National Academies Press: OpenBook

Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops (2009)

Chapter: Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko

« Previous: Medical Aspects of Combating Acts of Bioterrorism--Gennady G. Onishchenko
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 133
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 134
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 135
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 136
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 137
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 138
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 139
Suggested Citation:"Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It--Igor A. Sokolov and Vladimir I. Budzko." National Research Council. 2009. Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops. Washington, DC: The National Academies Press. doi: 10.17226/12629.
×
Page 140

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Certain Aspects Regarding the Development of Conditions Favorable to Cyberterrorism and the Main Areas of Cooperation in the Struggle Against It Igor A. Sokolov* and Vladimir I. Budzko Russian Academy of Sciences Institute for Informatics Problems The concept of cybernetic terrorism is interpreted rather broadly. In order to work out the necessary approaches for preventing threats of unauthorized pene- tration of systems—intrusion and infliction of damage—we believe it is appro- priate to consider the problem from the standpoint of ensuring computer securi- ty. In doing so, it is simplest to classify the various types of intruders according to the goals of their actions, for example, • obtaining access to secret data • altering data that affect the completion of processes (within a particular automated system or outside it, but under its control) in which the perpetrator has an interest • vandalism • informational impacts, for which specific individuals or groups behave according to the perpetrator’s wishes The capabilities offered by modern information technologies for data stor- age and transmission may also be used for the hidden exchange of information to provide support for illicit activities. Thus, there are two main types of illegal activities in the computer sphere: 1. unauthorized penetration or intrusion into a computer system 2. hidden transmission of data via legal channels *Translated from the Russian by Kelly Robbins. 133

134 RUSSIAN VIEWS ON COUNTERING TERRORISM Let us look first at external intrusion, that is, unauthorized penetration by perpetrators through devices to which they have free access. We will devote separate attention to threats from personnel within a given system on the suppo- sition that the necessary organizational and other security measures have been put in place. In the early 1980s, intrusion received a certain amount of attention in sys- tems where state and corporate secrets were stored. Here, the focus was primari- ly on limiting the access of end users to information stored in a system. The question of security for physical data carriers was handled rather simply, mainly through organizational measures. Information security was based on the principle of creating conditions in which the user has no physical opportunity to make any changes in the software programs—nonprogrammability. It was implemented by means of so-called dumb terminals and classical operating systems (IBM, DEC, and others), the architecture of which involved the separation of programs and data and the phys- ical protection of systems software from applied programs and other elements. Furthermore, communications technologies were systems oriented and did not permit outsiders to log on. Exchange protocols for the telecommunications com- ponents did not allow perpetrators to penetrate the network. The level of security provided by the architectural characteristics of comput- ers and communications devices was sharply reduced with the appearance and accelerated introduction of new technologies, of which the following deserve special attention: • personal computers, especially IBMs using Microsoft operating systems • local networks with personal computer (PC) workstations • the transmission control protocol/Internet protocol (TCP/IP) family of protocols and the creation of the Internet on their basis A keen struggle began among the various means of protection and attack. The first applications for PCs were for home use. Within a few years, PCs began to be used in almost all spheres of human activity. IBM-compatible PCs using Microsoft software established a dominating position. With their simplicity of use and relatively low cost, they made it substantially easier and less expensive to create small systems for various applications than did computers with differ- ent architectures. The local nature of their installation made it easy to handle security matters. This initial period saw the appearance of the first danger signals—computer viruses. At first, the intrusions were destructive in nature. The thesis was ad- vanced that “he who takes careful precautions will not be affected.” Therefore, most of the efforts were focused on the correct use of antivirus software and the proper way to use diskettes. From a security standpoint, it is unforgivable that very little attention was devoted to the operating system architecture and floppy

TERRORISM 135 disk technology serving as the catalyst for the development of intrusion tools. In the development of the architecture to date, almost no fundamental and reliable barriers have been put in place against virus attacks. In the first stage, virus attacks composed the technology for intrusion. Mod- ern antivirus packages (for example, the Kaspersky antivirus programs) essen- tially reflect the level of the current intrusion intellect on the whole. When we give high marks to the quality of current antivirus programs, we tacitly give the same high marks to this malicious intellect. The appearance of local computer network technology laid the foundation for a new stage in the use of PCs. Users were given a qualitatively new interface, convenient and easy to use, which they quickly preferred over previous systems based on dumb terminals. The practical implementation of “paperless informa- tion technology” in an organization’s work became a reality. Ethernet gradually became the dominant local network architecture. The well-protected architectures offered by such manufacturers as IBM and DEC in their mainframe and personal computers were gradually pushed aside. The market supported cheap hardware, and its components became the de facto standard. At the same time, local networks created new channels for intrusion. Their use opened up opportunities for inflicting damages on a substantially larg- er scale than possible in attacks against a single-user PC. It is very important to note that software carries the majority of the load in organizing the exchange of data over local networks. If there is an intrusion into any PC on the network, the network driver and its network map can be altered, which at a minimum will bring down the entire network. So-called software agents began to be widely used in local networks to carry out certain functions. These agents are loaded into client PCs in the process of performing a particular function. This approach gained widespread use in the implementation of software for electronic libraries, for which CD-ROMs were used as basic information carriers. Software agents also began to be used in diagnostic and monitoring systems. They appear automatically on specific work- stations. For example, electronic libraries that perform essential service func- tions involved in working with data include an internal search system and other programs that are loaded automatically during disk initialization. The placement of such a library on a server requires that the appropriate programs be transferred to a client machine. During the transfer process, some- one could catch such a program and attach an intrusion program to it. One way of doing this, although it would not be easy, would be to intercept all Ethernet messages on a client machine through a network card configured to receive all MAC addresses. Including codes necessary for intrusion in a program being transferred would ultimately make it possible to gain unauthorized access to another workstation. Another example of intrusion is the use of WinWord text editor macros. As macros are built-in programs, the addition of intrusion programs in the “body” of

136 RUSSIAN VIEWS ON COUNTERING TERRORISM macros makes it possible to distribute them along with text documents and launch them when the text editor begins processing. There are many examples in which WinWord has been used in virus attacks. Perpetrators have found even broader opportunities in the Internet environ- ment. The dominant position of the TCP/IP family of protocols and their inher- ent capabilities have given rise to a new wave of various types of attacks with even more destructive consequences. Experience amassed in previous stages and the scientific-technical potential involved in carrying out intrusions has been put to full use. A stable trend has been established by which the number of Internet intru- sions has been doubling each year. This means that the amount of damage done has at least doubled as well. The scope of virus attacks is such that the network space of several countries at once can be affected. At the same time, the Internet continues to play an increasingly important role as an international information repository and the least expensive means of communications. It is essentially one of the most important engines of world technological progress. It is very important to note that it has become the main daily working tool and information source in a number of fields. One example would be research and analytical activity using accessible electronic information resources via Internet Open Source Solutions, something a growing number of firms and organizations are doing. In the environment described above, creating an IBM PC-MS-Ethernet-In- ternet system capable of ensuring the necessary level of security requires the involvement of the necessary number of high-class specialists in the information technology field and the acquisition of expensive security software and devices. The cost of these security technologies for a system built on this platform and requiring a high level of protection equals up to half the cost of the entire system itself. Operating and maintaining the security technologies entail substantial ad- ditional costs. The more well-known outside intrusions that occur, the greater the demand for the products of companies that specialize in creating technologies for infor- mation security at various levels and with various purposes, producing method- ological materials, and providing security consulting services. This business is developing successfully. A system that is sufficiently protected from the outside remains vulnerable to intrusions launched from within through the capabilities of service personnel (operators, administrators, systems programmers, security officers, and so forth). A lack of on-staff capabilities in security software development must be rectified by using additional specialized software products from firms that specialize in providing enhanced protection in a Microsoft environment and by instituting additional heightened (and therefore expensive) organizational security measures. Certain successes have been achieved in the development of technologies for intrusion detection, particularly in the Internet environment. There have been

TERRORISM 137 many more successes in detecting intrusions than in preventing such intrusions. Each time it has released the latest version of its operating system, Microsoft has announced the substantial expansion of the program’s built-in security features, but each time it has turned out that these new features do not save average users, who lack the system enhancement capabilities of organizations. The well-known problems of ensuring security in modern automated systems in an IBM PC-MS- Ethernet-Internet environment are also applicable to a significant extent to cases involving the use of the UNIX operating system and RISC (reduced instruction set computer) processors. New security solutions for virtual private networks (VPNs) have been wide- ly developed in the past few years. The use of VPNs provides substantially increased protection against system intrusions over the Internet but does not resolve the problem within the system itself. VPN technology cannot be used for access to various general-access servers, search systems, portals, other informa- tion resources, or electronic mail. Furthermore, as the service provider plays a fundamental role in the organization of a VPN, this requires that these providers be highly responsible and that users place a great deal of trust in them. Therefore, the first conclusion that can be drawn is that the IBM PC-MS- Ethernet-Internet environment, which is the most widespread today and is used in creating automated information support tools for various functional purposes, is poorly protected against intrusions. Efforts to stop the growth in the number of intrusions have not been successful. This situation is advantageous for firms specializing in the sale of consulting services and the production of supplemental means of protection, such as firewall systems, security shields, and monitoring systems. But it also increasingly complicates the lives of end users. The funda- mental reason for this state of affairs lies in the inherent characteristics of the systems architectures. At the same time, the IBM PC-MS-Ethernet-Internet envi- ronment still represents the dominant foundation for existing and newly created automated information support systems. The new technology of dense wavelength division multiplexing (DWDM), in which all types of channels are collocated on one fiber, has seen very rapid development in recent years. Each subchannel has a carrying capacity of 10 GBps, and there are 256 subchannels in each channel. Efforts are continuing to increase the number and carrying capacity of the subchannels. The use of DWDM technology makes it more efficient to use IP as the basic exchange protocol, and this explains the gradual shift away from lower-level protocols such as asynchro- nous transfer mode (ATM), frame relay (FR), and others. The use of DWDM in developing the Internet will facilitate a substantial expansion in the volume and content of services provided, including IP-tele- phony, IP-video, video conferencing, and so forth. These and other types of services will make up an ever-increasing share of overall Internet use. DWDM offers expanded capabilities for making systems disaster resistant, which is defined as the ability of a critical application to maintain vitally important data

138 RUSSIAN VIEWS ON COUNTERING TERRORISM and software resources and continue performing its functions (possibly with certain limitations) under conditions of overall system degradation caused by the massive destruction of system components or entire hardware complexes and linkages between them as a result of natural disasters, industrial accidents and catastrophes, or the intentional actions of individuals or groups. This func- tion is also conveniently carried out over the Internet, as in such circumstances it is simpler and less expensive to resolve the problem of rerouting communi- cations channels. Finally, the use of DWDM makes it possible to advance efforts to imple- ment distributed parallel computing (grid program [peer-to-peer computing]). The Internet is advantageous in this regard as well. Dealing with issues of pro- viding security for data processing and transmission in cutting-edge distributed computing architectures is of fundamental importance if these architectures are to be broadly disseminated and used. The basic security components must pro- vide a mechanism for authentication, access limitation, and confidentiality of communications among elements of the network. Ensuring the integrity of data and processes during failures and catastrophes should also be viewed as an im- portant element of ensuring security. In addition, any system operating in an IP VPN environment must have a subsystem for security management that is de- signed to ensure the reliable and uninterrupted functioning of the base system in the event of threats or other actions, protect the technological process as a uni- fied whole, and provide monitoring and audit capabilities. Therefore, our second conclusion is that the Internet will develop and be used on an increasing scale in various spheres of human activity. However, if the IBM PC-MS-Ethernet-Internet architecture maintains its dominance, we will also see an increase in damages from intrusions and especially from intrusions for terrorist purposes. This leads to our third conclusion, namely, that the danger of computer terrorism can be reduced only by using new systems technology solutions for the design of operating systems, collective use systems, and telecommunications protocols. The following could be suggested as areas for joint research with our American colleagues: • definition of design principles and implementation mechanisms for en- suring the security of the LINUX operating system and preventing intrusions into individual computers and collective use systems, including the construction of such systems on narrow client principles • definition of areas for improvement and development of recommenda- tions on changing the IP protocol • study of questions related to the construction of virtual private networks that are reliable in preventing intrusions • study of questions related to the implementation of distributed parallel computing (GRID system)

TERRORISM 139 It would also be appropriate to join forces to prepare the necessary method- ological materials explaining the practical expediency of intrusion-resistant ar- chitectures to stimulate market interest in the shift to using hardware and soft- ware that could form the basis for the creation of reliably protected systems. Finally, it would be expedient to work together on preparing well-honed recom- mendations on the creation of a standardized set of laws on cyberterrorism.

Next: The Role of the Russian Ministry of Internal Affairs in Combating Terrorism in Urban Conditions--Sergey A. Starostin »
Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops Get This Book
×
 Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops
Buy Paperback | $98.00 Buy Ebook | $79.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Few countries have endured as many attacks of terrorism during the past two decades as has Russia. From bombings on the streets of a number of cities, to the disruption of pipelines in Dagestan, to the taking of hundreds of hostages at a cultural center in Moscow and at a school in Beslan, the Russian government has responded to many political and technical challenges to protect the population. The measures that have been undertaken to reduce vulnerabilities to terrorist attacks and to mitigate the consequences of attacks have been of widespread interest in many other countries as well.

In June 1999, the Presidents of the National Academy of Sciences and the Russian Academy of Sciences initiated an inter-academy program to jointly address common interests in the field of counter-terrorism. Four workshops were held from 2001 to 2007 and additional consultations were undertaken prior to and after the series of workshops. This report includes 35 of the Russian presentations during the workshop series. Collectively they provide a broad overview of activities that have been supported by Russian institutions.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!