Cyberwar: Lessons From Ukraine

Wars are conflicts where the use of particular weapons, strategy and tactics are laboratories which are capable of providing lessons that shape future conflicts. In particular, Artificial Intelligence (AI) is assuming critical war-fighting capabilities on the modern battlefield. The Internet of Things, Open Source Intelligence and Social Media are also taking an increasingly  significant part.

Before Russia’s invasion, European states, such as France and Germany, had failed to adapt to new geopolitical realities in the region and Russia’s actions would lead to a dramatic reappraisal of European security posture.

Another obvious type of inflection point in the story of war is when a new weapon is introduced that fundamentally changes or even ends the fighting, such as the atomic bomb’s debut in World War II. 

Artificial Intelligence

The conflict in Ukraine has seen various forms of AI deployed in a growing variety of ways, from using face recognition software to identify enemy soldiers and to deploying machine learning to make military and supply chains more effective.

AI has been harnessed to advance propaganda and information warfare: Russia’s invasion in Ukraine is the first war to see the use of deepfake videos, which blur the line between the real and machine generated. The use of machine intelligence in all its forms in war will grow as AI both advances in its own capability and takes on more roles and importance in our world beyond the realm of war.

Internet of Things

Even before the start of the conflict, Russian hackers attempted to degrade a variety of strategic  Ukrainian-networked systems from power grids to space communications. Using digital means to inflict a physical effect on a distant enemy is the future of warfare. The world is becoming more reliant upon the Internet-linked devices that now run the operations of every area of critical infrastructure and even operate within your home. 

Unfortunately, in the Internet of Things (IoT) there is a risk of recreating many of the same original problems that surrounded cyber security from the origin of the Internet - the attack surface is growing exponentially, adding more and more targets for hackers to attack. 

Yet security too often remains a secondary concern in IoT design and operations, due to unclear accountability and a general lack of requirements and regulation. The outcome is that too many vulnerabilities are just baked into the IoT systems that we increasingly rely on. This means digital attacks will increasingly have physical effects and this will especially be the case in wartime, where the normal limits of cyber deterrence fall by the wayside, and the incentives for causing harm are far different for militaries than cyber criminals’ incentives for profit.

OSINT

One major effect came from the sheer scale and importance of Open-Source Intelligence (OSINT). Ukrainians have turned their cell phones and social media accounts into a new kind of spy sensor and simultaneous broadcast network, collecting useful bits of information and distributing them widely for critical examination.

OSINT can, for example, be of critical value in challenging President Putin's claims that Russia was merely reacting to an emergency and not planning an invasion. In turn, Ukraine has used OSINT from literally millions of local civilians and hapless Russian soldiers’ posts, to track and target Russian military moves.

Indeed, the information has been so extensive and valuable, that the Ukrainian government even created its own special app, Diia, to manage the flow from outside OSINT volunteer spies and analysts. Diia allows Ukrainian citizens to use digital documents in their smartphones instead of physical ones for identification and sharing purposes.

Social Media

Ukraine’s leader has used social media effectively to counter the supposed Russian mastery of information warfare. Before the war, Volodymyr Zelenskyy was little known outside of the region. Inside Ukraine, polls found him and his party with just 23% support. Zelenskyy had little global influence and was the least unpopular of a set of deeply unpopular Ukrainian leaders, amid distrust of the government in general. These very same political dynamics may have tempted Putin to think just a slight push would topple the regime. Zelenskyy has made masterful use of the online space to get out his message while his nation was under attack. 

The use of social media has been a crucial victory for Ukraine is in reaching and influencing a worldwide audience: to gain support. 

The sympathy for Ukraine has reshaped the political context everywhere from the US to as far away as Japan, Australia and Germany. Russia’s invasion has also strengthened NATO’s deterrence posture and increased its forward presence in Eastern Europe.

This is altering both political priorities and what policies leaders thought their populations would ever be willing to support.  

CSIS:     UKRInform:   Raksha-Anirveda:      DefenseOne:      Chatham House Atlantic Council:  

You Might Also Read: 

The Cyber Effect On Modern Warfare:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Keeping Up With The Increase In Phishing Attacks
Two Cities In Californian  Attacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

Cyber Wales

Cyber Wales

Cyber Wales provides a focus and forum for everyone in the industry, helping businesses come together and collaborate both within Wales and internationally.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.