Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

Ukraine’s president has signed off on orders for limited martial law amid a showdown with Moscow over the seizure of Ukrainian naval vessels and crew, but the next moves by Kiev appeared caught up in internal political wrangling. 

The crisis, triggered Sunday by the maritime clash in the Black Sea, has brought widespread denunciations of Russia and calls by some leaders in Europe for deeper sanctions on Moscow.

But the political fortunes of Ukrainian President Petro Poroshenko have become part of the tensions. The deeply unpopular Poroshenko faces an election next year, and some critics, especially Russian President Vladi¬mir Putin, question whether he is trying use the standoff as a way boost his standing.

The martial-law process suggests how political concerns have spilled over into Ukraine’s response to Russia.

Lawmakers and government leaders haggled over the length of the martial law, cutting down Poroshenko’s original 60-day proposal to 30 days to prevent possible interference in elections March 31. 

The conflict in Ukraine’s eastern provinces has now gone on for more than two years.

Since mounting a massive cyber-attack against Estonia in 2007, Russia has invaded Georgia; violated Ukraine’s territorial integrity in air, sea, land and cyberspace; downed a civilian airliner; became a co-conspirator in Syria’s and Iran’s attacks on civilians in Syria; poisoned former Russian military intelligence officer Sergei Skripal and his daughter with a nerve agent; and interfered in elections in the United States and Europe.

Cyber

Unless it decides to expand its incursion into Ukraine, Russia’s ability to hurt the Ukrainian government depends on its willingness to leverage airpower, economic power and cyber-power. 

Of the first of these, Russia has been reticent to carry out direct attacks against Ukraine with either aircraft or ballistic missiles. Given the weakness of the Russian economy, Moscow can offer less and less in terms of coercive economic statecraft. But in the cyber-arena, Russia remains dangerous. 

As Thomas Rid and others have argued, the prospects for “cyber-war” are a combination of murky and over-hyped. Nevertheless, Russia has established that it has the capacity to engage in annoying, often disruptive attacks against unfriendly cyber-networks. 

These attacks cannot destroy the social fabric on their own, but they can certainly prove costly to the targets . Moreover, cyber-attacks continue to carry a degree of deniability that saves Russia from paying the diplomatic costs of aggression. 

Air Defense 

In the early days of the Ukrainian Civil War, Kiev tried to leverage its airpower advantage over the rebels by conducting airstrikes and other missions over the disputed eastern provinces. Central governments traditionally have airpower advantages over rebel groups, as the former remain in control of air assets and of the logistical framework necessary to keeping planes in the air. 

All of this made Russia’s contribution of surface-to-air missile systems extremely important to maintaining rebel control over the provinces in eastern Ukraine. Russia has reportedly contributed a variety of systems which, in total, have shot down almost twenty Ukrainian aircraft and helicopters. 

One of these systems also shot down a Malaysian jetliner in the most notable incident of the war . As long as Russia maintains what amounts to an air defense network over the wayward Ukrainian provinces (whether from Russia or from Ukraine itself), Kiev will struggle to defeat the rebels. 

Little Green Men 

When Russia seized Crimea , special operators paved the way. Soldiers in unmarked green uniforms formed the spearhead of the invasion force, quickly seizing key installations and cutting the peninsula off from the rest of Ukraine. These highly trained special forces have become one of Russia’s most effective weapons for keeping its near abroad in line. 

Russia has developed its special forces with great care, using them in Chechnya, Ukraine, Georgia, Syria, and elsewhere to create “facts on the ground,” military realities that become difficult for political and diplomatic forces to dislodge. 

In Crimea, Russian special operators managed to seize the peninsula before confused and distracted Ukrainian forces could react. In the eastern provinces, special operators have helped support and train rebel forces. Defusing and defeating these operators remains an exceedingly difficult task for Kiev. 

Artillery 

Over the past few decades the United States has de-emphasised the role of artillery in land combat, instead concentrating on mobile, precision-fires acting in support of mobile forces. Some believe that heavy artillery has become a relic of another age, while others worry that insufficient emphasis on what was once the “god of war” will leave the US vulnerable to conventional foes. 

Russia, on the other hand, has continued to put a strong emphasis on the role of artillery fires. The effectiveness of Russian artillery can perhaps be overstated but in Ukraine long-range artillery has played a critical role in allowing Russia to hit Ukrainian forces from the safety of its own borders. Without effective counter-fire options, Ukrainian troops are at the mercy of artillery that they cannot hit back against. 

Drones

Russia was slower than the United States to make drone technology a central focus of warfighting, although it has taken aggressive steps to catch up. In Ukraine, unmanned aerial vehicles have become the most important means through which Russia keeps track of developments on the battlefield. 

Russian drones rarely, if ever, conduct the kind of targeted strike that has become common from their US counterparts. They also normally do not partake in the prolonged surveillance missions that the United States has invested so much attention in. 

Rather, Russia uses its drones in close collaboration with fielded forces, to identify and target critical enemy assets, including command centers, logistical centers and concentrations of troops and vehicles. With the information supplied by drones, Russian artillery becomes ever more lethal, especially to thinly protected troops and vehicles. 

Final Shots 

Because of Western reticence about transferring lethal arms to Kiev, as well as Ukraine’s dire economic situation, there is no obvious path to overcoming Russia’s military advantages along the border. 

As long as Russia persists in committing men and weapons to Donetsk and Luhansk, Kiev will struggle to restore order, and recapture its territory. 

Over time, the once-robust Ukrainian defense industry may restore some of the Ukrainian military’s key capabilities. For now, Moscow continues to hold the most important cards.

The Washington Post:    The Hill:    The National interest:

You Might Also Read:

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

« What Makes Blockchain A New Security Standard?
Amazon Gets Into Blockchain »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.