tv Interview RT August 27, 2022 2:30pm-3:01pm EDT
2:30 pm
almost all smart phones have a built in remote disabling functionality. this was developed so that users could remotely turn off a loss smartphone, for example, to make sure that their private data wasn't stolen was this feature one can either raise all stored information or disable the smartphone altogether. basically turning it into a brick. this feature is documented and if it is available to the user, obviously the platform can take advantage of it as well. phone manufacturers can also use it, but there is also an undocumented feature. our specialist looked into this matter and they discovered that many smartphones have the disabling feature. of course, we haven't examined all fans. that would be a massive research board did look at a small range of models. so the situation is not great in that respect. you have to understand that, in essence, the real own of your smartphone is it's manufacturer when the russian, all sorties talk about import substitution. that is one of the reasons we use technology that is controlled by an external manufacturer. unfortunately,
2:31 pm
information technology is controlled by developers and producers not uses her pay money for their technological product. the goal for she, you learn in that case, can we say that this is a serious cyber threats? not all smartphone producers, or even based in the u. s. lot was not alone when medical skill, these are mostly american companies, the platforms i found or android or developed in the u. s. so this kind of control is a potential capability. it doesn't look like your typical on off switch, of course. anyway, that is the most important factor. but having this technological capability is one thing. another question is, will they decide to use it or war? yes, it was what i'm talking about. yep. well, a girl. i think it might be possible if there is a series escalation and the war, and it would be some type of hybrid strategy. simply disabling smartphones in some territories, pointless. this measure would likely have to be part of some kind of package. for example, if we become very successful on the front lines and the west realizes,
2:32 pm
can do anything about this. we could certainly expect some hybrid attacks in the information space and simultaneous actions that would significantly damage our infrastructure. when this was this necessarily affect smartphones, or maybe would they target base stations or other i o t elements? i can't make any predictions. i can only say that there is a hypothetical possibility. so stood her, i'll be meaningful the word diverse reactions to your comments. so ma, skeptical, i'm about research group expert, for example, said that if disabling smartphones was a realistic cyber threats, we could talk about disabling aircraft equipment, which hasn't happened on seems like this option is not on the table. what do you say about that already? got a couple or 3 of the buckles though, is that we're proposing bread with. well, 1st we do not know what is on the table. before late february, there had been a lot of things, we thought would be impossible. but now we are witnessing the disabling of several infrastructure elements. we are registering a drastic increase in attacks. major retailers are sold for 10 euros in our country
2:33 pm
. he would have predicted something like that 6 months ago. and i will not dare to predict what will happen as for disabling aircraft technology. when you are waging a hybrid war, you have to have a reason for every action. why would you disable airplanes right now? what would be the goal? the might be exaggerating this potential. if we talk about military charts, this is one thing. but with civilian aircraft, you must have a purpose anymore, but i do not think they would do something like that. just for the sake of disabling that is just wrong for the you have to understand that if they demonstrate some potential capability, like disabling smartphones, the country will mobilize its resources, figure out a work around, and it will be much harder to do something like that. next time. so if you're going to pull this kind of switch, you have to really think about everything and make sure this will ashley be a serious blow. we can safely assume that it will be a well thought out step. no,
2:34 pm
when it was in his cousin so, so if i understand correctly, this was just a warning. it came from the prison in your brain, los portal. no. as long as of course, i was asked if there was technically possible. what you called a statement was really just the comment. my answer is yes. technically it is possible. and mobile system experts should understand that smartphones can be disabled hutchings, my phone system. so she told me that a, is there a chance that other key infrastructure elements could be disabled? and if so, what would they be? horizontal going after that all depends. earlier i mentioned base stations automated process control systems also come to mind, especially if they're connected to the internet. our society has been actively going digital in recent years. this process has been very evident in the so called internet of things sector. for example, implementing internet connected systems that help establish remote control over certain objects, read data, et cetera. remote control means that you can influence things remotely as well
2:35 pm
because that's just how it is. there is no other way hold on, so it is important to check for such remote influence capabilities in various systems. that is why one of the 1st presidential orders after the start of the special military operation excluded for in software from critical infrastructure elements. it also prescribed additional information security measures. the government understands that this threat exists and that it needed to be neutralized . isn't it too late? what is known? think of this before. well, normally going, if this was addressed before, the input substitution concept was adopted in 2015 or rather in 2014. it happened when some key elements were disabled. the bank of russia was at one point disconnected from the swift system. while visa must card stopped working for a period of time in certain territories with, we realised that import substitution was significant and that from here a special program was created. the unified read still russian programs for
2:36 pm
electronic computing machines and databases was established. then the same was done for hardware, but somebody unfortunately for several reasons, the process of input substitution was not as efficient as we would have liked. everybody had gotten used to doing things a certain way, but there is also a general understanding that the quality of important systems is better when you rick, naturally it is a totally different situation. when you use a system on millions of computers or in a limited number of machines, when he can't have the same quality without scaling, foreign companies also have an influential lobby in our country. that's why the whole import substitution process was once that forward one step sideways stock and one step back. and nevertheless some steps were taken and we have moved forward even compared to 2014 assigning. i think the situation is much better now. the realtor question would, will come in by 2. now let's just go back to your comments about the possibility of smartphones being disabled. are there any steps we could take right now to avoid
2:37 pm
the scenario grammar to jeff yet? was kazama was bookstore. so i would say there are 2 groups of steps that can be taken. what the state can do to prevent this from happening, and what individual smartphone uses can do. but these are 2 separate issues to discuss. let's start with a state. it could develop an application and make it free for smartphone uses. that would switch off this mechanism, crucial something like this can be done. this type of technology is presently available and perhaps the stake and also introduce import substitution measures in this area as well. and we have operating systems of our own on this, i'm not competent enough in this domain to judge their performance. but there are the aurora and capacity operating systems, which are perhaps worth regarding as an alternative to the foreign made mobile software. or perhaps we could use chinese software. however, i do not saying this approach would be reasonable and it would effectively mean trading had for wes. so it's not right at the roof. that's what the state could
2:38 pm
undertake to remedy the situation. as for individual users, 1st of all, i would not recommend getting rid of the old beg button mobile phones. you never know, perhaps they will come in handy at a certain point co dig the mad just in case. and also i do not saying smartphone blockage will happen over night. it will likely be a gradual process. besides, some smartphones may be turned off on some devices, mobile data uses off, others are disconnected from the network. and if we finally see that the process is gaining speed, it will be possible to switch to other communication means, in order to stay connected. i do not saying china will choose to play mean tricks on us football. the potluck thought was what bridge and stolen look at that is using chinese technology really that bad an option. as you said, trading bud for worse. i mean, there are countries that's on the same side of the fence with the brochure in this regard. audible for a little bit. he got with them about oh,
2:39 pm
hinged their thoughts. i did not saying china will choose to play mean tricks on us, for at least they won't block anything intentionally, for sure, going for them. this is a wonderful business opportunity 1st to walk to step of their mobile device sales. but the problem is that the chinese are in a very dependent position themselves. as far as the cell phone market is concerned in most chinese catches are powered by android. while we had switched off google mobile services and developed an android platform of its own wm and its own at market a system for content distribution, we, but it's still android and we do not know whether it is safe to use it. we haven't looked into this yet, a separate study is needed to establish if there are any risks there. but i do not saying that using these google power, mobile devices, no matter who manufactured them, would be in any way more secure. the dealer would have thought, where is the decision making sense located the generates cybersecurity threats, like disabling smartphones in the us. and what do you think yourself?
2:40 pm
well yes, i think it's her whom area to live that i'm working with in las vegas. you may be right, it is where our enemies are, you know, but you know, i'm not so much worried about the hostile activities, but rather about the fact that the threat landscape in russia has changed so drastically. the number of cyber attacks where getting has searched and many foreign made cyber security systems have stopped working. as you know, many foreign software producers have withdrawn from the russian market and therefore sees to provide maintenance for their systems. it is tied up for, but at the same time nobody seems to care. every one is at ease. we are still operating the same programs we had before. the special military operation was launched by nasha. and we see today's kia can amik indicators telling us we need to boost digitalization by such and such percent, et cetera. i do not get, frankly, is it negligence or sloppiness or stupidity. it is clear that the programs need to
2:41 pm
be replaced or adjusted for digitalization to go on in this situation, but no one is doing anything by now. who are these people enemies or are they simply incapable of grasping the level of threat we are facing? the situation has changed drastically when you're one, greg, a dark blue. oh, this is you so vehement in criticizing the programs which no one is willing to adjust to the changing situation. let me ask you something. what are the 3 main changes that needs to be introduced? we name them for them. oh, glen, la jolla, that'll professor war winnie to analyze. war is lacking in russia. what we critically need to cover all the gaps to keep the entire infrastructure running smoothly and avoid the risk of mobile device blockage across russia. in cybersecurity, this called achieving the level of non realization of the west threat formula. and in order to do this, we need to identify what it is that we're lack of thousands of dollars. and then woody to think of ways to bridge the existing gaps and fill up these deficient when
2:42 pm
you to identify what needs to be done. someone expert teams engage professionals or perhaps commission 10, or say 5 companies to develop solutions on a competitive basis. and then choose the best product, or we could come up with a new mechanism or filling these gaps in each set of rigid deadline. it say, 12 or 18 months, or 2 years, or even 3, depending on the system's complexity. and we also need to identify what kind of stuff is required to complete this task. so we had a heated discussion in early summer, but how many staff were going to need, given the fact that many icey professionals have fled from russia, it was said that no one is left now, and this will kill us officials and then it turned out there are still plenty of competent people left even too many, but they aren't doing the work that needs to be done for the week. and what is exactly that they should be doing them. mm hm. they definitely should be dealing with the most important things at the expense of what trendy and many of these
2:43 pm
professionals continue focusing on the industry trends. let me give you an example . so here there are $26.00 messenger raps in russia, which i love. messengers don't get me wrong, i do not have a problem with them, but do we really need all the 26 of them in this country? also, there are over 60 hostile management software systems registered in russia. 60 different medical database systems, meaning there is a separate system for almost every regional russia. and it's obvious that the quality of the software solutions leaves much to be desired as they were a couple together in hurry, which are what do we really need this whole section when you go, besides, it's taking up human resources recovery, we will never have enough available i t professionals if we continue producing 60 similar software systems for hospital use and when, if we draft a plan and think through the mechanism of allocating government funds for this, i'm sure we will be able to fill all our gaps over a very short period of time,
2:44 pm
which definitely reduce exposure. cyber threats as well. that will go at it. if you said this side, the warfare is ongoing, with no serious steps have apparently been taken against russia. what did you mean and why is that? which if you had to assess the state of events on a $1.00 to $10.00 scale, where would we be standing right now? why not? no, it is obvious that all outside the war has not been started against russia yet. union, you see it is technically impossible to disable russia's infrastructure. the risk of smartphones being disabled is just one of the examples. there are many more, but we see that this is not happening. so we're inclined to thing that no serious cyber warfare is being waged against russia for now. but at the same time, the level of cyber threats has gone up within. we have not come close to the upper limit yet. it still can't be much worse unfortunately, because washes dependence and foreign software is still very high. for more than
2:45 pm
how can russia defend itself should an all out cyber was you put it actually break out, going to the dimensions. what did o'quinn us produce a trillion fast as far as i know, we have been conducting cyber warfare. drills them over the past few years. the ministry of digital development has helped several simulation exercises in case russia gets cut off from the internet and major i t infrastructures. also, they have been working on fortifying essential infrastructure, what they call critical information infrastructure or c. i a good that should have helped bolster our defenses. i think that the overseas, they are in any statistics i can share. i do not have access to this type of classified information, but there has been some work done along these lines. but whether there's adequate or affect, if it's not for me to judge, that's good. but i do think a lot more could be done in terms of input substitution. as i see it, no cybersecurity tools can guarantee any lasting protection. if you continue to rely on foreign made infrastructure, there are no ways to ensure that your security tools, however good,
2:46 pm
would give good enough protection if you operate foreign hardware to ruin and therefore the priorities to replace foreign information systems with our own. the 1001 goals will suppose the authorities here what you have to say and implements all the solutions you propose. how long would it take for us to reach a point where in your view, i, mrs. jersey is at its highest. what disney rosalyn sicilian cronyn, there will be different timelines for different systems for more some can be fixed pretty quickly. for example, by using open source technology. but even there, we have seen cases of code poisoning where all sorts of backdoors or malicious messages were inserted into the open source code through the community. or even though these communities claim to be politically neutral. now some systems are more difficult to improve maker, for example, our association of software developing companies conducted its own analysis and came to the conclusion that we have major problems with industrial software in
2:47 pm
russia does not have enough specialized industrial software. i will not name specific categories of software is because the manufacturers might get upset with me because we've got a handful of companies that work in this domain. but they're much smaller and less experienced compared to western vendors. so they have no other option but to try and catch up. so at least we've got a foundation here because when it comes to software development and programming tools, all we use our foreign ones to go to. so this includes programming languages, development environments, systems and d planning frameworks. with this, we do not have anything of our own. all this isn't something you can quickly fix. it requires a systemic approach. so how long will it take to build our warning tools? well, as they say, a journey of 1000 miles begins with a single step. we need to make plans and start doing something. then we will course correct. look at china, beijing has set a goal to completely replace all i see systems in the country with domestic
2:48 pm
products by 2025 chinese steadily. moving towards this goal here, where i did not remember exactly what year the program was adopted. but i believe that by 2025, they will reach their goal. as long as you have a specific target, this is a solvable issue with the system then done with 5 m. if we sets all of these goals for ourselves, could there be any downsides in some way? we're cutting ourselves off from the process of globalization on we rhythm can go, but is that set up with it? we know what comply zation is actually all about. we know what it stands for, i suppose if it worked like some kind of collective consciousness doing everything purely for the benefit of mankind, that would be a good thing. but with globalization comes competition, a single company or some country starts hugging the covers, so to speak, which leads to confrontation on finished project code poisoning threats. in the end,
2:49 pm
we have to make a choice for our country. the options we have right now are far from optimal. but for now, i do not see russia choosing the part of globalization anytime soon as much good. and then the wrong bonus, crispy of sky in the english language. there's the term nuclear auction. we've talked a lot about smartphones being forcefully shut down boats from what i understand that is not the nuclear option. there are scenarios that will be much worse for russia. what is the worst case scenario? young in the world? i don't think there will be one single blow against our countries i t infrastructure. rather, they will either hybrid approach and carry out simultaneous attacks on multiple france using information warfare and shutting down various systems in order to destabilize the political situation. we're going, if they could attempt to initiate regime change and impose outside control for us. it was expecting just one angle of attack would be nave in my eyes. there are many
2:50 pm
directions for a potential strike, but i suddenly hope our government is well aware of this and is building up multiple layers of defense, bobus's company, meeting widows for study nuclear or let's just go back to the nuclear option. we all understand that there can be no victors in a nuclear war or conflict like that would impact the entire world. of course. does this logic extend to cyber warfare yet key, or what all can been going on? right as, as cyber warfare. well, in that respect, russia can show the world a thing or 2 even in the last they say that she has some of the most brilliant hackers in the world. and personally, my believe them when you so we can retaliate. no one wasn't kind of system naturally, we're all operating the same systems. the modern world is transparent and the technologies that we use they use as well. if they can hit us, we can head back. perhaps not as efficiently as the owners or producers of their operating systems since they have direct control over them. but we can certainly do
2:51 pm
some damage. seamless you were born m historian, lama. history tells us that whenever humanity came to the verge of nuclear war, and recall the cuban missile crisis, for example, the parties involved eventually realize the needs negotiates for solution calmly. are there any parallels we can draw here? no credit? mm hm. so if the thought be go or no, no, yes, the more back then common sense prevailed when it comes to cyberspace. there have been multiple attempts to create something analogous to international law. a universal code of conduct. the old countries would sign so far, this has not been done in early 2, thousands, many, we're actually trying to address this problem. but as we get closer to our present time, fewer and fewer attempts were being made that the key in recent years rush, her alone has been calling for the well to abstain from using saw the weapons from engaging in cyber warfare et cetera. other nations meanwhile, have adopted
2:52 pm
a fast strike approach, and there are national cyber strategies. for example, the u. s. i, mr at the g says they can strike 1st if they have reasons to believe that a countries pursuing some policy that's unfavorable for washington. they can't themselves this, right? so are, unless it's conducted a study to analyze, decide mistrusted use of different states. and it turned out that only 3 countries in the world support offensive cyber warfare perspective, the united states, obviously the united kingdom and for some reason ukraine yet on all other countries, including russia, have defensive cyber strategies. okay. that's very telling them that one was but he well thank you so much for talking to us. it was very informative, unbeatable. thank you. ah, ah,
2:53 pm
look forward to talking to you all. that technology should work for people. a robot must obey the orders given by human beings, except where such order that conflict with the 1st law show your identification. we should be very careful about artificial intelligence. at the point obviously is too late truck rather than a take on various jobs with artificial intelligence, real summoning with a robot must protect his phone existence with awe. mm.
2:54 pm
time with that. the worst of jesus you did? yes, it was just open the window door with the door open to a month. so must all must. it always has but i wanna go on that machine please. can someone stop on um, condo vehicle, a to the borrower, to show us what hold on would lose the quote you move. you saw them. yeah. there was a shalom
2:57 pm
she did believe from what a slip of the month about on windows or the mac, about the va loan. you we look at what all do you see just look like must bully and then when you come in the machine just a bit. i was la, nearly to like a thought of a wished emotional informational as i put almost a total sold out on political when you model with them all dialed up on mr. on the was india over the daughter madison at somebody will give you a conflict. the butch moore released was painted by with a
2:58 pm
now can you if so if it's deploy box near to nothing in group homes in the book, is that probably the national shift anyway, the young will showcase is under nathaniel. that sounds good. it's a, it's a boy. why is it up to a boy a, [000:00:00;00] a quote on in my chair, the says, laura doesn't want that much extra mom. but i just wanted to let y'all know
3:00 pm
with a, a, a, a crew comes on to the latest ukrainian shelling of don. yes. i think a local hotel and a university i'm calling about reach a mutual agreement on a controversial border crossing according to the new which is mediating the top that kinds of gone caves into criticism over its deadly drones strikes on civilians and pledges to same thing with the number of deaths from its foaming of other countries, a state of emergency of what's being called the was humanitarian develop
20 Views
Uploaded by TV Archive on