Cyber Element War- Amna - Article thematic Image 2

Cyber has become a focal point in the conduct of both civil and military operations. Given its emerging destructive potential, it has now become an independent ‘domain’ like land, sea, air, or space in the national military strategy of the United States (US). Besides being a new battle space, this domain serves as a force multiplier to increase or decrease the effectiveness of kinetic operations in terms of its ability to conduct surveillance, espionage, criminal activities; launch disinformation campaigns/propaganda; impact recruitment/planning; incite attacks; crush enemy morale and will to fight; gain insight into the latter’s planning and capabilities; and to mislead the public in order to secure strategic objectives.

Exploitation of the cyber domain in the ongoing Russia-Ukraine war is a perfect illustration of timing cyber-attacks to gain an upper hand in ground operations. However, this use of cyber also raises serious concerns not only for the warring states’ national security apparatus, institutions and critical infrastructure but is equally a threat to the international community due to the nature of cyber interconnectivity. This means that the threat posed by cyber is overarching and needs to be addressed seriously to avoid any unintended consequences. The article attempts to highlight the scope of cyber in the Russia-Ukraine conflict and its implications for the region and the rest of the world.

The cyber element was in full swing even before Moscow’s ground operation was launched. According to some open sources, a cyber-attack was launched on Viasat KA-SAT before the launch of kinetic operations. In fact, Microsoft’s Digital Security Unit has issued a report covering the cyber aspect of this war. According to the report, several cyber-attacks have been launched on Ukraine’s critical infrastructure, government, and business agencies. On the opposite side, Ukraine has also been active both on the offensive and defensive fronts. On the offensive front, it has set up an IT Army – a cyber operations force backed by a decentralised hacktivist group – ‘Anonymous’. The IT Army has been successful in launching cyber-attacks against Russia’s critical information infrastructure and other targets of strategic importance, e.g., Russian satellites. ‘Anonymous’ was also able to access important Russian documents regarding Kremlin’s invasion by hacking into the Roskomnadzor system. On the defensive front, Ukraine has strengthened its defence system against cyber-attacks. Paul Chichester, Director of Operations at the UK’s National Cyber Security Centre described the use of cyber-operations in the ongoing Russia-Ukraine war as ‘the most sustained set of cyber operations coming up against the best collective defense we have seen.’

Cyber-attacks have not been limited to Ukraine alone. Indeed, the conflict is escalating beyond borders. This aspect was highlighted by Google’s Threat Analysis Group (TAG).  Russian hackers have also attempted to penetrate the networks of NATO and militaries of several eastern European countries as well. These attacks are an attempt to dissuade the countries supporting Kyiv militarily and economically, and ongoing NATO membership negotiations. Keeping in view Russia’s cyber potential, there are chances that Moscow (through non-state actors) could hack international banking systems to mitigate the economic damage caused by Western sanctions. Keeping in view an expected threat of attacks on energy and financial infrastructure, the US cyber security agency CISA issued its ‘Shields Up’ warning back in early February, urging increased cyber readiness.

The deployment of non-state actors by both parties (Russia and Ukraine) has blurred the lines between ‘cyber war’ and ‘cyber terrorism’. This ambiguity between state and non-state actors has increased the chances of unintended escalation or spread of this conflict. The link to escalation was made in Russia’s 2020 nuclear declaratory policy wherein the state holds the right to use nuclear weapons under a range of contingencies, such as attacks on critical governmental or military sites. The statement of  Dimitry Rogozin, Head of the Russian Space Agency also made it clear that ‘hacking satellites would constitute an act of war.’

The precedence (set by the US) upholds that a cyber-attack on nuclear Command, Control, and Communication (NC3) facilities can constitute a non-nuclear strategic attack, and therefore, will justify the use of nuclear weapons as a response. NATO also reiterates the same approach by reserving the right to respond with conventional weapons if subjected to a powerful cyber-attack. These policy directives show that cyber-attacks could result in aggravating the risk of kinetic escalation, including a nuclear one.

It has, therefore, become clear that cyber remains an important strategic domain in the ongoing Russia-Ukraine war as well as future conflicts. Given the complicated nature and evolving dynamics of cyber warfare, it is vital for the global community to form a broader international security regime and frame a code of conduct for states which are actively involved in this domain. This can be done by identifying critical infrastructures that are crucial to national security which either remain beyond the ambit of a cyber-attack or are placed in the maximum retaliation category. Warring countries and their supporters should be fully aware of the disruptive potential of technologies like cyber and ‘shield up’ their defences accordingly. Moreover, states should adopt responsible behaviour in the application of such technologies. Otherwise, the risk of inadvertent escalation would significantly increase, and may be beyond the control of warring states and the international community once it starts.

Amna Tauhidi is a researcher at the Centre for Aerospace & Security Studies (CASS), Islamabad, Pakistan. The article was first published in Modern Diplomacy. She can be reached at [email protected]

Image Credit: Online Sources


Share this article

Facebook
Twitter
LinkedIn

Recent Publications

Browse through the list of recent publications.

The Cover-up: IAF Narrative of the May 2025 Air Battle

Even after one year since the India-Pakistan May war of 2025, the Indian discourse regarding Operation Sindoor remains uncertain under its pretence of restraint. The Pahalgam attack on 22 April, which killed 26 people, triggered an escalatory spiral. New Delhi quickly accused Pakistan-linked elements, while Islamabad refuted the allegation and demanded an independent investigation. On 7 May, India launched attacks deep inside Pakistan under what it later termed as Operation Sindoor. The political motive was intended to turn the crisis into coercive signalling by shifting the blame onto the enemy and projecting a sense of military superiority.
This episode, however, began to fray immediately as war seldom follows the intended script. Within minutes PAF shot down 7 IAF aircraft including 4 Rafales. On 8 May, Reuters reported that at least two Indian aircraft were shot down by a Pakistani J-10C, while the local government sources reported other aircraft crashes in Indian-occupied Jammu and Kashmir

Read More »

Why the IAF’s Post-Sindoor Spending Surge is a Sign of Panic

After Operation Sindoor, India is spending billions of dollars on new weapons. This is being taken by many people as an indication of military prowess. It is not. This rush to procure weapons is in fact an acknowledgement that the Air Force in India had failed to do what it was meant to do. The costly jets and missiles that India had purchased over the years failed to yield the promised results.

Sindoor was soon followed by India in sealing the gaps which the operation had exposed. It was reported that Indian Air Force (IAF) is looking to speed up its purchases of more than 7 billion USD. This will involve other Rafale fighter jets with India already ordering 26 more Rafales to the Navy in 2024 at an estimated cost of about 3.9 billion USD. India is also seeking long-range standoff missiles, Israeli loitering munitions and increased drone capabilities. Special financial powers of the Indian military were activated to issue emergency procurement orders. The magnitude and rate of these purchases speak volumes.

Indian media and defence analysts have over the years considered the Rafale as a game changer. When India purchased 36 Rafales aircrafts at an approximate cost of 8.7 billion USD, analysts vowed that the aircraft would provide India with air superiority over Pakistan. Operation Sindoor disproved all those allegations. Indian aircraft did not even fly in Pakistani airspace when the fighting started. India solely depended on standoff weapons that were launched at a safe distance. The air defence system of Pakistan, comprising of the HQ-9 surface-to-air missile system and its own fighters, stood its ground.

Read More »

May 2025: Mosaic Warfare and the Myth of Centralised Air Power

Visualise a modern-day Air Force commander sitting in the operations room, miles away from the combat zone, overseeing every friendly and enemy aircraft and all assets involved in the campaign. In a split second, he can task a fighter, reposition a drone, and authorise a strike. In today’s promising technological era, he does not even need an operations room; a laptop on his desktop will suffice. The situation looks promising as it offers efficiency, precision, and control. The term used for such operational control is ‘centralisation’, which has been made possible with advanced networking, integrating space, cyber, surveillance, artificial intelligence, and seamless communication, enabling a single commander to manage an entire campaign from a single node. Centralised command and control, championed by the Western air forces and then adopted by many others, has thus been seen as a pinnacle of modern military power.
The concept of centralisation, enabled by state-of-the-art networking, may seem promising, but it is nothing more than a myth.

Read More »