{"id":70994,"date":"2022-03-08T06:00:25","date_gmt":"2022-03-07T19:00:25","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=70994"},"modified":"2022-03-09T11:34:03","modified_gmt":"2022-03-09T00:34:03","slug":"cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/","title":{"rendered":"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine"},"content":{"rendered":"
<\/figure>\n

The way cyber actions have played out in the Russian invasion of Ukraine hasn\u2019t followed the anticipated script. The attacks on Ukrainian government agencies and banks in early and mid-February were not unexpected, given Russian rhetoric. But the \u2018cyber Pearl Harbor<\/a>\u2019 that some<\/a> had<\/a> anticipated<\/a> hasn\u2019t occurred.<\/p>\n

Russia may well have drawn different conclusions to others from its experience in Georgia in 2008 and its 2014 invasion of Ukraine. Both were notable for their use of cyber\u2014attacking infrastructure and government agencies, destabilising decision-making and sowing confusion regarding purpose, responsibility and the on-the-ground situation. The integration of cyber, political and psychological activities with conventional operations, progressively escalating effort from influence operations to full kinetic warfare, became known as hybrid warfare or the Gerasimov doctrine, after the Russian chief of the general staff.<\/p>\n

Practice proved less smooth than theory. Russia\u2019s effort in Georgia arguably was more successful than the more ambitious activity in 2014 in the more advanced Ukraine. Georgian government decision-making was disrupted, the Russians confused the issue and effectively defanged an international response, and Ossetian secessionists, with some support, proved good enough against the Georgian military.<\/p>\n

In Ukraine in 2014, Vladimir Putin was progressively forced to show his hand and commit conventional forces as cyber, disinformation and his \u2018little green men\u2019 proved of limited value. Still, Putin succeeded in annexing Crimea and supporting limited secessionist effort in Donbas\u2014enough to encourage his invasion this year.<\/p>\n

Since then, cyber has proved useful to Moscow in other ways. Russia continued to improve its cyber capabilities, extending into active disinformation operations in the West, including the 2016 US<\/a> and 2017 French<\/a> presidential elections (and possibly the 2016 Brexit referendum<\/a> in the UK). In 2017, the Russian group Sandworm launched the NotPetya malware. Though the targets were Ukrainian companies and the country\u2019s government, NotPetya spread quickly, demonstrating the indiscriminate damage such tactics can cause.<\/p>\n

Later Russian activity was both better targeted and more sophisticated and may reflect caution over possible consequences to its own systems and interests resulting from malware spreading unchecked in the wild. And as the 2019 SolarWinds attack<\/a> showed, attacks \u2018deep in the stack\u2019 and supply chain can offer considerable breadth and scope for exploitation, including for intelligence purposes.<\/p>\n

The limited cyber activity in the current Russian invasion of Ukraine may be a recognition of its constraints in warfare. In the heat of conventional battle, the use of cyber will be highly tactical\u2014classic signals intelligence\u2014aimed at disrupting enemy digital systems. Because of the dependence of all modern states on digital systems for their military capabilities, protagonists won\u2019t want to suffer blowback from malware loose in the wild.<\/p>\n

Still, we would expect continued efforts to place malware, prepare the ground for a Russian takeover and shape the information environment outside the immediate sphere of operations. There is, after all, the broader information war to prosecute.<\/p>\n

In hindsight, Putin has been set on this course for some time<\/a>. However, the unanticipated use of US and UK intelligence to expose Russian mustering and intent shouldn\u2019t be underestimated in terms of garnering global support. And the Ukrainians\u2014government, community and supporters\u2014have used social media to great effect.<\/p>\n

These factors have cast doubt on Russia\u2019s superiority in maskirovka<\/em>, the use of disinformation, intimidation and deception, which has been employed since the country\u2019s tsarist days and was refined during Soviet repression. The Russian government\u2019s previous actions in Georgia and Ukraine, as well as cyber operations during the 2016 US presidential campaign, all echo those of the Soviet Union. Antecedents to Putin\u2019s \u2018little green men\u2019 can be found in Stalin\u2019s tactics in Ukraine in the 1920s and 1930s.<\/p>\n

A central focus of maskirovka<\/em> is domestic audiences and bolstering internal legitimacy\u2014typical of repressive regimes everywhere. Putin\u2019s crackdown on internal dissent\u2014arresting protesters<\/a>, silencing the few remaining independent<\/a> broadcasters<\/a>, pressuring tech platforms<\/a>, possibly with more to come<\/a>\u2014is likely to harden as the Russian campaign in Ukraine regroups. We should expect use of \u2018fellow travellers\u2019 outside Russia, of which there remain many, including in the Trump wing of the Republican Party, and of nations from which it can call in favours or leverage concessions. And we should expect use of cyber to block, intimidate and disrupt dissenters and simply to sow confusion.<\/p>\n

It\u2019s early days in this conflict. Russian pressure on Ukraine will increase, even as its military resorts to tried and true tactics of destruction. In the meantime, there are some conclusions that may be drawn for Australia.<\/p>\n

First, cyber is a classic \u2018grey zone\u2019 tool: it is ambiguous and potentially valuable for intelligence, developing influence, seeding uncertainty and shaping the information environment for the first few days of a conflict. We should be as sceptical of reliance on cyber for substantive outcomes as we are of claims of a cyber Pearl Harbor.<\/p>\n

Second, nation-states don\u2019t have a monopoly over the use of cyber. Some hacktivist and criminal groups are taking<\/a> sides<\/a> in the current conflict. Others\u2014including nation-states\u2014will seek to exploit both the distraction of agencies and the disruption of conflict. Cyber defence is getting harder and commercial companies<\/a> and researchers<\/a> often take point. All this activity is muddying the information environment, making signalling harder and increasing the prospect of miscalculation.<\/p>\n

Third, the role of technology companies is increasingly important. Governments no longer have such assets under their direct control and yet are critically dependent on them. It\u2019s not simply content<\/a>. The withdrawal of major tech<\/a> companies<\/a> will give Russia increased impetus to develop sovereign capability. We can expect China and other authoritarian states to increase their control over tech companies, and even Western governments will give pause to consider their dependence.<\/p>\n

Fourth, the importance of communities outside formal institutions. As Peter Singer<\/a> has noted, the Ukrainians have provided something of masterclass in strategic communications and activities, from formally applying for EU membership to videos of grandmothers offering sunflower seeds<\/a> to Russian soldiers. Normal government approaches aren\u2019t well suited to the irreverence and spontaneity of a fast-moving social media environment.<\/p>\n

Fifth, Australia\u2019s formal institutions need to show coordination, imagination, active engagement and transparency\u2014much as the UK and US governments demonstrated with the release of intelligence analysis. In a competition with closed, authoritarian states, transparency, adherence to democratic values and support of human rights and liberties offer the best counter.<\/p>\n

Despite the tragedy unfolding in Ukraine, we should not forget that the main game remains China; the one clear beneficiary of the invasion is the Chinese Communist Party. We should take care to understand the nature of cyber and information warfare in this conflict, not least to better prepare ourselves for increased pressure in the grey zone.<\/p>\n","protected":false},"excerpt":{"rendered":"

The way cyber actions have played out in the Russian invasion of Ukraine hasn\u2019t followed the anticipated script. The attacks on Ukrainian government agencies and banks in early and mid-February were not unexpected, given Russian …<\/p>\n","protected":false},"author":861,"featured_media":70996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,713,2279,163,714],"class_list":["post-70994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyberattack","tag-disinformation","tag-russia","tag-ukraine","dinkus-russia-ukraine-war"],"acf":[],"yoast_head":"\nCyber lessons in the wake of Russia\u2019s invasion of Ukraine | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The way cyber actions have played out in the Russian invasion of Ukraine hasn\u2019t followed the anticipated script. The attacks on Ukrainian government agencies and banks in early and mid-February were not unexpected, given Russian ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-07T19:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-09T00:34:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/03\/GettyImages-1238923905.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lesley Seebeck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lesley Seebeck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/03\/GettyImages-1238923905.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/03\/GettyImages-1238923905.jpg\",\"width\":1024,\"height\":683,\"caption\":\"04 March 2022, Hessen, Frankfurt\/Main: Volodymyr Selenskyj, President of Ukraine, speaks during a demonstration of the Europa Union Frankfurt against the war in Ukraine via livestream. In addition to Frankfurt, demonstrations are held simultaneously in Vienna, Vilnius, Bratislava Prague, Lyon, Tbilisi. Photo: Sebastian Gollnow\/dpa (Photo by Sebastian Gollnow\/picture alliance via Getty Images)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/\",\"name\":\"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#primaryimage\"},\"datePublished\":\"2022-03-07T19:00:25+00:00\",\"dateModified\":\"2022-03-09T00:34:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4\",\"name\":\"Lesley Seebeck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g\",\"caption\":\"Lesley Seebeck\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/lesley-seebeck\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/","og_locale":"en_US","og_type":"article","og_title":"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine | The Strategist","og_description":"The way cyber actions have played out in the Russian invasion of Ukraine hasn\u2019t followed the anticipated script. The attacks on Ukrainian government agencies and banks in early and mid-February were not unexpected, given Russian ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2022-03-07T19:00:25+00:00","article_modified_time":"2022-03-09T00:34:03+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/03\/GettyImages-1238923905.jpg","type":"image\/jpeg"}],"author":"Lesley Seebeck","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Lesley Seebeck","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/03\/GettyImages-1238923905.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/03\/GettyImages-1238923905.jpg","width":1024,"height":683,"caption":"04 March 2022, Hessen, Frankfurt\/Main: Volodymyr Selenskyj, President of Ukraine, speaks during a demonstration of the Europa Union Frankfurt against the war in Ukraine via livestream. In addition to Frankfurt, demonstrations are held simultaneously in Vienna, Vilnius, Bratislava Prague, Lyon, Tbilisi. Photo: Sebastian Gollnow\/dpa (Photo by Sebastian Gollnow\/picture alliance via Getty Images)"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/","url":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/","name":"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#primaryimage"},"datePublished":"2022-03-07T19:00:25+00:00","dateModified":"2022-03-09T00:34:03+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-lessons-in-the-wake-of-russias-invasion-of-ukraine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber lessons in the wake of Russia\u2019s invasion of Ukraine"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4","name":"Lesley Seebeck","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g","caption":"Lesley Seebeck"},"url":"https:\/\/www.aspistrategist.ru\/author\/lesley-seebeck\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/70994"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/861"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=70994"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/70994\/revisions"}],"predecessor-version":[{"id":70999,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/70994\/revisions\/70999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/70996"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=70994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=70994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=70994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}