Abstract

ABSTRACT After Russia’s massive Cyber-attacks on Ukraine’s government and bank sectors in January–February 2022, many analysts alleged that Cyber-power would be a crucial component of Russia’s military victory in Ukraine. Contrary to these expectations, however, Russian Cyber-intrusions yielded meagre strategic benefits, with Moscow seemingly prioritising conventional warfare and destruction of energy and civilian infrastructure instead. Using a theory of asymmetric conflict, this paper argues, somewhat counterintuitively, that the reason behind inhibited efficacy of Russian Cyber-operations post-2022 are Moscow’s prior Cyber-attacks against Ukraine since 2013. While having helped the Kremlin weaken Ukraine’s Cyber-networks and collect local intelligence, these antecedent Cyber-operations have provided a two-pronged learning loop: for Ukraine to cultivate habits of mitigating Russian Cyber-threats, and for Russia to acquire habits of relying on information operations more than on destructive Cyber-attacks. This “pedagogical” mechanism ultimately enabled Ukraine to redress its Cyber-asymmetry with Russia and deny Moscow success in its Cyber-intrusions post-2022.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.