Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

Ukraine’s president has signed off on orders for limited martial law amid a showdown with Moscow over the seizure of Ukrainian naval vessels and crew, but the next moves by Kiev appeared caught up in internal political wrangling. 

The crisis, triggered Sunday by the maritime clash in the Black Sea, has brought widespread denunciations of Russia and calls by some leaders in Europe for deeper sanctions on Moscow.

But the political fortunes of Ukrainian President Petro Poroshenko have become part of the tensions. The deeply unpopular Poroshenko faces an election next year, and some critics, especially Russian President Vladi¬mir Putin, question whether he is trying use the standoff as a way boost his standing.

The martial-law process suggests how political concerns have spilled over into Ukraine’s response to Russia.

Lawmakers and government leaders haggled over the length of the martial law, cutting down Poroshenko’s original 60-day proposal to 30 days to prevent possible interference in elections March 31. 

The conflict in Ukraine’s eastern provinces has now gone on for more than two years.

Since mounting a massive cyber-attack against Estonia in 2007, Russia has invaded Georgia; violated Ukraine’s territorial integrity in air, sea, land and cyberspace; downed a civilian airliner; became a co-conspirator in Syria’s and Iran’s attacks on civilians in Syria; poisoned former Russian military intelligence officer Sergei Skripal and his daughter with a nerve agent; and interfered in elections in the United States and Europe.

Cyber

Unless it decides to expand its incursion into Ukraine, Russia’s ability to hurt the Ukrainian government depends on its willingness to leverage airpower, economic power and cyber-power. 

Of the first of these, Russia has been reticent to carry out direct attacks against Ukraine with either aircraft or ballistic missiles. Given the weakness of the Russian economy, Moscow can offer less and less in terms of coercive economic statecraft. But in the cyber-arena, Russia remains dangerous. 

As Thomas Rid and others have argued, the prospects for “cyber-war” are a combination of murky and over-hyped. Nevertheless, Russia has established that it has the capacity to engage in annoying, often disruptive attacks against unfriendly cyber-networks. 

These attacks cannot destroy the social fabric on their own, but they can certainly prove costly to the targets . Moreover, cyber-attacks continue to carry a degree of deniability that saves Russia from paying the diplomatic costs of aggression. 

Air Defense 

In the early days of the Ukrainian Civil War, Kiev tried to leverage its airpower advantage over the rebels by conducting airstrikes and other missions over the disputed eastern provinces. Central governments traditionally have airpower advantages over rebel groups, as the former remain in control of air assets and of the logistical framework necessary to keeping planes in the air. 

All of this made Russia’s contribution of surface-to-air missile systems extremely important to maintaining rebel control over the provinces in eastern Ukraine. Russia has reportedly contributed a variety of systems which, in total, have shot down almost twenty Ukrainian aircraft and helicopters. 

One of these systems also shot down a Malaysian jetliner in the most notable incident of the war . As long as Russia maintains what amounts to an air defense network over the wayward Ukrainian provinces (whether from Russia or from Ukraine itself), Kiev will struggle to defeat the rebels. 

Little Green Men 

When Russia seized Crimea , special operators paved the way. Soldiers in unmarked green uniforms formed the spearhead of the invasion force, quickly seizing key installations and cutting the peninsula off from the rest of Ukraine. These highly trained special forces have become one of Russia’s most effective weapons for keeping its near abroad in line. 

Russia has developed its special forces with great care, using them in Chechnya, Ukraine, Georgia, Syria, and elsewhere to create “facts on the ground,” military realities that become difficult for political and diplomatic forces to dislodge. 

In Crimea, Russian special operators managed to seize the peninsula before confused and distracted Ukrainian forces could react. In the eastern provinces, special operators have helped support and train rebel forces. Defusing and defeating these operators remains an exceedingly difficult task for Kiev. 

Artillery 

Over the past few decades the United States has de-emphasised the role of artillery in land combat, instead concentrating on mobile, precision-fires acting in support of mobile forces. Some believe that heavy artillery has become a relic of another age, while others worry that insufficient emphasis on what was once the “god of war” will leave the US vulnerable to conventional foes. 

Russia, on the other hand, has continued to put a strong emphasis on the role of artillery fires. The effectiveness of Russian artillery can perhaps be overstated but in Ukraine long-range artillery has played a critical role in allowing Russia to hit Ukrainian forces from the safety of its own borders. Without effective counter-fire options, Ukrainian troops are at the mercy of artillery that they cannot hit back against. 

Drones

Russia was slower than the United States to make drone technology a central focus of warfighting, although it has taken aggressive steps to catch up. In Ukraine, unmanned aerial vehicles have become the most important means through which Russia keeps track of developments on the battlefield. 

Russian drones rarely, if ever, conduct the kind of targeted strike that has become common from their US counterparts. They also normally do not partake in the prolonged surveillance missions that the United States has invested so much attention in. 

Rather, Russia uses its drones in close collaboration with fielded forces, to identify and target critical enemy assets, including command centers, logistical centers and concentrations of troops and vehicles. With the information supplied by drones, Russian artillery becomes ever more lethal, especially to thinly protected troops and vehicles. 

Final Shots 

Because of Western reticence about transferring lethal arms to Kiev, as well as Ukraine’s dire economic situation, there is no obvious path to overcoming Russia’s military advantages along the border. 

As long as Russia persists in committing men and weapons to Donetsk and Luhansk, Kiev will struggle to restore order, and recapture its territory. 

Over time, the once-robust Ukrainian defense industry may restore some of the Ukrainian military’s key capabilities. For now, Moscow continues to hold the most important cards.

The Washington Post:    The Hill:    The National interest:

You Might Also Read:

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

« What Makes Blockchain A New Security Standard?
Amazon Gets Into Blockchain »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Social-Engineer

Social-Engineer

Social-Engineer is a team of outside–the–box thinkers that share a common focus on human-to-human social engineering.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

AML Global Solutions (AMLGS)

AML Global Solutions (AMLGS)

AMLGS delivers Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corruption and Fraud.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. 

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.