Russia And Ukraine’s Crisis Could Escalate Beyond Cyberwar

Ukraine’s president has signed off on orders for limited martial law amid a showdown with Moscow over the seizure of Ukrainian naval vessels and crew, but the next moves by Kiev appeared caught up in internal political wrangling. 

The crisis, triggered Sunday by the maritime clash in the Black Sea, has brought widespread denunciations of Russia and calls by some leaders in Europe for deeper sanctions on Moscow.

But the political fortunes of Ukrainian President Petro Poroshenko have become part of the tensions. The deeply unpopular Poroshenko faces an election next year, and some critics, especially Russian President Vladi¬mir Putin, question whether he is trying use the standoff as a way boost his standing.

The martial-law process suggests how political concerns have spilled over into Ukraine’s response to Russia.

Lawmakers and government leaders haggled over the length of the martial law, cutting down Poroshenko’s original 60-day proposal to 30 days to prevent possible interference in elections March 31. 

The conflict in Ukraine’s eastern provinces has now gone on for more than two years.

Since mounting a massive cyber-attack against Estonia in 2007, Russia has invaded Georgia; violated Ukraine’s territorial integrity in air, sea, land and cyberspace; downed a civilian airliner; became a co-conspirator in Syria’s and Iran’s attacks on civilians in Syria; poisoned former Russian military intelligence officer Sergei Skripal and his daughter with a nerve agent; and interfered in elections in the United States and Europe.

Cyber

Unless it decides to expand its incursion into Ukraine, Russia’s ability to hurt the Ukrainian government depends on its willingness to leverage airpower, economic power and cyber-power. 

Of the first of these, Russia has been reticent to carry out direct attacks against Ukraine with either aircraft or ballistic missiles. Given the weakness of the Russian economy, Moscow can offer less and less in terms of coercive economic statecraft. But in the cyber-arena, Russia remains dangerous. 

As Thomas Rid and others have argued, the prospects for “cyber-war” are a combination of murky and over-hyped. Nevertheless, Russia has established that it has the capacity to engage in annoying, often disruptive attacks against unfriendly cyber-networks. 

These attacks cannot destroy the social fabric on their own, but they can certainly prove costly to the targets . Moreover, cyber-attacks continue to carry a degree of deniability that saves Russia from paying the diplomatic costs of aggression. 

Air Defense 

In the early days of the Ukrainian Civil War, Kiev tried to leverage its airpower advantage over the rebels by conducting airstrikes and other missions over the disputed eastern provinces. Central governments traditionally have airpower advantages over rebel groups, as the former remain in control of air assets and of the logistical framework necessary to keeping planes in the air. 

All of this made Russia’s contribution of surface-to-air missile systems extremely important to maintaining rebel control over the provinces in eastern Ukraine. Russia has reportedly contributed a variety of systems which, in total, have shot down almost twenty Ukrainian aircraft and helicopters. 

One of these systems also shot down a Malaysian jetliner in the most notable incident of the war . As long as Russia maintains what amounts to an air defense network over the wayward Ukrainian provinces (whether from Russia or from Ukraine itself), Kiev will struggle to defeat the rebels. 

Little Green Men 

When Russia seized Crimea , special operators paved the way. Soldiers in unmarked green uniforms formed the spearhead of the invasion force, quickly seizing key installations and cutting the peninsula off from the rest of Ukraine. These highly trained special forces have become one of Russia’s most effective weapons for keeping its near abroad in line. 

Russia has developed its special forces with great care, using them in Chechnya, Ukraine, Georgia, Syria, and elsewhere to create “facts on the ground,” military realities that become difficult for political and diplomatic forces to dislodge. 

In Crimea, Russian special operators managed to seize the peninsula before confused and distracted Ukrainian forces could react. In the eastern provinces, special operators have helped support and train rebel forces. Defusing and defeating these operators remains an exceedingly difficult task for Kiev. 

Artillery 

Over the past few decades the United States has de-emphasised the role of artillery in land combat, instead concentrating on mobile, precision-fires acting in support of mobile forces. Some believe that heavy artillery has become a relic of another age, while others worry that insufficient emphasis on what was once the “god of war” will leave the US vulnerable to conventional foes. 

Russia, on the other hand, has continued to put a strong emphasis on the role of artillery fires. The effectiveness of Russian artillery can perhaps be overstated but in Ukraine long-range artillery has played a critical role in allowing Russia to hit Ukrainian forces from the safety of its own borders. Without effective counter-fire options, Ukrainian troops are at the mercy of artillery that they cannot hit back against. 

Drones

Russia was slower than the United States to make drone technology a central focus of warfighting, although it has taken aggressive steps to catch up. In Ukraine, unmanned aerial vehicles have become the most important means through which Russia keeps track of developments on the battlefield. 

Russian drones rarely, if ever, conduct the kind of targeted strike that has become common from their US counterparts. They also normally do not partake in the prolonged surveillance missions that the United States has invested so much attention in. 

Rather, Russia uses its drones in close collaboration with fielded forces, to identify and target critical enemy assets, including command centers, logistical centers and concentrations of troops and vehicles. With the information supplied by drones, Russian artillery becomes ever more lethal, especially to thinly protected troops and vehicles. 

Final Shots 

Because of Western reticence about transferring lethal arms to Kiev, as well as Ukraine’s dire economic situation, there is no obvious path to overcoming Russia’s military advantages along the border. 

As long as Russia persists in committing men and weapons to Donetsk and Luhansk, Kiev will struggle to restore order, and recapture its territory. 

Over time, the once-robust Ukrainian defense industry may restore some of the Ukrainian military’s key capabilities. For now, Moscow continues to hold the most important cards.

The Washington Post:    The Hill:    The National interest:

You Might Also Read:

Russia Will Keep Up Cyber Attacks For Geo-Political Influence

« What Makes Blockchain A New Security Standard?
Amazon Gets Into Blockchain »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Arculus Cyber Security

Arculus Cyber Security

Arculus Cyber Security enables customers to securely realise the benefits of digital transformation through pragmatic solutions, guidance and services.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.

WideField Security

WideField Security

WideField Security a venture backed cybersecurity startup helps enterprise protect their identity attack surface.

Shieldworkz

Shieldworkz

Shieldworkz secure Operational Technology environments and protect businesses with best-in-class professional services and cyber security solutions.