MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
  • 4G
  • 5G
  • Broadcast
  • Education
  • Mobile
  • streaming
  • Software
Facebook Twitter Instagram
Facebook Twitter Instagram
MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
  • 4G

    Colorado Opens Doubleheader Weekend by Hosting Swarm Friday

    February 2, 2023

    BSNL Offers Cheapest Postpaid Plan at Rs 199: Check Benefits

    January 31, 2023

    Lamar County Sheriff Inmate Booking Report || Jan. 30, 2023

    January 30, 2023

    Cohere Technologies Receives Funding From Bell Ventures for

    January 30, 2023

    With 5.7% CAGR, Enterprise WLAN Market Size Worth USD 9.59

    January 30, 2023
  • 5G

    Sunil Mittal lauds focus on 5G tech in this year’s Budget

    February 2, 2023

    iQOO 11 5G Review: Does It End Your Quest for the Ultimate Smartphone?

    January 31, 2023

    BSNL moves into the private 5G network space – Developing Telecoms

    January 30, 2023

    Oppo Reno8 T 5G and Enco Air3 set to launch on February 3 in India

    January 30, 2023

    Mafab Communications targets infrastructure sharing to push 5G service

    January 30, 2023
  • Broadcast

    2 former Tigers players joining TV broadcast team in 2023

    February 2, 2023

    Longtime Hawaii sports broadcaster Jim Leahey dies at 80

    January 31, 2023

    BBC Arabic Radio Airs Final Broadcast After 85 Years

    January 30, 2023

    Gracey swaps W Series for SailGP broadcast role

    January 30, 2023

    Lte And 5G Broadcast Market Analysis by Growth Facts and Revenue Figures over 2023 – 2032

    January 30, 2023
  • Education

    How technology will transform global education in 2023

    January 27, 2023

    MassBay Community College Offering Free Computer & Technology Education and Training to Unemployed and Underemployed Workers

    January 27, 2023

    Need to focus on reshaping technology education, says CM Naveen Patnaik

    January 26, 2023

    Tech ed students make cornhole sets for Winter Regatta – WJFW-TV

    January 26, 2023

    Ontario updating curriculum for computer, technological education

    January 24, 2023
  • Mobile

    Nova Labs Launches New IoT Integration Arm, 1663™

    February 2, 2023

    Reforms to enable speedy 5G roll outs, help consumers, Telecom News, ET Telecom

    January 31, 2023

    NXP Semiconductor delivers mixed results as mobile and IoT chip demand falters

    January 31, 2023

    Aalto University starting a new doctoral program with Nokia

    January 30, 2023

    ROSALIND FRANKLIN UNIVERSITY ANNOUNCES $1 MILLION IN NEW FUNDING FROM NORTHSHORE UNIVERSITY HEALTH SYSTEM TO EXPAND MOBILE CLINIC COMMUNITY OUTREACH

    January 30, 2023
  • streaming

    Buy or Bootleg: Save Your Favorite Streaming Media by Any Means Necessary

    February 2, 2023

    'The Adam Project' stands out amongst streaming duds – ECM Publishers

    January 31, 2023

    ‘Kidding’ Removed From Showtime Streaming — Full List of Removed Shows

    January 31, 2023

    ‘WWE Monday Night RAW’ (1/30/23) free live stream: How to watch Season 31, Episode 5 online without cable

    January 30, 2023

    Southwest’s Loss, Comcast’s Growth, and Netflix’s Strategy

    January 30, 2023
  • Software

    Azentio Software recognized as a Notable Vendor in Leading Research Firm’s Digital Banking Engagement Platforms Report

    January 31, 2023

    Hackers Use TrickGate Software to Deploy Emotet, REvil, Other Malware

    January 30, 2023

    Updates To ezPaycheck Software Enables Trucking Companies Start Payroll, Mid-Year Easily

    January 30, 2023

    Major government tech contractors use monopolistic vendor-lock to drive revenue: study

    January 30, 2023

    Calibrite launches brand new monitor calibration software suite

    January 29, 2023
MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
Home»Mobile»Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar
Mobile

Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar

By mulegeek-June 15, 2022No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Ever since the dawn of the Internet Age, the potential to weaponize digital technologies as tools of international aggression has been known. This was underlined by Russia’s 2007 cyber-attack on Estonia, which was widely recognized as the first such act by one state against another. In 2016, NATO officially recognized cyberspace as a field of military operations alongside the more traditional domains of land, sea and air.

The current Russo-Ukrainian War represents the next major milestone in our rapidly developing understanding of cyber security. It is now becoming increasingly apparent that the invasion unleashed by Vladimir Putin on February 24 is the world’s first full-scale cyberwar.

It will take many years to fully digest the lessons of this landmark conflict and assess the implications for the future of international security. However, it is already possible to draw a number of preliminary conclusions that have consequences for individuals, organizations and national governments around the world.

Subscribe to UkraineAlert DAILY

As the Russia crisis in Eastern Europe heats up, UkraineAlert DAILY delivers the best Atlantic Council expert insight, from the UkraineAlert online publication and beyond, to your inbox Monday through Friday.

The current war has confirmed that while Russian hackers often exist outside of official state structures, they are highly integrated into the country’s security apparatus and their work is closely coordinated with other military operations. Much as mercenary military forces such as the Wagner Group are used by the Kremlin to blur the lines between state and non-state actors, hackers form an unofficial but important branch of modern Russia’s offensive capabilities.

One month before the current invasion began, hackers hit Ukraine with a severe cyber-attack designed to weaken government structures and prepare the ground for the coming offensive. Critical infrastructure was targeted along with private data in a bid to undermine Ukraine’s ability to defend itself.

Again and again during the first few months of the conflict, we have witnessed the coordination of cyber operations with more conventional forms of warfare. On one entirely typical occasion, a cyber-attack on the Odesa City Council in southern Ukraine was timed to coincide with cruise missile strikes against the city.  

Just as the Russian army routinely disregards the rules of war, Russian hackers also appear to have no boundaries regarding legitimate targets for cyber-attacks. Popular targets have included vital non-military infrastructure such as energy and utilities providers. Hospitals and first responders have been subjected to cyber-attacks designed to disrupt the provision of emergency services in the immediate aftermath of airstrikes. As millions of Ukrainian refugees fled the fighting during the first month of the war, hackers attacked humanitarian organizations.

Individuals are also targets. Every Ukrainian citizen is potentially at risk of cyber-attack, with hacked personal data providing the Russian security services with opportunities to gain backdoor access to Ukrainian organizations and identify potential opponents or prepare tailored propaganda campaigns.

The scale of the cyber warfare currently being conducted against Ukraine is unprecedented but not entirely unexpected. Large-scale attacks began during the 2013-14 Euromaidan protests and initially enjoyed considerable success. This was followed by more ambitious attempts to hack into the Ukrainian electricity grid and spark power blackouts. Then came the Petya and NotPetya international cyber-attacks of 2016-17, which centered on Ukraine and caused huge global disruption.

It is clear that Russia’s current cyber offensive involves cybercriminals working in cooperation with military personnel while enjoying access to official intelligence data. This approach is relatively cheap, with cybercriminals often able to finance their operations using standard cyber fraud techniques. The idea of collaboration between the state and criminal elements is also nothing new. However, it is noteworthy that in this case, the state in question has a permanent seat on the United Nations Security Council. 

Eurasia Center events

Perhaps the single most important outcome of the cyberwar so far is that we now have a much better picture of the enemy. We are able to see the threats posed by Russia and also assess Moscow’s limitations. Just as naval threats are countered by missiles and mines, cyber security is achievable given sufficient knowledge and resources.

Ukraine has come under unprecedented cyber-attack on a daily basis for more than a quarter of a year, but the Ukrainian authorities have managed to maintain basic utility services for the vast majority of the country. Even more striking is the fact that mobile communications and internet connection disruption has been minimal. In many instances, Ukrainians have been able to access online information while under Russian bombardment. 

One key lesson from the past few months is the need for everyone to take responsibility for their own cyber security. This applies to individuals and organizations alike. Neglecting cyber security risks creating weak links in wider systems which can have disastrous consequences for large numbers of people. Likewise, businesses should not rely on the state to take care of cyber security and should be prepared to invest in sensible precautions. This can no longer be viewed as an optional extra.

International cooperation is also vital for strong cyber security. Ukraine has received invaluable support from a number of partner countries while sharing its own experience and expertise. Much as the internet itself does not recognize national boundaries, the most successful cyber security efforts are also international in nature.

The Russian invasion of Ukraine has underlined the expansion of the modern battlefield to include almost every aspect of everyday life. The rise of the internet and the increasing ubiquity of digital technologies means that virtually anything from water supplies to banking services can and will be weaponized.

For years, the Kremlin has been developing the tools to carry out such attacks. The international community was slow to recognize the true implications of this strategy and is now engaged in a desperate game of catchup. The war in Ukraine has highlighted the military functions performed by hackers and the centrality of cyber-attacks to modern warfare. Restricting Russian access to modern technologies should therefore be viewed as an international security priority.

The Russo-Ukrainian War is the world’s first full-scale cyberwar but it will not be the last. On the contrary, all future conflicts will have a strong cyber component. In order to survive, cyber security will be just as important as maintaining a strong conventional military.

Yurii Shchyhol is head of Ukraine’s State Service of Special Communication and Information Protection.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

Image: The current Russo-Ukrainian War represents a major milestone in our developing understanding of cyber security. It is now clear that the invasion unleashed by Vladimir Putin on February 24 is the world’s first full-scale cyberwar. (REUTERS/Dado Ruvic/Illustration/File Photo)

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
mulegeek-
  • Website

Related Posts

Nova Labs Launches New IoT Integration Arm, 1663™

February 2, 2023

Reforms to enable speedy 5G roll outs, help consumers, Telecom News, ET Telecom

January 31, 2023

NXP Semiconductor delivers mixed results as mobile and IoT chip demand falters

January 31, 2023

Leave A Reply Cancel Reply

Categories
  • 4G
  • 5G
  • Broadcast
  • Education
  • Mobile
  • Software
  • streaming

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Nova Labs Launches New IoT Integration Arm, 1663™

February 2, 2023

Buy or Bootleg: Save Your Favorite Streaming Media by Any Means Necessary

February 2, 2023

Colorado Opens Doubleheader Weekend by Hosting Swarm Friday

February 2, 2023

Sunil Mittal lauds focus on 5G tech in this year’s Budget

February 2, 2023
Facebook Twitter Instagram Pinterest
  • About Us
  • Cookies policy
  • Terms of services
  • Contact us
  • DIsclaimer
© 2023Designed by mulegeek.

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT