Intelligence, information warfare, cyber warfare, electronic warfare – what they are and how Russia is using them in Ukraine
Russian forces have the capability to jam signals from satellites, affecting communications and navigation. Vitaly V. Kuzmin/Wikimedia, CC BY-NC-SA
Justin Pelletier, Rochester Institute of Technology
Russia has one of the most capable and technological militaries on the planet. They have advanced intelligence, information warfare, cyber warfare and electronic warfare capabilities.
Russia has used these technologies in recent years in combat in Syria and the Donbas region in eastern Ukraine, and is using them in its current invasion of Ukraine.
The terms “intelligence,” “information,” “cyber” and “electronic” denote distinct but overlapping fields. As a cybersecurity professor of practice, I can explain what they are and how Russia is using them in Ukraine.
Intelligence and counterintelligence in the information age
The role of intelligence is to gain insight about the enemy’s activity. The role of counterintelligence is to blind the enemy or distort his view. Automation in intelligence surveillance and reconnaissance – key functions of intelligence in warfare – has become a common practice for modern militaries.
Intelligence services collect vast amounts of data from open-source intelligence (OSINT) – information collected from news, social media and other publicly available sources – as well as secret sources, and use artificial intelligence to analyze the information.
Russia has reportedly progressed faster at integrating AI in intelligence systems than the U.S. expected them to. It’s impossible to know what information Russia has collected, but its access to OSINT, spy satellites, operatives in Ukraine, powerful computers and experienced analysts makes it likely that Russia has extensive intelligence about Ukraine’s military and political situation.
Information and disinformation
Information warfare is the battle waged in the news media and on social media to bolster popular support; persuade and induce the sympathy of potential allies; and simultaneously spread confusion, uncertainty and distrust in the enemy’s population.
Russia has used and is likely to continue to use cyber operations to subvert the Ukrainian government. For example, in the weeks leading up to both the 2014 and 2022 invasions, Ukrainian soldiers were targeted with disinformation designed to sow confusion and disorder in the event of an attack.
Russian messaging about “liberating” portions of Ukraine is the disinformation most likely aimed at an international audience, and I expect attempts to legitimize Russia’s actions will continue.
There is an ongoing contest to control the narrative about what is happening in Ukraine. Russia is running an active disinformation campaign and I expect it is using AI to find and generate content at a rapid rate.
Some information circulating on social media, like this video purporting to show Russian bombers over Ukraine, has been proven to be fake. This underscores how difficult it is to be certain of the truth with a high volume of fast-changing information in an emotionally charged, high-stakes situation like warfare.
Cyber warfare entails infiltrating and disrupting the enemy’s computer systems. This includes generating denial of service attacks to block access to websites, breaking into computer systems to steal or destroy data, and taking control of computer systems to disrupt critical infrastructure like power grids.
U.S. and U.K. intelligence agencies reported on Feb. 23, 2022 that hackers based in Russia had unleashed a powerful new type of malware against targets in Ukraine. The attacks appear to have been targeted at Ukrainian government and telecommunications facilities, including the Ministry of Internal Affairs, and involve the theft and destruction of data.
Russia’s invasion of Ukraine was preceded by several weeks of cyberattacks, including an attack that posted a fake ransomware note and then destroyed data. These attacks were part of a multi-year campaign of cyber warfare against Ukraine, which included attacks on portions of the country’s power grid. https://www.youtube.com/embed/Bc5mxd4O1SI?wmode=transparent&start=0 Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency, discusses Russian cyberattacks against Ukraine.
A rapid response team of cybersecurity experts in the European Union has mobilized to assist Ukraine in defending against cyberattacks by detecting when attacks are occurring. The Ukrainian government has also called on the Ukrainian hacker community to help defend the country, by protecting computer systems that control critical infrastructure like the power grid.
Electronic warfare describes efforts to disrupt or misdirect the enemy’s electronic systems like radar and communications networks. It can include blocking radio signals, remotely destroying computer circuits and spoofing GPS signals to disrupt navigation.
Russia has a long history of controlling the electromagnetic spectrum. Because of Russia’s advanced electronic warfare capabilities, its force may be able to take down the internet and cell towers using a range of techniques.
Russia has used systems that interfere with the signal reception from satellites in eastern Ukraine. These systems can be used to block communications and disrupt control of drones.
Mastering new technologies
The old game of spycraft has taken on new technologies, but I think it is useful to remember that the ability to win wars during revolutions in military affairs is generally determined by the ability to integrate new technologies into a country’s military and intelligence operations.
Though the Russian military has shown some interesting technological innovations in recent years, it’s not clear whether it has mastered this new way of conducting warfare.
[Like what you’ve read? Want more? Sign up for The Conversation’s daily newsletter.]
Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of Technology
This article is republished from The Conversation under a Creative Commons license. Read the original article.