Cyberwar: Lessons From Ukraine

Wars are conflicts where the use of particular weapons, strategy and tactics are laboratories which are capable of providing lessons that shape future conflicts. In particular, Artificial Intelligence (AI) is assuming critical war-fighting capabilities on the modern battlefield. The Internet of Things, Open Source Intelligence and Social Media are also taking an increasingly  significant part.

Before Russia’s invasion, European states, such as France and Germany, had failed to adapt to new geopolitical realities in the region and Russia’s actions would lead to a dramatic reappraisal of European security posture.

Another obvious type of inflection point in the story of war is when a new weapon is introduced that fundamentally changes or even ends the fighting, such as the atomic bomb’s debut in World War II. 

Artificial Intelligence

The conflict in Ukraine has seen various forms of AI deployed in a growing variety of ways, from using face recognition software to identify enemy soldiers and to deploying machine learning to make military and supply chains more effective.

AI has been harnessed to advance propaganda and information warfare: Russia’s invasion in Ukraine is the first war to see the use of deepfake videos, which blur the line between the real and machine generated. The use of machine intelligence in all its forms in war will grow as AI both advances in its own capability and takes on more roles and importance in our world beyond the realm of war.

Internet of Things

Even before the start of the conflict, Russian hackers attempted to degrade a variety of strategic  Ukrainian-networked systems from power grids to space communications. Using digital means to inflict a physical effect on a distant enemy is the future of warfare. The world is becoming more reliant upon the Internet-linked devices that now run the operations of every area of critical infrastructure and even operate within your home. 

Unfortunately, in the Internet of Things (IoT) there is a risk of recreating many of the same original problems that surrounded cyber security from the origin of the Internet - the attack surface is growing exponentially, adding more and more targets for hackers to attack. 

Yet security too often remains a secondary concern in IoT design and operations, due to unclear accountability and a general lack of requirements and regulation. The outcome is that too many vulnerabilities are just baked into the IoT systems that we increasingly rely on. This means digital attacks will increasingly have physical effects and this will especially be the case in wartime, where the normal limits of cyber deterrence fall by the wayside, and the incentives for causing harm are far different for militaries than cyber criminals’ incentives for profit.

OSINT

One major effect came from the sheer scale and importance of Open-Source Intelligence (OSINT). Ukrainians have turned their cell phones and social media accounts into a new kind of spy sensor and simultaneous broadcast network, collecting useful bits of information and distributing them widely for critical examination.

OSINT can, for example, be of critical value in challenging President Putin's claims that Russia was merely reacting to an emergency and not planning an invasion. In turn, Ukraine has used OSINT from literally millions of local civilians and hapless Russian soldiers’ posts, to track and target Russian military moves.

Indeed, the information has been so extensive and valuable, that the Ukrainian government even created its own special app, Diia, to manage the flow from outside OSINT volunteer spies and analysts. Diia allows Ukrainian citizens to use digital documents in their smartphones instead of physical ones for identification and sharing purposes.

Social Media

Ukraine’s leader has used social media effectively to counter the supposed Russian mastery of information warfare. Before the war, Volodymyr Zelenskyy was little known outside of the region. Inside Ukraine, polls found him and his party with just 23% support. Zelenskyy had little global influence and was the least unpopular of a set of deeply unpopular Ukrainian leaders, amid distrust of the government in general. These very same political dynamics may have tempted Putin to think just a slight push would topple the regime. Zelenskyy has made masterful use of the online space to get out his message while his nation was under attack. 

The use of social media has been a crucial victory for Ukraine is in reaching and influencing a worldwide audience: to gain support. 

The sympathy for Ukraine has reshaped the political context everywhere from the US to as far away as Japan, Australia and Germany. Russia’s invasion has also strengthened NATO’s deterrence posture and increased its forward presence in Eastern Europe.

This is altering both political priorities and what policies leaders thought their populations would ever be willing to support.  

CSIS:     UKRInform:   Raksha-Anirveda:      DefenseOne:      Chatham House Atlantic Council:  

You Might Also Read: 

The Cyber Effect On Modern Warfare:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Keeping Up With The Increase In Phishing Attacks
Two Cities In Californian  Attacked »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Intrepid Solutions & Services

Intrepid Solutions & Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Cyber Intell Solution (CIS)

Cyber Intell Solution (CIS)

Cyber Intell Solution provide expert consulting, specialized products, and tailored operational services to governmental and corporate industry worldwide.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.