Russia Will Try Leaving The Global Internet

Russia will test its internal RuNet network to see whether the country can function without the global Internet. The tests will begin after November 1st and will recur at least annually, and possibly more frequently. 

It’s the latest move in a series of technical and policy steps intended to allow the Russian government to cut its citizens off from the rest of the world. The exercises follow April’s passage of the Internet Law that will require all Internet traffic in Russia to pass through official checkpoints, allowing the government to shut down foreign access.

The reason for the experiment is to gather insight and provide feedback and modifications to a proposed law introduced in the Russian Parliament last year. 

A first draft of the law mandated that Russian internet providers should ensure the independence of the Russian internet space (Runet) in the case of foreign aggression to disconnect the country from the rest of the internet. In addition, Russian telecom firms would also have to install "technical means" to re-route all Russian Internet traffic to exchange points approved or managed by Roskomnazor, Russia's telecom watchdog. 

Background
In 2016, Russia launched the Closed Data Transfer Segment: basically, a big military Intranet for classified data, similar to the Pentagon’s Joint Worldwide Intelligence Communications System. The following year, Russia said that it intends to build its own domain name directory, which would allow it to re-route Internet traffic.  Last year, Putin’s top IT advisor Herman Klimenko and others suggested that the military intranet, properly expanded, might be able to carry the rest of the country’s Internet traffic. 

Klimenko cautioned that moving to the new system would be painful, and as recently as March, Gen. Paul Nakasone, director of US Cyber Command and the NSA, expressed doubt that Russia would succeed. Samuel Bendett, an adviser at the CNA Corporation and a fellow in Russia studies at the American Foreign Policy Council, said the announcement shows that the Russian government wants to address any strategic vulnerability which is reliance on Western IT. 

“The larger context is Russia’s dependence as a nation on imported/foreign hi-tech and the perceived vulnerabilities that Russia sees in such technology use..... With so many government, public, and private-sector nodes using such foreign tech, the Russian government is seeking to impose a measure of control over how Internet communication over this technology is conducted,” Bendett said. 

“In the event of what the government sees as outside influence affecting RuNet, the state can act, hence the annual exercise.”

RuNet isn’t expected to improve the online experience for Russian people or companies. It’s all about control, making the country more technologically independent, and reducing the Putin regime’s vulnerability to popular uprising.
“The Russian government, particularly since seeing the role social media played in the Arab Spring, has wanted over the last decade to exert tight control over the online information space within Russia’s borders,” said Justin Sherman, a cybersecurity policy fellow at New America.

As the Russian government has built infrastructure that can disconnect Russia from the global Internet, it has also worked to limit Russian citizens’ access to sites and services that allow citizens to mobilise and protest. Access to services such as LinkedIn, Zello, and Telegram is limited by a 2006 Russian law that requires foreign companies to open their software to Russian security services and to hand user data to law enforcement agencies. Sherman said the passage of the sovereign internet law is one more item in this trend.

“When Russia passed its domestic internet bill into law, it wasn’t clear how much the government would actually work to make it happen, but now it’s clear they do intend to modify systems so the internet within Russian borders can be cut off from the global net at will,” Sherman said. 

“They also line up with a series of international pushes by authoritarian governments to make ‘cyber sovereignty’ of this kind more palatable to the global community.”

Euronews:     Defense One:        ZDNet:      

You Might Also Read: 

Russia Will Build A Separate Internet Directory:

Great Wall: China Bans Foreign Online Publishing:

 


 

 

« A £370m Investment To Boost AI In Britain
2020 Will Be A Landmark Year For AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Cyber Security Canada

Cyber Security Canada

Cyber Security Canada is an accredited Certification Body for government-backed Cyber Security Certification Programs, designed specifically for small and medium-sized Canadian businesses.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.