Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

Ukraine’s president has signed off on orders for limited martial law amid a showdown with Moscow over the seizure of Ukrainian naval vessels and crew, but the next moves by Kiev appeared caught up in internal political wrangling. 

The crisis, triggered Sunday by the maritime clash in the Black Sea, has brought widespread denunciations of Russia and calls by some leaders in Europe for deeper sanctions on Moscow.

But the political fortunes of Ukrainian President Petro Poroshenko have become part of the tensions. The deeply unpopular Poroshenko faces an election next year, and some critics, especially Russian President Vladi¬mir Putin, question whether he is trying use the standoff as a way boost his standing.

The martial-law process suggests how political concerns have spilled over into Ukraine’s response to Russia.

Lawmakers and government leaders haggled over the length of the martial law, cutting down Poroshenko’s original 60-day proposal to 30 days to prevent possible interference in elections March 31. 

The conflict in Ukraine’s eastern provinces has now gone on for more than two years.

Since mounting a massive cyber-attack against Estonia in 2007, Russia has invaded Georgia; violated Ukraine’s territorial integrity in air, sea, land and cyberspace; downed a civilian airliner; became a co-conspirator in Syria’s and Iran’s attacks on civilians in Syria; poisoned former Russian military intelligence officer Sergei Skripal and his daughter with a nerve agent; and interfered in elections in the United States and Europe.

Cyber

Unless it decides to expand its incursion into Ukraine, Russia’s ability to hurt the Ukrainian government depends on its willingness to leverage airpower, economic power and cyber-power. 

Of the first of these, Russia has been reticent to carry out direct attacks against Ukraine with either aircraft or ballistic missiles. Given the weakness of the Russian economy, Moscow can offer less and less in terms of coercive economic statecraft. But in the cyber-arena, Russia remains dangerous. 

As Thomas Rid and others have argued, the prospects for “cyber-war” are a combination of murky and over-hyped. Nevertheless, Russia has established that it has the capacity to engage in annoying, often disruptive attacks against unfriendly cyber-networks. 

These attacks cannot destroy the social fabric on their own, but they can certainly prove costly to the targets . Moreover, cyber-attacks continue to carry a degree of deniability that saves Russia from paying the diplomatic costs of aggression. 

Air Defense 

In the early days of the Ukrainian Civil War, Kiev tried to leverage its airpower advantage over the rebels by conducting airstrikes and other missions over the disputed eastern provinces. Central governments traditionally have airpower advantages over rebel groups, as the former remain in control of air assets and of the logistical framework necessary to keeping planes in the air. 

All of this made Russia’s contribution of surface-to-air missile systems extremely important to maintaining rebel control over the provinces in eastern Ukraine. Russia has reportedly contributed a variety of systems which, in total, have shot down almost twenty Ukrainian aircraft and helicopters. 

One of these systems also shot down a Malaysian jetliner in the most notable incident of the war . As long as Russia maintains what amounts to an air defense network over the wayward Ukrainian provinces (whether from Russia or from Ukraine itself), Kiev will struggle to defeat the rebels. 

Little Green Men 

When Russia seized Crimea , special operators paved the way. Soldiers in unmarked green uniforms formed the spearhead of the invasion force, quickly seizing key installations and cutting the peninsula off from the rest of Ukraine. These highly trained special forces have become one of Russia’s most effective weapons for keeping its near abroad in line. 

Russia has developed its special forces with great care, using them in Chechnya, Ukraine, Georgia, Syria, and elsewhere to create “facts on the ground,” military realities that become difficult for political and diplomatic forces to dislodge. 

In Crimea, Russian special operators managed to seize the peninsula before confused and distracted Ukrainian forces could react. In the eastern provinces, special operators have helped support and train rebel forces. Defusing and defeating these operators remains an exceedingly difficult task for Kiev. 

Artillery 

Over the past few decades the United States has de-emphasised the role of artillery in land combat, instead concentrating on mobile, precision-fires acting in support of mobile forces. Some believe that heavy artillery has become a relic of another age, while others worry that insufficient emphasis on what was once the “god of war” will leave the US vulnerable to conventional foes. 

Russia, on the other hand, has continued to put a strong emphasis on the role of artillery fires. The effectiveness of Russian artillery can perhaps be overstated but in Ukraine long-range artillery has played a critical role in allowing Russia to hit Ukrainian forces from the safety of its own borders. Without effective counter-fire options, Ukrainian troops are at the mercy of artillery that they cannot hit back against. 

Drones

Russia was slower than the United States to make drone technology a central focus of warfighting, although it has taken aggressive steps to catch up. In Ukraine, unmanned aerial vehicles have become the most important means through which Russia keeps track of developments on the battlefield. 

Russian drones rarely, if ever, conduct the kind of targeted strike that has become common from their US counterparts. They also normally do not partake in the prolonged surveillance missions that the United States has invested so much attention in. 

Rather, Russia uses its drones in close collaboration with fielded forces, to identify and target critical enemy assets, including command centers, logistical centers and concentrations of troops and vehicles. With the information supplied by drones, Russian artillery becomes ever more lethal, especially to thinly protected troops and vehicles. 

Final Shots 

Because of Western reticence about transferring lethal arms to Kiev, as well as Ukraine’s dire economic situation, there is no obvious path to overcoming Russia’s military advantages along the border. 

As long as Russia persists in committing men and weapons to Donetsk and Luhansk, Kiev will struggle to restore order, and recapture its territory. 

Over time, the once-robust Ukrainian defense industry may restore some of the Ukrainian military’s key capabilities. For now, Moscow continues to hold the most important cards.

The Washington Post:    The Hill:    The National interest:

You Might Also Read:

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

« What Makes Blockchain A New Security Standard?
Amazon Gets Into Blockchain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.