Russia Will Create Its Own Internet

Freedom on the Internet has diminished over the years in Russia: people go to jail for posts on social media, there's a ban on VPN services and expanded data storage is hard to come by. Recent moves by the Russian government indicate that further developments are yet to come.

According to a report by the domestic RBK web portal, Russian President Vladimir Putin in 2017 ordered his government to negotiate independent root name servers for the so-called domain name system (DNS). 

This would include the BRICS states, which apart from Russia include Brazil, India, China and South Africa, by August 2018. These servers contain global databases of public IP addresses and their host names. If Russia had its own root servers, it could create a kind of Internet of its own, experts say.

The reason given is the "dominance of the US and a few EU states concerning Internet regulation" which Russia sees as a "serious danger" to its safety, RBK quotes from minutes taken at a meeting of the Russian Security Council. Having its own root servers would make Russia independent of monitors like the International Corporation for Assigned Names and Numbers (ICANN) and protect the country in the event of "outages or deliberate interference." Putin sees Internet as CIA tool

From Moscow's point of view, it would seem the threat of a confrontation with the West in Cyberspace has increased since Russia annexed Crimea. Russia took a closer look at its Internet, and found flaws.

The country and the economy are too big to live with that threat, Putin advisor Igor Shchegolev said in an interview with RBK. He pointed out North Korea and Syria experienced Internet outages for a few days. The US was believed to be behind the December 2015 outage in North Korea; Washington remained silent, however. Moscow doesn't plan to seal itself off completely, Shchegolev said, only to keep the internet working in the country should there be an "external influence." 

President Putin once commented that the Internet was developed as a CIA project and continues to move in that direction. Internet technology was in fact developed by order of the US Department of Defense and by that department's employees.

Preparing for Cyber Warfare

The Russian government can't abide the system because it's set up in a way that governments only have an advisory role with ICANN, said former ICANN board member Wolfgang Kleinwächter. "Unlike the UN Security Council, no one has a permanent seat with veto rights." Moscow, he added, is preparing for a kind of Cyber War. Moscow blogger Alexander Pluschtschev has another explanation: "For somebody, building an 'Internet for BRICS' is a very lucrative state job," he said, adding that it has little practical use.

An Eye on the Root

Russia's plans go right to the root of the Internet. The world's entire communication between computers uses all of 13 DNS root servers. The computers store the so-called zone files of top level domains (TLD) like .com (worldwide), .de for Germany or .ru for Russia. Ten root servers are located in the US, one each in The Netherlands, Sweden and Japan. In addition, there are hundreds of any cast-server networks worldwide, ten of them in Russia alone.

All root servers are independent. Until September 2016, the US government had oversight over the A root server, which stores the DNS master copy. Now an ICANN subsidiary is responsible for that server. ICANN's contract with the US Department of Commerce ended in 2016, and today, the corporation is a private non-profit company based in California headed by a 20-member board that includes experts from all over the world.

Politically Counter-Productive

A Russian root server doesn't make much sense, said cyber-security expert and ICAAN BoardMemeber  Wolfgang Kleinwächter. They always claim the US government can shut off a country from the Internet, he said. "That's utter nonsense."

"Even if the US president has control of the A root server, and he doesn't, deleting the zone files ending on .ru would make no sense at all because this zone file still exists on all the other root and any-cast servers," Kleinwächter argued, adding that sending emails might be a few milliseconds slower. "How would the Americans enforce deleting country zone files for political reasons from the any-cast servers in Moscow?" he said. "Such an order from the White House would not be politically counterproductive, it wouldn't work and it would be a joke for the global Internet community."

"There’s no off-switch," said ICANN Chief Technology Officer David Conrad. In theory, he explained, the US government could force ICANN, a US-based firm, to influence the top level domain concerning Russia, for instance to take the .ru from the root server, adding that connections would become more difficult but overall, it would have a limited effect.

The DNS, Conrad said, is based on trust. "If the US government were to do anything as crazy" as meddling with the root server, he explained, that trust would be gone, and alternative root servers would crop up. The damage to the Internet as a global market place and means of communication would surpass the benefit, he concluded.

Technically, Russia is in the position to set up its own root servers, but it would be difficult to get people to use them, said Kleinwächter. "China, for one, is not likely to follow suit."

Ein News

You Might Also Read: 

Russia Will Build A Separate Internet Directory:

China's Great Wall Into Russian Cybersecurity:

GCHQ To Create A UK National Firewall:

 

« Cyber Insurance: Good News & Bad News
Get Serious About Hardware Cybersecurity »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.

Lupasafe

Lupasafe

Lupasafe is an all-in-one cybersecurity platform for MSPs and SMEs. See all your cyber risks: From training to phishing, darkweb scans, continuous tech monitoring, AI insights, reporting & compliance.