China's Great Wall Into Russian Cybersecurity

The Kremlin has joined forces with Chinese authorities to bring the internet and its users under greater state control

Russia has been working on incorporating elements of China’s Great Firewall into the “Red Web”, the country’s system of internet filtering and control, after unprecedented cyber collaboration between the countries.

A decision recently to block the networking site LinkedIn in Russia is the most visible in a series of measures to bring the Internet under greater state control. Legislation was announced this month that gives the Kremlin primacy over cyberspace, the exchange points, domain names and cross-border fibre-optic cables that make up the architecture of the Internet.

In the summer, a measure known as Yarovaya’s law was introduced, which requires Russia’s telecoms and Internet providers to store users’ data for six months and metadata for three years.

A group of Kremlin and security officials is driving the offensive against internet freedoms. The government fears the web could be used to mobilise protesters and disseminate dangerous ideas and information and it is looking for ways to switch off connections in times of crisis.

Earlier this year, the security council secretary, Nikolai Patrushev, who was head of the Russian Federal Security Service during Putin’s 2000-08 presidency, had two meetings with Chinese politburo members on information security; and in June, Putin went to Beijing to sign a joint communique about cyberspace (pictured).

What the Russians want most from China is technology. Russia has no means of handling the vast amounts of data required by Yarovaya’s law, and it cannot rely on western technologies because of sanctions.

However, the Chinese are willing to lend a hand. In August it was reported that Blat, the Russian telecoms equipment manufacturer, was in talks with Huawei, the Chinese telecoms company, to buy technologies for data storage and produce servers to implement Yarovaya’s law.

The Chinese officials also ensured senior Huawei staff were present at key information security conferences in Russia, and the company was the major sponsor of the Russian information security forum held in Beijing in October.

“Huawei is essentially an arm of the Chinese state, whoever nominally owns it,” said Gordon Chang, author of The Coming Collapse of China. “Its origins are murky, its growth far too fast for a private company in China, state officials support its efforts, and the absence of competition from state enterprises is another important tell.”

The Russians apparently see no other option than to invite Chinese heavyweights into the heart of its IT strategy. “China remains our only serious ‘ally’, including in the IT sector,” said a source in the Russian information technology industry, adding that despite hopes that Russian manufacturers would fill the void created by sanctions “we are in fact actively switching to Chinese”.

In Russia, the strategy for greater collaboration with China has been developed and promoted by top-level Kremlin officials, generals and businessmen. These include Patrushev, Shchyogolev and Konstantin Malofeev, the billionaire founder of Orthodox channel Tsargrad TV who is the subject of EU sanctions for his connections to separatists in Ukraine. The group is believed to be the driving force behind Yarovaya’s law.

On 7 November, China adopted a controversial cybersecurity law that revived international concerns about censorship in the country. In a sign that collaboration between the countries is mutually beneficial, the legislation echoes Russia’s rules on data localisation and requires “critical information infrastructure operators” to be stored domestically, the law LinkedIn fell foul of. It seems the exchange of ideas has already borne fruit.

Guardian:      ‘Great Cannon’ China’s Weapon Shoots Down Internet Sites:   

Three Pronged Attack: Chinese Military In Cyberwarfare Buildup:


 

« Critical Cybersecurity Protocols To Implement
Codbreakers: Cybersecurity School At Bletchley Park »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

National Cybersecurity and Communications Integration Center (NCCIC)

National Cybersecurity and Communications Integration Center (NCCIC)

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Our IT Department

Our IT Department

Our IT Department Limited is a leading IT services organisation that was founded to provide premium IT support services and the latest technology solutions.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.