Russia Will Try Leaving The Global Internet

Russia will test its internal RuNet network to see whether the country can function without the global Internet. The tests will begin after November 1st and will recur at least annually, and possibly more frequently. 

It’s the latest move in a series of technical and policy steps intended to allow the Russian government to cut its citizens off from the rest of the world. The exercises follow April’s passage of the Internet Law that will require all Internet traffic in Russia to pass through official checkpoints, allowing the government to shut down foreign access.

The reason for the experiment is to gather insight and provide feedback and modifications to a proposed law introduced in the Russian Parliament last year. 

A first draft of the law mandated that Russian internet providers should ensure the independence of the Russian internet space (Runet) in the case of foreign aggression to disconnect the country from the rest of the internet. In addition, Russian telecom firms would also have to install "technical means" to re-route all Russian Internet traffic to exchange points approved or managed by Roskomnazor, Russia's telecom watchdog. 

Background
In 2016, Russia launched the Closed Data Transfer Segment: basically, a big military Intranet for classified data, similar to the Pentagon’s Joint Worldwide Intelligence Communications System. The following year, Russia said that it intends to build its own domain name directory, which would allow it to re-route Internet traffic.  Last year, Putin’s top IT advisor Herman Klimenko and others suggested that the military intranet, properly expanded, might be able to carry the rest of the country’s Internet traffic. 

Klimenko cautioned that moving to the new system would be painful, and as recently as March, Gen. Paul Nakasone, director of US Cyber Command and the NSA, expressed doubt that Russia would succeed. Samuel Bendett, an adviser at the CNA Corporation and a fellow in Russia studies at the American Foreign Policy Council, said the announcement shows that the Russian government wants to address any strategic vulnerability which is reliance on Western IT. 

“The larger context is Russia’s dependence as a nation on imported/foreign hi-tech and the perceived vulnerabilities that Russia sees in such technology use..... With so many government, public, and private-sector nodes using such foreign tech, the Russian government is seeking to impose a measure of control over how Internet communication over this technology is conducted,” Bendett said. 

“In the event of what the government sees as outside influence affecting RuNet, the state can act, hence the annual exercise.”

RuNet isn’t expected to improve the online experience for Russian people or companies. It’s all about control, making the country more technologically independent, and reducing the Putin regime’s vulnerability to popular uprising.
“The Russian government, particularly since seeing the role social media played in the Arab Spring, has wanted over the last decade to exert tight control over the online information space within Russia’s borders,” said Justin Sherman, a cybersecurity policy fellow at New America.

As the Russian government has built infrastructure that can disconnect Russia from the global Internet, it has also worked to limit Russian citizens’ access to sites and services that allow citizens to mobilise and protest. Access to services such as LinkedIn, Zello, and Telegram is limited by a 2006 Russian law that requires foreign companies to open their software to Russian security services and to hand user data to law enforcement agencies. Sherman said the passage of the sovereign internet law is one more item in this trend.

“When Russia passed its domestic internet bill into law, it wasn’t clear how much the government would actually work to make it happen, but now it’s clear they do intend to modify systems so the internet within Russian borders can be cut off from the global net at will,” Sherman said. 

“They also line up with a series of international pushes by authoritarian governments to make ‘cyber sovereignty’ of this kind more palatable to the global community.”

Euronews:     Defense One:        ZDNet:      

You Might Also Read: 

Russia Will Build A Separate Internet Directory:

Great Wall: China Bans Foreign Online Publishing:

 


 

 

« A £370m Investment To Boost AI In Britain
2020 Will Be A Landmark Year For AI »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Sophos

Sophos

Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

Bufferzone Security

Bufferzone Security

BUFFERZONE® Safe Workspace® is a security suite based on Protection By Containment™, creating isolated virtual environments for safely accessing risky content.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

RySec

RySec

RySec specialize in affordable cybersecurity solutions designed to protect your business from today’s ever-evolving threats.