Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
This article examines Russia’s cyber campaigns against Ukraine and shines some light into this corner of the ‘gray zone’ and into the ‘red zone’ warfare inflicted upon Ukraine. Hitherto, there has been a lack of in-depth, systematic studies in relation to state-on-state cyber attacks. This article means to begin to bridge this gap in knowledge with its focus on Ukraine while arguing that Russia’s cyber campaigns are components of a wider suite of active measures/hybrid warfare engagements from its state and substate entities. For the Kremlin, hybrid warfare (gibridnaya voina) is fought with all the tools at their disposal on a ‘battlefield’ that stretches beyond the four modern domains of land, sea, air, and space. The fifth domain of cyberspace is increasingly important for espionage, cyberwar, and influence operations.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
5--33
Opis fizyczny
Bibliogr. 149 poz., wykr.
Twórcy
autor
- Swansea University
Bibliografia
- [1] D. Gioe, “Cyber operations and useful fools: the approach of Russian hybrid intelligence,” Intelligence and National Security, vol. 33, no. 7, pp. 954–973, 2019, doi: 10.1080/02684527.2018.1479345.
- [2] M. Zabrodskyi, J. Watling, O.V. Danylyuk, N. Reynolds, “Preliminary lessons in conventional warfighting from Russia’s invasion of Ukraine: February–July 2022,” Nov. 2022. [Online]. Available: https://static.rusi.org/359-SR-Ukraine- Preliminary-Lessons-Feb-July-2022-web-final.pdf. [Accessed Mar. 9, 2023].
- [3] N. Masuhr, B. Zogg, “The War in Ukraine: First Lessons,” Apr. 2022. [Online]. Available: https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/540121/2/CSSAnalyse301-EN.pdf. [Accessed Mar. 9, 2023].
- [4] J. Risen, (Mar. 11, 2022). U.S. Intelligence says Putin made a last-minute decision to invade Ukraine. [Online]. Available: https://theintercept.com/2022/03/11/russia-putin-ukraine-invasion-us-intelligence/. [Accessed Mar. 9, 2023].
- [5] T. Bukkvoll, “Why Putin went to war: Ideology, interests and decision-making in the Russian use of force in Crimea and Donbas,” Contemporary Politics, vol. 22, no. 3, pp. 273–279, 2016, doi: 10.1080/13569775.2016.1201310.
- [6] M. Saito, M. Tsvetkova. (May 17, 2022). The enemy within. [Online]. Available: https://www.reuters.com/investigates/special-report/ukraine-crisisrussia-saboteurs/. [Accessed Apr. 11, 2023].
- [7] M. Krever. (May 17, 2022). Ukraine’s security service hunts the spies selling information to Russia. [Online]. Available: https://edition.cnn.com/2022/05/16/europe/ukraine-sbu-russian-spies-intl/index.html. [Accessed Apr. 11, 2023].
- [8] T. Kuzio, Russian Nationalism and the Russian-Ukrainian War. Abingdon: Routledge, 2022.
- [9] T. Kuzio, “European identity, Euromaidan, and Ukrainian nationalism,” Nationalism and Ethnic Politics, vol. 22, no. 4, pp. 497–508, 2016, doi: 10.1080/13537113.2016.1238249.
- [10] H. Suganami, “The causes of war,” in An Introduction to International Relations, R. Devetak, A. Burke, J. George, Eds. Cambridge: Cambridge University Press, 3rd ed., 2017, pp. 225–234.
- [11] K. Waltz, Man, the State, and War: A theoretical Analysis Anniversary Edition. New York: Columbia University Press, 2018.
- [12] J.J. Mearsheimer, “Why the Ukraine crisis is the west’s fault: The liberal delusions that provoked Putin,” Foreign Affairs, vol. 93, no. 5, pp. 77–84, 2014.
- [13] J.J. Mearsheimer, “The causes and consequences of the Ukraine War,” Horizons: Journal of International Relations and Sustainable Development, vol. 21, no. 2, pp. 12–27, Summer 2022.
- [14] N.R. Smith, G. Dawson, “Mearsheimer, Realism, and the Ukraine War,” Analyse & Kritik, vol. 44, no. 2, pp. 175–200, 2022, doi: 10.1515/auk-2022-2023.
- [15] G. Mangott, “Farewell to Russia: The decay of a superpower,” in Europe’s New Security Challenges, H. Gartner, A. Hyde-Price, E. Reiter, Eds., Boulder, CO: Lynne Rienner, 2001, pp. 381–385.
- [16] S. Forde, “International realism and the science of politics: Thucydides, Machiavelli, and Neorealism,” International Studies Quarterly, vol. 39, no. 2, pp. 141–160, 1995, doi: 10.2307/2600844.
- [17] S. Tang, “The security dilemma: A conceptual analysis,” Security Studies, vol. 18, no. 3, pp. 587–623, 2009, doi: 10.1080/09636410903133050.
- [18] Z. Brzezinski, “The premature partnership,” Foreign Affairs, vol. 73, no. 2, pp. 67–82, 1994, doi: 10.2307/20045920.
- [19] L. Peisakhin, “Euromaidan revisited: Causes of regime change in Ukraine one year on,” Wilson Center, Kennan Cable, no. 5, Feb. 2015. [Online]. Available: https://www.files.ethz.ch/isn/188792/5-kennan%20cable-Peisakhin.pdf. [Accessed Mar. 30, 2022].
- [20] N. Bouchet, “Russia’s ‘militarization’ of colour revolutions,” Policy Perspectives, vol. 4, no. 2, pp. 1–2, 2016.
- [21] V. Putin, (Mar. 18, 2014). Address by President of the Russian Federation, 18 March, 15:50. The Kremlin, Moscow. [Online]. Available: http://en.kremlin.ru/events/president/news/20603. [Accessed Apr. 24, 2024].
- [22] M. Skak, “Russian strategic culture: The role of today’s Chekisty,” Contemporary Politics, vol. 22, no. 3, p. 324, 2016, doi: 10.1080/13569775.2016.1201317.
- [23] V. Putin. (2022). On the historical unity of Russians and Ukrainians. [Online]. Available: en.kremlin.ru/events/president/news/66181. [Accessed: Apr. 3, 2022].
- [24] J. Mankoff, “Russia’s latest land grab: How Putin Won Crimea and Lost Ukraine,” Foreign Affairs, vol. 93, no. 3, pp. 60–68, 2014.
- [25] C.K. Bartles, R.N. McDermott, “Russia’s military operation in Crimea road-testing rapid reaction capabilities,” Problems of Post-Communism, vol. 61, no. 6, pp. 55–59, 2014.
- [26] K. Åtland, “Destined for deadlock? Russia, Ukraine, and the unfulfilled Minsk agreements,” Post-Soviet Affairs, vol. 36, no. 2, pp. 122–139, 2020, doi: 10.1080/1060586X.2020.1720443.
- [27] F. Burkhardt, C. Wittke, E. Bescotti. (2022). TCUP Report: Passportization, diminished citizenship rights, and the Donbas vote in Russia’s 2021 Duma elections. [Online]. Available: https://huri.harvard.edu/files/huri/files/idp_report_3_burkhardt_et_al.pdf?m=1642520438. [Accessed Mar. 21, 2023].
- [28] J. Barbieri, “Raising citizen-soldiers in Donbas: Russia’s role in promoting patriotic education programmes in the Donetsk and Luhansk Peoples’ Republics” Ethnopolitics, forthcoming, 2023, doi: 10.1080/17449057.2023.2220097.
- [29] K. Giles, “Russia and its neighbours: Old attitudes, new capabilities,” in Cyber War in Perspective: Russian Aggression against Ukraine, K. Geers, Ed. Tallinn: NATO CCD COEPublications, 2015, pp. 19–28.
- [30] A. Polyakova. (Mar. 22, 2018). The next Russian attack will be far worse than bots and trolls. [Online]. Available: https://www.brookings.edu/blog/orderfrom-chaos/2018/03/22/the-next-russian-attack-will-be-far-worse-than-botsand-trolls/amp/. [Accessed Sep. 30, 2019].
- [31] Google’s Threat Analysis Group (TAG), Mandiant, Google Trust & Safety. (2023). Fog of War How the Ukraine Conflict Transformed the Cyber Threat Landscape [Online]. Available: https://services.google.com/fh/files/blogs/google_fog_of_war_research_report.pdf. [Accessed Dec. 21, 2023].
- [32] D. Hughes, A. Colarik, “The hierarchy of cyber war definitions,” Pacific Asia Workshop on Intelligence and Security, 2017, doi: 10.1007/978-3-319-57463-9_2.
- [33] K. Giles, W. Hagestad II, “Divided by a common language: Cyber definitions in Chinese, Russian and English,” in 5th International Conference on Cyber Conflict Proceedings, K. Podins, J. Stinissen, M. Maybaum, Eds., Tallinn: CCD COE Publications, 2013, pp. 413–430.
- [34] S. D. Applegate, A. Stavrou, “Towards a cyber conflict taxonomy,” in 5th International Conference on Cyber Conflict Proceedings, K. Podins, J. Stinissen, M. Maybaum, Eds., Tallinn: CCD COE Publications, 2013, pp. 431–450.
- [35] Washington Post Live. (Oct. 6, 2017). Michael Hayden, Richard Clarke on greatest cyberthreats facing America. [Online]. Available: https://www.youtube.com/watch?v=FdiAQBXGsMg. [Accessed Oct. 17, 2018].
- [36] L. Kello, “The meaning of the cyber revolution perils to theory and statecraft,” International Security, vol. 38, no. 2, pp. 9–14, 22, 2013, doi: 10.1162/ISEC_a_00138.
- [37] D. Betz, “Cyberpower in strategic affairs: Neither unthinkable nor blessed,” Journal of Strategic Studies, vol. 35, no. 5, pp. 689–711, 2012, doi: 10.1080/01402390.2012.706970.
- [38] T. Junio, “How probable is cyber war? Bringing IR theory back into the cyber conflict debate,” Journal of Strategic Studies, vol. 36, no. 1, pp. 125–133, 2013, doi: 10.1080/01402390.2012.739561.
- [39] A.P. Liff, “The proliferation of cyberwarfare capabilities and interstate war, redux: Liff responds to Junio,” Journal of Strategic Studies, vol. 36, no. 1, pp. 134–138, 2013, doi: 10.1080/01402390.2012.733312.
- [40] E. Gartzke, “The myth of cyberwar bringing war in cyberspace back down to earth,” International Security, vol. 38, no. 2, pp. 41–73, 2013, doi: 10.1162/ISEC_a_00136.
- [41] J.S. Nye. (Jul. 5, 2018). Is cyber the perfect weapon? [Online]. Available: https://www.project-syndicate.org/commentary/deterring-cyber-attacks-and-informationwarfare-by-joseph-s--nye-2018-07. [Accessed Sep. 13, 2018].
- [42] T. Rid, Cyber War Will Not Take Place. London: Hurst, 2013.
- [43] K. Stoddart, Cyberwarfare: Threats to Critical Infrastructure. London: Palgrave/Springer, 2022.
- [44] C. Watts. (Dec. 3, 2022). Preparing for a Russian cyber offensive against Ukraine this winter. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2022/12/03/preparing-russian-cyber-offensive-ukraine/. [Accessed Dec. 20, 2023].
- [45] M. Connell, S. Vogler, Russia’s approach to cyber warfare, Occasional paper, Center for Naval Analyses, 2017. [Online]. Available: https://www.cna.org/cna_files/pdf/DOP-2016-U-014231-1Rev.pdf. [Accessed Jan. 9, 2018].
- [46] J. Weedon, “Beyond ‘cyber war’: Russia’s use of strategic cyber espionage and information operations in Ukraine,” in Cyber War in Perspective: Russian Aggression against Ukraine, K. Geers, Ed. Tallinn: CCD COE Publications, 2015, pp. 67–77.
- [47] Mitre Corporation, APT28. [Online]. Available: https://attack.mitre.org/groups/G0007/. [Accessed Jul. 19, 2023].
- [48] Mitre Corporation, APT29. [Online]. Available: https://attack.mitre.org/groups/G0016/. [Accessed Jul. 19, 2023].
- [49] H. Modderkolk, “Dutch agencies provide crucial intel about Russia’s interference in US-elections,” De Volkskrant, Jan. 25, 2018. [Online]. Available: https://www.volkskrant.nl/wetenschap/dutch-agencies-provide-crucial-intel-about-russia-s-interference-in-us-elections~b4f8111b/. [Accessed Jul. 19, 2023].
- [50] A. Osborn, P. Polityuk, “Russia prepares reprisals against Ukraine over Crimea blackout,” Reuters, Nov. 24, 2015. [Online]. Available: https://www.reuters.com/article/us-ukraine-crisis-crimea-idUSKBN0TD1NI20151124. [Accessed Feb. 28, 2020].
- [51] National Cyber Security Centre. (Oct. 4, 2018). Reckless campaign of cyber attacks by Russian military intelligence service exposed. [Online]. Available: https://www.ncsc.gov.uk/news/reckless-campaign-cyber-attacks-russianmilitary-intelligence-service-exposed. [Accessed Jan. 10, 2019].
- [52] A. Greenberg, “Hackers tied to Russia’s GRU targeted the US grid for years, researchers warn,” Wired, Feb. 24, 2021. [Online]. Available: https://www.wired.com/story/russia-gru-hackers-us-grid/. [Accessed Apr. 11, 2023].
- [53] N. Zinets, “Ukraine charges Russia with new cyber attacks on infrastructure,” Reuters, Feb. 15, 2017. [Online]. Available: http://www.reuters.com/article/us-ukraine-crisis-cyber/ukraine-charges-russia-with-new-cyber-attacks-on-infrastructure-idUSKBN15U2CN. [Accessed Sep. 7, 2017].
- [54] CISA. (Jul. 20, 2021). ICS alert cyber-attack against Ukrainian critical infrastructure. [Online]. Available: https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01. [Accessed Dec. 28, 2023].
- [55] Idaho National Laboratory. (2016). Cyber threat and vulnerability analysis of the U.S. electric sector prepared by: Mission support center. [Online]. Available: https://www.energy.gov/sites/prod/files/2017/01/f34/Cyber%20Threat%20and%20Vulnerability%20Analysis%20of%20the%20U.S.%20Electric%20Sector.pdf. [Accessed Aug. 12, 2019].
- [56] ICS/SANS. (Mar. 18, 2016). TLP: White analysis of the cyber attack on the Ukrainian power grid defense use case. [Online]. Available: https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf. [Accessed Jan. 19, 2018].
- [57] P. Polityuk, “Ukraine to probe suspected Russian cyber attack on grid, ”Reuters, Dec. 31, 2015. [Online]. Available: https://www.reuters.com/article/us-ukraine-crisis-malware/ukraine-to-probe-suspected-russian-cyber-attack-on-grid-idUSKBN0UE0ZZ20151231?feedType=RSS. [Accessed Jan. 19, 2018].
- [58] E.J. Oughton, D. Ralph, R. Pant, E. Leverett, J. Copic, et al., “Stochastic counter-factual risk analysis for the vulnerability assessment of cyber-physical attacks on electricity distribution infrastructure networks,” Risk Analysis, vol. 39, no. 9, pp. 2012–2031, 2019, doi: 10.1111/risa.13291.
- [59] C-Span. (May 9, 2017). Cybersecurity threats and defense strategy. [Online]. Available: https://www.c-span.org/video/?428023-1/cybersecurity-threats-defensestrategy&start=1166. [Accessed Sep. 27, 2018].
- [60] D. Goodin. (Jun. 12, 2017). Found: ‘Crash override’ malware that triggered Ukrainian power outage attack tools can be used against a broad range of electric grids around the world. [Online]. Available: https://arstechnica.com/information-technology/2017/06/crash-override-malware-may-sabotageelectric-grids-but-its-no-stuxnet/. [Accessed Jan. 20, 2018].
- [61] D. Goodin. (Jan. 11, 2017). Hackers trigger yet another power outage in Ukraine for the second year in a row, hack targets Ukraine during one of its coldest months. [Online]. Available: https://arstechnica.com/information-technology/2017/01/the-new-normal-yet-another-hacker-caused-power-outage-hitsukraine/. [Accessed Jan. 19, 2018].
- [62] ESET. (Jun. 12, 2017). Industroyer: Biggest malware threat to critical infrastructure since Stuxnet. [Online]. Available: https://www.eset.com/int/industroyer/. [Accessed Jan. 19, 2018].
- [63] US-CERT. (Jul. 27, 2017). Alert (TA17-163A) crash override malware. [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA17-163A. [Accessed Jan. 19, 2018].
- [64] P. Polityuk, “Ukraine points finger at Russian security services in recent cyber attack,” Reuters, Jul. 1, 2017. [Online]. Available: https://www.reuters.com/article/us-cyber-attack-ukraine/ukraine-points-finger-at-russian-security-services-in-recent-cyber-attack-idUSKBN19M39P. [Accessed Jan. 19, 2018].
- [65] US-CERT. (Jul. 27, 2017). Alert (TA17-163A) crash override malware. [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA17-163A. [Accessed Jan. 19, 2018].
- [66] ESET. (Jun. 12, 2017). Industroyer: Biggest malware threat to critical infrastructure since Stuxnet. [Online]. Available: https://www.eset.com/int/industroyer/. [Accessed Jan. 19, 2018].
- [67] Dragos. (2017). Crashoverride analysis of the threat to electric grid operations. [Online]. Available: https://dragos.com/blog/crashoverride/CrashOverride-01.pdf. [Accessed Oct. 7, 2018].
- [68] Mandiant. (2023). M-trends 2023. [Online]. Available: https://services.google.com/fh/files/misc/m_trends_2023_report.pdf. [Accessed Dec. 21, 2023].
- [69] Trend Micro. (Jun. 28, 2016). Cyber threats to the mining industry. [Online]. Available: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/cyber-threats-to-the-mining-industry. [Accessed Mar. 27, 2023].
- [70] M. Baezner, Cyber and information warfare in the Ukrainian conflict, Center for Security Studies, ETH Zurich, Oct. 2018. [Online]. Available: https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/321570/20181003_MB_HS_RUS-UKRV2_rev.pdf?sequence=1. [Accessed Mar. 27,2023].
- [71] CybrerX Labs. (Feb. 15, 2017). Operation BugDrop: CyberX discovers large-scale cyber-reconnaissance operation targeting Ukrainian organizations. [Online]. Available: https://cyberx-labs.com/blog/operation-bugdrop-cyberx-discover-slarge-scale-cyber-reconnaissance-operation/. [Accessed Dec. 16, 2018].
- [72] Interfax. (Jul. 11, 2018). SBU thwarts cyber attack from Russia against chlorine station in Dnipropetrovsk region. [Online]. Available: https://en.interfax.com.ua/news/general/517337.html. [Accessed Mar. 27, 2023].
- [73] W. Largent.(May 23, 2018). New VPNFilter malware targets at least 500K networking devices worldwide. [Online]. Available: https://blog.talosintelligence.com/vpnfilter/. [Accessed Mar. 27, 2023].
- [74] US Department of Justice. (May 23, 2018). Justice Department announces actions to disrupt advanced persistent threat 28 Botnet of infected routers and network storage devices. [Online]. Available: https://www.justice.gov/opa/pr/justice-department-announces-actions-disrupt-advanced-persistentthreat-28-botnet-infected. [Accessed Mar. 27, 2023].
- [75] A. Greenberg, “Everything we know about Russia’s election-hacking play-book,” Wired, Jun. 9, 2017. [Online]. Available: https://www.wired.com/story/russia-election-hacking-playbook/. [Accessed Mar. 27, 2023].
- [76] P. Polityuk, “Exclusive: Ukraine says it sees surge in cyber attacks targeting election,” Reuters, Jan. 25, 2019. [Online]. Available: https://www.reuters.com/article/us-ukraine-cyber-exclusive/exclusive-ukraine-says-it-sees-surge-in-cyber-attacks-targeting-election-idUSKCN1PJ1KX. [Accessed Mar. 27, 2023].
- [77] A. Meyers, “Danger Close: Fancy bear tracking of Ukrainian field artillery units,” Crowdstrike, Dec. 22, 2016. [Online]. Available: https://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/. [Accessed Mar. 27, 2023].
- [78] Bellingcat. (Feb. 17, 2015). Bellingcat report - Origin of artillery attacks on Ukrainian military positions in Eastern Ukraine between 14 July 2014 and 8 August 2014. [Online]. Available: https://www.bellingcat.com/news/uk-andeu-rope/2015/02/17/origin-of-artillery-attacks/. [Accessed Mar. 27, 2023].
- [79] US Department of Justice. (2015). Press release. [Online]. Available: https://www.justice.gov/opa/press-release/file/1328521/download. [Accessed Mar. 27, 2023].
- [80] Microsoft. (Jan. 15, 2022). Destructive malware targeting Ukrainian organizations. [Online]. Available: https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/.[Accessed May 20, 2022].
- [81] J. Tidy. (Feb. 3, 2022). European oil facilities hit by cyber-attacks. [Online]. Available: https://www.bbc.co.uk/news/technology-60250956. [Accessed May 20, 2022].
- [82] A. Ribeiro. (Feb. 4, 2022). Cyberattacks continue to extend across Europe, BlackCat ransomware may be involved. [Online]. Available: https://industrialcyber.co/threats-attacks/cyberattacks-continue-to-extend-acrosseurope-blackcat-ran-somware-may-be-involved/. [Accessed May 20, 2022].
- [83] M. Wigell, A. Vihma, “Geopolitics versus geoeconomics: The case of Russia’s geostrategy and its effects on the EU,” International Affairs, vol. 92, no. 3, pp. 605–627, 2016, doi: 10.1111/1468-2346.12600.
- [84] D. Cattler, D. Black, “The myth of the missing cyberwar,” Foreign Affairs, Apr. 6, 2022. [Online]. Available: www.foreignaffairs.com/articles/ukraine/2022-04-06/myth-missing-cyberwar. [Accessed Apr. 11, 2023].
- [85] B. Smith. (Nov 3, 2022). Extending our vital technology support for Ukraine. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2022/11/03/ourtech-support-ukraine/. [Accessed Dec. 18, 2023].
- [86] Microsoft. (Apr. 7, 2022). Disrupting cyberattacks targeting Ukraine. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2022/04/07/cyberattack-sukraine-strontium-russia/. [Accessed May 19, 2022].
- [87] Microsoft. (Apr. 27, 2022). Special report: Ukraine an overview of Russia’s cyberattack activity in Ukraine. [Online]. Available: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd. [Accessed Apr. 11, 2023].
- [88] Microsoft. (Feb. 28, 2022). Digital technology and the war in Ukraine. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2022/02/28/ukraine-russia-digital-war-cyberattacks/. [Accessed May 19, 2022].
- [89] C. Watts.(Mar 15, 2023). Is Russia regrouping for renewed cyberwar? [Online]. Available: https://blogs.microsoft.com/on-the-issues/2023/03/15/russia-ukraine-cyberwarfare-threat-intelligence-center/. [Accessed Dec 20, 2023].
- [90] T. Burt. (Jun 14, 2023). Ongoing Russian cyberattacks targeting Ukraine.[Online]. Available: https://blogs.microsoft.com/on-the-issues/2023/06/14/russian-cyberattacks-ukraine-cadet-blizzard/. [Accessed Dec. 20, 2023].
- [91] Office for Budgetary Responsibility. (2022). Cyber-attacks on Ukraine by Russia since the invasion began, by sector. [Online]. Available: https://obr.uk/box/cyber-attacks-during-the-russian-invasion-of-ukraine/. [Accessed Dec. 19, 2023].
- [92] C. Watts. (Dec. 7, 2023). Russian influence and cyber operations adapt for long haul and exploit war fatigue. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2023/12/07/russia-ukraine-digital-threat-celebritycameo-mtac/. [Accessed Dec. 20, 2023].
- [93] F.R. Partipilo, M. Stroppa, “Humanitarian organisations under cyber-attack,” in Responsible Behaviour in Cyberspace: Global Narratives and Practice, A. Sukumar, D. Broeders, F. Delerue, Eds., Gilly, Beitlot/Luxembourg: Publications Office of the European Union, 2023, pp. 238–257.
- [94] N. Biasini, M. Chen, A. Karkins, A. Khodjibaev, C. Neal, M. Olney, D. Korzhevin. (Jan. 21, 2022.). Ukraine campaign delivers defacement and wipers, in continued escalation. [Online]. Available: https://blog.talosintelligence.com/2022/01/ukraine-campaign-delivers-defacement.html. [Accessed May 21, 2022].
- [95] M. Hill. (Mar. 2, 2022). How security vendors are aiding Ukraine. [Online]. Available: https://www.csoonline.com/article/3651685/how-security-vendorsare-aiding-ukraine.html. [Accessed Dec. 17, 2023].
- [96] K. Zetter, (Dec. 7, 2022). Security firms aiding Ukraine during war could be considered participants in conflict. [Online]. Available: https://www.zetter-zeroday.com/p/security-firms-aiding-ukraine-during. [Accessed Dec. 17, 2023].
- [97] S. Schechner, “Ukraine’s ‘IT army’ has hundreds of thousands of hackers, Kyiv says,” The Wall Street Journal, Mar. 4, 2022. [Online]. Available: https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-03-04/card/ukraine-s-it-army-has-hundreds-of-thousands-of-hackers-kyiv-says-RfpGa5zmLtavrot27OWX. [Accessed: May 20, 2022].
- [98] A. Greenberg, “Russia’s sandworm hackers attempted a third blackout in Ukraine,” Wired, Apr. 12, 2022. [Online]. Available: https://www.wired.com/story/sandworm-russia-ukraine-blackout-gru/. [Accessed: Dec. 28, 2023].
- [99] C. Krebbs, “The cyber warfare predicted in Ukraine may be yet to come,” Financial Times, Mar. 20, 2022. [Online]. Available: https://www.ft.com/content/2938a3cd-1825-4013-8219-4ee6342e20ca. [Accessed: May 21, 2022].
- [100] CCDCOE. (2022). World’s largest international live-fire cyber exercise launches in Tallinn. [Online]. Available: https://ccdcoe.org/news/2022/lockedshields-2022-exercise-to-be-launched-next-week/. [Accessed: May 21, 2022].
- [101] CISA. (Apr. 20, 2022). Joint cybersecurity advisory Russian state-sponsored and criminal cyber threats to critical infrastructure. [Online]. Available: https://www.cisa.gov/uscert/sites/default/files/publications/AA22-110A_Joint_CSA_Russian_State-Sponsored_and_Criminal_Cyber_Threats_to_Critical_Infrastructure_4_20_22_Final.pdf. [Accessed: May 19, 2022].
- [102] H. Lin, “Russian cyber operations in the invasion of Ukraine,” Cyber Defense Review, vol. 7, no. 4, pp. 37–38, 2022.
- [103] D. Ong, “Russian general brutally dies in Ukraine: ‘Collected his guts…back in his belly’,” International Business Times, Apr. 27, 2022. [Online]. Available: https://www.ibtimes.com/russian-general-brutally-dies-ukraine-collected-his-gutsback-his-belly-3488076. [Accessed: May 23, 2022].
- [104] J. Grady. (Mar. 18, 2022). Intel sharing between U.S. and Ukraine ‘Revolutionary’ says DIA Director. [Online]. Available: https://news.usni.org/2022/03/18/intel-sharing-between-u-s-and-ukraine-revolutionary-says-dia-director. [Accessed: May 22, 2022].
- [105] N.S. Abdalla, P. H.J. Davies, K. Gustafson, D. Lomas, S. Wagner, “Intelligence and the War in Ukraine,” War on the Rocks, May 11, 2022. [Online]. Available: Part 1: https://warontherocks.com/2022/05/intelligence-and-the-war-in-ukraine-part-1/, Part 2: https://warontherocks.com/2022/05/intelligence-and-the-war-in-ukraine-part-2/. [Accessed: May 22, 2022].
- [106] S. Skove, “Using starlink paints a target on Ukrainian troops,” Defense One, Mar. 23, 2023. [Online]. Available: https://www.defenseone.com/threats/2023/03/using-starlink-paints-target-ukrainian-troops/384361/. [Accessed: Mar 25, 2023].
- [107] B. Smith, “Defending Ukraine: Early lessons from the cyber war,” Microsoft On the Issues, Jun 22, 2022. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/. [Accessed: Jun 23, 2022].
- [108] R. Smith, Elections, Protest, and Authoritarian Regime Stability: Russia 2008–2020. Cambridge: Cambridge University Press, 2020.
- [109] R. Smith, “Vladimir Putin plans to win Russia’s parliamentary election no matter how unpopular his party is,” The Conversation, Aug. 16, 2021. [Online]. Available: https://theconversation.com/vladimir-putin-plans-to-win-russias-parliamentary-election-no-matter-how-unpopular-his-party-is-160078. [Accessed: Jun 18, 2023].
- [110] S. Herman, N. Chomsky, Manufacturing Consent: The Political Economy of the Mass Media. London: Vintage Books, 1994.
- [111] R. DiResta, K. Shaffer, B. Ruppel, D. Sullivan, R. Matney, R. Fox, “The Tactics and Tropes of the Internet Research Agency,” New Knowledge, Dec. 17, 2018. [Online]. Available: https://archive.org/details/5635464-NewKnowledge-Disinformation-Report-Whitepaper/mode/2up. [Accessed: Aug. 26, 2019].
- [112] B. Nimmo, “Anatomy of an info-war: How Russia’s propaganda machine works, and how to counter it,” StopFake, May 19, 2015. [Online]. Available: https://www.stopfake.org/en/anatomy-of-an-info-war-how-russia-s-propaganda-machine-works-and-how-to-counter-it/. [Accessed: Apr. 2, 2023].
- [113] Information manipulation in Russia’s war of aggression against Ukraine: EU lists seven individuals and five entities – Consilium, Consilium, Jul. 28, 2023. [Online]. Available: https://www.consilium.europa.eu/en/press/pressreleases/2023/07/28/information-manipulation-in-russia-s-war-of-aggressionagainst-ukraine-eu-lists-seven-individuals-and-five-entities/. [Accessed: Jul. 30, 2023].
- [114] Committee to Protect Journalists. (2022). Understanding the laws relating to ‘fake news’ in Russia. [Online]. Available: https://cpj.org/wp-content/uploads/2022/07/Guide-to-Understanding-the-Laws-Relating-to-Fake-News-in-Russia.pdf. [Accessed: Mar. 25, 2023].
- [115] G. Faulconbridge, T. Janowski. (Apr. 11, 2022). Russia says West helping Ukraine prepare fake allegations of war crimes. [Online]. Available: https://www.reuters.com/world/europe/russia-says-west-helping-ukraine-prepare-fakeallegations-war-crimes-2022-04-11/. [Accessed: Mar. 25, 2023].
- [116] I. Gaber, “Believing what they are told,” British Journalism Review, vol. 33, no. 3, pp. 22-26, 2022, doi: 10.1177/09564748221121469.
- [117] Tass. (Dec. 23, 2021). Zelensky under the influence of radical elements, says Putin. [Online]. Available: https://tass.com/politics/1380001. [Accessed: Mar. 26, 2023].
- [118] M. Trobridge. (Apr. 13, 2022). Fact check: How to spot a fake military success story. [Online]. Available: https://www.dw.com/en/fact-check-how-to-spot-afake-military-success-story-in-russia-ukraine-war/a-61453500. [Accessed: Mar. 25, 2023].
- [119] O. Dudko, “A conceptual limbo of genocide: Russian rhetoric, mass atrocities in Ukraine, and the current definition’s limits,” Canadian Slavonic Papers, vol. 64, no. 2–3, pp. 133–145, 2022, doi: 10.1080/00085006.2022.2106691.
- [120] T.C. Shea, “Post-Soviet Maskirovka, cold war nostalgia, and peacetime engagement,” Military Review, vol. 82, no. 3, pp. 63–67, 2022.
- [121] J. Landay, “U.S. intelligence assesses Ukraine war has cost Russia 315,000 casualties – source,” Reuters, Dec. 12, 2023. [Online]. Available: https://www.reuters.com/world/us-intelligence-assesses-ukraine-war-has-cost-russia-315000-casualties-source-2023-12-12/. [Accessed: Dec 2023].
- [122] I. Garner, “We’ve got to kill them”: Responses to Bucha on Russian social media groups,” Journal of Genocide Research, vol. 25, Issue 3–4, pp. 41–8–425, 2023, doi: 10.1080/14623528.2022.2074020.
- [123] I. Khaldarova, M. Pantti, “Fake News: The narrative battle over the Ukrainian conflict,” Journalism Practice, vol. 10, no. 7, pp. 891–901, 2016, doi: 10.1080/17512786.2016.1163237.
- [124] EUvsDisinfo. (Nov. 24, 2022). Throwing mud at everyone and hoping some of it sticks. [Online]. Available: https://euvsdisinfo.eu/throwing-mud-at-everyone-and-hoping-some-of-it-sticks/?highlight=mh17. [Accessed: Mar. 26, 2023]
- [125] K. Stepanenko, F.W. Kagan. (Apr. 2, 2023). Russian offensive campaign assessment, Institute for the Study of War. [Online]. Available: https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-april-2-2023. [Accessed: Apr. 6, 2023].
- [126] EUvsDisinfo. About. [Online]. Available: https://euvsdisinfo.eu/about/. [Accessed: Mar. 26, 2023].
- [127] EUvsDisinfo. Ukraine. [Online]. Available: https://euvsdisinfo.eu/ukraine/. [Accessed: Mar. 26, 2023].
- [128] C. Paul, M. Matthews. (2016). The Russian ‘firehose of falsehood’ propaganda model, RAND Corporation. [Online]. Available: https://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE198/RAND_PE198.pdf. [Accessed: Mar. 26, 2023].
- [129] D. Treisman, Ed., The New Autocracy: Information, Politics, and Policy in Putin’s Russia. Washington DC: Brookings Institution Press, 2018.
- [130] Business Ukraine. (Dec. 5, 2015). Interview: U.S. Ambassador Geoffrey Pyatt on Euromaidan, Ukrainian reforms and Kremlin trolls. [Online]. Available: http://bunews.com.ua/interviews/item/interview-us-ambassador-geoffrey-pyatt-oneuromaidan-ukrainian-reforms-and-kremlin-trolls. [Accessed: Apr. 3, 2023].
- [131] K. Giles, “Countering Russian information operations in the age of social media,” Council on Foreign Relations, Nov. 21, 2017. [Online]. Available: https://www.cfr.org/report/countering-russian-information-operations-age-social-media. [Accessed: Oct. 25, 2019].
- [132] BBC News. (Nov. 14, 2017). How Russian bots appear in your timeline. [Online]. Available: https://www.bbc.co.uk/news/technology-41982569. [Accessed: Oct. 25, 2019].
- [133] B. Abeshouse, “Troll factories, bots and fake news: Inside the Wild West of social media,” Al Jazeera, Feb. 8, 2018. [Online]. Available: https://www.aljazeera.com/blogs/americas/2018/02/troll-factories-bots-fake-news-wild-west-social-media-180207061815575.html. [Accessed: Nov. 12, 2019].
- [134] United Nations. (Aug. 22, 2022). ‘Nuclear Sabre-rattling must stop,’ Secretary-General tells Security Council, calling on States to ease tensions, end atomic weapons race, United Nations Press Release. [Online]. Available: https://press.un.org/en/2022/sc15001.doc.htm. [Accessed: Apr. 6, 2023].
- [135] M. Budjeryn. (Nov. 9, 2022). Distressing a system in distress: Global nuclear order and Russia’s war against Ukraine. [Online]. Available: https://thebulletin.org/premium/2022-11/distressing-a-system-in-distress-global-nuclearorder-and-russias-war-against-ukraine/#post-heading. [Accessed: Apr. 6, 2023].
- [136] R.C. Ewing, “Nuclear reactors in a war zone: A new type of weapon?,” Bulletin of the Atomic Scientists, Mar. 7, 2022. [Online]. Available: https://thebulletin.org/2022/03/nuclear-reactors-in-a-war-zone-a-new-type-of-weapon/#post-heading. [Accessed: Apr. 6, 2023].
- [137] Committee on Foreign Relations, United States Senate. (Jan. 10, 2018). Putin’s asymmetric assault on democracy in Russia and Europe: Implications for U.S. national security a minority staff report. [Online]. Available: https://www.foreign.senate.gov/imo/media/doc/FinalRR.pdf. [Accessed: Nov. 5, 2019].
- [138] D. Averre, “The Ukraine Conflict: Russia’s challenge to European security governance,” Europe-Asia Studies, vol. 68, no. 4, pp. 699–725, 2016, doi: 10.1080/09668136.2016.1176993.
- [139] D.W. Kruger. (Dec. 4, 1987). Maskirovka – What’s In It for Us?, Fort Leavenworth, KS: School of Advanced Military Studies. [Online]. Available: https://apps.dtic.mil/dtic/tr/fulltext/u2/a190836.pdf. [Accessed: Jan. 13, 2019].
- [140] T. Kuzio, “Ukraine’s Orange Revolution, the oppositions road to success,” Journal of Democracy, vol. 16, no. 2, pp. 117–130, 2005, doi: 10.1353/jod.2005.0028.
- [141] A. Racks. (2015). Russia’s Hybrid War in Ukraine: Breaking the Enemy’s Ability to Resist. Helsinki: Finnish Institute of International Affairs (FII). [Online]. Available: http://www.fiia.fi/en/publication/514/russia_s_hybrid_war_in_ukraine/. [Accessed: Jan.13, 2019].
- [142] J. Bateman, N. Beecroft, G. Wilde, What the Russian Invasion Reveals About the Future of Cyber Warfare. Washington, DC: Carnegie Endowment for International Peace, Dec. 19, 2022. [Online]. Available: https://carnegieendowment.org/2022/12/19/what-russian-invasion-reveals-about-future-of-cyber-warfare-pub-88667. [Accessed: Dec. 18, 2023].
- [143] J. Goldsmith, “How cyber changes the laws of war,” European Journal of International Law, vol. 24, no. 1, pp. 129–138, 2013, doi: 10.1093/ejil/cht004.
- [144] M. Robinson, K. Jones, H. Janicke, “Cyber Warfare: Issues and Challenges,” Computers & Security, vol. 49, pp. 70–94, 2015, doi: 10.1016/j.cose.2014.11.007.
- [145] M.C. Libicki, “Cyberspace is not a warfighting domain,” Journal of Law and Policy for the Information Society, vol. 8, no. 2, pp. 325–340, 2012.
- [146] P. Cunliffe, The New Twenty Years’ Crisis: 1999–2019. Montreal: McGill-Queens University Press, 2020.
- [147] J.L. Gaddis, “International relations theory and the end of the Cold War,” International Security, vol. 17, no. 3, pp. 5–58, 1992–1993, doi: 10.2307/2539129.
- [148] M. Galeotti, “(Mis)understanding Russia’s two ‘hybrid wars’,” Critique & Humanism, vol. 59, no. 1, p. 5, 2018. Reprinted in Eurozine. Available: https://www.eurozine.com/misunderstanding-russias-two-hybrid-wars/?pdf.
- [149] House of Commons Foreign Affairs Committee. (Jul. 18, 2023). Guns for gold: The Wagner Network exposed, Seventh Report of Session 2022–23. [Online]. Available: https://committees.parliament.uk/publications/41073/documents/200048/default/. [Accessed: Jul. 26, 2023
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-6835b711-aaf9-4d44-90a8-aa1a8a5ca742
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.