The use of cyber-attacks in Ukraine could have long-term implications for the way wars are carried out.
Ukraine鈥檚 recently formed 鈥淚T army鈥 is playing a crucial role in the war with Russia, and data thefts against the Russian government and other high-profile targets such as .
The IT army has thousands of volunteer members , who use Twitter and Telegram channels to communicate, coordinate and report on actions. Its members have already taken part in a wide variety of attacks. These range from stealing and exposing important information to successfully and other critical networks in order to hinder the Russian war efforts.
The formation of the IT army was a Ukrainian government response to concerns about the role Russian cyber-attacks might have on the war. On February 26 2022 Ukrainian vice-prime minister Mykhailo Fedorov issued a call to arms to all hackers willing to join its IT army and support Ukraine against Russian cyber-attacks and Russian networks.
The creation of Ukraine鈥檚 IT army is considered cyber-warfare operations. It is believed to be the first time a state official has openly called on hackers from around the globe to join a nation鈥檚 military defensive efforts against an invading force and act as part of its hybrid military operations.
Ukraine鈥檚 IT army are also supported by which are not affiliated with Ukraine, but want to support the country against Russia.
One of its most was carried out in 2022 and targeted Russia鈥檚 authentication system, Chestny Znak, which adds a unique ID and barcode to all products in the country.
This cyber-attack flooded Chestny Znak鈥檚 servers with information, causing it to stop working, creating widespread disruption with serious economic costs and even leading the Russian government to abolish .
The have also managed to target Russian radio and TV stations to add snippets of videos about the war in Ukraine to programmes and to broadcast fake air raid alerts. For example, in June 2023, Russian state TV and other channels and broadcast a video allegedly created by the Ukrainian ministry of defence including footage of Ukraine鈥檚 military operations, followed by a message reading 鈥渢he hour of reckoning has come鈥 in Ukrainian.
This rallying of hackers for Ukraine has prompted a response from groups , such as Killnet, Sandworm and XaKnet, to launch their own cyber-attacks on Ukrainian and western targets. However, Russian cyber-attacks before the invasion and intensified in February 2022. These involved an array of smaller assaults on Ukrainian state and private networks and even on the Viasat satellite communications system in order to prevent the monitoring of Russian troop movements during the invasion.
International ramifications
The Viasat cyber-attack on February 23 had serious spillover effects outside Ukraine鈥檚 borders, affecting thousands of German wind turbines by shutting down their remote control systems. This incident showed that all wars now have a very real cyberspace dimension that could have outside the war zone.
Apart from the global cybersecurity concerns that , the creation of the IT army has sparked important discussions around the role of cyberwarfare in real-life military operations. One significant question is whether groups such as the IT army could be considered combatants, rather than civilians, which can impact whether they can be legally targeted by Russian military, losing some of the by international law.
Having said that, some countries, including Estonia, already have formally established similar . This is something that is currently under consideration by the Ukrainian government for its IT army.
Another consideration is the unpredictability of hacker groups operating as decentralised 鈥渃yberguerillas鈥. This could have serious spillover effects beyond the war zone, potentially resulting in across more countries.
Efforts have been made by the international community and academic experts to apply the law of war and international humanitarian law to cyberoperations, which have culminated in the publication of . These manuals attempt to cover issues of international law regarding cyber incidents. But many of the concerns that the IT army has brought to the fore remain contested, especially since these documents are not binding.
Conflicts could become even more complex as AI tools are increasingly used in cyber-attacks and gradually become part of modern in the next few years.
This is why we need more concerted efforts to resolve the practical and legal concerns, before the new age of cyberwarfare is upon us.
Vasileios Karagiannopoulos, is a Lecturer in Cybercrime and Cybersecurity, 小蓝视频.
This article is republished from under a Creative Commons Licence. .
More The Conversation Articles...
The Conversation is an independent source of news analysis and informed comment written by academic experts, working with professional journalists who help share their knowledge with the world.
Decontaminating Fukushima: have the billions spent been worth it?
Jim Smith
25 October 2023
4
Inflation: raising interest rates was never the right medicine 鈥 here鈥檚 why central bankers did it anyway
Inflation: raising interest rates was never the right medicine 鈥 here鈥檚 why cen鈥
20 October 2023
4 min read
Do we live in a computer simulation like in The Matrix? My proposed new law of physics backs up the idea
Melvin Vopson
19 October 2023
4 min read