Russian MFA Information and Press Department Commentary Regarding Media Reports about Cyber Attacks on Pentagon computer networks
Question: There have been media reports from Washington recently that the Pentagon's computer systems suffered a large-scale external cyber attack. Furthermore, there has been speculation that Russia was somehow involved in these electronic attacks on the closed systems. How could you comment on such reports?
Commentary: We are aware of the reports. This information, let us add, is being presented in a characteristic manner: the thesis about the so called "Russian connection" does not even seem to be discussed as being supposedly too obvious; what they speculate about is only whether the "unfriendly programs" were launched by individual hackers or the "Russian government had a hand" in this. Here they also drag in the conjectures about Russian involvement in the computer attacks on the networks of Estonia and Georgia.
In conditions of global computerization and the growing common threat of the use of IT technologies for unfriendly purposes, such informational leaks are not only groundless, but also irresponsible. Actually Russia has initiated and is actively promoting the idea of forming a universal international legal regime of ensuring information safety that corresponds to the interests of each member of the international community.
Let me recall that in particular the current 63rd session of the UN General Assembly has again adopted practically by consensus the Russian draft resolution in line with this idea, "Developments in the field of information and telecommunications in the context of international security." Characteristically, the US alone voted against this resolution.
The objective of our efforts to reinforce international information security (IIS) is to facilitate achieving a better understanding of the real threats arising in this sphere and finding joint ways to fight them as soon as possible. We presume that such threats to international stability and security are not limited to illegal or criminal employment of IT technologies. There also arises the danger of a truly destructive information weapon being developed and used militarily. We should not allow humanity to be drawn into yet another round of the arms race on a qualitatively new technological level. It is necessary to keep the resources and finances for development and to prevent the use of IT technologies for purposes contrary to the security interests of states, whatever the motives and forms of such actions might be. And work should be carried out to preempt such threats.
On this basis we are ready for interaction and cooperation with all states sharing our concerns. We believe that the assurance of IIS could be a promising direction for our partner dialogue with the United States as well.
December 4, 2008