Russian Cyber Warfare:'Victory in Syria'

Russian Defense Minister Sergei Shoigu (pictured) has spoken out to promote Russia’s military successes. 

In previous years, Shoigu as well as his predecessors addressed plenary sessions of the Russian Parliament, the Duma behind closed doors; those proceedings were always declared state secrets, and deputies were instructed not to disclose anything to journalists. 

But recently, Shoigu’s address and question time in front of Russian legislators were open to the press and streamed live on the Internet by the Ministry of Defense.

Speaking before the youth forum, Shoigu asserted that Russia has achieved a resounding military-political victory in Syria by defeating the opposition, which was armed by the United States and its allies. 

He added that the wave of so-called “colored” pro-democracy revolutions, allegedly sponsored by the West, has been decisively crushed and reversed by heroic Russian soldiers fighting in Syria. Yugoslavia, Georgia, Iraq, Ukraine and Libya have been the victims of Western-sponsored pro-democracy “colored revolution” insurgencies, according to Shoigu. 

He asserted that while opposition fighters and mercenaries in Syria have been receiving arms and munitions from abroad, Russian weapons and soldiers have stabilised the situation by supporting the legitimate government in Damascus.

In his speech before the Duma, the defense minister declared the mission in Syria accomplished: The possible overthrow of the government of Syrian President Bashar al-Assad has been thwarted, and the Syrian civil war was effectively stopped after the “liberation” of Aleppo. 

The Syrian opposition is being separated from the radicals, something the Western powers, according to Shoigu, could not achieve. Russian naval and air bases in Syria have been secured and will continue to operate indefinitely “to keep the strategic balance in the region and prevent the spread of terrorism.” 

Russia massively used new weapons systems in Syria; and some 86 percent of all Russian air force pilots, according to Shoigu, carried out combat tours in Syria “to gain experience.” Russian special forces and military police battalions “have demonstrated their high efficiency” in Syria.

Replying to questions from Duma members, Shoigu disclosed that, four years ago, Russia secretly created an “information warfare directorate” within the defense ministry, in effect a new branch of the military that will be engaged in cyber warfare “counterpropaganda.” Apparently, this will involve hacking into databases and Internet trolling. 

Duma deputies seemed surprised when Shoigu publicly disclosed this previously secret information. Colonel General Vladimir Shamanov, a former chief of the Airborne Troops (VDV) and the current Duma defense committee chair, told journalists these new troops will “protect Russia’s national defense interests and engage in information warfare,” including cyber warfare. 

Retired Colonel General Leonid Ivashov, the former head of the defense ministry’s international cooperation department, insists Russia should be more aggressive in information warfare “to open up concealed Western Data in the US and in Germany to expose their lies”. 

The hacking of e-mail accounts to dump their contents into the public domain could seem to fit the Russian understanding of “information warfare.”

Shoigu also announced that newly formed army divisions are being deployed in the west, south, north and on the Kurile Islands. A two-divisional air defense command is being deployed in the Arctic: one division covering the Barents Sea region and the other, from Novaya Zemlya Archipelago to Alaska. 

Shoigu further noted than an additional division is being deployed in the Kuriles. In fact, an entire army corps, is reportedly being deployed in the Kuriles: a division and several separate brigades, combining army, anti-aircraft and long-range anti-ship missile units. 

This corps must defend the entire Kurile Island chain, including the presently uninhabited northern islands, not only the southern ones claimed by Japan, against a possible enemy (US and Japan) assault. 

The Kurile corps must deny enemy air and sea assets from penetrating the Sea of Okhotsk, thus turning this body of water into a fortress from which Russian nuclear strategic submarines based in Kamchatka may target the continental United States. 

The Kurile defenses are part of a larger Pacific defense rim from the Bering Strait to Vladivostok. Last August, Shoigu announced the creation of such a defensive rim, which will also include the deployment of a coastguard division on the Chukotka Peninsula, facing Alaska. 

Using long-range anti-ship and anti-aircraft missiles, this division will be tasked with denying the US access to the Arctic through the Bering Strait.

The immediate objective seems obvious: to secure President Putin’s long-term commitment to allocate sufficient funds to continue the military’s massive rearmament program, which is being challenged by the finance ministry wishing to cut defense spending. Shoigu seems to be winning.

Jamestown Foundation

Warning Over Russia's Cyber Warfare Methods:

Russian General Brags About Cyberwar Successes:

Overconfident: US Will Win A Cyber War With China In 2017:

MI5 Head: Russia A Growing Threat To UK:

 

 

 

« Mike Rogers Wants To Buy Cyber Weapons 'Off The Shelf'
Ransomware 'customer support' Chat Reveals Criminals' Ruthlessness »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

National CyberWatch Center - USA

National CyberWatch Center - USA

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

Axoflow

Axoflow

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure.

Parried

Parried

Parried is a leading Managed IT Services and Cybersecurity provider, known for blending deep technical knowledge with business strategy.