SlideShare a Scribd company logo
1 of 25
Download to read offline
Russian Approach to Information Warfare 
Jeff Malone 
School of Engineering and IT 
Australian Defence Force Academy 
September 2014
Scope 
•Historical Context 
•Russian Approach to IO 
•Operational Vignettes 
•Emerging Issues
Historical Context
Impact of History and Geography 
•KeyhistoricalinfluencesonRussianapproachtouseandmanipulationofinformationinwarfarearerootedininfluenceofMongolapproachtowarfare andRussiangeography 
•MongolsinRussialargelyfoughtandwonoutnumbered;madeeffectiveuseofdeceptionandintimidation(aprimitivebuteffectivecombinationofPSYOPSandkineticoperations/PPP)asaneffectiveforcemultiplier 
•Mongolseffectivelyemployedthenextanttechnologies(carrierpigeons,dedicatedcommunicationsdispatchriders)toenhancespeedofownC2;alsospecificallytargetedthesameinadversaries 
•Moregenerally,theflatnessofthesteppesmakesitdifficulttoemploynaturalcamouflageandconcealment,placesemphasisonactivedeceptionmeans 
DepictionoftheBattleofKulikovoin1388–aRussianvictoryovertheMongols,usingtheirowntacticsofconcealment,deceptionandambushagainstthem
Revolutionary Era Influences 
•InearlySovietera,keeninterestinuseofpropagandaforbothinternalmobilisationandloyalty,andasaweapontosubvertadversaries 
•Thisalsoentailedtheuseofdisinformation, proxiesandfalse-frontorganisationsforpropagandadissemination 
•Sovietsidentifiedthenemergentmediatechnologies(massnewspapers,radio, cinema)ascriticaldisseminationmeans 
•Correspondinglyrecognisedvulnerabilityofownpopulationtoforeigninfluence,leadingtoastrictregimeofcensorshipandmediacontrolintheSovietstate 
“Wecanandmustwriteinalanguagewhichsowsamongthemasseshate, revulsion,andscorntowardthosewhodisagreewithus.”-V.I.Lenin
Maskirovka 
•EntailsthecoordinatedemploymentofOPSEC,passivecamouflageandconcealment,MILDECandcounter- intelligenceandcounter-ISRactivities 
•Conceptfirstemergesinthe1920s,butisrefinedonthebasisofitsemploymentandoperationalexperienceintheGreatPatrioticWar 
•Particularinterestinrelationshipbetweenmaskirovkaandsurprise, particularlyinthecrucialinitialperiodofwarfaretoachievedecisivevictory; lessonsfromGermansuccessatstartofOperationBARBAROSSA 
•Theconceptisapplicablefromthetacticaluptothenationallevel,andistobeintegratedwithotherinformation- basedactivities 
Diagramillustratingtheenvironmental,technicalandoperationaldimensionsofmaskirovka
Radioelectronic Combat 
•RECemergedintheearly1960sasanoperationalconceptthatintegratedmaskirovka,EW,andoffensive(kinetic)fires 
•Entailsbothdefensive/protectiveandoffensiveactionsandactsasaforcemultiplier 
•KeymissionsinREC: 
•ProtectingfriendlyC2 
•DisruptingadversaryC2 
•ObtainingintelligenceonadversaryRECcapabilities 
•DenyingadversaryintelligenceonfriendlyRECcapabilities 
•Achievingsurpriseintheinitialstageofwar 
•SimilaritytolaterUSconceptsofC3CMandC2W,butprecedesthembyoveradecade 
TheSovietsmadesignificantinvestmentsinRECandREC- enablingcapabilities;picturedhereistheUral,adedicatedC2andRECvesselfortheSovietFarEastPacificFleet
The Military Technical Revolution 
•Term gradually emerged from late 1960s onwards, to describe the impact of emerging information technologies on the conduct of warfare 
•Identifies that the increases in the speed of C2 and the increasing precision of effects would have transformational implications; lessons from Vietnam Conflict and Arab- Israeli wars 
•Key issue for Soviets was that effective Western exploitation of technology would render Soviet numerical advantage irrelevant, lethality of conventional forces would approach those of tactical nuclear weapons 
•Develop the concept of the Reconnaissance Strike Complex, which builds on REC with automated, networked links between C2, sensors and effect generators –NCW in Western terms 
•US response to MTR prompts early thinking about C3CM and an information-based RMA 
The concept of the MTR and RSC was rooted in Soviet fears that Western military integration of information- based technologies would render traditional forces –particularly tank- heavy ground forces –operationally vulnerable and therefore strategically irrelevant
Reception of the 1991 Gulf War 
•Reception of the 1991 Gulf War an important influence on evolution of IO/IW thinking in post-Soviet Russia 
•Success of US C3CM/SEAD campaign seen in some quarters as a validation of MTR/RSC concepts 
•Failure of Iraqi C2 and IADS –closely modelled on Soviet REC principles –leads to questioning of the value of Soviet-era concepts (with counter-argument regarding Iraqi effectiveness in implementing such concepts) 
•Theorists note of the implications of real- time global television reporting on the conflict for mustering domestic and international support 
•Also leads to questioning of whether Soviet command economy could deliver IT underpinning required to implement a MTR in the Soviet armed forces 
Soviet reception of the Gulf War was signally important in shaping post-Soviet views on IO/IW and the implications of the emerging global real-time media environment
Russian Approach to IW
IW in Russian Military Doctrine 
•Current ‘Military Doctrine of the Russian Federation’ promulgated by Presidential edict on 5 February 2010; effectively a statement of defence/military policy for the Russian Federation 
•“Constitutes a system of views officially adopted…for the armed protection of the Russian Federation.” (para 2) 
•Characteristic of contemporary war: “the intensification of the role of information warfare.” (sub-para 12d) 
•“Military action will be typified by the increasing significance of precision, EM, laser, and infrasound weaponry, computer-controlled systems, drones and autonomous maritime craft…” (para 15) 
•Features of modern conflicts: “the prior implementation of measures of information warfare in order to achieve political objectives without the utilisation of military force…” (sub-para 13d) 
•Equipping the armed forces entails: “…develop(ing) forces and resources for information warfare.” (sub-para 41c) 
•Notably does NOT offer a specific definition of ‘information warfare’; this is defined elsewhere in the hierarchy of Russian military concepts and documents
IW in Russian Military Theory 
•A variety of (unclassified) definitions of IW have been offered in Russian open literature 
•“IW is a way of resolving conflict between opposing sides. The goal is for one side to gain and hold an information advantage over the other. This is achieved by exerting a specific information/psychological and information/technical influence on a nation’s decision making system, on the nation’s populace, and on its information resource structures, as well as by defeating the enemy’s control system and his information resource structures with the help of additional means, such as nuclear assets, weapons and electronic assets.” (Russian General Staff Academy definition) 
•“IW is a complex of information support, information counter-measures, and information defence measures, taken according to a single design, and plan, and aimed at gaining and holding information superiority over an enemy while launching and conducting a military action/battle.” (definition published in article by COL S.A. Komov in the journal Military Thought) 
•Emerging (since 2007) concept of Information Strike Operations (transliterated Russian abbreviation: IUO) which extends the REC/RSC concept of operations by incorporating ‘electronic fire’ (an extension of EA arguably including DEWs) and ‘information strike’ (CNO)
SVR Approach to IW 
•Sluzhba Vneshnik Razvedka (SVR) is the Russian Federation’s external intelligence (and covert operations) agency 
•Head of SVR has defined IW as: 
•“…a concept that includes establishing control over other states’ information resources, deterring the development of information technology in countries which are potential enemies, possibly disrupting or completely putting out of operation information networks and communications systems, and developing information weapons and systems for safeguarding the security of a country’s own information structure and information flows.” 
•Suggests a more expansive, national-level approach to IW than a narrowly military one, which specifically includes peacetime measures intended to influence or shape the information environment 
•Includes broader national policy instruments such as export controls, embargoes and ‘information blockades’ to achieve national security outcomes
Information Security Doctrine 
•‘InformationSecurityDoctrineoftheRussianFederation’promulgatedin2000articulatesRussianapproachtotheroleofinformationinnationalsecurity 
•OriginallyadministeredbytheFederalAgencyforGovernmentCommunicationsandInformation(FAPSI–RussianstrategicSIGINTagency);from2003administeredbytheFederalSecurityBureau(FSB–RussianFederationsuccessortotheKGB) 
•Providesabroadoverviewoftheroleofinformationinnationalsecurity,andinformation- basedthreatstothesecurityoftheRussianFederation 
•Specificissuesincludesecurityofgovernmentinformation,cybersecurity,cryptography,mediaoperationandcontrol,andcensorship 
•Roleofinformationinnationalsecurityfurtherdevelopedin2008‘StrategyofInformationSocietyDevelopmentinRussia’and2009‘NationalSecurityStrategy’ 
TheInformationSecurityDoctrineprovidestheoverallframeworkforRussianGovernmentcontrolofinformationandinformationinfrastructurefornationalsecuritypurposes;picturehereisfromaprotestagainstInternetcensorshipinearly2014,thetextreads“censorship”
Operational Vignettes
First Chechen War –1994-96 
•InitialefforttocreateanindependentChechenstateinthewakeofthecollapseoftheSovietUnionin1991;afterseveralyearsofdisorder,resultsin(initiallyundeclared)Russianarmedinterventionin1994 
•ArguablyrepresentedacontinuationofSoviet-erabrute-forceCOIN(aspreviouslydemonstratedinAfghanistan)butnowonaformerSovietterritory 
•Russians–thoughgenerallypoorlyequipped– employREC-typecapabilitiesagainsttheChechens; Chechenssuccessfullyexploitcommerciallyacquiredtechnologies(satellitephones,RFjammers,etc)tosignificanteffect 
•ChechensabletoleverageaccesstoglobalmediaasakeydisseminationmechanismforPSYOPScampaign;Russianperformanceinthisregard–andintryingtodenyChechenaccesstoglobalmedia– regardedaspoor 
•Russianperformanceessentiallyregardedasafailure;arguablydemonstratedrationalefortightenedcontrolsonmediainpost-YeltsinRussia 
RussianCOINoperationsintheFirstChechenWararguablyrepresentedacontinuationoftheheavyhandedapproachtoCOINemployedinAfghanistan
Lessons from Kosovo 1999 
•RussianotadirectprotagonistinOperationALLIEDFORCE,but(arguably) providedsomedegreeofcovertassistancetoSerbia 
•DetectionanddowningofF-117aircraftdemonstratedinnovativeradartechniquescoulddefeatlow-observability(‘stealth’)technologies 
•EffectiveSerbuseofdecoysandcamouflagedemonstratedcontinuingrelevanceofmaskirovkaincounteringanaircampaign 
•NotedthatultimatedecisivefactorincampaignwasnotmilitarydefeatofSerbianarmedforces,butthepoliticalisolation–bothdomesticallyandinternationally–ofSerbleadership 
•DemonstratedtheutilityofInternet(bothdirectlyandviahackinganddefacementofadversarywebpages)asapropagandadisseminationmechanism 
ThedowningofanF-117Nighthawkaircraftdemonstratedthelimitationsoflow-observabilitytechnologywhichhadprovedsousefulinthe1991GulfWar
Second Chechen War –1999-2000 
•Russianinterventionaroseoutofunresolvedissuesfromfirstwar,andinresponsetoterroristattacksattributedtoChechensinRussiaproper 
•MainphaseofoperationsAug1999toMay2000; butinsurgencycontinueduntil2009;RussianmilitaryhandedoperationalleadtosecurityservicesinApr2002 
•RussianemploymentofIWdemonstratedevolutioninRussianapproachtoIWthrough1990s, integratedinformation-technicalandinformation- psychologicalaspects: 
•EnhancedEW,ISRandprecisiontargetingcapabilitiesacquiredsincefirstwarwereeffectivelyemployedwithinanRSCapproach 
•Abletoexertfargreatcontrolofdomesticandglobalmedia(andInternet);wereeffectivelyabletocounterChechennarrativeintheinfosphere 
•Russianexperiencehereshapedfurtherrefinementofmilitary’sapproachtoIWintothe21stcentury 
•Experienceherealsoshapeddevelopmentof‘InformationSecurityDoctrine’releasedin2000 
ChechengraffititauntingRussiantroopsduringtheSecondChechenWar;textreads:“WelcometoHell, Part2”
2007 Estonian Cyber Attacks 
•Significant cyber attacks on Estonian information infrastructure lasted 22 days between April and May 2007; coincided with protests/rioting by Russian ethnic minority in Estonia and economic sanctions by Russian Government 
•Triggered by Estonian government’s decision to relocate a Soviet era monument to Great Patriotic War away from central Tallinn (Estonian capital) 
•Entailed both significant DDOS attacks on Estonian (public and private sector) information infrastructure and defacement of Estonian Government websites 
•Depicted by Russian Government as grass roots activism for which it was not responsible and had no control 
•Despite some circumstantial evidence (IP addresses for launching attacks, dissemination of advice on how to conduct DDOS attacks) full extent of official Russian complicity remains controversial and contested 
A prominent feature of the 2007 Estonian cyber attacks was the hacking and defacement of Estonian government webpages; a common motif in defaced webpages was the replacement of Estonian government symbols with images relating the Soviet era and the ‘Great Patriotic War’
Georgia -2008 
•Rootsofconflictgobacktoimmediatepost-Sovietera;commencedwithGeorgianresponsetoattacksbyRussian-backedseparatistsinOssetia; RussiarespondswithmoregeneralassaultonGeorgia(howeverRussiancyberattacksprecedeactionsbyseparatists) 
•RussiansemployREC-typeactivitiestoundermineGeorgianC2andairdefencecapabilities;someproblemscausedbyUSblackingoutofGPSandpoorperformanceofRussianGLONASSsystem 
•DespitegenerallyoveralloperationalpoorperformancebyRussians,appeartohavelearnedlessonsfromChechenconflicts;inparticularcontrolofaccessbyglobalmediatoconflictarea 
•Cyberattacksconductedbybothsides;effectofRussiancyberattacksonGeorgialesseffectivethaninEstoniabecauseGeorgialess‘wiredup’asanation,thereforelessdependent/vulnerable 
•Arguablyfirstinstancewhere‘kinetic’manoeuvreoperationshavebeendirectlycombinedwithCNOagainstinfrastructuretargets 
AsinEstoniain2007,onefocusofRussian-basedcyberattacksonGeorgiantargetswasthehackinganddefacementofgovernmentwebpages
Ukraine -2014 
•Current on-going operations in Ukraine demonstrate –at least in part –the further evolution of the Russian approach to IW 
•Emphasis of bulk of IW activities thus far has been in the information-psychological domain; involving both overt and covert/proxy activities 
•Campaign has been successful within Russia and annexed portions of Ukraine; distinctly less so elsewhere 
•Has arguably demonstrated the risks of devolved use of social media (e.g.: social media based reporting has seemed to indicate direct separatist involvement in the downing of MH117) 
•Scope of REC/RSC type information-technical activities thus far has been somewhat limited, given the extent of combat operations between Ukraine and Russian/separatist forces; extent of cyber attacks along the lines of those experienced by Estonia and Georgia has been limited 
CounteringimageryassociatedwiththedowningofMH17–apparentlybyRussian-backedUkrainianseparatists– hasnowbecomeamajorchallengefortheRussianIWcampaign
Emergent Issues
Reflexive Control and Psychotronics 
•AdistinctfeatureoftheRussianapproachtoIWhasbeenaspecificfocusonthehumannervoussystemastheultimatetargetofIW-typeactivities 
•Approachstandsastridemoretraditionaldivisionbetween‘information-psychological’and‘information-technical’aspectsofIW 
•ProspectiveIW-typeactivitiesinthisdomainreferredtobytermssuchasReflexiveControl, Psychotronics,andotherterms 
•Potentiallyentailsawiderangeoftechniquesortechnologiestoinduceintendedbehaviourchange: 
•DirectlyinfluencinghumanmentalstatesviainducedEMdirectlytargetingthebrain 
•Impartingsubliminalmessagesbymanipulatinghuman-machineinterfaceinC2/situationalawarenesssystems 
•Weaponisationofpsychedelic,psychotropicorotherpsychoactivesubstances 
•ThechemicalagentemployedbyRussianCTforcesinthe2002Nord-OstTheatrehostagecrisisconceivablyrepresentsanactualoperationalexample 
Theuseofanunknownincapacitatingchemicalagent– leadingtoover100deaths– duringtheNord-OstTheatrehostagecrisiscouldrepresentanactualexampleofthisuniquelyRussianapproachtoIWfocusedonthehumannervoussystem
Conclusion 
•RussianapproachtoIO/IWquitedistincttoUS/WesternAnglophoneone;inparticular, closerassociationbetweenmilitaryIO/IWandtheroleofinformationinoverallnationalsecurity 
•CurrentapproachtoIO/IWbuildsuponhistoricallegacyoftheMongolinfluence,pre- RevolutionaryRussiaandtheSovietperiod 
•Emergenceofmodern(post-Soviet)RussianapproachtoIO/IWhasbeenstronglyinfluencedbybothRussia’sownexperience,andlessonsdrawnfromotherstates(particularlyUS/NATOapplicationofC3CMin1991GulfWarandIO/IWin1999Kosovocampaign) 
•MilitaryIO/IWclosesttoWesternapproach; relationshipbetweenSovietMTRandtheoriginsoftheUSC3CMconcept 
•UniqueaspectsofRussianapproachtoIO/IWrelatetomeasuresintendedtotargetthehumanorganism/nervoussystemdirectly;closestothernationalapproachinthisrespectisarguablysomeaspectsofChineseapproachtoIO/IW 
IWwillbecomeamoreprominentfeaturenotonlyoftheRussianmilitary’sapproachtooperations,butofthenationalsecuritypracticesoftheRussianstateasawhole
References 
•Information Warfare in the Second Chechen War 
•Information Security Doctrine of the Russian Federation 
•Emerging Cyber Threats and Russian Views on IW and IO 
•Anatomy of Russian Information Warfare 
•The Mind Has No Firewall

More Related Content

What's hot

The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfareandeedalal
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It MattersJeffrey Malone
 
Anti ballistic missiles i
Anti ballistic missiles iAnti ballistic missiles i
Anti ballistic missiles iSolo Hermelin
 
Electronic Warfare: War Cases Studies
Electronic Warfare: War Cases Studies Electronic Warfare: War Cases Studies
Electronic Warfare: War Cases Studies Arshad Khan
 
Stevenson f 22 brief
Stevenson f 22 briefStevenson f 22 brief
Stevenson f 22 briefPicard578
 
The Future of Airpower
The Future of AirpowerThe Future of Airpower
The Future of AirpowerICSA, LLC
 
Combat Systems Fusion Engine for the F-35
Combat Systems Fusion Engine for the F-35Combat Systems Fusion Engine for the F-35
Combat Systems Fusion Engine for the F-35ICSA, LLC
 
Weapons of mass destruction ir
Weapons of mass destruction irWeapons of mass destruction ir
Weapons of mass destruction irvirgo_az
 
Carl von clausewitz
Carl von clausewitzCarl von clausewitz
Carl von clausewitzShafiq Ridz
 

What's hot (20)

The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfare
 
MIDWAY BATTLE
MIDWAY BATTLEMIDWAY BATTLE
MIDWAY BATTLE
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It Matters
 
4GW
4GW4GW
4GW
 
Anti ballistic missiles i
Anti ballistic missiles iAnti ballistic missiles i
Anti ballistic missiles i
 
Guided missiles
Guided missilesGuided missiles
Guided missiles
 
Electronic Warfare: War Cases Studies
Electronic Warfare: War Cases Studies Electronic Warfare: War Cases Studies
Electronic Warfare: War Cases Studies
 
Stevenson f 22 brief
Stevenson f 22 briefStevenson f 22 brief
Stevenson f 22 brief
 
Harpoon
HarpoonHarpoon
Harpoon
 
The Future of Airpower
The Future of AirpowerThe Future of Airpower
The Future of Airpower
 
Seminar ppt
Seminar pptSeminar ppt
Seminar ppt
 
F-35 Multi-Role
F-35 Multi-RoleF-35 Multi-Role
F-35 Multi-Role
 
Combat Systems Fusion Engine for the F-35
Combat Systems Fusion Engine for the F-35Combat Systems Fusion Engine for the F-35
Combat Systems Fusion Engine for the F-35
 
F 35 brief
F 35 briefF 35 brief
F 35 brief
 
Air Dominance
Air DominanceAir Dominance
Air Dominance
 
Deterrence
DeterrenceDeterrence
Deterrence
 
7 air-to-air combat
7 air-to-air combat7 air-to-air combat
7 air-to-air combat
 
Weapons of mass destruction ir
Weapons of mass destruction irWeapons of mass destruction ir
Weapons of mass destruction ir
 
Carl von clausewitz
Carl von clausewitzCarl von clausewitz
Carl von clausewitz
 

Viewers also liked

The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...Jeffrey Malone
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian PerspectiveJeffrey Malone
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsJeffrey Malone
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Jeffrey Malone
 
Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceJeffrey Malone
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian PerspectiveJeffrey Malone
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations WorkforceJeffrey Malone
 

Viewers also liked (8)

The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...The Information Component of National Power and Australian National Security ...
The Information Component of National Power and Australian National Security ...
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian Perspective
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network Operations
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...
 
Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence Force
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian Perspective
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations Workforce
 

Similar to The Russian Approach to Information Warfare

148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016cacds_ukraine
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber Warpjoyal
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
Lessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptxLessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptxyogeshchoudhary71
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
Military Satellites Summit
Military Satellites SummitMilitary Satellites Summit
Military Satellites Summitcassie111
 
2014 Karles Invitational Conference
2014 Karles Invitational Conference2014 Karles Invitational Conference
2014 Karles Invitational ConferenceJohn Canning
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Jose Gonzalez
 
The Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightThe Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightTed Middleton
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after nextLex Pit
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Manned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyManned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyRichard Lim
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Sharmin Ahammad
 

Similar to The Russian Approach to Information Warfare (20)

Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)Russia Ukraine war Cyberspace operations (2022-2024)
Russia Ukraine war Cyberspace operations (2022-2024)
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber War
 
Wizards of-langley
Wizards of-langleyWizards of-langley
Wizards of-langley
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Lessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptxLessons Russia Ukraine War-1.pptx
Lessons Russia Ukraine War-1.pptx
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Military Satellites Summit
Military Satellites SummitMilitary Satellites Summit
Military Satellites Summit
 
2014 Karles Invitational Conference
2014 Karles Invitational Conference2014 Karles Invitational Conference
2014 Karles Invitational Conference
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
Northrop Grumman Prc Cyber Paper Final Approved Report 16 Oct2009
 
The Sharpest Knife in a Gunfight
The Sharpest Knife in a GunfightThe Sharpest Knife in a Gunfight
The Sharpest Knife in a Gunfight
 
The revolution after next
The revolution after nextThe revolution after next
The revolution after next
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Manned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyManned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. Army
 
Foreig~1 (1)
Foreig~1 (1)Foreig~1 (1)
Foreig~1 (1)
 
Viewgraphs
ViewgraphsViewgraphs
Viewgraphs
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011
 

Recently uploaded

Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...kumargunjan9515
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Partito democratico
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)NAP Global Network
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Sareena Khatun
 
Bhubaneswar Call Girls Chandrashekharpur 👉👉 9777949614 Top Class Call Girl S...
Bhubaneswar Call Girls Chandrashekharpur  👉👉 9777949614 Top Class Call Girl S...Bhubaneswar Call Girls Chandrashekharpur  👉👉 9777949614 Top Class Call Girl S...
Bhubaneswar Call Girls Chandrashekharpur 👉👉 9777949614 Top Class Call Girl S...Call Girls Mumbai
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCNAP Global Network
 
Call Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call Girls
Call Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call GirlsCall Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call Girls
Call Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call Girlsvershagrag
 
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...kumargunjan9515
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationCuyahoga County Planning Commission
 
Bhubaneswar Call Girls Patia 👉👉 9777949614 Top Class Call Girl Service Avai...
Bhubaneswar Call Girls Patia  👉👉 9777949614  Top Class Call Girl Service Avai...Bhubaneswar Call Girls Patia  👉👉 9777949614  Top Class Call Girl Service Avai...
Bhubaneswar Call Girls Patia 👉👉 9777949614 Top Class Call Girl Service Avai...Call Girls Mumbai
 
YHRGeorgetown Spring 2024 America should Take Her Share
YHRGeorgetown Spring 2024 America should Take Her ShareYHRGeorgetown Spring 2024 America should Take Her Share
YHRGeorgetown Spring 2024 America should Take Her Shareyalehistoricalreview
 
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort ServicePremium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Servicevershagrag
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Menggugurkan Kandungan 087776558899
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...HyderabadDolls
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31JSchaus & Associates
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...Sareena Khatun
 
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery ServiceWomen Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery ServiceSareena Khatun
 

Recently uploaded (20)

Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
Call Girls AS Rao Nagar - 8250092165 Our call girls are sure to provide you w...
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
Call Girls Koregaon Park - 8250092165 Our call girls are sure to provide you ...
 
Bhubaneswar Call Girls Chandrashekharpur 👉👉 9777949614 Top Class Call Girl S...
Bhubaneswar Call Girls Chandrashekharpur  👉👉 9777949614 Top Class Call Girl S...Bhubaneswar Call Girls Chandrashekharpur  👉👉 9777949614 Top Class Call Girl S...
Bhubaneswar Call Girls Chandrashekharpur 👉👉 9777949614 Top Class Call Girl S...
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
Call Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call Girls
Call Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call GirlsCall Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call Girls
Call Girls Service Vijayawada {6378878445} ❤️VVIP POOJA Call Girls
 
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...Call Girl Service in Korba   9332606886  High Profile Call Girls You Can Get ...
Call Girl Service in Korba 9332606886 High Profile Call Girls You Can Get ...
 
Lorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final PresentationLorain Road Business District Revitalization Plan Final Presentation
Lorain Road Business District Revitalization Plan Final Presentation
 
Bhubaneswar Call Girls Patia 👉👉 9777949614 Top Class Call Girl Service Avai...
Bhubaneswar Call Girls Patia  👉👉 9777949614  Top Class Call Girl Service Avai...Bhubaneswar Call Girls Patia  👉👉 9777949614  Top Class Call Girl Service Avai...
Bhubaneswar Call Girls Patia 👉👉 9777949614 Top Class Call Girl Service Avai...
 
YHRGeorgetown Spring 2024 America should Take Her Share
YHRGeorgetown Spring 2024 America should Take Her ShareYHRGeorgetown Spring 2024 America should Take Her Share
YHRGeorgetown Spring 2024 America should Take Her Share
 
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort ServicePremium  Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
Premium Prayagraj ❤️🍑 6378878445 👄🫦Independent Escort Service
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...Call Girls in North Sikkim  9332606886 HOT & SEXY Models beautiful and charmi...
Call Girls in North Sikkim 9332606886 HOT & SEXY Models beautiful and charmi...
 
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery ServiceWomen Call Girls in gaya  8250092165 Call Girls Advance Cash On Delivery Service
Women Call Girls in gaya 8250092165 Call Girls Advance Cash On Delivery Service
 

The Russian Approach to Information Warfare

  • 1. Russian Approach to Information Warfare Jeff Malone School of Engineering and IT Australian Defence Force Academy September 2014
  • 2. Scope •Historical Context •Russian Approach to IO •Operational Vignettes •Emerging Issues
  • 4. Impact of History and Geography •KeyhistoricalinfluencesonRussianapproachtouseandmanipulationofinformationinwarfarearerootedininfluenceofMongolapproachtowarfare andRussiangeography •MongolsinRussialargelyfoughtandwonoutnumbered;madeeffectiveuseofdeceptionandintimidation(aprimitivebuteffectivecombinationofPSYOPSandkineticoperations/PPP)asaneffectiveforcemultiplier •Mongolseffectivelyemployedthenextanttechnologies(carrierpigeons,dedicatedcommunicationsdispatchriders)toenhancespeedofownC2;alsospecificallytargetedthesameinadversaries •Moregenerally,theflatnessofthesteppesmakesitdifficulttoemploynaturalcamouflageandconcealment,placesemphasisonactivedeceptionmeans DepictionoftheBattleofKulikovoin1388–aRussianvictoryovertheMongols,usingtheirowntacticsofconcealment,deceptionandambushagainstthem
  • 5. Revolutionary Era Influences •InearlySovietera,keeninterestinuseofpropagandaforbothinternalmobilisationandloyalty,andasaweapontosubvertadversaries •Thisalsoentailedtheuseofdisinformation, proxiesandfalse-frontorganisationsforpropagandadissemination •Sovietsidentifiedthenemergentmediatechnologies(massnewspapers,radio, cinema)ascriticaldisseminationmeans •Correspondinglyrecognisedvulnerabilityofownpopulationtoforeigninfluence,leadingtoastrictregimeofcensorshipandmediacontrolintheSovietstate “Wecanandmustwriteinalanguagewhichsowsamongthemasseshate, revulsion,andscorntowardthosewhodisagreewithus.”-V.I.Lenin
  • 6. Maskirovka •EntailsthecoordinatedemploymentofOPSEC,passivecamouflageandconcealment,MILDECandcounter- intelligenceandcounter-ISRactivities •Conceptfirstemergesinthe1920s,butisrefinedonthebasisofitsemploymentandoperationalexperienceintheGreatPatrioticWar •Particularinterestinrelationshipbetweenmaskirovkaandsurprise, particularlyinthecrucialinitialperiodofwarfaretoachievedecisivevictory; lessonsfromGermansuccessatstartofOperationBARBAROSSA •Theconceptisapplicablefromthetacticaluptothenationallevel,andistobeintegratedwithotherinformation- basedactivities Diagramillustratingtheenvironmental,technicalandoperationaldimensionsofmaskirovka
  • 7. Radioelectronic Combat •RECemergedintheearly1960sasanoperationalconceptthatintegratedmaskirovka,EW,andoffensive(kinetic)fires •Entailsbothdefensive/protectiveandoffensiveactionsandactsasaforcemultiplier •KeymissionsinREC: •ProtectingfriendlyC2 •DisruptingadversaryC2 •ObtainingintelligenceonadversaryRECcapabilities •DenyingadversaryintelligenceonfriendlyRECcapabilities •Achievingsurpriseintheinitialstageofwar •SimilaritytolaterUSconceptsofC3CMandC2W,butprecedesthembyoveradecade TheSovietsmadesignificantinvestmentsinRECandREC- enablingcapabilities;picturedhereistheUral,adedicatedC2andRECvesselfortheSovietFarEastPacificFleet
  • 8. The Military Technical Revolution •Term gradually emerged from late 1960s onwards, to describe the impact of emerging information technologies on the conduct of warfare •Identifies that the increases in the speed of C2 and the increasing precision of effects would have transformational implications; lessons from Vietnam Conflict and Arab- Israeli wars •Key issue for Soviets was that effective Western exploitation of technology would render Soviet numerical advantage irrelevant, lethality of conventional forces would approach those of tactical nuclear weapons •Develop the concept of the Reconnaissance Strike Complex, which builds on REC with automated, networked links between C2, sensors and effect generators –NCW in Western terms •US response to MTR prompts early thinking about C3CM and an information-based RMA The concept of the MTR and RSC was rooted in Soviet fears that Western military integration of information- based technologies would render traditional forces –particularly tank- heavy ground forces –operationally vulnerable and therefore strategically irrelevant
  • 9. Reception of the 1991 Gulf War •Reception of the 1991 Gulf War an important influence on evolution of IO/IW thinking in post-Soviet Russia •Success of US C3CM/SEAD campaign seen in some quarters as a validation of MTR/RSC concepts •Failure of Iraqi C2 and IADS –closely modelled on Soviet REC principles –leads to questioning of the value of Soviet-era concepts (with counter-argument regarding Iraqi effectiveness in implementing such concepts) •Theorists note of the implications of real- time global television reporting on the conflict for mustering domestic and international support •Also leads to questioning of whether Soviet command economy could deliver IT underpinning required to implement a MTR in the Soviet armed forces Soviet reception of the Gulf War was signally important in shaping post-Soviet views on IO/IW and the implications of the emerging global real-time media environment
  • 11. IW in Russian Military Doctrine •Current ‘Military Doctrine of the Russian Federation’ promulgated by Presidential edict on 5 February 2010; effectively a statement of defence/military policy for the Russian Federation •“Constitutes a system of views officially adopted…for the armed protection of the Russian Federation.” (para 2) •Characteristic of contemporary war: “the intensification of the role of information warfare.” (sub-para 12d) •“Military action will be typified by the increasing significance of precision, EM, laser, and infrasound weaponry, computer-controlled systems, drones and autonomous maritime craft…” (para 15) •Features of modern conflicts: “the prior implementation of measures of information warfare in order to achieve political objectives without the utilisation of military force…” (sub-para 13d) •Equipping the armed forces entails: “…develop(ing) forces and resources for information warfare.” (sub-para 41c) •Notably does NOT offer a specific definition of ‘information warfare’; this is defined elsewhere in the hierarchy of Russian military concepts and documents
  • 12. IW in Russian Military Theory •A variety of (unclassified) definitions of IW have been offered in Russian open literature •“IW is a way of resolving conflict between opposing sides. The goal is for one side to gain and hold an information advantage over the other. This is achieved by exerting a specific information/psychological and information/technical influence on a nation’s decision making system, on the nation’s populace, and on its information resource structures, as well as by defeating the enemy’s control system and his information resource structures with the help of additional means, such as nuclear assets, weapons and electronic assets.” (Russian General Staff Academy definition) •“IW is a complex of information support, information counter-measures, and information defence measures, taken according to a single design, and plan, and aimed at gaining and holding information superiority over an enemy while launching and conducting a military action/battle.” (definition published in article by COL S.A. Komov in the journal Military Thought) •Emerging (since 2007) concept of Information Strike Operations (transliterated Russian abbreviation: IUO) which extends the REC/RSC concept of operations by incorporating ‘electronic fire’ (an extension of EA arguably including DEWs) and ‘information strike’ (CNO)
  • 13. SVR Approach to IW •Sluzhba Vneshnik Razvedka (SVR) is the Russian Federation’s external intelligence (and covert operations) agency •Head of SVR has defined IW as: •“…a concept that includes establishing control over other states’ information resources, deterring the development of information technology in countries which are potential enemies, possibly disrupting or completely putting out of operation information networks and communications systems, and developing information weapons and systems for safeguarding the security of a country’s own information structure and information flows.” •Suggests a more expansive, national-level approach to IW than a narrowly military one, which specifically includes peacetime measures intended to influence or shape the information environment •Includes broader national policy instruments such as export controls, embargoes and ‘information blockades’ to achieve national security outcomes
  • 14. Information Security Doctrine •‘InformationSecurityDoctrineoftheRussianFederation’promulgatedin2000articulatesRussianapproachtotheroleofinformationinnationalsecurity •OriginallyadministeredbytheFederalAgencyforGovernmentCommunicationsandInformation(FAPSI–RussianstrategicSIGINTagency);from2003administeredbytheFederalSecurityBureau(FSB–RussianFederationsuccessortotheKGB) •Providesabroadoverviewoftheroleofinformationinnationalsecurity,andinformation- basedthreatstothesecurityoftheRussianFederation •Specificissuesincludesecurityofgovernmentinformation,cybersecurity,cryptography,mediaoperationandcontrol,andcensorship •Roleofinformationinnationalsecurityfurtherdevelopedin2008‘StrategyofInformationSocietyDevelopmentinRussia’and2009‘NationalSecurityStrategy’ TheInformationSecurityDoctrineprovidestheoverallframeworkforRussianGovernmentcontrolofinformationandinformationinfrastructurefornationalsecuritypurposes;picturehereisfromaprotestagainstInternetcensorshipinearly2014,thetextreads“censorship”
  • 16. First Chechen War –1994-96 •InitialefforttocreateanindependentChechenstateinthewakeofthecollapseoftheSovietUnionin1991;afterseveralyearsofdisorder,resultsin(initiallyundeclared)Russianarmedinterventionin1994 •ArguablyrepresentedacontinuationofSoviet-erabrute-forceCOIN(aspreviouslydemonstratedinAfghanistan)butnowonaformerSovietterritory •Russians–thoughgenerallypoorlyequipped– employREC-typecapabilitiesagainsttheChechens; Chechenssuccessfullyexploitcommerciallyacquiredtechnologies(satellitephones,RFjammers,etc)tosignificanteffect •ChechensabletoleverageaccesstoglobalmediaasakeydisseminationmechanismforPSYOPScampaign;Russianperformanceinthisregard–andintryingtodenyChechenaccesstoglobalmedia– regardedaspoor •Russianperformanceessentiallyregardedasafailure;arguablydemonstratedrationalefortightenedcontrolsonmediainpost-YeltsinRussia RussianCOINoperationsintheFirstChechenWararguablyrepresentedacontinuationoftheheavyhandedapproachtoCOINemployedinAfghanistan
  • 17. Lessons from Kosovo 1999 •RussianotadirectprotagonistinOperationALLIEDFORCE,but(arguably) providedsomedegreeofcovertassistancetoSerbia •DetectionanddowningofF-117aircraftdemonstratedinnovativeradartechniquescoulddefeatlow-observability(‘stealth’)technologies •EffectiveSerbuseofdecoysandcamouflagedemonstratedcontinuingrelevanceofmaskirovkaincounteringanaircampaign •NotedthatultimatedecisivefactorincampaignwasnotmilitarydefeatofSerbianarmedforces,butthepoliticalisolation–bothdomesticallyandinternationally–ofSerbleadership •DemonstratedtheutilityofInternet(bothdirectlyandviahackinganddefacementofadversarywebpages)asapropagandadisseminationmechanism ThedowningofanF-117Nighthawkaircraftdemonstratedthelimitationsoflow-observabilitytechnologywhichhadprovedsousefulinthe1991GulfWar
  • 18. Second Chechen War –1999-2000 •Russianinterventionaroseoutofunresolvedissuesfromfirstwar,andinresponsetoterroristattacksattributedtoChechensinRussiaproper •MainphaseofoperationsAug1999toMay2000; butinsurgencycontinueduntil2009;RussianmilitaryhandedoperationalleadtosecurityservicesinApr2002 •RussianemploymentofIWdemonstratedevolutioninRussianapproachtoIWthrough1990s, integratedinformation-technicalandinformation- psychologicalaspects: •EnhancedEW,ISRandprecisiontargetingcapabilitiesacquiredsincefirstwarwereeffectivelyemployedwithinanRSCapproach •Abletoexertfargreatcontrolofdomesticandglobalmedia(andInternet);wereeffectivelyabletocounterChechennarrativeintheinfosphere •Russianexperiencehereshapedfurtherrefinementofmilitary’sapproachtoIWintothe21stcentury •Experienceherealsoshapeddevelopmentof‘InformationSecurityDoctrine’releasedin2000 ChechengraffititauntingRussiantroopsduringtheSecondChechenWar;textreads:“WelcometoHell, Part2”
  • 19. 2007 Estonian Cyber Attacks •Significant cyber attacks on Estonian information infrastructure lasted 22 days between April and May 2007; coincided with protests/rioting by Russian ethnic minority in Estonia and economic sanctions by Russian Government •Triggered by Estonian government’s decision to relocate a Soviet era monument to Great Patriotic War away from central Tallinn (Estonian capital) •Entailed both significant DDOS attacks on Estonian (public and private sector) information infrastructure and defacement of Estonian Government websites •Depicted by Russian Government as grass roots activism for which it was not responsible and had no control •Despite some circumstantial evidence (IP addresses for launching attacks, dissemination of advice on how to conduct DDOS attacks) full extent of official Russian complicity remains controversial and contested A prominent feature of the 2007 Estonian cyber attacks was the hacking and defacement of Estonian government webpages; a common motif in defaced webpages was the replacement of Estonian government symbols with images relating the Soviet era and the ‘Great Patriotic War’
  • 20. Georgia -2008 •Rootsofconflictgobacktoimmediatepost-Sovietera;commencedwithGeorgianresponsetoattacksbyRussian-backedseparatistsinOssetia; RussiarespondswithmoregeneralassaultonGeorgia(howeverRussiancyberattacksprecedeactionsbyseparatists) •RussiansemployREC-typeactivitiestoundermineGeorgianC2andairdefencecapabilities;someproblemscausedbyUSblackingoutofGPSandpoorperformanceofRussianGLONASSsystem •DespitegenerallyoveralloperationalpoorperformancebyRussians,appeartohavelearnedlessonsfromChechenconflicts;inparticularcontrolofaccessbyglobalmediatoconflictarea •Cyberattacksconductedbybothsides;effectofRussiancyberattacksonGeorgialesseffectivethaninEstoniabecauseGeorgialess‘wiredup’asanation,thereforelessdependent/vulnerable •Arguablyfirstinstancewhere‘kinetic’manoeuvreoperationshavebeendirectlycombinedwithCNOagainstinfrastructuretargets AsinEstoniain2007,onefocusofRussian-basedcyberattacksonGeorgiantargetswasthehackinganddefacementofgovernmentwebpages
  • 21. Ukraine -2014 •Current on-going operations in Ukraine demonstrate –at least in part –the further evolution of the Russian approach to IW •Emphasis of bulk of IW activities thus far has been in the information-psychological domain; involving both overt and covert/proxy activities •Campaign has been successful within Russia and annexed portions of Ukraine; distinctly less so elsewhere •Has arguably demonstrated the risks of devolved use of social media (e.g.: social media based reporting has seemed to indicate direct separatist involvement in the downing of MH117) •Scope of REC/RSC type information-technical activities thus far has been somewhat limited, given the extent of combat operations between Ukraine and Russian/separatist forces; extent of cyber attacks along the lines of those experienced by Estonia and Georgia has been limited CounteringimageryassociatedwiththedowningofMH17–apparentlybyRussian-backedUkrainianseparatists– hasnowbecomeamajorchallengefortheRussianIWcampaign
  • 23. Reflexive Control and Psychotronics •AdistinctfeatureoftheRussianapproachtoIWhasbeenaspecificfocusonthehumannervoussystemastheultimatetargetofIW-typeactivities •Approachstandsastridemoretraditionaldivisionbetween‘information-psychological’and‘information-technical’aspectsofIW •ProspectiveIW-typeactivitiesinthisdomainreferredtobytermssuchasReflexiveControl, Psychotronics,andotherterms •Potentiallyentailsawiderangeoftechniquesortechnologiestoinduceintendedbehaviourchange: •DirectlyinfluencinghumanmentalstatesviainducedEMdirectlytargetingthebrain •Impartingsubliminalmessagesbymanipulatinghuman-machineinterfaceinC2/situationalawarenesssystems •Weaponisationofpsychedelic,psychotropicorotherpsychoactivesubstances •ThechemicalagentemployedbyRussianCTforcesinthe2002Nord-OstTheatrehostagecrisisconceivablyrepresentsanactualoperationalexample Theuseofanunknownincapacitatingchemicalagent– leadingtoover100deaths– duringtheNord-OstTheatrehostagecrisiscouldrepresentanactualexampleofthisuniquelyRussianapproachtoIWfocusedonthehumannervoussystem
  • 24. Conclusion •RussianapproachtoIO/IWquitedistincttoUS/WesternAnglophoneone;inparticular, closerassociationbetweenmilitaryIO/IWandtheroleofinformationinoverallnationalsecurity •CurrentapproachtoIO/IWbuildsuponhistoricallegacyoftheMongolinfluence,pre- RevolutionaryRussiaandtheSovietperiod •Emergenceofmodern(post-Soviet)RussianapproachtoIO/IWhasbeenstronglyinfluencedbybothRussia’sownexperience,andlessonsdrawnfromotherstates(particularlyUS/NATOapplicationofC3CMin1991GulfWarandIO/IWin1999Kosovocampaign) •MilitaryIO/IWclosesttoWesternapproach; relationshipbetweenSovietMTRandtheoriginsoftheUSC3CMconcept •UniqueaspectsofRussianapproachtoIO/IWrelatetomeasuresintendedtotargetthehumanorganism/nervoussystemdirectly;closestothernationalapproachinthisrespectisarguablysomeaspectsofChineseapproachtoIO/IW IWwillbecomeamoreprominentfeaturenotonlyoftheRussianmilitary’sapproachtooperations,butofthenationalsecuritypracticesoftheRussianstateasawhole
  • 25. References •Information Warfare in the Second Chechen War •Information Security Doctrine of the Russian Federation •Emerging Cyber Threats and Russian Views on IW and IO •Anatomy of Russian Information Warfare •The Mind Has No Firewall