All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1201397",
"signature": "Article:1201397",
"url": "https://staging.dailymaverick.co.za/article/2022-03-09-a-war-on-infinite-fronts-russia-ukraine-and-the-double-whammy-of-hybrid-warfare/",
"shorturl": "https://staging.dailymaverick.co.za/article/1201397",
"slug": "a-war-on-infinite-fronts-russia-ukraine-and-the-double-whammy-of-hybrid-warfare",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "A war on infinite fronts — Russia, Ukraine and the double whammy of ‘hybrid warfare’",
"firstPublished": "2022-03-09 22:58:11",
"lastUpdate": "2022-03-09 22:58:11",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "38",
"name": "World",
"signature": "Category:38",
"slug": "world",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/world/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "368744",
"name": "Ukraine Crisis",
"signature": "Category:368744",
"slug": "ukraine-crisis",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/ukraine-crisis/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": false
}
],
"content_length": 9215,
"contents": "<span style=\"font-weight: 400;\">President Vladimir Putin’s 2022 Russian military operation to “denazify” and demilitarise Ukraine provides war analysts with an insight into future warfare, but more so, new add-ons into war doctrines.</span>\r\n\r\n<span style=\"font-weight: 400;\">Previously, before the advent of digital technologies, superior airstrikes paved the way for ground forces. Cyberattacks against the enemy’s critical infrastructure, such as communication and national security apparatus, however, take precedence in today’s digitally dominated realm. The aim is to blind the enemy to the oncoming military onslaught.</span>\r\n\r\n<span style=\"font-weight: 400;\">While pro-Russia and pro-Ukraine forces are engaged in postmodernist arguments, debating whether Russia’s security concerns justified its invasion of Ukraine or whether Ukraine is truly a victim of Russia’s expansionary designs, in practice the use of cyber capabilities for the war effort is one area in which they both converge. Cyber vigilantism is on the rise, as autonomous international and domestic hacker groups join war efforts in support of victim states. Some are driven by a sense of patriotism.</span>\r\n\r\n<span style=\"font-weight: 400;\">In contemporary military operations, overflowing as they are with digital technologies, the actual war characterised by bullets and missiles tends to be ushered in by cyberattacks (i.e. early warning systems). Countries often deploy cyber capabilities to facilitate a grand entrance to their military in the more traditional form of boots and helmets. For example, when erstwhile US president George Bush announced on 20 March 2003 that the US military would begin military operations in Iraq, the rationale of the invasion was to locate weapons of mass destruction and end what the West called Saddam Hussein’s dictatorship against the Iraqi people.</span>\r\n\r\n<span style=\"font-weight: 400;\">Before the US put boots on the ground in Iraq, the latter had its</span><a href=\"https://link.springer.com/article/10.1007/s13347-017-0271-5\"> <span style=\"font-weight: 400;\">computer networks, internet grid and radar systems</span></a><span style=\"font-weight: 400;\"> crippled by the US military command. The crippling of Iraq’s computer systems was to blind its political and military leaders to the oncoming military attacks, weakening their military strategy and response. In other words, the cyberattacks in Iraq were used to make it difficult for Iraq’s top brass to communicate and coordinate a military response effectively. Iraq was caught flat-footed, hence the US experienced episodes of military victories during the early days of the war effort.</span>\r\n\r\n<span style=\"font-weight: 400;\">Again, in 2007, Israel obscured (or hacked, to be more blunt) Syria’s air defence systems before sending fighter jets to demolish the supposed nuclear facility in Diaya-al-Sahir. Cyber capabilities are often used for military operations, but as enablers, not as primary actors.</span>\r\n\r\n<span style=\"font-weight: 400;\">The ubiquitous nature of information and communication technologies, having grown steadily even by 2000s standards, means cyber offences are also available to vigilantes. In this respect, states no longer have the exclusive right to declare another state’s behaviour as atrocious and determine appropriate retaliatory measures.</span>\r\n\r\n<span style=\"font-weight: 400;\">As demonstrated by the international hacker group Anonymous, cyber vigilantism continues to challenge states’ monopoly on retaliation (i.e. the use of force). For example, in 2011, Anonymous took the US Central Intelligence Agency website down in retaliation for the US involvement in the 2010 Stuxnet virus that crippled Iran’s nuclear programme. Even before Iran tailored a retaliatory package, Anonymous had a head start.</span>\r\n\r\n<span style=\"font-weight: 400;\">Here, there is double jeopardy on the perpetrator state: it stands to be attacked by vigilantes as well as by the actual victim state. Consequently, the principle of proportionality disappears under dormancy due to double jeopardy. The ultimate result of double jeopardy is that while the perpetrator state would ordinarily accept retaliation from the injured state, it finds itself wounded beyond cause, breeding the possibility of a second attack against the initially injured state.</span>\r\n\r\n<span style=\"font-weight: 400;\">Closer to home, Anonymous went on a doxing spree publishing an estimated 16,000</span><a href=\"https://www.wired.co.uk/article/south-africa-whistleblower-leak\"> <span style=\"font-weight: 400;\">whistle-blower files hacked from SAPS systems</span></a><span style=\"font-weight: 400;\"> in 2013 to protest the killing of 34 striking miners by police officers during the Marikana strike on 16 August 2012.</span>\r\n\r\n<span style=\"font-weight: 400;\">Thus, the internet provides tools to hold states to account. Domestic and international court systems no longer have a monopoly on holding faulty leaders and government policies to account.</span>\r\n\r\n<span style=\"font-weight: 400;\">In another cyberattack, three South African government websites were defaced in 2012 by hacker groups sympathetic to Morocco. The attacks began with the Department of Social Development website in December 2012. Hackers claimed the South African government’s websites got defaced because the nation supported Western Sahara independence against Morocco’s wishes. While Morocco could use diplomatic efforts, such as blocking motions beneficial to South Africa in the African Union and frustrating South Africa’s efforts in regional and international bodies, the latter suffers from double jeopardy when cyber vigilantism is added to the mix.</span>\r\n\r\n<span style=\"font-weight: 400;\">While the international community’s outcry about the invasion of Ukraine began after seeing Russian missiles and tanks used against Ukrainian military posts on 24 February 2022, Ukraine as a state had begun to feel the noose getting tighter through cyberattacks on its internet apparatus. Preceding the invasion day, Ukraine started to experience distributed denial of service attacks (DDoS) on significant websites (a clear indication in modern warfare that war is afoot). Researchers at the ESET, the international cybersecurity firm, registered “wiper attacks” on Ukrainian computers, with malware intending to render the computer networks out of commission by wiping data from the networks.</span>\r\n\r\n<span style=\"font-weight: 400;\">Responding to the invasion, Anonymous declared a “cyberwar” against Russia. Various Russian websites were taken down, including the</span><a href=\"https://thebarentsobserver.com/en/security/2022/02/anonymous-takes-down-websites-defense-ministry-rt-and-kremlin\"> <span style=\"font-weight: 400;\">Ministry of Defence and the </span><i><span style=\"font-weight: 400;\">Russia Today</span></i><span style=\"font-weight: 400;\"> news website</span></a><span style=\"font-weight: 400;\">, through DDoS attacks by the group. With the advent of cyber vigilantism, we observe that peace efforts can be frustrated. States might be willing to negotiate, but how do we “ask” cyber vigilante groups to stop their efforts? How do we plead with nationalist cyber groups to give diplomacy a chance?</span>\r\n\r\n<span style=\"font-weight: 400;\">Russian vigilante groups have also taken up “cyber arms”. There have been reports of Kremlin-aligned hacker groups and individuals targeting Ukrainian</span><a href=\"https://www.bbc.com/news/technology-60528594\"> <span style=\"font-weight: 400;\">government websites, banks and army websites</span></a><span style=\"font-weight: 400;\"> in DDoS attacks. In a show of patriotism and advanced computer wizardly, on 2 March 2022, a pro-Russian hacker group named Killnet boasted of taking down the website belonging to the Anonymous hacker group for the latter’s declaration of cyberwar against Russia. The Killnet group also took down</span><a href=\"https://www.rt.com/russia/551080-killnet-hackers-anonymous-retaliation-russia/\"> <span style=\"font-weight: 400;\">websites belonging to Ukrainian president Volodymyr Zelensky</span></a><span style=\"font-weight: 400;\">, blaming Zelensky for “adopting wrong policies”, presumably against Moscow.</span>\r\n\r\n<span style=\"font-weight: 400;\">Another Russian hacker group, the Conti ransomware group, has threatened cyber retaliation against all states adopting hostile policies, i.e. sanctions, against Russia. In addition, the Conti group, which is considered ideologically linked to Kremlin, has threatened to weaponise its</span><a href=\"https://www.afr.com/politics/federal/world-s-most-prolific-hacking-gang-threatens-ukrainian-allies-20220227-p5a00o\"> <span style=\"font-weight: 400;\">offensive cyber capabilities</span></a><span style=\"font-weight: 400;\"> should Russian critical infrastructure be targeted by Western sympathisers.</span>\r\n\r\n<span style=\"font-weight: 400;\">Ukrainian internet and computer networks are fair game to the advanced Russian state’s offensive cyber capabilities and nationalists in Russia with cyber capabilities, with the latter not prone to the restraints of the internationally renowned “responsible state behaviour” doctrine.</span>\r\n\r\n<span style=\"font-weight: 400;\">The introduction of cyber vigilantism enabled by the ubiquitous cyberspace challenges the Westphalian state-led global system, putting shame on national borders and domestic authorities. While the internet is prone to benevolence, it remains a challenge to states, especially during war times. Individuals or groups with advanced computer skills can hold states hostage in cyberspace.</span>\r\n\r\n<span style=\"font-weight: 400;\">Through the ostensibly coercive cyber vigilantism, states are compelled to conform to accepted standards established not in the United Nations’ corridors and halls, but by faceless computer capable groups and individuals online. States intending not to follow what is acceptable to the faceless vigilantes will have to enhance their cybersecurity systems against advanced computer groups beholden to no state, but to principles of justice, equality, and peace.</span>\r\n\r\n<span style=\"font-weight: 400;\">The pre-emptive cyber strikes also compel states to enhance their cybersecurity systems, especially on critical infrastructure, for war. As Ukraine found out in February 2022, these can come about at any time, with internet and computer networks being the primary target in military operations.</span>\r\n\r\n<span style=\"font-weight: 400;\">The future of warfare has a major cybersecurity component, with states in possession of cyber offences likely to dictate the path of war.</span>\r\n\r\n<span style=\"font-weight: 400;\">In the same vein, states with hardened cybersecurity systems will in future have to face the enemy on the battlefield, with the enemy having failed to gain an advantage through cybersecurity and forced into a symmetrical war where cyber vigilantism is also nullified. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">The writers are researchers with the 4IR and Digital Policy Research Unit (4DPRU) at the University of Johannesburg. They write in their personal capacities.</span></i>\r\n\r\n \r\n\r\n[hearken id=\"daily-maverick/9264\"]",
"teaser": "A war on infinite fronts — Russia, Ukraine and the double whammy of ‘hybrid warfare’",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "248371",
"name": "Mancha Johannes Sekgololo, Neo Letswalo and Bhaso Ndzendze",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/mancha-johannes-sekgololo-neo-letswalo-and-bhaso-n/",
"editorialName": "mancha-johannes-sekgololo-neo-letswalo-and-bhaso-n",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "4558",
"name": "Marikana",
"url": "https://staging.dailymaverick.co.za/keyword/marikana/",
"slug": "marikana",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Marikana",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5966",
"name": "Russia",
"url": "https://staging.dailymaverick.co.za/keyword/russia/",
"slug": "russia",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Russia",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10510",
"name": "Anonymous",
"url": "https://staging.dailymaverick.co.za/keyword/anonymous/",
"slug": "anonymous",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Anonymous",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12331",
"name": "Ukraine",
"url": "https://staging.dailymaverick.co.za/keyword/ukraine/",
"slug": "ukraine",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ukraine",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "61866",
"name": "Stuxnet",
"url": "https://staging.dailymaverick.co.za/keyword/stuxnet/",
"slug": "stuxnet",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Stuxnet",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "369788",
"name": "cyber warfare",
"url": "https://staging.dailymaverick.co.za/keyword/cyber-warfare/",
"slug": "cyber-warfare",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyber warfare",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "369789",
"name": "Diaya-al-Sahir",
"url": "https://staging.dailymaverick.co.za/keyword/diayaalsahir/",
"slug": "diayaalsahir",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Diaya-al-Sahir",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "26973",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/qzxzw_sBdPZuMy9eb4idc0y0LAY=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/MzsirMPKpBMrAmK2h38ebjGY4eM=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/nt0crSLDFAX7oMePbpIdPmi3puE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/SFU4dUK8jf5U_qyoetWqSgbd-04=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/32d2kT_9ZnW7hWjtYiwCQhh4l7s=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/qzxzw_sBdPZuMy9eb4idc0y0LAY=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/MzsirMPKpBMrAmK2h38ebjGY4eM=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/nt0crSLDFAX7oMePbpIdPmi3puE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/SFU4dUK8jf5U_qyoetWqSgbd-04=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/32d2kT_9ZnW7hWjtYiwCQhh4l7s=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"type": "image"
}
],
"summary": "The future of warfare has a major cybersecurity component, with states in possession of cyber offences being the ones most likely to dictate the path of war.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "A war on infinite fronts — Russia, Ukraine and the double whammy of ‘hybrid warfare’",
"search_description": "<span style=\"font-weight: 400;\">President Vladimir Putin’s 2022 Russian military operation to “denazify” and demilitarise Ukraine provides war analysts with an insight into future warfare, but more so",
"social_title": "A war on infinite fronts — Russia, Ukraine and the double whammy of ‘hybrid warfare’",
"social_description": "<span style=\"font-weight: 400;\">President Vladimir Putin’s 2022 Russian military operation to “denazify” and demilitarise Ukraine provides war analysts with an insight into future warfare, but more so",
"social_image": ""
},
"cached": true,
"access_allowed": true
}