Cyberwar: Lessons From Ukraine

Wars are conflicts where the use of particular weapons, strategy and tactics are laboratories which are capable of providing lessons that shape future conflicts. In particular, Artificial Intelligence (AI) is assuming critical war-fighting capabilities on the modern battlefield. The Internet of Things, Open Source Intelligence and Social Media are also taking an increasingly  significant part.

Before Russia’s invasion, European states, such as France and Germany, had failed to adapt to new geopolitical realities in the region and Russia’s actions would lead to a dramatic reappraisal of European security posture.

Another obvious type of inflection point in the story of war is when a new weapon is introduced that fundamentally changes or even ends the fighting, such as the atomic bomb’s debut in World War II. 

Artificial Intelligence

The conflict in Ukraine has seen various forms of AI deployed in a growing variety of ways, from using face recognition software to identify enemy soldiers and to deploying machine learning to make military and supply chains more effective.

AI has been harnessed to advance propaganda and information warfare: Russia’s invasion in Ukraine is the first war to see the use of deepfake videos, which blur the line between the real and machine generated. The use of machine intelligence in all its forms in war will grow as AI both advances in its own capability and takes on more roles and importance in our world beyond the realm of war.

Internet of Things

Even before the start of the conflict, Russian hackers attempted to degrade a variety of strategic  Ukrainian-networked systems from power grids to space communications. Using digital means to inflict a physical effect on a distant enemy is the future of warfare. The world is becoming more reliant upon the Internet-linked devices that now run the operations of every area of critical infrastructure and even operate within your home. 

Unfortunately, in the Internet of Things (IoT) there is a risk of recreating many of the same original problems that surrounded cyber security from the origin of the Internet - the attack surface is growing exponentially, adding more and more targets for hackers to attack. 

Yet security too often remains a secondary concern in IoT design and operations, due to unclear accountability and a general lack of requirements and regulation. The outcome is that too many vulnerabilities are just baked into the IoT systems that we increasingly rely on. This means digital attacks will increasingly have physical effects and this will especially be the case in wartime, where the normal limits of cyber deterrence fall by the wayside, and the incentives for causing harm are far different for militaries than cyber criminals’ incentives for profit.

OSINT

One major effect came from the sheer scale and importance of Open-Source Intelligence (OSINT). Ukrainians have turned their cell phones and social media accounts into a new kind of spy sensor and simultaneous broadcast network, collecting useful bits of information and distributing them widely for critical examination.

OSINT can, for example, be of critical value in challenging President Putin's claims that Russia was merely reacting to an emergency and not planning an invasion. In turn, Ukraine has used OSINT from literally millions of local civilians and hapless Russian soldiers’ posts, to track and target Russian military moves.

Indeed, the information has been so extensive and valuable, that the Ukrainian government even created its own special app, Diia, to manage the flow from outside OSINT volunteer spies and analysts. Diia allows Ukrainian citizens to use digital documents in their smartphones instead of physical ones for identification and sharing purposes.

Social Media

Ukraine’s leader has used social media effectively to counter the supposed Russian mastery of information warfare. Before the war, Volodymyr Zelenskyy was little known outside of the region. Inside Ukraine, polls found him and his party with just 23% support. Zelenskyy had little global influence and was the least unpopular of a set of deeply unpopular Ukrainian leaders, amid distrust of the government in general. These very same political dynamics may have tempted Putin to think just a slight push would topple the regime. Zelenskyy has made masterful use of the online space to get out his message while his nation was under attack. 

The use of social media has been a crucial victory for Ukraine is in reaching and influencing a worldwide audience: to gain support. 

The sympathy for Ukraine has reshaped the political context everywhere from the US to as far away as Japan, Australia and Germany. Russia’s invasion has also strengthened NATO’s deterrence posture and increased its forward presence in Eastern Europe.

This is altering both political priorities and what policies leaders thought their populations would ever be willing to support.  

CSIS:     UKRInform:   Raksha-Anirveda:      DefenseOne:      Chatham House Atlantic Council:  

You Might Also Read: 

The Cyber Effect On Modern Warfare:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Keeping Up With The Increase In Phishing Attacks
Two Cities In Californian  Attacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.