Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

Ukraine’s president has signed off on orders for limited martial law amid a showdown with Moscow over the seizure of Ukrainian naval vessels and crew, but the next moves by Kiev appeared caught up in internal political wrangling. 

The crisis, triggered Sunday by the maritime clash in the Black Sea, has brought widespread denunciations of Russia and calls by some leaders in Europe for deeper sanctions on Moscow.

But the political fortunes of Ukrainian President Petro Poroshenko have become part of the tensions. The deeply unpopular Poroshenko faces an election next year, and some critics, especially Russian President Vladi¬mir Putin, question whether he is trying use the standoff as a way boost his standing.

The martial-law process suggests how political concerns have spilled over into Ukraine’s response to Russia.

Lawmakers and government leaders haggled over the length of the martial law, cutting down Poroshenko’s original 60-day proposal to 30 days to prevent possible interference in elections March 31. 

The conflict in Ukraine’s eastern provinces has now gone on for more than two years.

Since mounting a massive cyber-attack against Estonia in 2007, Russia has invaded Georgia; violated Ukraine’s territorial integrity in air, sea, land and cyberspace; downed a civilian airliner; became a co-conspirator in Syria’s and Iran’s attacks on civilians in Syria; poisoned former Russian military intelligence officer Sergei Skripal and his daughter with a nerve agent; and interfered in elections in the United States and Europe.

Cyber

Unless it decides to expand its incursion into Ukraine, Russia’s ability to hurt the Ukrainian government depends on its willingness to leverage airpower, economic power and cyber-power. 

Of the first of these, Russia has been reticent to carry out direct attacks against Ukraine with either aircraft or ballistic missiles. Given the weakness of the Russian economy, Moscow can offer less and less in terms of coercive economic statecraft. But in the cyber-arena, Russia remains dangerous. 

As Thomas Rid and others have argued, the prospects for “cyber-war” are a combination of murky and over-hyped. Nevertheless, Russia has established that it has the capacity to engage in annoying, often disruptive attacks against unfriendly cyber-networks. 

These attacks cannot destroy the social fabric on their own, but they can certainly prove costly to the targets . Moreover, cyber-attacks continue to carry a degree of deniability that saves Russia from paying the diplomatic costs of aggression. 

Air Defense 

In the early days of the Ukrainian Civil War, Kiev tried to leverage its airpower advantage over the rebels by conducting airstrikes and other missions over the disputed eastern provinces. Central governments traditionally have airpower advantages over rebel groups, as the former remain in control of air assets and of the logistical framework necessary to keeping planes in the air. 

All of this made Russia’s contribution of surface-to-air missile systems extremely important to maintaining rebel control over the provinces in eastern Ukraine. Russia has reportedly contributed a variety of systems which, in total, have shot down almost twenty Ukrainian aircraft and helicopters. 

One of these systems also shot down a Malaysian jetliner in the most notable incident of the war . As long as Russia maintains what amounts to an air defense network over the wayward Ukrainian provinces (whether from Russia or from Ukraine itself), Kiev will struggle to defeat the rebels. 

Little Green Men 

When Russia seized Crimea , special operators paved the way. Soldiers in unmarked green uniforms formed the spearhead of the invasion force, quickly seizing key installations and cutting the peninsula off from the rest of Ukraine. These highly trained special forces have become one of Russia’s most effective weapons for keeping its near abroad in line. 

Russia has developed its special forces with great care, using them in Chechnya, Ukraine, Georgia, Syria, and elsewhere to create “facts on the ground,” military realities that become difficult for political and diplomatic forces to dislodge. 

In Crimea, Russian special operators managed to seize the peninsula before confused and distracted Ukrainian forces could react. In the eastern provinces, special operators have helped support and train rebel forces. Defusing and defeating these operators remains an exceedingly difficult task for Kiev. 

Artillery 

Over the past few decades the United States has de-emphasised the role of artillery in land combat, instead concentrating on mobile, precision-fires acting in support of mobile forces. Some believe that heavy artillery has become a relic of another age, while others worry that insufficient emphasis on what was once the “god of war” will leave the US vulnerable to conventional foes. 

Russia, on the other hand, has continued to put a strong emphasis on the role of artillery fires. The effectiveness of Russian artillery can perhaps be overstated but in Ukraine long-range artillery has played a critical role in allowing Russia to hit Ukrainian forces from the safety of its own borders. Without effective counter-fire options, Ukrainian troops are at the mercy of artillery that they cannot hit back against. 

Drones

Russia was slower than the United States to make drone technology a central focus of warfighting, although it has taken aggressive steps to catch up. In Ukraine, unmanned aerial vehicles have become the most important means through which Russia keeps track of developments on the battlefield. 

Russian drones rarely, if ever, conduct the kind of targeted strike that has become common from their US counterparts. They also normally do not partake in the prolonged surveillance missions that the United States has invested so much attention in. 

Rather, Russia uses its drones in close collaboration with fielded forces, to identify and target critical enemy assets, including command centers, logistical centers and concentrations of troops and vehicles. With the information supplied by drones, Russian artillery becomes ever more lethal, especially to thinly protected troops and vehicles. 

Final Shots 

Because of Western reticence about transferring lethal arms to Kiev, as well as Ukraine’s dire economic situation, there is no obvious path to overcoming Russia’s military advantages along the border. 

As long as Russia persists in committing men and weapons to Donetsk and Luhansk, Kiev will struggle to restore order, and recapture its territory. 

Over time, the once-robust Ukrainian defense industry may restore some of the Ukrainian military’s key capabilities. For now, Moscow continues to hold the most important cards.

The Washington Post:    The Hill:    The National interest:

You Might Also Read:

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

« What Makes Blockchain A New Security Standard?
Amazon Gets Into Blockchain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.