Inside a US military cyber team's defence of Ukraine

Abstract: 

Malicious cyber activities, as we know, have only continued to increase as networks expand and more devices become connected to the cyber domain. These harmful threats are not just limited to entertainment, health, or financial institutions, but also to entire states. One of the most notorious examples of cyberattacks launched towards a specific state includes Russia’s attacks towards Ukraine. Targeted specifically by Russian forces, Ukraine has experienced some of the worst cyberattacks known across the globe. Though network infiltration had been previously known for espionage between states, it has recently started to become a larger part of military actions such as preparing for full-scale war against targeted countries. This increase in cyberattacks against certain states has allowed for the U.S. to deploy military operators to many countries (most of which are allies, including Ukraine) to find proof of Russian infiltration and help one another in preventing targeted attacks. Although U.S. teams are deployed to investigate and help these countries, it may often be initially hard for a state to trust these teams with access to their government networks. As a result of this “suspicion”, it is very important for American military individuals to convince host countries that they are arriving on mission to help and not to spy. One of the most common ways of overcoming this suspicion is for local teams to sit in conference rooms with American teams and watch as they work, making sure no questionable activities are occurring and therefore becoming more trustful of them. Ultimately, the goal for both sides of the operations is to keep Russia out of their networks whether it be to prevent espionage or targeted attacks, meaning that it is important for the teams to trust that they are both there to help each other. Another way U.S. military teams build a trustworthy connection is through sharing their findings and insights with the host state’s local team in order to allow the states themselves to keep Russian hackers out of their systems. Through such actions, connections like that of the U.S. and Ukraine can be established, where both learn form and help one another in protecting/defending against cyberattacks from malicious sources.

Author: 

Gordon Corera

Year: 

2022

Domain: 

Dimension: 

Region: 

Data Type: