandadissemination •Sovietsidentifiedthenemergentmediatechnologies(massnewspapers,radio, cinema)ascriticaldisseminationmeans •Correspondinglyrecognisedvulnerabilityofownpopulationtoforeigninfluence,leadingtoastrictregimeofcensorshipandmediacontrolintheSovietstate “Wecanandmustwriteinalanguagewhichsowsamongthemasseshate, revulsion,andscorntowardthosewhodisagreewithus.”-V.I.Lenin
  • 6. Maskirovka •EntailsthecoordinatedemploymentofOPSEC,passivecamouflageandconcealment,MILDECandcounter- intelligenceandcounter-ISRactivities •Conceptfirstemergesinthe1920s,butisrefinedonthebasisofitsemploymentandoperationalexperienceintheGreatPatrioticWar •Particularinterestinrelationshipbetweenmaskirovkaandsurprise, particularlyinthecrucialinitialperiodofwarfaretoachievedecisivevictory; lessonsfromGermansuccessatstartofOperationBARBAROSSA •Theconceptisapplicablefromthetacticaluptothenationallevel,andistobeintegratedwithotherinformation- basedactivities Diagramillustratingtheenvironmental,technicalandoperationaldimensionsofmaskirovka
  • 7. Radioelectronic Combat •RECemergedintheearly1960sasanoperationalconceptthatintegratedmaskirovka,EW,andoffensive(kinetic)fires •Entailsbothdefensive/protectiveandoffensiveactionsandactsasaforcemultiplier •KeymissionsinREC: •ProtectingfriendlyC2 •DisruptingadversaryC2 •ObtainingintelligenceonadversaryRECcapabilities •DenyingadversaryintelligenceonfriendlyRECcapabilities •Achievingsurpriseintheinitialstageofwar •SimilaritytolaterUSconceptsofC3CMandC2W,butprecedesthembyoveradecade TheSovietsmadesignificantinvestmentsinRECandREC- enablingcapabilities;picturedhereistheUral,adedicatedC2andRECvesselfortheSovietFarEastPacificFleet
  • 8. The Military Technical Revolution •Term gradually emerged from late 1960s onwards, to describe the impact of emerging information technologies on the conduct of warfare •Identifies that the increases in the speed of C2 and the increasing precision of effects would have transformational implications; lessons from Vietnam Conflict and Arab- Israeli wars •Key issue for Soviets was that effective Western exploitation of technology would render Soviet numerical advantage irrelevant, lethality of conventional forces would approach those of tactical nuclear weapons •Develop the concept of the Reconnaissance Strike Complex, which builds on REC with automated, networked links between C2, sensors and effect generators –NCW in Western terms •US response to MTR prompts early thinking about C3CM and an information-based RMA The concept of the MTR and RSC was rooted in Soviet fears that Western military integration of information- based technologies would render traditional forces –particularly tank- heavy ground forces –operationally vulnerable and therefore strategically irrelevant
  • 9. Reception of the 1991 Gulf War •Reception of the 1991 Gulf War an important influence on evolution of IO/IW thinking in post-Soviet Russia •Success of US C3CM/SEAD campaign seen in some quarters as a validation of MTR/RSC concepts •Failure of Iraqi C2 and IADS –closely modelled on Soviet REC principles –leads to questioning of the value of Soviet-era concepts (with counter-argument regarding Iraqi effectiveness in implementing such concepts) •Theorists note of the implications of real- time global television reporting on the conflict for mustering domestic and international support •Also leads to questioning of whether Soviet command economy could deliver IT underpinning required to implement a MTR in the Soviet armed forces Soviet reception of the Gulf War was signally important in shaping post-Soviet views on IO/IW and the implications of the emerging global real-time media environment
  • 11. IW in Russian Military Doctrine •Current ‘Military Doctrine of the Russian Federation’ promulgated by Presidential edict on 5 February 2010; effectively a statement of defence/military policy for the Russian Federation •“Constitutes a system of views officially adopted…for the armed protection of the Russian Federation.” (para 2) •Characteristic of contemporary war: “the intensification of the role of information warfare.” (sub-para 12d) •“Military action will be typified by the increasing significance of precision, EM, laser, and infrasound weaponry, computer-controlled systems, drones and autonomous maritime craft…” (para 15) •Features of modern conflicts: “the prior implementation of measures of information warfare in order to achieve political objectives without the utilisation of military force…” (sub-para 13d) •Equipping the armed forces entails: “…develop(ing) forces and resources for information warfare.” (sub-para 41c) •Notably does NOT offer a specific definition of ‘information warfare’; this is defined elsewhere in the hierarchy of Russian military concepts and documents
  • 12. IW in Russian Military Theory •A variety of (unclassified) definitions of IW have been offered in Russian open literature •“IW is a way of resolving conflict between opposing sides. The goal is for one side to gain and hold an information advantage over the other. This is achieved by exerting a specific information/psychological and information/technical influence on a nation’s decision making system, on the nation’s populace, and on its information resource structures, as well as by defeating the enemy’s control system and his information resource structures with the help of additional means, such as nuclear assets, weapons and electronic assets.” (Russian General Staff Academy definition) •“IW is a complex of information support, information counter-measures, and information defence measures, taken according to a single design, and plan, and aimed at gaining and holding information superiority over an enemy while launching and conducting a military action/battle.” (definition published in article by COL S.A. Komov in the journal Military Thought) •Emerging (since 2007) concept of Information Strike Operations (transliterated Russian abbreviation: IUO) which extends the REC/RSC concept of operations by incorporating ‘electronic fire’ (an extension of EA arguably including DEWs) and ‘information strike’ (CNO)
  • 13. SVR Approach to IW •Sluzhba Vneshnik Razvedka (SVR) is the Russian Federation’s external intelligence (and covert operations) agency •Head of SVR has defined IW as: •“…a concept that includes establishing control over other states’ information resources, deterring the development of information technology in countries which are potential enemies, possibly disrupting or completely putting out of operation information networks and communications systems, and developing information weapons and systems for safeguarding the security of a country’s own information structure and information flows.” •Suggests a more expansive, national-level approach to IW than a narrowly military one, which specifically includes peacetime measures intended to influence or shape the information environment •Includes broader national policy instruments such as export controls, embargoes and ‘information blockades’ to achieve national security outcomes
  • 14. Information Security Doctrine •‘InformationSecurityDoctrineoftheRussianFederation’promulgatedin2000articulatesRussianapproachtotheroleofinformationinnationalsecurity •OriginallyadministeredbytheFederalAgencyforGovernmentCommunicationsandInformation(FAPSI–RussianstrategicSIGINTagency);from2003administeredbytheFederalSecurityBureau(FSB–RussianFederationsuccessortotheKGB) •Providesabroadoverviewoftheroleofinformationinnationalsecurity,andinformation- basedthreatstothesecurityoftheRussianFederation •Specificissuesincludesecurityofgovernmentinformation,cybersecurity,cryptography,mediaoperationandcontrol,andcensorship •Roleofinformationinnationalsecurityfurtherdevelopedin2008‘StrategyofInformationSocietyDevelopmentinRussia’and2009‘NationalSecurityStrategy’ TheInformationSecurityDoctrineprovidestheoverallframeworkforRussianGovernmentcontrolofinformationandinformationinfrastructurefornationalsecuritypurposes;picturehereisfromaprotestagainstInternetcensorshipinearly2014,thetextreads“censorship”
  • 16. First Chechen War –1994-96 •InitialefforttocreateanindependentChechenstateinthewakeofthecollapseoftheSovietUnionin1991;afterseveralyearsofdisorder,resultsin(initiallyundeclared)Russianarmedinterventionin1994 •ArguablyrepresentedacontinuationofSoviet-erabrute-forceCOIN(aspreviouslydemonstratedinAfghanistan)butnowonaformerSovietterritory •Russians–thoughgenerallypoorlyequipped– employREC-typecapabilitiesagainsttheChechens; Chechenssuccessfullyexploitcommerciallyacquiredtechnologies(satellitephones,RFjammers,etc)tosignificanteffect •ChechensabletoleverageaccesstoglobalmediaasakeydisseminationmechanismforPSYOPScampaign;Russianperformanceinthisregard–andintryingtodenyChechenaccesstoglobalmedia– regardedaspoor •Russianperformanceessentiallyregardedasafailure;arguablydemonstratedrationalefortightenedcontrolsonmediainpost-YeltsinRussia RussianCOINoperationsintheFirstChechenWararguablyrepresentedacontinuationoftheheavyhandedapproachtoCOINemployedinAfghanistan
  • 17. Lessons from Kosovo 1999 •RussianotadirectprotagonistinOperationALLIEDFORCE,but(arguably) providedsomedegreeofcovertassistancetoSerbia •DetectionanddowningofF-117aircraftdemonstratedinnovativeradartechniquescoulddefeatlow-observability(‘stealth’)technologies •EffectiveSerbuseofdecoysandcamouflagedemonstratedcontinuingrelevanceofmaskirovkaincounteringanaircampaign •NotedthatultimatedecisivefactorincampaignwasnotmilitarydefeatofSerbianarmedforces,butthepoliticalisolation–bothdomesticallyandinternationally–ofSerbleadership •DemonstratedtheutilityofInternet(bothdirectlyandviahackinganddefacementofadversarywebpages)asapropagandadisseminationmechanism ThedowningofanF-117Nighthawkaircraftdemonstratedthelimitationsoflow-observabilitytechnologywhichhadprovedsousefulinthe1991GulfWar
  • 18. Second Chechen War –1999-2000 •Russianinterventionaroseoutofunresolvedissuesfromfirstwar,andinresponsetoterroristattacksattributedtoChechensinRussiaproper •MainphaseofoperationsAug1999toMay2000; butinsurgencycontinueduntil2009;RussianmilitaryhandedoperationalleadtosecurityservicesinApr2002 •RussianemploymentofIWdemonstratedevolutioninRussianapproachtoIWthrough1990s, integratedinformation-technicalandinformation- psychologicalaspects: •EnhancedEW,ISRandprecisiontargetingcapabilitiesacquiredsincefirstwarwereeffectivelyemployedwithinanRSCapproach •Abletoexertfargreatcontrolofdomesticandglobalmedia(andInternet);wereeffectivelyabletocounterChechennarrativeintheinfosphere •Russianexperiencehereshapedfurtherrefinementofmilitary’sapproachtoIWintothe21stcentury •Experienceherealsoshapeddevelopmentof‘InformationSecurityDoctrine’releasedin2000 ChechengraffititauntingRussiantroopsduringtheSecondChechenWar;textreads:“WelcometoHell, Part2”
  • 19. 2007 Estonian Cyber Attacks •Significant cyber attacks on Estonian information infrastructure lasted 22 days between April and May 2007; coincided with protests/rioting by Russian ethnic minority in Estonia and economic sanctions by Russian Government •Triggered by Estonian government’s decision to relocate a Soviet era monument to Great Patriotic War away from central Tallinn (Estonian capital) •Entailed both significant DDOS attacks on Estonian (public and private sector) information infrastructure and defacement of Estonian Government websites •Depicted by Russian Government as grass roots activism for which it was not responsible and had no control •Despite some circumstantial evidence (IP addresses for launching attacks, dissemination of advice on how to conduct DDOS attacks) full extent of official Russian complicity remains controversial and contested A prominent feature of the 2007 Estonian cyber attacks was the hacking and defacement of Estonian government webpages; a common motif in defaced webpages was the replacement of Estonian government symbols with images relating the Soviet era and the ‘Great Patriotic War’
  • 20. Georgia -2008 •Rootsofconflictgobacktoimmediatepost-Sovietera;commencedwithGeorgianresponsetoattacksbyRussian-backedseparatistsinOssetia; RussiarespondswithmoregeneralassaultonGeorgia(howeverRussiancyberattacksprecedeactionsbyseparatists) •RussiansemployREC-typeactivitiestoundermineGeorgianC2andairdefencecapabilities;someproblemscausedbyUSblackingoutofGPSandpoorperformanceofRussianGLONASSsystem •DespitegenerallyoveralloperationalpoorperformancebyRussians,appeartohavelearnedlessonsfromChechenconflicts;inparticularcontrolofaccessbyglobalmediatoconflictarea •Cyberattacksconductedbybothsides;effectofRussiancyberattacksonGeorgialesseffectivethaninEstoniabecauseGeorgialess‘wiredup’asanation,thereforelessdependent/vulnerable •Arguablyfirstinstancewhere‘kinetic’manoeuvreoperationshavebeendirectlycombinedwithCNOagainstinfrastructuretargets AsinEstoniain2007,onefocusofRussian-basedcyberattacksonGeorgiantargetswasthehackinganddefacementofgovernmentwebpages
  • 21. Ukraine -2014 •Current on-going operations in Ukraine demonstrate –at least in part –the further evolution of the Russian approach to IW •Emphasis of bulk of IW activities thus far has been in the information-psychological domain; involving both overt and covert/proxy activities •Campaign has been successful within Russia and annexed portions of Ukraine; distinctly less so elsewhere •Has arguably demonstrated the risks of devolved use of social media (e.g.: social media based reporting has seemed to indicate direct separatist involvement in the downing of MH117) •Scope of REC/RSC type information-technical activities thus far has been somewhat limited, given the extent of combat operations between Ukraine and Russian/separatist forces; extent of cyber attacks along the lines of those experienced by Estonia and Georgia has been limited CounteringimageryassociatedwiththedowningofMH17–apparentlybyRussian-backedUkrainianseparatists– hasnowbecomeamajorchallengefortheRussianIWcampaign
  • 23. Reflexive Control and Psychotronics •AdistinctfeatureoftheRussianapproachtoIWhasbeenaspecificfocusonthehumannervoussystemastheultimatetargetofIW-typeactivities •Approachstandsastridemoretraditionaldivisionbetween‘information-psychological’and‘information-technical’aspectsofIW •ProspectiveIW-typeactivitiesinthisdomainreferredtobytermssuchasReflexiveControl, Psychotronics,andotherterms •Potentiallyentailsawiderangeoftechniquesortechnologiestoinduceintendedbehaviourchange: •DirectlyinfluencinghumanmentalstatesviainducedEMdirectlytargetingthebrain •Impartingsubliminalmessagesbymanipulatinghuman-machineinterfaceinC2/situationalawarenesssystems •Weaponisationofpsychedelic,psychotropicorotherpsychoactivesubstances •ThechemicalagentemployedbyRussianCTforcesinthe2002Nord-OstTheatrehostagecrisisconceivablyrepresentsanactualoperationalexample Theuseofanunknownincapacitatingchemicalagent– leadingtoover100deaths– duringtheNord-OstTheatrehostagecrisiscouldrepresentanactualexampleofthisuniquelyRussianapproachtoIWfocusedonthehumannervoussystem
  • 24. Conclusion •RussianapproachtoIO/IWquitedistincttoUS/WesternAnglophoneone;inparticular, closerassociationbetweenmilitaryIO/IWandtheroleofinformationinoverallnationalsecurity •CurrentapproachtoIO/IWbuildsuponhistoricallegacyoftheMongolinfluence,pre- RevolutionaryRussiaandtheSovietperiod •Emergenceofmodern(post-Soviet)RussianapproachtoIO/IWhasbeenstronglyinfluencedbybothRussia’sownexperience,andlessonsdrawnfromotherstates(particularlyUS/NATOapplicationofC3CMin1991GulfWarandIO/IWin1999Kosovocampaign) •MilitaryIO/IWclosesttoWesternapproach; relationshipbetweenSovietMTRandtheoriginsoftheUSC3CMconcept •UniqueaspectsofRussianapproachtoIO/IWrelatetomeasuresintendedtotargetthehumanorganism/nervoussystemdirectly;closestothernationalapproachinthisrespectisarguablysomeaspectsofChineseapproachtoIO/IW IWwillbecomeamoreprominentfeaturenotonlyoftheRussianmilitary’sapproachtooperations,butofthenationalsecuritypracticesoftheRussianstateasawhole
  • 25. References •Information Warfare in the Second Chechen War •Information Security Doctrine of the Russian Federation •Emerging Cyber Threats and Russian Views on IW and IO •Anatomy of Russian Information Warfare •The Mind Has No Firewall