As missiles rain down on Ukraine’s telecommunications infrastructure, including Kyiv’s TV tower, hackers have been attacking in cyberspace.
Sergei Supinsky/AFP via Getty Images
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine.
Russian Defense Ministry Press Service via AP
Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
Russian forces have the capability to jam signals from satellites, affecting communications and navigation.
Vitaly V. Kuzmin/Wikimedia
From jamming satellite signals to spreading disinformation, Russia’s military has sophisticated technologies it’s bringing to the battlefield in Ukraine.
Hackers can get eyes inside systems that are supposed to be secure.
Yuichiro Chino via Getty Images
Russian information warriors have the capacity to damage critical US infrastructure systems.
Russian President Vladimir Putin walks through a hall in the building housing Russia’s GRU military intelligence service.
Dmitry Astakhov, Sputnik, Government Pool Photo via AP
Troop buildups and diplomatic negotiations highlight the threat of a major land war in Europe. In cyberspace, Russia has been attacking Ukrainian infrastructure and government operations for years.
The Department of Justice indicted six officers of Russia’s GRU military intelligence service in October 2020 on charges of hacking and deploying malware.
Andrew Harnik - Pool/Getty Images
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
At this month’s summit, US President Joe Biden warned his counterpart Vladimir Putin of reprisals against ‘persistent malicious cyber-attacks’. But it will take more than posturing to end the stand-off.
The U.S. Justice Department was among many federal agencies and private companies whose networks suffered intrusions from Russian hackers.
AP Photo/Jacquelyn Martin
A scholar of cyber conflict sets out why retaliation doesn’t prevent future attacks, and explains what might have a better chance.
Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack.
Tasos Katopodis/Getty Images
Cyberwarfare is more like cancer than bombs and bullets. Cybersecurity experts are just beginning to make their diagnosis of the Sunburst hack.
Mick Tsikas/AAP Image
Australia is coming under sustained cyber attack by a ‘state-based’ actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it’s time to change that.
Shire of Katanning
The wool industry was paralysed for several days after hackers held to ransom the IT system that governs almost all wool sales in Australia and New Zealand. More attacks are a case of if, not when.
In the wake of U.S. killings, Iran’s supreme leader vowed ‘harsh revenge’ – which could come in the form of cyber attacks.
Office of the Iranian Supreme Leader via AP
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
Cyber attacks aren’t warfare.
Treating non-violent cyber attacks as warfare could lead to unnecessary escalation.
astudio / Shutterstock.com
Countries may be forced to choose whether they side with the US or China when it comes to Huawei.
The U.S. military is shifting the focus of its cyberwarfare forces.
U.S. Air Force
A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
Cyber attacks need two components – the tools to exploit vulnerabilities and the people with the expertise to deploy them.
What constitutes cyberwar?
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
The US has charged and sanctioned nine Iranians and an Iranian company for cyber attacks.
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Countries affected by prolonged periods of cyber warfare need peacekeeping assistance to recover.