Cyberwar: Lessons From Ukraine

Wars are conflicts where the use of particular weapons, strategy and tactics are laboratories which are capable of providing lessons that shape future conflicts. In particular, Artificial Intelligence (AI) is assuming critical war-fighting capabilities on the modern battlefield. The Internet of Things, Open Source Intelligence and Social Media are also taking an increasingly  significant part.

Before Russia’s invasion, European states, such as France and Germany, had failed to adapt to new geopolitical realities in the region and Russia’s actions would lead to a dramatic reappraisal of European security posture.

Another obvious type of inflection point in the story of war is when a new weapon is introduced that fundamentally changes or even ends the fighting, such as the atomic bomb’s debut in World War II. 

Artificial Intelligence

The conflict in Ukraine has seen various forms of AI deployed in a growing variety of ways, from using face recognition software to identify enemy soldiers and to deploying machine learning to make military and supply chains more effective.

AI has been harnessed to advance propaganda and information warfare: Russia’s invasion in Ukraine is the first war to see the use of deepfake videos, which blur the line between the real and machine generated. The use of machine intelligence in all its forms in war will grow as AI both advances in its own capability and takes on more roles and importance in our world beyond the realm of war.

Internet of Things

Even before the start of the conflict, Russian hackers attempted to degrade a variety of strategic  Ukrainian-networked systems from power grids to space communications. Using digital means to inflict a physical effect on a distant enemy is the future of warfare. The world is becoming more reliant upon the Internet-linked devices that now run the operations of every area of critical infrastructure and even operate within your home. 

Unfortunately, in the Internet of Things (IoT) there is a risk of recreating many of the same original problems that surrounded cyber security from the origin of the Internet - the attack surface is growing exponentially, adding more and more targets for hackers to attack. 

Yet security too often remains a secondary concern in IoT design and operations, due to unclear accountability and a general lack of requirements and regulation. The outcome is that too many vulnerabilities are just baked into the IoT systems that we increasingly rely on. This means digital attacks will increasingly have physical effects and this will especially be the case in wartime, where the normal limits of cyber deterrence fall by the wayside, and the incentives for causing harm are far different for militaries than cyber criminals’ incentives for profit.

OSINT

One major effect came from the sheer scale and importance of Open-Source Intelligence (OSINT). Ukrainians have turned their cell phones and social media accounts into a new kind of spy sensor and simultaneous broadcast network, collecting useful bits of information and distributing them widely for critical examination.

OSINT can, for example, be of critical value in challenging President Putin's claims that Russia was merely reacting to an emergency and not planning an invasion. In turn, Ukraine has used OSINT from literally millions of local civilians and hapless Russian soldiers’ posts, to track and target Russian military moves.

Indeed, the information has been so extensive and valuable, that the Ukrainian government even created its own special app, Diia, to manage the flow from outside OSINT volunteer spies and analysts. Diia allows Ukrainian citizens to use digital documents in their smartphones instead of physical ones for identification and sharing purposes.

Social Media

Ukraine’s leader has used social media effectively to counter the supposed Russian mastery of information warfare. Before the war, Volodymyr Zelenskyy was little known outside of the region. Inside Ukraine, polls found him and his party with just 23% support. Zelenskyy had little global influence and was the least unpopular of a set of deeply unpopular Ukrainian leaders, amid distrust of the government in general. These very same political dynamics may have tempted Putin to think just a slight push would topple the regime. Zelenskyy has made masterful use of the online space to get out his message while his nation was under attack. 

The use of social media has been a crucial victory for Ukraine is in reaching and influencing a worldwide audience: to gain support. 

The sympathy for Ukraine has reshaped the political context everywhere from the US to as far away as Japan, Australia and Germany. Russia’s invasion has also strengthened NATO’s deterrence posture and increased its forward presence in Eastern Europe.

This is altering both political priorities and what policies leaders thought their populations would ever be willing to support.  

CSIS:     UKRInform:   Raksha-Anirveda:      DefenseOne:      Chatham House Atlantic Council:  

You Might Also Read: 

The Cyber Effect On Modern Warfare:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Keeping Up With The Increase In Phishing Attacks
Two Cities In Californian  Attacked »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.