Acceso abierto

Russian Aggression on Ukraine: Cyber Operations and the Influence of Cyberspace on Modern Warfare


Cite

1. Andress, J., and Winterfeld, S., 2014. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Edition). Waltham: Elsevier. Search in Google Scholar

2. Brantly, A., and Smeets, M., 2020. Military Cyber Operations. In A. McD Sookermany, Handbook of Military Sciences (pp 1-13). Cham: Springer. Search in Google Scholar

3. Brikše, I., 2006. The information environment: theoretical approaches and explanations, Informācijas vide Latvijā: 21. gadsimta sākums.: 2006. Retrieved from University of Latvia: https://www.szf.lu.lv/fileadmin/user_upload/szf_faili/Petnieciba/sppi/mediji/intabrikse_anglu.pdf, 10 February 2022. Search in Google Scholar

4. Burgess, M., 2022, 24 March. A mysterious satellite hack has victims far beyond Ukraine. Retrieved from Wired: https://www.wired.com/story/viasat-internet-hack-ukraine-russia/, 24 March 2022. Search in Google Scholar

5. Burgess, M., 2022 A, 27 February. Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory. Retrieved from Wired: https://www.wired.com/story/ukraine-it-army-russia-war-cyberattacks-ddos/, 2 March 2022. Search in Google Scholar

6. Cerulus, L., 2022, 10 March. Kyiv’s hackers seize their wartime moment. Retrieved from Politico: https://www.politico.eu/article/kyiv-cyber-firm-state-backed-hacking-group/, 10 March 2022. Search in Google Scholar

7. Chivvis, C. S., 2017. Understanding Russian »Hybrid Warfare« and What Can be Done About It. Santa Monica: RAND. Search in Google Scholar

8. Cigler, M., 2016. Hibridna varnost in M. Malešič, Konvencionalna in hibridna varnost: vzorci (dis)kontiuitete (pp 75-95). Ljubljana: Fakulteta za družbene vede. Search in Google Scholar

9. Clark, D., 2010. Characterizing cyberspace: past, present and future. ECIR Working Paper, Massachusetts Institute of Technology. Massachusetts: Cambridge. Search in Google Scholar

10. Clausewitz, V. C., 1989. On War. New Yersey: Princeton. Search in Google Scholar

11. Deibert, R. J., Rohozinski, R., Crete-Nishihata, M., 2012, February. Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War. Security Dialogue Vol. 43, No. 1, pp 3-24. Search in Google Scholar

12. European External Action Service, 2018. A Europe That Protects: Countering Hybrid Threats. Brussels: European External Action Service. Search in Google Scholar

13. Fendorf, K., and Miller, J., 2022, 24 March. Tracking Cyber Operations and Actors in the Russia-Ukraine War. Retrieved from Council on Foreign Affairs: https://www.cfr.org/blog/tracking-cyber-operations-and-actors-russia-ukraine-war, 26 March 2022. Search in Google Scholar

14. Funakoshi, M., Lawson, H., Deka, K., 2022, 28 March. Tracking sanctions against Russia. Retrieved from Reuters: https://graphics.reuters.com/UKRAINE-CRISIS/SANCTIONS/byvrjenzmve/, 30 March 2022. Search in Google Scholar

15. Galeotti, M., 2018, 5 March. I’m Sorry for Creating the ‘Gerasimov Doctrine’. Retrieved from Foreign Policy: https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-thegerasimov-doctrine/, 10 March 2022. Search in Google Scholar

16. Geneva Internet Platform Digiwatch, 2022, 27 March. Ukraine conflict: Digital and cyber aspects. Retrieved from Geneva Internet Platform Digiwatch: https://dig.watch/trends/ukraine-conflict-digital-and-cyber-aspects, 29 March 2022. Search in Google Scholar

17. Giles, A., 2020. Valery Gerasimov’s Doctrine: From Soviet armor officer to strategic mastermind? Potsdam: Universität Potsdam. Search in Google Scholar

18. Giles, K., 2015. Russia and its Neighbours: Old attitudes, New capabilities. In K. Geers, Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine (pp 67-77). Tallin: CCDCOE. Search in Google Scholar

19. Github, 2022, 27 March. Ukraine-Cyber-Operations. Retrieved from Github: https://github.com/curated-intel/Ukraine-Cyber-Operations, 20 March 2022. Search in Google Scholar

20. Gray, C. S., 2013. Making strategic sense of cyber power: Why the sky is not falling. Carlisle: Strategic Studies Institute and U.S. Army War College Press, Army War College. Search in Google Scholar

21. Grizold, A., and Bučar, B., 2011. Knjižna zbirka Teorija in praksa: Izzivi sodobne varnosti: od nacionalne in mednarodne do človekove varnosti. Teorija in praksa, 827-851. Search in Google Scholar

22. Harknett, J. R., and Smeets, M., 2020, 4 March. Cyber campaigns and strategic outcomes. Journal of Strategic Studies, pp 1-34. Search in Google Scholar

23. Hoffman, G. F., 2007. Conflict in the 21st century: The rise of Hybrid wars. Arlington: Potomac Institute for Policy Studies Arlington. Search in Google Scholar

24. Indian Foreign Affairs, 2022, 6 March. Hybrid Warfare : A New Face of Warfare. Retrieved from Indian Foreign Affairs: https://indianforeignaffairs.com/hybrid-warfare-anew-face-of-war-in-the-modern-world/, 10 March 2022. Search in Google Scholar

25. Joint Chief of Staff, 2014. Joint Publication 3-13: Information Operations. Chairman of the Joint Chief of Staff. Search in Google Scholar

26. Kaitseliit., 2022, 20 March. Estonian Defence League. Retrieved from Kaitseliit: https://www.kaitseliit.ee/en/edl, 20 March 2022. Search in Google Scholar

27. Kallberg, J., Spring 2016. Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber. The Cyber Defense Review, Vol. 1, No. 1, 113-128. Search in Google Scholar

28. Kello, L., 2013. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security, Vol. 38, No. 2, pp 4-40. Search in Google Scholar

29. Krepinevich, F., A., 2012. Cyber Warfare A »Nuclear Option ˮ?. Washington: Center for Strategic and Budgetary Assessments. Search in Google Scholar

30. Kuehl, T. D., 2009. From Cyberspace to Cyberpower: Defining the Problem. In D. F. Kramer, H. S. Starr, and K. l. Wentz, Cyberpower and National Security (pp 3-24). Washington DC: National Defense University Press. Search in Google Scholar

31. Libicki, C. M., 2009. Cyberdeterrence and Cyberwar. Santa Monica: RAND. Search in Google Scholar

32. Liebetrau, T., 2022. Cyber conflict short of war: a European strategic vacuum. European Security, 1-21. Search in Google Scholar

33. Madnick, S., 2022, 7 March. What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare. Retrieved from Harvard Business Review: https://hbr.org/2022/03/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-ofcyber-warfare, 8 March 2022. Search in Google Scholar

34. Maschmeyer, L., & Kostyuk, N., 2022, 8 February. There Is No Cyber ‘Shock And Awe’: Plausible Threats In The Ukrainian Conflict. Retrieved from War on the rocks: https://warontherocks.com/2022/02/there-is-no-cyber-shock-and-awe-plausible-threats-in-the-ukrainian-conflict/, 13 March 2022. Search in Google Scholar

35. McKew, K. M., 2017, 5 September. The Gerasimov Doctrine. Retrieved from Politico: https://www.politico.com/magazine/story/2017/09/05/gerasimov-doctrine-russia-foreign-policy-215538/, 20 March 2022. Search in Google Scholar

36. Milmo, D., 2022, 27 February. Anonymous: the hacker collective that has declared cyberwar on Russia. Retrieved from The Guardian: https://www.theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia, 4 March 2022. Search in Google Scholar

37. Ministry of Defence Shrivenham, July 2016. Cyber Primer, (2nd Edition). Ministry of Defence Shrivenham. Search in Google Scholar

38. MoD France, September 2019. International Law Applied to Operations in Cyberspace. MoD France. Search in Google Scholar

39. Murphy, M., 2016. Understanding Russia’s Concept for Total War in Europe. Washington DC: The heritage Fundation. Search in Google Scholar

40. Ophardt, A. J., 2010. Cyber warfare and the crime of aggression: The need for individual accountability on tomorrow´s battlefield. Duke Law & Technology Review, No. 3, 1-27. Search in Google Scholar

41. Orye, E., and Maennel, M. O., 2019. Recommendations for Enhancing the Results of Cyber Effects. 11th International Conference on Cyber Conflict: Silent Battle (pp 1-19). Tallinn: CCDCOE. Search in Google Scholar

42. Porche III, R. I., 2016. Emerging Cyber Threats and Implications. Santa Monica: RAND. Search in Google Scholar

43. Probert, E., 2021, 25 August. Organisational Structures & Incident Management for Cybersecurity in the America. Retrieved from ITU: SlideShare: https://www.slideshare.net/DrDavidProbert/saltaworkshop1v12, 10 March 2022. Search in Google Scholar

44. Rácz, A., 2015. Russia’s Hybrid War in Ukraine: Breaking the Enemy’s Ability to Resist, FIIA Report 43. Helsinki: The Finnish Institute of International Affairs. Search in Google Scholar

45. Rid, T., 2013. Cyber War Will Not Take Place. New York: Oxford. Search in Google Scholar

46. Rumer, E., 2019, 5 June. The Primakov (Not Gerasimov) Doctrine in Action. Carnegie Endowment for International Peace, 1-30. Retrieved from Carnegie Endowment for International Peace: https://carnegieendowment.org/2019/06/05/primakov-notgerasimov-doctrine-in-action-pub-79254, 10 March 2022. Search in Google Scholar

47. Sārts, J., 2022, 8 March. #StratComPodcast/S2E2:#StratCom and Modern Warfare. Retrieved from NATO Strategic Communications Centre of Excellenc: https://open.spotify.com/episode/54w6pDaUemFp6je4iPJehr, 10 March 2022. Search in Google Scholar

48. Schmitt, N. M., 2017. Tallinn manual 2.0 on the international law applicable to cyber operations, Second edition. Cambridge: Cambridge. Search in Google Scholar

49. Sherman, J., 2022, 24 February. Russia’s Cyber Threat to Ukraine Is Vast—and Underestimated. Retrieved from Wired: https://www.wired.com/story/russias-cyber-threat-to-ukraine-is-vast-and-underestimated/, 20 March 2022. Search in Google Scholar

50. SOC Radar, 2022, 28 February. What You Need to Know About Russian Cyber Escalation in Ukraine. Retrieved from SOC Radar: https://socradar.io/what-you-need-to-know-about-russian-cyber-escalation-in-ukraine/, 20 March 2022. Search in Google Scholar

51. The Conversation, 2022, 24 February. Russia is using an onslaught of cyber attacks to undermine Ukraine’s defence capabilities. Retrieved from The Conversation: https://theconversation.com/russia-is-using-an-onslaught-of-cyber-attacks-to-undermine-ukraines-defence-capabilities-177638, 20 March 2022. Search in Google Scholar

52. UN General Assembly (A/RES/70/237), 2015. Developments in the field of information and telecommunications in the context of international security. United Nations General Assembly. Search in Google Scholar

53. UN General Assembly (A/RES/73/266), 2019. Group of Governmental Experts on Advancing responsible State behaviour in cyberspace in the context of international security. UN General Assembly. Search in Google Scholar

54. UN General Assembly (A/RES/73/27), 2018. Developments in the field of information and telecommunications in the context of international security. UN General Assembly. Search in Google Scholar

55. UN General Assembly, 1974, 14 December. United Nations General Assembly Resolution 3314 (XXIX), A/RES/3314. UN General Assembly. Retrieved from United Nations: https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/739/16/IMG/NR073916.pdf?OpenElement. Search in Google Scholar

56. UN GGE (A/70/174), 2015. Report of the Group of Governmental Experts on Report of the Group of Governmental Experts on Telecommunications in the Context of International Security. United Nations General Assebly. Search in Google Scholar

57. UN GGE (A/76/135), 2021. Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security. UN General Assembly. Search in Google Scholar

58. UN OEWG (A/AC.290/2021/CRP.2), 2021. Open-ended working group on developments in the field of information and telecommunications in the context of international security. UN General Assembly. Search in Google Scholar

59. United Nations, 1945, 27 March. United Nations Charter. United Nations. Retrieved from United Nations: https://www.un.org/en/about-us/un-charter/full-text, 22 March 2022. Search in Google Scholar

60. Weedon, J., 2015. Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine. In K. Geers, Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine (pp 67-77). Tallin: CCDCOE. Search in Google Scholar

61. Wolff, J., 2022, 2 March. Why Russia Hasn’t Launched Major Cyber Attacks Since the Invasion of Ukraine. Retrieved from Time: https://time.com/6153902/russia-major-cyber-attacks-invasion-ukraine/, 25 March 2022. Search in Google Scholar

eISSN:
2463-9575
Idiomas:
Inglés, Slovenian