The Times Real Estate


.

  • Written by Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of Technology
Intelligence, information warfare, cyber warfare, electronic warfare – what they are and how Russia is using them in Ukraine

Russia has one of the most capable and technological militaries[1] on the planet. They have advanced intelligence, information warfare, cyber warfare and electronic warfare capabilities.

Russia has used these technologies in recent years in combat in Syria[2] and the Donbas region[3] in eastern Ukraine, and is using them in its current invasion of Ukraine.

The terms “intelligence,” “information,” “cyber” and “electronic” denote distinct but overlapping fields. As a cybersecurity professor of practice[4], I can explain what they are and how Russia is using them in Ukraine.

Intelligence and counterintelligence in the information age

The role of intelligence is to gain insight about the enemy’s activity. The role of counterintelligence is to blind the enemy or distort his view. Automation in intelligence surveillance and reconnaissance – key functions of intelligence in warfare – has become a common practice for modern militaries[5].

Intelligence services collect vast amounts of data from open-source intelligence[6] (OSINT) – information collected from news, social media and other publicly available sources – as well as secret sources, and use artificial intelligence to analyze the information[7].

Russia has reportedly progressed faster at integrating AI in intelligence systems than the U.S. expected[8] them to. It’s impossible to know what information Russia has collected, but its access to OSINT, spy satellites, operatives in Ukraine, powerful computers and experienced analysts makes it likely that Russia has extensive intelligence about Ukraine’s military and political situation.

Information and disinformation

Information warfare is the battle waged in the news media and on social media to bolster popular support; persuade and induce the sympathy of potential allies; and simultaneously spread confusion, uncertainty and distrust in the enemy’s population.

Russia has used and is likely to continue to use cyber operations to subvert the Ukrainian government. For example, in the weeks leading up to both the 2014 and 2022 invasions, Ukrainian soldiers were targeted with disinformation[9] designed to sow confusion and disorder in the event of an attack.

Russian messaging about “liberating” portions of Ukraine[10] is the disinformation most likely aimed at an international audience, and I expect attempts to legitimize Russia’s actions will continue.

There is an ongoing contest to control the narrative about what is happening in Ukraine. Russia is running an active disinformation campaign[11] and I expect it is using AI to find and generate content at a rapid rate.

Some information circulating on social media, like this video purporting to show Russian bombers over Ukraine[12], has been proven to be fake[13]. This underscores how difficult it is to be certain of the truth[14] with a high volume of fast-changing information in an emotionally charged, high-stakes situation like warfare.

Cyber warfare

Cyber warfare entails infiltrating and disrupting the enemy’s computer systems. This includes generating denial of service attacks to block access to websites, breaking into computer systems to steal or destroy data, and taking control of computer systems to disrupt critical infrastructure like power grids.

U.S. and U.K. intelligence agencies reported on Feb. 23, 2022 that hackers based in Russia had unleashed a powerful new type of malware[15] against targets in Ukraine. The attacks appear to have been targeted at Ukrainian government and telecommunications facilities[16], including the Ministry of Internal Affairs, and involve the theft and destruction of data.

Russia’s invasion of Ukraine was preceded by several weeks of cyberattacks[17], including an attack that posted a fake ransomware note and then destroyed data[18]. These attacks were part of a multi-year campaign of cyber warfare against Ukraine[19], which included attacks on portions of the country’s power grid[20].

Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency, discusses Russian cyberattacks against Ukraine.

A rapid response team of cybersecurity experts in the European Union has mobilized to assist Ukraine[21] in defending against cyberattacks by detecting when attacks are occurring. The Ukrainian government has also called on the Ukrainian hacker community[22] to help defend the country, by protecting computer systems that control critical infrastructure like the power grid.

Electronic warfare

Electronic warfare describes efforts to disrupt or misdirect the enemy’s electronic systems like radar and communications networks. It can include blocking radio signals, remotely destroying computer circuits[23] and spoofing GPS signals[24] to disrupt navigation.

Russia has a long history of controlling the electromagnetic spectrum. Because of Russia’s advanced electronic warfare capabilities[25], its force may be able to take down the internet and cell towers using a range of techniques.

Russia has used systems that interfere with the signal reception from satellites[26] in eastern Ukraine. These systems can be used to block communications and disrupt control of drones.

Mastering new technologies

The old game of spycraft has taken on new technologies, but I think it is useful to remember that the ability to win wars during revolutions in military affairs is generally determined by the ability to integrate new technologies[27] into a country’s military and intelligence operations.

Though the Russian military has shown some interesting technological innovations in recent years, it’s not clear whether it has mastered this new way of conducting warfare.

[Like what you’ve read? Want more? Sign up for The Conversation’s daily newsletter[28].]

References

  1. ^ technological militaries (www.c4isrnet.com)
  2. ^ in Syria (www.thedefensepost.com)
  3. ^ the Donbas region (www.uawire.org)
  4. ^ cybersecurity professor of practice (scholar.google.com)
  5. ^ common practice for modern militaries (autoisr.dsigroup.org)
  6. ^ open-source intelligence (theconversation.com)
  7. ^ use artificial intelligence to analyze the information (www.afcea.org)
  8. ^ faster at integrating AI in intelligence systems than the U.S. expected (www.c4isrnet.com)
  9. ^ targeted with disinformation (www.politico.com)
  10. ^ “liberating” portions of Ukraine (www.reuters.com)
  11. ^ running an active disinformation campaign (www.politico.com)
  12. ^ purporting to show Russian bombers over Ukraine (gizmodo.com)
  13. ^ proven to be fake (www.wwltv.com)
  14. ^ how difficult it is to be certain of the truth (apnews.com)
  15. ^ unleashed a powerful new type of malware (www.theguardian.com)
  16. ^ targeted at Ukrainian government and telecommunications facilities (www.bloomberg.com)
  17. ^ several weeks of cyberattacks (www.npr.org)
  18. ^ an attack that posted a fake ransomware note and then destroyed data (www.microsoft.com)
  19. ^ campaign of cyber warfare against Ukraine (theconversation.com)
  20. ^ portions of the country’s power grid (www.wired.com)
  21. ^ mobilized to assist Ukraine (www.bbc.com)
  22. ^ called on the Ukrainian hacker community (www.usnews.com)
  23. ^ remotely destroying computer circuits (theconversation.com)
  24. ^ spoofing GPS signals (www.thedrive.com)
  25. ^ advanced electronic warfare capabilities (defensionem.com)
  26. ^ interfere with the signal reception from satellites (www.uawire.org)
  27. ^ ability to integrate new technologies (doi.org)
  28. ^ Sign up for The Conversation’s daily newsletter (memberservices.theconversation.com)

Authors: Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of Technology

Read more https://theconversation.com/intelligence-information-warfare-cyber-warfare-electronic-warfare-what-they-are-and-how-russia-is-using-them-in-ukraine-177899

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more