tv Documentary RT August 27, 2022 6:00pm-6:31pm EDT
6:00 pm
good guy last week i that was there though. i see with lever heflin hill grain with out of there. ah. allow for gym. we always happy to see you as an expert on our team, miss garcia, sky. welcome to the program and thank you for inviting us to your home. of course, you know, what we want to discuss with you today is your recent statement that all smartphones in russia might become disabled. some say that you just tried to scare people, is the existing technology that can make it possible. and if so, how moral not by tucker. so, but as evelyn and the, let's talk about the statement 1st. i never made any such statement, didn't of you said our i phones might be disabled to which i replied, do not worry, and george bay smartphones might be disabled as well. as for the technology aspect,
6:01 pm
there are 2 factors here. almost all smartphones have a built in remote disabling functionality. this was developed so that users could remotely turn off a loss smartphone, for example, to make sure that their private data wasn't stolen was this feature one can either raise all stored information or disable the smartphone altogether. basically turning it into a brick, this feature is documented and if it is available to the user, obviously the platform can take advantage of it as well through phone manufacturers can also use it. but there is also an undocumented feature. our specialist looked into this matter and they discovered that many smartphones have the disabling feature. of course, we haven't examined all fans. that would be a massive research board did look at a small range of models user. so the situation is not great in that respect. you have to understand that in essence, the real own of your smart phone is it's manufacturer when the russian, all sorties talk about import substitution. that is one of the reasons we use technology that is controlled by an external manufacturer of smith. unfortunately,
6:02 pm
information technology is controlled by developers and producers not uses her pay money for their technological product. they're gone for she, you learn in that case. can we say that this is a serious cyber threats? not all smartphone producers or even based in the u. s. no, it was not on my medical ski, these are mostly american companies, the platforms i found or android or developed in the u. s. so this kind of control is a potential capability. it doesn't look like your typical on off switch, of course. anyway, that is the most important factor in the world, but having this technological capability is one thing. another question is, will they decide t? is it a war? yes, that was what i'm talking about. yep. all ago, i think it might be possible if there is a series escalation and the war, and it would be some type of hybrid strategy and simply disabling smartphones in some territories, pointless. this measure would likely have to be part of some kind of package. for example, if we become very successful on the front lines and the west realizes that it can
6:03 pm
do anything about this, we could certainly expect some hybrid attacks in the information space and simultaneous actions that would significantly damage our infrastructure. when this was this necessarily affect smartphones, or maybe would they target base stations or other i o t elements? i can't make any predictions. i can only say that there is a hypothetical possibility. so stood the aroused me meaningful the word diverse reactions to your comments. so ma, skeptical a mobile research group expert, for example, said that if disabling smartphones was a realistic cyber threats, we could talk about disabling aircraft equipment, which hasn't happened and seems like this option is not on the table. what do you say about that? so the gar garcia, the buckles though, is that we're proposing bread with, well, 1st we do not know what is on the table. before late february, there had been a lot of things we thought would be impossible, but, but now we are witnessing the disabling of several infrastructure for elements. we
6:04 pm
are registering a drastic increase in attacks. major retailers are sold for 10 euros in our country . he would have predicted something like that 6 months ago. i will not dare to predict what will happen as for disabling aircraft technology. when you are waging a hybrid war, you have to have a reason for every action. why would you disable airplanes right now? what would be the goal? they might be exaggerating this potential. if we talk about military charts, this is one thing. but with civilian aircraft, you must have a purpose anymore. but i do not think they would do something like that. just for the sake of disabling that is just wrong. you have to understand that if they demonstrate some potential capability, like disabling smartphones, the country will mobilize its resources, figure out a workaround, and it will be much harder to do something like that next time. so if you're going to pull this kind of switch, you have to really think about everything and make sure this will ashley be a serious blow. we can safely assume that it will be
6:05 pm
a well thought out step norwin that were continuous covered. so if i understand correctly, this was just a warning from the prison in barnwell's portal. no phone. no, of course. i was asked if there was technically possible. what you called a statement was really just the comment. my answer is yes. technically it is possible. and mobile system experts should understand that smartphones can be disabled my phone system. so she told me, right, is there a chance that other key infrastructure elements could be disabled? and if so, what would they be? horizontal, grinnell, that all depends. earlier i mentioned base stations automated process control systems also come to mind, especially if they're connected to the internet. our society has been actively going digital in recent years. this process has been very evident in the so called internet of things sector. for example, implementing internet connected systems that help establish remote control over certain objects. read data set. remote control means that you can influence things
6:06 pm
remotely as well because that's just how it is. there is no other way to go on, so it is important to check for such remote influence capabilities in various systems. that is why one of the 1st presidential orders after the start of the special military operation excluded for in software from critical infrastructure elements. it also prescribed additional information security measures. the government understands that this threat exists and that it needed to be neutralized . isn't it too late? what a known, think of this before? normally going, if this was addressed before the impulse substitution concept was adopted in 2015 or rather in 2014, it happened when some key elements were disabled. the bank of russia was at one point disconnected from the swift system. while visa must caught stopped working for a period of time in 7 territories with, we realised that import substitution was significant. from here, a special program was created,
6:07 pm
the unified register of russian programs for electronic computing machines and data bases was established. then the same was done for hardware, but somebody unfortunately for several reasons, the process of input substitution was not as efficient as we would have liked. everybody had gotten used to doing things a certain way, but there is also a general understanding that the quality of important systems is better. which naturally it is a totally different situation. when you use a system on millions of computers or in a limited number of machines, when he can have the same quality without scaling. foreign companies also have an influential lobby in our country. that's why the whole import substitution process was one step forward. one step sideways stock and one step back them. nevertheless, some steps were taken and we have moved forward even compared to 2014. so i mean, i think the situation is much better now. the realtor question would welcome in, but oh no, let's just go back your comments about the possibility of smartphones being
6:08 pm
disabled. are there any steps we could take right now to avoid the scenario? graham was to jeff yet, was kazama was bookstore. so i would say there are 2 groups of steps that can be taken, what the state can do to prevent this from happening. and what individual smartphone uses can do a little bit of these are 2 separate issues to discuss. let's start with a state. it could develop an application and make it free for smartphone uses. that would switch off this mechanism, crucial something like this can be done. this type of technology is presently available and perhaps the stake and also introduce import substitution measures in this area as well. and we have operating systems of our own and the performance, i'm not competent enough in this domain to judge their performance. but there are the aurora and capacity operating systems, which are perhaps worth regarding as an alternative to the foreign med mobile software. or perhaps we could use chinese software. however, i do not saying this approach would be reasonable and it would effectively mean
6:09 pm
trading bad for worse. so it's not right at the rule. that's what the state could undertake to remedy the situation. as for individual users, 1st of all, i would not recommend getting rid of the old big, but mobile phones you never know. perhaps they will come in handy at a certain point code. dig them out just in case, and also i do not saying smartphone blockage will happen over night. it will likely be a gradual process. besides, some smartphones may be turned off. on some devices, mobile data uses off, others are disconnected from the network. and if we finally see that the process is gaining speed, it will be possible to switch to other communication means, in order to stay connected. i do not st. china will choose to play mean tricks on us football. the potluck thought was what bridge store look at that is using chinese technology really that bad an option, as you said, trading bad for worse. i mean, there are countries that are on the same side of the fence with
6:10 pm
a brochure in this regard, audible for a little but he got all the lovers, no hinge, thirst. the kid thought i did not, st. china will choose to play mean tricks on us, for at least they won't block anything intentionally, for sure, going for them. this is a wonderful business opportunity 1st to walk, to step of their mobile device sales. but the problem is that the chinese are in a very dependent position themselves as far as the cell phone market is concerned, and most chinese catches are powered by android. while we had switched off google mobile services and developed an android platform of its own wm and its own app market, a system for content distribution go away. but it's still android and we do not know whether it is safe to use it. we haven't looked into this yet, a separate study is needed to establish if there are any risks there. but i do not saying that using these google power, mobile devices, no matter who manufactured them, would be in any way more secure. deanna would have thought, where is the decision making sense located the generates cybersecurity threats,
6:11 pm
like disabling smartphones in the u. s. council, and what do you think yourself? well yes, i think it's her whom area to live that i'm working with in this way. this is, you may be right, it is where our enemies are, you know, but you know, i'm not so much worried about the hostile activities, but rather about the fact that the threat landscape in russia has changed so drastically. the number of cyber attacks where getting has surged and many foreign made cyber security systems have stopped working. as you know, many foreign software producers have withdrawn from the russian market and therefore sees to provide maintenance for their systems is that up for. but at the same time, nobody seems to care. every one is at ease. we are still operating the same programs we had before. the special military operation was launched by nasha. and we see today's kia can amik indicators telling us we need to boost digitalization by such and such percent, et cetera. i do not get it frankly, though, is it negligence or sloppiness or stupidity. it is clear that the programs need to
6:12 pm
be replaced or adjusted for digitalization to go on in this situation, but no one is doing anything by yeah. who are these people enemies or are they simply incapable of grasping the level of threat we are facing? the situation has changed drastically. when you were quoted, doubly all this is your so vehement in criticizing the programs which no one is willing to adjust to the changing situation. let me ask you something. what are the 3 main changes that needs to be introduced? we made them for them. oh, la, la jolla, that'll professor war winnie to analyze. war is lacking in russia. what would critically need to cover all the gaps to keep the entire infrastructure running smoothly and avoid the risk of mobile device blockage across russia. in cybersecurity, this called achieving the level of non realization of the west threat formula. and in order to do this, we need to identify what it is that we're lack of thousands of dollars. and then we
6:13 pm
need to think of ways to bridge the existing gaps and fill up these deficient. we need to identify what needs to be done. some an expert teams engage professionals or perhaps commission 10 or say 5 companies to develop solutions on a competitive basis. and then choose the best product, or we could come up with a new mechanism or filling these gaps in each set of rigid deadline and say, 12 or 18 months or 2 years, or even 3, depending on the systems complexity. and we also need to identify what kind of stuff is required to complete this task. so we had a heated discussion in early summer, but how many staff were going to need given the fact that many i t professionals have fled from russia. it was said that no one is left now, and this will kill us of those will, and then it turned out there are still plenty of competent people left even too many. but they aren't doing the work that needs to be done for the woods and what is exactly that they should be doing them. mm hm. they definitely should be dealing
6:14 pm
with the most important things at the expense of what's trendy. and many of these professionals continue focusing on the industry trends. let me give you an example . so when you draw 26 messenger apps in russia, what i love messengers don't get me wrong. i do not have a problem with them, but do we really need all the 26 of them when this country? also, there are over 60 hostile management software systems registered in russia. 60 different medical database systems, meaning there is a separate system for almost every regional russia. and it's obvious that the quality of the software solutions leaves much to be desired as they were a couple together in hurry, which are what do we really need this victim? when besides, it's taking up human resources worker, but we will never have enough available i t professionals if we continue producing 60 similar software systems for hospital use and when, if we draft a plan and think through the mechanism of allocating government funds for this,
6:15 pm
i'm sure we will be able to fill all our gaps over a very short period of time, which definitely reduce exposure cyber threats as well. because that will go at it . if you said this side, the warfare is ongoing, but the no serious steps have apparently been taken against russia. what did you mean and why is that? which if you test the state of events on a $1.00 to $10.00 scale, where would we be standing right now? why not? no, it is obvious that all outside the war has not been started against russia yet. union, you see it is technically impossible to disable russia's infrastructure. the risk of smartphones being disabled is just one of the examples. there are many more, but we see that this is not happening. so we're inclined to thing that no serious cyber warfare is being waged against russia for now. but at the same time, the level of cyber threats has gone up within. we have not come close to the upper limit yet. it's still can't be much worse unfortunately, because roches dependence and foreign software is still very high bordered. how can
6:16 pm
russia defend itself should an all out cyber was you put it actually break out joy for the dimensions? what good o'quinn us foreigners searching and fast as far as i know, we have been conducting cyber warfare. drills them over the past few years. the ministry of digital development has helped several simulation exercises in case russia gets cut off from the internet and major i t infrastructures. also, they have been working on fortifying essential infrastructure, what they call critical information infrastructure, or c. i a good that should have helped bolster our defenses. i think that the oversee, they are in any statistics i can share. i do not have access to this type of classified information, but there has been some work done along these lines. but whether there's adequate or affect, if it's not for me to judge, that's good. but i do think a lot more could be done in terms of input substitution. as i see it, no cybersecurity tools can guarantee any lasting protection. if you continue to rely on foreign made infrastructure,
6:17 pm
there are no ways to ensure that you are security tools. however good would give good enough protection if you operate foreign hardware to ruin. therefore, the priorities to replace foreign information systems with our own. the 1001 was blue. suppose the authorities here what you have to say and implements all the solutions you propose. how long would it take for us to reach a point where in your view, i, mrs. jersey is it is highest to me, but all of them says they want granite. there will be different timelines for different systems. some can be fixed pretty quickly. for example, by using open source technology. but even there we have seen cases of code poisoning, where all sorts of back doors or malicious messages were inserted into the open source code through the community. even though these communities claim to be politically neutral. now some systems are more difficult to improve maker, for example, our association of software developing companies conducted its own analysis. and
6:18 pm
came to the conclusion that we have major problems with industrial software that russia does not have enough specialized industrial software. i will not name specific categories of software is because the manufacturers might get upset with me. we've got a handful of companies that work in this domain, but they are much smaller and less experience compared to western vendors. so they have no other option but to try and catch up. so at least we've got a foundation here because when it comes to software development and programming tools, all we use our foreign ones to go to. so this includes programming languages, development environments, systems and d planning frameworks. with this, we do not have anything of our own. all this isn't something you can quickly fix. it requires a systemic approach. so how long will it take to build our warren tools? well, as they say, a journey of 1000 miles begins with a single step. we need to make plants and start doing something. then we will course correct. look at china. patient has set
6:19 pm
a goal to completely replace all i see systems in the country with domestic products by 2025. if china is steadily moving towards this goal here, i do not remember exactly what year the program was adopted. but i believe that by 2025, they will reach their goal. as long as you have a specific target, this is a solvable issue with the system that down with 5 m. if we set all of these goals for ourselves, could there be any downsides in some way? we're cutting ourselves off from the process of globalization out we rhythm can go . but is that set up with it? we know, woke applies ation is actually all about, we know what it stands for. i suppose if it worked like some kind of collective consciousness doing everything purely for the benefit of mankind, that would be a good thing. but with globalization comes competition, a single company or some country starts hugging the covers, so to speak, which leads to confrontation on finished project code poisoning threats. in the end,
6:20 pm
if we have to make a choice for our country, the options we have right now are far from up to marketing. but for now, i do not see russia choosing the part of globalization anytime soon as much as it and the value on bonus. casper sky in the english language, there's the term nuclear option. we've talked a lot about smartphones been forcefully shut down boats from what i understand that is not the nuclear option. there are scenarios that would be much worse for russia . what is the worst case scenario? young in the world. i don't think there will be one single blow against sarah countries i t infrastructure. rather, they will use a hybrid approach and carry out simultaneous attacks on multiple fronts using information warfare and shutting down various systems in order to destabilize the political situation. we're going, if they could attempt to initiate regime change and impose outside control for us. it was expecting just one angle of attack would be nave in my eyes. there are many
6:21 pm
directions for a potential strike, but i suddenly hope our government is well aware of this and is building up multiple layers of defense with his company meets him. when it was closed, study nuclear or let's just go back to the nuclear option. we all understand that there can be no victors in a nuclear war or conflict like that would impact the entire world. of course, does this logic extend to cyber warfare yet key, or what all combine? all right. this is the cyber warfare. well, in that respect, russia can show the world a sing, or 2, even in the us. they said that she has some of the most brilliant hackers in the world. and personally, my believe them when you so we can retaliate and what wasn't kind of system naturally, we're all operating the same systems. the modern world is transparent and the technologies that we use they use as well. if they can hit us, we can head back to perhaps not as efficiently as the owners or producers of their
6:22 pm
operating systems since they have direct control over them. but we can suddenly do some damage. seamless you were born. you miss gloria lamar. history tells us that whenever humanity came to the verge of a nuclear war, and recall the cuban missile crisis, for example, the parties involved eventually realize the needs negotiates 1st solution calmly. are there any parallels we can draw here? quite name of sure. and she's with all the big old? no, no. yes. back then common sense prevailed when it comes to cyberspace, there have been multiple attempts to create something analogous to international law. a universal code of conduct, the old countries would sign. so far, this has not been done in early 2, thousands, many were actually trying to address this problem. but as we get closer to our present time, fewer and fewer attempts were being made that the key in recent years rush, her alone has been calling for the well to abstain from using saw the weapons from engaging in cyber warfare, et cetera, are the nation's me while have adopted
6:23 pm
a fast strike approach in their national cyber strategies. for example, the u. s. cyber strategy says they can strike 1st if they have reasons to believe that a countries pursuing some policy that's unfavourable for washington. they grant themselves this right. so, sir, are unlisted conducted a study to analyze, decide mistrusted sheet of different states. and it turned out that only 3 countries in the world support offensive cyber warfare perspective, the united states, obviously, the united kingdom and for some reason ukraine. all other countries, including russia, have defensive cyber strategies. that's very telling that it was but he well thank you so much for talking to us. it was very informative. thank you. ah, ah,
6:24 pm
the day before the morning i'm. i was watching them only. yeah. yeah. so, but there isn't any just just on the horse to don't get on that on. i'm just needed someone to do it, but they might just at them click out of here. so there's an actual national. so what time i see if my will come and get a better price. all right, so joe, i'm wishing you should get into the system, but also the data sheet on that because i said that was in the middle. yes. special
6:25 pm
. a motion thing is you need to know partial team that were like almost 2000000 much that was the window. it was moderation. would that if the machine is much more complex from a more well, but i don't know what to shield your son or my less the won't go in and get it to the she just has to balance them each other when you get it and get it all to see which markers telling me about this, and i'm not sure anything, complex bonuses, you know. and so i'm guessing, you know, i mostly in the blood school, but i will subordinate point also, boy, man, we're not going to look at it just to know what i mean, and you are going to put them on the machine and the physician will, i put it in and what are the new genia before the video, i'm going to go,
6:26 pm
or i'm going to be the way when you read for a to me, but i'm, i will local bar towards passage over atlas. sit in the machine. i wish i be the best now to stay in iraq and there is actually one of the principal belonging as of asia able to shock, say me, you can po priscilla. it was issued me a lot from rational sociology sewer kind of stuff. just just wanted to share. i see where mm. ebersole early, bethesda was alyssa, i showed a man. got older so, but african as up milk. i said she had the same it about them. i was a little air national bong, i was standing there. mm. mm. oh, well, it's showing wrong when i was just
6:27 pm
a yes to see how this thing becomes the advocate and engagement. it was the trail when so many find themselves, well, the part we choose to look for common ground. ah, yes. now you media visits, deploy smear to melting, you know them look, you know, the new book is up probably the next we should see where the extra, your showcase is with a boy. why is it w ah,
6:28 pm
6:29 pm
recently. 2014, a qu divides ukraine and leads to fratricidal war and on a war that continues to this day on the edge of a large field near lo ganske, the mass grave. local say that the people buried here are mostly civilians who are allegedly killed by ukrainian paramilitary groups in the summer of 2014. what does this, what's written, mr. alcorda? what does that? don't be just that means it would be the when the british go, what's the crayon said things of us that inform you not to annasae rocha leads a special committee for collecting evidence of the ukrainian government alleged
6:30 pm
walk rhymes against the people of la ganske. when you go about doing is i'm really interested. there are many burial sites like this and done bus. i'm here for 5 minutes and then i'm told the 1st 5 people they found it was 5 decapitated heads. they were all civilians. who does this to people? you can't say that there isn't, there wasn't war crunch for in the area around venetia, verifica village and, and against the people's republic. 36 civilian bodies are being exit. mm hm. georgia license and american journalist claims he repeatedly sent reports of alleged crimes like this to european and american media. my hope is that this begins the process to bring this into an international forum. but when you see
16 Views
Uploaded by TV Archive on