"When the company Siemens has supplied equipment for Iran’s nuclear station, was a very dangerous incident. Centrifuges began to receive commands that are not displayed on the operator’s console. Centrifuges are untwisted. This could result in a serious man-made disaster. NATO has long tried to find out what happened. Especially the Germans found out, because for them it is a blow to the reputation. Here’s find out, we do not know the results. But this is also an example in general, cyber-warfare.
What is a cyber war? It can be based on the original board. Relatively speaking, this 3 directions. The first task — delivery of electronic component base c bins that will be governed by the supplier at some point, turn on, turn off or direct its activities to other goals and objectives.
The second point is the use of open networks of the Internet, first and foremost. Open access to be introduced in the system of political opponents of the military leadership of the country. And bring it to chaos. Block this system. I think that, in reality, this may already be a harbinger of this great war. The idea is to destroy, disrupt the system of governance. And then take advantage of the chaos to strike is by military means. It is no accident that in 2010, the year at the NATO term «cyber security» suddenly came to be called differently: «cyber defence». This means that in general, the word «defence», the defense has no relation to any other article of the charter of NATO, and especially to Article 5 of the Washington Treaty, which, strictly speaking, defines the forms of collective defense. That is the subject of cyber war has been the threat of war and the military response to NATO.
The third way of conducting cyber warfare more well known to all. This is the way the so-called open social networking sites, which are the most powerful manipulation of public opinion. All sorts of "likes" and other buttons that you click there, you immediately enter into certain groups, which are then analyzed and systematized. That is an opportunity to work with people who hold opposing views of some. Yes. Through an open social network can be manipulated. It can be output in a separate segment, invisible to everyone else. To direct targeted way, for example, a contact or advertising contact information, thereby increasing the number of people who are starting to get specific information that undermines the authority of the government, the state of values, principles, constitution, etc. But we know that it is very actively used. By the way, it is necessary to bear in mind that the United States is engaged in this sort of thing even the State Department.
They’ve got a special department. I met with the head of that department. A young, very talented guy who really is working on the application of social networking, to achieve the purposes of the United States of its non-military means. That is not military objectives by military means. "Soft power", so called. That is the third line of the development of these issues. Whether we are engaged in a response to these threats? My answer to you is certain: do. Moreover, we are engaged very seriously.
Regarding the first question, we are creating new shops, new production of electron-komponenntnoy base. Adopted programs of Radio Electronics of the Russian Federation. It will be realized. There are targets. All of this in 2012, we have already passed. Now, for example, in Zelenograd-based company "Micron" we opened the chip industry is absolutely competitive, giving us the ability to do all the necessary chips to create a range of modern devices that do not depend on any of the tabs was "unfair", we call them as gently suppliers. Therefore, the theme we understand and know its value. And you’ve probably heard that the General Staff has already made statements to create a special Cyber Command of the Armed Forces of the Russian Federation. "