assessment of threats to national security

SECOND INVESTIGATION DEPARTMENT
UNDER THE MINISTRY OF NATIONAL DEFENCE
ASSESSMENT OF THREATS
TO NATIONAL SECURITY
Vilnius
2013
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
CONTENTS
INTRODUCTION.........................................................................................................................3
REGIONAL SECURITY
Russia ............................................................................................................................3
Belarus……..................................................................................................................... 9
Other CIS states and Georgia ......................................................................................10
GLOBAL SECURITY. CRISIS REGIONS
Afghanistan …..............................................................................................................11
Horn of Africa and Sahel ………………...........................................................................12
Middle East and North Africa…. ...............................................................................13
Syria …..........................................................................................................................14
Terrorism…..................................................................................................................14
THREATS IN CYBERSPACE………………......................................................................................15
COUNTERINTELLIGENCE ACTIVITY.........................................................................................17
INFORMATIONAL THREATS ...................................................................................................18
ANNEX 1 ………………………….....................................................................................................21
2
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
The assessment of threats to national security is provided to the public in accordance with
the provisions laid down in Articles 8 and 26 of the revised version of the Law of the Republic of
Lithuania on Intelligence (as of 17 October 2012, No. XI-2289, “Zinios”, 2000, No. 64-1931; 2002, No.
72-3019). Thereby, the document provides unclassified assessment of military, military-political,
military-economic, military-technological and military-informational external threats and risk factors
to Lithuanian national security.
INTRODUCTION
Currently, there are no major preconditions for a large scale conventional
military conflict in the regional geopolitical environment of Lithuania (the Baltic Sea region).
A probability of a direct military confrontation between regional states is very low. However,
certain tendencies and external players’ actions negatively affect the Lithuanian security
situation. Lithuania’s borders are also external boarders of the European Union (EU) and
NATO with Russia, which greatly influences Belarus, along with the members of the
Commonwealth of Independent States (CIS) and the Collective Security Treaty Organization
(CSTO). Additionally, the situation becomes more complex as NATO members often have
diverse aims in the relations with Russia, whereas Russia continues to consider the Republic
of Lithuania as part of its “zone of privileged interests”. Consequently, any major
disagreement between Russia and NATO influences negatively the geopolitical environment
of Lithuania and the pursuance of an effective foreign and security policy.
Lithuania perceives its national security as an integral part of NATO and EU
security policy by assigning troops to international military operations and missions. For this
reason, the Second Investigation Department under the Ministry of National Defence of the
Republic of Lithuania (AOTD) devotes significant attention to the close monitoring and
analysis of the worrying tendencies in more distant regions, such as Afghanistan, the Middle
East and North Africa, the Horn of Africa and the Sahel region.
Recently, national security interests of the states are being increasingly
affected by non-traditional transnational developments and phenomena, such as terrorism,
cyber attacks, piracy, etc. Some of those global tendencies have a direct negative impact on
national security of Lithuania, whereas the others influence Lithuania’s security interests
only indirectly as an integral part of the larger Euro-Atlantic community.
REGIONAL SECURITY
Russia
Over the last decade authoritarian tendencies in Russia’s internal policy were
significantly strengthened. As a response to increased Russian society’s activity and
discontent at the end of 2011 and the first half of 2012, Russia’s authorities were tightening
the control of domestic political processes, whereas opposition remained disunited.
3
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
Presently, none of the opposition movements are able to attract broader society’s support
and pose a threat to the ruling elite.
Aggressive Russian rhetoric and actions in relations with neighbouring states
used throughout the past years are often intended to achieve certain domestic policy goals.
The demonstration of military strength is an important measure in Russia’s internal policy
seeking to exploit the society’s ‘Great Russia’ and anti-western moods, and simultaneously
redirect its attention from domestic economic and social concerns. The aggressive
statements and actions in foreign policy receive almost unanimous support from Russian
society. It is likely that the growing nationalistic tendencies will have a negative impact and
will foster even more aggressive Russian foreign policy. An image of strong authority,
capable to defend national interests by strict means, is one of the core elements of the
contemporary Kremlin ideology. It should be noted that in case of aggressive (even military)
actions the domestic political situation in Russia enables authorities to avoid criticism and
enforce civil control.
The Russian foreign policy priorities have not changed in 2012. A long term
foreign policy goal - multipolar international relations, where Russia is perceived to be one
of the most important power pillars – remains unchanged. Accordingly, trying to pursue this
goal, anti-western rhetoric as well as confrontational behaviour in relations with NATO/ the
West was again intensifying in the second half of 2011 and 2012. As Russia strives to
entrench the status of a revived great power, the demonstration of military strength stands
as inseparable part of this endeavour.
The Russian leadership considers NATO as the main obstacle in consolidating its
strength not only in the post Soviet space, but also on the global scale. Thus, despite the
declared objective to continue cooperation with NATO, the Alliance is still perceived as a
threat to Russia’s national security. The concrete Russian actions are directed to diminish
coherence of the Alliance, perceiving it as a potential opponent. Russia attempts to increase
tensions between the US and EU, discredit NATO and induce the Alliance’s internal
disintegration. Russia’s military doctrine, approved in 2010, indicates NATO as a source of
military danger.
Another main Russian foreign policy goal is to strengthen and consolidate its
influence in the post Soviet space. The entire post Soviet space (incl. Lithuania) is perceived
as the “zone of privileged interests”, where exceptional Russian interests must be respected
not only by the states falling into this zone, but also by other global international players.
Seeking to increase its influence in the entire post Soviet space, Russia has devoted extreme
attention for the integration processes within the CIS: the Customs Union of Russia, Belarus
and Kazakhstan, (since 2011); and the Single Economic Space, established in 2012.
Russia perceives other states’ energy independence as a threat to its security. At
the end of 2011, the former chief of the Russian Armed Forces (AF) General Staff, Army Gen.
Nikolai Makarov presented the assessment of threats to military security (see page 5). An
4
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
intention of the Western states to ensure energy independence in defiance of Russian
economic and political interests has been indicated as the main threat to Russian military
security 1. The Russian leadership envisages such a threat because of the critical dependency
of the state budget on the revenues from energy resource exports, whereas high revenues
for oil and gas are the main prerequisites enabling to sustain domestic political stability.
Moreover, the AF weapon modernisation, which is the main element of the implementation
of Russia’s AF reform, depends on sufficient budget revenues from oil and gas. Thus,
Western actions that negatively affect Russia’s interests and its overall energy policy are
considered as a threat to Russia’s security. On the other hand, policies of individual
European states (incl. Lithuania) towards energy independence are considered as making a
limited negative impact on Russian interests and contributing to the rise of a threat to
security2. The situation becomes more complicated, since Russian political leadership
assesses energy as one of the major political influence leverage in Central and Eastern
Europe. For this reason, Russia is particularly sensitive towards any attempt by the states of
this region to enhance their energy independence.
Makarov’s presentation slide defining threats to RF military security
1
Major threats indicated by Makarov: 1. The aim of the West to ensure energy independence in defiance of the
Russian economic and political interests (first of all – the EU energy policy); 2. Contravention of strategic power
balance (first of all, global missile defence system elements’ deployment); 3. Continuation of the US lead;
expansion of the US and NATO military and responsibility zones (firstly – NATO expansion to the East); 4. The
Western countries’ military-technical and technological domination; 5. Territorial claims for Russia and its allies
(among those – Lithuania’s territorial claims); 6. Employment of military force measures bypassing
international law principals and norms (military operations in Yugoslavia and Iraq).
2
For example, the third EU energy package.
5
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
Energy is a keystone of Russian AF financing. Before economic crisis in 20082009 the Russian GDP annually grew approximately by 7%. Currently, the state economy has
recovered from the crisis, yet the growing pace remains rather restrained (in 2011 – 4.3%; in
2012 – 3.4%). The economy persists structurally weak and largely dependent on the energy
resources. In 2012, 50.2% of the Russian federal budget revenues were received from oil and
gas sectors.
The ever growing
100
revenues from natural resource
90
exports until the end of 2008
98
80
provided Russia with possibility to
70
79
substantially increase its AF
60
financing annually. Throughout
68
50
59
the last decade the nominal
@
40
defence
expenditure
has
30
increased
approximately
6.5
20
times. Considering inflation during
3
3,2
10
3,4
3,7
this period, the actual financing of
0
AF grew approximately 3 times. In
2012
2013
2014
2015
economic crisis conditions the AF
Per cent of GDP
US dollars (bn)
financial allocations grew slower,
but with the start of 2011 the
Nominal expenditure for defence in 2012 and planned defence
tendency of ever growing
budget for 2013–2015
expenditures for AF arouse once
again. In 2013, Russia will increase
AF financing by almost 15%, whereas defence spending for the first time will exceed
3% of GDP (will comprise 3.2%).
Russian AF development.
The large scale Russian AF reform
that started in 2008 had further
continued in 2012. The main goal
of the reform is to largely increase
the AF combat potential by
creating smaller yet much more
effective forces. Russia has
indicated that the formation of
modern
and high combat
readiness forces is one of its
strategic
goals.
The
AF
“professionalism”
programme,
which is oriented to an increase in
numbers of professional soldiers,
is being implemented. This will
The missile system “Iskander” and its range (400-480
km)
6
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
increase the readiness and effectiveness of combat units.
In State Armament Programme 2011-2020 (SAP) it is forecasted to allocate up
to 20 trillion Russian Rubles (about €450 bn) for the AF modernization and rearmament. The
major share of the budget expenditure, which constitutes the envisaged increase to national
defence financing in 2013-2015 should be allocated namely for implementation of the SAP.
The AF rearmament with modern military equipment is one of the keystone elements of this
reform. Moscow endeavours that the modern armament share in all military equipment
should constitute more than 30% by 2017, and more than 70% by 2020. It is very unlikely
that the SAP will be fully implemented. However, the Russian political leadership perceives
the national defence as a priority. The AF financing could experience a decrease only in case
of extremely deep economic crisis.
In 2012, Russia
continued to strengthen its
military capabilities in the
Western
direction
and
Kaliningrad. The most modern
Missile Defence (MD) radar
“Voronezh” has been installed in
Kaliningrad region. The most
modern Air Defence (AD)
systems S-400 capable to
destroy air targets over the
territory of Lithuania have been
deployed.
It
has
been
announced that there are also
plans to deploy the most
Russia’s offer to divide Europe into MD responsibility sectors.
Lithuania would be under “protection” of Russian MD
modern offensive weaponry –
the surface to surface (SS)
missile systems “Iskander-M”. The Baltic Fleet has been supplied with new combat ships.
Region based military infrastructure modernization efforts are also underway.
Despite publicly declared Russian intention to cooperate with the US and
NATO, including Missile Defence (MD), the major Russian objective remains unaltered – to
avoid deployment of NATO’s AD and MD components in the territory of countries bordering
Russia. Moscow offers NATO to divide Europe into MD responsibility sectors. According to
the Russian proposal, the Baltic States and part of Poland’s territory would fall into “Russian
responsibility sector”, i.e. NATO would have to transfer part of its members’ security
ensuring liabilities to Russia. Consequently, the Alliance’s defence capabilities in the region
would be restricted. Meanwhile, Russia has been intensively developing its AD and MD
systems near the border with NATO member states. This system is already capable to track
7
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
and destroy air targets several hundred kilometres over the territory of some NATO
member-states.
Moreover, it has become a custom that Russian Navy conducts naval patrols in
strategically important areas of Blue Waters, especially the Mediterranean region. In 2012,
Russia demonstrated the growing military power by conducting strategic aviation flights over
international waters (incl. the Baltic Sea). Such flights were resumed after a long period and
have become regular. Since 2008, Russia has been annually organizing large-scale military
exercises, with participation of more than 10,000 troops. In 2012, the large-scale exercise
“KAVKAZ” was hosted by Russia’s Southern Military District.
The consistent strengthening of Russian and Belarusian integration in the
military field is also noteworthy. For Russia, Belarus is the front defence echelon in the
Western direction. The countries have established a joint Regional Military Grouping (RMG),
which is intended to ensure defence of both states. Interoperability of the Russian and
Belarusian units that are subordinated to this grouping is being constantly improved during
various military exercises. For instance, in 2013 it is planned to organize large-scale “ZAPAD
2013” exercise in Belarus territory and Kaliningrad region. It must be pointed out that the
ZAPAD exercise scenario embraces defensive and also offensive operations. Some of the
naval and ground military ranges used for these exercises are situated near the Lithuanian
border. During such intensive military activities, intentional or unintentional violations of
Lithuanian state border, airspace or various other incidents are likely to occur. Russia’s
military activity in the Western direction is assessed as a demonstration of its military power.
In 2013, Russia announced its intentions to establish an Air Force base in
Belarus. Such developments would undoubtedly consolidate mutual military integration and
enhance Belarus’ role in Russia’s defence plans and policy, which in turn would increase
Belarus’ overall dependence on Russia.
The fact that by developing military capabilities and conducting military
exercises the priority is given to the Western and Southern strategic directions indicates
that the Russian military doctrine is being implemented in practice. To be more precise,
NATO is not only perceived as a source of danger, but real military planning and concrete
preparations for neutralization of this threat are being employed.
Utilization of ammunition stocks in Kaliningrad region. There are cumulated large
amounts of ammunition in Kaliningrad region. A substantial part of this ammunition is
outdated and must be utilized. A complex utilization process of unserviceable ammunition
was started throughout 2010-2012. The ammunition utilization was carried out in
Kaliningrad military ranges, including Dobrovolsk which is situated close to the Lithuanian
border. As in other Russian regions, where utilization of unserviceable ammunition is carried
out, various incidents in Kaliningrad region were recorded. The detonation activities caused
damage to the habitants and their properties in close vicinity of the ranges.
8
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
Belarus
The domestic political situation of Belarus has been determined by the
president’s administration endeavour to preserve authoritarian regime. Incomplete
constitutional mechanisms as well as centralized Belarus’ authority system based on the
security apparatus (KGB, Ministry of Interior, AF) guarantee President Alexander Lukashenka
almost unlimited freedom of action and a possibility to remain in power.
Despite the fact that political opposition parties operate legally, their influence
on the state’s political life is minimal. As a result of constant persecution and repressions,
Belarus’ opposition is divided and weak. Notwithstanding that recent social-economic
situation in Belarus is complicated, there is no apparent antigovernment disposition within
the major part of society. The social policy pursued by authorities ensures low
unemployment and small but steady income, which in turn creates an illusion that the
regime guarantees the protection of citizens’ basic needs.
Due to authoritarian ruling system, Belarus experiences certain international
isolation. Economic and financial crisis has accelerated Belarus’ involvement into Russia-led
integration processes in post Soviet CIS space, namely the establishment of the common
Customs Union, and the Single Economic Space of Russia, Belarus and Kazakhstan.
Moreover, the aforementioned states signed an agreement regarding the establishment of
the Eurasian Economic Union. This formed the background for further increase of Belarus’
political, economic and military dependence on Russia. However, relations between Russia
and Belarus are not only unilateral, there were temporary tensions between the two states,
when Russia exerted political, economic and informational pressure in the past.
Belarus’ National Security Concept and other doctrine-based documents imply that a major
source of external threats is the establishment and development of military-political blocks
in Europe as well as military infrastructure development near Belarus’ borders, i.e. NATO.
Belarus relates the assurance of its military security to Russia. Thus, the establishment and
development of a single defence space with Russia is considered to be a priority.
Currently, Belarusian AF are capable of ensuring state defence and mobilization
readiness. They are also capable of performing limited scale, short term offensive operations
because of their significant number of tanks, armoured vehicles and large Special Operation
Forces. The main best manned and equipped Belarusian AF units and training areas are
deployed in the western part of the country. So far, the Belarusian financial situation
restricts the procurement of new and upgraded armament as well as military equipment.
However, it is likely that the potential of AF will be augmented by Russia’s delivered modern
armament and military equipment and the Russian-Belarusian regional military grouping
(RMG) will be strengthened in the future.
9
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
Other CIS states and Georgia
Apart from internal causes, such as political instability, lack of public
governance and an ineffective economy, the major sources of instability in this area are
separatist regions and ‘frozen conflicts’ along with everlasting Russian ambition to increase
its influence. In 2012, most of the states of this region were urged to be closely involved in
the Russian controlled integration processes. Meanwhile, the political elite of these
countries was forced to choose between Russian led Eurasian or European integration
perspectives.
Throughout 2012, Russia has continued its efforts to increase influence in the
post Soviet space. The most extensive pressure was exerted against Ukraine, seeking to
involve it in the Russian controlled integration projects and promote Russian capital
(incursion to energy sector), first of all, taking over the control of the Ukrainian gas
infrastructure. Since Russian objectives and actions do not always correspond to the
interests of Ukraine’s political and business elite, a basis for growing tension between these
states still persists.
In 2012, the Transnistrian issue settlement process has not, in fact, progressed.
Apparently, Moldova is not capable to solve Transnistrian conflict independently, while
Russia is more concerned to preserve ‘the frozen conflict’ status quo rather than to
recognize independence of this separatist region: this is one of the major Russian political
levers in the region.
So far, there are no obvious indications that the settlement of Nagorno
Karabakh conflict by political means may break the deadlock. Armenia and Azerbaijan retain
a very harsh rhetoric and pursue their own AF strengthening programmes. Russia remains
Armenia’s major security guarantor. Russia has continued its effort to strengthen influence
in Armenia and to entail it to the Customs Union.
Russian military contingent based in Georgian separatist regions clearly
increases its influence in the South Caucasus region. Russia’s entrenchment in Abkhazia and
Tskhinvali region (South Ossetia) keeps a constant military tension on the Georgian border
and greatly reduces the possibility to solve the Georgian territorial integrity issue in the short
term. After the 2012 autumn parliamentary elections state political balance has shifted
immensely. Although Georgia seeks to normalize bilateral relations with Russia, it also states
that the Euroatlantic integration remains a top priority. Despite slightly decreased tension
between Russia and Georgia, a possibility of diplomatic relations revival in the short term is
low.
The plans to strengthen CSTO military component by establishing the joint CSTO
forces were announced in 2012. Nevertheless, the CSTO still remains a cover for Russian
bilateral military cooperation with individual members of the organization, rather than a
functional alliance united by common interests. In 2012, Russia further sought to establish
10
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
cooperation between NATO and CSTO. However, the main objective is to strengthen the
status of CSTO and segregate the responsibility zones of the CSTO and NATO by limiting
NATO involvement possibilities in the post Soviet space.
GLOBAL SECURITY. CRISIS REGIONS
In some regions that are geographically distant from the Republic of Lithuania
there are conditions which inflame tension and instability, as a result, ethnic, religious or
interstate conflicts tend to occur. Being a member of international community, NATO and
the EU, Lithuania contributes to international efforts to settle these conflicts. Considering
this, the processes and events in unstable regions become important factors for Lithuanian
national security.
Afghanistan
The year 2012 in Afghanistan was distinguished by unstable security situation,
economic stagnation and tension in the state domestic policy. The armed opposition’s – the
Taliban’s – combat activity remained a major factor making a negative impact on security.
Incompetence of central authority institutions, widely spread corruption and nepotism
negatively affected the growth of economy and the implementation of measures intended
for its revival. Disagreements between executive and legislative powers, the continuing local
warlords’ influence and some neighbouring states’ interests in Afghanistan were the main
reasons for political tension. The security situation in Afghanistan, especially in the regions
where ISAF transfers responsibility to local security forces, will remain vulnerable in the
short term. Afghanistan National Army (ANA) and Police (ANP) are quite effective while
ensuring security in major towns and surrounding areas, but they are not sufficient in more
remote regions of Afghanistan.
A possibility of security situation improvement in 2013 is low, because the armed
opposition shows no will to start a dialogue with central authority and stop the fighting. The
forthcoming elections in 2014 will become the main reason for conflicts and growing tension
among political parties, warlords and influential persons. The central authority’s plans to
fight against corruption, most likely, will not be implemented in the short term.
Consequently, Afghanistan will remain less attractive to foreign investors. This in turn will
impede the state’s economic growth and social-economic situation improvement. As a
result, Afghanistan will further remain dependent on international community and foreign
donors’ support. Stable, yet delicate security situation will also pose various threats to
security of Afghanistan-based Lithuanian troops and civilian personnel amid the period of
forces’ withdrawal.
11
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
Horn of Africa and Sahel
Horn of Africa and Sahel
After Lithuania’s decision to dispatch an autonomous vessel protection group to
the EU naval force counter-piracy operation and take part in the EU-led training mission of
troops in Mali, AOTD observes the ongoing regional processes in the Horn of Africa and
assesses risk factors for the security of Lithuanian troops.
Piracy-related incidents which pose a threat to international shipping security off
the coasts of Somalia in 2012 significantly decreased in number and the tendency will likely
remain similar throughout 2013. This tendency was partially conditioned by the joined
efforts of the international community: patrolling of EU and NATO military ships, preventive
measures reinforced on the ships, particularly, deployment of armed protection groups, and
compliance of security guidelines of the International Maritime Organization.
Somali central government still remains dependent on support provided by the
international community in all spheres. The security situation in the country remains
unstable. In 2012, the military campaign by the forces of the African Union against a radical
Islamist militant group “Al Shabaab” enabled the government to regain control of most of
the main towns in the central and south Somalia, including the strategically important ports.
However, the current Somali army is not yet disciplined and capable to ensure security in the
controlled territories independently. The EU continues the training mission of Somali
soldiers that started in 2010.
Political and security crisis has arisen in Mali after the military coup in March 2012.
After the armed Islamist and terrorist groups established themselves in the north of Mali, in
the middle of 2012, a threat of terrorism has significantly increased to the neighbouring
countries and the Westerners in the Sahel region. Responding to Mali’s government request
for help, France started a combat operation in 2013 and forced the armed groups to
abandon the main towns of northern Mali. The EU started a military training mission seeking
to instruct and train Mali army which later could be capable of taking over the responsibility
for security.
12
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
A threat of asymmetric attacks, kidnapping of foreigners and terrorist attacks posed
by radical Islamist militant groups in the Sahel region will remain, since military measures
alone are not sufficient to address the causes of extremism and radicalization. A possibility
that militancy will spill to neighbouring countries or humanitarian situation will worsen and
instability will spread over the region still remains. Attacks against foreign forces in Mali and
participating countries are also likely. A threat of terrorism acts in France and European
countries is likely to increase also.
Middle East and North Africa
Middle East and North Africa
With a wave of massive demonstrations and protests in the Middle East and North
Africa at the threshold of 2011, popularly called the Arab Spring, the political and security
situation in the region remains unstable. Fragile transitional governments and weakened
autocratic regimes, hard-to-resolve socio-economic problems give background for ethnoconfessional tensions to resume and change the balance of power. General tendency in the
Middle East and North Africa in 2012 is the strengthening of the Islamist movement with a
help of society’s support and mechanisms of institutional democracy. The destabilization of
security situation in the Middle East and North Africa mainly depends on the following two
factors:
Growing ethno-confessional tension in the conflict regions. The civil war in Syria
has escalated inter-confessional divisions inside the country and in the
neighbouring countries (Iraq, Lebanon). The uprising of the Bahraini Shiites
against the Sunni regime ignited unrest of Saudi Arabian Shiite minority in the
eastern province of the country. Tension has increased between the central
13
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
government and the Kurdish autonomous region in Iraq, and between Muslims
and the Copts in Egypt.
Terrorist groups that support “Al Qaeda” ideology are exploiting the situation
and take part in the conflicts on the Sunni side, thus contributing to the
confessional strife or take advantage of the power vacuum after regimes had
weakened/collapsed. The socio-economic problems that induced a massive
unrest are not solved easily and promptly; therefore, the Arab societies, who
had changed regimes in their countries, are likely to feel discontent due to
absence of positive outcome. As a result, extremist groups are seeking to take
advantage of the situation by spreading propaganda and radicalisation efforts.
Therefore, a threat of terrorism is increasing.
Syria
The ongoing conflict in Syria is the major destabilizing factor in the Middle East. A
growing activity of terrorist groups and their capabilities to take over the reserve of weapons
of mass destruction in Syria increases the threat to the region. The ethno-confessional strife
in Syria has a spillover effect in Lebanon, Iraq, Jordan, and risks sparking off a serious
humanitarian crisis in the region. It is most likely that the violence in Syria will persist,
sectarian conflict will deepen and the activity of terrorist groups will continue to grow.
Therefore, the security situation in Syria and the whole region will remain unstable.
Terrorism
Activity of al Qaeda inspired or influenced terrorist groups in politically,
economically and socially unstable Muslim countries in the Middle East ( Iraq, Yemen), Africa
(Algeria, Somalia, Nigeria, the Sahel region) and Asia (Afghanistan, Pakistan) poses a threat
of global terrorism to the international community, despite the fact that the al Qaeda
spiritual leader Osama bin Laden was killed in 2011.
Unrests that emerged at the threshold of 2011 in the Middle East and North
Africa made geographically favourable conditions for the development of radical Islamist
ideology. New political systems in the overthrown regime countries (Tunisia, Libya, Egypt)
are not capable of finding prompt and effective solutions for economic and social problems.
As a result, extremist groups have a good opportunity to strive and increase their influence
in these countries and engage in radicalization efforts.
The citizens of the EU states who return from terrorist training camps in Muslim countries
are free to travel throughout the Schengen Area and can promulgate in propagating radical
extremist ideas. Persons living in Lithuania may also be involved in dissemination process of
radical extremist ideas.
14
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
There have been no direct threats by terrorist groups to Lithuania observed; however, a
possibility of such threats or attacks still persists.
THREATS IN CYBERSPACE
Rapid development of information technologies and communications (IT&C) creates
not only new possibilities but also increases vulnerability of information systems, electronic
services and processing of data. The following factors increase a threat of cyber intrusion:
absence of security control requirements or its inadequate application; insufficient
monitoring of already implemented security measures; insufficient investment in IT security;
negligent attitude of IT users to security requirements and procedures; lack of competence;
etc. AOTD has recently observed an increasing number of incidents in cyberspace:
interference to information systems and computer networks functioning, efforts to gain
unauthorized control, creation of the so-called “BotNet3” networks, and illegal information
collection. Consequently, the institutional damage is rapidly growing due to cyber incidents.
Such tendency emerges from the growing dependence on IT: data application in electronic
space, popularity of electronic services and widely observed business practices using
information systems and computer networks.
The actors challenging and threatening the cyberspace can be grouped according to
their endeavours, genuine interests and the damage caused: state or states sponsored cyber
aggressors and the cyber aggressors without any state affiliation. The major cyber threat to
national defence and security of the Republic of Lithuania is posed by particular state or
state sponsored cyber aggressors.
Cyber attacks
The objective of direct and targeted cyber attacks is to infect or disturb a computer
and or a computer network (state institution, business company, non-governmental
organization or private person) or install a malicious code on a particular computer system’s
node (e.g., server). Even though the cyber attacks have been mostly directed against
information related to financial and particularly banking sector, recently cyber aggressors
have expanded their attacks by targeting business companies or state institutions possessing
potentially valuable information.
Cyber aggressors are interested in technical
documentation, information that comprises commercial secrets or other information used
for internal use of particular entity.
The spread of DDoS attack and “BotNet” networks
3
“BotNet” is a robot-program (stems from the two words robot and network) conducting remote
commands. A collection of internet connected programs communicating with other similar malicious
programs in order to perform tasks, usually to participate in DDoS attacks.
15
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
In 2012, the world observed the spread of “BotNet” networks in mobile
technologies. These networks had many common features and functional advantages with
traditional “BotNet” networks due to which the users could experience new type of DDos
attacks (malicious codes are acting in both, mobile devices or smart phones and on personal
computers at the same time). For example, an infected mobile phone and personal
computer have a remote access through the same C&C server; a mobile phone and personal
computer will be attacked at the same time or will be involved in a performed command.
It is assessed that in 2013 one quarter of all DDos attacks will be aimed at
application-based programs. The application-based DDoS attacks will be different for the fact
that the cyber aggressors will be sending commands, which will be overloading the
processor capacity and memory, and eventually the computer software will become
inefficient. DDoS attacks also pose threat to security since they will be used for diverting
attention. The cyber aggressors, by having temporarily blocked access to a service, will have
a possibility to extract sensitive or other type of information. Moreover, they could execute
other unauthorized activities by using stolen data, which was received while a service
provider and (or) receiver was trying to resume the services.
Threats to users of mobile phones and “the cloud” computing technology
Extremely fast developing new technologies impel on paying special attention
to threats posed to mobile and the so-called “cloud4” technology users. It is possible to
break into “the cloud” and transfer viruses or cyber spyware. This allows viruses to break
into the banking systems or other data files that store sensitive information such as
passwords. The methods accessing “the cloud” may also create an opportunity to illegally
acquire other types of sensitive user information.
In 2013, malicious codes will be further improved in order to send expensive
SMS messages from the users’ mobile (especially smart phones) devices without any
notification. Therefore, by using a malicious code it will be possible to acquire the contacts
from address books and transmit them by sending SMS messages to other addressees.
Malicious codes will be improved and actively spread by malware5. A malicious
code that will gain access to a mobile phone will enable cyber aggressors to have a remote
access to a device, activate separate functions and track the mobile phone user’s
4
Cloud computing technology – information network based services, which resources are used by a
subject. The subject’s IT infrastructure is established not at its presence place, or room or territory that
belongs to the subject; its technical support, IT infrastructure is carried out by a third party.
5
This software is used for advertisements in mobile phones: using this software, an Internet advertising
contractor will have a possibility to trace a user at any moment and by knowing his/her precise place,
browsing habits, etc., to send advertisement message (e.g., if a user is near a shopping center, he/she
would get an advertisement message related to this shopping center).
16
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
movements. Therefore, this software may be used for various purposes, including illegal
surveillance of a person.
Threats in social networks
The majority of Internet users are actively using social networks (e.g.,
Facebook, Twitter, etc.), enter personal information, purchase virtual monetary units or
presents, etc. It is assessed that the number of attacks intended to illegally acquire payment
data, personal information or identities will increase. The main method of fraudulent activity
will be related with the use of fake social network identities. The social networks will further
remain an effective mean for cyber aggressors to collect information on persons or
companies without any restrictions.
By assessing the cyber security of Lithuanian State institutions, it could be stated
that there is a need for a unified and comprehensive guide of cyber security standards,
which would encompass technical security measures and procedures, the use of external
storage devices. Such a guide of security standards should be applied to the IT
infrastructure in all state institutions, strategically important state infrastructure and
companies, and in some circumstances incorporating public and private sectors.
COUNTERINTELLIGENCE ACTIVITY
In 2012, the main attempts of hostile foreign intelligence and security services were
directed at information collection on Lithuanian defence capabilities, NATO infrastructure,
state economy and energy projects. Information was collected by using traditional collection
methods – HUMINT, OSINT and SIGINT (e.g., intelligence collection flights and intelligence
ship raids along the state border of Lithuania). Besides traditional methods, foreign
intelligence services tend to take advantage of collection opportunities in cyberspace more
often.
Cyber spyware
Through employing active counterintelligence measures a foreign developed
cyber spyware, operating and spreading in Lithuanian computers was detected. After a
thorough investigation it was identified that computers of state institutions, private
companies and persons were infected.
The spyware detected on computers in Lithuania was intended for data
collection, their remote control, network monitoring, identification of accounts and
passwords. It can switch on a video camera or a microphone and conduct a real time
eavesdropping. The spyware is usually spread through USB flash memory devices, optical
disks (CD and DVD), HDD and e-mails.
17
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
Another identified function of
spyware detected in Lithuania
is a “BotNet” network
creation. Malicious software
enables a computer for
remote control; therefore,
every computer infected by
this software becomes a part
of “BotNet” network. Usually,
the main purpose of such
network is to facilitate cyber
attacks.
spyware
spyware
Process of infecting computers with spyware
Information of an
infected Internet-connected computer is collected through the Internet and transferred to
spyware’s administrator. If a computer is not connected to the Internet, the data is collected
and stored on every connected external storage device, thus, consequently these devices
also become infected with malicious software. When such devices are connected to an
Internet-connected computer, the computer becomes infected and again, information
initially collected by spyware and stored on those devices is transmitted to spyware
administrator. Likewise, spyware receives instructions for further information collection in a
specific computer. This method of distributing malware enables private computers or
computer networks without Internet access to be infected with spyware.
Software intended for spying is regularly modified and updated with new functions.
Some versions of the software have a function of self-destruction of malware after collected
information is transmitted. None off-the-shelf anti-virus software is capable of detecting
this spyware, therefore, malicious software can only be identified by observing some
specific operating features of a computer (main indications of spyware are listed in Annex
1). One of the most effective methods to destroy malicious software is to re-install a
computer; however, if the user’s safety skills in working with IT are not well developed, the
technical solutions (re-install of a computer, etc.) can not be efficient enough.
INFORMATIONAL THREATS
During recent years, Lithuania has constantly encountered intensive, systematic and
long term perspective oriented informational attacks from external actors. The scale of
attacks particularly intensifies when Lithuania undertakes active actions in implementing its
foreign and defence policy priorities and energy projects. The content of informational
attacks at a specific moment is often determined by the most current actual events. On the
18
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
other hand, the targets of informational attacks are usually of the same concern: first and
foremost, foreign policy, national defence and energy policy.
The major goals of informational attacks are to retain Lithuanian society in the
foreign information space, increase the vulnerability of the state and society, and affect
mentality and emotional attitude of the society, its individual groups or individuals. The main
aim in reaching these goals is to retain Lithuania in a “zone of privileged interests” with a
help of information means.
Alongside economic and social issues, the historical topic is also intensively used by
accusing Lithuania of
“rewriting history”, “rehabilitation of Nazism” and “disregard of
common human, European values”. The attention directed to the status of ethnic minorities
and their educational situation in Lithuania is growing. In 2012, special attention was paid to
“irrational”, “inconsistent” and “illegal” activities made by the Republic of Lithuania in the
energy sector. In addition, there are attempts to shape a positive image of the Russia-led
integration projects (the Customs Union, the Eurasian Economic Union).
In respect to foreign policy pursued by the Republic of Lithuania it is often
attempted to devalue all efforts made by the country to foster democratization processes in
Eastern Europe. Moreover, the competence of the Republic of Lithuania to be constructively
involved in the activity of international organizations (NATO, EU) is openly questioned.
Above all, more and more often the issues that raise tension in relations with the
neighbouring countries are highlighted and widely escalated.
In respect to national defence sector doubts are raised in regional and national level
over national defence potential of the Republic of Lithuania, the capability to act as an equal
partner with other NATO and the EU member states, and social attitudes concerning
involvement in international missions. Additionally, the uncertainty within the society is
instigated over NATO’s determination to ensure security for the Republic of Lithuania.
Different methods are employed to form a critical public opinion in respect to
national security interests. Some messages are often presented avoiding aggressiveness, but
gradually introducing them on television, in the press, Internet sites, social networks, during
conferences, through different funds, non-governmental organizations, international
meetings, official statements, protest demonstrations, etc. Clearly, not only the whole
society’s, but also separate groups’ or individuals’ opinion on one or another relevant issue
becomes a target for informational attacks.
At least in a short term, the intensity of informational attacks against the Republic
of Lithuania will not decrease and informational provocations will continue to occur
periodically.
19
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
FINAL COMMENTS
The indirect damage to national security interests of Lithuania is caused or might be
caused by other global, regional or transnational developments, events and tendencies not
discussed or assessed in this review. It is likely that some of them in the future may become
the risk factors or even threats to national security of Lithuania. Thus, the institutions
ensuring national security of Lithuania will have to monitor and assess the following
developments, events and tendencies that cause or may cause indirect damage to national
security:
Disagreements between international community members over wasting global
energy resources and strategically important transportation routes/ measures
(e.g, Arctic region and exploitation of its natural resources);
Uneven economic development and unbalanced increase of global population,
migration, climate change, and food security indirectly instigate social unrests
leading to crisis situations (especially Africa);
Development of weapons of mass destruction (WMD) in certain countries and
its proliferation, particularly paying attention to limited efficiency of
international non-proliferation regulations and control.
20
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
ANNEX 1
Spyware files detected in Windows XP operating system:
C:\Documents and Settings\All Users\Application Data\Help\System32
C:\Documents and Settings\any user\Application Data\Help\System32
C:\Windows\System32
Spyware files detected in Windows 7 32 and 64 bit operational systems:
C:\Users\any user\AppData\Roaming\Help\system32\
C:\Programs\system32
C:\Programs\spuninst
Files that belong to spyware:
21
ASSESSMENT OF THREATS TO NATIONAL SECURITY/AOTD UNDER MOD 2012
Attention should be drawn to the fact that the dates of creation and modification of files are not
authentic, but they are indicated according to the needs of spyware creator.
Spyware files responsible for transmitting information msidfn32.dll, commodule.dll are found
in C:\Windows\System32 catalogue.
Information collected by spyware is encoded by XOR with a key:
1dM3uu4j7Fw4sjnbcwlDqet4F7JyuUi4m5Imnxl1pzxI6as80cbLnmz54cs5Ldn4ri3do5L6gs923
HL34x2f5cvd0fk6c1a0s
Some of the executable spyware files are packed with AsPack.
Spyware detects and copies to USB flash memory stick the following files : autorun.inf,
thumb.dd, thumb.db.
Spyware also creates files that are saved in temporary Windows catalogues:
4D666334326C30302E706462FF.tmp,
6D73696E65743332782E6F6378FF.tmp,
6D73776D706461742E746C62FA.tmp,
6D737379736D67722E6F6378FF.tmp,
6D73646174736E642E6F6378FF.tmp,
776D63616368652E6E6C64FF.tmp,
4953556E696E73742E62696EFF.tmp.
Subject to the exact modification of spyware, indications of spyware may be of
different type and be hidden in other storage places. The above example presents the
most typical and common fragments of spyware.
22