Internet - Atlantic Council https://www.atlanticcouncil.org/issue/internet/ Shaping the global future together Thu, 20 Jul 2023 21:00:43 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 https://www.atlanticcouncil.org/wp-content/uploads/2019/09/favicon-150x150.png Internet - Atlantic Council https://www.atlanticcouncil.org/issue/internet/ 32 32 Russian War Report: Wagner is still in business in Africa https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-wagner-still-in-africa/ Thu, 20 Jul 2023 20:22:35 +0000 https://www.atlanticcouncil.org/?p=665774 Despite their Russia-based forces being relocated to Belarus after their failed mutiny, Wagner Group is still alive and active in Africa, including ahead of a referendum in the Central African Republic.

The post Russian War Report: Wagner is still in business in Africa appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report

Security

Ukrainian attack damages Kerch Bridge

Wagner moves soldiers to Belarus following apparent disbandment in Russia

Wagner vehicle columns are seen driving from Voronezh to Belarus

Tracking narratives

Russian officials and state media change their tune about the Kerch Bridge attack after Kremlin announces terror investigation

Media policy

FSB colonel alleged to be behind popular Telegram channel detained for extortion

International response

Wagner continues to advertise its services in Africa

Wagner troops arrive in Central African Republic ahead of critical referendum

Lavrov to replace Putin at BRICS summit

Ukrainian attack damages Kerch Bridge

Russia accused Ukraine of conducting a drone strike against the Kerch Strait Bridge on July 17. The bridge, also known as the Crimean Bridge, connects Ukraine’s Crimean Peninsula with Russia’s Krasnodar region. The bridge is used for civilian movement and as an essential logistical route for the Russian army.

Explosions were reported at around 3:00 a.m. local time. Footage of the aftermath indicates that a span of the bridge’s road had collapsed while another suffered damage but remained intact. Traffic reportedly resumed several hours after the explosion, but in the interim, occupation authorities asked civilians to consider alternate evacuation routes. Russian Telegram channels reported extensive traffic jams in Crimea’s Dzhankoi area and in the occupied Kherson region towards Melitopol. 

Ukraine defense intelligence spokesperson Andrii Yusov told Suspilne News that damage to the bridge could create logistical difficulties for Russian forces, but said Kyiv would not comment on the cause of the explosion. CNN, citing a source in the Security Service of Ukraine (SBU), reported that the attack on the bridge was a joint operation of the SBU and Ukrainian naval forces. Ukrainian media outlet LIGA also reported that the SBU and Ukrainian naval forces were responsible for the attack, citing sources in the SBU. LIGA also noted that the strike was likely conducted with surface drones. The SBU said that information about the incident would only be revealed once the war ended. Some Russian military bloggers, including former Russian officer and pro-war nationalist Igor Girkin, stated that Russian authorities had focused too heavily on road security and not enough on maritime security. Alexander Kots, another prominent blogger and Kremlin-appointed Russian Human Rights Council member, also blamed Russian authorities for focusing too much on land security.

Natalia Humeniuk, a spokesperson for Ukraine’s Southern Operational Command, speculated without evidence that the attack may have been a provocation by Russia amid talks on prolonging the Black Sea Grain Initiative. The grain deal, brokered by Turkey and the United Nations in July 2022, has been essential for stemming a global surge in food prices. The agreement, necessitated after the Russian navy blocked all Ukrainian ports, permits Ukraine to export products. It has has been prolonged several times, with the last extension expiring on July 17. The Kremlin announced on July 17 that it had suspended its participation in the initiative but claimed that the decision was unrelated to the bridge attack. 

Meanwhile, about twenty-four hours after the attack on the Kerch Bridge, explosions were heard in Odesa in southern Ukraine. Unconfirmed reports claimed the explosions were a response from Russia. The attack on Odesa continued for a second night on July 19, described by Ukrainian officials as “hellish.” Odesa is an essential port for Ukrainian exports and was allowed to remain open under the conditions of the grain deal.

Ruslan Trad, resident fellow for security research, Sofia, Bulgaria

Wagner moves soldiers to Belarus following apparent disbandment in Russia

The Wagner Group appears to have disbanded its operations in Russia and relocated to Belarus, according to footage reviewed by the DFRLab documenting the movements of Wagner military columns in the days following the mutiny through July 18. Additionally, satellite imagery captured the entry of troops and equipment at the Tsel military camp, located near the Belarusian town of Asipovichy.

On July 17, a video shared on Telegram depicted Wagner soldiers taking down the Russian flag and the Wagner flag at the group’s original military base in Molkino, Krasnodar Krai, Russia. In another video published on July 19, Prigozhin addressed Wagner fighters as they left the Molkino base, describing the situation on the front as “a shame.” In addition, he declared that the group is relocating to Belarus and will focus on its activities in Africa. For the time being, he said, Wagner soldiers are no longer participating in Russia’s special military operation in Ukraine, although they “will perhaps return to the special military operation at the moment when [they] are sure [they] will not be forced to shame ourselves.”

Shortly after the mutiny ended, Russian authorities conducted raids on Wagner’s accounting divisions in Saint Petersburg, according to information purportedly shared by the wives and mothers of Wagner fighters in an online forum. Additional raids took place on Prigozhin’s residence. The movements of Prigozhin’s private jet also indicate frequent travel to Belarus over the past three weeks.

An investigation by Belarusian opposition media outlet Motolko.help revealed a photograph of a man resembling Prigozhin in his undergarments allegedly at the Tsel military base, where he reportedly spent the night on July 12. According to flight data posted on the online portal Radarbox, Prigozhin’s personal Embraer Legacy 600 jet, registration number RA-02795, completed four round-trip flights between Belarus’ Machulishchy air base and Russia.

Radar imagery acquired on July 17 also shows the tents where Wagner fighters appear to be housed and several places for vehicles parked inside the military base.

SAR imagery of Tsel military camp in Belarus, taken on July 17, 2023.  (Source: DFRLab via Capella Space)
SAR imagery of Tsel military camp in Belarus, taken on July 17, 2023.  (Source: DFRLab via Capella Space)

Valentin Châtelet, research associate, Brussels, Belgium

Wagner vehicle columns are seen driving from Voronezh to Belarus

On July 16, several videos emerged on Telegram documenting Wagner vehicles departing Voronezh Oblast along Russia’s M-4 Don highway. Utilizing social media footage, the DFRLab determined the location of the vehicles and identified forty registration plates. At least two-thirds of these vehicles displayed military registration plates from the self-proclaimed Donetsk and Luhansk People’s Republic. However, the Belarusian monitoring project Belaruski Hajun reported that many other vehicles used tape to cover their registration plates.

The columns are composed of various buses and trucks, of which only a few could transfer construction equipment. Most of the convoys consist of UAZ Patriot pickup trucks, Ural vans, and Lada cars. No heavy military equipment was observed at the time of writing.

Screenshots show a UAZ Patriot pickup truck (top) and a Mitsubishi pickup truck (bottom) bearing military registration plates from the Luhansk People’s Republic. A police car escorted the trucks one hundred kilometers south of Voronezh on July 14, 2023. (Source: Telegram/archive)

Another video shared on the Russian Telegram channel VChK-OPGU revealed a Wagner convoy of soldiers entering Belarusian territory. According to a post by Belaruski Hajun, at least sixty vehicles entered Belarus through Mogilev Oblast in the early hours of June 15 using the R-43 and M-5 roads. A photograph on Telegram showed the Russian and Wagner Group flags flying at a border outpost.

According to Belaruski Hajun, since July 14, nine distinct military convoys have entered Belarusian territory. They are likely located at the Tsel military camp near Asipovichy. The camp is home to military unit 61732 and was previously identified by Verstka Media as a potential site to accommodate Wagner soldiers. Further, the Belarusian military TV channel VoyenTV posted a video on July 14 showing Wagner soldiers arriving in Belarus and training local forces. According to updated estimates from Belaruski Hajun, as many as 2,500 Wagner members may have relocated to the Tsel military camp since last week.

Valentin Châtelet, research associate, Brussels, Belgium

Russian officials and state media change their tune about the Kerch Bridge attack after Kremlin announces terror investigation

In the immediate aftermath of the July 17 attack on the Kerch Bridge, Russian officials and state media were relatively mild in their initial language addressing the incident, referring to it as an “emergency.” However, once Kremlin agencies began referring to the attack as a “terror act,” state media and officials began changing their language to follow the Kremlin.

“Traffic was stopped on the Crimean bridge: an emergency occurred in the area of the 145th support from the Krasnodar territory,” Sergei Aksenov, the Russian-installed head of occupied Crimea, wrote on his Telegram channel at 4:21 a.m. local time. Notably, Aksenov did not use the words “explosion,” “attack,” or “terror” to describe the destruction of the bridge. Two subsequent posts, made at 5:03 a.m. and 6:59 a.m., also avoided these terms. It wasn’t until 1:51 p.m. that Aksenov used the phrase “terror act” to describe the attack.

In between Aksenov’s posts, Russia’s National Antiterrorism Committee reported at 10:04 a.m. that they had assessed the Kerch Bridge explosion as a “terror act,” according to Kremlin-owned news agency TASS. Several minutes later at 10:07 a.m., Russia’s Investigative Committee announced that it would open a criminal case investigating the “terror act” on the Kerch Bridge. 

Several Kremlin-owned Russian media outlets, including RIA Novosti and TASS, also used the term “emergency” (“чрезвычайное прошествие” or ЧП) to first describe the bridge explosion before later pivoting to using “terror act.” Neither outlet referred to the destruction of the Kerch Bridge as a “terror act” prior to the official announcements from the Investigative Committee and Antiterrorism Committee. In the case of RIA Novosti, they published a story using the word “emergency” in the headline at 11:41 a.m., more than ninety minutes after the terror investigation announcement, while TASS used the term as late as 7:31 p.m., even though it had already published a report on the investigation. Similarly, many other Kremlin-controlled media outlets, like Komsomolskaya Pravda, Gazeta.ru, RBC, Lenta.ru, and Izvestiya used both “emergency” and “terror act” in their publications throughout the day interchangeably.

Nika Aleksejeva, resident fellow, Riga, Latvia

FSB colonel alleged to be behind popular Telegram channel detained for extortion

According to Russian media outlet RBC, former Federal Security Service (FSB) Colonel Mikhail Polyakov, the purported administrator of the Telegram channel Kremlevskaya Prachka (“Kremlin Laundress”), was detained for suspected extortion. The press office for the Moscow court released a statement that said Polyakov is “suspected of extorting 40 million rubles [around $440,000] from JSC Lanit, the leader of the Russian industry of information technology.” 

“According to the prosecution, from 2020 to 2023, Polyakov received a large sum of money from a group of IT companies for not publishing information (the so-called ‘negative block’) that could cause significant harm to the rights and legitimate interests of Lanit JSC and the management of Lanit JSC,” the Moscow court continued. The “negative block” is a guarantee that a channel will not mention a particular person or a company in a negative light in exchange for money; this is reportedly a popular practice among Russian Telegram channels.

The independent Russian media outlet Vazhnyye Istorii (“Important Stories”), citing a source close to Russian intelligence services, reported that Polyakov was behind the Kremlevskaya Prachka Telegram channel. According to the outlet, Polyakov supervised an unnamed service at the FSB’s Office for the Protection of the Constitutional Order. In addition, he reportedly oversaw pro-government Telegram channels and was engaged in promoting the Kremlin’s agenda via media and social networks. According to Important Stories, he worked in coordination with Vladimir Putin’s deputy chief of staff, Sergey Kiriyenko.

Important Stories noted that the Telegram channel 112 also named Polyakov as Kremlevskaya Prachka’s administrator, along with the Telegram channels Siloviki, Nezigar, and Brief, which are not as staunchly pro-govern cited by Kremlin propagandists and proxies.

Kremlevskaya Prachka has not posted since the evening of July 13, corresponding with the reported detainment of Polyakov.

Eto Buziashvili, research associate, Tbilisi, Georgia

Wagner continues to advertise its services in Africa

On July 16, the Wagner-affiliated Telegram channel REVERSE SIDE OF THE MEDAL posted an advertisement offering Wagner’s services to African states. The post included an image from the Prigozhin-funded film, Granite, as well as an email address, seemingly for interested African countries to communicate with Wagner. 

In French, the advertisement reads: “PMC Wagner offers its services to ensure the sovereignty of states and protect the people of African from militants and terrorists.” The fine print emphasizes that “various forms of cooperation are possible,” as long as the cooperation does not “contradict Russia’s interests.” Russia’s interests are not specified.

While the Telegram channel claimed the advertisement was replicated on African social media channels, the DFRLab has not found additional evidence to support this claim.

Wagner-affiliated Telegram channel shared an advertisement for Wagner’s services in Africa, claiming it was widely circulated on the continent. (Source: rsotmdivision)

Tessa Knight, research associate, London, United Kingdom

Wagner troops arrive in Central African Republic ahead of critical referendum

Alexander Ivanov, director of the Officer’s Union for International Security (COSI), released a statement on COSI’s Telegram channel regarding the recent arrival of dozens of Wagner operatives in Central African Republic. According to US authorities, COSI is a front company for the Wagner Group in Central African Republic.

In the statement, Ivanov confirmed the Wagner troop rotation while stressing that the new personnel have no contract with Russia’s Ministry of Defense. He reiterated that both in CAR and across the continent, “security work is carried out by private companies that enter into contracts directly with the governments of sovereign states,” and that these private companies have nothing to do with official Russian state entities. Ivanov also indicated that this staff rotation should not impact the activities of Russia in Ukraine, and he claimed to have been in contact with Yevgeny Prigozhin. 

Notably, Ivanov stated that despite the recent changes in the structure of Wagner’s “African business,” Prigozhin “intends not to curtail, but to expand his presence in Africa.” This is somehow consistent with what some analysts are observing: Wagner appears to be trying to expand its presence in West African coastal states increasingly threatened by a spillover of the jihadist insurgency from the Sahel, or possibly taking advantage of upcoming elections in several fragile African countries. 

Although Ivanov has often remarked on Wagner activities in CAR and Africa in the past, this statement, coupled with other recent comments, suggest that the COSI director might be now exercising a wider role as spokesman for all Wagner activity in Africa, as Wagner reorganizes its structure in the wake of last month’s failed mutiny. 

The statement comes as a U-turn in recent communications over Wagner’s presence in CAR. In past weeks both CAR and Russian officials stated that the African republic had an agreement with Russia and not with a private military company. Ivanov seems to be returning to earlier narratives in which Wagner claimed that the CAR government signed an agreement with the PMC and not the Russian government. This narrative seems to confirm DFRLab reporting in the June 30 edition of the Russian War Report, in which we noted that denying direct links to Wagner’s actions in Africa has become more difficult for the Kremlin after recent events damaged the principle of plausible deniability, which had previously been a key aspect of Wagner’s success in Africa. However, Russia does not want to waste the network of influence built by its state proxy forces and is now attempting to reorganize, rebrand and develop a new narrative around Wagner and the Kremlin’s ability to conduct hybrid warfare.

The arrival of dozens of troops from Russia’s Wagner in CAR comes at a critical time as the country prepares to hold a constitutional referendum on July 30 that would eliminate presidential term limits and allow President Faustin-Archange Touadéra to extend his term. The CAR government stated earlier this month that Wagner operatives will help in securing the referendum. This could be seen as a strong signal from Moscow to reiterate the strategic importance of its influence in CAR and reassure local partners of its continued support, while sending a message of continuity and strength to other countries in the region where Wagner operates.

Mattia Caniglia, associate director, Brussels, Belgium

Lavrov to replace Putin at BRICS summit

The Office of South Africa’s Presidency announced on July 19 that Russian Foreign Minister Sergey Lavrov would replace President Vladimir Putin at the upcoming Summit of BRICS Nations (Brazil, Russia, India, China and South Africa) “by mutual agreement.”

In Russian media, pro-Kremlin and opposition news outlets alike posted articles claiming that Russia had refused South Africa’s proposal to send Lavrov as head of the country’s delegation on July 14. Quoting an interview with South Africa’s deputy president, the Russian pro-Kremlin news outlet RTVI suggested that “negotiations are still ongoing.”

Putin is wanted by the International Criminal Court (ICC) for alleged war crimes committed during Russia’s war in Ukraine. A warrant for the arrest of both the Russian president and Presidential Commissioner for Children’s Rights Maria Lvova-Belova alleges that they were involved in organizing and participating in the deportation of Ukrainian children. As a signatory to the Rome Statute, which established the ICC, South Africa would have been obligated to arrest Putin had he attended the BRICS Summit in August. 

South Africa’s largest opposition party, the Democratic Alliance, took to court in a petition to force the government to arrest Putin if he did attend. In a responding affidavit, South African President Cyril Ramaphosa stated that Russia would view South Africa arresting Putin as a “declaration of war.” 

The Kremlin denied claims that Moscow had threatened South African authorities. However, Kremlin spokesperson Dmitry Peskov said on July 19 that “it is clear to everyone in the world what an attempt to encroach on the head of the Russian Federation means.”

Tessa Knight, Research Associate, London, United Kingdom and Valentin Châtelet, Research Associate, Brussels, Belgium

The post Russian War Report: Wagner is still in business in Africa appeared first on Atlantic Council.

]]>
Russian War Report: Russian conspiracy alleges false flag at Zaporizhzhia nuclear plant https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russian-false-flag-zaporizhzhia/ Fri, 07 Jul 2023 18:02:29 +0000 https://www.atlanticcouncil.org/?p=662365 Allegations of a supposedly US and Ukraine-planned false flag operation on the Zaporizhzhia nuclear power plant spread across social media ahead of the NATO Summit.

The post Russian War Report: Russian conspiracy alleges false flag at Zaporizhzhia nuclear plant appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report

Security

Russian missile strike in Lviv kills ten civilians, injures dozens

Tracking narratives

New narrative accuses US and Ukraine of planning false flag attack on Zaporizhzhia nuclear power plant

Media policy

Former employees share details about Prigozhin’s media group and troll farms

Kremlin-owned RT offers jobs to former employees of Prigozhin’s troll factory

Russian missile strike in Lviv kills ten civilians, injures dozens

At least ten people were killed and thirty-seven injured in Russia’s July 6 attack on Lviv, in western Ukraine. Regional Governor Maksym Kozytskyy said that a Russian missile struck a residential building in the city, destroying more than fifty apartments. 

Meanwhile, Russian forces continue to launch offensive actions in Donetsk and Luhansk oblasts. Ukrainian forces reported thirty-eight combat engagements against Russian troops near Novoselivske, Novohryhorivka, Berkhivka, Bohdanivka, Bakhmut, Avdiivka, and Marinka. In the direction of Lyman, Russian forces shelled Nevske, Bilohorivka, Torske, Verkhnokamyanske, and Rozdolivka in Donetsk. Russian aviation conducted an airstrike in Bilohorivka. Russia also attacked villages in Zaporizhzhia and Kherson oblasts, including Levadne, Olhivske, Malynivka, Huliaipole, and Bilohirka. On July 6, Russian troops shelled Chervonohryhorivka and Nikopol, damaging civilian infrastructure.  

On July 5, reports from Russian military bloggers suggested that Ukrainian forces had advanced southwest of Berkhivka, west of Yahidne, and southwest of Bakhmut. The Ukrainian army said it conducted offensive operations south and north of Bakhmut and is moving on Bakhmut’s southern flank. The Russian Ministry of Defense claimed that the Ukrainian army conducted offensive operations near Lyman, Bakhmut, along the Avdiivka front, on the border between Zaporizhzhia and Donetsk, and in western Zaporizhzhia. 

The Ukrainian army appears to have launched a coordinated attack on Russian army logistical and communications hubs. On July 4, Ukrainian forces reportedly struck an ammunition depot in occupied Makiivka, Donetsk. Russian sources claimed without evidence that Ukraine had struck a hospital. Former Russian army commander Igor Strelkov, also known as Igor Girkin, said the attack demonstrates how Ukraine regularly launches missile strikes against Russian rear targets. Other unconfirmed reports from July 5 indicate Ukraine may have struck Russian positions near Debaltseve. Russian sources claimed that Ukrainian forces hit Russian positions near Yakymivka in the Melitopol area and attempted to strike Berdyansk in the Zaporizhzhia region.

Ruslan Trad, resident fellow for security research, Sofia, Bulgaria

New narrative accuses US and Ukraine of planning false flag attack on Zaporizhzhia nuclear power plant

Ahead of next week’s NATO Summit in Vilnius, Lithuania, allegations that the United States and Ukraine will launch a false flag operation on the Zaporizhzhia nuclear power plant are spreading on various platforms, including Twitter, 4chan, and Instagram. The allegations seemingly aim to create panic and, in the event of a future attack on the plant, establish a narrative the West and Ukraine are to blame

On July 3, a post appeared on 4chan from an anonymous user who introduced himself as a US Marine Corps veteran now working for the government in electronic espionage. The user claimed that the Ukrainian and US governments are working together to bomb the Zaporizhzhia power plant. According to the conspiracy theory, after the false flag operation, the United States will be able to use “nuclear warheads” against Russia. At the time of writing, the post had been deleted from 4chan. However, similar posts remain on the platform.

Screencap of an anonymous 4chan post claiming the US and Ukraine are planning a false flag attack. (Source: 4chan)

However, the false flag claims did not originate on 4chan. Russian Twitter accounts posted similar claims building the false flag narrative. After the 4chan post, the claim circulated again on Twitter.  

A similar narrative was also shared by Renat Karchaa, an adviser to Rosenergoatom, a subsidiary of the Russian state nuclear agency Rosatom. Karchaa claimed on Russian state television channel Russia-24 that on the night of July 5, the Ukrainian army would attempt an attack on the Zaporizhzhia plant. Without evidence, he accused the United States and the West of planning a false flag incident to damage Russia’s reputation. The claims were further amplified by Russian state media outlets.  

The allegations escalated on social media after July 4, when Ukrainian President Volodymyr Zelenskyy repeated Ukraine’s concerns about the status of the nuclear power plant. In an address, Zelenskyy restated that Russia plans to attack the plant and that Russian troops have placed explosive-like objects on the building’s roof. In June, Ukrainian military intelligence made similar claims when it reported that the plant’s cooling pond had been mined by Russian troops.  

On July 5, the International Atomic Energy Agency (IAEA) said that it was aware of reports that mines and other explosives had been placed around the plant. The IAEA said their experts inspected parts of the facility and did not observe any visible indications of mines or explosives. IAEA Director General Rafael Mariano Grossi added, “The IAEA experts requested additional access that is necessary to confirm the absence of mines or explosives at the site.” On July 7, the IAEA announced that Russia had granted its experts further access, “without – so far – observing any visible indications of mines or explosives.”  

Sayyara Mammadova, research assistant, Warsaw, Poland

Former employees share details about Prigozhin’s media group and troll farms

Several independent Russian media outlets published stories this week interviewing former employees of Yevgeny Prigozhin’s Patriot Media Group, which dissolved on June 30.  

In a video published on Telegram, Yevgeny Zubarev, director of Patriot Media Group’s RIA FAN, said the goal was to “work against the opposition, such as Alexei Navalny and others who wanted to destroy our country.” Zubarev confirmed key details previously reported by independent Russian journalists at Novaya Gazeta in 2013 and the now-Kremlin-controlled RBC in 2017 about the existence of paid commentators and the creation of Prigozhin-affiliated media outlets. Zubarev added that, after Russian President Vladimir Putin’s 2018 re-election, the group hired “foreign affairs observers.” The timing corresponds with attempts by Prigozhin’s Internet Research Agency to meddle in the 2020 US presidential election. 

Further, independent Russian media outlets Sever.Realii, Bumaga, and Novaya Gazeta interviewed former employees of Prigozhin’s media group. Speaking on the condition of anonymity, the former employees confirmed that Prigozhin’s “troll factory” and “media factory” conducted coordinated information attacks on opposition leaders, published fabricated or purchased news “exclusives,” praised Putin, and deliberately ignored particular individuals who criticized Wagner Group. Bumaga and Sever.Realii described a smear campaign against Saint Petersburg Governor Alexander Beglov. In 2019, Prigozhin’s media group supported and promoted Beglov, but in 2021, Prigozhin reportedly launched a smear campaign, as Beglov allegedly prevented him from developing a waste collection business in the city. Novaya Gazeta’s report also provided evidence that Prigozhin’s troll farm activities extended beyond Russia, with employees portraying skinheads and fascists in the Baltic region, specifically in Lithuania. 

In recent years, additional revelations about Prigozhin’s media group have come to light. For example, Bumaga reported that prospective hires had to pass a “lie detector test” in which “security service specialists” asked candidates about their attitudes toward the opposition and Alexei Navalny in particular. Once hired, employees were closely surveilled. One former employee Bumaga interviewed characterized the atmosphere as being in a “closed military company.” Both Bumaga and Novaya Gazeta’s interviewees said that most of the employees did not believe in the mission. In one example, an employee left after refusing to launch a smear campaign against Ivan Golunov, a journalist at the independent news outlet Meduza who was detained in 2019 under false pretenses. Bumaga, citing an unnamed former employee, also reported that at one point an employee had hacked the system, erased a database, and fled to Poland. The same interviewee claimed they employed two Telegram administrators who also administered pro-Ukraine channels.

Nika Aleksejeva, resident fellow, Riga, Latvia

Kremlin-owned RT offers jobs to former employees of Prigozhin’s troll factory

RT Editor-in-Chief Margarita Simonyan offered to hire employees of Yevgeny Prigozhin’s Patriot Media Group, which reportedly housed his troll factories. In the latest episode of the program Keosayan Daily, Simonyan praised the work of “Wagner’s media empire.” She said their work “was super professional” and that anyone left without a job can join “them,” referring to Russian propaganda outlets. She added, “We know you as professional colleagues of ours.” 

The fate of Patriot’s former employees is being actively discussed in Russia. According to Russian outlet Novie Izverstia, Pavel Gusev, editor-in-chief of the pro-Kremlin outlet MK.ru, volunteered to help find jobs for former employees of Patriot. In addition, the chairman of the Saint Petersburg branch of the Union of Journalists of Russia stated that the union would contact the heads of media outlets to help find opportunities for dismissed employees and would provide additional informational support.

Eto Buziashvili, research associate, Tbilisi, Georgia

The post Russian War Report: Russian conspiracy alleges false flag at Zaporizhzhia nuclear plant appeared first on Atlantic Council.

]]>
Russian War Report: Kremlin denies that it targeted civilians in a missile attack on a pizza restaurant https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-missile-strikes-kramatorsk-restaurant/ Fri, 30 Jun 2023 19:00:00 +0000 https://www.atlanticcouncil.org/?p=661201 A deadly Russian missile strike on a cafe in Kramatorsk leaves a dozen dead and more injured. Post-mutiny, Wagner's future in Africa is up in the air.

The post Russian War Report: Kremlin denies that it targeted civilians in a missile attack on a pizza restaurant appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report

Security

Military camps for Wagner reportedly under construction in Belarus

Tracking narratives

Pro-Kremlin sources spreading disinformation to justify missile strike in Kramatorsk

Kremlin blames Colombian victims for the injuries they sustained in the Kramatorsk attack

Media policy

Prigozhin’s online assets reportedly blocked in Russia

International Response

Questions abound over the future of Wagner contracts and Prigozhin-linked businesses in Africa

Analysis: With Wagner mutiny, Russia’s loses plausible deniability about its involvement in Africa

Investigation sheds light on how Putin’s childhood friends allegedly evade sanctions

Military camps for Wagner reportedly under construction in Belarus

Russian independent outlet Verstka reported on the construction of camps for Wagner forces near Asipovichi, Mogilev Oblast, located in Belarus approximately two hundred kilometers from the Ukraine border. According to Verstka’s local forestry source, the area will cover 2.4 hectares (5.9 acres) and accommodate eight thousand Wagner fighters. The source also claimed that there will be additional camps constructed. Family members of Wagner fighters also confirmed to Verstka that they were deploying to Belarus. 

Radio Svaboda, the Belarusian-language edition of Radio Liberty, reviewed satellite imagery from Planet Labs that suggested signs of expansion at the Unit 61732 military camp adjacent to the village of Tsel, twenty kilometers northwest of Asipovichi. The outlet interviewed Ukrainian military analyst Oleg Zhdanov, who suggested it was “too early to tell” as to whether the military camp’s expansion is specifically for Wagner forces. “Very little time has passed to start building a camp specifically for the Wagnerites—it’s unreal,” Zhdanov told Radio Svaboda.

Location of possible construction at the Unit 61732 military camp in Tsel, Belarus. (Source: Planet Labs)

On June 27, in his first speech after the Wagner mutiny, Russian President Vladimir Putin reaffirmed the deal that ended the rebellion on June 24 in which Yevgeniy Prigozhin would relocate to Belarus. Putin praised those Wagner fighters who did not participate in the revolt and said they could sign a contract with the Russian Ministry of Defense of other services. He added that other mercenaries who do not want to join could go either home or follow Prigozhin to Belarus.

Eto Buziashvili, research associate, Tbilisi, Georgia

Pro-Kremlin sources spreading disinformation to justify missile strike in Kramatorsk

Pro-Kremlin sources denied Russia targeted civilians when a missile struck a crowded pizza restaurant in Kramatorsk, killing at least twelve civilians and injuring more than fifty others. According to this narrative, RIA Pizza was actually a military base hosting US and Ukrainian soldiers. To support the claims, pictures taken after the strike were published on Telegram and Twitter.

To support the claim that soldiers of 101st Airborne Division were located at the pizza “military base,” pro-Kremlin sources circulated grisly footage of the attack aftermath recorded by freelance journalist Arnaud De Decker. The clip shows a man wearing a morale patch of a US flag with the words “Always Be Ready: 5.11 Tactical.” 5.11 Tactical is a military apparel company that sells branded merchandise, including morale patches, worn to offer support to various causes and slogans but not used official unit patches. Various types of 5.11 Tactical’s “Always Be Ready” patches are readily available for purchase online.

Top: A 5.11 Tactical morale patch for sale on its website. Bottom: Image taken during the aftermath of the Kramatorsk attack showing a man wearing the same morale patch on his helmet. (Source: 5.11 Tactical/archive, top; @arnaud.dedecker/archive, bottom)

Similarly, another post from Aleksandr Simonov’s Telegram channel that a man wearing an 101st Airborne t-shirt was a member of the US Army division. These t-shirts are also readily available from online retailers.

Montage of three screenshots from online retail websites selling 101st Airborne t-shirts. (Sources: top left, Etsy/archive; bottom left, Predathor/archive; right, Allegro/archive)
Montage of three screenshots from online retail websites selling 101st Airborne t-shirts. (Sources: top left, Etsy/archive; bottom left, Predathor/archive; right, Allegro)

Sayyara Mammadova, research assistant, Warsaw, Poland

Kremlin blames Colombian victims for the injuries they sustained in the Kramatorsk attack

In addition to pro-Kremlin accusations that the Kramatorsk attack targeted a base housing US Army soldiers, Kremlin influencers also targeted citizens of Colombia, three of whom were injured in the attack, for being at the site of the incident. Colombian President Gustavo Petro said the attack targeted “three defenseless Colombian civilians” in violation of the protocols of war and called for the Colombian Foreign Ministry to submit a note of diplomatic protest to Russia. While the Kremlin acknowledged launching the attack, it insisted the assault struck military personnel rather than civilians.

The three Colombian citizens injured in the attack include acclaimed Colombian writer Hector Abad Faciolince; Sergio Jaramillo Caro, who previously led Colombia’s peace negotiations with FARC rebels; and Ukrainian-based journalist Catalina Gomez. According to the New York Times, Abad and Jaramillo were in Kramatorsk “collecting material” in support of their initiative, ¡Aguanta Ucrania! (“Hang On Ukraine!”), which seeks to garner support for Ukraine in Latin America.

Following the attack, Colombian influencers and officials criticized the attack through media outlets and social media accounts in Spanish. Danilo Rueda, Colombia’s current high commissioner for peace, issued a statement expressing support for the victims without mentioning Russia, while the Ministry of Foreign Affairs expressed its “strongest condemnation of the unacceptable attack by Russian forces on a civilian target.” 

Gomez, who was injured in the attack, broadcast a video for France 24 from the site of the explosion. Meanwhile, Abad and Jaramillo conducted interviews with Colombian media outlets such as El Tiempo in which they described the incident.

Actualidad RT, a Russian media outlets with enormous reach in the Spanish-speaking world, insisted that the victims of the attack were mercenaries and instructors of NATO and Ukraine rather than civilians. Actualidad RT quoted statements from Igor Konashenkov, spokesperson for the Russian Ministry of Defense,  and Kremlin spokesperson Dmitri Peskov, who said the attack struck “military targets” and that “Russia does not attack civilian infrastructure.” Actualidad RT promoted its claims via Twitter and Facebook multiple times on June 28.

Colombian radio station WRadio interviewed Kremlin foreign policy spokesperson Maria Zakharova on the morning of June 28. Zakharova stated that the restaurant was a Russian military target and called for an investigation into Victoria Amelina, a Ukrainian writer who was gravely injured while purportedly hosting the Colombians at the restaurant, claiming without evidence that Amelina had prior knowledge that the restaurant was a military target. Zakharova reiterated this statement after a WRadio journalist asked her to confirm the accusation. In contrast, Abad stated that it was Gomez who suggested they visit the restaurant, and that she apologized for doing so after the attack.

The Russian embassy in Colombia amplified Zakharova’s narrative later that same afternoon and evening. On Twitter, the embassy insisted that the city was “an operational and logistical-military hub, not a suitable place to enjoy Ukrainian cuisine dishes.” It also seemed to celebrate that the “reckless trip [of the Colombians] did not turn into an irreparable tragedy.”

Daniel Suárez Pérez, research associate, Bogota, Colombia

Prigozhin’s online assets reportedly blocked in Russia

Over the course of the thirty-six-hour Wagner mutiny, the Kremlin attempted to limit information about Yevgeniy Prigozin on Russian social media and search engines, eventually blocking websites affiliated with Prigozhin. On June 24, the Telegram channel of Russian state-owned propaganda outlet RT reported that several Prigozhin-controlled media outlets including RIA FAN, People’s News, and Patriot Media Group were no longer accessible in parts of Russia. RT added that the reason for their disappearance was unknown. Similar reports appeared in Mediazona and several Telegram channels

The DFRLab used the Internet censorship measurement platform OONI to verify the claim and check the accessibility of RIA FAN within Russia. OONI detected signs that riafan.ru was blocked in the country. 

Internet censorship measurement platform OONI detected the apparent blocking of Prigozhin-owned media outlet RIA FAN. (Source: OONI)

On June 29, independent Russian outlet The Bell claimed the Kremlin was searching for a new owner for Patriot Media Group, which includes media assets associated with Prigozhin. The following day, multiple Russian outlets reported that Prigozhin had dissolved Patriot Media Group.

Eto Buziashvili, research associate, Tbilisi, Georgia

Questions abound over the future of Wagner contracts and Prigozhin-linked businesses in Africa

For years, Wagner has acted as Russia’s primary form of influence in Africa—spreading disinformation and propaganda, securing military contracts, and exporting natural resources to support Putin’s war effort. Following Prigozhin’s attempted mutiny, the future of Wagner’s operations on the continent has come into question. While it is highly unlikely the Kremlin would willingly abandon its influence in Africa, if Wagner is retired or its troops absorbed into the Ministry of Defense, it is uncertain who would maintain the group’s operations on the continent.

Russian Foreign Minister Sergei Lavrov confirmed that Russia’s work in Africa will continue. In a TV interview with Russia Today, Lavrov said, “In addition to relations with this PMC the governments of CAR and Mali have official contacts with our leadership. At their request, several hundred soldiers are working in CAR as instructors.”

A top advisor to Central African Republic President Faustin-Archange Touadéra appeared unconcerned about the weekend’s events. Speaking of Wagner’s military instructors, Fidèle Gouandjika said, “If Moscow decides to withdraw them and send us the Beethovens or the Mozarts rather than Wagners, we will have them.” In a statement released to its Telegram channel, the Officer’s Union for International Security—a US-sanctioned Wagner front company operating in CAR—claimed CAR’s defense minister had apologized for Gouandjika’s remarks. It quoted Defense Minister Claude Rameaux Bireau as saying, “The people of the CAR are grateful to the Russian instructors of Wagner, ask any Central African on the streets of Bangui or in the village of the CAR—he will confirm my words.”

In Mali, where Wagner forces have taken over responsibility for pushing back jihadists after the departure of French forces, the online outlet Mali Actu reported that the situation could dramatically impact Mali. “This situation raises major concerns about the security, stability and sovereignty of Mali, as well as the impact on the local population and counter-terrorism efforts,” it wrote.

Tessa Knight, research associate, London, United Kingdom

Analysis: With Wagner mutiny, Russia loses plausible deniability about its involvement in Africa

While Wagner’s future in Africa remains uncertain, it is important to consider that the Wagner Group not just a paramilitary force. It is also a conglomerate of companies active in different sectors, from mining and logistics to political warfare and moviemaking, able to travel the spectrum between private entrepreneurism to state proxy. This flexibility has previously allowed Moscow to deploy Wagner to act as a force multiplier in Africa while simultaneously denying Russia’s direct presence on the continent. In Africa, Russia has used Wagner multiple times as part of a strategy to help authoritarian leaders stay in power and gain a pro-Russian military presence on the ground, all while maintaining plausible deniability. Until now, the positive outcomes of this strategy have far exceeded the costs for the Kremlin, as Russia has built a strong network of African influence with relatively little effort, securing concessions in strategic extractive industries, and expanding military-to-military relations on the continent.

However, this principle of plausible deniability, which made Wagner so successful and so useful for Moscow as an extension of its foreign policy and influence, is now damaged. As previously noted, Russian Foreign Minister Sergei Lavrov, as well as Putin, publicly confirmed direct links between Wagner and the Russian state apparatus.

Africa is intimately linked to Wagner: In the wake of Wagner’s involvement in Syria, Africa became the scene of the group’s expansion. Engaging in Sudan, the Central African Republic, Libya, Mozambique, Madagascar, and Mali, Wagner employed an opportunistic strategy of supplying security while taking concessions to mine natural resources. While its forces were in most cases invited to stabilize fragile states, its actions actively invited further instability, creating more opportunities and a greater demand signal for its services, ultimately granting renewing opportunities to Moscow to reinforce its footprint in the continent.

While denying direct links to Wagner’s actions in Africa might have become more difficult for the Kremlin, Russia is unlikely to waste the network of influence built by the group in recent years. Instead, Moscow will likely continue to deploy hybrid tools such as Wagner, although organized in different shapes and forms, so Russia can continue displacing Western influence, exploiting natural resources, and evading sanctions through dozens of front companies.

Mattia Caniglia, associate director, Brussels, Belgium

Investigation sheds light on how Putin’s childhood friends allegedly evade sanctions

On June 20, the Organized Crime and Corruption reporting project (OCCRP) published a series of investigations titled “The Rotenberg Files” that shed light on the business dealings and alleged sanctions evasion attempts of Boris and Arkady Rotenberg, close friends of Russian President Vladimir Putin. The report is based on fifty thousand leaked emails and documents, examined by journalists from seventeen outlets. The OCCRP said the leak came from a source who worked for the brothers at a Russian management firm. The OCCRP investigation was conducted in partnership with the Times of London, Le Monde, and Forbes, among others.

Boris and Arkady Rotenberg are childhood friends of Putin. The billionaire brothers faced Western sanctions amid Russia’s 2014 annexation of Crimea, but their lavish lifestyles do not appear to have been impacted. 

According to the OCCRP, the leaked documents demonstrate how the Rotenberg brothers allegedly used Western lawyers, bankers, corporate service providers, and proxies to evade sanctions. 

One of the report’s findings also alleges the brothers maintain business links to Prince Michael of Kent, a cousin of the late Queen Elizabeth II who was previously accused by the Sunday Times and Channel 4 of profiting off close access to the Kremlin. According to the latest investigation, “Prince Michael distanced himself from earlier ties to the Putin regime in the wake of the 2022 invasion of Ukraine. But leaked emails and corporate records show he co-owns a company with two Russian businessmen who helped billionaire oligarch and Putin ally Boris Rotenberg dodge Western sanctions.” 

Another investigation from the Rotenberg files reported that Putin’s eldest daughter regularly visited a holiday property financed by Arkady Rotenberg in an exclusive Austrian skiing destination. Documents reviewed by the OCCRP suggest that the house was purchased by a Cypriot company in 2013 with a loan from a bank then owned by Arkady, using funds invested by another company he owned. Other records suggested that the former romantic partner of Putin’s daughter is connected to the company that owns the Austrian property. Residents claim to have seen Putin himself at the Kitzbühel residence, though this has not been confirmed. 

The Rotenberg brothers and Prince Michael declined to comment to the OCCRP investigative consortium.

Ani Mejlumyan, research assistant, Yerevan, Armenia

The post Russian War Report: Kremlin denies that it targeted civilians in a missile attack on a pizza restaurant appeared first on Atlantic Council.

]]>
The disinformation landscape in West Africa and beyond https://www.atlanticcouncil.org/in-depth-research-reports/report/disinformation-west-africa/ Thu, 29 Jun 2023 09:00:00 +0000 https://www.atlanticcouncil.org/?p=655037 A look at West Africa’s information environment, with particular emphasis on local and international disinformation campaigns targeting the region and beyond.

The post The disinformation landscape in West Africa and beyond appeared first on Atlantic Council.

]]>

Introduction

The prominence of West Africa, and Africa as a whole, within the global disinformation ecosystem cannot be ignored. A report by the Africa Center for Strategic Studies released in April 2022 identified twenty-three disinformation campaigns targeting African countries dating back to 2014. Of these campaigns, sixteen are linked to Russia.

The listed disinformation campaigns—nine of which were identified by the DFRLab—reveal two key points. First, there has been a marked increase in the number of publicly identified disinformation campaigns in recent years. Whether this is due to an increase in the scrutiny, analytical capacity, or efforts on the part of bad actors is unclear. Second, the characteristics of each of these influence operations are distinct—these operations target a wide variety of issues, such as elections, the war in Ukraine, commercial interests, and domestic and international politics.

Further, relations between France and francophone West Africa have, following years of amicable relations built on the back of military cooperation, seen a marked erosion that was underscored by the exit of the last of the French troops from Mali in August 2022. Anti-France and pro-Russia sentiments have surged contemporaneously, with overlapping narratives positioning Russia as a viable alternative to Western aid. When French forces began their departure from Mali in June 2022, Russian private military companies (PMCs) such as the Wagner Group stood ready to fill the void.

This report examines several influence operation case studies from the West African region, with a particular emphasis on Mali, Burkina Faso, Côte d’Ivoire, and Niger. The narratives, actors, and contexts supporting these influence operations are summarized alongside their impact on regional stability. Russian influence plays a significant role in these case studies, an unsurprising fact considering the geopolitical history of this region.

This report also includes case studies from outside the Sahel region, consisting of thematically distinct but strategically noteworthy influence campaigns from elsewhere on the continent. For example, the Nigerian government used social media influencers to suppress citizen participation in the #EndSARS movement. Elsewhere, the Ethiopian diaspora used innovative click-to-tweet campaigns to spread international awareness of the conflict in Ethiopia’s Tigray region. In South Africa, the rise in violent xenophobic demonstrations was precipitated by a popular social media campaign that normalized prejudice against foreign nationals.

The plethora of actors, targets, strategies, and tactics make a blanket approach to studying African disinformation networks difficult. The depth and breadth of these campaigns shows that Africa is facing the same challenges as the rest of the world insofar as disinformation is concerned. Moreover, the interest shown by foreign governments attests to the region’s geopolitical significance. This combination of geopolitical importance and a vulnerability to influence campaigns makes Africa a notable case study.

Background

Africa’s information environment is not monolithic Analog channels such as radio and film are used in conjunction with digital efforts to reach audiences, but Internet penetration rates and the accompanying reli- ance on analog media differ significantly from country to country For example, as of January 2022, Morocco, the Seychelles, and Egypt maintained Internet penetration rates of higher than 70 percent, nearly ten times the rate of the country with the lowest penetration rate, the Central African Republic (7 percent).

In the countries mentioned in the table above, Facebook and Instagram maintain a leading position insofar as social media penetration is concerned This can be partly ascribed to Facebook’s Free Basics service that “zero-rates” data (including Facebook and Instagram data) on participating mobile networks. These mobile networks can then bundle Facebook and Instagram data into a consumer’s service plan without the consumer having to pay extra for that data use Considering that mobile connections outstrip desktop connections, and that mo- bile data is more expensive than fixed broadband, it is clear why this has been effective to expand Facebook and Instagram’s footprint Meta shuttered the Free Basics program in some regions at the end of 2022 as the program’s spiritual successor – Meta Discover – was being rolled out The impact this will have on the information environment remains to be seen.

Social media and internet penetration rates in some of the African countries referenced in this report

Breakdown of Social Media and Internet Penetration Rates in Some of the African Countries Referenced in This Report

With contributions from

Code for Africa

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

The post The disinformation landscape in West Africa and beyond appeared first on Atlantic Council.

]]>
Global Strategy 2023: Winning the tech race with China https://www.atlanticcouncil.org/content-series/atlantic-council-strategy-paper-series/global-strategy-2023-winning-the-tech-race-with-china/ Tue, 27 Jun 2023 13:00:00 +0000 https://www.atlanticcouncil.org/?p=655540 The United States and the People’s Republic of China (PRC) are engaged in a strategic competition surrounding the development of key technologies. Both countries seek to out-compete the other to achieve first-mover advantage in breakthrough technologies, and to be the best country in terms of the commercial scaling of emerging and existing technologies.

The post Global Strategy 2023: Winning the tech race with China appeared first on Atlantic Council.

]]>
Table of contents

As strategic competition between the United States and China continues across multiple domains, the Scowcroft Center for Strategy and Security in partnership with the Global China Hub, has spent the past year hosting a series of workshops aimed at developing a coherent strategy for the United States and its allies and partners to compete with China around technology. Based on these workshops and additional research, we developed our strategy for the US to retain its technological advantage over China and compete alongside its allies and partners.

Strategy Paper Editorial board

Executive editors

Frederick Kempe
Alexander V. Mirtchev

Editor-in-chief

Matthew Kroenig

Editorial board members

James L. Jones
Odeh Aburdene
Paula Dobriansky
Stephen J. Hadley
Jane Holl Lute
Ginny Mulberger
Stephanie Murphy
Dan Poneman
Arnold Punaro

Executive summary

The United States and the People’s Republic of China (PRC) are engaged in a strategic competition surrounding the development of key technologies. Both countries seek to out-compete the other to achieve first-mover advantage in breakthrough technologies, and to be the best country in terms of the commercial scaling of emerging and existing technologies.

Until recently, the United States was the undisputed leader in the development of breakthrough technologies, and in the innovation and commercial scaling of emerging and existing technologies, while China was a laggard in both categories. That script has changed dramatically. China is now the greatest single challenger to US preeminence in this space. 

For the United States, three goals are paramount. The first is to preserve the US advantage in technological development and innovation relative to China. The second is to harmonize US strategy and policy with those of US allies and partners, while gaining favor with nonaligned states. The third is to retain international cooperation around trade in technology and in scientific research and exploration.

The strategy outlined in these pages has three major elements: the promotion of technologically based innovation; the protection of strategically valuable science and technology (S&T) knowhow, processes, machines, and technologies; and the coordination of policies with allies and partners. The shorthand for this triad is “promote, protect, and coordinate.”

On the promotion side, if the United States wishes to remain the leading power in scientific research and in translating that research into transformative technologies, then the US government—in partnership with state and local governments, the private sector, and academia—will need to reposition and recalibrate its policies and investments. On the protect side, a coherent strategy requires mechanisms to protect and defend a country’s S&T knowledge and capabilities from malign actors, including trade controls, sanctions, investment screening, and more. Smartly deploying these tools, however, is exceedingly difficult and requires the United States to hone its instruments in a way that yields only intended results. The coordination side focuses on “tech diplomacy,” given the need to ensure US strategy and policy positively influence as many allies, partners, and even nonaligned states as possible, while continuing to engage China on technology-related issues. The difficulty lies in squaring the interests and priorities of the United States with those of its allies and partners, as well as nonaligned states, and even China itself. 

This strategy assumes that China will remain a significant competitor to the United States for years to come. It also assumes that relations between the United States and China will remain strained at best or, at worst, devolve into antagonism or outright hostility. Even if a thaw were to reset bilateral relations entirely, the US interest in maintaining its advantage in technological development would remain. 

Any successful long-term strategy will require that the US government pursue policies that are internally well coordinated, are based on solid empirical evidence, and are flexible and nimble in the short run, while being attentive to longer-run trends and uncertainties. 

There are two major sets of risks accompanying this strategy. Overreach is one because decoupling to preserve geopolitical advantages can be at odds with economic interests. A second involves harms to global governance including failure to continue cooperation surrounding norms and standards to guide S&T research, and failure to continue international science research cooperation focused on solving global-commons challenges such as pandemics and climate change. 

The recommendations that follow from this analysis include the following, all directed at US policymakers.

  1. Restore and sustain public research and development (R&D) funding for scientific and technological advancement.
  2. Improve and sustain STEM (science, technology, engineering, and math) education and skills training across K–12, university, community college, and technical schools.
  3. Craft a more diverse tech sector.
  4. Attract and retain highly skilled talent from abroad.
  5. Support whole-of-government strategy development.
  6. Ensure private-sector firms remain at the cutting edge of global competitiveness. 
  7. Improve S&T intelligence and counterintelligence.
  8. Ensure calibrated development and application of punitive measures. 
  9. Build out and sustain robust multilateral institutions.
  10. Engage with China, as it cannot be avoided.

Back to top

A 2033 What If…

Imagine that it is the year 2033. Imagine that China has made enormous strides forward in the technology arena at the expense of the United States and its allies and partners. Suppose that this outcome occurred because, between 2023 and 2033, China’s economy not only does not weaken substantially but instead goes from strength to strength, including (importantly) increasing its capabilities in technological development and innovation. Suppose, too, that the US government failed to craft and maintain the kinds of investments and policies that are needed to sustain and enhance its world-leading tech-creation machine—its “innovation ecosystem”—to stay ahead of China. Suppose that the US government also failed to properly calibrate the punitive measures designed to prevent China from acquiring best-in-class technologies from elsewhere in the world—where calibration means the fine-tuning of policies to achieve prescribed objectives without spillover consequence. Finally, suppose that the United States and its allies and partners around the world failed to align with one another in terms of strategies and policies regarding how to engage China and, just as critically, about alignment of their own ends. What might that world look like?

Looking at that world from the year 2033, a first observation is that US scientific and technological (S&T) advantage, a period that lasted from 1945 to the 2020s, has come to an end. In its place is a world where China’s government labs, universities, and firms are often the first to announce breakthrough scientific developments and the first to turn them into valuable technologies.

For the US government and for allies and partners in the Indo-Pacific region, the strategic consequences are severe, as China has not only closed much of the defense spending gap by 2033 but is able to employ weaponry as advanced, and in some cases more advanced, than those of the United States and its allies.1 Military planners from Washington to New Delhi watch China’s rising capabilities with much anxiety, given the geostrategic leverage that such changes have given Beijing across the region.

Nor is this problem the only headache for the United States and its coalition of partners in 2033. For a variety of reasons, many of China’s tech firms are outcompeting those elsewhere in the world, including some of the United States’ biggest and most important firms. Increasingly, the world looks as much to Shenzhen as to Silicon Valley for the latest tech-infused products and services.

China’s long-standing ambition to give its tech firms an advantage has paid off. The Chinese state has successfully pursued its strategy of commercial engagement with other countries, one that has been well known for decades and is characterized by direct and indirect financial and technical aid for purchases of Chinese hardware and software. This approach, while imperfect, drove adoption of Chinese technology abroad, with much of that adoption happening in the Global South.2 Across much of Africa, Latin America, South and Southeast Asia, and the Middle East, China has grown into the biggest player in the tech space, with its technologies appealing both to consumers and to many governments looking for financial assistance in upgrading their tech infrastructure. Moreover, China’s tech assistance has aided authoritarian governments seeking the means to control access to information, especially online, and the desire to surveil citizens and suppress dissent.3 China’s efforts have been a major reason why the internet has fractured in many countries around the world. The ideal of the internet as an open platform is largely gone, replaced by a system of filtered access to information—in many instances, access that is controlled by authoritarian and illiberal states.

In 2033, even the biggest US-based tech firms struggle to keep pace with Chinese firms, as do tech firms based in Europe, Asia, and elsewhere. Although still formidable, Western firms find themselves at a disadvantage in both domestic and foreign markets. China’s unfair trading practices have continued to give its firms an edge, even in markets in mature economies and wealthy countries. China has continued its many unfair trading practices, including massive direct and indirect state subsidies and regulatory support for its firms, suspect acquisition—often outright theft—of intellectual property (IP) from firms abroad, and requiring that foreign firms transfer technology to China in exchange for granting access to its enormous domestic consumer market, in 2033 the biggest in the world.4 When added to the real qualitative leaps that China has made in terms of the range and sophistication of its tech-based products and services, foreign firms are often on the back foot even at home. In sector after sector, China is capturing an increasingly large share of global wealth.

Nor is this all. China’s rising influence means that the democratic world has found it impossible to realize its preferences concerning the global governance of technology. This problem extends beyond China’s now significant influence on technical-standards development within the range of international organizations that are responsible for standards.5 The problem is much larger than even that. Since the early 2020s, because of decreasing interest in scientific cooperation, the United States, China, and Europe have been unable to agree on the basic norms and principles that should guide the riskiest forms of advanced tech development. As a result, big gaps have appeared in how the major players approach such development. This patchwork, incomplete governance architecture has meant that countries, firms, and even individual labs have forged ahead without common ethical-normative frameworks to guide research and development. In such fields as artificial intelligence (AI), China has increased its implementation of AI-based applications that have eroded individual rights and privacies—for example, AI-driven facial-recognition technologies used by the state to monitor individual activity—not only within China, but in parts of the world where its technologies have been adopted.6

Nor is even this long list all that is problematic in the year 2033. Scientific cooperation between the United States and China—and, by extension, China and many US allies and partners—has declined precipitously since 2023. Cross-national collaboration among the world’s scientists has always been a proud hallmark of global scientific research, delivering progress on issues ranging from cancer treatments to breakthrough energy research. Collaboration between China on the one hand, and Western states on the other, used to be a pillar of global science. Now, unfortunately, much of that collaboration has disappeared, given the rising suspicions and antagonism and the resulting policies that were implemented to limit and, in some cases, even block scientific exchange.7

From the perspective of developments that led to this point in the year 2033, the United States and its allies and partners failed to pursue a coherent, cooperative, and united strategy vis-à-vis strategic competition with China. Policymakers were unable to articulate, and then implement, policies that were consistent over time and across national context. Various international forums were created for engagement on strategy and policy questions, but they proved of low utility as policy harmonization bodies or tech trade-dispute mechanisms.

Opening session of US-China talks at the Captain Cook Hotel in Anchorage, Alaska, US March 18, 2021. REUTERS/Frederic J. Brown

Back to top

Strategic context

The above scenario, which sketches a world in 2033 where China has gained the upper hand at the expense of the United States and its allies and partners, is not inevitable. As this strategy paper articulates, there is much that policymakers in the United States and elsewhere can do to ensure that more benign futures, from their perspectives, are possible. However, as this strategy paper also articulates, their success is far from a given.

The United States and the People’s Republic of China (PRC) are engaged in a strategic competition surrounding the development of key technologies, including advanced semiconductors (“chips”), AI, advanced computing (including quantum computing), a range of biotechnologies, and much more. Both countries seek to out-compete the other to achieve first-mover advantage in breakthrough technologies, and to be the best country at the commercial scaling of emerging and existing technologies.

These two capabilities—the first to develop breakthrough technologies and the best at tech-based innovation—overlap in important respects, but they are not identical and should not be regarded as the same thing. The first country to build a quantum computer for practical application (such as advanced decryption) is an example of the former capability; the country that is best at innovating on price, design, application, and functionality of electric vehicles (EVs) is an example of the latter capability. The former will give the inventing country a (temporary) strategic and military advantage; the latter will give the more innovative country a significant economic edge, indirectly contributing to strategic and military advantage. The outcome of this competition will go a long way toward determining which country—China or the United States—has the upper hand in the larger geostrategic competition between them in the coming few decades.

For China, the primary goal is to build an all-encompassing indigenous innovation ecosystem, particularly in sectors that Chinese leadership has deemed critical. Beijing views technology as the main arena of competition and rivalry with the United States, with many high-level policies and strategy documents released under Xi Jinping’s tenure emphasizing technology across all aspects of society. Under Xi’s direction, China has intensified its preexisting efforts to achieve self-sufficiency in key technology sectors, centering on indigenous innovation and leapfrogging the United States. 

On the US side, the Joe Biden administration and Congress have emphasized the need to maintain leadership in innovation and preserve US technological supremacy. Although there are many similarities between the Donald Trump and Biden administrations’ approaches to competition with China, one of the primary differences has been the Biden administration’s focus on bringing allies and partners onboard and trying to make policies as coordinated and multilateral as possible. While a laudable goal, implementation of a seamless allies-and-partners coordination is proving difficult.

Until recently, the United States was the undisputed leader in the development of breakthrough technologies, and in the innovation and commercial scaling of emerging and existing technologies. Until recently, China was a laggard in both categories, falling well behind the United States and most, if not all, of the world’s advanced economies in both the pace of scientific and technological (S&T) development and the ability to innovate around technologically infused products and services.

That script has changed dramatically as a result of China’s rapid ascension up the S&T ladder, starting with Deng Xiaoping’s reforms in the 1970s and 1980s and continuing through Xi Jinping’s tenure.8

Although analysts disagree about how best to measure China’s current S&T capabilities and its progress in innovating around tech-based goods and services, there is no dispute that China is now the greatest single challenger to US preeminence in this space. In some respects, China may already have important advantages over the United States and all other countries—for example, in its ability to apply what has been labeled “process knowledge,” rooted in the country’s vast manufacturing base, to improve upon existing tech products and invent new ones.9

Chinese President Xi Jinping speaks at the military parade marking the 70th founding anniversary of People’s Republic of China, on its National Day in Beijing, China October 1, 2019. REUTERS/Jason Lee

This competition represents a new phase in the two countries’ histories. The fall of the Berlin Wall and the decade that followed saw US leadership seek to include China as a member of the rules-based international order. In a March 2000 speech, President Bill Clinton spoke in favor of China’s entry into the World Trade Organization (WTO), arguing that US support of China’s new permanent normal trade relations (PNTR) status was “clearly in our larger national interest” and would “advance the goal America has worked for in China for the past three decades.”10 China’s leadership returned the favor, with President Jiang Zemin later stating that China “would make good on [China’s] commitments…and further promote [China’s] all-directional openness to the outside world.”11

Despite some US concerns, the period from 2001 through most of the Barack Obama administration saw Sino-American relations at their best.12 The lure of the Chinese market was strong, with bilateral trade in goods exploding from less than $8 billion in 1986 to more than $578 billion in 2016.13 People-to-people exchanges increased dramatically as well, with tourism from China increasing from 270,000 in 2005 to 3.17 million in 2017, and the number of student F-visas granted to PRC students increasing tenfold, from approximately 26,000 in 2000 to nearly 250,000 in 2014.14 US direct investment in China also grew significantly after 2000, as US companies saw the vast potential of the Chinese market and workforce. Notably, overall US investment in China continued to grow even after the COVID-19 pandemic.15

So what changed? In a 2018 essay titled “The China Reckoning,” China scholars Ely Ratner and Kurt Campbell—now both members of the Biden administration—described how the US plan for China and its role in the international system had not gone as hoped. 

Neither carrots nor sticks have swayed China as predicted. Diplomatic and commercial engagement have not brought political and economic openness. Neither US military power nor regional balancing has stopped Beijing from seeking to displace core components of the US-led system. And the liberal international order has failed to lure or bind China as powerfully as expected. China has instead pursued its own course, belying a range of American expectations in the process.

Campbell and Ratner, “The China Reckoning.”

These sentiments were shared by many others in Washington. Many felt like China was taking advantage of the United States as the Obama administration transitioned to its “pivot to Asia.” For example, in 2014 China sent an uninvited electronic-surveillance ship alongside four invited naval vessels to the US-organized Rim of the Pacific (RIMPAC) military exercises, damaging what had appeared to be improving military-to-military relations.16 On the economic side, despite the two sides signing an agreement in April 2015 not to engage in industrial cyber espionage, it soon became clear that China did not plan to uphold its side of the bargain. In 2017, the US Department of Justice indicted three Chinese nationals for cyber theft from US firms, including Moody’s Analytics, Siemens AG, and Trimble.17

Within China, political developments were also driving changes in the relationship. Xi Jinping assumed power in November 2012, and most expected him to continue on his predecessors’ trajectory. However, in 2015 a slew of Chinese policies caught the eye of outside observers, especially the “Made in China 2025” strategy that caused a massive uproar in Washington and other global capitals, given its explicit focus on indigenization of key sectors, including the tech sector. 

On the US side, when President Trump was elected in 2017, the bilateral economic relationship came under further fire, sparked by growing concerns surrounding China’s unfair trade practices, IP theft, and the growing trade deficit between the two countries. First the first time, frustration over these issues brought about strong US policy responses, including tariffs on steel, aluminum, soybeans, and more, a Section 301 investigation of Chinese economic practices by the US trade representative, and unprecedented export controls on the Chinese firms Huawei and ZTE. On the Chinese side, a growing emphasis on self-reliance, in conjunction with narratives surrounding the decline of the West, has dominated the conversation at the highest levels of government. In many instances, some of these statements—like China’s relatively unachievable indigenization goals in the semiconductor supply chain—have pushed the US policy agenda closer toward one centering on zero-sum tech competition.

In 2023, the Biden administration continued some Trump-era policies toward China, often reaching for export controls as a means to prevent US-origin technology from making its way to China. The Biden administration is even considering restricting outbound investment into China, stemming from concerns around everything from pharmaceutical supply chains to military modernization. The bottom line is that US-China competition is intense, and is here to stay for the foreseeable future. 

Back to top

Goals

There are three underlying goals for policymakers in the United States to consider when developing a comprehensive strategy. 

  1. Preserve the US advantage in technological development and innovation relative to China. Although the United States has historically led the world in the development of cutting-edge technologies, technological expertise, skills, and capabilities have proliferated worldwide and eroded this advantage. Although the United States arguably maintains its first position, it can no longer claim to be the predominant global S&T power across the entire board. As a result, US leadership will have to approach this issue with a clear-eyed understanding of US capabilities and strengths, as well as weaknesses. 

    Further, it is impractical to believe that the United States alone can lead in all critical technology areas. US policymakers must determine (with the help of the broader scientific community) not only which technologies are critical to national security but also how these technologies are directly relevant in a national security context. This point suggests the need for aligning means with ends—what is the US objective in controlling or promoting a specific technology? Absent strong answers to this question, technology controls or promotion efforts will likely yield unintended results, both good and bad. 

    Further, it is impractical to believe that the United States alone can lead in all critical technology areas. US policymakers must determine (with the help of the broader scientific community) not only which technologies are critical to national security but also how these technologies are directly relevant in a national security context. This point suggests the need for aligning means with ends—what is the US objective in controlling or promoting a specific technology? Absent strong answers to this question, technology controls or promotion efforts will likely yield unintended results, both good and bad. 

    Further, the United States’ capacity to transform basic research into applications and commercial products is an invaluable asset that has propelled its innovation ecosystem for decades. In contrast, Chinese leadership is keenly aware of its deficiencies in this area. 

    First-mover advantage in laboratory scientific research is not the same thing as innovation excellence. A country needs both if it seeks predominance. A country can have outstanding scientific capabilities but poor innovation capacity (or vice versa). Claims that China is surpassing the United States and other advanced countries in critical technology areas are premature, and often fail to consider how metrics to assess innovative capacity interact with one another (highly cited publications, patents, investment trends, market shares, governance, etc.).18 Assessing a country’s ability to preserve or maintain its technological advantage requires a holistic approach that takes all of these factors into account.
  2. Harmonize strategy and policy with allies and partners, while gaining favor with nonaligned states. With respect to strategic competition vis-a-vis China, the interests of the United States are not always identical to those of its allies and partners. Any strategy designed to compete in the tech space with China needs to align with the strategies and interests of US allies and partners. Simultaneously, US strategy should offer benefits to nonaligned states within the context of this strategic competition with China, so as to curry favor with them.

    This goal is especially important, given that the United States relies on and benefits from a network of allies and partners, whereas China aspires to self-sufficiency in S&T development. To preserve the United States’ advantage, US leadership must first recognize that its network is one of the strongest weapons in the US arsenal.

    US allies and partners, of which there are many, want to maintain and strengthen their close diplomatic, security, and economic ties to the United States. The problem is that most also have substantial, often critical, economic relationships with China. Hence, they are loath to jeopardize their relationships with either the United States or China. 

    This strategic dilemma has become a significant one for US allies in both the transpacific and transatlantic arenas. As examples, Japan and South Korea, the two most advanced technology-producing countries in East Asia, are on the front lines of this dilemma. Their challenging situation owes to their geographic proximity to China on the one hand—and, hence, proximity to China’s strategic ambitions in the East and South China Seas, as well as Taiwan—and to their close economic ties to both China and the United States on the other.19 Although both have been attempting an ever-finer balancing act between the United States and China for years, the challenge is becoming more difficult.20 In January 2023, Japan reportedly joined the United States and the Netherlands to restrict sales of advanced chipmaking lithography machines to China, despite the policy being against its clear economic interests.21 In April and May 2023, even before China banned sales of chips from Micron Technology, a US firm, the US government was urging the South Korea government to ensure that Micron’s principal rivals, South Korea’s Samsung Electronics and SK Hynix, did not increase their sales in China.22

    For nonaligned states, many of which are in the Global South, their interests are manifold and not easily shoehorned into a US-versus-China bifurcation. Many states in this category have generalized concerns about a world that is dominated by either Washington or Beijing, and, as such, are even more interested in hedging than are the closest US allies and partners. Their governments and business communities seek trade, investment, and access to technologies that can assist with economic development, while their consumers seek affordable and capable tech. Although China has made enormous strides with respect to technological penetration of markets in the Global South, there also is much opportunity for the United States and its allies and partners, especially given widespread popular appetite for Western ideals, messaging, and consumer-facing technologies.23
  3. Retain cooperation around trade and scientific exploration. One of the risks that is inherent in a fraught Sino-American bilateral relationship is that global public-goods provision will be weakened. Within the context of rising tensions over technological development, there are two big concerns: first, that global trade in technologically based goods and services will be harmed, and second, that global scientific cooperation will shrink. 

    An open trading system has been an ideal of the rules-based international order since 1945, built on the premise that fair competition within established trading rules is best for global growth and exchange. The US-led reforms at the end of the World War II and early postwar period gave the world the Bretton Woods system, which established the International Monetary Fund (IMF), plus the Marshall Plan and the General Agreement on Tariffs and Trade (GATT). Together, these reforms enabled unprecedented multi-decade growth in global trade.24 China’s accession to the WTO in 2001, which the US government supported, marked a high point as many read into China’s entry its endorsement of the global trade regime based on liberal principles. However, since then—and for reasons having much to do with disagreements over China’s adherence to WTO trading rules—this global regime has come under significant stress. In 2023, with few signs that the Sino-American trade relationship will improve, there is significant risk of damage to the global trading system writ large.25

    Any damage done to the global trading system also risks harm to trade between the two countries, which is significant given its ongoing scale (in 2022, bilateral trade in goods measured a record $691 billion).26. Tech-based trade and investment remain significant for both countries, as illustrated by the February 2023 announcement of a $3.5-billion partnership between Ford Motor Company and Contemporary Amperex Technology Limited (CATL) to build an EV-battery plant in Michigan using CATL-licensed technology.27 A priority for US policymakers should be to preserve trade competition in tech-infused goods and services, at least for those goods and services that are not subject to national security-based restrictions and where China’s trade practices do not result in unfair advantages for its firms. 

    Beyond trade, there are public-goods benefits resulting from bilateral cooperation in the S&T domain. These benefits extend to scientific research that can hasten solutions to global-commons challenges—for example, climate change. China and the United States are the two most active countries in global science, and are each other’s most important scientific-research partner.28 Any harm done to their bilateral relationship in science is likely to decrease the quality of global scientific output. Further, the benefits from cooperation also extend to creation and enforcement of international norms and ethics surrounding tech development in, for example, AI and biotechnology.
A worker conducts quality-check of a solar module product at a factory of a monocrystalline silicon solar equipment manufacturer LONGi Green Technology Co, in Xian, Shaanxi province, China December 10, 2019. REUTERS/Muyu Xu

Back to top

Major elements of the strategy

The strategy outlined in these pages has three major elements: the promotion of technologically based innovation, sometimes labeled “running faster”; the protection of strategically valuable S&T knowhow, processes, machines, and technologies; and the coordination of policies with allies and partners. This triad—promote, protect, and coordinate—is also shorthand for the most basic underlying challenge facing strategists in the US government and in the governments of US allies and partners. In the simplest terms, strategists should aim to satisfy the “right balance between openness and protection,” in the words of the National Academies of Sciences, Engineering, and Medicine.29 This strategic logic holds for both the United States and its allies and partners.

  1. Promote: The United States has been the global leader in science and tech-based innovation since 1945, if not earlier. However, that advantage has eroded, in some areas significantly, in particular since the end of the Cold War. If the United States wishes to remain the leading power in scientific research and in translating that research into transformative technologies (for military and civilian application), then the US government, in partnership with state and local governments, the private sector, and academia, will have to reposition and recalibrate its policies and investments.

    The preeminence of America’s postwar innovation ecosystem resulted from several factors, including: prewar strengths across several major industries; massive wartime investments in science, industry, and manufacturing; and even larger investments made by the US government in the decades after the war to boost US scientific and technological capabilities. The 1940s through 1960s were especially important, owing to the whole-of-society effort behind prosecuting World War II and then the Cold War. The US government established many iconic S&T-focused institutions, including the National Science Foundation (NSF), Defense Advanced Research Projects Agency (DARPA), the National Aeronautics and Space Administration (NASA), most of the country’s national laboratories (e.g., Sandia National Laboratories and Lawrence Livermore National Laboratories), and dramatically boosted funding for science education, public-health research, and academic scientific research.30

    This system, and the enormous investments made by the US government to support it, spurred widespread and systematized cooperation among government, academic science, and the private sector. This cooperation led directly to a long list of breakthrough technologies for military and civilian purposes, and to formation of the United States’ world-leading tech hubs, Silicon Valley most prominent among them.31

    The trouble is that after the Cold War ended, “policymakers [in the US government] no longer felt an urgency and presided over the gradual and inexorable shrinking of this once preeminent system,” in particular through allowing federal spending on research and development (R&D) and education to flatline or even atrophy.32 From a peak of around 2.2 percent of national gross domestic product (GDP) in the early 1960s, federal R&D spending has declined since, reaching a low of 0.66 percent in 2017 before rebounding slightly to 0.76 percent in 2023.33

    Today, US competitors, including China, have figured out the secrets to growing their own innovation ecosystems (including the cultural dimensions that historically have been key to separating the United States from its competition) and are investing the necessary funding to do so. For example, several countries, especially China, have outpaced the United States in R&D spending. Between 1995 and 2018, China’s R&D spending grew at an astonishing 15 percent per annum, about double that of the next-fastest country, South Korea, and about five times that of the United States. By 2018, China’s total R&D spending (from public and private sources) was in second place behind the United States and had surpassed the total for the entire European Union.34 From the US perspective, other metrics are equally concerning. A 2021 study by Georgetown University’s Center for Security and Emerging Technology (CSET) projected that China will produce nearly twice as many STEM PhDs as the United States by 2025 (if counting only US citizens graduating with a PhD in STEM, that figure would be three times as much). This projection is based, in part, on China’s government doubling its investment in STEM higher education during the 2010s.35

    The United States retains numerous strengths, including the depth and breadth of its scientific establishment, number and sizes of its Big Tech firms, robust startup economy and venture capital to support it, numerous world-class educational institutions, dedication to protection of intellectual property, relatively open migration system for high-skilled workers, diverse and massive consumer base, and its still-significant R&D investments from public and private sources.36

    In addition, over the past few years there have been encouraging signs of a shift in thinking among policymakers, away from allowing the innovation model that won the Cold War to further erode and toward increased bipartisan recognition that the federal government has a critical role to play in updating that system. As was the case with the Soviet Union, this newfound interest in strengthening the US innovation ecosystem owes much to a recognition that China is a serious strategic competitor to the United States in the technology arena.37 The Biden administration’s passage of several landmark pieces of legislation, including the CHIPS and Science Act, the Inflation Reduction Act (IRA), and the Infrastructure Investment and Jobs Act (IIJA), increased the amount of federal government spending on S&T, STEM education and skills training, and various forms of infrastructure (digital and physical), all of which are concrete evidence of the degree to which this administration and much of Congress recognize the stiff challenge from China.
  2. Protect: A coherent strategy requires mechanisms to protect and defend a country’s S&T knowledge and capabilities from malign actors. Policy documents and statements from US officials over the past decade have called out the many ways in which the Chinese state orchestrates technology transfer through licit and illicit means, ranging from talent-recruitment programs and strategic mergers and acquisitions (M&A) to outright industrial espionage via cyber intrusion and other tactics.38

    On the protect side, tools include trade controls, sanctions, investment screening, and more. On the export-control side, both the Trump and Biden administrations have relied on dual-use export-control authorities to both restrict China’s access to priority technologies and prevent specific Chinese actors (those deemed problematic by the US government) from accessing US-origin technology and components.39 Investment screening has also been a popular tool; in 2018, Congress passed the bipartisan Foreign Investment Risk Review Modernization Act (FIRRMA) that strengthened and modernized the Committee on Foreign Investment in the United States (CFIUS)—an interagency body led by the Treasury Department that reviews inbound foreign investment for national security risks.40 Under the Biden administration, a new emphasis on the national security concerns associated with US outbound investment into China has arisen, with an executive order focused on screening outbound tech investments in the works for almost a year.41 On sanctions, although the United States has so far been wary of deploying them against China, the Biden administration has, in conjunction with thirty-eight other countries, imposed a harsh sanctions regime on Russia and Belarus following Russia’s unprovoked invasion of Ukraine.42

    Trade controls can be effective tools, but they need to be approached with a clear alignment between means and ends. For decades, an array of export controls and other regulations have worked to prevent rivals from accessing key technologies. However, historical experience (such as that of the US satellite industry) shows that, with a clear alignment between means and ends, trade controls can have massive implications for the competitiveness of US industries and, by extension, US national security.43

    Before deploying these tools, it is critical for policymakers to first identify what China is doing—both within and outside its borders—in its attempts to acquire foreign technology, an evaluation that should allow the United States to hone more targeted controls that can yield intended results. Trade controls that are too broad and ambiguous tend to backfire, as they create massive uncertainties that lead to overcompliance on the part of industry, in turn causing unintended downside consequences for economic competitiveness.

    Understanding China’s strategy for purposes of creating effective trade controls is not as difficult as it once appeared. For instance, a 2022 report from CSET compiled and reviewed thirty-five articles on China’s technological import dependencies.44 This series of open-source articles, published in Chinese in 2018, provides specific and concrete examples of Chinese S&T vulnerabilities that can be used by policymakers to assess where and how to apply trade controls. Other similar resources exist. Although the Chinese government appears to be systematically tracking and removing these as they receive attention, there are ways for US government analysts and scholars to continue making use of these materials that preserve the original sources.
  3. Coordinate: The final strategy pillar is outward facing, focused on building and sustaining relationships with other countries in and around the tech strategy and policy space. This pillar might be labeled “tech diplomacy,” given the need to ensure US strategy and policy positively influences as many allies, partners, and even nonaligned states as possible, while continuing to engage China on technology-related issues. As with the other two pillars, this pillar is simple to state as a priority, but difficult to realize in practice.

    In a May 2022 speech, US Secretary of State Antony Blinken said that the administration’s shorthand formula is to “invest, align, [and] compete” vis-a-vis China.45 Here, he meant “invest” to refer to large public investments in US competitiveness, “align” to closer coordination with allies and partners on tech-related strategy and policy, and “compete” largely to geostrategic competition with China over Taiwan, the East and South China Seas, and other areas.

    Blinken’s remarks underscore the Biden administration’s priority for allies and partners to view the United States as a trusted interlocutor. When it comes to technology policy on China, the trouble lies in the execution—in particular, overcoming the tensions inherent within the “invest, align, compete” formula. After Blinken’s speech, for example, the IRA became law, which triggered a firestorm of protest among the United States’ closest transpacific and transatlantic allies. Viewing the IRA’s ample support for domestic production and manufacturing of electric vehicles and renewable-energy technologies—designed to boost the US economy and tackle climate change while taking on China’s advantages in these areas—the protectionist European Union (EU) went so far as to formulate a Green Deal Industrial Plan, widely seen as an industrial policy response to the IRA.46 Much of the row over the IRA resulted from the perception—real or not—that the United States had failed to properly consider allies’ and partners’ interests while formulating the legislation. In the words of one observer, “amid the difficult negotiations at home on the CHIPS Act and the IRA, allies and partners were not consulted, resulting in largely unintended negative consequences for these countries.”47

    Long-term investment by US policymakers in multilateral institutions focused on technology will be a critical aspect of any potential victory. The Biden administration is already making strides on this front through several multilateral arrangements, including the resurrection of the Quadrilateral Security Dialogue (the Quad) and the establishment of the US-EU Trade and Technology Council (TTC) and AUKUS trilateral pact. All three of these arrangements have dedicated time and resources to specific technological issues in both the military/geopolitical and economic spheres, and all three have the potential to be massively impactful in terms of technology competition.

    However, history has shown that these types of arrangements are only effective as long as high-level political leadership remains involved and dedicated to the cause. Cabinet officials and other high-level leaders from all participating countries—especially the United States—will have to demonstrate continued interest in and commitment to these arrangements if they want them to produce more than a handful of documents with broad strategic visions.

Back to top

Assumptions

The strategy outlined in these pages rests on two plausible assumptions. First, this strategy assumes that China will not follow the Soviet Union into decline, collapse, and disintegration anytime soon, which, in turn, means that China should remain a significant competitor to the United States for a long time to come.

China’s leadership has studied the collapse of the Soviet Union closely and learned from it, placing enormous weight on delivering economic performance through its brand of state capitalism while avoiding the kind of reforms that Mikhail Gorbachev instituted during the 1980s, which included freer information flows, freer political discourse, and ideological diversity within the party and state—all of which Chinese leadership believes to have been key to the Soviet Union’s undoing.48 China also does not have analogous centrifugal forces that threaten an internal breakup along geographic lines as did the Soviet Union, which had been constructed from the outset as a federation of republics built upon the contours of the tsarist empire. (The Soviet Union, after all, was a union of Soviet Socialist republics scattered across much of Europe and Asia).49

These factors weigh against an assessment that China will soon collapse. Nicholas Burns, the US ambassador to China, has said recently that China is “infinitely stronger” than the Soviet Union ever was, “based on the extraordinary strength of the Chinese economy” including “its science and technology research base [and] innovative capacity.” He concluded that the Chinese challenge to the United States and its allies and partners “is more complex and more deeply rooted [than was the Soviet Union] and a greater test for us going forward.”50

A more realistic long-term scenario is one in which the United States and its allies and partners would need to manage a China that will either become stronger or plateau, rather than one that will experience a steep decline. Both variants of this scenario are worrisome, and both underscore the need to hew to the strategy outlined in this paper. A stronger China brings with it obvious challenges. A plateaued China is a more vexing case, owing to the very real possibility that Chinese leadership might conclude that, as economic stagnation portends a future decline and fall, the case for military action (e.g., against Taiwan) is more, rather than less, pressing. The strategist Hal Brands, for example, has suggested that a China that has plateaued will become more dangerous than it is now, requiring a strategy that is militarily firm, economically wise (including maintenance of the West’s advantages in the tech-innovation space), and diplomatically flexible.51

Second, the strategy outlined here assumes that relations between the United States and China will remain strained at best or, at worst, devolve into antagonism or outright hostility. In 2023, the assumption of ongoing strained relations appears wholly rational, based on a straightforward interpretation of all available diplomatic evidence.

How this strategy should shift if the United States and China were to have a rapprochement would depend greatly on the durability and contours of that shift. Even if a thaw were to reset bilateral relations to where they were at the beginning of the century (an unlikely prospect), the US interest in maintaining a first-mover advantage in technological development would remain. As reviewed in this paper, there was a long period during which the United States and China traded technologically based goods and services in a more open-ended trading regime than is currently the case. During that period, the United States operated on two presumptions: that China’s S&T capabilities were nowhere near as developed as its own, and that the US system could stay ahead owing to its many strengths compared with China’s.

The trouble with returning to this former state is that both presumptions no longer hold. China has become a near-peer competitor in science and technological development, and its innovative capabilities are considerable.

If China and the United States were to thaw their relationship, the policy question would concern the degree to which the United States would reduce its “protect” measures—the import and export restrictions, sanctions, and other policies designed to keep strategic technologies and knowhow from China, while protecting its own assets from espionage, sabotage, and other potential harms.

Back to top

Guidelines for implementation

As emphasized throughout this paper, any successful long-term strategy will require that the US government pursue policies that are internally well coordinated, are based on solid empirical evidence, and are flexible and nimble in the short run, while being attentive to longer-run trends and uncertainties. The government will need to improve its capabilities in three areas.

  1. Improved intelligence and counterintelligence: The US government will need to reassess, improve, and extend its intelligence and counterintelligence capabilities about tech development. The intelligence community will need to be able to conduct ongoing, comprehensive assessments of tech trends and uncertainties of relevance to the strategic competition with the United States. To properly gauge the full range of relevant and timely information about China’s tech capabilities, the Intelligence Community’s practice of relying on classified materials will need to be augmented by stressing unclassified open-source material. Classified sources, which the Intelligence Community always has prioritized, do not provide a full picture of what is happening in China. Patent filings, venture-capital investment levels and patterns, scientific and technical literature, and other open sources can be rich veins of material for analysts looking to assess where China is making progress, or seeking to make progress, in particular S&T areas. The US government’s prioritization of classified material contrasts with the Chinese government’s approach. For decades, China has employed “massive, multi-layered state support” for the “monitoring and [exploitation] of open-source foreign S&T.”52 There is recognition that the US government needs to upgrade its capabilities in this respect. In 2020, the House Permanent Select Committee on Intelligence observed that “open-source intelligence (OSINT) will become increasingly indispensable to the formulation of analytic products” about China.53

    An intelligence pillar will need a properly calibrated counterintelligence element to identify where China might be utilizing its means and assets—including legal, illegal, and extralegal ones—to obtain intellectual property in the United States and elsewhere (China has a history of utilizing multiple means, including espionage, to gain IP that is relevant to their S&T development).54 Here, “properly calibrated” refers to how counterintelligence programs must ensure that innocent individuals, including Chinese nationals who are studying or researching in the United States, are not brought under undue or illegitimate scrutiny. At the same time, these programs must be able to identify, monitor, and then handle as appropriate those individuals who might be engaging in industrial espionage or other covert activities. The Trump administration’s China Initiative was criticized both for its name (it implied that Chinese nationals and anyone of East Asian descent were suspect) and the perception of too-zealous enforcement (the program resulted in several high-profile cases ending in dismissal or exoneration for the accused). In 2022, the Biden administration shuttered this initiative and replaced it with “a broader strategy aimed at countering espionage, cyberattacks and other threats posed by a range of countries.”55
  2. Improved foresight: Strategic-foresight capabilities assist governments in understanding and navigating complex and fast-moving external environments. Foresight offices in government and the private sector systematically examine long-term trends and uncertainties and assess how these will shape alternative futures. These processes often challenge deeply held assumptions about where the world is headed, and can reveal where existing strategies perform well or poorly.

    This logic extends to the tech space, where the US government should develop a robust foresight apparatus to inform tech-focused strategies and policies at the highest levels. The purpose of this capability would be to enhance and deepen understanding of where technological development might take the United States and the world. Such a foresight capability within the US government would integrate tech-intelligence assessments, per above, into comprehensive foresight-based scenarios about how the world might unfold in the future. The US government has impressive foresight capabilities already, most famously those provided by the National Intelligence Council (NIC). However, for a variety of reasons, including distance from the center of executive power, neither the NIC nor other foresight offices within the US government currently perform a foresight function described here. The US government should institutionalize a foresight function within or closely adjacent to the White House—for example, within the National Security Council or as a presidentially appointed advisory board. Doing so would give foresight the credibility and mandate to engage the most critical stakeholders from across the entire government and from outside of it, a model followed by leading public foresight offices around the world.56 This recommendation is consistent with numerous others put forward by experts over the past decade, which stress how the US government needs to give foresight more capabilities while bringing it closer to the office of the president.57
  3. Improved S&T strategy and policy coordination: One of the major challenges facing the US government concerns internal coordination around S&T strategy and policy. As technology is a broad and multidimensional category, the government’s activities are equally broad, covered by numerous statutes, executive orders, and administrative decisions. One of many results is a multiplicity of departments and agencies responsible for administering the many different pieces of the tech equation, from investment to development to monitoring, regulation, and enforcement. In just the area of critical technology oversight and control, for example, numerous departments including Commerce, State, Defense, Treasury, Homeland Security, and Justice, plus agencies from the Intelligence Community, all have responsibilities under various programs.58

    Moreover, the US government’s approach to tech oversight tends to focus narrowly on control of specific technologies, which leads to an underappreciation of the broader contexts in which technologies are used. A report issued in 2022 by the National Academies of Sciences, Engineering, and Medicine argued that the US government’s historic approach to tech-related risks is done through assessing individual critical technologies, defining the risks associated with each, and then attempting to restrict who can access each type of technology. Given that technologies now are “ubiquitous, shared, and multipurpose,” the National Academies asserted, a smarter approach would be to focus on the motives of bad-faith actors to use technologies and then define the accompanying risks.59 This approach “requires expertise that goes beyond the nature of the technology to encompass the plans, actions, capabilities, and intentions of US adversaries and other bad actors, thus involving experts from the intelligence, law enforcement, and national defense communities in addition to agency experts in the technology.”60

Back to top

US Secretary of State Antony Blinken meets with Chinese President Xi Jinping in the Great Hall of the People in Beijing, China, June 19, 2023. REUTERS

Major risks

There are two major sets of risks accompanying this strategy, both of which involve the potential damage that might result from failure to keep the strategic competition within acceptable boundaries. 

  1. Decoupling run amok: Overreach is one of the biggest risks associated with this strategy. Geopolitical and economic goals contradict, and it can be difficult to determine where to draw the line. As such, reconciling this dilemma will be the hardest part of a coherent and effective competition strategy.

    Technology decoupling to preserve geopolitical advantages can be at odds with economic interests, which the United States is currently experiencing in the context of semiconductors. The October 7, 2022, export controls were deemed necessary for geopolitical reasons, as the White House’s official rationale for the policy centered around the use of semiconductors for military modernization and violation of human rights. However, limiting the ability of US companies like Nvidia, Applied Materials, KLA, and Lam Research to export their products and services to China, in addition to applying complex compliance burdens on these firms, has the potential to affect these firms’ ability to compete in the global semiconductor industry. 

    In addition, the continued deployment of decoupling tactics like export controls can put allies and partners in a position where they feel forced to choose sides between the United States and China. On the October 7 export controls, it took months to convince the Netherlands and Japan—two critical producer nations in the semiconductor supply chain whose participation is critical to the success of these export controls—to get on board with US policy.61 Even now, although media reporting says an agreement has been reached, no details of the agreements have been made public, likely due to concerns surrounding Chinese retaliation.

    These issues are not exclusive to trade controls or protect measures. On the promote side, the IRA has also put South Korea in a difficult position as it relates to EVs and related components. When first announced, many on the South Korean side argued that the EV provisions of the IRA violated trade rules. At one point in late 2022, the South Korean government considered filing a complaint with the WTO over the issue.62 Although things seem to have cooled between Washington and Seoul—and the Netherlands and Japan have officially, albeit privately, agreed to join the US on semiconductor controls—these two instances should be lessons for US policymakers in how to approach technology policies going forward. Policies that push allies and partners too hard to decouple from the Chinese market are likely to be met with resistance, as many (if not all) US allies have deeply woven ties with Chinese industry, and often do not have the same domestic capabilities or resources that the United States has that can insulate us from potential harm. China is acutely aware of this, and will likely continue to take advantage of this narrative to convince US allies to not join in US decoupling efforts. China has historically leveraged economic punishments against countries for a variety of reasons, so US policymakers should be sure to incorporate this reality into their policy planning to ensure that allies are not put in tough positions. 

    Recently, government officials within the Group of Seven (G7) have been using the term “de-risking ” instead of “decoupling.” The term was first used by a major public official during a speech by Ursula von der Leyen, president of the European Commission, in a March 2023 speech where she called for an “open and frank” discussion with China on contentious issues.63 The term was used again in the G7 communique of May 2023: economic security should be “based on diversifying and deepening partnerships and de-risking, not de-coupling.”64 This rhetorical shift represents a recognition that full economic decoupling from China is unwise, and perhaps impossible. Moreover, it also is a tacit admission that decoupling sends the wrong signals not only to China, but to the private sector in the West as well.

    In the authors’ opinion, de-risking is superior to decoupling as a rhetorical device—but changes in phrasing do not solve the underlying problem for policymakers in the United States, Europe, East Asia, and beyond. That underlying problem is to define and then implement a coherent strategy, coordinated across national capitals, that manages to enable them to stay a step ahead of China in the development of cutting-edge technology while preventing an economically disastrous trade war with China.
  2. Harm to global governance: Another major set of risks involves the harms to global governance should the strategic competition between the United States and China continue on its current trajectory. Although the strategy outlined in these pages emphasizes, under the coordination pillar, maintenance of global governance architecture—the norms, institutions, pathways, laws, good-faith behavior, and so on that guide technology development—there is no guarantee that China and the United States, along with other important state and nonstate actors, will be able to do so given conflicting pressures to reduce or eliminate cooperative behavior. 

    Tragic outcomes of this strategic competition, therefore, would be: failure to continue cooperation regarding development of norms and standards that should guide S&T research; and failure to continue S&T research cooperation focused on solving global-commons challenges such as pandemics and climate change. 

    Any reduction in cooperation among the United States, China, and other leading S&T-research countries will harm the ability to establish norms and standards surrounding tech development in sensitive areas—for instance, in AI or biotechnology. As recent global conversations about the risks associated with rapid AI development show, effective governance of these powerful emerging technologies is no idle issue.65

    Even under the best of circumstances, however, global governance of such technologies is exceedingly difficult. For example, Gigi Kwik Gronvall, an immunologist and professor at Johns Hopkins University, has written that biotechnology development is “inherently international and cannot be controlled by any international command and control system” and that, therefore, “building a web of governance, with multiple institutions and organizations shaping the rules of the road, is the only possibility for [effective] governance.”66 By this, she meant that—although a single system of rules for governing the biotechnology development is impossible to create given the speed of biotech research and multiplicity of biotech research actors involved (private and public-sector labs, etc.) around the world—it is possible to support a “web of governance” institutions such as the WHO that set norms and rules. Although this system is imperfect, as she admits, it is much better than the alternative, which is to have no governance web at all. The risk of a weak or nonexistent web becomes much more real if the United States, China, and other S&T leaders fail to cooperate in strengthening it. 

Back to top

Conclusions and recommendations

The arguments advanced in this paper provide an overview of the range and diversity of policy questions that must be taken into consideration when formulating strategies to compete with China in science and technology. This final section offers a set of recommendations that follow from this analysis.

  1. Restore and sustain public R&D funding for scientific and technological advancement. As noted in this paper, public investment in R&D—most critically, federal-government investment in R&D—has been allowed to atrophy since the end of the Cold War. Although private-sector investment was then, and is now, a critical component of the nation’s R&D spending, public funding is also imperative for pure scientific research (versus applied research) and for funneling R&D toward ends that are in the public interest (defense, public health, etc.). Although the CHIPS and Science Act and the IRA both pledge massive increases in the amount of federal R&D investment, there is no guarantee that increased funding will be sustained over time. Less than a year after the CHIPS Act was signed into law, funding levels proposed in Congress and by the White House have fallen well short of amounts specified in the act.67
  2. Improve and sustain STEM education and skills training across K–12, university, community college, technical schools. It is widely recognized that the United States has fallen behind peer nations in STEM education and training at all levels, from K–12 through graduate training.68 Although the Biden administration’s signature pieces of legislation, including the CHIPS Act, address this problem through increased funding vehicles for STEM education and worker-training programs, the challenge for policymakers will be to sustain interest in, and levels of funding for, such programs well into the future, analogous to the federal R&D spending challenge. Other related problems include the high cost of higher education, driven in part by lower funding by US states, that drives students into long-term indebtedness, and the need to boost participation in (and reduce stigma around) STEM-related training at community colleges and technical schools.69 Germany’s well-established, well-funded, and highly respected technical apprenticeship programs are models.70
  3. Craft a more diverse tech sector. A closely related challenge is to ensure that the tech sector in the United States reflects the country’s diversity, defined in terms of gender, ethnicity, class, and geography. This is a long-term challenge that has multiple roots and many different pathways to success, including public investment in education, training, and apprenticeship programs, among other things.71 Among the most challenging problems (with potentially the most beneficial solutions) are those rooted in economic geography—specifically regional imbalances in the knowledge economy, where places like Silicon Valley and Boston steam ahead and many other places fall behind. As in other areas, recent legislation including the IRA, CHIPS Act, and IIJA have called for billions in funding to spread the knowledge economy to a greater number of “tech hubs” around the country. As with other pieces of the investment equation, however, there is no guarantee that billions will be allocated under current legislation.72
  4. Attract and retain high-skilled talent from abroad. One of the United States’ enduring strengths is its ability to attract and retain the world’s best talent, which has been of enormous benefit to its tech sector. A December 2022 survey conducted by the National Bureau of Economic Research (NBER), for example, found that between 1990 and 2016, about 16 percent of all inventors in the United States were immigrants, who, in turn, were responsible for 23 percent of all patents filed during the same period.73 Although the United States is still the top destination for high-skilled migrants, other countries have become more attractive in recent years, owing to foreign countries’ tech-savvy immigration policies and problems related to the US H-1B visa system.74
  5. Support whole-of-government strategy development. This paper stresses the need to improve strategic decision-making regarding technology through improving (or relocating) interagency processes and foresight and intelligence capabilities. One recommendation is to follow the suggestion by the National Academies of Sciences, Engineering, and Medicine, and bring a whole-of-government strategic perspective together under the guidance of the White House.75 Such a capacity would bring under its purview and/or draw upon a tech-focused foresight capacity, as well as an improved tech-focused intelligence apparatus (see below). The CHIPS Act contains provisions that call for development of quadrennial S&T assessments followed by technology strategy formulation, both to be conducted by the White House’s Office of Science Technology and Policy (OSTP).76 A bill that was introduced in June 2022 by Senators Michael Bennet, Ben Sasse, and Mark Warner (and reintroduced in June 2023) would, if passed, create an Office of Global Competition Analysis, the purpose of which would be to “fuse information across the federal government, including classified sources, to help us better understand U.S. competitiveness in technologies critical to our national security and economic prosperity and inform responses that will boost U.S. leadership.”77
  6. Ensure private sector firms remain at the cutting edge of global competitiveness. Policymakers will need to strengthen the enabling environment to allow US tech firms to meet and exceed business competition from around the world. Doing so will require constant monitoring of best-practice policy development elsewhere, based on the presumption that other countries are tweaking their own policies to outcompete the United States. Policymakers will need to properly recalibrate, as appropriate and informed by best practices, an array of policy instruments including labor market and immigration policies, types and level of infrastructural investments, competition policies, forms of direct and indirect support, and more. An Office of Global Competition Analysis, as referred to above, might be an appropriate mechanism to conduct the horizon scanning tasks necessary to support this recommendation.
  7. Improve S&T intelligence and counterintelligence. Consistent with the observations about shortcomings in the US Intelligence Community regarding S&T collection, analysis, and dissemination, some analysts have floated creation of an S&T intelligence capability outside the Intelligence Community itself. This capability would be independent of other agencies and departments within the government and would focus on collection and analysis of S&T intelligence for stakeholders within and outside of the US government, as appropriate.78
  8. Ensure calibrated development and application of punitive measures. As this paper has stressed at multiple points, although the US government has powerful protect measures at its disposal, implementing those measures often comes with a price, including friction with allies and partners. The US government should create an office within the Bureau of Industry and Security (BIS) at the Commerce Department to monitor the economic impact (intended and unintended) of its export-control policies on global supply chains before they are implemented (including impacts on allied and partner economies).79 This office would have a function that is similar in intent to the Sanctions Economic Analysis Unit, recently established at the US Treasury to “research the collateral damage of sanctions before they’re imposed, and after they’ve been put in place to see if they should be adjusted.”80
  9. Build out and sustain robust multilateral institutions. This paper has stressed that any effort by the United States to succeed in its tech-focused competition with China will require that it successfully engage allies and partners in multilateral settings such as the EU-TTC, Quad, and others. As with so many other recommendations on this list, success will be determined by the degree to which senior policymakers can stay focused over the long run (i.e., across administrations) on this priority and in these multilateral forums. In addition, US policymakers might consider updating multilateral forums based on new realities. For example, some analysts have called for the creation of a new multilateral export-control regime that would have the world’s “techno-democracies…identify together the commodities, software, technologies, end uses, and end users that warrant control to address shared national security, economic security, and human rights issues.”81
  10. Engagement with China cannot be avoided. The downturn in bilateral relations between the United States and China should not obscure the need to continue engaging China on S&T as appropriate, and as opportunities arise. There are zero-sum tradeoffs involved in the strategic competition with China over technology. At the same time, there are also positive-sum elements within that competition that need to be preserved or even strengthened. As the Ford-CATL Michigan battery-plant example underscores, trade in nonstrategic technologies (EVs, batteries, etc.) benefits both countries, assuming trade occurs on a level playing field. The same is true of science cooperation, where the risk is of global scientific research on climate change and disease prevention shrinking if Sino-American scientific exchange falls dramatically. Policymakers in the United States will need to accept some amount of S&T collaboration risk with China. They will need to decide what is (and is not) of highest risk and communicate that effectively to US allies and partners around the world, the scientific community, and the general public. 

Back to top

The authors would like to thank Noah Stein for his research assistance with this report.

Report authors

Explore the Strategy Paper Series

Explore the programs

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

Global China Hub

The Global China Hub researches and devises allied solutions to the global challenges posed by China’s rise, leveraging and amplifying the Atlantic Council’s work on China across its 15 other programs and centers.

1    Although China likely will not close the spending gap with the United States by the mid-2030s, current spending trajectories strongly suggest that China will have narrowed the gap considerably. See the US-China bilateral comparison in: “Asia Power Index 2023,” Lowy Institute, last visited June 13, 2023, https://power.lowyinstitute.org; “China v America: How Xi Jinping Plans to Narrow the Military Gap,” Economist, May 8, 2023, https://www.economist.com/china/2023/05/08/china-v-america-how-xi-jinping-plans-to-narrow-the-military-gap.
2    See, e.g., the arguments presented by: Bryce Barros, Nathan Kohlenberg, and Etienne Soula, “China and the Digital Information Stack in the Global South,” German Marshall Fund, June 15, 2022, https://securingdemocracy.gmfus.org/china-digital-stack/.
3    For a brief overview of China’s efforts in this regard, see: Bulelani Jili, China’s Surveillance Ecosystem and the Global Spread of Its Tools, Atlantic Council, October 17, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/chinese-surveillance-ecosystem-and-the-global-spread-of-its-tools/.
4    For background to these practices, see: Karen M. Sutter, ““Made in China 2025’ Industrial Policies: Issues for Congress,” Congressional Research Service, March 10, 2023, https://sgp.fas.org/crs/row/IF10964.pdf; Gerard DiPippo, Ilaria Mazzocco, and Scott Kennedy, “Red Ink: Estimating Chinese Industrial Policy Spending in Comparative Perspective,” Center for Strategic and International Studies, May 23, 2022, https://www.csis.org/analysis/red-ink-estimating-chinese-industrial-policy-spending-comparative-perspective; “America Is Struggling to Counter China’s Intellectual Property Theft,” Financial Times, April 18, 2022, https://www.ft.com/content/1d13ab71-bffd-4d63-a0bf-9e9bdfc33c39; “USTR Releases Annual Report on China’s WTO Compliance,” Office of the United States Trade Representative, February 16, 2022, press release, 3, https://ustr.gov/about-us/policy-offices/press-office/press-releases/2022/february/ustr-releases-annual-report-chinas-wto-compliance.
5     On China and technical standards, see: Matt Sheehan, Marjory Blumenthal, and Michael R. Nelson, “Three Takeaways from China’s New Standards Strategy,” Carnegie Endowment for International Peace, October 28, 2021, https://carnegieendowment.org/2021/10/28/three-takeaways-from-china-s-new-standards-strategy-pub-85678.
6    China’s current (2023) AI regulations are generally seen as more developed than those in either Europe or the United States. However, analysts argue that the individual rights and corporate responsibilities to protect them, as outlined in China’s regulations, will be selectively enforced, if at all, by the state. See: Ryan Heath, “China Races Ahead of U.S. on AI Regulation,” Axios, May 8, 2023, https://www.axios.com/2023/05/08/china-ai-regulation-race.
7    The scientific community has warned that this scenario is a real risk, owing to heightened Sino-American tension. James Mitchell Crow, “US–China partnerships bring strength in numbers to big science projects,” Nature, March 9, 2022, https://www.nature.com/articles/d41586-022-00570-0.
8    Deng Xiaoping’s reforms included pursuit of “Four Modernizations” in agriculture, industry, science and technology, and national defense. In the S&T field, his reforms included massive educational and worker-upskilling programs, large investments in scientific research centers, comprehensive programs to send Chinese STEM (science, technology, engineering, and math) students abroad for advanced education and training, experimentation with foreign technologies in manufacturing and other production processes, and upgrading of China’s military to include a focus on development of dual-use technologies. Bernard Z. Keo, “Crossing the River by Feeling the Stones: Deng Xiaoping in the Making of Modern China,” Education About Asia 25, 2 (2020), 36, https://www.asianstudies.org/publications/eaa/archives/crossing-the-river-by-feeling-the-stones-deng-xiaoping-in-the-making-of-modern-china/.
9    Dan Wang, “China’s Hidden Tech Revolution: How Beijing Threatens U.S. Dominance,” Foreign Affairs, March/April 2023, https://www.foreignaffairs.com/china/chinas-hidden-tech-revolution-how-beijing-threatens-us-dominance-dan-wang.
10    “Full Text of Clinton’s Speech on China Trade Bill,” Federal News Service, March 9, 2000, https://www.iatp.org/sites/default/files/Full_Text_of_Clintons_Speech_on_China_Trade_Bi.htm.
11    “Speech by President Jiang Zemin at George Bush Presidential Library,” Ministry of Foreign Affairs of the PRC, October 24, 2002, https://perma.cc/7NYS-4REZ; G. John Ikenberrgy, “The Rise of China and the Future of the West: Can the Liberal System Survive?” Foreign Affairs 87, 1, (2008), https://www.jstor.org/stable/20020265.
12    Elizabeth Economy, “Changing Course on China,” Current History 102, 665, China and East Asia (2003), https://www.jstor.org/stable/45317282; Thomas W. Lippman, “Bush Makes Clinton’s China Policy an Issue,” Washington Post, August 20, 1999, https://www.washingtonpost.com/wp-srv/politics/campaigns/wh2000/stories/chiwan082099.htm.
13     Kurt M. Campbell and Ely Ratner, “The China Reckoning: How Beijing Defied American Expectations,” Foreign Affairs, February 18, 2018, https://www.foreignaffairs.com/articles/china/2018-02-13/china-reckoning.
14     “Number of Tourist Arrivals in the United States from China from 2005 to 2022 with Forecasts until 2025,” Statista, April 11, 2023, https://www.statista.com/statistics/214813/number-of-visitors-to-the-us-from-china/; and “Visa Statistics,” U.S. Department of State, https://travel.state.gov/content/travel/en/legal/visa-law0/visa-statistics.html.
15    “Direct Investment Position of the United States in China from 2000 to 2021,” Statista, January 26, 2023, https://www.statista.com/statistics/188629/united-states-direct-investments-in-china-since-2000/.
16     Robbie Gramer, “Washington’s China Hawks Take Flight,” Foreign Policy, February 15, 2023, https://foreignpolicy.com/2023/02/15/china-us-relations-hawks-engagement-cold-war-taiwan/; Sam LaGrone, “China Sends Uninvited Spy Ship to RIMPAC,” USNI News, July 18, 2014, https://news.usni.org/2014/07/18/china-sends-uninvited-spy-ship-rimpac.
17    “Findings of the Investigations into China’s Acts, Policies, and Practices Related to Technology Transfer, Intellectual Property, and Innovation Under Section 301 of the Trade Act of 1974,” Office of the United States Trade Representative, March 22, 2018, https://ustr.gov/sites/default/files/Section%20301%20FINAL.PDF. When asked in November 2018 if China was violating the 2015 cyber-espionage agreement, senior National Security Agency cybersecurity official Rob Joyce said, “it’s clear that they [China] are well beyond the bounds today of the agreement that was forced between our countries.” See: “U.S. Accuses China of Violating Bilateral Anti-Hacking Deal,” Reuters, November 8, 2018, https://www.reuters.com/article/us-usa-china-cyber/u-s-accuses-china-of-violating-bilateral-anti-hacking-deal-idUSKCN1NE02E.
18    Jacob Feldgoise, et. al, “Studying Tech Competition through Research Output: Some CSET Best Practices,” Center for Security and Emerging Technology, April 2023, https://cset.georgetown.edu/article/studying-tech-competition-through-research-output-some-cset-best-practices.
19    The World Intellectual Property Organization’s annual “Global Innovation Index,” considered the gold standard rankings assessment of the world’s tech-producing economies, ranks South Korea sixth and Japan thirteenth in the 2022 edition. “Global Innovation Index 2022. What Is the Future of Innovation-Driven Growth?” World Intellectual Property Organization, 2022, https://www.globalinnovationindex.org/analysis-indicator.
20    For a general review of the Japanese case, see: Mireya Solis, “Economic Security: Boon or Bane for the US-Japan Alliance?,” Sasakawa Peace Foundation USA, November 5–6, 2022, https://spfusa.org/publications/economic-security-boon-or-bane-for-the-us-japan-alliance/#_ftn19. For the South Korean case, see: Seong-Ho Sheen and Mireya Solis, “How South Korea Sees Technology Competition with China and Export Controls,” Brookings, May 17, 2023, https://www.brookings.edu/blog/order-from-chaos/2023/05/17/how-south-korea-sees-technology-competition-with-china-and-export-controls/.
21    Jeremy Mark and Dexter Tiff Roberts, United States–China Semiconductor Standoff: A Supply Chain under StressAtlantic Council, February 23, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/united-states-china-semiconductor-standoff-a-supply-chain-under-stress/.
22    Yang Jie and Megumi Fujikawa, “Tokyo Meeting Highlights Democracies’ Push to Secure Chip Supplies,” Wall Street Journal, May 18, 2023, https://www.wsj.com/articles/tokyo-meeting-highlights-democracies-push-to-secure-chip-supplies-54e1173d?mod=article_inline; “US Urges South Korea not to Fill Chip Shortfalls in China if Micron Banned, Financial Times Reports,” Reuters, April 23, 2023, https://www.reuters.com/technology/us-urges-south-korea-not-fill-china-shortfalls-if-beijing-bans-micron-chips-ft-2023-04-23/.
23    See, e.g., the arguments in: Matias Spektor, “In Defense of the Fence Sitters. What the West Gets Wrong about Hedging,” Foreign Affairs, May/June 2023, https://www.foreignaffairs.com/world/global-south-defense-fence-sitters.
24    On the expansion of trade under Bretton Woods during the first postwar decades, see: Tamim Bayoumi, “The Postwar Economic Achievement,” Finance & Development, June 1995, https://www.elibrary.imf.org/view/journals/022/0032/002/article-A013-en.xml
25    For a review of the history of the bilateral trade relationship, see: Anshu Siripurapu and Noah Berman, “Backgrounder: The Contentious U.S.-China Trade Relationship,” Council on Foreign Relations, December 5, 2022, https://www.cfr.org/backgrounder/contentious-us-china-trade-relationship.
26    Eric Martin and Ana Monteiro, “US-China Goods Trade Hits Record Even as Political Split Widens,” Bloomberg, February 7, 2023, https://www.bloomberg.com/news/articles/2023-02-07/us-china-trade-climbs-to-record-in-2022-despite-efforts-to-split?sref=a9fBmPFG#xj4y7vzkg
27    Neal E. Boudette and Keith Bradsher, “Ford Will Build a U.S. Battery Factory with Technology from China,” New York Times, February 13, 2023, https://www.nytimes.com/2023/02/13/business/energy-environment/ford-catl-electric-vehicle-battery.html.
28    “Tracking the Collaborative Networks of Five Leading Science Nations,” Nature 603, S10–S11 (2022), https://www.nature.com/articles/d41586-022-00571-z.
29     “Protecting U.S. Technological Advantage,” National Academies of Sciences, Engineering, and Medicine, 2022, 12, https://doi.org/10.17226/26647.
30     Robert W. Seidel, “Science Policy and the Role of the National Laboratories,” Los Alamos Science 21 (1993), 218–226, https://sgp.fas.org/othergov/doe/lanl/pubs/00285712.pdf.
31     The federal government’s hand in creating Silicon Valley is well known. For a short summary, see: W. Patrick McCray, “Silicon Valley: A Region High on Historical Amnesia,” Los Angeles Review of Books, September 19, 2019, https://lareviewofbooks.org/article/silicon-valley-a-region-high-on-historical-amnesia/. A forceful defense of the federal government’s role in creating and sustaining Silicon Valley is: Jacob S. Hacker and Paul Pierson, “Why Technological Innovation Relies on Government Support,” Atlantic, March 28, 2016, https://www.theatlantic.com/politics/archive/2016/03/andy-grove-government-technology/475626/.
32     Robert D. Atkinson, “Understanding the U.S. National Innovation System, 2020,” International Technology & Innovation Foundation, November 2020, 1, https://www2.itif.org/2020-us-innovation-system.pdf.
33     “National Innovation Policies: What Countries Do Best and How They Can Improve,” International Technology & Innovation Foundation, June 13, 2019, 82, https://itif.org/publications/2019/06/13/national-innovation-policies-what-countries-do-best-and-how-they-can-improve/; “Historical Trends in Federal R&D, Federal R&D as a Percent of GDP, 1976-2023,” American Association for the Advancement of Science, last visited June 13, 2023, https://www.aaas.org/programs/r-d-budget-and-policy/historical-trends-federal-rd.
34     Matt Hourihan, “A Snapshot of U.S. R&D Competitiveness: 2020 Update,” American Association for the Advancement of Science, October 22, 2020, https://www.aaas.org/news/snapshot-us-rd-competitiveness-2020-update.
35    Remco Zwetsloot, et al., “China is Fast Outpacing U.S. STEM PhD Growth,” Center for Security and Emerging Technology, August 2021, 2–4, https://cset.georgetown.edu/publication/china-is-fast-outpacing-u-s-stem-phd-growth/.
36    As reviewed in: Robert D. Atkinson, “Understanding the U.S. National Innovation System, 2020,” International Technology & Innovation Foundation, November 2020, https://www2.itif.org/2020-us-innovation-system.pdf.
37    See, e.g., the arguments laid out by Frank Lucas, chairman of the House Science, Space, and Technology Committee, in: Frank Lucas, “A Next-Generation Strategy for American Science,” Issues in Science and Technology 39, 3, Spring 2023, https://issues.org/strategy-american-science-lucas/.
38     “Findings of the Investigations into China’s Acts, Policies, and Practices Related to Technology Transfer, Intellectual Property, and Innovation Under Section 301 of the Trade Act of 1974”; “Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans,” Permanent Subcommittee on Investigations, Committee on Homeland Security and Governmental Affairs, US Senate, November 2019, https://www.hsgac.senate.gov/wp-content/uploads/imo/media/doc/2019-11-18%20PSI%20Staff%20Report%20-%20China’s%20Talent%20Recruitment%20Plans%20Updated2.pdf; Michael Brown and Pavneet Singh, “China’s Technology Transfer Strategy: How Chinese Investments in Emerging Technology Enable A Strategic Competitor to Access the Crown Jewels of U.S. Innovation,” Defense Innovation Unit Experimental (DIUx), January 2018, https://www.documentcloud.org/documents/4549143-DIUx-Study-on-China-s-Technology-Transfer.
39     Steven F. Hill, et. al, “Trump Administration Significantly Enhances Export Control Supply Chain Restrictions on Huawei,” K&L Gates, September 2020, https://www.klgates.com/Trump-Administration-Significantly-Enhances-Export-Control-Supply-Chain-Restrictions-on-Huawei-9-2-2020; and “Implementation of Additional Export Controls: Certain Advanced Computing and Semiconductor Manufacturing Items; Supercomputer and Semiconductor End Use; Entity List Modification,” Bureau of Industry and Security, US Department of Commerce, October 14, 2022, https://www.federalregister.gov/documents/2022/10/13/2022-21658/implementation-of-additional-export-controls-certain-advanced-computing-and-semiconductor.
40    “The Committee on Foreign Investment in the United States,” US Department of the Treasury, last visited June 13, 2023, https://home.treasury.gov/policy-issues/international/the-committee-on-foreign-investment-in-the-united-states-cfius.
41    Hans Nichols and Dave Lawler, “Biden’s Next Move to Box China out on Sensitive Tech,” Axios, May 25, 2023, https://www.axios.com/2023/05/25/china-investments-ai-semiconductor-biden-order.
42    “With Over 300 Sanctions, U.S. Targets Russia’s Circumvention and Evasion, Military-Industrial Supply Chains, and Future Energy Revenues,” US Department of the Treasury, press release, May 19, 2023, https://home.treasury.gov/news/press-releases/jy1494.
43     Tim Hwang and Emily S. Weinstein, “Decoupling in Strategic Technologies: From Satellites to Artificial Intelligence,” Center for Security and Emerging Technology, July 2022, https://cset.georgetown.edu/publication/decoupling-in-strategic-technologies/.
44     The articles were published in China’s state-run newspaper, Science and Technology Daily. Ben Murphy, “Chokepoints: China’s Self-Identified Strategic Technology Import Dependencies,” Center for Security and Emerging Technology, May 2022, https://cset.georgetown.edu/publication/chokepoints/.
45     Antony J. Blinken, “The Administration’s Approach to the People’s Republic of China,” US Department of State, May 26, 2022, https://www.state.gov/the-administrations-approach-to-the-peoples-republic-of-china/.
46     “Media Reaction: US Inflation Reduction Act and the Global ‘Clean-Energy Arms Race,’” Carbon Brief, February 3, 2023, https://www.carbonbrief.org/media-reaction-us-inflation-reduction-act-and-the-global-clean-energy-arms-race/; Théophile Pouget-Abadie, Francis Shin, and Jonah Allen, Clean Industrial Policies: A Space for EU-US Collaboration, Atlantic Council, March 10, 2023, https://www.atlanticcouncil.org/blogs/energysource/clean-industrial-policies-a-space-for-eu-us-collaboration/.
47     Shannon Tiezzi, “Are US Allies Falling out of ‘Alignment’ on China?” Diplomat, December 19, 2022, https://thediplomat.com/2022/12/are-us-allies-falling-out-of-alignment-on-china/.
48     “The Fall of Empires Preys on Xi Jinping’s Mind,” Economist, May 11, 2023, https://www.economist.com/briefing/2023/05/11/the-fall-of-empires-preys-on-xi-jinpings-mind; Kunal Sharma, “What China Learned from the Collapse of the USSR,” Diplomat, December 6, 2021, https://thediplomat.com/2021/12/what-china-learned-from-the-collapse-of-the-ussr/; Simone McCarthy, “Why Gorbachev’s Legacy Haunts China’s Ruling Communist Party,” CNN, August 31, 2022, https://www.cnn.com/2022/08/31/china/china-reaction-mikhail-gorbachev-intl-hnk/index.html.
49     For a review of the complex history of the construction and deconstruction of the Soviet Union, see: Serhii Plokhy, “The Empire Returns: Russia, Ukraine and the Long Shadow of the Soviet Union,”Financial Times, January 28, 2022, https://www.ft.com/content/0cbbd590-8e48-4687-a302-e74b6f0c905d.
50     Phelim Kine, “China ‘Is Infinitely Stronger than the Soviet Union Ever Was,’” Politico, April 28, 2023, https://www.politico.com/newsletters/global-insider/2023/04/28/china-is-infinitely-stronger-than-the-soviet-union-ever-was-00094266.
51     Hal Brands, “The Dangers of China’s Decline,” Foreign Policy, April 14, 2022, https://foreignpolicy.com/2022/04/14/china-decline-dangers/.
52     Tarun Chhabra, et al., “Open-Source Intelligence for S&T Analysis,” Center for Security and Emerging Technology (CSET), Georgetown University Walsh School of Foreign Service, September 2020, https://cset.georgetown.edu/publication/open-source-intelligence-for-st-analysis/.
53     A summary of and link to the committee’s redacted report is in: Tia Sewell, “U.S. Intelligence Community Ill-Prepared to Respond to China, Bipartisan House Report Finds,” Lawfare, September 30, 2020, https://www.lawfareblog.com/us-intelligence-community-ill-prepared-respond-china-bipartisan-house-report-finds.
54     William Hannas and Huey-Meei Chang, “China’s Access to Foreign AI Technology,” Center for Security and Emerging Technology (CSET), Georgetown University Walsh School of Foreign Service, September 2019, https://cset.georgetown.edu/publication/chinas-access-to-foreign-ai-technology/.
55     Ellen Nakashima, “Justice Department Shutters China Initiative, Launches Broader Strategy to Counter Nation-State Threats,” Washington Post, February 23, 2022, https://www.washingtonpost.com/national-security/2022/02/23/china-initivative-redo/.
56     Tuomo Kuosa, “Strategic Foresight in Government: The Cases of Finland, Singapore, and the European Union,” S. Rajaratnam School of International Studies, Nanyang Technological University, 43, https://www.files.ethz.ch/isn/145831/Monograph19.pdf.
57     For a review, including a summary of such recommendations, see: J. Peter Scoblic, “Strategic Foresight in U.S. Agencies. An Analysis of Long-term Anticipatory Thinking in the Federal Government,” New America, December 15, 2021, https://www.newamerica.org/international-security/reports/strategic-foresight-in-us-agencies/.
58     See, for example: Marie A. Mak, “Critical Technologies: Agency Initiatives Address Some Weaknesses, but Additional Interagency Collaboration Is Needed,” General Accounting Office, February 2015, https://www.gao.gov/assets/gao-15-288.pdf.
59     “Protecting U.S. Technological Advantage,” 97.
60     Ibid.
61    Toby Sterling, Karen Freifeld, and Alexandra Alper, “Dutch to Restrict Semiconductor Tech Exports to China, Joining US Effort,”Reuters, March 8, 2023, https://www.reuters.com/technology/dutch-responds-us-china-policy-with-plan-curb-semiconductor-tech-exports-2023-03-08/.
62    Troy Stangarone, “Inflation Reduction Act Roils South Korea-US Relations,” Diplomat, September 20, 2022, https://thediplomat.com/2022/09/inflation-reduction-act-roils-south-korea-us-relations/; “S. Korea in Preparation for Legal Disputes with U.S. over IRA,” Yonhap News Agency, November 3, 2022, https://en.yna.co.kr/view/AEN20221103004500320.
63    “Speech by President von der Leyen on EU-China Relations to the Mercator Institute for China Studies and the European Policy Centre,” European Commission, March 30, 2023, https://ec.europa.eu/commission/presscorner/detail/en/speech_23_2063.
64    “G7 Hiroshima Leaders’ Communiqué,” White House, May 20, 2023, https://www.whitehouse.gov/briefing-room/statements-releases/2023/05/20/g7-hiroshima-leaders-communique/.
65    See, e.g.: Kevin Roose, “A.I. Poses ‘Risk of Extinction,’ Industry Leaders Warn,” New York Times, May 30, 2023, https://www.nytimes.com/2023/05/30/technology/ai-threat-warning.html.
66    Gigi Kwik Gronvall, “Managing the Risks of Biotechnology Innovation,” Council on Foreign Relations, January 30, 2023, 7, https://www.cfr.org/report/managing-risks-biotechnology-innovation.
67     Madeleine Ngo, “CHIPS Act Funding for Science and Research Falls Short,” New York Times, May 30, 2023, https://www.nytimes.com/2023/05/30/us/politics/chips-act-science-funding.html; Matt Hourihan, Mark Muro, and Melissa Roberts Chapman, “The Bold Vision of the CHIPS and Science Act Isn’t Getting the Funding It Needs,” Brookings, May 17, 2023, https://www.brookings.edu/blog/the-avenue/2023/05/17/the-bold-vision-of-the-chips-and-science-act-isnt-getting-the-funding-it-needs/.
68    See, e.g.: Gabrielle Athanasia and Jillian Cota, “The U.S. Should Strengthen STEM Education to Remain Globally Competitive,” Center for Strategic and International Studies, April 1, 2022, https://www.csis.org/blogs/perspectives-innovation/us-should-strengthen-stem-education-remain-globally-competitive.
69     On per-student university funding at state level, see: Mary Ellen Flannery, “State Funding for Higher Education Still Lagging,” NEA Today, October 25, 2022, https://www.nea.org/advocating-for-change/new-from-nea/state-funding-higher-education-still-lagging
70    Matt Fieldman, “5 Things We Learned in Germany,” NIST Manufacturing Innovation Blog, December 14, 2022, https://www.nist.gov/blogs/manufacturing-innovation-blog/5-things-we-learned-germany.
71    For a review, see: Peter Engelke and Robert A. Manning, Keeping America’s Innovative EdgeAtlantic Council, April 2017, https://www.atlanticcouncil.org/in-depth-research-reports/report/keeping-america-s-innovative-edge-2/.
72    To date, Congress has allocated only 5 percent of the funds called for in the piece of the CHIPS Act that funds the tech hubs. Madeleine Ngo, “CHIPS Act Funding for Science and Research Falls Short,” New York Times, May 30, 2023, https://www.nytimes.com/2023/05/30/us/politics/chips-act-science-funding.html; Mark Muro, et al., “Breaking Down an $80 Billion Surge in Place-Based Industrial Policy,” Brookings, December 15, 2022, https://www.brookings.edu/blog/the-avenue/2022/12/15/breaking-down-an-80-billion-surge-in-place-based-industrial-policy/.
73    Shai Bernstein, et al., “The Contribution of High-Skilled Immigrants to Innovation in the United States,” National Bureau of Economic Research, December 2022, 3, https://www.nber.org/papers/w30797.
74    Miranda Dixon-Luinenburg, “America Has an Innovation Problem. The H-1B Visa Backlog Is Making It Worse,” Vox, July 13, 2022, https://www.vox.com/future-perfect/23177446/immigrants-tech-companies-united-states-innovation-h1b-visas-immigration.
75    “Protecting U.S. Technological Advantage,” 98–99.
76    Matt Hourihan, “CHIPS And Science Highlights: National Strategy,” Federation of American Scientists, August 9, 2022, https://fas.org/publication/chips-national-strategy/.
77     “Press Release: Bennet, Sasse, Warner Unveil Legislation to Strengthen U.S. Technology Competitiveness,” Office of Michael Bennet, June 9, 2022, https://www.bennet.senate.gov/public/index.cfm/2022/6/bennet-sasse-warner-unveil-legislation-to-strengthen-u-s-technology-competitiveness.
78     Tarun Chhabra, et al., “Open-Source Intelligence for S&T Analysis,” Center for Security and Emerging Technology (CSET),Georgetown University Walsh School of Foreign Service, September 2020, https://cset.georgetown.edu/publication/open-source-intelligence-for-st-analysis/.
79     Emily Weinstein, “The Role of Taiwan in the U.S. Semiconductor Supply Chain Strategy,” National Bureau of Asian Research, January 21, 2023, https://www.nbr.org/publication/the-role-of-taiwan-in-the-u-s-semiconductor-supply-chain-strategy/.
80    Daniel Flatley, “US Treasury Hires Economists to Study Consequences of Sanctions,” Bloomberg, May 17, 2023, https://www.bloomberg.com/news/articles/2023-05-18/us-treasury-hires-economists-to-study-consequences-of-sanctions?sref=a9fBmPFG.
81    Kevin Wolf and Emily S. Weinstein, “COCOM’s daughter?” World ECR, May 13, 2022, 25, https://cset.georgetown.edu/wp-content/uploads/WorldECR-109-pp24-28-Article1-Wolf-Weinstein.pdf.

The post Global Strategy 2023: Winning the tech race with China appeared first on Atlantic Council.

]]>
Russian War Report Special Edition: Prigozhin and Wagner forces mutiny against Moscow https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-wagner-mutiny/ Sat, 24 Jun 2023 17:04:28 +0000 https://www.atlanticcouncil.org/?p=658931 A special edition of the Russian War Report on Wagner Group's mutiny against the Russian military and occupation of Rostov.

The post Russian War Report Special Edition: Prigozhin and Wagner forces mutiny against Moscow appeared first on Atlantic Council.

]]>
On the evening of Friday, June 23, Wagner Group founder Yevgeny Prigozhin effectively broke ties with Moscow and initiated a mutiny against the Russian military, successfully occupying Rostov. Russian President Vladimir Putin condemned Prigozhin’s actions in an address to the nation as Russian authorities secured Moscow and reportedly engaged Wagner forces around Rostov. At the time of writing on the afternoon of Saturday, June 24, Prigozhin appears to have accepted a pause in further escalation, stating that Wagner forces will return to base. Today’s special edition of the Russian War Report provides an overview of the last thirty-six hours, including details on how Prigozhin’s rhetoric escalated into open conflict, open-source analysis of the latest footage, and a review of some of the competing narratives on Telegram and across the Russian information ecosystem.

Tracking narratives

How Prigozhin used Telegram to declare war on the Russian Ministry of Defense – and then suddenly pull back

Putin calls Prigozhin’s “criminal adventure” an “armed mutiny” and “treason”

Security

Wagner forces enter Rostov, occupy Russian Southern Military District headquarters

Wagner forces emerge south of Moscow in Lipetsk

Explosion at oil depot in Russian city of Voronezh

Media policy

Amid chaos in the Russian information space the Kremlin attempts to limit information on Prigozhin

How Prigozhin used Telegram to declare war on the Russian Ministry of Defense – and then suddenly pull back

The Russian-founded messaging platform Telegram, which became a primary tool circulating pro-Kremlin narratives throughout Russia’s war in Ukraine, achieved an unprecedented level of influence on June 23, with Prigozhin wielding it to vent his rage at the Russian defense establishment and launch a mercenary mutiny. For months, Prigozhin has engaged in rhetorical warfare against his rivals in the Kremlin, in particular Russian Defense Minister Sergei Shoigu and Armed Forces Chief of Staff Gen. Valery Gerasimov. The Wagner founder blamed them for ineptitude over the course of the war in Ukraine, including a months-long public argument about supplying his forces with adequate munitions during its siege of Bakhmut. 

Prigozhin’s one-man war against the Russian Ministry of Defense (MoD) reached new heights in a series of Telegram posts that began on Friday, June 23, and continued into Saturday. At 10:50 am Moscow time, he posted a thirty-minute video to his Prigozhin Press Service Telegram channel excoriating the MoD, accusing its leadership of deceiving Putin and the Russian public in early 2022 into believing that Ukrainian aggression was imminent, and that Russia had no choice but to invade Ukraine. 

Sitting in a chair in front of a Wagner Group flag pinned to an otherwise blank wall, Prigozhin proceeded to make his case against the MoD and its entire war effort. “Right now, the [MoD] is trying to deceive society and the president and tell a story that there was insane aggression from the Ukrainian side and they were going to attack us together with the whole NATO bloc,” Prigozhin said effectively undermining the Kremlin’s entire case for war. “Therefore, on February 24, the so-called special operation was launched for completely different reasons.” He described Russia’s invasion of Ukraine as a “monstrous shame show” and an “incompetently planned operation” conducted by “a bunch of creatures” and “mentally ill scum” who “don’t have the balls” to fight aggressively with the necessary decisiveness to win the war, including their unwillingness to use tactical nuclear weapons. “The grandfathers are rather weak. They cannot get out of their comfort zone,” he added.

“A handful of dipshits decided for some reason that they were so cunning that no one would realize what they were doing with their military exercises, and nobody would stop them when they went to Kyiv,” Prigozhin said. He went on to blame Shoigu for killing thousands of capable Russian soldiers, and he directed his ire at Russian oligarchs enriching themselves on the war while seeking to return former Russian President Dmitry Medvedev to power. “Our sacred war against those who wrong the Russian people has turned into racketeering, into theft,” he said.  

Prigozhin later added that he would follow up the video with a second “interview,” but this would turn out to be a gross understatement, as the initial video was merely the first of more than a dozen messages he would post to his Prigozhin Press Service Telegram channel over the next thirty-six hours. 

Later in the day at 5:10 pm Moscow time, Prigozhin amped up his criticism of the MoD even further with a Telegram audio post in which he accused it of committing “genocide” against Russians. Calling out Shoigu and Gerasimov directly, Prigozhin said “they should be held responsible for the genocide of the Russian people, the murder of tens of thousands of Russian citizens, and the transfer of Russian territories to the enemy.” 

As angry audio clips of Prigozhin continued to appear into the evening, multiple pro-Wagner Telegram channels circulated a video around 9:00 pm Moscow time purporting to document the aftermath of a Russian airstrike on a Wagner encampment. The video shows scenes of a wooded area lined with stone paths subjected to a moderate amount debris and several fires burning in trenches; a body is briefly seen towards the end of the clip. It is unclear where or when the footage was filmed, and it brought to mind similar suspicious footage contextually devoid footage circulated prior to the February 2022 invasion accusing Ukraine of engaging in sabotage and other aggression against Russia.

Within ten minutes, Prigozhin posted another angry statement, this time accusing the MoD of attacking his forces at the camp. “Today, seeing that we aren’t broken, they decided to launch rocket attacks on our rear camps,” he exclaimed. “A huge number of fighters were killed, our comrades in arms. We’ll decide how to respond to this atrocity. The ball’s in our court.”  

Approximately fifteen minutes later, Prigozhin effectively declared war against the MoD in another Telegram audio clip. “The Wagner Group commanders’ council has made a decision,” he announced. “The evil that the country’s military leadership is carrying out must be stopped. They neglect soldiers’ lives. They’ve forgotten the word ‘justice’ and we’re bringing it back. Those who destroyed our guys today, those who destroyed many tens of thousands of Russian soldiers’ lives will be punished.” Later, he described his forces as “25,000 strong,” adding, “We’re going to get to the bottom of the lawlessness in this country.” 

As Prigozhin continued posting additional threats and taunts on Telegram, the MoD described the alleged footage circulated on pro-Wagner channels as fake, while Russia’s National Anti-Terrorism Committee announced that the Federal Security Service, or FSB, would initiate a criminal case against Prigozhin “on the fact of calling for an armed rebellion.”

Prigozhin continued posting on and off throughout Saturday as his forces advanced north in the direction of Moscow. Then just before 8:30pm local time, he uploaded another message, stating he would return Wagner forces to their camps. It remains unclear whether he intends to keep that promise.

Andy Carvin, managing editor, Washington, DC

Putin calls Prigozhin’s “criminal adventure” an “armed mutiny” and “treason”

After spending Friday night away from cameras, Putin released a televised statement late Saturday morning. Addressing the Russian public as well as the armed forces and security personnel “who are now fighting in their combat positions, repulsing enemy attacks,” Putin described Prigozhin’s actions as a “criminal adventure” and an “armed mutiny.”  

“Today, Russia is waging a tough struggle for its future, repelling the aggression of neo-Nazis and their patrons,” he stated. “The entire military, economic, and informational machine of the West is directed against us. We are fighting for the lives and security of our people, for our sovereignty and independence, for the right to be and remain Russia, a state with a thousand-year history.” 

“This battle, when the fate of our nation is being decided, requires consolidation of all forces,” Putin continued. “It requires unity, consolidation, and a sense of responsibility, and everything that weakens us, any strife that our external enemies can use and do so to subvert us from within, must be discarded. Therefore, any actions that split our nation are essentially a betrayal of our people, of our comrades-in-arms who are now fighting at the frontline. This is a knife in the back of our country and our people.” 

Comparing the mutiny to 1917, when “Russians were killing Russians and brothers were killing brothers,” Putin declared, “We will not allow this to happen again. We will protect our people and our statehood from any threats, including from internal betrayal…. Inflated ambitions and personal interests have led to treason—treason against our country, our people and the common cause which Wagner Group soldiers, and commanders were fighting and dying for.” 

“Once again, any internal revolt is a deadly threat to our statehood and our nation. It is a blow to Russia, to our people,” he continued. “Our actions to defend the fatherland from this threat will be harsh. All those who have consciously chosen the path of betrayal, planned an armed mutiny, and taken the path of blackmail and terrorism, will inevitably be punished and will answer before the law and our people…. Those who staged the mutiny and took up arms against their comrades—they have betrayed Russia and will be brought to account. I urge those who are being dragged into this crime not to make a fatal and tragic mistake but make the only right choice: to stop taking part in criminal actions.” 

“I am certain that we will preserve and defend what we hold dear and sacred, and together with our motherland we will overcome any hardships and become even stronger,” Putin concluded. 

Andy Carvin, managing editor, Washington, DC

Wagner forces enter Rostov, occupy Russian Southern Military District headquarters

Over the course of Prigozhin’s Telegram posts, he boasted that his “25,000 strong” Wagner forces had marched across the border from Ukraine into Russia before claiming they had shot down a Russian armed forces helicopter before entering the city of Rostov. For many hours overnight, he provided no evidence to back his claims. This finally began to change as footage emerged on Russian Telegram, ultimately confirming that Prigozhin had indeed occupied Rostov. 

At 3:47 am Moscow time, the pro-Wagner channel VChK-OGPU posted a video in which a helicopter can be heard circling over Rostov at night. The channel noted, however, “No one has yet seen the video of the Wagner PMC column and the battles with the Ministry of Defense.” Two minutes later, the channel changed its tune by sharing a second video appearing to show rocket fire and bursts of assault rifles, describing it as the “first video reportedly showing fighting between PMC Wagner and Ministry of Defense units.” The footage circulated widely on Telegram but remained unverified. 

Less than twenty minutes later, at 4:09 am, VChK-OGPU shared a third clip showing what appeared to be a convoy of Wagner tanks, trucks, and other vehicles crossing a checkpoint without any opposition. Unlike the previous clips, however, the footage was easily visible, as it appeared to have been recorded during the pre-dawn twilight. According to open-source sun-tracking data, the sun rose in Rostov this morning at 4:25 am, with twilight commencing at 3:50 am, putting the video’s release squarely in the middle of pre-dawn twilight. The exact location of the footage is still under review and cannot be confirmed. 

At 5:01 am, not long after sunrise, the Verum Regnum Telegram channel circulated video clips of what appeared to show Wagner forces arriving in central Rostov, just outside the MoD’s Southern Military District headquarters at the intersection of Pushkinskaya Ulitsa and Budonnovskiy Prospekt. One of the videos appeared to show forces beginning to set up a perimeter around the MoD building.

Telegram footage allegedly of Wagner forces in central Rostov. (Source: Verum Regnum/archive)
Telegram footage allegedly of Wagner forces in central Rostov. (Source: Verum Regnum/archive)
Top: Highlights from the video showing a tank in front of the southwest corner of Pushkinskaya Ulitsa and Budonnovskiy Prospekt (top left) and a man recording footage on his phone in front of the intersection’s northwest corner in front of the MoD’s Southern Military District building (top right). Bottom: Google Street View of the same intersection facing westward, where both corners are visible. (Source: Verum Regnum/archive, top left and top right; Google Street View/archive, bottom)
Top: Highlights from the video showing a tank in front of the southwest corner of Pushkinskaya Ulitsa and Budonnovskiy Prospekt (top left) and a man recording footage on his phone in front of the intersection’s northwest corner in front of the MoD’s Southern Military District building (top right). Bottom: Google Street View of the same intersection facing westward, where both corners are visible. (Source: Verum Regnum/archive, top left and top right; Google Street View/archive, bottom)

A second clip showed how that presence had expanded with the placement of additional armored vehicles blocking the entire intersection from vehicle traffic.

Wagner soldiers (left) and armored vehicles (center and right) block the intersection in front of the Southern Military District building in Rostov. (Source: Verum Regnum/archive)
Wagner soldiers (left) and armored vehicles (center and right) block the intersection in front of the Southern Military District building in Rostov. (Source: Verum Regnum/archive)

Around 7:30 am Moscow time, a pair of videos appeared on the WAGNER Z GROUP/Z PMC WAGNER’Z Telegram channel and Prigozhin’s press channel respectively. The first video showed Prigozhin and his entourage entering the inner courtyard of the Southern Military District building. Prigozhin is later seen bragging about his successes with Deputy Defense Minister Yunus-bek Yevkurov while demanding that Yevkurov speak to him respectfully. In the second video, he addressed the camera and bragged that he had captured Rostov without firing a single shot.

Later, prior to 2:00 pm Moscow time, new footage emerged showing people running from the neighborhood of the MoD building. Initial reports suggested it was a Russian Armed Forces attack within the vicinity, but this has not been confirmed.

The many civilians running from the sound of an explosion were likely due to the crowds that came out to observe Wagner’s occupation of the MoD building. In one video, people can be seen chatting with Wagner soldiers and thanking them.

Andy Carvin, managing editor, Washington, DC

Wagner forces emerge south of Moscow in Lipetsk

The governor of Lipetsk, Igor Artamonov, announced Saturday afternoon that Wagner forces had entered the region, approximately 400 km south of Moscow. The Associated Press noted that the governor added, “The situation is under control.” Meanwhile, footage emerged that appeared to show excavators destroying the highway between Lipetsk and Moscow. 

At the time of writing there were conflicting reports as to whether the Wagner convoy had traveled from Rostov or was comprised of defectors from the Russian Armed Forces. 

Andy Carvin, managing editor, Washington, DC

Explosion at oil depot in Russian city of Voronezh

On June 24, videos depicting an explosion at an oil depot in the region of Voronezh were widely circulated online. The DFRLab identified the precise location of the explosion and confirmed the videos as authentic. 

The video published online was captured from buildings in close proximity to the Leroy Merlin store in Voronezh, as clearly observed in the footage. The DFRLab also corroborated the location of the oil depot Red Flag Oil Combine (Комбинат Красное знамя) and identified approximate coordinates for the area where the video was recorded. Below, the screenshot on the left is extracted from the video, while the image on the right is from Google Maps, illustrating the precise positions of the oil depot, store, and the recorded video.

Photo shows the locations of oil depot, store, recorded video, marked as blue, yellow, red respectively.  (Source: Left Twitter/archive, Right Google Maps/archive)
Photo shows the locations of oil depot, store, recorded video, marked as blue, yellow, red respectively.  (Source: Left Twitter/archive, Right Google Maps/archive)

Additional footage documented the shelling of a residential area in Voronezh. The footage reveals visible damage to cars. In order to verify the location of the building, the DFRLab utilized reverse image search via Google and Yandex, then cross-referenced the results with Google Maps, verifying the location of the shelling.

Imagery from Google Maps (left) shows the location of residential area in Voronezh (center and right). (Source: Google Maps/archive left; RtrDonetsk/archive, center; @christogrozev/archive, right)
Imagery from Google Maps (left) shows the location of residential area in Voronezh (center and right). (Source: Google Maps/archive left; RtrDonetsk/archive, center; @christogrozev/archive, right)
The location of residential area as seen on Yandex Maps. (Source: Yandex/archive)
The location of residential area as seen on Yandex Maps. (Source: Yandex/archive)

Sayyara Mammadova, research associate, Warsaw, Poland

Valentin Châtelet, research associate, Brussels, Belgium

Amid chaos in the Russian information space the Kremlin attempts to limit information on Prigozhin

According to TASS, Russian social network VKontakte (VK) and search engine Yandex are blocking content related to Prigozhin. Reportedly, instead of Prigozhin’s statement that was published on June 23 at 9:52 pm Moscow time, a VK page for Prigozhin’s Concord company displayed a message that the material was blocked on the territory of Russia on the basis of the decision of the Prosecutor General’s Office. At the time of the writing, Prigozhin’s posts on Concord VK page were available, though none of them correspond to 9:52 pm Moscow time. TASS added that the Yandex search results for Prigozhin notifies a reader that some of the search results are hidden in accordance with federal law. Using a virtual private network (VPN), the DFRLab replicated the search of the content mentioned by TASS and found that they are accessible from other locations. The restrictions seem to be geofenced to Russia. 

Separately, TASS reported that there are Telegram-access disruptions detected in various Russian cities, including Moscow, St. Petersburg, Voronezh, and Volgograd Oblasts. 

Russia’s internet regulator Roskomnadzor warned that the government can place internet performance restrictions in locations where counter-terrorist operations might take place, such as Moscow, Voronezh, or Rostov. Roskomnadzor also added that the use of Telegram is not limited for now.  

Meanwhile, the Telegram channel Faridaily reported that residents of Moscow and the surrounding region are receiving calls from unknown mobile numbers with messages from Wagner. According to the Telegram post, one person received a call on their Viber messenger with a recording of Prigozhin’s appeal about “restoring justice.” Another person received a call on behalf of Wagner with an automated voice encouraging them to join Wagner when their units move toward Moscow.

Meanwhile, footage from Russian state media Rossiya 24 surfaced online showing a confused news anchor. Apparently lacking instructions from the Kremlin on how to report about the armed insurrection in Russia, they said, “Next we are going for short commercial and then… commercial.”

Eto Buziashvili, research associate, Tbilisi, Georgia

The post Russian War Report Special Edition: Prigozhin and Wagner forces mutiny against Moscow appeared first on Atlantic Council.

]]>
Russian War Report: Wagner attempts to draft gamers as drone pilots https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-wagner-drafts-gamers/ Thu, 22 Jun 2023 18:12:27 +0000 https://www.atlanticcouncil.org/?p=658059 Russian PMC Wagner Group is encouraging gamers to apply to serve as drone pilots in the war against Ukraine while Ukrainian forces advance on the eastern front.

The post Russian War Report: Wagner attempts to draft gamers as drone pilots appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report

Security

Ukrainian counteroffensive sees advances in Zaporizhzhia and eastern Ukraine

Wagner attempts to draft gamers as UAV pilots

Tracking narratives

Deripaska blames hackers after his website briefly takes credit for potential war crime

Rumors of alleged death of popular pro-Kremlin war correspondent gain traction on Twitter

Ukrainian counteroffensive sees advances in Zaporizhzhia and eastern Ukraine

On June 19, Ukrainian forces launched counteroffensive actions in at least three areas and appear to have made gains in Zaporizhzhia and eastern Ukraine. The Telegram channel of Russian military blogger WarGonzo reported that Ukrainian forces continued attacks northwest, northeast, and southwest of Bakhmut and advanced near Krasnopolivka. Ukrainian Deputy Defense Minister Hanna Maliar announced that over the past week Ukrainian troops advanced up to seven kilometers in the direction of Zaporizhzhia and retook 113 square kilometers of territory. Russian Telegram channels also reported that fighting was ongoing south and southwest of Orikhiv on June 19. Zaporizhzhia and Donetsk oblasts continue to be the most active areas of the frontline, as the Ukrainian army attempts to advance in the directions of Novodarivka, Pryutne, Makarivka, Rivnopil, Novodanylivka, and Robotyne.

On June 17, the Russian Ministry of Defense claimed that Ukrainian forces conducted ground attacks west and south of Kreminna. It also stated that the Russian army had repelled Ukrainian attacks on the Avdiivka-Donetsk sector. Meanwhile, Ukrainian forces continued operations around Velyka Novosilka near the border between Donetsk and Zaporizhzhia oblasts. 

According to Ukrainian forces, Russian forces conducted offensive actions in Donetsk and Luhansk oblasts. The Ukrainian military reported forty-five combat engagements with Russian forces near Yampolivka, Torske, Hryhorivka, Spirne, Avdiyivka, Krasnohorivka, Marinka, Pobieda, Novomykhailivka, and Donetsk’s Dibrova and Orikhovo-Vasylivka. According to Ukraine, the Russian army continued to shell villages in the direction of Marinka, Zaporizhzhia, Kherson, Lyman, and Kupiansk. Ukraine also alleged that Russian forces launched Kalibr cruise missiles from a submarine in the Black Sea and Shahed drones from the eastern coast of the Sea of Azov.

On June 20, Kyrylo Budanov, chief of the Main Directorate of Intelligence for the Ministry of Defense of Ukraine, alleged that Russian troops mined the Zaporizhzhia nuclear power plant’s cooling pond, which is necessary for the safe operation of the plant. According to Budanov, if Russia triggers an explosion, there is a “high probability that there will be significant problems.” Budanov did not provide any evidence to support the allegation, and the statement cannot be independently verified at this time. If true, however, it would put the nuclear plant at greater risk of a significant accident. The power plant complex, Europe’s largest, has been under occupation since February 2022.

On January 22, the governor of Russian-occupied Crimea accused Ukraine of targeting a bridge that connects the peninsula to Kherson Oblast, near the village of Chonhar. In a Telegram post, Vladimir Sal’do alleged that Ukraine struck the bridge with “British Storm Shadow missiles,” creating a hole in the middle of the bridge.

As fierce hostilities continue in eastern and southern Ukraine, there are signs of a new wave of arrests in Russia, including of people with ties to Ukraine. On June 20, Russian state media outlet RIA Novosti announced that a woman of Ukrainian origin was detained in Saransk and charged with treason.

Ruslan Trad, resident fellow for security research, Sofia, Bulgaria

Wagner attempts to draft gamers as UAV pilots

A June 19 Telegram post from Russian opposition news outlet Verstka claimed that Wagner Group is encouraging gamers to apply to serve as unmanned aerial vehicle pilots in the war against Ukraine. The media outlet reported that no prior military experience was required to apply for the position. Posts from Wagner emerged on Vkontakte the same day, inviting gamers with experience in “manipulating joysticks in flight simulators” to enroll.

Wagner ad recruiting gamers as UAV pilots. (Source: VK)
Wagner ad recruiting gamers as UAV pilots. (Source: VK)

Verstka, which contacted a Wagner recruiter as part of its reporting, stated that the campaign aims to recruit soldiers to pilot “copters and more serious machines.” In this particular context, “copters” (коптеры) is a reference to commercial drones that are sold to the public and have been widely used in the war against Ukraine. A May 19 investigation published by the Organized Crime and Corruption Reporting Project found that Chinese manufacturers have reportedly continued to provide Russian armed forces with DJI drones through third parties in Kazakhstan. 

Verstka also noted that in 2022, the Russian defense ministry attempted to recruit gamers with a targeted ad campaign that invited them to play “with real rules, with no cheat codes or saves.”

Valentin Châtelet, research associate, Brussels, Belgium

Deripaska blames hackers after his website briefly takes credit for potential war crime

The Russian-language website of Russian industrialist and US-sanctioned oligarch Oleg Deripaska briefly displayed an article appearing to take credit for deporting Ukrainian children to Russian-occupied Crimea in partnership with Kremlin official Maria Lvova-Belova, who is already facing an International Criminal Court arrest warrant for allegedly deporting children. 

Yaroslav Trofimov, chief foreign affairs correspondent at the Wall Street Journal, noted the article’s appearance and disappearance in a June 15 tweet. Trofimov shared screengrabs of the article, which by that time had already been deleted from Deripaska’s Russian-language website, deripaska.ru. A complete copy of the article can be found at the Internet Archive.

Later in the article, it added, “Separately, the Fund and personally Oleg Vladimirovich [Deripaska] express their gratitude to Maria Lvova-Belova and her project ‘In Hands to Children,’ which not only provided methodological materials, but also found an opportunity to send employees for psychological work with affected babies.” In March 2023, the ICC issued an arrest warrant for Lvova-Belova and Russian President Vladimir Putin, alleging they are responsible for unlawful deportation and transport of children from Russian-occupied parts of Ukraine to the Russian Federation.

In a response to Russian independent news outlet Meduza, which also covered the incident, a team of representatives for Deripaska called the article a “gross fake press-release” and blamed hackers for the article’s appearance. “The team added that Deripaska ‘unequivocally condemns the separation of children from their parents’ and that he is ‘one of the very few prominent Russian industrialists who openly criticizes the fratricidal war and consistently advocates for peace in Ukraine, as well as a reduction in global military spending,’” Meduza noted.

Eto Buziashvili, research associate, Tbilisi, Georgia

Rumors of alleged death of popular pro-Kremlin war correspondent gain traction on Twitter

Rumors are spreading online that claim Ukrainian forces killed pro-Kremlin war correspondent Semyon Pegov, who operates an influential group of social media accounts under the name Wargonzo. The rumor first spread on Twitter on June 19 following the release of a graphic video from the 73rd Naval Center of Operations documenting how Ukrainian special forces unit had shot Russian soldiers in trenches. On June 19, Pegov’s Twitter account disregarded the allegations as fake. Wargonzo’s Telegram account has continued to operate as usual.

DFRLab analysis conducted with the social media monitoring software Meltwater Explore revealed that the most retweeted tweet came from the pro-Ukraine Twitter account @GloOouD, which stated, “LOOKS LIKE RUSSIAN TERRORISTS AND WAR REPORTER SEMEN PEGOV WAS KILLED BY UKRAINIAN SPECIAL FORCES.” The account shared a screenshot of a low-quality video frame depicting a red-bearded man that bears resemblance to Pegov.

Screenshot of @GloOouD’s tweet suggesting that Semyon Pegov was killed by Ukrainian special forces. (Source: @GloOouD/archive)
Screenshot of @GloOouD’s tweet suggesting that Semyon Pegov was killed by Ukrainian special forces. (Source: @GloOouD/archive)

The DFRLab confirmed that the video frame depicting Pegov’s look-alike was extracted from the graphic video posted posted by the 73rd Naval Center of Operations. The video’s metadata indicates the clip was created on June 18, 2023, at 22:16:07 GMT+0300. However, the video shows events occurring in daylight.

Pegov’s most recent public appearance was on June 13 during a meeting between Putin and Russian war correspondents. The Kremlin-controlled Channel One Russia broadcast the meeting on June 18.

Comparison of the red-bearded man from the 73rd Naval Center of Operations’ video and Pegov talking at a press conference. (Source: @ukr_sof/archive, top; Perviy Kanal/archive, bottom)
 
- Nika Aleksejeva, Resident Fellow, Riga, Latvia
Comparison of the red-bearded man from the 73rd Naval Center of Operations’ video and Pegov talking at a press conference. (Source: @ukr_sof/archive, top; Perviy Kanal/archive, bottom)

Nika Aleksejeva, resident fellow, Riga, Latvia

The post Russian War Report: Wagner attempts to draft gamers as drone pilots appeared first on Atlantic Council.

]]>
Ukraine’s counteroffensive is a marathon not a blitzkrieg https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-counteroffensive-is-a-marathon-not-a-blitzkrieg/ Thu, 22 Jun 2023 17:44:48 +0000 https://www.atlanticcouncil.org/?p=658184 Ukraine's summer counteroffensive has barely begun and already some are dismissing it as a failure due to lack of immediate progress. In reality, the unfolding campaign is a marathon and not a blitzkrieg, writes Peter Dickinson.

The post Ukraine’s counteroffensive is a marathon not a blitzkrieg appeared first on Atlantic Council.

]]>
Less than two weeks since he first confirmed that Ukraine’s long-awaited counteroffensive was finally underway, Ukrainian President Volodymyr Zelenskyy already finds himself forced to hit back at criticism over the pace of military operations. “Some people believe this is a Hollywood movie and expect results now. It’s not,” he told the BBC on June 21. “Whatever some might want, including attempts to pressure us, with all due respect, we will advance on the battlefield the way we deem best.”

Zelenskyy’s comments reflect frustration in Kyiv over reports in the mainstream international media and widespread claims on social media platforms suggesting Ukraine’s counteroffensive is already floundering. Ukrainian presidential advisor Mykhailo Podolyak was one of many Ukrainian commentators to suggest this trend is part of a coordinated Kremlin disinformation operation. In a June 20 post, he accused Moscow of fueling media hysteria about the alleged failure of Ukraine’s counteroffensive in order to secure a ceasefire and “freeze the conflict at any cost.”

Kremlin-tied or Russia-friendly sources are likely to be behind at least some of the recent criticism over the initial pace of Ukraine’s counteroffensive. At the same time, negative assessments are also a consequence of the unrealistically high expectations that built up in the half-year period prior to the start of the campaign.

In the final months of 2022, the Ukrainian military stunned the watching world by liberating large areas of the country from Russian occupation. A lightning September offensive saw most of northeastern Ukraine’s Kharkiv region de-occupied, while a more methodical push in the south eventually resulted in the liberation of Kherson. These successes encouraged many to expect similarly rapid progress during the current campaign. In reality, Ukraine’s summer 2023 counteroffensive represents a far greater challenge in almost every sense.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Ukraine must overcome a vast Russian invasion force strengthened by 300,000 mobilized troops that is dug in behind successive lines of sophisticated defensive fortifications stretching for over one thousand kilometers. They must do so without air superiority and while outgunned by Russian artillery at many points along the front. Nor can they count on the element of surprise. This incredibly ambitious task would challenge the world’s most powerful militaries. Understandably, Ukrainian commanders are adopting a methodical approach to the campaign.

Progress so far has been very slow but steady. During the first few weeks of the counteroffensive, Ukraine claims to have liberated at least eight settlements. While most represent sparsely populated frontline villages with little strategic value, the sight of the Ukrainian flag raised in liberated communities provides all Ukrainians with a massive morale boost. Meanwhile, the big battles still lie ahead.

For now, the Ukrainian military is focusing on probing attacks at numerous points along the front in order to identify weaknesses and thin out Russian defenses. Ukraine is also carrying out a comprehensive campaign of airstrikes against Russian military and logistical targets deep inside occupied territory. Britain’s May 2023 decision to provide Ukraine with long-range Storm Shadow cruise missiles is playing an important role in these air attacks, making it possible to hit targets virtually anywhere in occupied Ukraine. For example, Storm Shadow missiles are believed to have been used in the June 22 attack on a strategically important bridge connecting Crimea with Russian-occupied southern Ukraine.

These tactics are reminiscent of the early stages of last year’s ultimately triumphant Ukrainian campaign to liberate Kherson. At the beginning of August 2022, Ukraine very publicly signaled the start of a counteroffensive to free the southern port city and surrounding region. Progress was initially slow, leading to widespread criticism and pessimistic forecasts. However, Ukraine’s strategy of systematically targeting key bridges across the Dnipro River which Russian troops relied upon for resupply eventually paid off. Hemmed in and cut off, Russian commanders ordered a humiliating retreat in early November. 

While the Kherson counteroffensive was on a far smaller scale than the current operation, it offers perhaps the best guide to Ukraine’s current objectives and envisioned timeline. The campaign to liberate Kherson involved tens of thousands of troops and took approximately three months to complete. Today’s counteroffensive involves hundreds of thousands of troops on both sides, with an area equal to a medium-sized European country at stake. It may be months before Ukraine’s commanders feel the conditions are right to attempt a major push to achieve a comprehensive breakthrough.

Ukraine’s international partners seem to appreciate the need for patience and are now emphasizing a long-term commitment to Ukraine that goes far beyond the current counteroffensive. At the Ukraine Recovery Conference in London on June 21, British Prime Minister Rishi Sunak reiterated his promise to “stand with Ukraine for as long as it takes.” Other Western leaders have made similar pledges in recent weeks.

These statements are particularly important at a time when Russian hopes of rescuing their faltering invasion increasingly hinge on a weakening of Western resolve and a reduction in support for Ukraine. Despite the many setbacks of the past sixteen months, Putin and other senior regime figures in Moscow are apparently still convinced they can ultimately outlast the democratic world in Ukraine. European and American leaders are attempting to dampen such expectations by signaling the strength of their commitment to Ukrainian victory.

As international anxiety grows over the perceived lack of progress in Ukraine’s big summer counteroffensive, it is vital that this message of Western unity and resolution remains clear and unambiguous. The campaign to defeat Russia’s invasion is a marathon not a blitzkrieg, but it has every chance of success as long as Ukraine and the country’s partners are unwavering in their commitment.

Peter Dickinson is the editor of the Atlantic Council’s UkraineAlert service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s counteroffensive is a marathon not a blitzkrieg appeared first on Atlantic Council.

]]>
The world’s regulatory superpower is taking on a regulatory nightmare: artificial intelligence https://www.atlanticcouncil.org/blogs/new-atlanticist/the-worlds-regulatory-superpower-is-taking-on-a-regulatory-nightmare-artificial-intelligence/ Thu, 15 Jun 2023 23:02:29 +0000 https://www.atlanticcouncil.org/?p=656204 Atlantic Council experts answer the most pressing questions on the EU's AI Act, including what's in it, when it could become law, and what it means for the world.

The post The world’s regulatory superpower is taking on a regulatory nightmare: artificial intelligence appeared first on Atlantic Council.

]]>
The humans are still in charge—for now. The European Parliament, the legislative branch of the European Union (EU), passed a draft law on Wednesday intended to restrict and add transparency requirements to the use of artificial intelligence (AI) in the twenty-seven-member bloc. In the AI Act, lawmakers zeroed in on concerns about biometric surveillance and disclosures for generative AI such as ChatGPT. The legislation is not final. But it could have far-reaching implications since the EU’s large size and single market can affect business decisions for companies based elsewhere—a phenomenon known as “the Brussels effect.”

Below, Atlantic Council experts share their genuine intelligence by answering the pressing questions about what’s in the legislation and what’s next. 

1. What are the most significant aspects of this draft law? 

The European Parliament’s version of the AI Act would prohibit use of the technology within the EU for controversial purposes like real-time remote biometric identification in public places and predictive policing. Member state law enforcement agencies are sure to push back against aspects of these bans, since some of them are already using these technologies for public security reasons. The final version could well be more accommodating of member states’ security interests.

Kenneth Propp is a nonresident senior fellow with the Atlantic Council’s Europe Center and former legal counselor at the US Mission to the European Union in Brussels.

The most significant aspect of the draft AI Act is that it exists and has been voted on positively by the European Parliament. This is the only serious legislative attempt to date to deal with the rapidly evolving technology of AI and specifically to address some of the anticipated risks, both due to the technology itself and to the ways people use it. For example, a government agency might use AI to identify wrongdoing among welfare recipients, but due to learned bias it misidentifies thousands of people as participating in welfare fraud (this happened in the Netherlands in 2020). Or a fake video showing a political candidate in a compromising position is released just prior to the election. Or a government uses AI to track citizens and determine whether they exhibit “disloyal” behavior.

To address these concerns, EU policymakers have designed a risk-management framework, in which higher-risk applications would receive more scrutiny. A few uses of AI—social scoring, real-time facial recognition surveillance—would be banned, but most companies deploying AI, even the higher-risk cases, would have to file extensive records on training and uses. Above all, this is a law about transparency and redress: humans should know when they are interacting with AI, and if AI makes decisions about them, they should have a right of redress to a fellow human. In the case of generative AI, such as ChatGPT, the act requires that images be marked as coming from AI and the AI developer should list the copyrighted works on which the AI trained.

Of course, the act is not yet finished. Next, there will be negotiations between parliament and the EU member states, and we can expect significant opposition to certain bans from European law enforcement institutions. Implementation will bring other challenges, especially in protecting trade secrets while examining how algorithms might steer users toward extreme views or criminal fraudsters. But if expectations hold, by the end of 2023 Europe will have the first substantive law on AI in the world.

Frances Burwell is a distinguished fellow at the Atlantic Council’s Europe Center and a senior director at McLarty Associates.

There are numerous significant aspects of this law, but there are two and a half that really stand out. The first is establishing a risk-based policy where lawmakers identify certain uses as presenting unacceptable risk (for example, social scoring, behavioral manipulation of certain groups, and biometric identification by groups including police). Second, generative AI systems would be regulated and required to disclose any copyrighted data that was used to train the generative model, and any content AI outputs would need to carry a notice or label that it was created with AI. It’s also interesting what’s included as guidance for parliament to “ensure that AI systems are overseen by people, are safe, transparent, traceable, non-discriminatory, and environmentally friendly.” This gives parliament a wide mandate that could see everything from data provenance to data center energy use be regulated under this draft law.

Steven Tiell is a nonresident senior fellow with the Atlantic Council’s GeoTech Center. He is a strategy executive with wide technology expertise and particular depth in data ethics and responsible innovation for artificial intelligence.

2. What impact would it have on the industry?

Much as the EU’s General Data Protection Regulation (GDPR) became a globally motivating force in the business community, this law will do the same. The burden on companies to maintain and keep separate infrastructure exclusively for the EU is much higher than the cost of compliance. And the cost (and range) of noncompliance for companies (and individuals) has risen—prohibited uses, those deemed to have unacceptable risk, will incur a fine up to forty million euros or 7 percent of worldwide annual turnover (total global revenue) for the preceding financial year, whichever is greater. Violations of human-rights laws or any type of discrimination perpetrated by an AI will incur fines up to twenty million euros or 4 percent of worldwide turnover. Other noncompliance offenses, including from foundational models (again, the draft regulation affects generative AI), are subjected to fines of up to ten million euros or 2 percent of worldwide annual turnover. And those supplying false, incomplete, or misleading information to regulators can be fined up to five million euros or 1 percent of worldwide annual turnover. These fines are a big stick to encourage compliance. 

—Steven Tiell 

As I wrote for Lawfare when the European Commission proposed the AI Act two years ago, the proposed AI regulation is “a direct challenge to Silicon Valley’s common view that law should leave emerging technology alone.” At the same time, though the legislation is lengthy and complex, it is far from the traditional caricature of EU measures as heavy-handed, top-down enactments. Rather, as I wrote then, the proposal “sets out a nuanced regulatory structure that bans some uses of AI, heavily regulates high-risk uses, and lightly regulates less risky AI systems.” The European Parliament has added some onerous requirements, such as a murky human-rights impact assessment of AI systems, but my earlier assessment remains generally true.

It’s also worth noting that other EU laws, such as the GDPR adopted in 2016, will have an important and still-evolving impact on the deployment of AI within EU territory. For example, earlier this week Ireland’s data protection commission delayed Google’s request to deploy Bard, its AI chatbot, because the company had failed to file a data protection impact assessment, as required by the GDPR. Scrutiny of AI products by multiple European regulatory authorities employing precautionary approaches likely will mean that Europe will lag in seeing some new AI products.

—Kenneth Propp

3. How might this process shape how the rest of the world regulates AI?

It will have an impact on the rest of the world, but not simply by becoming the foundation for other AI acts. Most significantly, the EU act puts certain restrictions on governmental use of AI in order to protect democracy and a citizen’s fundamental rights. Authoritarian regimes will not follow this path. The AI Act is thus likely to become a marker, differentiating between those governments that value democracy more than technology, versus those that seek to use technology to control their publics.

—Frances Burwell

Major countries across the globe from Brazil to South Korea are in the process of developing their own AI legislation. The US Congress is slowly moving in the same direction with a forthcoming bill being developed by Senate Majority Leader Chuck Schumer likely to have important influence. If the EU sticks to its timetable of adopting the AI Act by the end of the year, its legislation could shape other countries’ efforts significantly by virtue of being early out of the gate and comprehensive in nature. Countries more concerned with promoting AI innovation, such as the United Kingdom, may stake out a lighter-touch approach than the EU, however.

Kenneth Propp

The world’s businesses will comply with the EU’s AI Act if they have any meaningful amount of business in the EU and governments in the rest of the world are aware of this. Compliance with the EU’s AI Act will be table stakes. It can be assumed that many future regulations will mimic many components, big and small, of the EU’s AI Act, but where they deviate will be interesting. Expect to see other regulators emboldened by the fines and seek commensurate remuneration for violations in their countries. Other countries might extend more of the auditing requirements to things such as maintaining outputs from generative models. Consumer protections in different countries will be more variable as well. And it will be interesting to see if countries such as the United States and United Kingdom pivot their legislation toward being more risk-based as opposed to principles-based.

—Steven Tiell 

4. What are the chances of this becoming law, and how long will it take? 

Unlike in the United States, where congressional passage of legislation is typically the decisive step, the European Parliament’s adoption on Wednesday of the AI Act only prepares the way for a negotiation with the EU’s member states to arrive at the final text. Legislative proposals can shift substantially during such closed-door “trilogues” (so named because the European Commission as well as the Council of the European Union also participate). The institutions aim for a final result by the end of 2023, during Spain’s presidency of the Council, but legislation of this complexity and impact easily could take longer to finalize.

Kenneth Propp

Based on this week’s vote, there are strong signals of overwhelming support for this draft law. The next step is trilogue negotiations among the parliament, the Council of the European Union, and the European Commission, and these negotiations will determine the law’s final form. There are strong odds these negotiations will finish by the end of the year. At that point, the act will take about two years to transpose to EU member states for implementation, similar to what happened with GDPR. Also similar to GDPR, it could take at least that long for member states to develop the expertise to assume their role as market regulators. 

—Steven Tiell 

5. What are some alternative visions for regulating AI that we may see?

In general, we see principles-based, risk-based, and rights-based legislation. Depending on the government and significance of the law, different approaches might be applied. The EU’s AI Act is somewhat unique and interesting as it started life as a principles-based approach, but through its evolution became primarily risk-based. Draft legislation in the United States and the United Kingdom is principles-based today. Time will tell if these governments are influenced by the EU’s approach.

—Steven Tiell

The post The world’s regulatory superpower is taking on a regulatory nightmare: artificial intelligence appeared first on Atlantic Council.

]]>
Russian War Report: Anti-Ukrainian counteroffensive narratives fail to go viral https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-counteroffensive-narratives/ Thu, 15 Jun 2023 18:59:00 +0000 https://www.atlanticcouncil.org/?p=656035 As the Ukrainian counteroffensive continues in Ukraine's south and east, false narratives calling it unsuccessful fail to gain traction on Twitter.

The post Russian War Report: Anti-Ukrainian counteroffensive narratives fail to go viral appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report

Security

Deadly Russian barrage targets residential building in Kryvyi Rih as fighting continues in south and east

Putin confirms Russian conscripts are protecting Belgorod Oblast against raids

Tracking narratives

Narrative targeting Ukraine’s counteroffensive fails to gain traction on Twitter

Deadly Russian barrage targets residential building in Kryvyi Rih as fighting continues in south and east

On June 13, Russia attacked a residential building in Kryvyi Rih, killing at least twelve people and injuring at least thirty-four. Rescue operations continued the morning of June 14. 

Elsewhere, the Air Force of the Armed Forces of Ukraine said at least three people were killed and thirteen wounded after Russia launched Kalibr cruise missiles against Odesa on the night of June 13. The air force said it shot down three of four Kalibr cruise missiles and nine of ten Shahed drones. In addition, shelling in Karyerne, in Kherson Oblast, killed a nine-year-old girl, according to the Prosecutor General’s Office.

Further, a Donbas Telegram channel citing Governor Pavlo Kyrylenko reported at least two people killed and two others wounded after Russian missile strikes in Kramatorsk. In the Dnipropetrovsk region, Governor Serhiy Lysak said three Shahed drones were shot down, while in Svitlovodsk, Kirovohrad Oblast, a Shahed drone reportedly struck an unnamed “infrastructure object.” Russian Tu-22M3 bombers also launched Kh-22 missiles against targets in Donetsk Oblast. Meanwhile, shelling was reported in Russia’s Kursk region, targeting Glushkovo, Korovyakovka, Tetkino, and Popovo-Lezhachi. A police station in Glushkovo was reportedly damaged. 

The General Staff of the Armed Forces of Ukraine reported on June 13 twenty-eight clashes between its forces and the Russian army. Near Bakhmut, Russian forces attempted to carry out attacks in the areas of Orikhovo-Vasylivka, Ivanivske, and Bila Hora. Attacks were also reported in the direction of Lyman near Vesele and Rozdolivka. 

The office of Ukrainian President Volodymyr Zelenskyy said that evacuations are planned in Armyansk, a Russian-occupied town in north Crimea, prompted by the collapse of the Nova Kakhovka dam. Operations at the Titan titanium dioxide plant in Armyansk were critically disrupted as a result of the dam collapse. The presidential office said an attack against the Titan plant could release up to two hundred tons of ammonia into the air, posing a significant threat to north Crimea and south Kherson Oblast. Flooding is also silting up the North Crimean Canal; Reuters noted that the canal has traditionally supplied 85 percent of Crimea’s water.

Ukrainian volunteer Roman Donik reported on June 13 that the 47th Mechanized Brigade of the Armed Forces of Ukraine, known as Magura, is advancing through continuous minefields. Ukraine’s current de-mining equipment is reportedly insufficient for handling the density of the minefields. Despite the risks, the soldiers of the brigade are moving forward on foot. The following day, Speaker of the General Staff of the Armed Forces of Ukraine Andriy Kovalev announced that Ukrainian forces had advanced in various areas in the direction of Berdyansk at a distance of 200 to 1,400 meters. Currently, the main battles are taking place in Makarivka, Novodanylivka, and Novopokrovka. 

The investigative unit of Radio Free Europe/Radio Liberty’s Ukraine service reported that satellite imagery shows Russia transferred twenty helicopters to the Berdyansk airfield after the launch of Ukraine’s counteroffensive in the direction of Zaporizhzhia. Currently, there are at least twenty-seven Russian military helicopters at the occupied airfield, as well as five Ka-52 units, nine Mi-8 or Mi-24 units, and thirteen Ka-29 units. According to the report, these aircraft are designed to support Russian ground forces with the operational transfer of troops or equipment closer to the battlefield, in addition to possible evacuation operations. 

According to Mykola Kolesnyk, a Ukrainian paramilitary leader, a Russian ammunition depot was hit in occupied Staromlynivka by the aerial reconnaissance unit of the 129th Territorial Defense Forces Brigade and the artillery unit of the 55th Brigade of the Armed Forces of Ukraine. Footage from the 53rd Brigade of Ukraine’s Armed Forces shows strikes against Russian equipment, warehouses, and bases. 

Meanwhile, US Secretary of State Antony Blinken announced a new military assistance package for Ukraine, which will include additional munitions for national advanced surface-to-air missile systems (NASAMS), Stinger anti-aircraft systems, missiles for high mobility artillery rocket systems (HIMARS), 155mm and 105mm artillery shells, fifteen Bradley infantry fighting vehicles, ten Stryker armored personnel carriers, Javelin anti-armor systems, and more than 22 million rounds of small arms ammunitions and grenades, in addition to demining and communications systems. Meanwhile, the United Kingdom announced a new $116 million aid package for Ukraine, which will include a radar system to track Russian missiles, artillery, and ammunition. 

Lastly, Danish military instructors will train Ukrainian crews on German Leopard 1A5 tanks, according to a Danish media. Denmark is scheduled to send Ukraine eighty restored Leopard 1A5DK tanks this month. The machines were bought by the private German company FFG after they were withdrawn from the Danish army in 2005. Denmark and Germany allocated $3.2 million to repair and modernize the tanks. In early February, the German company Krauss-Maffei Wegmann began preparing the tanks for delivery to Ukraine.

Ruslan Trad, resident fellow for security research, Sofia, Bulgaria

Putin confirms Russian conscripts are protecting Belgorod Oblast against raids

In a June 13 address, Russian President Vladimir Putin spoke about the situation in Russian regions bordering Ukraine. Since May 22, Belgorod Oblast has been the target of two incursions allegedly led by the Russian Volunteer Corps, an anti-Putin military unit made of Russian pro-Ukrainian partisans. In a meeting with Russian military bloggers and war correspondents, Putin reportedly said, “If this continues, then we will need to examine the question—and I say this carefully—of creating on Ukraine’s territory a sanitary zone at such a distance from where it could be impossible to reach our territory.” While this appears to be the first time the term “sanitary zone” has been used in reference to the war in Ukraine, the Russian president is likely referring to the creation of a demilitarized buffer zone in Ukraine.

In sharing an anecdote about a battalion commander in Belgorod Oblast, Putin confirmed Russian conscripts had been deployed to the region. When asked how many mobilized soldiers and conscripts were under his command, the commander reportedly replied, “They’re all conscripts,” adding, “None of them shivered!”

Russia’s spring conscription kicked off on March 30, 2023, with future recruits called to undergo military preparation. Although Putin declared in March 2022 that no conscript would fight in the war, suspicions were raised following the reported death of three conscripts after a June 1 attack against Belgorod. The three soldiers served in the 43rd Railway Brigade. In a VKontakte post, a Russian official said the conscripted soldiers had been relocated from the Sverdlovsk region to Belgorod. According to pro-Russian media outlet Lenta, Russian MP Leonid Slutsky reportedly proposed a legal mechanism so that “conscripts, fighting the enemy in the Belgorod Oblast, could be recognized as participants of combat operations and receive all the payments due under the law.”

Valentin Châtelet, research associate, Brussels, Belgium

Narrative targeting Ukraine’s counteroffensive fails to gain traction on Twitter

A small number of influential Twitter accounts are spreading a narrative that frames the Ukrainian counteroffensive as unsuccessful. The DFRLab conducted a query using the social media analysis platform Meltwater Explore to identify tweets that mention the Ukrainian counteroffensive. It returned 352,000 results from 118,000 users, which averages almost three tweets per user. The results indicate organic traffic.

Chart comparing the sentiment of tweets about Ukraine’s counter-offense, determined by number of tweets, average number of retweets, and total retweets of top 100 most retweeted posts. (Source: @nikaaleksejeva/DFRLab via Meltwater Explore)

Three of the five most-retweeted tweets claimed the counteroffensive was unsuccessful. All three tweets came from @KimDotcom, a controversial hacker, entrepreneur, and activist currently based in New Zealand. In his tweets, he suggested that sanctions against Russia do not work, implied that Ukrainian soldiers are suffering enormous casualties, and amplified a tweet from the Russian Ministry of Foreign Affairs allegedly showing destroyed Western military vehicles. The second most-active account declaring the counteroffensive a failure was the anonymous account @WarMonitors, which shared allegedly destroyed Western military equipment and praised Russian equipment.

Nika Aleksejeva, resident fellow, Riga, Latvia

The post Russian War Report: Anti-Ukrainian counteroffensive narratives fail to go viral appeared first on Atlantic Council.

]]>
Activists and experts assemble in Costa Rica to protect human rights in the digital age https://www.atlanticcouncil.org/content-series/360os/activists-and-experts-assemble-in-costa-rica-to-protect-human-rights-in-the-digital-age/ Wed, 07 Jun 2023 20:21:18 +0000 https://www.atlanticcouncil.org/?p=652275 Our Digital Forensic Research Lab is convening top tech thinkers and human-rights defenders at RightsCon to collaborate on an agenda for advancing rights globally.

The post Activists and experts assemble in Costa Rica to protect human rights in the digital age appeared first on Atlantic Council.

]]>
Will the world’s human-rights defenders be able to match the pace of quickly moving technological challenges arising from artificial intelligence, information wars, and more?

Rights activists, tech leaders, and other stakeholders are meeting at RightsCon Costa Rica on June 5-8 to collectively set an agenda for advancing human rights in this digital age.

Our experts at the Digital Forensic Research Lab are coordinating part of that effort, with a slate of RightsCon events as part of their 360/Open Summit: Around the World global programming. Below are highlights from the events at RightsCon, which cover digital frameworks in Africa, disinformation in Ukraine, online harassment of women globally, and more.


The latest from San José

Rethinking transparency reporting

Human rights must be central in the African Union’s Digital Transformation Strategy

Day two wraps with a warning about dangerous threats, from militant accelerationism to violence toward women

What’s behind today’s militant accelerationism?

The digital ecosystem’s impact on women’s political participation

Day one wraps with recommendations for Africa’s digital transformation, Venezuela’s digital connectivity, and an inclusionary web

What does a trustworthy web look like?

Mapping—and addressing—Venezuela’s information desert

Where open-source intelligence meets human-rights advocacy


Rethinking transparency reporting

On Day 3 of RightsCon Costa Rica, Rose Jackson, director of the DFRLab’s Democracy & Tech Initiative, joined panelists Frederike Kaltheuner, director for technology and human rights at Human Rights Watch, and David Green, civil liberties director at Electronic Frontier Foundation, for a panel on rethinking transparency reporting. The discussion was led and moderated by Gemma Shields, Online Safety Policy Lead at the United Kingdom’s Office of Communications (Ofcom).

Shields opened the session by describing the online safety bill currently making its way through the UK parliament and the role of Ofcom in its implementation. The bill will give new powers to Ofcom to test mandatory platform transparency reporting requirements. Through these efforts, Ofcom hopes that “good, effective meaningful transparency reporting might encourage proactive action from the platforms,” Shields explained.

During the discussion, the panelists discussed what will be central to implementation of the online safety bill, including what effective transparency reporting looks like. Kaltheuner emphasized the complexity of defining meaningful transparency when the use cases vary across end users, regulators, civil society, journalists, and academics. Green underscored the importance of centering user needs in the conversation and the need to tailor reporting mandates to specific platforms.

Jackson noted that it is a strategic imperative for the UK government to consult experts from the global majority and consider how regulations and norms could be potentially used for harm by non-democratic actors. As Jackson put it, “what happens in the most unprotected spaces is the beta test for what will show up in your backyard.” She also highlighted the importance of global civil society engaging with the UK Online Safety Bill and European transparency regulations, such as the Digital Services Act, because these policies are first movers in codifying more regulation, and future policies will refer back to these efforts.

Human rights must be central in the African Union’s Digital Transformation Strategy

The DFRLab gathered stakeholders from the policy-making, democracy, rights, and tech communities across the African continent to discuss the African Union’s Digital Transformation Strategy. Participants compared notes and identified opportunities for increasing the strategy’s human-rights focus as it approaches its mid-mandate review. Participants also agreed that trusted conveners, such as watchdog agencies within national governments, can play a critical facilitating role in ensuring effective communication between experts, users, and civil society on one hand and policymakers and elected officials on the other. Discussion of particular concerns with the Strategy or recommendations to increasingly center human rights in it will be continued in future gatherings.

Day two wraps with a warning about dangerous threats, from militant accelerationism to violence toward women

The DFRLab kicked off day two at RightsCon with a conversation on how Russian information operations, deployed ahead of the full-scale invasion of Ukraine, were used to build false justifications for the war, deny responsibility for the war of aggression, and mask Russia’s military build-up. The panel also highlighted two DFRLab reports, released in February 2023, that examine Russia’s justifications for the war and Russia’s attempts to undermine Ukraine’s resistance and support from the international community.

Read more

Transcript

Jun 8, 2023

Mapping the last decade of Russia’s disinformation and influence campaign in Ukraine

By Atlantic Council

Since its full-scale invasion of Ukraine, Russia has continued its information operations, targeting more than just Ukraine, say speakers at a RightsCon event hosted by the Digital Forensic Research Lab.

Disinformation Russia

While at RightsCon, the DFRLab participated in a discussion on militant accelerationism, its impact on minority communities, and how bad actors can be held accountable. The event, hosted by the United Kingdom’s Office of Communications and Slovakia’s Council of Media Services, featured panelists who discussed the ways in which policy can hold all voices, including those of the powerful, accountable. During the panel, DFRLab Research Fellow Meghan Conroy discussed how such violent narratives have become increasingly commonplace in some American ideologies and how extremist individuals and groups sympathetic to these narratives have been mobilized.

To close out the day, the DFRLab and the National Democratic Institute co-hosted a panel featuring global experts from civil society, government, and industry on how the threat of violence and harassment online has impacted the potential for women to participate in politics. As noted by the panelists, abuse suffered online is meant to strictly intimidate and silence those who want to get involved, and it is, therefore, all the more important that these very women, and those already established, stand up and speak out so as to serve as role models and protect diversity and equity in politics, tech, and beyond.

What’s behind today’s militant accelerationism?

By Meghan Conroy

While at RightsCon, I—a DFRLab research fellow and co-founder of the Accelerationism Research Consortium—joined an event hosted by the UK Office of Communications and Slovakia’s Council of Media Services on militant accelerationism.

My co-panelists and I provided an overview of militant accelerationism and an explanation of the marginalized groups that have been targets of militant accelerationist violence. I discussed accelerationist narratives that have not only permeated mainstream discourse but have also mobilized extremists to violence. Hannah Rose, research fellow and PhD candidate at King’s College London’s International Centre for the Study of Radicalization, zeroed in on the role of conspiracy theories in enabling the propagation of these extreme worldviews.

Stanislav Matějka, head of the Analytical Department at the Slovakian Council of Media Services, delved into the October 2022 attack in Bratislava. He flagged the role of larger, more mainstream platforms as well as filesharing services in enabling the spread of harmful content preceding the attack. Murtaza Shaikh, principal at the UK Office of Communications for illegal harms and hate and terrorism, highlighted the office’s work on the May 2022 attack in Buffalo, New York. He raised that these attacks result, in part, from majority populations framing themselves as under threat by minority populations, and then taking up arms against those minority populations.

Attendees then broke into groups to discuss regulatory solutions and highlight obstacles that may stand in the way of those solutions’ implementation or effectiveness. Key takeaways included the following:

  • Powerful voices need to be held to account. Politicians, influencers, and large platforms have played an outsized role in enabling the mainstreaming and broad reach of these worldviews.
  • Bad actors will accuse platforms and regulators of censorship, regardless of the extent to which content is moderated. As aforementioned, they’ll often position themselves as victims of oppression, and doing so in the context of content moderation policies is no different—even if the accusations are not rooted in reality.
  • Regulators must capitalize on existing expertise. Ahost of experts who monitor these actors, groups, and narratives across platforms, as well as their offline activities, can help regulators and platforms craft creative, adaptive, and effective policies to tackle the nebulous set of problems linked to militant accelerationism.

This conversation spurred some initial ideas that are geared toward generating more substantial discussion. Introducing those unfamiliar with understudied and misunderstood concepts, like militant accelerationism, is of the utmost importance to permit more effective combatting of online harms and their offline manifestations—especially those that have proven deadly.

Meghan Conroy is a US research fellow with the Atlantic Council’s Digital Forensic Research Lab.

The digital ecosystem’s impact on women’s political participation

By Abigail Wollam

The DFRLab and the National Democratic Institute (NDI) co-hosted a panel that brought together four global experts from civil society, government, and industry to discuss a shared and prevalent issue: The threat of digital violence and harassment that women face online, and the impact that it has on women’s participation in political life.

The panel was facilitated by Moira Whelan, director for democracy and technology at NDI; she opened the conversation by highlighting how critical these conversations are, outlining the threat to democracy posed by digital violence. She noted that as online harassment towards women becomes more prevalent, women are self-censoring and removing themselves from online spaces. “Targeted misogynistic abuse is designed to silence voices,” added panelist Julia Inman Grant, the eSafety commissioner of Australia.  

Both Neema Lugangira (chairperson for the African Parliamentary Network on Internet Governance and member of parliament in Tanzania) and Tracy Chou (founder and chief executive officer of Block Party) spoke about their experiences with online harassment and how those experiences spurred their actions in the space. Lugangira found, through her experience as a female politician in Tanzania, that the more outspoken or visible a woman is, the more abuse she gets. She observed that women might be less inspired to participate in political life because they see the abuse other women face—and the lack of defense or support these women get from other people. “I decided that since we’re a group that nobody speaks for… I’m going to speak for women in politics,” said Lugangira.

Chou said that she faced online harassment when she became an activist for diversity, equity, and inclusion in the tech community. She wanted to address the problem that she was facing herself and founded Block Party, a company that builds tools to combat online harassment.  

Despite these challenges, the panelists discussed potential solutions and ways forward. Australia is leading by example with its eSafety commissioner and Online Safety Act, which provide Australians with an avenue through which to report online abuses and receive assistance. Fernanda Martins, director of InternetLab, discussed the need to change how marginalized communities that face gendered abuse are seen and talked about; instead of talking about the community as a problem, it’s important to see them as part of the solution and bring them into the discussions.

Abigail Wollam is an assistant director at the Atlantic Council’s DFRLab

Read more

Transcript

Jun 8, 2023

The international community must protect women politicians from abuse online. Here’s how.

By Atlantic Council

At RightsCon, human-rights advocates and tech leaders who have faced harassment online detail their experiences—and ways the international community can support women moving forward.

Disinformation Resilience & Society

Day one wraps with recommendations for Africa’s digital transformation, Venezuela’s digital connectivity, and an inclusionary web

This year at RightsCon Costa Rica, the DFRLab previewed its forthcoming Task Force for a Trustworthy Future Web report and gathered human-rights defenders and tech leaders to talk about digital frameworks in Africa, disinformation in Latin America and Ukraine, and the impact online harassment has on women in political life, and what’s to come with the European Union’s Digital Services Act. 

Read more

Transcript

Jun 8, 2023

The European Commission’s Rita Wezenbeek on what comes next in implementing the Digital Services Act and Digital Markets Act

By Atlantic Council

At a DFRLab RightsCon event, Wezenbeek spoke about the need to get everyone involved in the implementation of the DSA and DMA.

Disinformation European Union

The programming kicked off on June 5 with the Digital Sherlocks training program in San José, which marked the first time the session was conducted in both English and Spanish. The workshop aimed to provide human-rights defenders with the tools and skills they need to build movements that are resilient to disinformation.  

On June 6, the programming opened with a meeting on centering human rights in the African Union’s Digital Transformation Strategy. The DFRLab gathered stakeholders from democracy, rights, and tech communities across the African continent to discuss the African Union’s Digital Transformation Strategy. Participants compared notes and identified opportunities for impact as the strategy approaches its mid-mandate review. 

Next, the DFRLab, Venezuela Inteligente, and Access Now hosted a session on strengthening Venezuela’s digital information ecosystem, a coalition-building meeting with twenty organizations. The discussion drew from a DFRLab analysis of Venezuela’s needs and capabilities related to the country’s media ecosystems and digital security, literacy, and connectivity. The speakers emphasized ways to serve vulnerable groups.

Following these discussions, the DFRLab participated a dialogue previewing findings from the Task Force for a Trustworthy Future Web. The DFRLab’s Task Force is convening a broad cross-section of industry, civil-society, and government leaders to set a clear and action-oriented agenda for future online ecosystems. As the Task Force wraps up its report, members discussed one of the group’s major findings: the importance of inclusionary design in product, policy, and regulatory development. To close out the first day of DFRLab programming at RightsCon Costa Rica, the task force notified the audience that it will be launching its report in the coming weeks. 

What does a trustworthy web look like?

By Jacqueline Malaret and Abigail Wollam

The DFRLab’s Task Force for a Trustworthy Future Web is charting a clear and action-oriented roadmap for future online ecosystems to protect users’ rights, support innovation, and center trust and safety principles. As the Task Force is wrapping up its report, members joined Task Force Director Kat Duffy to discuss one of the Task Force’s major findings—the importance of inclusionary design in product, policy, and regulatory development—on the first day of RightsCon Costa Rica.

In just eight weeks, Elon Musk took over Twitter, the cryptocurrency market crashed, ChatGPT launched, and major steps have been made in the development of augmented reality and virtual reality, fundamentally shifting the landscape of how we engage with technology. Framing the panel, Duffy highlighted how not only has technology changed at a breakneck pace, but the development and professionalization of the trust and safety industry have unfolded rapidly in tandem, bringing risks, harms, and opportunities to make the digital world safer for all.

Read more

Digital mouse cursor

Task Force for a Trustworthy Future Web

The Task Force for a Trustworthy Future Web will chart a clear and action-oriented roadmap for future online ecosystems to protect users’ rights, support innovation, and center trust and safety principles.

The three panelists—Agustina del Campo, director of the Center for Studies on Freedom of Expression; Nighat Dad, executive director of the Digital Rights Foundation; and Victoire Rio, a digital-rights advocate—agreed that the biggest risk, which could yield the greatest harm, is shaping industry practices through a Western-centric lens, without allowing space for the global majority. Excluding populations from the conversation around tech only solidifies the mistakes of the past and risks creating a knowledge gap. Additionally, the conversation touched on the risk of losing sight of the role of government, entrenching self-regulation as an industry norm, and absolving both companies and the state for harms that can occur because of the adoption of these technologies.

Where there is risk, there is also an opportunity to build safer and rights-respecting technologies. Panelists said that they found promise in the professionalization and organization of industry, which can create a space for dialogue and for civil society to engage and innovate in the field. They are also encouraged that more and more industry engagements are taking place within the structures of international law and universal human rights. The speakers were encouraged by new opportunities to shape regulation in a way that coalesces action around systemic and forward-looking solutions.

But how can industry, philanthropy, and civil society maximize these opportunities? There is an inherent need to support civil society that is already deeply engaged in this work and to help develop this field, particularly in the global majority. There is also a need to pursue research that can shift the narrative to incentivize investment in trust and safety teams and articulate a clear case for the existence of this work.

Jacqueline Malaret is an assistant director at the Atlantic Council’s DFRLab

Abigail Wollam is an assistant director at the Atlantic Council’s DFRLab

Mapping—and addressing—Venezuela’s information desert

By Iria Puyosa and Daniel Suárez Pérez

On June 6, the DFRLab, Venezuela Inteligente, and Access Now (which runs RightsCon) hosted a coalition-building meeting with twenty organizations that are currently working on strengthening Venezuela’s digital information ecosystem. The discussion was built on an analysis, conducted by the DFRLab, of the country’s media ecosystems and digital security, literacy, and connectivity; the speakers focused on ways to serve vulnerable groups such as grassroots activists, human-rights defenders, border populations, and populations in regions afflicted by irregular armed groups. 

The idea of developing a pilot project in an information desert combining four dimensions—connectivity, relevant information, security, and literacy—was discussed. Participants agreed that projects should combine technical solutions to increase access to connectivity and generate relevant information for communities, with a human-rights focus. In addition, projects should include a digital- and media-literacy component and continuous support for digital security.

Iria Puyosa is a senior research fellow at the Atlantic Council’s DFRLab

Daniel Suárez Pérez is a research associate for Latin America at the Atlantic Council’s DFRLab

Where open-source intelligence meets human-rights advocacy

By Ana Arriagada

On June 5, the DFRLab hosted a Digital Sherlocks workshop on strengthening human-rights advocacy through open-source intelligence (OSINT) and countering disinformation.

I co-led the workshop with DFRLab Associate Researchers Jean le Roux, Daniel Suárez Pérez, and Esteban Ponce de León.

In the session, attendees discussed the worrying rise of antidemocratic governments in Latin America—such as in Nicaragua and Guatemala—who are  using open-source tools for digital surveillance and are criminalizing the work of journalists and human-rights defenders. When faced with these challenges, it becomes imperative for civil-society organizations to acquire and use investigative skills to produce well-documented reports and investigations. 

During the workshop, DFRLab researchers shared their experiences investigating paid campaigns that spread disinformation or promote violence or online harassment. They recounted having used an array of tools to analyze the origin and behavior of these paid advertisements. 

DFRLab researchers also discussed tools that helped them detect suspicious activity on platforms such as YouTube, where, for example, some gamer channels spread videos related to disinformation campaigns or political violence. The workshop attendees also discussed how policy changes at Twitter have made the platform increasingly challenging to investigate, but they added that open-source researchers are still investigating, thanks to the help of available tools and the researchers’ creative methodologies. 

The workshop also showcased the DFRLab’s work with the Action Coalition on Meaningful Transparency (ACT). Attendees received a preview of ACT’s upcoming portal launch, for which the DFRLab has been offering guidance. The new resource will offer access to a repository of transparency reporting, policy documents, and analysis from companies, governments, and civil society. It will also include a registry of relevant actors and initiatives, and it will allow users to establish links between entries to see the connections between organizations, the initiatives they are involved in, and the reports they have published. 

The workshop ended with the DFRLab explaining that social network analysis— the study of social relationships and structures using graph theory—is important because it allows for investigating suspicious activity or unnatural behavior exhibited by users on social media platforms. 

Ana Arriagada is an assistant director for Latin America at the Atlantic Council’s DFRLab

The post Activists and experts assemble in Costa Rica to protect human rights in the digital age appeared first on Atlantic Council.

]]>
Ukraine’s Diia platform sets the global gold standard for e-government https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-diia-platform-sets-the-global-gold-standard-for-e-government/ Wed, 31 May 2023 01:30:31 +0000 https://www.atlanticcouncil.org/?p=650569 Ukraine's Diia app is widely seen as the world's first next-generation e-government platform, and is credited with implementing what many see as a more human-centric government service model, writes Anatoly Motkin.

The post Ukraine’s Diia platform sets the global gold standard for e-government appeared first on Atlantic Council.

]]>
Several thousand people gathered at the Warner Theater in Washington DC on May 23 for a special event dedicated to Ukraine’s award-winning e-governance platform Diia. “Ukrainians are not only fighting. For four years behind the scenes, they have been creating the future of democracy,” USAID Administrator Samantha Power commented at the event.

According to Power, users of Diia can digitally access the kinds of state services that US citizens can only dream of, including crossing the border using a smartphone application as a legal ID, obtaining a building permit, and starting a new business. The platform also reduces the potential for corruption by removing redundant bureaucracy, and helps the Ukrainian government respond to crises such as the Covid pandemic and the Russian invasion.

Since February 2022, the Diia platform has played a particularly important part in Ukraine’s response to Russia’s full-scale invasion. According to Ukraine’s Minister of Digital Transformation Mykhailo Fedorov, in the first days of the invasion the platform made it possible to provide evacuation documents along with the ability to report property damage. Other features have since been added. The e-enemy function allows any resident of Ukraine to report the location and movement of Russian troops. Radio and TV functions help to inform people who find themselves cut off from traditional media in areas where broadcasting infrastructure has been damaged or destroyed.

Today, the Diia ecosystem offers the world’s first digital passport and access to 14 other digital documents along with 25 public services. It is used by more than half the Ukrainian adult population. In addition to consumer-oriented functions, the system collects information for the national statistical office and serves as a digital platform for officials. Diia is widely seen as the world’s first next-generation e-government platform, and is credited with implementing what many see as a more human-centric government service model.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

In today’s increasingly digital environment, governments may find that they have a lot of siloed systems in place, with each system based on its own separate data, infrastructure, and even principles. As a result, people typically suffer from additional bureaucracy and need to deal repeatedly with different official organizations. Most e-government initiatives are characterized by the same problems worldwide, such as technical disparity of state systems, inappropriate data security and data protection systems, absence of unified interoperability, and inefficient interaction between different elements. Ukraine is pioneering efforts to identify more human-centric solutions to these common problems.

One of the main challenges on the path to building sustainable e-government is to combine user friendliness with a high level of cyber security. If we look at the corresponding indices such as the Online Services Index and Baseline Cyber Security Index, we see that only a handful of European countries have so far managed to achieve the right balance: Estonia, Denmark, France, Spain, and Lithuania. Beyond Europe, only Singapore and Malaysia currently meet the necessary standards.

Ukraine has a strong record in terms of security. Since the onset of the Russian invasion, the Diia system has repeatedly been attacked by Russian cyber forces and has been able to successfully resist these attacks. This is an indication that the Ukrainian platform has the necessary reserve of cyber security along with a robust and secure digital public infrastructure.

The success of the IT industry in Ukraine over the past decade has already changed international perceptions of the country. Instead of being primarily seen as an exporter of metals and agricultural products, Ukraine is now increasingly viewed as a trusted provider of tech solutions. The Ministry of Digital Transformation is now working to make Diia the global role model for human-centric GovTech. According to Samantha Power, the Ukrainian authorities are interested in sharing their experience with the international community so that others can build digital infrastructure for their citizens based on the same human-centric principles.

USAID has announced a special program to support countries that, inspired by Diia, will develop their own e-government systems on its basis. This initiative will be launched initially in Colombia, Kosovo, and Zambia. Ukraine’s Diia system could soon be serving as a model throughout the transitional world.

As they develop their own e-government systems based on Ukraine’s experience and innovations, participating governments should be able to significantly reduce corruption tied to bureaucratic obstacles. By deploying local versions of Diia, transitional countries will also develop a large number of their own high-level IT specialists with expertise in e-government. This is an important initiative that other global development agencies may also see value in supporting.

Anatoly Motkin is president of the StrategEast Center for a New Economy, a non-profit organization with offices in the United States, Ukraine, Georgia, Kazakhstan, and Kyrgyzstan.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s Diia platform sets the global gold standard for e-government appeared first on Atlantic Council.

]]>
Russian War Report: Belgorod incursion brings deluge of online mockery of Russia’s defenses https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-trolls-belgorod/ Thu, 25 May 2023 19:09:42 +0000 https://www.atlanticcouncil.org/?p=649635 After an anti-Putin Russian volunteer military unit attacked Belgorod, trolls and bloggers online viciously ridiculed Russian defenses.

The post Russian War Report: Belgorod incursion brings deluge of online mockery of Russia’s defenses appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Tracking narratives

Belgorod raid sparks trolling activity on social media

Russian pro-war military bloggers criticize the handling of Belgorod incursion

Russian media spins Australian solidarity rally for Julian Assange as an anti-NATO event

International response

US sanctions Armenian company for helping Russia evade sanctions

Belgorod raid sparks trolling activity on social media

Drone imagery from a burning border control outpost in the Russian region of Belgorod sparked a frenzy on social media this week. According to Riga-based Russian news outlet Meduza, members of the Russian Volunteer Corps and other Russian nationals crossed from Ukraine into Belgorod Oblast and attacked a border outpost in Grayvoron. The Russian Volunteer Corps, an anti-Putin military unit made of Russian pro-Ukrainian partisans, claimed responsibility for the attack; the Free Russia Legion also claimed responsibility.

An assessment by Russian news outlet RBC regarding the broader situation in Belgorod indicated an armed incursion, with shelling and artillery fire reported. On the evening of May 22, Russian government declared a state of counterterrorist emergency in Belgorod Oblast. Although the governor of the oblast did not officially issue an order to evacuate the civilian population immediately, footage and photographs posted on social media indicated that at least some residents evacuated to other areas in the region. Meduza also reported several drone strikes on the city of Belgorod itself.

Conflicting reports emerged on May 23 after Russian officials lifted the counterterrorist alert. While the Russian Ministry of Defense claimed to have “liquidated” around seventy “saboteurs,” reporting from the news outlet Mash indicated the deployment of additional Russian law enforcement in nearby Bryansk Oblast. In an effort to support their assertions of having eliminated the insurgency, Russian news outlets also released photos of military-class vehicles allegedly used by the insurgents stuck in the mud; some open-source analysts, however, questioned the authenticity of the photos. Russian media chased these reports with claims of destroyed Ukrainian tanks, while the Russian Volunteer Corps posted footage to Telegram seemingly showing intact military equipment.

Shortly after the news broke out, footage of a drone attack on the local Russian border outpost, APP Grayvoron, appeared on the outpost’s Google Maps profile, though it was later deleted. At the time of writing, it had been replaced with footage showing a convoy of vehicles, one flying the flag of the Russian Volunteer Corps.

The Google Maps profile for a Russian border outpost in Belgorod featured a video of a mechanized convoy flying the flag of the Russian Volunteer Corps. (Source: Google Maps/archive)
The Google Maps profile for a Russian border outpost in Belgorod featured a video of a mechanized convoy flying the flag of the Russian Volunteer Corps. (Source: Google Maps/archive)

Simultaneously, trolling reviews appeared on the border outpost’s Google Maps profile, calling the border guards “friendly” and the facilities “understaffed.” These too have been deleted, though not before they were documented by the Saint Javelin Twitter account and other Twitter users.

Trolls post mocking reviews of Russia’s Belgorod border post. (Source: @SaintJavelin/archive)
Trolls post mocking reviews of Russia’s Belgorod border post. (Source: @SaintJavelin/archive)

Other trolls took to Twitter, where members of the NAFO meme movement, a pro-NATO and pro-Ukrainian community on the platform, renamed their account to “Government of The Bilhorod’s Peoples Republic” as a joking reference to the self-proclaimed Donetsk and Luhansk Peoples Republics. “Bilhorod” is the Ukrainian name for Belgorod.

NAFO meme account @nitro19820 changes its Twitter name and bio to joke that it now represented a new “People’s Republic” in Belgorod. (Source: @nitro19820/archive)
NAFO meme account @nitro19820 changes its Twitter name and bio to joke that it now represented a new “People’s Republic” in Belgorod. (Source: @nitro19820/archive)

Valentin Châtelet, research associate, Security, Brussels, Belgium

Russian pro-war military bloggers criticize the handling of Belgorod incursion

Following the apparent border incursion into Belgorod Oblast and subsequent attacks on the region, pro-war military bloggers condemned Moscow’s handling of the war in Ukraine, including its border defenses.

Telegram channel Vоенкор Котенок Z (“Milblogger Kitten Z”) criticized the Kremlin for being late in declaring a counterterrorism operation in Belgorod and not knowing how to fight “for real.” “There is a war, and in Russia … they are afraid to call the war a war,” stated the Telegram post.

The channel ДШРГ Русич (“DShRG Rusich”) questioned “commanders of all levels” on how the incursion happened. It also blamed Russia’s intelligence services for failing to reveal “plans of an enemy.” The channel added that as long as there is no photographic evidence of corpses or burned equipment, “the enemy has no losses, and the [Russian] propagandists crapped themselves a little, saying that everything is fine.”

The Kotsnews Telegram channel addressed pro-Kremlin pundits who dismissed military blogger concerns as “hysteria” by insisting that the threat to Russian territory is real and that there are uncomfortable questions around Russia’s defensive capabilities that nobody wants to ask. “What is happening with our technical equipment at the border, surveillance systems, tracking, motion detection?” the channel asked. “What about the mining of potentially dangerous areas? What about anti-tank weapons? Why did the enemy armored group calmly penetrate deep into our territory?”

As Russia’s war against Ukraine has dragged on, the frequency and intensity of pro-war military bloggers’ criticism have increased and become bolder. The DFRLab has previously covered how Russian military bloggers criticized Russian President Vladimir Putin and the Ministry of Defense.

Eto Buziashvili, research associate, Tbilisi, Georgia

Russian media spins Australian solidarity rally for Julian Assange as an anti-NATO event

On May 20, a series of so-called “World Wide Freedom Rallies” took place in many cities around the world. The Telegram account for Simeon Boikov, a pro-Kremlin activist and blogger in Australia, claimed to have organized the Sydney edition of the rally, part of a decentralized movement that originated in 2021 to express dissatisfaction with COVID security measures. Boikov promoted a poster for the event on April 6, a day before the event announcement on the movement’s official Telegram channel. 

The rally ostensibly focused on demanding the release of WikiLeaks founder Julian Assange, who is currently being held in London facing potential extradition to the United States. After the event, however, Boikov highlighted a speech by Assange’s father, John Shipton, in a video showing scenes from the rally and emphasized that Shipton was wearing a “double headed eagle and St George’s ribbons,” both of which are Russian symbols. Additional videos and images from the rally showed many people carrying Russian flags and wearing pro-Kremlin symbols. 

Kremlin-controlled media outlets emphasized in their headlines not just the pro-Russia nature of the event, but also claims of anti-NATO sentiment, which appear to have been exaggerated. Reviewing footage from the event, the DFRLab identified only one instance of someone sporting anti-NATO messaging. Nonetheless, Russian media embraced the event as specifically anti-NATO, including state outlets Gazeta.ru, TASS, RIA Novosti, and Komsomolyskaya Pravda, and pro-Kremlin media such as News Front, Inforeactor, Ekonomika Segodnya. Additionally, The Eastern Herald, an Indian media outlet, and Belarus state-controlled television both framed the event as anti-NATO in their English-language publications.

Nika Aleksejeva, resident fellow, Riga, Latvia

US sanctions Armenian company for helping Russia evade sanctions

On May 22, the US Department of Commerce announced that it had amended its list of sanctioned entities and individuals by adding seventy-one entities that the US government had determined to be acting “contrary to [US] national security or foreign policy interests.” Alongside Russian companies, one Kyrgyz company, Tro.Ya LLC, and one Armenian company, Medisar LLC, were included in the amended list. According to the Department of Commerce, both companies engaged in conduct that “prevented the successful accomplishment of an end-use check.” In other words, the Department of Commerce suspected that the final destination for the products was Russia but the companies themselves had obfuscated this information.

Medisar LLC, which was registered in Armenia in 2001, is an importer of chemicals and laboratory equipment. The company is one of the thousand largest taxpayers in Armenia, paying about one million dollars in taxes in 2022. It also has a longstanding trade history with Russian companies. On its website, Medisar indicates that one of its trading partners, dating back to 2011, is Russian company Minimed.

Screenshot from the Organized Crime and Corruption Reporting Project’s (OCCRP) Aleph database, made available through Friends of OCCRP access, about Medisar’s trade. The third and fourth companies on the list are both OOO Minimed, a Russian company with a long-term trading relationship with Medisar. (Source: DFRLab via OCCRP)

On May 20, Armenian investigative website Hetq reported that data obtained from the country’s customs service showed that in 2022, Medisar exported equipment from Armenia to Russia, including electronic integrated circuits, diodes, transistors, and similar semiconductor devices.

A company executive who did not want to be identified acknowledged to RFE/RL that Medisar imported chemicals and laboratory equipment from the United States and the European Union and re-exported them to Russia.

Medisar is the second-largest company registered in Armenia to be sanctioned by the United States. The US Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned the other firm, TAKO, in April. The company is in the wholesale of electronic and telecommunications equipment and parts. TAKO, spelled TACO in Armenia’s legal entities register, was registered in May 2022 in Armenia and is fully owned by a Russian citizen, according to public registry records.

On April 18, the New York Times reported that in 2022, Armenia imported 515 percent more chips and processors from the United States and 212 percent more from the European Union than in 2021, and that Armenia exported 97 percent of those same products to Russia.

During a May 22 press conference, Armenian Prime Minister Nikol Pashinyan said that despite Armenia’s “strategic” relationship with Russia and membership in the Russian-led Eurasian Economic Union, the country “cannot afford to come under Western sanctions.” Pashinyan underscored that if Armenia faced sanctions, “it wouldn’t be good for any of our allies, while we would ruin our relations with our Western partners.”

A joint “compliance note” issued on March 2 by the US Departments of the Treasury, Justice, and Commerce, titled “Cracking Down on Third-Party Intermediaries Used to Evade Russia-Related Sanctions and Export Controls,” mentioned Armenia, along with China, Turkey, and Uzbekistan, as “transshipment points commonly used to illegally redirect restricted items to Russia or Belarus.”

According to the Statistical Committee of the Republic of Armenia, Russian-Armenian trade soared in 2022, including exports to Russia, which nearly tripled to $2.4 billion.

Ani Mejlumyan, research assistant, Yerevan, Armenia

The post Russian War Report: Belgorod incursion brings deluge of online mockery of Russia’s defenses appeared first on Atlantic Council.

]]>
Russian War Report: Russia cancels Victory Day parades and moves “Immortal Regiment” marches online https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russia-cancels-victory-day-parades-and-moves-immortal-regiment-marches-online/ Fri, 21 Apr 2023 18:33:06 +0000 https://www.atlanticcouncil.org/?p=639045 Russia continues ramping up its attacks in eastern Ukraine while canceling its Victory Day parade in areas bordering Russian-annexed Ukrainian territory.

The post Russian War Report: Russia cancels Victory Day parades and moves “Immortal Regiment” marches online appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Russia escalates Avdiivka, Marinka front lines; Belgorod accidentally bombed by a Russian jet

Russia’s Bashkir battalions form a new motor rifle regiment as more are sent to Ukraine to replenish Russian forces

Russian mobilized soldiers report signs of coercion to join Wagner in support of Bakhmut offensive

Russia cancels Victory Day parades and moves “Immortal Regiment” marches online

Tracking narratives

Pro-Kremlin experts use false story to claim military upper hand over Ukraine and NATO

Documenting dissent

Wagner members claim killing of Ukrainian civilians

International response

US investigates ex-Navy officer allegedly behind notorious pro-Russia social media accounts

Russia escalates Avdiivka, Marinka front lines; Belgorod accidentally bombed by a Russian jet

The offensive actions of the Russian army in Eastern Ukraine continue, as well as the defensive efforts of the Ukrainian forces. In recent days, there has been an escalation of attacks on Ukrainian positions in the direction of Marinka, Avdiivka, and Bakhmut. 

On April 17, the General Staff of the Armed Forces of Ukraine reported that more than seventy attacks by the Russian army were repulsed during the day. The most difficult areas to defend remain Bakhmut and Marinka. Offensive actions were registered in the direction of Avdiivka, with separate attacks carried out in the Kupiansk and Lyman areas. The Russian forces continued the assaults on Bakhmut and Marinka on April 18 and April 19 on par with offensive operations in the Avdiivka area, where Ukrainian forces repulsed attacks in the areas of six settlements. Between April 18-19, the Ukrainian army recorded more than sixty Russian attacks.

According to British intelligence’s April 18 assessment, even though heavy fighting continued in the directions of Avdiivka and Marinka, the Russian command still gave priority to the Bakhmut front. The front line there has become relatively stable, running along the railway line, as Ukraine’s soldiers are effectively resisting attempts by Russia to encircle the town. The question of sending reinforcements to Bakhmut is acute for both sides, since the Ukrainian command wants to attract as many units as possible for a future offensive, while the Russian army wants to form an operational reserve. On April 20, Russian forces reportedly attempted to advance near Kreminna and Serebryanske Forest, as well as Khromove, Vodyane, Pervomaiske, Pobieda, and Vuhledar. 

On the night of April 20, the Russian army attacked the south and east of Ukraine with Shahed attack drones. Ten out of eleven drones were shot down, the Ukrainian East Air Command reported. Sirens for Russian attacks were reported in Chernihiv, Cherkasy, Kyiv, Odessa, Rivne, Sumy, Poltava, and other regions of Ukraine.    

Meanwhile, Telegram users reported an explosion in Belgorod, Russia, near the Ukraine border, on the night of April 20-21. Images shared online show an explosion crater near a residential area of the city. There were reports moments before the explosion of Russian bombers launching a guided bomb in the direction of Kharkiv. At first, it was unclear whether the explosion was the result of a failed Russian attack that hit Belgorod instead of Kharkiv, or whether it was a drone attack from the Ukrainian side. Later, a Russian Ministry of Defense statement that was re-shared by Ukrainian sources said, “On the evening of April 20, during the flight of a Su-34 aircraft over the city of Belgorod, an abnormal derailment of aviation ammunition occurred.” The explosion was apparently large and caused material damage.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russia’s Bashkir battalions form a new motor rifle regiment as more are sent to Ukraine to replenish Russian forces

Radiy Khabirov, head of the Republic of Bashkortostan, announced on April 10 that the republic’s volunteer formations would undergo reformation as part of the creation of a new motor rifle regiment. Like many ethnic regions of Russia, the Republic of Bashkorstostan has been subjected to targeted military recruitment. These volunteers, alongside contract soldiers and mobilized military personnel of the Russian reserve, are constantly sent to Ukraine to replenish the regular Russian forces.

According to the federal media outlet FedPress, the idea was suggested by the commanders of the two national battalions, “Northern Amurs” and “Dayan Murzin,” created in Bashkortostan at the beginning of March. The newest regiment would comprise several motor rifle divisions and an artillery division, totaling between 900 to 1,500 men. Moreover, Bashkortostan has recently been pushing for more servicemen to be deployed to Ukraine. During an April 12 ceremony in the regional capital city of Ufa, Bashkirs celebrated the creation of yet another volunteer formation before it was deployed to Ukraine. The new volunteer formation, “Vatan,” Bashkir for “Fatherland,” was created at the beginning of 2023; estimates indicate it could comprise around 720 men. This would bring the number of volunteer formations in the republic to six, including four volunteer formations named after war heroes and local figures, and two volunteer battalions like “Vatan” and “Northern Amurs.” 

As the Russian State Duma recently approved a new e-drafting bill and is planning to conduct testing in Moscow and Saint Petersburg during its annual spring conscription, replenishment of military forces has become a top priority for the Kremlin. The DFRLab previously reported on regional ad campaigns targeting national minorities, including the Udmurt population. A new Bashkortostan-hosted recruitment website called BashBat  – short for “Bashkir Battalion” – launched on April 17. The domain’s WHOIS record directly points to the Bashkir Ministry for Digital Transformation. Like the Udmurt portal Delomuzhchin.rf (деломужчин.рф), BashBat was advertised in the press using the local Udmurt language, as well as on the Russian federal resource portal for recruitment, Ob’yesnyayem, in both Russian and Bashkir.

Valentin Châtelet, Research Associate, Security, Brussels, Belgium

Russian mobilized soldiers report signs of coercion to join Wagner in support of Bakhmut offensive

An April 14 article posted by independent Russian-language media outlet Astra reported that hundreds of Russian mobilized soldiers had re-enlisted with Wagner Group. News outlets inside Russia described the situation as “volunteer enrolment.” However, information posted by Twitter user @Tatarigami_UA and subsequent reporting indicate that these episodes might have occurred forcibly. The report by Astra pointed at a video where a mobilized soldier declared that Wagner had been training mobilized personnel. Satellite imagery released by that same account points at a military training facility in Kursk, where instructors are reportedly “experienced Wagner soldiers.”

Later reports indicated one hundred soldiers disappeared after being sent into Ukraine’s Luhansk Oblast and refusing to sign Wagner contracts. Astra’s leaked texts indicate the soldiers were forced to give up their phones and threatened by thirty Wagner representatives with rifles at the Stakhanov railway station. Other signs of coercion were brought to the attention of the Russian MoD after six mobilized soldiers from Yakutia informed their families they had been forcibly recruited by another PMC. In an April 19 post, Wagner Group financier Yevgeny Prigozhin denied these accusations. 

Although user @Tatarigami_UA reports that the instructors are said to be part of a PMC called Volk (“Wolf”), the DFRLab could not confirm this. However, job ads analyzed in a previous DFRLab report mentioned instructors as “participants of the special military operation.” In their accusations of coerced re-enlistment, mobilized soldiers from the Sakha Republic also pointed to yet another subsidiary of the Wagner Group, called PMC Veteran.

Valentin Châtelet, Research Associate, Security, Brussels, Belgium

Russia cancels Victory Day parades and moves “Immortal Regiment” marches online

Russia’s Ministry of Defense (MoD) canceled May 9 Victory Day parades in annexed Ukrainian territory and adjacent Russian territory because of security concerns. “Immortal Regiment” marches were moved from their usual offline space to online. Previously, Victory Day celebrations and parades have traditionally been a significant event in Russia. 

Citing the Russia-installed head of annexed Sevastopol city Mikhail Razvozhaev, TASS reported on April 20 that it was the MoD’s decision to cancel the parade. Earlier, on April 12, Russia-installed head of Crimea Sergey Aksenov stated that parades were cancelled across annexed Crimea “due to security concerns.” Victory Day parades were also canceled in Ukraine-neighboring Russian regions of Kursk and Belgorod. In Krasnodar Krai the parade will only be held in the city of Novorossiysk. According to the governor of the Belgorod region, such a measure was necessary in order “not to provoke the enemy with a large accumulation of equipment and military personnel.”

UkraineAlert has named equipment shortages as one of the possible reasons behind the Kremlin’s decision to cancel parades. According to the report, “[N]umerous commentators have speculated that Moscow is increasingly short of tanks and is understandably eager to avoid highlighting the scale of the losses suffered by the Russian army in Ukraine.”

Similarly there will be no traditional organized march of the “Immortal Regiment” this year. The organizers have moved the march online, which previously happened twice during COVID pandemic years in 2020 and 2021. They told RBC that Russian regions will be posting “portraits of heroes” in interactive online formats. 

Citing Russian Defense Minister Sergei Shoigu, Meduza reported that military parades are planned to be held in twenty-eight Russian cities, including Moscow, where “more than 10,000 military personnel are planned to participate,” with enhanced security measures.

Eto Buziashvili, Research Associate, Tbilisi, Georgia

Pro-Kremlin experts use false story to claim military upper hand over Ukraine and NATO

Pro-Kremlin media continue to amplify a false story about the Russian army allegedly destroying a bunker in Lviv occupied by NATO officers with a Kinzhal supersonic missile. Snopes, the US fact-checking outlet, debunked the story as early as April 3, labeling it as “a lazy piece of obvious propaganda.” Russia previously attacked Ukraine with Kinzhal missiles on March 9 and hit two residential building in Lviv, according to Ukrainian fact-checking outlet StopFake, which debunked the story on April 19. There is no evidence of any underground NATO command center in Lviv. Both fact-checking outlets argued that it did not make sense to have such command center in Lviv, which around one hundred kilometers from Poland, a NATO member state. 

The first mention of the rumor was a March 1 report published by “Cossack Colonel Yuri Kominyenko” on the fringe website Cairns News. According to Snopes, the Greek outlet Pronews made the claim “regain virality” starting on March 12. From April 14 to April 18 pro-Kremlin media outlets resurfaced the story by citing pro-Kremlin experts who voiced contradicting numbers of NATO’s alleged casualties.  For instance, TopNews and Sibnet.ru cited Nikolay Sorokin, a pro-Kremlin political expert saying that “Kinzhal destroyed 300 officers from NATO countries.” 

Ekonomika Segodnya, ZOV Kherson, Lenta.ru, and Tsargrad cited Viktor Baranets, an author on Komsomolyskaya Pravda, who asserted, “Kinzhal destroyed secret bunker with 200 NATO and Ukrainian Armed Forces’ officers.” Baranets also claimed with no evidence that the US embassy called the representatives of Ukrainian Ministry of Defense and Armed Forces to “reprimand” them for “poor control center security” and that “capitals of NATO countries are silent about the incident because they are ashamed to admit this biting slap from Moscow.” 

Pravda.ru and RG.ru cited Anatoly Matveychuk, a military expert who declared, “Kinzhal destroyed 160 NATO and Ukrainian Armed Forces’ officers in Ukrainian bunker in Lviv.” Matveychuk reportedly suggested this led to Ukraine to cancel its plans for a spring counteroffensive. 

Nika Aleksejeva, Resident Fellow, Riga, Latvia

Wagner members claim killing of Ukrainian civilians

On April 17, a Russian human rights project released testimonies of two Russian former prisoners, Azamat Uldarov and Alexei Savichev, who allegedly fought in Ukraine within the ranks of Wagner Group. In a conversation with Gulagu.net, Savichev and Uldarov reported the killing of Ukrainian civilians, including children, allegedly on personal orders from Wagner founder Yevgeny Prigozhin. The Ukrainian Prosecutor General’s Office launched an investigation into Uldarov and Savichev’s confessions.

Savichev argued that Wagner mercenaries in Bakhmut received an order to kill everyone over fifteen years old; he admitted killing at least ten teenagers and more than twenty unarmed Ukrainians in February 2023. In addition, Savichev claimed that he personally witnessed the killing of about seventy Russian former prisoners who served in Wagner and refused to comply with orders. He also asserted that he blew up a pit full of bodies of dead and wounded citizens of Russia and Ukraine then subsequently set fire to the remnants of dead people to hide traces of the crime. Uldarov, meanwhile, said that he killed minors in Bakhmut and Soledar and admitted that one of his victims was a girl who was “five or six” years old. 

Gulagu.net also published documents allegedly proving that Azamat Uldarov and Alexei Savichev were previously pardoned by presidential decree in September 2022 then sent to the front line in Ukraine. The founder of the Gulagu.net project, Vladimir Osechkin, argued that both of them are currently located on the territory of Russia and that they gave their testimony voluntarily. 

Following the publication of these claims, Yevgeny Prigozhin publicly addressed Alexei Savichev on April 28 and stated that he had been searching for him over the previous twenty-four hours. Prigozhin demanded that Savichev contact Wagner and explain “why he spoke falsehoods, who was behind it, how he was blackmailed.” Prigozhin promised that Savichev will be “left alive and unharmed” if he is willing to explain in person what took place. The events discussed by the ex-prisoners have not been verified independently. 

Givi Gigitashvili, Research Associate, Warsaw, Poland

The Wall Street Journal identified the individual allegedly behind the pro-Russian social media persona “Donbas Devushka” as Sarah Bils, a thirty-seven-year-old US Navy veteran from New Jersey who served as an aviation electronics technician at Whitby Island in Washington state. The US Department of Justice is currently investigating her for allegedly disseminating leaked classified documents. 

Donbas Devushka allegedly presented herself to her followers as a Russian Jew from occupied Luhansk. Their Twitter and Telegram accounts largely grew after Russia invaded Ukraine in February of last year. The accounts continuously spread Kremlin propaganda, with their Telegram channel amplifying graphic content of possible war crimes by Wagner Group.

According a Bellingcat investigation, Donbas Devushka’s Telegram account was found to be the first to have shared leaked intelligence currently under investigation by the Justice Department and Pentagon. According to the Wall Street Journal, Bils played a key role in spreading the leaked documents, though she has denied these claims. Bils admitted she was the administrator of Donbas Devushka, however; she also said that there were fourteen other people involved in running the network but refused to name them.

Bils also ran a tropical fish business, which in part led to her discovery. During her stint in the US Navy, Bils imported tropical fish from Poland. According to Malcontent News, she appeared in a video from the Aquarium Co-op podcast; Malcontent and the pro-Ukrainian group North Atlantic Fella Organization (NAFO) then matched her voice and home décor with footage from the Donbas Devushka account. 

Ani Mejlumyan, Research Assistant, Armenia 

The post Russian War Report: Russia cancels Victory Day parades and moves “Immortal Regiment” marches online appeared first on Atlantic Council.

]]>
Russia’s invasion of Ukraine is also being fought in cyberspace https://www.atlanticcouncil.org/blogs/ukrainealert/russias-invasion-of-ukraine-is-also-being-fought-in-cyberspace/ Thu, 20 Apr 2023 16:30:09 +0000 https://www.atlanticcouncil.org/?p=638524 While the war in Ukraine often resembles the trench warfare of the twentieth century, the battle for cyber dominance is highly innovative and offers insights into the future of international aggression, writes Vera Mironova.

The post Russia’s invasion of Ukraine is also being fought in cyberspace appeared first on Atlantic Council.

]]>
The Russian invasion of Ukraine is the first modern war to feature a major cyber warfare component. While the conventional fighting in Ukraine often resembles the trench warfare of the early twentieth century, the evolving battle for cyber dominance is highly innovative and offers important insights into the future of international aggression.

The priority for Ukraine’s cyber forces is defense. This is something they have long been training for and are excelling at. Indeed, Estonian PM Kaja Kallas recently published an article in The Economist claiming that Ukraine is “giving the free world a masterclass on cyber defense.”

When Russian aggression against Ukraine began in 2014 with the invasion of Crimea and eastern Ukraine’s Donbas region, Russia also began launching cyber attacks. One of the first attacks was an attempt to falsify the results of Ukraine’s spring 2014 presidential election. The following year, an attempt was made to hack into Ukraine’s electricity grid. In 2017, Russia launched a far larger malware attack against Ukraine known as NotPetya that Western governments rated as the most destructive cyber attack ever conducted.

In preparation for the full-scale invasion of 2022, Russia sought to access Ukraine’s government IT platforms. One of the goals was to obtain the personal information of Ukrainians, particularly those working in military and law enforcement. These efforts, which peaked in January 2022 in the weeks prior to the invasion, failed to seriously disrupt Ukraine’s state institutions but provided the country’s cyber security specialists with further important experience. “With their nonstop attacks, Russia has effectively been training us since 2014. So by February 2022, we were ready and knew everything about their capabilities,” commented one Ukrainian cyber security specialist involved in defending critical infrastructure who was speaking anonymously as they were not authorized to discuss details.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Ukrainian specialists say that while Russian hackers previously tried to disguise their origins, many now no longer even attempt to hide their IP addresses. Instead, attacks have become far larger in scale and more indiscriminate in nature, with the apparent goal of seeking to infiltrate as many systems as possible. However, the defenders of Ukraine’s cyberspace claim Russia’s reliance on the same malware and tactics makes it easier to detect them.

The growing importance of digital technologies within the Ukrainian military has presented Russia with a expanding range of high-value targets. However, efforts to access platforms like Ukraine’s Delta situational awareness system have so far proved unsuccessful. Speaking off the record, Ukrainian specialists charged with protecting Delta say Russian hackers have used a variety of different methods. “They tried phishing attacks, but this only resulted in our colleagues having to work two extra hours to block them. They have also created fake interfaces to gain passwords and login details.”

Ukrainian security measures that immediately detect and block unauthorized users requesting information have proved effective for the Delta system and similar platforms. Russian hackers have had more success targeting the messaging platforms and situation reports of various individual Ukrainian military units. However, due to the fast-changing nature of the situation along the front lines, this information tends to become outdated very quickly and therefore is not regarded as a major security threat.

Ukraine’s cyber efforts are not exclusively focused on defending the country against Russian attack. Ukrainians have also been conducting counterattacks of their own against Russian targets. One of the challenges they have encountered is the comparatively low level of digitalization in modern Russian society compared to Ukraine. “We could hack into Russia’s railway IT systems, for example, but what information would this give us? We would be able to access train timetables and that’s all. Everything else is still done with paper and pens,” notes one Ukrainian hacker.

This has limited the scope of Ukrainian cyber attacks. Targets have included the financial data of Russian military personnel via Russian banks, while hackers have penetrated cartographic and geographic information systems that serve as important infrastructure elements of the Ukraine invasion. Ukrainian cyber attacks have also played a role in psychological warfare efforts, with Russian television and radio broadcasts hacked and replaced with content revealing suppressed details of the invasion including Russian military casualties and war crimes against Ukrainian civilians.

While Ukraine’s partners throughout the democratic world have provided the country with significant military aid, the international community has also played a role on the cyber front. Many individual foreign volunteers have joined the IT Army of Ukraine initiative, which counts more than 200,000 participants. Foreign hacker groups are credited with conducting a number of offensive operations against Russian targets. However, the large number of people involved also poses significant security challenges. Some critics argue that the practice of making Russian targets public globally provides advance warning and undermines the effectiveness of cyber attacks.

Russia has attempted to replicate Ukraine’s IT Army initiative with what they have called the Cyber Army of Russia, but this is believed to have attracted fewer international recruits. Nevertheless, Russia’s volunteer cyber force is thought to have been behind a number of attacks on diverse targets including Ukrainian government platforms and sites representing the country’s sexual minorities and cultural institutions.

The cyber front of the Russo-Ukrainian War is highly dynamic and continues to evolve. With a combination of state and non-state actors, it is a vast and complex battlefield full of gray zones and new frontiers. Both combatant countries have powerful domestic IT industries and strong reputations as hacker hubs, making the cyber front a particularly fascinating aspect of the wider war. The lessons learned are already informing our knowledge of cyber warfare and are likely to remain a key subject of study in the coming decades for anyone interested in cyber security.

Vera Mironova is an associate fellow at Harvard University’s Davis Center and author of Conflict Field Notes. You can follow her on Twitter at @vera_mironov.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Russia’s invasion of Ukraine is also being fought in cyberspace appeared first on Atlantic Council.

]]>
Human wave tactics are demoralizing the Russian army in Ukraine https://www.atlanticcouncil.org/blogs/ukrainealert/human-wave-tactics-are-demoralizing-the-russian-army-in-ukraine/ Sat, 08 Apr 2023 20:41:38 +0000 https://www.atlanticcouncil.org/?p=634125 Vladimir Putin's invasion of Ukraine has not gone according to plan but he still hopes to win a long war of attrition. However, Russia's reliance on human wave tactics risks undermining morale within his invading army, writes Olivia Yanchik.

The post Human wave tactics are demoralizing the Russian army in Ukraine appeared first on Atlantic Council.

]]>
It is no secret that the Russian invasion of Ukraine has not gone according to plan. Nevertheless, with the conflict now in its second year, Vladimir Putin still hopes to break Ukrainian resistance in a long war of attrition.

This may be easier said than done. While Russia enjoys significant demographic, industrial, and economic advantages over Ukraine, questions remain over the ability of the once-vaunted Russian military to achieve the Kremlin’s goals. Crucially, an apparent reliance on human wave tactics during Russia’s recent winter offensive has led to catastrophic losses which threaten to undermine morale within the ranks of Putin’s invading army.

There is currently no confirmed data regarding losses on either side of the Russo-Ukrainian War. At the same time, most independent sources agree that fighting in recent months has resulted in some of the worst carnage of the entire war. In mid-February, Britain’s Ministry of Defence reported that during the previous two weeks, Russia had likely suffered its highest rate of casualties since the initial stages of the invasion almost one year earlier.

Russia’s heaviest losses in recent months are believed to have occurred in battles for control over strategic towns in eastern Ukraine such as Bakhmut and Vuhledar, with Ukraine claiming to have killed or wounded tens of thousands of Russian soldiers. While unconfirmed, these figures are supported by extensive battlefield footage, much of which appears to show Russian troops engaged in reckless frontal assaults on entrenched defensive positions.

The human wave tactics on display in eastern Ukraine reflect Russia’s narrowing military options following a year of embarrassing battlefield setbacks. The Russian military entered the current war with a reputation as the world’s number two army, but has performed remarkably poorly in Ukraine. With many of his most experienced units and elite regiments decimated, Putin now hopes to grind down Ukraine’s resources and outlast the country’s Western backers by relying on superior numbers. In the final months of 2022, he bolstered his invasion force with an additional 300,000 troops via Russia’s first mobilization since World War II.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Human wave tactics are not new and typically involve soldiers conducting direct attacks in large numbers with the objective of overwhelming an opposing force. Such troops are often regarded as “single-use soldiers,” with each wave suffering heavy casualties as it attempts to move the front lines further forward. This is not the first time Russian troops have been called upon to conduct such attacks. During WWII, Soviet commanders often ordered Red Army soldiers into frontal assaults that resulted in exceptionally high death tolls.

In the present war against Ukraine, the Kremlin may see human wave tactics as an effective way of overcoming determined Ukrainian resistance. It allows Russia to wear down Ukraine’s numerically fewer but battle-hardened troops, and can be implemented using a combination of easily replaced forces including recently mobilized soldiers and former convicts serving in the Wagner private military company.

This approach allows Russia’s more experienced soldiers to be held in reserve and used to exploit emerging weak points in the Ukrainian defenses. So-called “blocking units” are also reportedly being deployed behind the front lines to ensure Russian troops do not try to flee. According to numerous battlefield accounts, any Russian soldier who attempts to retreat from a human wave attack faces the prospect of being shot by their own side.

Although grisly, Russia’s human wave tactics are producing results. However, any advances during the past three months in Bakhmut and at other points along the 600-mile front line have been modest in scale and have come at a high cost. In an interview with Current Time on the front lines of Bakhmut, one Ukrainian soldier described the horrors of Russia’s frontal assaults. “The Russian soldiers face certain death in these attacks, but they are not retreating,” he commented. “You can shoot his head off, but his comrade will keep coming. Their own commanders will kill them if they don’t attack.”

The brutality of Russia’s human wave attacks is leading to growing signs of demoralization among front line troops. Since the beginning of 2023, dozens of video appeals have been posted to social media featuring Russian soldiers in Ukraine complaining to Putin or other state officials about human wave tactics and high death tolls. Russian media outlet Verstka reported that since early February, Russian soldiers from at least 16 different regions of the country have recorded video messages in which they criticize their military commanders for using them as cannon fodder.

Footage has also emerged of Russian soldiers refusing to follow orders after suffering heavy losses during the recent winter offensive in eastern Ukraine. While details remain unconfirmed, most of these incidents appear to have involved recently mobilized Russian troops who found themselves rushed into battle, often after having received minimal training.

In a further worrying sign for the Kremlin, Ukrainian officials have reported a record number of calls in March 2023 to the country’s “I Want to Live” initiative, which helps Russian troops surrender to the Ukrainian military. All this points to the conclusion that human wave attacks could be compounding Russian morale issues and further accelerating the buckling of front line offensives.

At this stage, there appears to be little prospect of a sudden collapse throughout the Russian military comparable to the disintegration of Afghanistan’s security forces during the 2021 US withdrawal. While the demoralization issues facing the Russian army appear significant, recent steps to introduce draconian penalties for Russian soldiers found guilty of disobedience, desertion, or surrender represent a powerful deterrent. The continued domestic strength of the Putin regime and its control over the information space also serve to hold Russia’s army together in Ukraine.

The Kremlin may now have recognized that it must address widespread anger and alarm over the military’s use of human waves. In early April, Russian General Rustam Muradov was reportedly dismissed from his post as commander of the Eastern Group of Forces in Ukraine following his disastrous handling of the recent failed assault on Vuhledar, which resulted in “exceptionally heavy casualties.” Muradov had been widely criticized by his own troops along with many members of Russia’s vocal pro-war blogger community, making him an unofficial symbol of the army’s human wave tactics.

If confirmed, Muradov’s departure may indicate a coming change in tactics. This would arguably be long overdue. If Russia is hoping to outlast Ukraine in a war of attrition, Putin’s generals will need to move beyond a reliance on costly human waves and demoralizing frontal assaults.

Olivia Yanchik is a program assistant at the Atlantic Council’s Eurasia Center.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Human wave tactics are demoralizing the Russian army in Ukraine appeared first on Atlantic Council.

]]>
Russian War Report: Belarus accuses Ukraine of plotting terrorist attack https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-belarus-accuses-ukraine-of-plotting-terrorist-attack/ Fri, 07 Apr 2023 18:23:57 +0000 https://www.atlanticcouncil.org/?p=633770 Belarus' KGB accused Ukraine of plotting an attack on a Russian consulate in the Belarusian city of Grodno. Belarus also confirmed it would accept Russian tactical nuclear weapons.

The post Russian War Report: Belarus accuses Ukraine of plotting terrorist attack appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Belarus accuses Ukraine of plotting terrorist attack against Russian consulate

Identifying potential host sites for Russian tactical nuclear weapons

Documenting dissent

Individuals linked to Russian army form ‘angry patriots club’

Tracking narratives

Russian propaganda reaches Ukrainian users via Facebook ads

International response

Poland and Ukraine sign cooperation deal for production of tank shells

Belarus accuses Ukraine of plotting terrorist attack against Russian consulate

On April 4, Belarusian state-controlled TV channel ONT aired a documentary titled “Loud failures of the Ukrainian special services in Belarus. Gaspar did not get in touch.” Reports from Belarus’ State Security Committee (KGB) informed much of the program, which asserted that, under the leadership of Ukrainian special services, a network of Russian and Belarusian citizens planned several terrorist attacks in the Belarusian city of Grodno. The alleged perpetrators reportedly planned to target several facilities, including the Consulate General of Russia, a military enlistment office opposite Zhiliber Park, a military unit in southern Grodno, and two oil depots. 

The KGB claimed that Vyacheslav Rozum, an alleged employee of the Main Directorate of Intelligence in the Ukrainian defense ministry, planned the attacks. Ukrainian authorities had not commented on the accusations at the time of writing. According to the documentary, Rozum asked Russian citizen Daniil Krinari, known as Kovalevsky, to form a network of people to carry out terrorist acts. Krinari was reportedly arrested in Grodno in December 2022 and extradited to Russia at the request of the Russian Federal Security Service (FSB). He was charged in Russia for cooperating with Ukraine and acting in the interests of Ukraine. The Belarusian KGB asserted that, before his extradition, Krinari managed to recruit at least two people, Russian citizen Alexei Kulikov and Belarusian citizen Vadim Patsenko. Kulikov had allegedly fled Russia in 2022 to avoid conscription and moved to Belarus. 

The ONT documentary includes interviews with Kulikov and Patsenko, who argue that Rozum asked them to take photos and videos of the target facilities in Grodno. Moreover, Patsenko argued that Vyacheslav tasked him with blowing up an oil depot with a drone. The program claims Ukrainian special services promised Kulikov and Patsenko $10,000 each. While Patsenko and Kulikov allege that Ukrainian security services were involved in the operation, the ONT program does not include concrete evidence to prove this claim. 

The documentary also contains an interview with Nikolai Shvets, the main suspect behind a February 26, 2023, attack on an AWACS A-50 Russian military aircraft at Machulishchy airfield in Belarus. Shvets is reported to be a Russian-Ukrainian dual citizen and served in the Ukrainian army. In the ONT interview, he claimed he was working with a person from the Ukrainian security service while planning the sabotage. The Belarusian independent media outlet Nasha Niva reported that Maxim Lopatin, one of arrested suspects in the Machulishchy attack, had a broken jaw when he filmed the ONT doumentary. Nasha Niva suggested that he was possibly beaten by Belarusian law enforcement authorities. Belarus arrested more than twenty people in connection to the February aircraft incident and announced on April 3 that the suspects were charged with committing an act of terrorism, for which the maximum sentence is capital punishment. However, the ONT program again provides no concrete evidence linking Shvets to Ukrainian security services. 

In addition, the ONT documentary aired on the same day that Alyaksandr Lukashenka met Sergey Naryshkin, the head of Russia’s Foreign Intelligence Service, in Minsk to discuss joint counterterrorism measures undertaken by Belarus and Russia. 

Givi Gigitashvili, Research Associate, Warsaw, Poland

Identifying potential host sites for Russian tactical nuclear weapons

On March 28, Belarus confirmed it would accept Russian tactical nuclear weapons. The announcement came after Russian President Vladimir Putin announced on March 25 plans to store tactical nuclear weapons in Belarus, promising to build a nuclear weapons storage facility in the country. Putin made the comments after the United Kingdom said it would supply Ukraine with ammunition containing depleted uranium. “The heavy metal is used in weapons because it can penetrate tanks and armour more easily due to its density, amongst other properties,” Reutersreported. On April 4, Russian Minister of Defense Sergei Shoigu reported the transfer of Iskander-M tactical missiles, which are nuclear capable and have been utilized by the Russian military against Ukraine. 

Two days after the start of Russia’s invasion of Ukraine, on February 26, 2022, Belarus approved via referendum constitutional amendments to remove the country’s non-nuclear status. The constitutional change allows Belarus to host nuclear weapons for foreign states. 

Amidst the speculation surrounding Russia’s nuclear deployment to Belarus, the most pressing questions concern the potential location of airfields capable of nuclear deployment and which type of equipment is nuclear capable in terms of maintenance and modernization efforts.  

Along with the confirmed transfer of the Iskander-M missiles (a mobile, short-range ballistic missile system with a range of up to 500 kilometers), Sukhoi Su-25 fighter jets are also a top contender in the Russian and Belarusian aviation arsenals. This aircraft is capable of carrying two nuclear bombs, which the Russian military categorizes as “special aviation bombs.” In June 2022, Belarusian President Alyaksandr Lukashenka personally called on Putin to help upgrade and retrofit the Belarusian Su-25 fleet to be nuclear-capable. This resulted in a long-term project to enable Belarusian nuclear capabilities, legalize hosting Russian nuclear technology and nuclear-capable craft, enable joint-training programs for aviation sorties, and direct training for Belarusian pilots.

In conjunction with the Su-25’s capabilities against Ukraine’s current air defence networks and Russia’s non-strategic nuclear policy, Belarus’ acceptance of Russian tactical nuclear weapons can be viewed as escalatory. Video footage showed the Su-25’s capacity to evade Ukraine’s man-portable air defence system (MANPAD).

https://twitter.com/ua_ridna_vilna/status/1569048817110077445
Video footage from the cockpit of a SU-25 aircraft demonstrating its maneuverability and evasion of MANPAD systems. (Source: ua_ridna_vilna/archive)

On April 2, the Russian envoy to Minsk announced that the nuclear weapons deployment would occur along Belarus’ western border. The exact location has not been specified, but Belarus has a number of bases along its western border, including Osovtsy, Ross, and Bereza. However, Lida is a primary staging base for the Belarusian fleet of SU-25s, and open-source researchers have confirmed a large presence of the aircraft on the base. Currently, Osovtsy is not one of the highly utilized bases in Belarus, but its proximity to the western border, especially in terms of proximity to Poland and the northern border of Ukraine, makes it a primary location to watch for potential signs of development, land-clearing operations, and heightened military activity.

Map showing Belarus’ western border and highlighting the locations of the Lida, Ross, and Osovtsy airbases. (Source: DFRLab via Google Maps)

Kateryna Halstead, Research Assistant, Bologna, Italy

Individuals linked to Russian army form ‘angry patriots club’

On April 1, former Russian army commander Igor Strelkov (also known as Igor Girkin) published a video announcing the formation of the “angry patriots club” (Клуб рассерженных патриотов). According to Strelkov, the club aims “to help Russian armed forces” and “meet the stormy wind that will soon whip our faces as one team.” In the video, Strelkov says that Russia “is moving toward military defeat” because “we got into a long, protracted war for which our economy turned out to be completely unprepared. Neither the army nor the political system was ready for it.” In a Telegram post, Strelkov said the club “was created two weeks ago. So far, organizational issues have not been resolved publicly.” Strelkov previously played a crucial role in forming a separatist movement in the Donbas region.

The video also featured a statement from Pavel Gubarev, who in 2014 proclaimed himself the commander of the Donbas People’s Militia. In the video, he says, “We are angry that we are going from one defeat to another, and nothing changes.” He called the system in Russia “thievish and corrupt” and said the Russian elite are “elite in catastrophe.” 

The video further featured Vladimir Grubnik, who in 2015 was arrested in Ukraine in connection to an explosion near a Security Service of Ukraine (SBU) building in Odesa; in 2019, he was part of a prisoner exchange and returned to the Russian forces in Donbas. Grubnik said that defeat would lead to Russia falling apart. 

Vladimir Kucherenko, an Odesa-born Russian propagandist better known by his pen name Maksim Kalashnikov, said, “We are not afraid to criticize the actions of the government. Why? Because it can somehow help victory. Otherwise, they will do nothing, they will not move.” He called the Russian elite “looters,” “resource grabbers,” and “corrupts.” He predicted the war would turn into “carnage to death” and that the “corrupt Russian elites” would organize a coup that would “betray the country” by agreeing to Russia’s “separation” and “giving up of nuclear arms” in order to “earn the forgiveness of the West.” In 2015, the Ukrainian Ministry of Culture included Kucherenko in the list of Russians “threatening national security.”

Another figure in the video is Maksim Klimov, a pro-Kremlin military expert, who said, “The authorities do not know the real situation.” He added, “They do not hear nor see what is happening in the special military operation zone.” Klimov also did not rule out Russia’s defeat. 

The video gained some traction online, garnering 177,000 views on YouTube at the time of writing and 623,600 views and 2,500 shares on Strekov’s Telegram channel. According to TGStat, most of the shares on Telegram came from private accounts. Many Ukrainian media outlets reported on the newly founded club. The DFRLab did not identify any mainstream Russian media outlets reporting on the club besides Kommersant, a Kremlin-approved media outlet focused on business. 

Nika Aleksejeva, Resident Fellow, Riga, Latvia

Russian propaganda reaches Ukrainian users via Facebook ads

This week, the Center for Strategic Communications and Information Security (CSCIS) and Ukrainian civil society members reported that Facebook advertising campaigns are being used to spread negative content about Ukraine. The ads range from posts that claim “Romania wants to annex Ukrainian territories” to videos that claim “This is the end. There are no men to fight for Ukraine.” While these campaigns were quickly de-platformed and the pages sharing them were banned, the DFRLab was able to investigate some of the ads via the Facebook Ad Library. The DFRLab previously reported on Facebook ads promoting pro-Russia disinformation to Ukrainian users.

The ads included links to the website luxurybigisland.net, with some ads sharing variations of the URL, such as luxurybigisland.net/rbk or luxurybigisland.net/pravda. The website was built using the Russian website builder Tilda, and its the landing page featured German text that translates to, “Nothing that can’t be removed. We care for your textiles as gently as possible with the utmost care, iron and steam, so that you can enjoy your clothes for a long time. We care.” The same phrase appeared on the now-defunct Tilda-made website google-seo-top.com and the website of a German textile care company. Registration data for luxurybigisland.net is redacted, but WhoIs data for google-seo-top.com shows that the website was registered in Russia. Both luxurybigisland.net and google-seo-top.com include metadata, shown in Google results, that states, in German, “the USA are against the entire world.”

A composite image of a Google search result showing google-seo-top.com (top) and an archive of luxurybigisland.net (bottom) sharing an identical German phrase in their metadata. (Source: Google/Google cache, top; Luxurybigisland.net/archive, bottom)

One URL shared in the ads, luxurybigisland.net/pravda, remained online at the time of writing. The URL redirects to a forged article mimicking the Ukrainian news outlet Pravda. The article shared in the ads never appeared on the authentic Pravda website, but its byline cited a genuine journalist working at the outlet. The DFRLab confirmed the article was a forgery by reviewing the journalist’s author page on the authentic Pravda website, reviewing Pravda’s archived section, conducting a Google search for the forged headline, and then a more specific website search via Google.

Visually the forged website is identical to the authentic one and even features links to contact information copied from the original website. However, the forged website’s image format is different. The text of the forged article claims that the Ukrainian economy is heavily damaged and that “continuation of the war will lead to even greater losses in the economy.” The data shared in the article appears to be copied from multiple media sources and is not false, but the article’s framing contains pro-Russian sentiments as it calls for Ukraine’s surrender.

A second forged article, discovered by CSCIS, was shared on the now-offline URL luxurybigisland.net/RBK. The article mimicked the website of the reputable Ukrainian outlet RBC. 

Meta itself has taken – and continues to take – action against similar cross-platform, pro-Russia networks that push users to websites designed to impersonate legitimate news organizations. The DFRLab could not tie its identified assets to those previous Meta actions, but there is some probability that they were related given the similarity of behavior.

A Facebook page with “Cripto” in its name shared some of the ads. The DFRLab identified another Facebook page with the word Cripto in the name sharing pro-Kremlin narratives via Facebook ads. The ads pushed a false story claiming there was a “riot in Kyiv over losses.” CSCIS previously debunked another narrative pushed by a similarly named page that also fomented anti-Ukrainian military sentiment.

A composite image of two ads from pages with “cripto” in the name. The first, at left, is the Facebook page identified by the DFRLab, while the second, at right, is an earlier ad previously identified by CSCIS. (Source: Cripto ukijed, left; Cripto nucergeq, right)

Roman Osadchuk, Research Associate

Poland and Ukraine sign cooperation deal for production of tank shells

During Ukrainian President Volodymyr Zelenskyy’s visit to Poland, Polish manufacturer Polska Grupa Zbrojeniowa and Ukroboronprom signed a cooperation agreement for the joint production of 125-mm tank ammunition. The agreement assumes that the deployment of new production lines will be in Polish cities and the agreement indicates that they plan to produce a large amount of ammunition for 125-mm guns. The decision to start production in Poland was made due to the high risks of Russian missile attacks on production facilities if they were to be based in Ukraine. In place of locating the production in the country, the Ukrainian side will provide technologies and highly qualified specialists with experience in production. This will be the second factory that will produce 125-mm tank shells.

The supply of shells is of particular importance to Ukrainian forces, which are preparing a counter-offensive in southern and eastern Ukraine as heavy fighting with the Russian army continues in the Bakhmut and Donetsk regions.

Separately, German manufacturer Rheinmetall is building a service center for Western military equipment used by Ukraine’s armed forces in Romania, Reuters reported on April 2. The construction for the center is already underway in the Romanian city of Satu Mare, close to the country’s border with Ukraine. The hub is expected to open later this month. 

This development is happening against the background of diplomatic activity and statements. Ukraine is not ready to sign any peace agreement with Russian President Vladimir Putin, but the war could end as early as this year, according to an April 5 interview with  Ukraine’s Minister of Defense Oleksii Rezniko, who said, “I think this war will end soon. Of course, I would like it not to start, but I personally believe in this year as a year of victory.”

Rezniko also commented on a statement made in March by Czech Republic President Petr Pavel, who claimed that Ukraine had only one chance to conduct a successful counter-offensive this year. “I think that the president of the Czech Republic now speaks more like a military man than a politician, and the logic of the military is such that they constantly calculate the worst options. But even if this is his assessment, it is subjective, and he still lays down useful for us. The message is that European countries should unite more powerfully and strengthen assistance to Ukraine,” said Reznikov. Later, Andriy Sybiha, an adviser to Zelenskyy, told the Financial Times that Kyiv is willing to discuss the future of Crimea with Moscow if its forces reach the border of the Russian-occupied peninsula.

Ruslan Trad, resident fellow for security research, Sofia, Bulgaria

The post Russian War Report: Belarus accuses Ukraine of plotting terrorist attack appeared first on Atlantic Council.

]]>
Anti-war Russians struggle to be heard https://www.atlanticcouncil.org/blogs/ukrainealert/anti-war-russians-struggle-to-be-heard/ Thu, 06 Apr 2023 18:12:04 +0000 https://www.atlanticcouncil.org/?p=633443 The Kremlin has worked hard to create the impression of overwhelming Russian public support for the invasion of Ukraine but anti-war sentiment may become more visible if Putin's army suffers further battlefield defeats, writes Christopher Isajiw.

The post Anti-war Russians struggle to be heard appeared first on Atlantic Council.

]]>
Ever since the full-scale invasion of Ukraine began on February 24, 2022, the Putin regime has worked hard to present the impression of overwhelming Russian domestic support for the war effort. This has involved everything from celebrity endorsements and relentless pro-war coverage in the Kremlin-controlled mainstream Russian media, to online flash mobs and carefully choreographed mass rallies in central Moscow.

Meanwhile, a ruthless clampdown has made it increasingly difficult and dangerous for dissenting voices to be heard. Nevertheless, opposition figures continue to question the true levels of public backing for the invasion, while insisting that large numbers of Russians are either opposed or indifferent. The real situation within Russian society is certainly far more complex than the Kremlin would like us to believe, but today’s suffocating atmosphere means there is little reason to expect an increase in visible anti-war activity any time soon.

Officially at least, Putin’s approval rating has increased significantly since the start of the full-scale invasion just over one year ago. According to Russia’s only internationally respected independent pollster, the Levada Center, the Russian President’s rating rose from 71% on the eve of the invasion to 82% in March 2023. The same source indicates consistently high levels of support for the invasion of Ukraine, with over 70% of respondents expressing their approval in every single survey conducted throughout the past thirteen months.

These figures point to strong levels of public support for the war but they must be viewed in context. Critics question the validity of any public opinion polling in a dictatorship such as Putin’s Russia, where people are legally obliged to call the invasion a “Special Military Operation” and can face criminal prosecution for social media posts. This is worth keeping in mind when analyzing surveys of Russian opinion.

Many poll respondents may be inclined to demonstrate their patriotism and their support for the Russian military while being less enthusiastic about the invasion itself or the Kremlin’s war aims. Others may have become swept up in the relentless flow of pro-war propaganda or cut off from alternative sources of information. It is also important to acknowledge that a large majority of people refuse to participate in polling of this nature. They may choose to decline for a wide range of reasons, but it is possible that many simply prefer not to share anti-war opinions with strangers.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

What evidence is there of anti-war sentiment in today’s Russia? When the invasion of Ukraine began in February 2022, efforts to claim strong public backing for the war were hampered by a series of protests in cities across the country involving mainly young Russians. However, these public demonstrations failed to reach any kind of critical mass and were fairly rapidly suppressed by the authorities with large numbers of detentions.

Other Russians have voted with their feet. A mass exodus of Russian nationals began during the first weeks of the war, with a second wave starting in September 2022 in the wake of Russia’s first mobilization since World War II. Hundreds of thousands of military-age Russian men fled to neighboring countries in the last four months of the year, leading in some cases to massive queues at border crossings.

This outflow of people has had a considerable negative demographic impact on Russia, but it would not be accurate to claim that everyone who has left the country during the past year holds anti-war views. Many chose to leave in order to avoid military service, while others feared the inconvenience of wartime conditions. Thousands of wealthy Russians have relocated to destinations like Dubai, where they can manage their Russian businesses while distancing themselves physically and psychologically from the war.

For those who remain in Russia, it is still possible to live a fairly normal life despite the imposition of sanctions and the departure of many high-profile Western brands. Meanwhile, some members of Russia’s billionaire elite are believed to oppose the war, but most see their fortunes as tied to Putin and are fearful of the consequences if they break with the regime publicly.

There are indications that the war is becoming less and less popular among the very troops charged with leading the invasion. The refusal of many contract soldiers to extend their service has forced the Russian authorities to introduce legislative changes, while in recent months there has been a sharp increase in video addresses on social media featuring mobilized Russian soldiers complaining about suicidal tactics and high death tolls. At the same time, there is little indication yet that mounting demoralization on the front lines is shaping the public mood back in Russia itself.

What of Russia’s beleaguered political opposition? For more than twenty years, the Putin regime has sought to silence any genuine opposition forces via increasingly direct means. These efforts have intensified since the onset of the Ukraine invasion, with independent media outlets shut down and many of the country’s relatively few remaining opposition figures either jailed or forced to flee. Some have attempted to speak out against the war while in exile, with others who left Russia in previous years such as Gary Kasparov and Mikhail Khodorkovsky serving as vocal opponents of the invasion.

The most prominent opposition figure in today’s Russia, Alexei Navalny, remains in prison. Navalny has managed to issue a number of statements from jail condemning the war. In February 2023, he published a fifteen-point plan calling for the Russian military to withdraw completely from Ukraine and arguing that Russia must accept Ukraine’s internationally recognized borders. While many have welcomed Navalny’s unambiguous opposition to the invasion, others remain wary due to his ties to Russian nationalism and earlier reluctance to back the return of Crimea to Ukraine.

At this point, extreme Russian nationalism appears to pose a far greater threat to the Putin regime than liberal anti-war sentiment. A new class of pro-war bloggers has emerged over the past year and has become a powerful force within the more active segments of Russian society. Hardliners such as Wagner chief Yevgeny Prigozhin and Chechen leader Ramzan Kadyrov have gained in stature thanks to their prominent roles in the invasion and have engaged in rare public criticism of key establishment figures.

The authoritarian nature of the Putin regime makes it almost impossible to accurately gauge levels of anti-war sentiment in today’s Russia. It may take a decisive military defeat before many of those who oppose the war dare to speak up and demand change. In a sense, this is exactly what Putin is fighting against. He invaded Ukraine primarily because he feared Ukrainian democracy would serve as a catalyst for similar demands inside Russia itself. So far, he has managed to prevent anti-war or pro-democracy movements from gaining momentum. However, if his invading army’s battlefield fortunes continue to deteriorate in Ukraine, those who dream of a different Russia may finally find their voices.

Christopher Isajiw is an international relations commentator and business development consultant to private, governmental, and non-governmental organizations.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Anti-war Russians struggle to be heard appeared first on Atlantic Council.

]]>
What to expect from the world’s democratic tech alliance as the Summit for Democracy unfolds https://www.atlanticcouncil.org/blogs/new-atlanticist/what-to-expect-from-the-worlds-democratic-tech-alliance-as-the-summit-for-democracy-unfolds/ Wed, 29 Mar 2023 17:37:06 +0000 https://www.atlanticcouncil.org/?p=630003 Ahead of the Biden administration’s second Summit for Democracy, stakeholders from the Freedom Online Coalition gave a sneak peek at what to expect on the global effort to protect online rights and freedoms.

The post What to expect from the world’s democratic tech alliance as the Summit for Democracy unfolds appeared first on Atlantic Council.

]]>
Watch the full event

Ahead of the Biden administration’s second Summit for Democracy, US Deputy Secretary of State Wendy Sherman gave a sneak peek at what to expect from the US government on its commitments to protecting online rights and freedoms.

The event, hosted by the Atlantic Council’s Digital Forensic Research Lab on Monday, came on the same day that US President Joe Biden signed an executive order restricting the US government’s use of commercial spyware that may be abused by foreign governments or enable human-rights abuses overseas.

But there’s more in store for this week, Sherman said, as the United States settles into its role as chair of the Freedom Online Coalition (FOC)—a democratic tech alliance of thirty-six countries working together to support human rights online. As chair, the United States needs “to reinforce rules of the road for cyberspace that mirror and match the ideals of the rules-based international order,” said Sherman. She broke that down into four top priorities for the FOC:

  1. Protecting fundamental freedoms online, especially for often-targeted human-rights defenders
  2. Building resilience against digital authoritarians who use technology to achieve their aims
  3. Building a consensus on policies designed to limit abuses of emerging technologies such as artificial intelligence (AI)
  4. Expanding digital inclusion  

“The FOC’s absolutely vital work can feel like a continuous game of catch-up,” said Sherman. But, she added, “we have to set standards that meet this moment… we have to address what we see in front of us and equip ourselves with the building blocks to tackle what we cannot predict.”

Below are more highlights from the event, during which a panel of stakeholders also outlined the FOC’s role in ensuring that the internet and emerging technologies—including AI—adhere to democratic principles.

Deepening fundamental freedoms

  • Sherman explained that the FOC will aim to combat government-initiated internet shutdowns and ensure that people can “keep using technology to advance the reach of freedom.”
  • Boye Adegoke, senior manager of grants and program strategy at the Paradigm Initiative, recounted how technology was supposed to help improve transparency in Nigeria’s recent elections. But instead, the election results came in inconsistently and after long periods of time. Meanwhile, the government triggered internet shutdowns around the election period. “Bad actors… manipulate technology to make sure that the opinions and the wishes of the people do not matter at the end of the day,” he said.
  • “It’s very important to continue to communicate the work that the FOC is doing… so that more and more people become aware” of internet shutdowns and can therefore prepare for the lapses in internet service and in freely flowing, accurate information, Adegoke said.
  • On a practical level, once industry partners expose where disruptions are taking place, the FOC offers a mechanism by which democratic “governments can work together to sort of pressure other governments to say these [actions] aren’t acceptable,” Starzak argued.
  • The FOC also provides a place for dialogue on human rights in the online space, said Alissa Starzak, vice president and global head of public policy at Cloudfare. Adegoke, who also serves in the FOC advisory network, stressed that “human rights [are] rarely at the center of the issues,” so the FOC offers an opportunity to mainstream that conversation into policymakers’ discussions on technology.

Building resilience against digital authoritarianism

  • “Where all of [us FOC countries] may strive to ensure technology delivers for our citizens, autocratic regimes are finding another means of expression,” Sherman explained, adding that those autocratic regimes are using technologies to “divide and disenfranchise; to censor and suppress; to limit freedoms, foment fear, and violate human dignity.” New technologies are essentially “an avenue of control” for authoritarians, she explained.
  • At the FOC, “we will focus on building resilience against the rise of digital authoritarianism,” Sherman said, which has “disproportionate and chilling impacts on journalists, activists, women, and LGBTI+ individuals” who are often directly targeted for challenging the government or expressing themselves.
  • One of the practices digital authoritarians often abuse is surveillance. Sherman said that as part of the Summit for Democracy, the FOC and other partners will lay out guiding principles for the responsible use of surveillance tech.
  • Adegoke recounted how officials in Nigeria justified their use of surveillance tech by saying that the United States also used the technology. “It’s very important to have some sort of guiding principle” from the United States, he said.
  • After Biden signed the spyware executive order, Juan Carlos Lara, executive director at Derechos Digitales, said he expects other countries “to follow suit and hopefully to expand the idea of bans on spyware or bans on surveillance technology” that inherently pose risks to human rights.

Addressing artificial intelligence

  • “The advent of AI is arriving with a level of speed and sophistication we haven’t witnessed before,” warned Sherman. “Who creates it, who controls it, [and] who manipulates it will help define the next phase of the intersection between technology and democracy.”
  • Some governments, Sherman pointed out, have used AI to automate their censorship and suppression practices. “FOC members must build a consensus around policies to limit these abuses,” she argued.
  • Speaking from an industry perspective, Starzak acknowledged that sometimes private companies and governments “are in two different lanes” when it comes to figuring out how they should use AI. But setting norms for both good and bad AI use, she explained, could help get industry and the public sector in the same lane, moving toward a world in which AI is used in compliance with democratic principles.
  • Lara, who also serves in the FOC advisory network, explained that the FOC has a task force to specifically determine those norms on government use of AI and to identify the ways in which AI contributes to the promise—or peril—of technology in societies worldwide.

Improving digital inclusion

  • “The internet should be open and secure for everyone,” said Sherman. That includes “closing the gender gap online” by “expanding digital literacy” and “promoting access to safe online spaces” that make robust civic participation possible for all. Sherman noted that the FOC will specifically focus on digital inclusion for women and girls, LGBTI+ people, and people with disabilities.
  • Starzak added that in the global effort to cultivate an internet that “builds prosperity,” access to the free flow of information for all is “good for the economy and good for the people.” Attaining that version of the internet will require a “set of controls” to protect people and their freedoms online, she added.
  • Ultimately, there are major benefits to be had from expanded connectivity. According to Sherman, it “can drive economic growth, raise standards of living, create jobs, and fuel innovative solutions” for global challenges such as climate change, food insecurity, and good governance.

Katherine Walla is an associate director of editorial at the Atlantic Council.

Watch the full event

The post What to expect from the world’s democratic tech alliance as the Summit for Democracy unfolds appeared first on Atlantic Council.

]]>
Wendy Sherman on the United States’ priorities as it takes the helm of the Freedom Online Coalition https://www.atlanticcouncil.org/news/transcripts/wendy-sherman-on-the-united-states-priorities-as-it-takes-the-helm-of-the-freedom-online-coalition/ Tue, 28 Mar 2023 14:22:55 +0000 https://www.atlanticcouncil.org/?p=628865 US Deputy Secretary of State Wendy Sherman outlined the priorities for the world's democratic tech alliance, from protecting fundamental freedoms online to building resilience against digital authoritarianism.

The post Wendy Sherman on the United States’ priorities as it takes the helm of the Freedom Online Coalition appeared first on Atlantic Council.

]]>
Watch the event

Event transcript

Uncorrected transcript: Check against delivery

Introduction
Rose Jackson
Director, Democracy & Tech Initiative, Digital Forensic Research Lab

Opening Remarks
Wendy Sherman
Deputy Secretary of State, US Department of State

Panelists
Boye Adegoke
Senior Manager, Grants and Program Strategy, Paradigm Initiative

Juan Carlos Lara
Executive Director, Derechos Digitales

Alissa Starzak
Vice President, Global Head of Public Policy, Cloudflare

Moderator
Khushbu Shah
Nonresident Fellow, Digital Forensic Research Lab

ROSE JACKSON: Hello. My name is Rose Jackson, and I’m the director of the Democracy + Tech Initiative here at the Atlantic Council in Washington, DC.

I’m honored to welcome you here today for this special event, streaming to you in the middle of the Freedom Online Coalition, or the FOC’s first strategy and coordination meeting of the year.

For those of you watching at home or many screens elsewhere, I’m joined here in this room by representatives from thirty-one countries and civil-society and industry leaders who make up the FOC’s advisory network. They’ve just wrapped up the first half of their meeting and wanted to bring some of the conversation from behind closed doors to the community working everywhere to ensure the digital world is a rights-respecting one.

It’s a particularly important moment for us to be having this conversation. As we get ready for the second Summit for Democracy later this week, the world’s reliance and focus on the internet has grown, while agreement [on] how to further build and manage it frays.

I think at this point it’s a bit of a throwaway line that the digital tools mediate every aspect of our lives. But the fact that most of the world has no choice but to do business, engage with their governments, or stay connected with friends and family through the internet makes the rules and norms around how that internet functions a matter of great importance. And even more because the internet is systemic and interconnected, whether it is built and imbued with the universal human rights we expect offline will determine whether our societies can rely on those rights anywhere.

Antidemocratic laws have a tendency of getting copied. Troubling norms are established in silence. And a splintering of approach makes it easier for authoritarians to justify their sovereign policies used to shutter dissent, criminalize speech, and surveil everyone. These are the core democratic questions of our time, and ensuring that the digital ecosystem is a rights-respecting one requires democracies [to row] in the same direction in their foreign policy and domestic actions.

The now twelve-year-old FOC, as the world’s only democratic tech alliance, presents an important space for democratic governments to leverage their shared power to this end, in collaboration with civil society and industry around the world.

We were encouraged last year when Secretary of State Antony Blinken announced at our open summit conference in Brussels that the US would take over as chair of the FOC in 2023 as part of its commitment to reinvest in the coalition and its success. Just over an hour ago, the US announced a new executive order limiting its own use of commercial spyware on the basis of risks to US national security and threats to human rights everywhere really brings home the stakes and potential of this work.

So today we’re honored to have Deputy Secretary of State Wendy Sherman here to share more about the US government’s commitment to these issues and its plans for the coming year as chair.

We’ll then turn to a panel of civil-society and industry leaders from around the world to hear more about how they view the role and importance of the FOC in taking action on everything from internet shutdowns to surveillance tech and generative AI. That session will be led by our nonresident fellow and the former managing editor of Rest of World Khushbu Shah.

Now, before I turn to the deputy secretary, I want to thank the FOC support unit, the US State Department, and our Democracy and Tech team here for making this event possible. And I encourage you in Zoomland to comment on and engage liberally with the content of today’s event on your favorite social media platforms, following at @DFRLab, and using the hashtags #SummitforDemocracy, #S4D too, or #PartnersforDemocracy.

For those tuning in remotely in need of closed captioning, please view today’s program on our YouTube channel through the link provided in the chat.

It is now my distinct honor to pass the podium to Deputy Secretary of State Wendy Sherman, who needs no introduction as one of our nation’s most experienced and talented diplomats.

Deputy Secretary, thank you so much for joining us.

WENDY SHERMAN: Good afternoon. It’s terrific to be with you, and thank you, Rose, for your introduction and for all of the terrific work that the Freedom Online Coalition is doing.

It is fitting to be here at the Atlantic Council for this event because your mission sums up our purpose perfectly: shaping the global future together. That is our fundamental charge in the field of technology and democracy: how we use modern innovations to forge a better future.

That’s what the DFRLab strives to achieve, through your research and advocacy, and that’s what the Freedom Online Coalition, its members, observers, and advisory network seek to accomplish through our work. Thank you for your partnership.

More than five decades ago—seems like a long time ago, but really very short—the internet found its origins in the form of the first online message ever sent, all of two letters in length, delivered from a professor at UCLA to colleagues at Stanford. It was part of a project conceived in university labs and facilitated by government. It was an effort meant to test the outer limits of rapidly evolving technologies and tap into the transformative power of swiftly growing computer networks.

What these pioneers intended at the time was actually to devise a system that could allow people to communicate in the event of a nuclear attack or another catastrophic event. Yet what they created changed everything—how we live and work, how we participate in our economy and in our politics, how we organize movements, how we consume media, read books, order groceries, pay bills, run businesses, conduct research, learn, write, and do nearly everything we can think of.

Change didn’t happen overnight, of course, and that change came with both promise and peril. This was a remarkable feat of scientific discovery, and it upended life as we know it for better, and sometimes, worse.

Over the years, as we went from search engines to social media, we started to face complicated questions as leaders, as parents and grandparents, as members of the global community—questions about how the internet can best be used, how it should be governed, who might misuse it, how it impacts our children’s mental and emotional health, who could access it, and how we can ensure that access is equitable—benefitting people in big cities, rural areas, and everywhere in between. Big-picture questions arose about these tectonic shifts. What would they mean for our values and our systems of governance? Whether it’s the internet as we understand it today or artificial intelligence revolutionizing our world tomorrow, will digital tools create more democracy or less? Will they be deployed to maximize human rights or limit them? Will they be used to enlarge the circle of freedom or constraint and contract it?

For the United States, the Freedom Online Coalition, and like-minded partners, the answer should point in a clear direction. At a basic level, the internet should be open and secure for everyone. It should be a force for free enterprise and free expression. It should be a vast forum that increases connectivity, that expands people’s ability to exercise their rights, that facilitates unfettered access to knowledge and unprecedented opportunities for billions.

Meeting that standard, however, is not simple. Change that happens this fast in society and reaches this far into our lives rarely yields a straightforward response, especially when there are those who seek to manipulate technology for nefarious ends. The fact is where all of us may strive to ensure technology delivers for our citizens, autocratic regimes are finding another means of expression. Where democracies seek to tap into the power of the internet to lift individuals up to their highest potential, authoritarian governments seek to deploy these technologies to divide and disenfranchise, to censor and suppress, to limit freedoms, [to] foment fear and [to] violate human dignity. They view the internet not as a network of empowerment but as an avenue of control. From Cuba and Venezuela to Iran, Russia, the PRC, and beyond, they see new ways to crush dissent through internet shutdowns, virtual blackouts, restricted networks, blocked websites, and more.

Here in the United States, alongside many of you, we have acted to sustain connections to internet-based services and the free flow of information across the globe, so no one is cut off from each other, the outside world, or cut off from the truth. Yet even with these steps, none of us are perfect. Every day, almost everywhere we look, democracies grapple with how to harness data for positive ends, while preserving privacy; how to bring out the best in modern innovations without amplifying their worst possibilities; how to protect the most vulnerable online while defending the liberties we hold dear. It isn’t an easy task, and in many respects, as I’ve said, it’s only getting harder. The growth of surveillance capabilities is forcing us to constantly reevaluate how to strike the balance between using technologies for public safety and preserving personal liberties.

The advent of AI is arriving with a level of speed and sophistication we haven’t witnessed before. It will not be five decades before we know the impact of AI. That impact is happening now. Who creates it, who controls it, [and] who manipulates it will help define the next phase of the intersection between technology and democracy. By the time we realize AI’s massive reach and potential, the internet’s influence might really pale in comparison. The digital sphere is an evolving and is evolving at a pace we can’t fully fathom and in ways at least I can’t completely imagine. Frankly, we have to accept the fact that the FOC’s absolutely vital work can feel like a continuous game of catchup. We have to acknowledge that the guidelines we adopt today might seem outdated as soon as tomorrow.

Now let me be perfectly clear: I am not saying we should throw up our hands and give up. To the contrary, I’m suggesting that this is a massive challenge we have to confront and a generational change we have to embrace. We have to set standards that meet this moment and that lay the foundation for whatever comes next. We have to address what we see in front of us and equip ourselves with the building blocks to tackle what we cannot predict.

To put a spin on a famous phrase, with the great power of these digital tools comes great responsibility to use that power for good. That duty falls on all our shoulders and the stakes could not be higher for internet freedom, for our common prosperity, for global progress, because expanded connectivity, getting the two billion unconnected people online can drive economic growth, raise standards of living, create jobs, and fuel innovative solutions for everything from combating climate change to reducing food insecurity, to improving public health, to promoting good governance and sustainable development.

So we need to double down on what we stand for: an affirmative, cohesive, values-driven, rights-respecting vision for democracy in a digital era. We need to reinforce rules of the road for cyberspace that mirror and match the ideals of the rules-based international order. We need to be ready to adapt our legal and policy approaches for emerging technologies. We need the FOC—alongside partners in civil society, industry, and elsewhere—to remain an essential vehicle for keeping the digital sphere open, secure, interoperable, and reliable.

The United States believes in this cause as a central plank of our democracy and of our diplomacy. That’s why Secretary Blinken established our department’s Bureau of Cyberspace and Digital Policy, and made digital freedom one of its core priorities. That’s why the Biden-Harris administration spearheaded and signed into and onto the principles in the Declaration for the Future of the Internet alongside sixty-one countries ready to advance a positive vision for digital technologies. That’s why we released core principles for tech-platform accountability last fall and why the president called on Congress to take bipartisan action in January.

That’s why we are committed to using our turn as FOC chair as a platform to advance a series of key goals.

First, we will deepen efforts to protect fundamental freedoms, including human rights defenders online and offline, many of whom speak out at grave risk to their own lives and to their families’ safety. We will do so by countering disruptions to internet access, combating internet shutdowns, and ensuring everyone’s ability to keep using technology to advance the reach of freedom.

Second, we will focus on building resilience against the rise of digital authoritarianism, the proliferation of commercial spyware, and the misuse of technology, which we know has disproportionate and chilling impacts on journalists, activists, women, and LGBTQI+ individuals. To that end, just a few hours ago President Biden issued an executive order that for the first time will prohibit our government’s use of commercial spyware that poses a risk to our national security or that’s been misused by foreign actors to enable human rights abuses overseas.

On top of that step, as part of this week’s Summit for Democracy, the members of the FOC and other partners will lay out a set of guiding principles on government use of surveillance technologies. These principles describe responsible practices for the use of surveillance tech. They reflect democratic values and the rule of law, adherence to international obligations, strive to address the disparate effect on certain communities, and minimize the data collected.

Our third objective as FOC chair focuses on artificial intelligence and the way emerging technologies respect human rights. As some try to apply AI to help automate censorship of content and suppression of free expression, FOC members must build a consensus around policies to limit these abuses.

Finally, we will strengthen our efforts on digital inclusion—on closing the gender gap online; on expanding digital literacy and skill-building; on promoting access to safe online spaces and robust civic participation for all, particularly women and girls, LGBTQI+ persons, those with disabilities, and more.

Here’s the bottom line: The FOC’s work is essential and its impact will boil down to what we do as a coalition to advance a simple but powerful idea, preserving and promoting the value of openness. The internet, the Web, the online universe is at its best when it is open for creativity and collaboration, open for innovation and ideas, open for communication and community, debate, discourse, disagreement, and diplomacy.

The same is true for democracy—a system of governance, a social contract, and a societal structure is strongest when defined by open spaces to vote, deliberate, gather, demonstrate, organize, and advocate. This openness could not be more important, because when the digital world is transparent, when democracy is done right, that’s when everyone has a stake in our collective success. That’s what makes everyone strive for a society that is free and fair in our politics and in cyberspace. That’s what we will give—that’s what we’ll give everyone reason to keep tapping into the positive potential of technology to forge a future of endless possibility and boundless prosperity for all.

So good luck with all your remaining work; lots ahead. And thank you so much for everything that you all do. Thank you.

KHUSHBU SHAH: Hello, everybody. Thank you so much for joining us. I’m Khushbu Shah, a journalist and a nonresident fellow at the Atlantic Council’s DFRLab.

We’re grateful to have these three experts here with us today to discuss rights in the digital world and the Freedom Online Coalition’s role in those rights. I’ll introduce you to these three experts.

This is Adeboye Adegoke, who is the senior manager of grants and program strategy at Paradigm Initiative. We have Alissa Starzak, the vice president and global head of public policy at Cloudflare, and Juan Carlos, known as J.C., Lara, who’s the executive director of Derechos Digitales. And so I will mention that both J.C. and Adeboye are also on the FOC’s Advisory Network, which was created as a strong mechanism for ongoing multi-stakeholder engagement.

And so I’ll start with the thirty-thousand-foot view. So we’ve heard—we’ve just heard about the FOC and its continued mission with the United States at the helm as chair this year in an increasingly interconnected and online world. More than five billion people are online around the world. That’s the majority of people [on] this planet. We spend nearly half of our time that we’re awake online, around more than 40 percent.

We as a global group of internet users have evolved in our use of the internet, as you’ve heard, since the creation of the FOC in 2011.

So Adeboye, why do you think now suddenly so many people are suddenly focused on technology as a key democratic issue? And speaking, you know, from your own personal experience in Nigeria, should we be?

ADEBOYE ADEGOKE: Yeah. I mean, I think the reasons are very clear, not just [looking out] to any region of the world, but, you know, generally speaking, I mean, the Cambridge Analytica, you know, issue comes to mind.

But also just speaking, you know, very specifically to my experience, on my reality as a Nigerian and as an African, I mean, we just concluded our general elections, and technology was made to play a huge role in ensuring transparency, you know, the integrity of the elections, which unfortunately didn’t achieve that objective.

But besides that, there are also a lot of concerns around how technology could be manipulated or has been manipulated in order to literally alter potential outcomes of elections. We’re seeing issues of microtargeting; you know, misinformation campaigns around [the] election period to demarcate, you know, certain candidates.

But what’s even most concerning for me is how technology has been sometimes manipulated to totally alter the outcome of the election. And I’ll give you a very clear example in terms of the just-concluded general elections in Nigeria. So technology was supposed to play a big role. Results were supposed to be transmitted to a central server right from the point of voting. But unfortunately, those results were not transmitted.

In fact, as a matter of fact, three or four days after the election, 50 percent of the results were not uploaded. As of the time that the election results were announced, those results were—less than 50 percent of the results had been transmitted, which then begin to, you know, lead to questioning of the integrity of those outcomes. These are supposed to be—elections are supposed to be transmitted, like, on the spot. So, you know, it becomes concerning.

The electoral panel [gave] an excuse that there was a technical glitch around, you know, their server and all of that. But then the question is, was there actually a technical glitch, or was there a compromise or a manipulation by certain, you know, bad actors to be able to alter the outcome of the election? [This] used to be the order of the day in many supposedly, you know, democratic countries, especially from the part of the world that I come from, where people really doubt whether what they see as the outcomes of their election is the actual outcome or somebody just writing something that they want.

So technology has become a big issue in elections. On one side, technology has the potential to improve on [the] integrity of elections. But on the other side, bad actors also have the tendency to manipulate technology to make sure that the opinions or the wishes of the people do not matter at the end of the day. So that’s very important here.

KHUSHBU SHAH: And you just touched on my next question for Alissa and J.C. So, as you mentioned, digital authoritarians have used tech to abuse human rights, limit internet freedoms. We’re seeing this in Russia and Myanmar, Sudan, and Libya. Those are some examples. [The] deputy secretary mentioned a few others. For example, in early 2022, at the start of its invasion of Ukraine, Russia suppressed domestic dissent by closing or forcing into exile the handful of remaining independent media outlets. In at least fifty-three countries, users have faced legal repercussions for expressing themselves online, often leading to prison terms, according to a report from Freedom House. It’s a trend that leaves people on the frontlines defenseless, you know, of course, including journalists and activists alike.

And so, J.C., what have you seen globally? What are the key issues we must keep an eye on? And what—and what are some practical steps to mitigate some of these issues?

JUAN CARLOS LARA: Yeah. I think it’s difficult to think about the practical steps without first addressing what those issues are. And I think Boye was pointing out basically what has been a problem as perceived in many in the body politic, or many even activists throughout the world. But I think it’s important to also note that these broader issues about the threats to democracy, about the threats to human rights, [they] manifest sometimes differently. And that includes how they are seen in my region, in Latin America, where, for instance, the way in which you see censorship might differ from country to country.

While some have been able to pass laws, authoritarian laws that restrict speech and that restrict how expression is represented online and how it’s penalized, some other countries have resorted to the use of existing censorship tools. Like, for instance, some governments [are] using [Digital Millennium Copyright Act] notice and technical mechanisms to delete or to remove some content from the online sphere. So that also becomes a problematic issue.

So when we speak about, like, how do we go into, like, the practical ways to address this, we really need to identify… some low-level practices [that] connect with the higher-level standards that we aspire to for democracies; and how bigger commitments to the rule of law and to fair elections and to addressing and facing human rights threats goes to the lower level of what are actually doing in governments, what people are actually doing when they are presented with the possibility of exercising some power that can affect the human rights of the population in general. So to summarize a bit of that point, we still see a lot of censorship, surveillance, internet blockings, and also, increasingly, the use of emerging technologies as things that might be threatening to human rights.

And while some of those are not necessarily exclusive to the online sphere, they are certainly been evolving—they have been evolving [for] several years. So we really need to address how those are represented today.

KHUSHBU SHAH: Thank you. Alissa, as our industry expert I want to ask you the same question. And especially I want you to maybe touch upon what J.C. was saying about low-level practices that might be practical.

ALISSA STARZAK: You know, I think I actually want to step back and think about all of this, because I think—I think one of the challenges that we’ve seen, and we certainly heard this in Deputy Secretary Sherman’s remarks—is that technology brings opportunities and risks. And some of the challenges, I think, that we’ve touched on are part of the benefit that we saw initially. So the drawbacks that come from having broad access is that you can cut it off.

And I think that as we go forward, thinking about the Freedom Online Coalition and sort of how this all fits together, the idea is to have conversations about what it looks like long term, what are the drawbacks that come from those low-level areas, making sure that there is an opportunity for activists to bring up the things that are coming up, for industry, sort of folks in my world, to do the same. And making sure that there’s an opportunity for governments to hear it in something that actually looks collaborative.

And so I think that’s our big challenge. We have to find a way to make sure [that] those conversations are robust, that there is dialogue between all of us, and [that] we can both identify the risks that come from low-level practices like that and then also figure out how to mitigate them.

KHUSHBU SHAH: Thank you. And so, back to you—both of you. I’d like to hear from you both about, as part of civil society—we can start with you, Adegoke—what role as an organization, such as the Freedom Online Coalition, what kind of role can it play in all of these issues that we’re talking about as it expands and it grows in its own network?

ADEBOYE ADEGOKE: Yeah. So I think the work of the Freedom Online Coalition is very critical in such a time as this. So when you look at most international or global [platforms] where conversations around technology, its impact, are being discussed, human rights is rarely at the center of the issues. And I think that is where the advocacy comes in terms of highlighting and spotlighting, you know, the relevance of human rights of this issue. And as a matter of fact, not just relevance but the importance of human rights to this issue.

I think the work of the FOC is relevant even more to the Global South than probably it is to the Global North because in the Global South you—our engagement with technology, and I mean at the government level, is only from the—it’s likely from the perspective of… economics and… security. [Human rights] is, sadly, in an early part of the conversation. So, you know, with a platform like the FOC, it’s an opportunity to mainstream human rights into the technology, you know, conversation generally, and it’s a great thing that some of us from that part of the world are able to engage at this level and also bring those lessons back to our work, you know, domestically in terms of how we engage the policy process in our countries.

And that’s why it’s very important for the work of FOC to be expanded to—you know, to have real impact in terms of how it is deliberate—in terms of how it is—it is deliberate in influencing not just regional processes, but also national processes, because the end goal—and I think the beauty of all the beautiful work that is being done by the coalition—is to see how that reflects on what governments, in terms of how governments are engaging technology, in terms of how governments are consciously taking into cognizance the human rights implication of, you know, new emerging technologies and even existing technologies. So I think the FOC is very, very important stakeholder in technology conversation globally.

KHUSHBU SHAH: J.C., I want to ask you the same question, especially as Chile recently joined the FOC in recent years. And love to hear what you think.

JUAN CARLOS LARA: Yeah. I think it’s important to also note what Boye was saying in the larger context of when this has happened for the FOC. Since its creation, we have seen what has happened in terms of shutdowns, in terms of war, in terms of surveillance revelations. So it’s important to also connect what the likemindedness of certain governments and the high-level principles have to do with the practice of those same governments, as well as their policy positions both in foreign policy forums and internally, as the deputy secretary was mentioning.

I think it’s—that vital role that Boye was highlighting, it’s a key role but it’s a work in progress constantly. In which way? Throughout the process of the FOC meeting and producing documents and statements, that’s when the advisory network that Boye and myself are members of was created. Throughout that work, we’ve been able to see what happens inside the coalition and what—the discussions they’re having to some degree, because I understand that some of them might be behind closed doors, and what those—how the process of those statements comes to be.

So we have seen that very important role [in] how it’s produced and how it’s presented by the governments and their dignitaries. However, I still think that it’s a work in progress because we still need to be able to connect that with the practice of governments, including those that are members of the coalition, including my own government that recently joined, and how that is presented in internal policy. And at the same time, I think that key role still has a big room—a big role to play in terms of creating those principles; in terms of developing them into increasingly detailed points of action for the countries that are members of; but also then trying to influence other countries, those that are not members of the coalition, in order to create, like, better standards for human rights for all of internet users.

KHUSHBU SHAH: Any thoughts, Alissa?

ALISSA STARZAK: Yeah. You know, I think J.C. touched on something that is—that is probably relevant for everyone who’s ever worked in government which is the reality that governments are complicated and there isn’t one voice, often, and there frequently what you see is that the people who are focused on one issue may not have the same position as people who are working on it from a different angle. And I think the interesting thing for me about the FOC is not that you have to change that as a fundamental reality, but that it’s an opportunity for people to talk about a particular issue with a focus on human rights and take that position back. So everybody sitting in this room who has an understanding of what human rights online might look like, to be able to say, hey, this is relevant to my government in these ways if you’re a government actor, or for civil society to be able to present a position, that is really meaningful because it means that there’s a voice into each of your governments. It doesn’t mean that you’re going to come out with a definitive position that’s always going to work for everyone or that it’s going to solve all the problems, but it’s a forum. And it’s a forum that’s focused on human rights, and it’s focused on the intersection of those two, which really matters.

So, from an FOC perspective, I think it’s an opportunity. It’s not going to ever be the be all and end all. I think we all probably recognize that. But you need—I think we need a forum like this that really does focus on human rights.

KHUSHBU SHAH: An excellent point and brings me to my next question for you three. Let’s talk specifics, speaking of human rights: internet shutdowns. So we’ve mentioned Russia. Iran comes to mind as well during recent months, during protests, and recently, very recently, the Indian government cut tens of millions of people off in the state of Punjab as they search for a Sikh separatist.

So what else can this look like, J.C.? Those are some really sort of very basic, very obvious examples of internet shutdowns. And how can the FOC and its network of partners support keeping people online?

JUAN CARLOS LARA: Yes, thank you for that question because specifically for Latin America, the way in which shutdowns may present themselves is not necessarily a huge cutting off of the internet for many people. It sometimes presents in other ways, like, for instance, we have seen the case of one country in South America in which their telecommunication networks has been basically abandoned, and therefore, all of the possibilities of using the internet are lost not because the government has decided to cut the cable, but rather because it’s let it rot, or because it presents in the form of partially and locally focused cutting off services for certain platforms.

I think the idea of internet shutdowns has provided awareness about the problems that come with losing access to the internet, but that also can be taken by governments to be able to say they have not shut access to the internet; it’s just that there’s either too much demand in a certain area or that a certain service has failed to continue working, or that it’s simply failures by telecommunication companies, or that a certain platform has not complied with its legal or judicial obligations and therefore it needs to be taken off the internet. So it’s important that when we speak about shutdowns we consider the broader picture and not just the idea of cutting off all of the internet.

KHUSHBU SHAH: Adeboye, I’d like to hear what your thoughts are on this in the context of Nigeria.

ADEBOYE ADEGOKE: Yeah. It’s really very interesting. And to the point, you know, he was making about, you know, in terms of when we talk about shutdown, I think the work around [understanding shutdowns] has been great and it’s really helped the world to understand what is happening globally. But just as he said, I think there are also some other forms of exclusion that [happen] because of government actions and inactions that probably wouldn’t fall on that thematic topic of shutdown, but it, in a way, is some sort of exclusionary, you know, policy.

So an example is in some remote areas in Nigeria, for example, for most of the technology companies who are laying cables, providing internet services, it doesn’t make a lot of business sense for them to be, you know, present in those locations. And to make the matter worse for them, the authorities, the local governments, those are imposing huge taxes on those companies to be able to lay their fiber cables into those communities, which means that for the businesses, for the companies it doesn’t make any economic sense to invest in such locations. And so, by extension, those [kinds] of people are shut down from the internet; they are not able to assess communication network and all of that.

But I also think it’s very important to highlight the fact that—I mean, I come from the continent where internet is shut down for the silliest reason that you can imagine. I mean, there have been [shutdowns] because [the] government was trying to prevent students cheating in exams, you know? Shutdowns are common during elections, you know? [Shutdowns] happen because [the] government was trying to prevent gossip. So it’s the silliest of reasons why there have been internet [shutdowns] in the area, you know, in the part of the world that I am from.

But what I think—in the context of the work that the FOC does, I think something that comes to mind is how we are working to prevent future [shutdowns]. I spoke about the election that just ended in Nigeria. One of the things that we did was to, shortly before the election, organize, like, a stakeholder meeting of government representative, of fact checkers, of, you know, the platforms, the digital companies, civil society [organizations], and electoral [observers]… to say that, OK, election is—if you are from Africa, any time election is coming you are expecting a shutdown. So it’s to have a conversation and say: Election is coming. There is going to be a lot of misinformation. There’s going to be heightened risk online. But what do we need to do to ensure that we don’t have to shut down the internet?

So, for Nigeria, we were able to have that conversation a few weeks before the election, and luckily the [internet was] not shut down. So I mean, I would describe that as a win. But just to emphasize that it is helpful when you engage in a platform like the FOC to understand the dimensions that [shutdowns] take across the world. It kind of helps you to prepare for—especially if you were in the kind of tradition that we were to prepare for potential shutdown. And also I think it’s also good to spotlight the work that Access Now has done with respect to spotlighting the issue of shutdown because it helps to get their perspective.

So, for example, I’m from Nigeria. We have never really experienced widespread shutdown in Nigeria, but because we are seeing it happen in our sister—in our neighboring countries—we are kind of conscious of that and were able to engage ahead of elections to see, oh, during election in Uganda, [the] internet was shut down. In Ethiopia, [the] internet was shut down. So it’s likely [the] internet will be shut down in Nigeria. And then to say to the authority: No, you know what? We don’t have to shut down the internet. This is what we can do. This is the mechanism on [the] ground to identify risk online and address those risks. And also, holding technology platform accountable to make sure that they put mechanism in place, to make sure they communicate those mechanisms clearly during elections.

So it’s interesting how much work needs to go into that, but I think it’s… important work. And I think for the FOC, it’s also—it’s also very important to continue to communicate the work that the FOC is doing in that regard so that more and more people become aware of it, and sort of more people are prepared, you know, to mitigate it, especially where you feel is the highest risk of shutdown.

KHUSHBU SHAH: Thank you. I’m going to jump across to the other side of that spectrum, to surveillance tech, to the—to the almost literally—the opposite, and I wanted to start with the news that Deputy Secretary Sherman mentioned, with the news that the Biden administration announced just this afternoon, a new executive order that would broadly ban US federal agencies from using commercially developed spyware that poses threats to human rights and national security.

The deputy secretary also mentioned, Alissa, some guiding principles that they were going to announce later this week with the FOC. What are some—what are some things—what are some principles or what are some ambitions that you would hope to see later this week?

ALISSA STARZAK: So I think there’s a lot coming is my guess. Certainly the surveillance tech piece is an important component, but I think there are lots of broad guidelines.

I actually want to go back to shutdowns for a second, if you don’t mind…. Because I think it’s a really interesting example of how the FOC can work well together and how you take all of the different pieces—even at this table—of what—how you sort of help work on an internet problem or challenge, right? So you have a world where you have activists on the ground who see particular challenges who would then work with their local government. You have industry partners like Cloudflare who can actually show what’s happening. So are there—is there a shutdown? Is there a network disruption? So you can take the industry component of it, and that provides some information for governments, and then governments can work together to sort of pressure other governments to say these aren’t acceptable. These are—these norms—you can’t—no, you can’t shut down because you are worried about gossip, and cheating, and an exam, right? There’s a set of broad international norms that become relevant in that space, and I think you take that as your example. So you have the players—you have the government to government, you have the civil society to government, you have the industry which provides information to government and civil society. And those are the pieces that can get you to a slightly better place.

And so when I look at the norms coming out later this week, what I’m going to be looking for are that same kind of triangulation of using all of the players in the space to come to a better—to come to a better outcome. So whether that’s surveillance tech, sort of understanding from civil society how it has been used, how you can understand it from other tech companies, how you can sort of mitigate against those abuses, working with governments to sort of address their own use of it to make sure that that doesn’t become a forum—all of those pieces are what you want from that model. And I think—so that’s what I’m looking for in the principles that come out. If they have that triangulation, I’m going to be—I’m going to be very happy.

KHUSHBU SHAH: What would you both be looking for, as well? J.C., I’ll start with you.

JUAN CARLOS LARA: Yeah, as part of the [FOC advisory network], of course, there might be some idea of what’s coming in when we speak about principles for governments for the use of surveillance capabilities.

However, there are two things that I think are very important to consider for this type of issue: first of all is that which principles and which rules are adopted by the states. I mean, it’s a very good—it’s very good news that we have this executive order as a first step towards thinking how states refrain from using surveillance technology disproportionately or indiscriminately. That’s a good sign in general. That’s a very good first step. But secondly, within this same idea, we would expect other countries to follow suit and hopefully to expand the idea of bans on spyware or bans on surveillance technology that by itself may pose grave risks to human rights, and not just in the case of this, or that, or the fact that it’s commercial spyware, which is a very important threat including for countries in Latin America who are regular customers for certain spyware producers and vendors.

But separately from that, I think it’s very important to also understand how this ties into the purposes of the Freedom Online Coalition and its principles, and how to have further principles that hopefully pick up on the learnings that we have had for several years of discussion on the deployment of surveillance technologies, especially by academia and civil society. If those are picked up by the governments themselves as principle, we expect that to exist in practice.

One of the key parts of the discussion on commercial spyware is that I can easily think of a couple of Latin American countries that are regular customers. And one of them is an FOC member. That’s very problematic, when we speak about whether they are abiding by these principles and by human rights obligations or not, and therefore whether these principles will generate any kinds of restraint in the use and the procurement of such surveillance tools.

KHUSHBU SHAH: So I want to follow up on that. Do you think that there—what are the dangers and gaps of having this conversation without proposing privacy legislation? I want to ask both of our—

JUAN CARLOS LARA: Oh, very briefly. Of course, enforcement and the fact that rules may not have the institutional framework to operate I think is a key challenge. That is also tied to capacities, like having people with enough knowledge and have enough, of course, exchange of information between governments. And resources. I think it’s very important that governments are also able to enact the laws that they put in the books, that they are able to enforce them, but also to train every operator, every official that might be in contact with any of these issues. So that kind of principle may not just be adopted as a common practice, but also in the enforcement of the law, so get into the books. Among other things, I think capacities and resources are, like—and collaboration—are key for those things.

KHUSHBU SHAH: Alissa, as our industry expert, I’d like to ask you that same question.

ALISSA STARZAK: You know, I think one of the interesting things about the commercial spyware example is that there is a—there is a government aspect on sort of restricting other people from doing certain things, and then there is one that is a restriction on themselves. And so I think that’s what the executive order is trying to tackle. And I think that the restricting others piece, and sort of building agreement between governments that this is the appropriate thing to do, is—it’s clearly with the objective here, right?

So, no, it’s not that every government does this. I think that there’s a reality of surveillance foreign or domestic, depending on what it looks like. But thinking about building rulesets of when it’s not OK, because I think there is—there can be agreement if we work together on what that ruleset looks like. So we—again, this is the—we have to sort of strive for a better set of rules across the board on when we use certain technologies. And I think—clearly, I think what we’ve heard, the executive order, it’s the first step in that process. Let’s build something bigger than ourselves. Let’s build something that we can work across governments for. And I think that’s a really important first step.

ADEBOYE ADEGOKE: OK. Yeah, so—yeah, so, I think, yeah, the executive order, it’s a good thing. Because I was, you know, thinking to myself, you know, looking back to many years ago when in my—in our work when we started to engage our government regarding the issue of surveillance and, you know, human rights implications and all of that, I recall very vividly a minister at the time—a government minister at the time saying that even the US government is doing it. Why are you telling us not to do it? So I think it’s very important.

Leadership is very key. The founding members of the FOC, if you look FOC, the principles and all of that, those tests are beautiful. Those tests are great. But then there has to be a demonstration of—you know, of application of those tests even by the governments leading, you know, the FOC so that it makes the work of people like us easier, to say these are the best examples around and you don’t get the kind of feedback you get many years ago; like, oh, even the US government is doing it. So I think the executive order is a very good place to start from, to say, OK, so this is what the US government is doing right now and this is how it wants to define their engagement with spyware.

But, of course, like, you know, he said, it has to be, you know, expanded beyond just, you know, concerns around spyware. It has to be expanded to different ways in which advanced technology [is] applied in government. I come from a country that has had to deal with the issues of, you know, terrorism very significantly in the past ten years, thereabout, and so every justification you need for surveillance tech is just on the table. So whenever you want to have the human rights conversation, somebody’s telling you that, you want terrorists to kill all of us? You know? So it’s very important to have some sort of guiding principle.

Yeah, we understand [the] importance of surveillance to security challenges. We understand how it can be deployed for good uses. But we also understand that there are risks to human-rights defenders, to journalists, you know, to people who hold [governments] accountable. And those have to be factored into how these technologies are deployed.

And in terms of, you know, peculiar issues that we have to face, basically you are dealing with issues around oversight. You are dealing with issues around transparency. You are dealing with issues around [a] lack of privacy frameworks, et cetera. So you see African governments, you know, acquiring similar technologies, trying, you know, in the—I don’t want to say in the guise, because there are actually real problems where those technologies might be justified. But then, because of the lack of these principles, these issues around transparency, oversight, legal oversight, human-rights considerations, it then becomes problematic, because this too then become—it’s true that it is used against human-rights defenders. It’s true that it is used against opposition political parties. It’s true that it is used against activists and dissidents in the society.

So it’s very important to say that we look at the principle that has been developed by the FOC, but we want to see FOC government demonstrate leadership in terms of how they apply those principles to the reality. It makes our work easier if that happens, to use that as an example, you know, to engage our government in terms of how this is—how it is done. And I think these examples help a lot. It makes the work very easy—I mean, much easier; not very easy.

KHUSHBU SHAH: Well, you mentioned a good example; so the US. So you reminded me of the biometric data that countries share in Central and North America as they monitor refugees, asylum seekers, migrants. Even the US partakes. And so, you know, what can democracies do to address the issue when they’re sometimes the ones leveraging these same tools? Obviously, it’s not the same as commercial spyware, but—so what are the boundaries of surveillance and appropriate behavior of governments?

J.C., can I throw that question to you?

JUAN CARLOS LARA: Happy to. And we saw a statement by several civil-society organizations on the use of biometric data with [regard] to migrants. And I think it’s very important that we address that as a problem.

I really appreciated that Boye mentioned, like, countries leading by example, because that’s something that we are often expecting from countries that commit themselves to high-level principles and that sign on to human-rights instruments, that sign declarations by the Human Rights Council and the General Assembly of the [United Nations] or some regional forums, including to the point of signing on to FOC principles.

I think that it’s very problematic that things like biometric data are being used—are being collected from people that are in situations of vulnerability, as is the case of very—many migrants and many people that are fleeing from situations of extreme poverty and violence. And I think it’s very problematic also that also leads to [the] exchange of information between governments without proper legal safeguards that prevent that data from falling into the hands of the wrong people, or even that prevent that data from being collected from people that are not consenting to it or without legal authorization.

I think it’s very problematic that countries are allowing themselves to do that under the idea that this is an emergency situation without proper care for the human rights of the people who are suffering from that emergency and that situations of migrations are being treated like something that must be stopped or contained or controlled in some way, rather than addressing the underlying issues or rather than also trying to promote forms of addressing the problems that come with it without violating human rights or without infringing upon their own commitments to human dignity and to human privacy and to the freedom of movement of people.

I think it’s—that it’s part of observing legal frameworks and refraining from collecting data that they are not allowed to, but also to obeying their own human-rights commitments. And that often leads to refraining from taking certain action. And in that regard, I think the discussions that there might be on any kind of emergency still needs to take a few steps back and see what countries are supposed to do and what obligations they are supposed to abide [by] because of their previous commitments.

KHUSHBU SHAH: So thinking about what you’ve just said—and I’m going to take a step back. Alissa, I’m going to ask you kind of a difficult question. We’ve been talking about specific examples of human rights and what it means to have online rights in the digital world. So what does it mean in 2023? As we’re talking about all of this, all these issues around the world, what does it mean to have freedom online and rights in the digital world?

ALISSA STARZAK: Oh, easy question. It’s really easy. Don’t worry; we’ve got that. Freedom Online’s got it; you’ve just got to come to their meetings.

No, I think—I think it’s a really hard question, right? I think that we have—you know, we’ve built something that is big. We’ve built something where we have sort of expectations about access to information, about the free flow of information across borders. And I think that, you know, what we’re looking at now is finding ways to maintain it in a world where we see the problems that sometimes come with it.

So when I look at the—at the what does it mean to have rights online, we want to—we want to have that thing that we aspire to, I think that Deputy Secretary Sherman mentioned, the sort of idea that the internet builds prosperity, that the access to the free flow of information is a good thing that’s good for the economy and good for the people. But then we have to figure out how we build the set of controls that go along with it that are—that protect people, and I think that’s where the rule of law does come into play.

So thinking about how we build standards that are respect—that respect human rights in the—when we’re collecting all of the information of what’s happening online, right, like, maybe we shouldn’t be collecting all of that information. Maybe we should be thinking of other ways of addressing the concerns. Maybe we should be building [a] framework that countries can use that are not us, right, or that people at least don’t point to the things that a country does and say, well, if they can do this, I can do this, right, using it for very different purposes.

And I think—I think that’s the kind of thing that we’re moving—we want to move towards, but that doesn’t really answer the underlying question is the problem, right? So what are the rights online? We want as many rights as possible online while protecting security and safety, which is, you know, also—they’re also individual rights. And it’s always a balance.

KHUSHBU SHAH: It seems like what you’re touching on—J.C., would you like to—

JUAN CARLOS LARA: No. Believe me.

KHUSHBU SHAH: Well, it seems like what you’re talking about—and we’re touching—we’ve, like, talked around this—is, like, there’s a—there’s a sense of impunity, right, when you’re on—like in the virtual world, and that has led to what we’ve talked about for the last forty minutes, right, misinformation/disinformation. And if you think about what we’ve all been talking about for the last few weeks, which is AI—and I know there have been some moments of levity. I was thinking about—I was telling Alissa about how there was an image of the pope wearing a white puffer jacket that’s been being shown around the internets, and I think someone pointed out that it was fake, that it was AI-generated. And so that’s one example. Maybe it’s kind of a fun example, but it’s also a little bit alarming.

And I think about the conversation we’re having, and what I really want to ask all of you is, so, how might these tools—like the AI, the issue of AI—further help or hurt [human rights] activists and democracies as we’re going into uncharted territories, as we’re seeing sort of the impact of it in real time as this conversation around it evolves and how it’s utilized by journalists, by activists, by politicians, by academics? And what should the FOC do—I know I’m asking you again—what can the FOC do? What should we aim for to set the online world on the right path for this uncharted territory? I don’t know who wants to start and attempt.

ADEBOYE ADEGOKE: OK, I’ll start. Yeah.

So I think it’s great that, you know, the FOC has, you know, different task [forces] working on different thematic issues, and I know there is a task force on the issue of artificial intelligence and human rights. So I think for me that’s a starting point, you know, providing core leadership on how emerging technology generally impacts… human rights. I think that’s the starting point in terms of what we need to do because, like the deputy secretary said, you know, technology’s moving at such a pace that we can barely catch up on it. So we cannot—we cannot afford to wait one minute, one second before we start to work on this issue and begin to, you know, investigate the human rights implications of all of those issues. So it’s great that the FOC’s doing that work.

I would just say that it’s very important for—and I think this [speaks] generally to the capacities of the FOC. I think the FOC needs to be further capacitated so that this work can be made to bear in real-life issues, in regional, in national engagement so that some of the hard work that has been put into those processes can really reflect in real, you know, national and regional processes.

ALISSA STARZAK: Yeah. So I definitely agree with that.

I think—I think on all of these issues I think we have a reality of trying to figure out what governments do and then what private companies do, or what sort of happens in industry, and sometimes those are in two different lanes. But in some ways figuring out what governments are allowed to do, so thinking about the sort of negative potential uses of AI may be a good start for thinking about what shouldn’t happen generally. Because if you can set a set of norms, if you can start with a set of norms about what acceptable behavior looks like and where you’re trying to go to, you’re at least moving in the direction of the world that you think you want together, right?

So understanding that you shouldn’t be generating it for the purpose of misinformation or, you know, that—for a variety of other things, at least gets you started. It’s a long—it’s going to be a long road, a long, complicated road. But I think there’s some things that can be done there in the FOC context.

JUAN CARLOS LARA: Yes. And I have to agree with both of you. Specifically, because the idea that we have a Freedom Online Coalition to set standards, or to set principles, and a taskforce that can devote some resources, some time, and discussion to that, can also identify where this is actually the part of the promise and which is the part of the peril. And how governments are going to react in a way that promotes prosperity, that promotes interactivity, and promotes commerce—exercise of human rights, the rights of individuals and groups—and which sides of it become problematic from the side of the use of AI tools, for instance, for detecting certain speech for censorship or for identifying people in the public sphere, because they’re working out on the streets, or to collect and process people without consent.

I think because that type of expertise and that type of high political debate can be held at the FOC, that can promote the type of norms that we need in order to understand, like, what’s the role of governments in order to steer this somewhere. Or whether they should refrain from doing certain actions that might—with the good intention of preventing the spread of AI-generated misinformation or disinformation—that may end up stopping these important tools to be used creatively or to be used in constructive ways, or in ways that can allow more people to be active participants of the digital economy.

KHUSHBU SHAH: Thank you. Well, I want to thank all three of you for this robust conversation around the FOC and the work that it’s engaging in. I want to thank Deputy Secretary Sherman and our host here at the Atlantic Council for this excellent conversation. And so if you’re interested in learning more about the FOC, there’s a great primer on it on the DFRLab website. I recommend you check it out. I read it. It’s excellent. It’s at the bottom of the DFRLab’s registration page for this event.

Watch the full event

The post Wendy Sherman on the United States’ priorities as it takes the helm of the Freedom Online Coalition appeared first on Atlantic Council.

]]>
The 5×5—Conflict in Ukraine’s information environment https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-conflict-in-ukraines-information-environment/ Wed, 22 Mar 2023 04:01:00 +0000 https://www.atlanticcouncil.org/?p=625738 Experts provide insights on the war being waged through the Ukrainian information environment and take away lessons for the future.

The post The 5×5—Conflict in Ukraine’s information environment appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

Just over one year ago, on February 24, 2022, Russia launched a full-scale invasion of neighboring Ukraine. The ensuing conflict, Europe’s largest since World War II, has not only besieged Ukraine physically, but also through the information environment. Through kinetic, cyber, and influence operations, Russia has placed Ukraine’s digital and physical information infrastructure—including its cell towers, networks, data, and the ideas that traverse them—in its crosshairs as it seeks to cripple Ukraine’s defenses and bring its population under Russian control. 

Given the privately owned underpinnings of the cyber and information domains by technology companies, a range of local and global companies have played a significant role in defending the information environment in Ukraine. From Ukrainian telecommunications operators to global cloud and satellite internet providers, the private sector has been woven into Ukrainian defense and resilience. For example, Google’s Threat Analysis Group reported having disrupted over 1,950 instances in 2022 of Russian information operations aimed at degrading support for Ukraine, undermining its government, and building support for the war within Russia. The present conflict in Ukraine offers lessons for states as well as private companies on why public-private cooperation is essential to building resilience in this space, and how these entities can work together more effectively. 

We brought together a group of experts to provide insights on the war being waged through the Ukrainian information environment and take away lessons for the United States and its allies for the future. 

#1 How has conflict in the information environment associated with the war in Ukraine compared to your prior expectations?

Nika Aleksejeva, resident fellow, Baltics, Digital Forensic Research Lab (DFRLab), Atlantic Council

“As the war in Ukraine started, everyone was expecting to see Russia conducting offensive information influence operations targeting Europe. Yes, we have identified and researched Russia’s coordinated information influence campaigns on Meta’s platforms and Telegram. These campaigns targeted primarily European countries, and their execution was unprofessional, sloppy, and without much engagement on respective platforms.” 

Silas Cutler, senior director for cyber threat research, Institute for Security and Technology (IST)

“A remarkable aspect of this conflict has been how Ukraine has maintained communication with the rest of the world. In the days leading up to the conflict, there was a significant concern that Russia would disrupt Ukraine’s ability to report on events as they unfolded. Instead of losing communication, Ukraine has thrived while continuously highlighting through social media its ingenuity within the conflict space. Both the mobilization of its technical workforce through the volunteer IT_Army and its ability to leverage consumer technology, such as drones, have shown the incredible resilience and creativity of the Ukrainian people.” 

Roman Osadchuk, research associate, Eurasia, Digital Forensic Research Lab (DFRLab), Atlantic Council: 

“The information environment was chaotic and tense even before the invasion, as Russia waged a hybrid war since at least the annexation of Crimea and war in Eastern Ukraine in 2014. Therefore, the after-invasion dynamic did not bring significant surprises, but intensified tension and resistance from Ukrainian civil society and government toward Russia’s attempts to explain its unprovoked invasion and muddle the water around its war crimes. The only things that exceeded expectations were the abuse of fact-checking toolbox WarOnFakes and the intensified globalization of the Kremlin’s attempts to tailor messages about the war to their favor globally.” 

Emma Schroeder, associate director, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council

“The information environment has been a central space and pathway throughout which this war is being fought. Russian forces are reaching through that space to attack and spread misinformation, as well as attacking the physical infrastructure underpinning this environment. The behavior, while novel in its scale, is the continuation of Russian strategy in Crimea, and is very much living up to expectations set in that context. What has surpassed expectations is the effectiveness of Ukrainian defenses, in coordination with allies and private sector partners. The degree to which the international community has sprung forward to provide aid and assistance is incredible, especially in the information environment where such global involvement can be so immediate and transformative.” 

Gavin Wilde, senior fellow, Technology and International Affairs Program, Carnegie Endowment for International Peace

“The volume and intensity of cyber and information operations has roughly been in line with my prior expectations, though the degree of private and commercial activity was something that I might not have predicted a year ago. From self-selecting out of the Russian market to swarming to defend Ukrainian networks and infrastructure, the outpouring of support from Western technology and cybersecurity firms was not on my bingo card. Sustaining it and modeling for similar crises are now key.” 

 
#2 What risks do private companies assume in offering support or partnership to states engaged in active conflict?

Aleksejeva: “Fewer and fewer businesses are betting on Russia’s successful economical future. Additionally, supporting Russia in this conflict in any way is morally unacceptable for most Western companies. Chinese and Iranian companies are different. As for Ukraine, supporting it is morally encouraged, but is limited by many practicalities, such as supply chain disruptions amid Russia’s attacks.” 

Cutler: “By providing support during conflict, companies risk becoming a target themselves. Technology companies such as Microsoft, SentinelOne, and Cloudflare, which have publicly reported their support for Ukraine, have been historically targeted by Russian cyber operations and are already familiar with the increased risk. Organizations with pre-conflict commercial relationships may fall under new scrutiny by nationally-aligned hacktivist groups such as Killnet. This support for one side over the other—whether actual or perceived—may result in additional risk.” 

Osadchuk: “An important risk of continuing business as usual [in Russia] is that it may damage a company’s public image and test its declared values, since the continuation of paying taxes within the country-aggressor makes the private company a sponsor of these actions. Another risk for a private company is financial, since the companies that leave a particular market are losing their profits, but this is incomparable to human suffering and losses caused by the aggression. In the case of a Russian invasion, one of the ways to stop the war is to cut funding for and, thus, undermine the Russian war machine and support Ukraine.” 

Schroeder: “Private companies have long provided goods and services to combatants outside of the information environment. The international legal framework restricting combatants to targeting ‘military objects’ provides normative protection, as objects are defined as those ‘whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage’ in a manner proportional to the military gain foreseen by the operation. This definition, however, is still subject to the realities of conflict, wherein combatants will make those decisions to their own best advantage. In the information environment, this question becomes more complicated, as cyber products and services often do not fall neatly within standard categories and where private companies themselves own and operate the very infrastructure over and through which combatants engage. The United States and its allies, whether on a unilateral of supranational basis, work to better define the boundaries of civilian ‘participation’ in war and conflict, as the very nature of the space means that their involvement will only increase.” 

Wilde: “On one hand, it is important not to falsely mirror onto others the constraints of international legal and normative frameworks around armed conflict to which responsible states strive to adhere. Like Russia, some states show no scruples about violating these frameworks in letter or spirit, and seem unlikely to be inhibited by claims of neutrality from companies offering support to victimized states. That said, clarity about where goods and services might be used for civilian versus military objectives is advisable to avoid the thresholds of ‘direct participation’ in war outlined in International Humanitarian Law.”

#3 What useful lessons should the United States and its allies take away from the successes and/or failures of cyber and information operations in Ukraine?

Aleksejeva: “As for cyber operations, so far, we have not seen successful disruptions achieved by Russia of Ukraine and its Western allies. Yes, we are seeing constant attacks, but cyber defense is much more developed on both sides than before 2014. As for information operations, the United States and its allies should become less self-centered and have a clear view of Russia’s influence activities in the so-called Global South where much of the narratives are rooted in anti-Western sentiment.” 

Cutler: “Prior to the start of the conflict, it was strongly believed that a cyber operation, specifically against energy and communication sectors, would act as a precursor to kinetic action. While a WannaCry or NotPetya-scale attack did not occur, the AcidRain attack against the Viasat satellite communication network and other attacks targeting Ukraine’s energy sector highlight that cyber operations of varying effectiveness will play a role in the lead up to a military conflict.” 

Osadchuk: “First, cyber operations coordinate with other attack types, like kinetic operations on the ground, disinformation, and influence operations. Therefore, cyberattacks might be a precursor of an upcoming missile strike, information operation, or any other action in the physical and informational dimensions, so allies could use cyber to model and analyze multi-domain operations. Finally, preparation for and resilience to information and cyber operations are vital in mitigating the consequences of such attacks; thus, updating defense doctrines and improving cyber infrastructure and social resilience are necessary.” 

Schroeder: “Expectations for operations in this environment have exposed clear fractures in the ways that different communities define as success in a wartime operation. Specifically, there is a tendency to equate success with direct or kinetic battlefield impact. One of the biggest lessons that has been both a success and a failure throughout this war is the role that this environment can play. Those at war, from ancient to modern times, have leveraged every asset at their disposal and chosen the tool they see as the best fit for each challenge that arises—cyber is no different. While there is ongoing debate surrounding this question, if cyber operations have not been effective on a battlefield, that does not mean that cyber is ineffective, just that expectations were misplaced. Understanding the myriad roles that cyber can and does play in defense, national security, and conflict is key to creating an effective cross-domain force. 

Wilde: “Foremost is the need to check the assumption that these operations can have decisive utility, particularly in a kinetic wartime context. Moscow placed great faith in its ability to convert widespread digital and societal disruption into geopolitical advantage, only to find years of effort backfiring catastrophically. In other contexts, better trained and resourced militaries might be able to blend cyber and information operations into combined arms campaigns more effectively to achieve discrete objectives. However, it is worth reevaluating the degree to which we assume offensive cyber and information operations can reliably be counted on to play pivotal roles in hot war.”

More from the Cyber Statecraft Initiative:

#4 How do comparisons to other domains of conflict help and/or hurt understanding of conflict in the information domain?

Aleksejeva: “Unlike conventional warfare, information warfare uses information and psychological operations during peace time as well. By masking behind sock puppet or anonymous social media accounts, information influence operations might be perceived as legitimate internal issues that polarize society. A country might be unaware that it is under attack. At the same time, as the goal of conventional warfare is to break an adversary’s defense line, information warfare fights societal resilience by breaking its unity. ‘Divide and rule’ is one of the basic information warfare strategies.” 

Cutler: “When looking at the role of cyber in this conflict, I think it is critical to examine the history of Hacktivist movements. This can be incredibly useful for understanding the influences and capabilities of groups like the IT_Army and Killnet.” 

Osadchuk: “The information domain sometimes reflects the kinetic events on the ground, so comparing these two is helpful and could serve as a behavior predictor. For instance, when the Armed Forces of Ukraine liberate new territories, they also expose war crimes, civilian casualties, and damages inflicted by occupation forces. In reaction to these revelations, the Kremlin propaganda machine usually launches multiple campaigns to distance themselves, blame the victim, or even denounce allegations as staged to muddy the waters for certain observers.” 

Schroeder: “It is often tricky to carry comparisons over different environments and context, but the practice persists because, well, that is just what people do—look for patterns. The ability to carry over patterns and lessons is essential, especially in new environments and with the constant developments of new tools and technologies. Where these comparisons cause problems is when they are used not as a starting point, but as a predetermined answer.” 

Wilde: “It is problematic, in my view, to consider information a warfighting ‘domain,’ particularly because its physical and metaphorical boundaries are endlessly vague and evolving—certainly relative to air, land, sea, and space. The complexities and contingencies in the information environment are infinitely more than those in the latter domains. However talented we may be at collecting and analyzing millions of relevant datapoints with advanced technology, these capabilities may lend us a false sense of our ability to control or subvert the information environment during wartime—from hearts and minds to bits and bytes.”

#5 What conditions might make the current conflict exceptional and not generalizable?

Aleksejeva: “This war is neither ideological nor a war for territories and resources. Russia does not have any ideology that backs up its invasion of Ukraine. It also has a hard time maintaining control of its occupied territories. Instead, Russia has many disinformation-based narratives or stories that justify the invasion to as many Russian citizens as possible including Kremlin officials. Narratives are general and diverse enough, so everyone can find an explanation of the current invasion—be it the alleged rebirth of Nazism in Ukraine, the fight against US hegemony, or the alleged historical right to bring Ukraine back to Russia’s sphere of influence. Though local, the war has global impact and makes countries around the world pick sides. Online and social media platforms, machine translation tools, and big data products provide a great opportunity to bombard any internet user in any part of the world with pro-Russia massaging often tailored to echo historical, racial, and economic resentments especially rooted in colonial past.” 

Cutler: “During the Gulf War, CNN and other cable news networks were able to provide live coverage of military action as it was unfolding. Now, real-time information from conflict areas is more broadly accessible. Telegram and social media have directly shaped the information and narratives from the conflict zone.” 

Osadchuk: “The main difference is the enormous amount of war content, ranging from professional pictures and amateur videos after missile strikes to drone footage of artillery salvos and bodycam footage of fighting in the frontline trenches—all making this conflict the most documented. Second, this war demonstrates the need for drones, satellite imagery, and open-source intelligence for successful operations, which distances it from previous conflicts and wars. Finally, it is exceptional due to the participation of Ukrainian civil society in developing applications, like the one alerting people about incoming shelling or helping find shelter; launching crowdfunding campaigns for vehicles, medical equipment, and even satellite image services; and debunking Russian disinformation on social media.” 

Schroeder: “One of the key lessons we can take from this war is the centrality of the global private sector to conflict in and through the information environment. From expedited construction of cloud infrastructure for the Ukrainian government to Ukrainian telecommunications companies defending and restoring services along the front lines to distributed satellite devices, providing flexible connectivity to civilians and soldiers alike, private companies have undoubtedly played an important role in shaping both the capabilities of the Ukrainian state and the information battlespace itself. While we do not entirely understand the incentives that drove these actions, an undeniable motivation that will be difficult to replicate in other contexts is the combination of Russian outright aggression and comparative economic weakness. Companies and their directors felt motivated to act due to the first and, likely, free to act due to the second. Private sector centrality is unlikely to diminish and, in future conflicts, it will be imperative for combatants to understand the opportunities and dependencies that exist in this space within their own unique context.” 

Wilde: “My sense is that post-war, transatlantic dynamics—from shared norms to politico-military ties—lent significant tailwinds to marshal resource and support to Ukraine (though not as quickly or amply from some quarters as I had hoped). The shared memory of the fight for self-determination in Central and Eastern Europe in the late 1980s to early 1990s still has deep resonance among the publics and capitals of the West. These are unique dynamics, and the degree to which they could be replicated in other theaters of potential conflict is a pretty open question.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Conflict in Ukraine’s information environment appeared first on Atlantic Council.

]]>
Amid Pakistan’s political and economic turmoil, risks to curbs on digital freedoms grow https://www.atlanticcouncil.org/blogs/southasiasource/amid-pakistans-political-and-economic-turmoil-risks-to-curbs-on-digital-freedoms-grow/ Mon, 06 Mar 2023 17:57:22 +0000 https://www.atlanticcouncil.org/?p=619804 Growing polarization and instability in Pakistan have increased the likelihood that as elections draw near, curbs on speech, largely limited thus far to television channels, may extend to internet platforms like YouTube, Facebook, and Twitter.

The post Amid Pakistan’s political and economic turmoil, risks to curbs on digital freedoms grow appeared first on Atlantic Council.

]]>
On March 5, 2023, the Pakistan Media Regulatory Authority (PEMRA) banned television channels in the country from broadcasting former prime minister Imran Khan’s speeches and news conferences, arguing that he was “attacking the state’s institutions and promoting hatred.” Only hours later, Khan challenged the decision through the Lahore High Court, arguing that the ban was “in excess of the jurisdiction vested in it and without having regard to the constitutional rights guaranteed under Articles 19 and 19-A of the Constitution.”

These developments come amid ongoing instability in the country, with the former prime minister continuing to criticize retired army chief General Qamar Javed Bajwa, who Khan argues played a role in ousting him from power in April 2022. Khan has stated a desire to engage with Pakistan’s current military chief General Asim Munir “for the betterment of the country.” 

This is not the first time that television channels have been barred from airing speeches made by Khan or other political leaders: a similar order banning his speeches was issued in November 2022; former prime minister Nawaz Sharif’s speeches were banned in October 2020; and former president Asif Ali Zardari’s interview was taken off air in July 2019.

Growing polarization and instability in the country have increased the likelihood that as elections draw near, curbs on speech, largely limited thus far to television channels, may extend to internet platforms like YouTube, Facebook, and Twitter.

For example, on September 6, 2022, YouTube encountered disruptions across Pakistan ahead of Khan’s speech at a rally. This was not the first such disruption—NetBlocks confirmed that a similar disruption also occurred on August 21, 2022, when Imran Khan was making another public speech. In addition, Wikipedia was blocked (and subsequently unblocked) by the Pakistan Telecommunications Authority (PTA) a few weeks ago for its failure to “remove or block allegedly sacrilegious content.” 

Other notable examples in the recent past include TikTok, which has been banned and unbanned on numerous occasions, and YouTube, which was blocked in the country back in 2012 and was only unblocked by the PTA more than three years later.

These developments make clear that the PTA indeed has the capability to disrupt internet services across Pakistan on a whim, something that journalist Abid Hussain pointed out as far back as April 2021 on Twitter. To further control access to the internet, the PTA has also been seeking to limit the use of virtual private networks in the country.

As the conflict between the current government, the military establishment, and Imran Khan’s Pakistan Tehreek-i-Insaf party sharpens ahead of elections—Punjab, Pakistan’s most populous province, is expected to go to elections on April 30—further curbs on expression and disruptions to the internet, especially platforms like YouTube, Twitter, WhatsApp, and Facebook, cannot be ruled out.

In recent months, US companies and US government stakeholders have often chosen not to react to these developments, preferring to adopt a wait-and-watch approach. In addition, they have followed a strategy to engage privately and discreetly, hoping to positively influence government stakeholders through private conversations.

As the crisis in Pakistan deepens, it is time for diplomatic and business stakeholders with an interest in strengthening its democracy and maintaining a largely open internet in the country to shift their approach. 

Given the evolving situation, these stakeholders should consider the following steps to proactively deter further curbs on expression on the internet in Pakistan:

  1. Enhance level of engagement with domestic civil society: Recent weeks have seen a flurry of concerning developments in Pakistan, with the recent PEMRA order being the key development. US companies and diplomats must deepen conversations with civil society stakeholders, especially the digital rights community that has been voicing these concerns for years.
  1. Proactively communicate concerns to Pakistani government officials: Ongoing diplomatic conversations between Islamabad and Washington have focused on the potential for deepening investment in the country’s technology sector. The PTA’s recent and past actions, however, undermine confidence in Pakistan’s internet economy and it is important that the negative economic impact of arbitrary bans and disruptions to the internet is clearly communicated to Pakistani stakeholders.
  1. Build new alliances with the technology and content creator ecosystem: In private conversations, members of Pakistan’s burgeoning technology and content creation ecosystem continue to express growing concern over curbs on freedom of expression. These stakeholders are domestic allies for companies like Meta, Google, and Twitter. However, limited interactions and collaboration with these stakeholders mean that more often than not, a united front is not presented to deter Pakistani government stakeholders from taking adverse actions that curb expression, undermine democracy, and hurt confidence in the country’s digital economy.

The coming months will be a challenging period for Pakistan’s flawed and floundering democracy. This challenge will be compounded by the state’s own capabilities and predilections to curb expression both in the traditional  media and the internet. 

With the PTI and Imran Khan possessing a strong advantage in their ability to digitally percolate party messaging through Pakistani society, the government and its institutions may be incentivized to take drastic measures to disrupt internet services and platforms that allow Khan to bypass television channels who may not air his speeches. As elections draw near, the likelihood of such actions is increasing. For this reason, it is important for US stakeholders—including private sector companies—to proactively monitor the evolving situation and develop strategies to deter such actions. 

Doing so may perhaps safeguard Pakistan’s internet economy, its democracy, and the global reputation of internet platforms that are vital to public discourse within and outside Pakistan.

Uzair Younus is director of the Pakistan Initiative at the Atlantic Council’s South Asia Center. He also is the Vice President at The Asia Group.

The South Asia Center serves as the Atlantic Council’s focal point for work on the region as well as relations between these countries, neighboring regions, Europe, and the United States.

The post Amid Pakistan’s political and economic turmoil, risks to curbs on digital freedoms grow appeared first on Atlantic Council.

]]>
Critical connectivity: Reducing the price of data in African markets https://www.atlanticcouncil.org/in-depth-research-reports/report/critical-connectivity-reducing-the-price-of-data-in-african-markets/ Fri, 03 Mar 2023 20:35:27 +0000 https://www.atlanticcouncil.org/?p=617879 This report analyzes the current state of the digital transformation in Africa and outlines how affordable and accessible data is imperative for further development.

The post Critical connectivity: Reducing the price of data in African markets appeared first on Atlantic Council.

]]>

This report is part of an ongoing partnership on the Power of African Creative Industries between The Policy Center for the New South (PCNS) and the Atlantic Council’s Africa Center.

“Critical connectivity: Reducing the price of data in African markets,” by Africa Center Senior Fellow Aubrey Hruby, analyzes the current state of the digital transformation in Africa and outlines how affordable and accessible data is imperative for further development. Finally, it provides concrete recommendations to the key actors and facilitators of the transition outlined in the Digital Transformation with Africa; a new initiative the Biden administration announced at the 2022 US-Africa Leaders Summit, which emphasizes the importance of reducing data costs in Africa to spur growth and employment.

In outlining why data remains so costly and inaccessible across Africa, Hruby profiles four main detriments: infrastructure, competition, policy, and consumption patterns. Through case studies and success stories from other developing nations who struggled with high-priced data and implemented successful mitigation measures, Hruby develops a framework for reform and showcases how key changes can rapidly reduce data costs, spur development, and transform entire industries. Her recommendations directly address the current US administration, African governments seeking to build and benefit from a digital economy, and global development finance institutions (DFIs) that are already investing and making much needed transformative inroads into African markets.

Throughout the 21st century, African markets have unleashed the globe’s most significant digital revolution, and they are poised to continue doing so over the next few decades as the world’s youngest population reaches maturity. Currently, 40 percent of the continent’s total population is under the age of 15 and represents 27 percent of the entire world population. From 2000 to 2010, the African mobile phone market grew at a rate of 44 percent per year, bringing the number of subscriptions to around 700 million, more than in both the European Union and the United States combined. For African creative and mobile industries, which are emerging at the forefront of this digital revolution, infrastructure and technological systems are critical to the sector’s continued growth. The African Continental Free Trade Area connects 1.3 billion people across fifty-five countries with a combined GDP of over $3 trillion. Digital infrastructure is a vital economic opportunity and a crucial security issue for African nations and their partners.

The African vision is increasingly shaped by the digital tools and platforms African consumers use and the new opportunities that have emerged in a growing start-up ecosystem. According to the UN, the digital economy is set to expand in Africa by 57 percent between 2020 and 2025. With projections by the Alliance for Affordable Internet forecasting that the continent’s digital economy will grow six times over by 2050 to $712 billion and the fact that African startups raised more than $4 billion in venture capital in 2021, it is clear that this sector is booming. Undoubtedly the future is digital, and Africa must be able to access this future affordably if it is to share in the benefits of this global revolution.

The Atlantic Council is the only DC global think tank to have placed African creative industries at the center of its security and prosperity work. The Africa Center’s focus on the creative industries was launched by the Africa Creative Industries Summit of Washington in October 2021 at the Smithsonian National Museum of African Art and was opened by a message from Vice President Kamala Harris. The program is now fully supported by strong sponsors and partners, from ADS Group and Afreximbank to OSF and OCP, allowing the Atlantic Council to continue its leadership in the field by hosting events such as the Sports Business Forum, held in Dakar, and the financial engineering task force for African creative industries. This work was crowned by the Africa Center’s partnership with the US Department of State and its participation in the organization of the African and Young Leaders Diaspora Forum on the first official day of the US-Africa Leaders Summit of December 2022 at the African American Museum of History and Culture in Washington.

Report author

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

The post Critical connectivity: Reducing the price of data in African markets appeared first on Atlantic Council.

]]>
Russian War Report: DFRLab confirms increased Russian air force activity as Kremlin strives to achieve air dominance https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-dfrlab-confirms-increased-russian-air-force-activity-as-kremlin-strives-to-achieve-air-dominance/ Fri, 03 Mar 2023 18:18:49 +0000 https://www.atlanticcouncil.org/?p=619190 Russia intensified its air power in recent weeks across airfields in Crimea and Rostov Oblast. Elsewhere, Russia continues to pressure Bahkmut.

The post Russian War Report: DFRLab confirms increased Russian air force activity as Kremlin strives to achieve air dominance appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

DFRLab confirms increased Russian air force activity as Kremlin strives to achieve air dominance

Russian army continues to pressure Ukraine in Bakhmut

Tracking narratives

Volunteer Russian unit fighting for Ukraine reportedly infiltrates Bryansk

Kremlin-linked Telegram networks coordinated to spread disinformation around the world

Media policy

Report examines Russia’s decentralized approach to internet censorship

DFRLab confirms increased Russian air force activity as Kremlin strives to achieve air dominance

The DFRLab confirmed that the Russian General Staff has intensified its air power in recent weeks across airfields in Crimea and Rostov Oblast. Satellite imagery collected by the DFRLab throughout February indicates that Russian air forces have increased their aerial activity at the Saki military airbase in western Crimea. Several MiG and Sukhoi class fighter aircraft have been identified in standby positions or on the runway.

DFRLab satellite analysis shows increased Russian aerial activity on the Saki military airbase in western Crimea. (Source: DFRLab via Planet.com)
DFRLab satellite analysis shows increased Russian aerial activity on the Saki military airbase in western Crimea. (Source: DFRLab via Planet.com)

The DFRLab’s findings are consistent with those published by open-source researcher Brady Africk, who identified seven different instances of aircraft located in the south of Ukraine on Sentinel-2 satellite imagery. The European Space Agency’s satellite imagery also serves as open-source evidence of the aircraft’s direction, located in the different color bands of Sentinel-2.


Screenshot of a tweet from Brady Africk, who identified seven different instances of aircraft located in the south of Ukraine on Sentinel-2 satellite imagery. (Source: Twitter/archive)
Screenshot of a tweet from Brady Africk, who identified seven different instances of aircraft located in the south of Ukraine on Sentinel-2 satellite imagery. (Source: Twitter/archive)

In addition, explosions reported at the Yeysk military air base in Krasnodar Krai further suggest the Russian army has been increasingly intensifying its air maneuvers. Geolocated footage of a Sukhoi-25 fighter aircraft near Luhansk indicated that further maneuvers can be expected from Russia’s western air base of Millerovo. The DFRLab also assessed that air activity possibly occurred during the last week of February at a seemingly deserted airfield south of Luhansk. Satellite imagery shows that although the meteorological conditions in January and February were mostly snowy, the main runway and several pads dedicated to aircrafts and helicopters were consistently clear of snow. Satellite imagery has not yet detected aircraft at the site, however, so it is unclear what class of aircraft is currently deployed in this airfield. Nevertheless, the operation of MiG and Sukhoi class fighters could be responsible for the melting snow on the pads.  

Google Earth imagery from 2021 showed the airbase in dire condition, which could support the claim of its low military activity.

Satellite imagery of the Southern Luhansk air base. Source: DFRLab via Planet.com
Satellite imagery of the Southern Luhansk air base. Source: DFRLab via Planet.com

As battles intensify to seize Bakhmut, the southern air base near Luhansk could serve as a strategic advantage for the Russian armed forces as it requires less fuel and maneuvers. 

Meanwhile, Ukrainian forces continue to target strategic Russian installations on the southern front. On March 1, the Russian defense ministry claimed it had downed more than ten Ukrainian unmanned aerial vehicles (UAVs) in an attack against occupied Crimea. This comes as unverified reports suggested a Ukrainian UJ-22 drone was also downed on February 28 between Moscow and Ryazan. Ukrainian presidential advisor Mykhailo Podolyak denied the accusation and said Ukraine is not launching attacks on Russian soil; he claimed the increased aerial strikes on infrastructure were the result of “internal attacks.” Open-source evidence suggests explosions near Yalta and Bakhchysarai, Crimea, could have resulted from other projectiles, not exclusively drone strikes.

Valentin Châtelet, Research Associate, Security, Brussels, Belgium 

Russian army continues to pressure Ukraine in Bakhmut

Russian forces continue their efforts to encircle and capture the eastern Ukrainian city of Bakhmut. Interviewed by Reuters on February 28, the commander of Ukraine’s ground forces described the situation as “extremely tense.” Russian troops, including Wagner units, are attempting to cut Ukraine’s supply lines to the city in a bid to force troops to surrender or withdraw. 

On February 28, pro-Russia sources shared a video showing Russian Su-25 fighter jets deployed over Bakhmut. The lack of adequate air support has been among the primary sources of friction between the Russian General Staff and the units fighting in Bakhmut. Footage from Ukraine’s 93rd Separate Mechanized Brigade shows fighting escalating, but Ukrainian forces appeared to be holding off the advance at the time of writing. On February 27 and 28, Ukrainian soldiers repelled more than sixty attacks, including on the villages of Yahidne and Berkhivka, north of Bakhmut. According to a pro-Russia blogger’s Telegram channel, Wagner units are advancing north of Bakhmut, but Ukraine’s army has not retreated. Amid heavy fighting, Wagner reportedly advanced on February 27 towards the AZOM metallurgical plant in north Bakhmut. 

Rybar, a Russian Telegram channel believed to be linked to the defense ministry, claimed on March 2 that Wagner’s troops had reached the western suburbs of Bakhmut and clashed with Ukrainian forces in the hills north of the area. According to Rybar, Russian troops approached the road between Chasiv Yar and Bakhmut. On March 2, The Insider reported that Bakhmut was under operative siege as Ukraine’s army repelled attacks in Orikhovo, Vasylivka, Dubovo, Khromove, and Ivanivske. 

Meanwhile, NATO Secretary-General Jens Stoltenberg told a Helsinki summit on February 28 that the end of the war in Ukraine “would not lead to normalization” of relations with Russia.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Volunteer Russian unit fighting for Ukraine reportedly infiltrates Bryansk

Russian government figures, Kremlin media, and pro-Russia Telegram channels are heavily focused on an alleged March 2 incursion by pro-Ukraine forces in the Russian village of Sushany, Bryansk oblast, approximately one kilometer away from Ukraine’s north-central border with Russia. DW News and Radio Free Europe reported that members of the Russian RDK volunteer corps crossed into Russia and were active in the Bryansk area at the time of publishing.

Google satellite imagery shows the village of Sushany. (Source: DFRLab via Google Maps).
Google satellite imagery shows the village of Sushany. (Source: DFRLab via Google Maps)

According to DW News, RDK is “a unit of volunteers from Russia who have been fighting on the side of Ukraine since August 2022.” Initially, Ukrainian authorities dismissed the claims of an insurgency in the Russian village as a Russian false-flag operation. However, a video published on the official RDK Telegram channel showed fighters holding the unit flag and indicating a Russian government building behind them. In the video, and later in follow-up interviews, members of the unit adamantly denied claims spread by Russia that they had attacked the civilian population. They stated that the infiltration into Russian territory was done to sabotage Russian military targets. Additional reporting confirmed that RDK leader Denis Nikitin appeared in the video.

A screengrab from the RDK Telegram video shows a sign for the Health Services building of Liubechane village, approximately 17 km north of Sushany, on the Russian border. (Source: Telegram)
A screengrab from the RDK Telegram video shows a sign for the Health Services building of Liubechane village, approximately 17 km north of Sushany, on the Russian border. (Source: Telegram)

Russian Telegram channels and media did not distinguish that the volunteer troops are of Russian origin; instead they reported that a group of “Ukrainian saboteurs” had infiltrated sovereign Russian territory. The governor of Bryansk announced on March 2 that “saboteurs” had attacked the civilian population, killed a man, and taken hostages. President Vladimir Putin described the incident as a “terrorist attack” and condemned the alleged unprovoked shelling of a civilian vehicle. The Kremlin said it was closely monitoring the situation and continued to label the alleged insurgents as “Ukrainian militants.” It also tasked the Federal Security Service with conducting counterterrorism operations in response to the situation in Bryansk. 

Russia also suggested that the Center of the Psychological Operations of the Ukrainian Armed Forces (Центринформационно-психологических операций ВСУ) may have been responsible for the “attacks on civilians and infrastructure” in Bryansk, again making no distinction between the RDK and the official Ukrainian military. Echoing the Kremlin’s “terrorism” claim, far-right nationalist State Duma member Aleksey Zhuravlyov labeled the Ukrainian military and political leadership as “terrorists” in official public statements and called for an escalation of the “special military operation” into open war. 

As the conflict along the eastern flank intensifies, escalatory narratives involving northern regions of Ukraine could serve as a critical Kremlin tool for conducting operations into the northern border, where Russian forces could tap into already stationed and mobilized Belarusian troops, military bases, and equipment, along with their own units left behind following joint military training exercises between Russia and Belarus. 

Kateryna Halstead, Research Assistant, Bologna, Italy 

Kremlin-linked Telegram networks coordinated to spread disinformation around the world

The DFRLab recently discovered fifty-six pro-Kremlin Telegram channels that targeted twenty countries with pro-Kremlin disinformation. Three networks of similarly named accounts — Surf Noise, Info Defense, and Node of Time — targeted users worldwide, including in Europe, Asia, South America, and the Middle East. The operation primarily relied on volunteer work. It focused on translating and spreading pro-Russia disinformation, as well as amplifying reports from Kremlin media outlets, state organizations, and state actors. 

The DFRLab found clear coordination between the three networks, but the approach to capturing a global audience was unsophisticated. The DFRLab consulted its global team of researchers to examine the accuracy of translations and found that the quality of translations was poor.

Nika Aleksejeva, Research Fellow, Riga, Latvia 

Sayyara Mammadova, Research Assistant, Warsaw, Poland 

Report examines Russia’s decentralized approach to internet censorship

Russian digital rights organization Roskomsvaboda collaborated with the Open Observatory of Network Interference (OONI) to publish a report examining “a year of military censorship in Russia.” The report reviews censored topics, websites, and services, as well as the legislative mechanisms used to enforce the censorship. 

According to the report, Russia blocked 494 domains over the course of 2022. These fell into twenty-eight categories, with news media representing the largest category, followed by social networks, human rights organizations, and circumvention tools. 

The report found that “more than 247,492 URLs were added to Roskomnadzor’s registry of banned websites” in the past year. However, the orders to ban content did not only come from Russia’s internet regulator. Other Russian agencies that requested websites be blocked include the federal tax service, Russian courts, and the prosecutor general’s office, among others. The report’s authors found over 3,500 instances of an entity anonymously requesting a website block. 

While blocking requests are centralized through Roskomnadzor’s registry, the implementation of internet censorship in Russia is decentralized, the report concluded. The authors found forty-eight of the 494 blocked domains were absent in Roskomnadzor’s registry. The report suggested that some internet providers in Russia can block content not listed in Roskomnadzor’s registry. 

Eto Buziashvili, Research Associate, Tbilisi, Georgia

The post Russian War Report: DFRLab confirms increased Russian air force activity as Kremlin strives to achieve air dominance appeared first on Atlantic Council.

]]>
A parallel terrain: Public-private defense of the Ukrainian information environment https://www.atlanticcouncil.org/in-depth-research-reports/report/a-parallel-terrain-public-private-defense-of-the-ukrainian-information-environment/ Mon, 27 Feb 2023 05:01:00 +0000 https://www.atlanticcouncil.org/?p=615692 The report analyzes Russia’s continuous assaults against the Ukrainian information environment, and examines how Russian offensives and Ukrainian defense both move through this largely privately owned and operated environment. The report highlights key questions that must emerge around the growing role that private companies play in conflict.

The post A parallel terrain: Public-private defense of the Ukrainian information environment appeared first on Atlantic Council.

]]>

Executive summary

In the year since the Russian invasion of Ukraine, the conventional assault and advances into Ukrainian territory have been paralleled by a simultaneous invasion of the Ukrainian information environment. This environment, composed of cyber infrastructure, both digital and physical, and the data, networks, and ideas that flow through and across it, is more than a domain through which the combatants engage or a set of tools by which combatants interact—it is a parallel territory that Russia is intent on severing from the global environment and claiming for itself.

Russian assaults on the Ukrainian information environment are conducted against, and through, largely privately owned infrastructure, and Ukrainian defense in this space is likewise bound up in cooperative efforts with those infrastructure owners and other technology companies providing aid and assistance. The role of private companies in this conflict seems likely to grow, along with the scale, complexity, and criticality of the information infrastructure they operate.

Examining and mitigating the risks related to the involvement of private technology companies in the war in Ukraine is crucial and looking forward, the United States government must also examine the same questions with regard to its own security and defense:

  1. What is the complete incentive structure behind a company’s decision to provide products or services to a state at war?
  2. How dependent are states on the privately held portions of the information environment, including infrastructure, tools, knowledge, data, skills, and more, for their own national security and defense?
  3. How can the public and private sectors work together better as partners to understand and prepare these areas of reliance during peace and across the continuum of conflict in a sustained, rather than ad hoc, nature?

Russia’s war against Ukraine is not over and similar aggressions are likely to occur in new contexts and with new actors in the future. By learning these lessons now and strengthening the government’s ability to work cooperatively with the private sector in and through the information space, the United States will be more effective and resilient against future threats.

Introduction

Russia’s invasion of Ukraine in 2022 held none of the illusory cover of its 2014 operation; instead of “little green men” unclaimed by Moscow, Putin built up his forces on Ukraine’s border for the entire international community to see. His ambitions were clear: To remove and replace the elected government of Ukraine with a figurehead who would pull the country back under Russia’s hold, whether through literal absorption of the state or by subsuming the entire Ukrainian population under Russia’s political and information control. In the year since the Russian invasion, Ukraine’s defense has held back the Russian war machine with far greater strength than many thought possible in the early months of 2022. President Zelenskyy, the Ukrainian government, and the Ukrainian people have repeatedly repelled Russian attempts to topple the state, buttressed in part by the outpouring of assistance from not just allied states, but also local and transnational private sector companies.

Amidst the largest conventional land war in Europe since the fall of the Third Reich, both Russia and Ukraine have directed considerable effort toward the conflict’s information environment, defined as the physical and digital infrastructure over and through which information moves, the tools used to interact with that information, and information itself. This is not only a domain through which combatants engage, but a parallel territory that the Kremlin seeks to contest and claim. Russian efforts in this realm, to destroy or replace Ukraine’s underpinning infrastructure and inhibit the accessibility and reach of infrastructure and tools within the environment, are countered by a Ukrainian defense that prioritizes openness and accessibility.

The information environment, and all the components therein, is not a state or military dominated environment; it is largely owned, operated, and populated by private organizations and individuals around the globe. The Ukrainian information environment, referring to Ukrainian infrastructure operators, service providers, and users, is linked to and part of a global environment of state and non-state actors where the infrastructure and the terrain is largely private. Russian operations within the Ukrainian information environment are conducted against, and through, this privately owned infrastructure, and the Ukrainian defense is likewise bound up in cooperative efforts with those infrastructure owners and other technology companies that are providing aid and assistance. These efforts have contributed materially, and in some cases uniquely, to Ukraine’s defense.

The centrality of this environment to the conduct of this war, raises important questions about the degree to which states and societies are dependent on information infrastructure and functionalities owned and operated by private actors, and especially transnational private actors. Although private sector involvement in the war in Ukraine has generally been positive, the fact that the conduct of war and other responsibilities in the realm of statehood are reliant on private actors leads to new challenges for these companies, for the Ukrainian government, and for the United States and allies.

The United States government must improve its understanding of, and facility for, joint public-private action to contest over and through the information environment. The recommendations in this report are intended to facilitate the ability of US technology companies to send necessary aid to Ukraine, ensure that the US government has a complete picture of US private-sector involvement in the war in Ukraine, and contribute more effectively to the resilience of the Ukrainian information environment. First, the US government should issue a directive providing assurance and clarification as to the legality of private sector cyber, information, capacity building, and technical aid to Ukraine. Second, a task force pulling from agencies and offices across government should coordinate to track past, current, and future aid from the private sector in these areas to create a better map of US collaboration with Ukraine across the public and private sectors. Third, the US government should increase its facilitation of private technology aid by providing logistical and financial support.

These recommendations, focused on Ukraine’s defense, are borne of and provoke larger questions that will only become more important to tackle. The information environment and attempts to control it have long been a facet of conflict, but the centrality of privately owned and operated technology—and the primacy of some private sector security capabilities in relation to all but a handful of states—pose increasingly novel challenges to the United States and allied policymaking communities. Especially in future conflicts, the risks associated with private sector action in defense of, or directly against, a combatant could be significantly greater and multifaceted, rendering existing cooperative models insufficient.

The Russian information offensive

The Russian Federation Ministry of Foreign Affairs defines information space—of which cyberspace is a part—as “the sphere of activity connected with the formation, creation, conversion, transfer, use, and storage of information and which has an effect on individual and social consciousness, the information infrastructure, and information itself.1 Isolating the Ukrainian information space is key to both the short- and long-term plans of the Russian government. In the short term, the Kremlin pursues efforts to control both the flow and content of communications across the occupied areas.2 In the longer term, occupation of the information environment represents an integral step in Russian plans to occupy and claim control over the Ukrainian population.

In distinct opposition to the global nature of the information environment, over the past decade or so, the Kremlin has produced successive legislation “to impose ‘sovereignty’ over the infrastructure, content, and data traversing Russia’s ‘information space,’” creating a sectioned-off portion of the internet now known as RuNet.3 Within this space, the Russian government has greater control over what information Russian citizens see and a greater ability to monitor what Russian citizens do online.4 This exclusionary interpretation is an exercise in regime security against what the Kremlin perceives as constant Western information warfare against it.5 As Gavin Wilde, senior fellow with the Carnegie Endowment for International Peace, writes, the Russian government views the information environment “as an ecosystem to be decisively dominated.”6

To the Kremlin, domination of the information environment in Ukraine is an essential step toward pulling the nation into its fold and under its control. Just as Putin views information domination as critical to his regime’s exercise of power within Russia, in Ukraine, Russian forces systematically conduct offensives against the Ukrainian information environment in an attempt to create a similar model of influence and control that would further enable physical domination. This strategy is evident across the Kremlin’s efforts to weaken the Ukrainian state for the last decade at least. In the 2014 and 2022 invasions, occupied, annexed, and newly “independent” regions of Ukraine were variously cut off from the wider information space and pulled into the restricted Russian information space.  

The Crimean precedent – 2014 

The Russian invasion of Ukraine did not begin in 2022, but in 2014. Examining this earlier Russian incursion illustrates the pattern of Russian offensive behavior in and through the information environment going back nearly a decade—a combination of physical, cyber, financial, and informational maneuvers that largely target or move through private information infrastructure. In 2014, although obfuscated behind a carefully constructed veil of legitimacy, Russian forces specifically targeted Ukrainian information infrastructure to separate the Crimean population from the Ukrainian information environment, and thereby the global information environment, and filled that vacuum with Russian infrastructure and information. 

The Russian invasion of eastern Ukraine in 2014 was a direct response to the year-long Euromaidan Revolution, which took place across Ukraine in protest of then-President Viktor Yanukovych’s decision to spurn closer relations with the European Union and ignore growing calls to counter Russian influence and corruption within the Ukrainian government. These protests were organized, mobilized, and sustained partially through coordination, information exchange, and message amplification over social media sites like Facebook, Twitter, YouTube, and Ustream—as well as traditional media.7 In February 2014, after Yanukovych fled to Russia, the Ukrainian parliament established a new acting government and announced that elections for a new president would be held in May. Tensions immediately heightened, as Russian forces began operating in Crimea with the approval of Federal Assembly of Russia at the request of “President” Yanukovych, although Putin denied that they were anything other than “local self-defense forces.”8 On March 21, Putin signed the annexation of Crimea.9

During the February 2014 invasion of Crimea, the seizure and co-option of Ukrainian physical information infrastructure was a priority. Reportedly, among the first targets of Russian special forces was the Simferopol Internet Exchange Point (IXP), a network facility that enables internet traffic exchange.10 Ukraine’s state-owned telecommunications company Ukrtelecom reported that armed men seized its offices in Crimea and tampered with fiber-optic internet and telephone cables.11 Following the raid, the company lost the “technical capacity to provide connection between the peninsula and the rest of Ukraine and probably across the peninsula, too.”12 Around the same time, the head of the Security Service of Ukraine (SBU), Valentyn Nalivaichenko, reported that the mobile phones of Ukrainian parliament members, including his own, were blocked from connecting through Ukrtelecom networks in Crimea.13

Over the next three years, and through the “progressive centralization of routing paths and monopolization of Internet Service market in Crimea … the topology of Crimean networks has evolved to a singular state where paths bound to the peninsula converge to two ISPs (Rosetelecom and Fiord),” owned and operated by Russia.14 Russian forces manipulated the Border Gateway Protocol (BGP)—the system that helps connects user traffic flowing from ISPs to the wider internet—modifying routes to force Crimean internet traffic through Russian systems, “drawing a kind of ‘digital frontline’ consistent with the military one.”15 Residents of Crimea found their choices increasingly limited, until their internet service could only route through Russia, instead of Ukraine, subject to the same level of censorship and internet controls as in Russia. The Russian Federal Security Service (FSB) monitored communications from residents of Crimea, both within the peninsula and with people in Ukraine and beyond.16 Collaboration between ISPs operating in Crimea through Russian servers and the FSB appears to be a crucial piece of this wider monitoring effort. This claim was partially confirmed by a 2018 Russian decree that forbade internet providers from publicly sharing any information regarding their cooperation with “the authorized state bodies carrying out search and investigative activities to ensure the security of the Russian Federation.”17

From March to June 2014, Russian state-owned telecom company Rostelcom began and completed construction of the Kerch Strait cable, measuring 46 kilometers (about 28.5 miles) and costing somewhere between $11 and $25 million, to connect the Crimean internet with the Russian RuNet.18 Rostelcom, using a local agent in Crimea called Miranda Media, became the main transit network for several Crimean internet service providers (ISPs), including KCT, ACS-Group, CrimeaCom, and CRELCOM in a short period of time.19 There was a slower transition of customers from the Ukrainian company Datagroup to Russian ISPs, but nonetheless, the number of Datagroup customers in Crimea greatly decreased throughout 2014. According to one ISP interviewed by Romain Fontugne, Ksenia Ermoshina, and Emile Aben, “the Kerch Strait cable was used first of all for voice communication … The traffic capacity of this cable was rather weak for commercial communications.”20 But by the end of 2017, remnant usage of Ukrainian ISPs had virtually disappeared, following the completion of a second, better internet cable through the Kerch Strait and a series of restrictions placed on Russian social media platforms, news outlets, and a major search engine by Ukrainian President Poroshenko.21 The combination of the new restrictions, and the improved service of Russian ISPs encouraged more Crimeans to move away from Ukrainian ISPs. 

Russia’s efforts to control the information environment within Crimea, and the Russian government’s ability to monitor communications and restrict access to non-Russian approved servers, severely curtailed freedom of expression and belief—earning the region zero out of four in this category from Freedom House.22 Through physical, and formerly private, information infrastructure, Russia was able to largely take control of the information environment within Crimea. 

A parallel occupation – 2022 

Digital information infrastructure 

Just as in 2014, one of the first priorities of invading Russian forces in 2022 was the assault of key Ukrainian information infrastructure, including digital infrastructure. Before, during, and following the invasion, Russian and Russian-aligned forces targeted Ukrainian digital infrastructure through cyber operations, ranging in type, target, and sophistication. Through some combination of Ukrainian preparedness, partner intervention, and Russian planning shortfalls, among other factors, large-scale cyber operations disrupting Ukrainian critical infrastructure, such as those seen previously in 2015 with BlackEnergy and NotPetya, did not materialize.23 This could be because such cyber operations require significant time and resources, and similar ends can be more cheaply achieved through direct, physical means. Russian cyber operators, however, have not been idle.  

Preceding the physical invasion, there was a spate of activity attributed to both Russian and Russian-aligned organizations targeting a combination of state and private organizations.24 From January 13 to 14, for example, hackers briefly took control of seventy Ukrainian government websites, including the Ministries of Defense and Foreign Affairs, adding threatening messages to the top of these official sites.25 The following day, January 15, Microsoft’s Threat Intelligence Center reported the discovery of wiper malware, disguised as ransomware, in dozens of Ukrainian government systems, including agencies which “provide critical executive branch or emergency response function,” and an information technology firm that services those agencies.26 A month later, on February 15, Russian hackers targeted several websites with distributed denial of service (DDoS) attacks, forcing Ukrainian defense ministry and armed forces websites, as well as those of PrivatBank and Oschadbank, offline.27  Around the same time, according to Microsoft’s special report on Ukraine, “likely” Russian actors were discovered in the networks of unidentified critical infrastructure in Odessa and Sumy.28 The day before the invasion, cybersecurity companies ESET and Symantec reported that a new destructive wiper was spreading across Ukrainian, Latvian, and Lithuanian networks, as a second round of DDoS attacks again took down a spate of government and financial institution websites.“29 This activity centered around information—with defacements sending a clear threat to the Ukrainian government and population, DDoS attacks impairing accurate communication, and wiper malware degrading Ukrainian data—and gaining access to Ukrainian data for Russia. Although many of these operations targeted Ukrainian government networks, the attacks moved through or against privately operated infrastructure and, notably, the first public notification and detailing of several of these operations was undertaken by transnational technology companies.  

After February 24, Russian cyber activity continued and the targets included a number of private information infrastructure operators. A March hack of Ukrtelecom—Ukraine’s largest landline operator, which also provides internet and mobile services to civilians and the Ukrainian government and military—resulted in a collapse of the company’s network to just 13 percent capacity, the most severe disruption in service the firm recorded since the invasion began.30 Another such operation targeted Triolan—a Ukrainian telecommunications provider—on February 24 in tandem with the physical offensive and a second time on March 9. These incursions on the Triolan network took down key nodes and caused widespread service outages. Following the March 9 attack, the company was able to restore service, but these efforts were complicated by the need to physically access some of the equipment located in active conflict zones.31 These attacks against Ukraine-based information infrastructure companies caused service outages that were concurrent with the physical invasion and afterwards, restricted communications among Ukrainians and impeded the population’s ability to respond to current and truthful information. 

This unacceptable cyberattack is yet another example of Russia’s continued pattern of irresponsible behaviour in cyberspace, which also formed an integral part of its illegal and unjustified invasion of Ukraine.1

Council of the European Union

These types of operations, however, were not restricted to Ukraine-based information infrastructure. A significant opening salvo in Russia’s invasion was a cyber operation directed against ViaSat, a private American-based satellite internet company that provides services to users throughout the world, including the Ukrainian military.32 Instead of targeting the satellites in orbit, Russia targeted the modems in ViaSat’s KA-SAT satellite broadband network that connected users with the internet.33 Specifically, Russia exploited a “misconfiguration in a VPN [virtual private network] appliance to gain remote access to the trusted management segment of the KA-SAT network.”34 From there, the attackers were able to move laterally though the network to the segment used to manage and operate the broader system.35 They then “overwrote key data in flash memory on the modems,” making it impossible for the modems to access the broader network.36 Overall, the effects of the hack were short-lived, with ViaSat reporting the restoration of connectivity within a few days after shipping approximately 30,000 new modems to affected customers.37

SentinelOne, a cybersecurity firm, identified the malware used to wipe the modems and routers of the information they needed to operate.38 The firm assessed “with medium-confidence“ that AcidRain, the malware used in the attack, had ”developmental similarities” with an older malware, VPNFilter, that the Federal Bureau of Investigation and the US Department of Justice have previously linked to the Russian government.39  The United States, United Kingdom, and European Union all subsequently attributed the ViaSat hack to Russian-state backed actors.40

The effectiveness of the operation is debated, although the logic of the attack is straightforward. Russia wanted to constrain, or preferably eliminate, an important channel of communication for the Ukrainian military during the initial stages of the invasion. Traditional, land-based radios, which the Ukrainian military relies on for most of their communications, only work over a limited geographic range, therefore making it more difficult to use advanced, long-range weapons systems.41 It should be expected that landline and conventional telephony would suffer outages during the opening phases of the war and struggle to keep up with rapidly moving forces.

Initially, it was widely reported that the Russian strike on ViaSat was effective. On March 15, a senior Ukrainian cybersecurity official, Viktor Zhora, was quoted saying that the attack on ViaSat caused “a really huge loss in communications in the very beginning of the war.42 When asked follow-up questions about his quote, Zhora said at the time that he was unable to elaborate, leading journalists and industry experts to believe that the attack had impacted the Ukrainian military’s ability to communicate.43 However, several months later, on September 26, Zhora revised his initial comments, stating that the hack would have impacted military communications if satellite communications had been the Ukrainian military’s principal medium of communication. However, Zhora stated that the Ukrainian military instead relies on landlines for communication, with satellites as a back-up method. He went on to say that “in the case land lines were destroyed, that could be a serious issue in the first hours of war.”44 The tension, and potential contradictions, in Zhora’s comments underlines the inherent complications in analyzing cyber operations during war: long-term consequences can be difficult to infer from short-term effects, and countries seek to actively control the narratives surrounding conflict.  

The effectiveness of the ViaSat hack boils down to how the Ukrainian military communicates, and how adaptable it was in the early hours of the invasion. However, it is apparent how such a hack could impact military effectiveness. If Russia, or any other belligerent, was able to simultaneously disrupt satellite communications while also jamming or destroying landlines, forces on the frontlines would be at best poorly connected with their superiors. In such a scenario, an army would be cut off from commanders in other locations and would not be able to report back or receive new directives; they would be stranded until communications could be restored.  

The ViaSat hack had a military objective: to disrupt Ukrainian military access to satellite communications. But the effects were not limited to this objective. The operation had spillover effects that rippled across Europe. In Germany, nearly 6,000 wind turbines were taken offline, with roughly 2,000 of those turbines remaining offline for nearly a month after the initial hack due to the loss of remote connectivity.45 In France, modems used by emergency services vehicles, including firetrucks and ambulances, were also affected.46

ViaSat is not a purely military target. It is a civilian firm that counts the Ukrainian military as a customer. The targeting of civilian infrastructure with dual civilian and military capability and use has occurred throughout history and has been the center of debate in international law, especially when there are cross-border spillover effects in non-combatant countries. Both the principle of proportionality and international humanitarian law require the aggressor to target only military objects, defined as objects “whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage” in a manner proportional to the military gain foreseen by the operation. 47 What this means in practice, however, is that the aggressor determines whether they deem a target to be a military object and a beneficial target and, therefore, what is legitimate. Konstantin Vorontsov, the Head of the Russian Delegation to the United Nations, attempted to justify Russian actions in October 2022 by saying that the use of civilian space infrastructure to aid the Ukrainian war effort may be a violation of the Outer Space Treaty, thereby rendering this infrastructure a legitimate military target.48 Similar operations like that against ViaSat are likely to be the new norm in modern warfare. As Mauro Vignati, the adviser on new digital technologies of warfare at the Red Cross, said in November 2022, insofar as private companies own and operate the information infrastructure of the domain, including infrastructure acting as military assets, “when war start[s], those companies, they are inside the battlefield.”49

Physical information infrastructure 

In February 2022, as Russian forces moved to seize airfields and key physical assets in Ukraine, they simultaneously assaulted the physical information infrastructure operating within and beneath the Ukrainian information environment. Russian forces targeted this infrastructure, largely privately operated, by taking control of assets where possible and destroying them where not, including through a series of Russian air strikes targeting Ukrainian servers, cables, and cell phone towers.50 As of June 2022, about 15 percent of Ukrainian information infrastructure had been damaged or destroyed; by July, 12.2 percent of homes had lost access to mobile communication services, 11 percent of base stations for mobile operators were out of service, and approximately 20 percent of the country’s telecommunications infrastructure was damaged or destroyed.51 By August “the number of users connecting to the Internet in Ukraine [had] shrunk by at least 16 percent nationwide.”52

In some areas of Ukraine, digital blackouts were enforced by Russian troops to cut the local population off from the highly contested information space. In Mariupol, the last cell tower connecting the city with the outside world was tirelessly tended by two Kyivstar engineers, who kept it alive with backup generators that they manually refilled with gasoline. Once the Russians entered the city, however, the Ukrainian soldiers who had been protecting the cell tower location left to engage with the enemy, leaving the Kyivstar engineers alone to tend to their charge. For three days the engineers withstood the bombing of the city until March 21, when Russian troops disconnected the tower and it went silent.53

Russian forces coerced Ukrainian occupied territories onto Russian ISPs, once again through Rostelcom’s local agent Miranda Media, and onto Russian mobile service providers.54 Information infrastructure in Ukraine is made up of overlapping networks of mobile service and ISPs, a legacy of the country’s complicated post-Soviet modernization process. This complexity may have been a boon for its resilience. Russian forces, observed digital-rights researcher Samuel Woodhams, “couldn’t go into one office and take down a whole region … There were hundreds of these offices and the actual hardware was quite geographically separated.55 Across eastern Ukraine, including Kherson, Mlitopol, and Mariupol, the Russians aimed to subjugate the physical territory, constituent populations, and Ukrainian information space. In Kherson, Russian forces entered the offices of a Ukrainian ISP and at gunpoint, forced staff to transfer control to them.56

Russian bombardment of telecommunications antennas in Kiev
Russian bombardment of telecommunications antennas in Kiev (Attribution: Mvs.gov.ua)

Routing the internet and communications access of occupied territories through Russia meant that Moscow could suppress communications to and from these occupied areas, especially through social media and Ukrainian news sites, sever access to essential services in Ukraine, and flood the populations with its own propaganda, as was proved in Crimea in 2014. Moving forward, Russia could use this dependency to “disconnect, throttle, or restrict access to the internet” in occupied territories, cutting off the occupied population from the Ukrainian government and the wider Ukrainian and international community.57

The Kremlin’s primary purpose in the invasion of Ukraine was and is to remove the Ukrainian government and, likely, install a pro-Russian puppet government to bring to an end an independent Ukraine.58 Therefore, isolating the information environment of occupied populations, in concert with anti-Ukrainian government disinformation, such as the multiple false allegations that President Zelenskyy had fled the country and abandoned the Ukrainian people,59 were a means to sway the allegiances, or at least dilute the active resistance, of the Ukrainian people.60 Without connectivity to alternative outlets, the occupying Russians could promote false and largely uncontested claims about the progress of the war. In early May 2022 for example, when Kherson lost connectivity for three days, the deputy of the Kherson Regional Council, Serhiy Khlan, reported that the Russians “began to spread propaganda that they were in fact winning and had captured almost all of Mykolaiv.”61 

Russia used its assault on the information environment to undermine the legitimacy of the Ukrainian government and its ability to fulfill its governmental duties to the Ukrainian people. Whether through complete connectivity blackouts or through the restrictions imposed by Russian networks, the Russians blocked any communications from the Ukrainian government to occupied populations—not least President Zelenskyy’s June 13, 2022 address, intended most for those very populations, in which he promised to liberate all occupied Ukrainian land and reassured those populations that they had not been forgotten. Zelenskyy acknowledged the Russian barrier between himself and Ukrainians in occupied territories, saying, “They are trying to make people not just know nothing about Ukraine… They are trying to make them stop even thinking about returning to normal life, forcing them to reconcile.”62

Isolating occupied populations from the Ukrainian information space is intended, in large part, said Stas Prybytko, the head of mobile broadband development within the Ukrainian Ministry of Digital Transformation, to “block them from communicating with their families in other cities and keep them from receiving truthful information.”63 Throughout 2022, so much of what the international community knew about the war came—through Twitter, TikTok, Telegram, and more—from Ukrainians themselves. From videos of the indiscriminate Russian shelling of civilian neighborhoods to recordings tracking Russian troop movements, Ukrainians used their personal devices to capture and communicate the progress of the war directly to living rooms, board rooms, and government offices around the world.64The power of this distributed information collection and open-source intelligence relies upon mobile and internet access. The accounts that were shared after Ukrainian towns and cities were liberated from Russian occupation lay bare just how much suffering, arrest, torture, and murder was kept hidden from international view by the purposeful isolation of the information environment and the constant surveillance of Ukrainians’ personal devices.65 The war in Ukraine has highlighted the growing impact of distributed open source intelligence during the conduct of war that is carried out by civilians in Ukraine and by the wider open source research community though various social media and messaging platforms.66 

Russian operations against, especially transnational, digital infrastructure companies can mostly be categorized as disruption, degradation, and information gathering, which saw Russian or Russian-aligned hackers moving in and through the Ukrainian information environment. The attacks against Ukrainian physical infrastructure, however, are of a slightly different character. Invading forces employed physically mediated cyberattacks, a method defined by Herb Lin as “attacks that compromise cyber functionality through the use of or the threat of physical force” to pursue the complete destruction or seizure and occupation of this infrastructure.67 Both ends begin with the same purpose: to create a vacuum of information between the Ukrainian government, the Ukrainian people, and the global population, effectively ending the connection between the Ukrainian information environment and the global environment. But the seizure of this infrastructure takes things a step beyond: to occupy the Ukrainian information environment and pull its infrastructure and its people into an isolated, controlled Russian information space. 

Reclaiming the Ukrainian information environment 

Preparation of the environment 

The Russian assault on the Ukrainian information environment is far from unanswered. Russian efforts have been countered by the Ukrainian government in concert with allied states and with technology companies located both within and outside Ukraine. Russia’s aim to pull occupied Ukrainian territory onto Russian networks to be controlled and monitored has been well understood, and Ukraine has been hardening its information infrastructure since the initial 2014 invasion. Ukraine released its Cyber Security Strategy in 2016, which laid out the government’s priorities in this space, including the defense against the range of active cyber threats they face, with an emphasis on the “cyber protection of information infrastructure.”68 The government initially focused on centralizing its networks in Kyiv to make it more difficult “for Russian hackers to penetrate computers that store critical data and provide services such as pension benefits, or to use formerly government-run networks in the occupied territories to launch cyberattacks on Kyiv.”69

As part of its digitalization and security efforts, the Ukrainian government also sought out new partners, both public and private, to build and bolster its threat detection and response capabilities. Before and since the 2022 invasion, the Ukrainian government has worked with partner governments and an array of technology companies around the world to create resilience through increased connectivity and digitalization. 

Bolstering Ukrainian connectivity 

Since the 2014 invasion and annexation of Crimea, Ukraine-serving telecommunications operators have developed plans to prepare for future Russian aggression. Lifecell, the third largest Ukrainian mobile telephone operator, prepared its network for an anticipated Russian attack. The company shifted their office archives, documentation, and critical network equipment from eastern to western Ukraine, where it would be better insulated from violence, added additional network redundancy, and increased the coordination and response capabilities of their staff.70 Similarly, Kyivstar and Vodafone Ukraine increased their network bandwidth to withstand extreme demand. In October 2021, these three companies initiated an infrastructure sharing agreement to expand LTE (Long Term Evolution) networks into rural Ukraine and, in cooperation with the Ukrainian government, expanded the 4G telecommunications network to bring “mobile network coverage to an estimated 91.6 per cent of the population.”71 

The expansion and improvement of Ukrainian telecommunications continued through international partnerships as well. Datagroup, for example, announced a $20 million partnership in 2021 with Cisco, a US-based digital communications company, to modernize and expand the bandwidth of its extensive networks.72 Since the February 2022 invasion, Cisco has also worked with the French government to provide over $5 million of secure, wireless networking equipment and software, including firewalls, for free to the Ukrainian government.73

This network expansion is an integral part of the Ukrainian government’s digitalization plans for the country, championed by President Zelenskyy. Rather than the invasion putting an end to these efforts, Deputy Prime Minister and Minister for Digital Transformation Mykhailo Fedorov claimed that during the war “digitalization became the foundation of all our life. The economy continues to work … due to digitalization.74 The digital provision of government services has created an alternate pathway for Ukrainians to engage in the economy and with their government. The flagship government initiative Diia, launched in February 2020, is a digital portal through which the 21.7 million Ukrainian users can access legal identification, make social services payments, register a business, and even register property damage from Russian missile strikes.75 The Russian advance and consequent physical destruction that displaced Ukrainians means that the ability to provide government services through alternate and resilient means is more essential than ever, placing an additional premium on defending Ukrainian information infrastructure. 

Backing up a government 

As Russian forces built up along Ukraine’s borders, Ukrainian network centralization may have increased risk, despite the country’s improved defense capabilities. In preparation for the cyber and physical attacks against the country’s information infrastructure, Fedorov moved to amend Ukrainian data protection laws to allow the government to store and process data in the cloud and worked closely with several technology companies, including Microsoft, Amazon Web Services, and Google, to effect the transfer of critical government data to infrastructure hosted outside the country.76 Cloud computing describes “a collection of technologies and organizational processes which enable ubiquitous, on-demand access to a shared pool of configurable computing resources.”77 Cloud computing is dominated by the four hyperscalers—Amazon, Microsoft, Google, and Alibaba—that provide computing and storage at enterprise scale and are responsible for the operation and security of data centers all around the world, any of which could host customer data according to local laws and regulations.78 

According to its April 2022 Ukraine war report, Microsoft “committed at no charge a total of $107 million of technology services to support this effort” and renewed the relationship in November, promising to ensure that “government agencies, critical infrastructure and other sectors in Ukraine can continue to run their digital infrastructure and serve citizens through the Microsoft Cloud” at a value of about $100 million.79 Amazon and Google have also committed to supporting cloud services for the Ukrainian government, for select companies, and for humanitarian organizations focused on aiding Ukraine.80 In accordance with the Ukrainian government’s concerns, Russian missile attacks targeted the Ukrainian government’s main data center in Kyiv soon after the invasion, partially destroying the facility, and cyberattacks aggressively tested Ukrainian networks.81    

Unlike other lines of aid provided by the international community to strengthen the defense of the Ukrainian information environment, cloud services are provided only by the private sector.82 While this aid has had a transformative effect on Ukrainian defense, that transformative quality has also raised concerns. Microsoft, in its special report on Ukraine, several times cites its cloud services as one of the determining factors that limited the effect of Russian cyber and kinetic attacks on Ukrainian government data centers, and details how their services, in particular, were instrumental in this defense.83 In this same report, Microsoft claims to be most worried about those states and organizations that do not use cloud services, and provides corroborating data.84 Microsoft and other technology companies offering their services at a reduced rate, or for free, are acting—at least in part—out of a belief in the rightness of the Ukrainian cause. However, they are still private companies with responsibilities to shareholders or board members, and they still must seek profit. Services provided, especially establishing information infrastructure like Cloud services, are likely to establish long-term business relationships with the Ukrainian government and potentially with other governments and clients, who see the effectiveness of those services illustrated through the defense of Ukraine. 

Mounting an elastic defense  

Working for wireless 

Alongside and parallel to the Ukrainian efforts to defend and reclaim occupied physical territory is the fight for Ukrainian connectivity. Ukrainian telecommunications companies have been integral to preserving connectivity to the extent possible. In March 2022, Ukrainian telecom operators Kyivstar, Vodafone Ukraine, and Lifecell made the decision to provide free national mobile roaming services across mobile provider networks, creating redundancy and resilience in the mobile network to combat frequent service outages.85 The free mobile service provided by these companies is valued at more than UAH 980 million (USD 26.8 million).86 In addition, Kyivstar in July 2022 committed to the allocation of UAH 300 million (about USD 8.2 mil) for the modernization of Ukraine’s information infrastructure in cooperation with the Ukrainian Ministry of Digital transformation.87 The statements that accompanied the commitments from Kyivstar and Lifecell—both headquartered in Ukraine—emphasized each company’s dedication to Ukrainian defense and their role in it, regardless of the short-term financial impact.88 These are Ukrainian companies with Ukrainian infrastructure and Ukrainian customers, and their fate is tied inextricably to the outcome of this war. 

As Russian forces advanced and attempted to seize control of information infrastructure, in at least one instance, Ukrainian internet and mobile service employees sabotaged their own equipment first. Facing threats of imprisonment and death from occupying Russians, employees in several Ukrtelecom facilities withstood pressure to share technical network details and instead deleted key files from the systems. According to Ukrtelecom Chief Executive Officer Yuriy Kurmaz, “The Russians tried to connect their control boards and some equipment to our networks, but they were not able to reconfigure it because we completely destroyed the software.”89 Without functional infrastructure, Russian forces struggled to pull those areas onto Russian networks.  

The destruction of telecommunications infrastructure has meant that these areas and many others along the war front are, in some areas, without reliable information infrastructure, either wireless or wired. While the Ukrainian government and a bevy of local and international private sector companies battle for control of on-the-ground internet and communications infrastructure, they also pursued new pathways to connectivity.

Searching for satellite 

Two days after the invasion, Deputy Prime Minister Fedorov tweeted at Elon Musk, the Chief Executive Officer of SpaceX, that “while you try to colonize Mars — Russia try [sic] to occupy Ukraine! While your rockets successfully land from space — Russian rockets attack Ukrainian civil people! We ask you to provide Ukraine with Starlink stations and to address sane Russians to stand.”90 Just another two days later, Fedorov confirmed the arrival of the first shipment of Starlink stations.91  

Starlink, a network of low-orbit satellites working in constellations operated by SpaceX, relies on satellite receivers no larger than a backpack that are easily installed and transported. Because Russian targeting of cellular towers made communications coverage unreliable, says Fedorov, the government “made a decision to use satellite communication for such emergencies” from American companies like SpaceX.92 Starlink has proven more resilient than any other alternative throughout the war. Due to the low orbit of Starlink satellites, they can broadcast to their receivers at relatively higher power than satellites in higher orbits. There has been little reporting on successful Russian efforts to jam Starlink transmissions, and the Starlink base stations—the physical, earthbound infrastructure that communicates directly with the satellites—are located on NATO territory, ensuring any direct attack on them would be a significant escalation in the war.93

Starlink has been employed across sectors almost since the war began. President Zelenskyy has used the devices himself when delivering addresses to the Ukrainian people, as well as to foreign governments and populations.94 Fedorov has said that sustained missile strikes against energy and communication infrastructure have been effectively countered through the deployment of Starlink devices that can restore connection where it is most needed. He even called the system “an essential part of critical infrastructure.”95   

Starlink has also found direct military applications. The portability of these devices means that Ukrainian troops can often, though not always, stay connected to command elements and peer units while deployed.96 Ukrainian soldiers have also used internet connections to coordinate attacks on Russian targets with artillery-battery commanders.97 The Aerorozvidka, a specialist air reconnaissance unit within the Ukrainian military that conducts hundreds of information gathering missions every day, has used Starlink devices in areas of Ukraine without functional communications infrastructure to “monitor and coordinate unmanned aerial vehicles, enabling soldiers to fire anti-tank weapons with targeted precision.”98 Reports have also suggested that a Starlink device was integrated into an unmanned surface vehicle discovered near Sevastopol, potentially used by the Ukrainian military for reconnaissance or even to carry and deliver munitions.99 According to one Ukrainian soldier, “Starlink is our oxygen,” and were it to disappear, “our army would collapse into chaos.”100

The initial package of Starlink devices included 3,667 terminals donated by SpaceX and 1,333 terminals purchased by the United States Agency for International Development (USAID).101 SpaceX initially offered free Starlink service for all the devices, although the offer has already been walked back by Musk, and then reversed again. CNN obtained proof of a letter sent by Musk to the Pentagon in September 2022 stating that SpaceX would be unable to continue funding Starlink service in Ukraine. The letter requested that the Pentagon pay what would amount to “more than $120 million for the rest of the year and could cost close to $400 million for the next 12 months.” It also clarified that the vast majority of the 20,000 Starlink devices sent to Ukraine were financed at least in part by outside funders like the United States, United Kingdom, and Polish governments.102

After the letter was sent, but before it became public, Musk got into a Twitter spat with Ukrainian diplomat Adrij Melnyk after the former wrote a tweet on October 3 proposing terms of peace between Russia and Ukraine. Musk’s proposal included Ukraine renouncing its claims to Crimea and pledging to remain neutral, with the only apparent concession from Russia a promise to ensure water supply in Crimea. The plan was rejected by the public poll Musk included in the tweet, and Melnyk replied and tagged Musk, saying “Fuck off is my very diplomatic reply to you @elonmusk.”103 After CNN released the SpaceX letter to the Pentagon, Musk seemingly doubled down on his decision to reduce SpaceX funding at first. He responded on October 14 to a tweet summarizing the incident, justifying possible reduced SpaceX assistance stating, “We’re just following his [Melnyk’s] recommendation,” even though the letter was sent before the Twitter exchange. Musk then tweeted the following day, “The hell with it … even though Starlink is still losing money & other companies are getting billions of taxpayer $, we’ll just keep funding Ukraine govt for free.”104 Two days later, in response to a Politico tweet reporting that the Pentagon was considering covering the Starlink service costs, Musk stated that “SpaceX has already withdrawn its request for funding.”105 Musk’s characterization of SpaceX’s contribution to the war effort has sparked confusion and reprimand, with his public remarks often implying that his company is entirely footing the bill when in fact, tens of millions of dollars’ worth of terminals and service are being covered by several governments every month.  

The Starlink saga, however, was not over yet. Several weeks later in late October, 1,300 Starlink terminals in Ukraine, purchased in March 2020 by a British company for use in Ukrainian combat-related operations, were disconnected, allegedly due to lack of funding, causing a communications outage for the Ukrainian military.106 Although operation was restored, the entire narrative eroded confidence in SpaceX as a guarantor of flexible connectivity in Ukraine. In November 2022, Federov noted that while Ukraine has no intention of breaking off its relationship with Starlink, the government is exploring working with other satellite communications operators.107 Starlink is not the only satellite communications network of its kind, but its competitors have not yet reached the same level of operation. Satellite communications company OneWeb, based in London with ties to the British military, is just now launching its satellite constellation, after the Russian invasion of Ukraine required the company to change its launch partner from Roscosmos to SpaceX.108 The US Space Development Agency, within the United States Space Force, will launch the first low earth orbit satellites of the new National Defense Space Architecture in March 2023. Other more traditional satellite companies cannot provide the same flexibility as Starlink’s small, transportable receivers.

UA Support Forces use Starlink
UA Support Forces use Starlink (Attribution: Mil.gov.ua)

With the market effectively cornered for the moment, SpaceX can dictate the terms, including the physical bounds, of Starlink’s operations, thereby wielding immense influence on the battlefield. Starlink devices used by advancing Ukrainian forces near the front, for example, have reported inconsistent reliability.109 Indeed CNN reported on February 9th that this bounding was a deliberate attempt to separate the devices from direct military use, as SpaceX President Gwynne Shotwell explained “our intent was never to have them use it for offensive purposes.”110 The bounding decision, similar to the rationale behind the company’s decision to refuse to activate Starlink service in Crimea, was likely made to contain escalation, especially escalation by means of SpaceX devices.111

But SpaceX is not the only satellite company making decisions to bound the area of operation of their products to avoid playing—or being perceived to play—a role in potential escalation. On March 16, 2022, Minister Fedorov tweeted at DJI, a Chinese drone producer, “@DJIGlobal are you sure you want to be a partner in these murders? Block your products that are helping russia to kill the Ukrainians!”112 DJI responded directly to the tweet the same day, saying “If the Ukrainian government formally requests that DJI set up geofencing throughout Ukraine, we will arrange it,” but pointed out that such geofencing would inhibit all users of their product in Ukraine, not just Russians.113

While Russia continues to bombard the Ukrainian electrical grid, Starlink terminals have grown more expensive for new Ukrainian consumers, increasing from $385 earlier this year to $700, although it is unclear if this price increase also affected government purchasers.114 According to Andrew Cavalier, a technology industry analyst with ABI Research, the indispensability of the devices gives “Musk and Starlink a major head start [against its competitors] that its use in the Russia–Ukraine war will only consolidate.”115 Indeed, the valuation of SpaceX was $127 million in May 2022, and the company raised $2 billion in the first seven months of 2022.116 For SpaceX, the war in Ukraine has been an impressive showcase of Starlink’s capabilities and has proven the worth of its services to future customers. The company recently launched a new initiative, Starshield, intended to leverage “SpaceX’s Starlink technology and launch capability to support national security efforts. While Starlink is designed for consumer and commercial use, Starshield is designed for government use.”117 It is clear that SpaceX intends to capitalize on the very public success of its Starlink network in Ukraine.

Reclaiming Territory 

The Russian assault is not over, but Ukraine has reclaimed “54 percent of the land Russia has captured since the beginning of the war” and the front line has remained relatively stable since November 2022.118 Videos and reports from reclaimed territory show the exultation of the liberated population. As Ukrainian military forces reclaim formerly occupied areas, the parallel reclamation of the information environment, by or with Ukrainian and transnational information infrastructure operators, follows quickly. 

In newly liberated areas, Starlink terminals are often the first tool for establishing connectivity. In Kherson, the first regional capital that fell to the Russian invasion and reclaimed by Ukrainian troops on November 11, 2022, residents lined up in public spaces to connect to the internet through Starlink.119 The Ministry of Digital Transformation provided Starlink devices to the largest service providers, Vodaphone and Kyivstar, to facilitate communication while their engineers repaired the necessary infrastructure for reestablishing mobile and internet service.120 A week after Kherson was recaptured, five Kyivstar base stations were made operational and Vodaphone had reestablished coverage over most of the city.121

Due to the importance of reclaiming the information space, operators are working just behind Ukrainian soldiers to reconnect populations in reclaimed territories to the Ukrainian and global information environment as quickly as possible, which means working in very dangerous conditions. In the Sumy region, a Ukrtelecom vehicle pulling up to a television tower drove over a land mine, injuring three of the passengers and killing the driver.122 Stanislav Prybytko, the head of the mobile broadband department in the Ukrainian Ministry of Digital Transformation, says “It’s still very dangerous to do this work, but we can’t wait to do this, because there are a lot of citizens in liberated villages who urgently need to connect.”123 Prybytko and his eleven-person team have been central to the Ukrainian effort to stitch Ukrainian connectivity back together. The team works across a public-private collaborative, coordinating with various government officials and mobile service providers to repair critical nodes in the network and to reestablish communications and connectivity.124 According to Ukrainian government figures, 80 percent of liberated settlements have partially restored internet connection, and more than 1,400 base stations have been rebuilt by Ukrainian mobile operators since April 2022.125

Key Takeaways 

The information environment is a key domain through which this war is being contested. The Russian government has demonstrated for over a decade the importance it places on control of the information environment, both domestically and as part of campaigns to expand the Russian sphere of influence abroad. Yet, despite this Russian focus, the Ukrainian government has demonstrated incredible resilience against physical assaults, cyberattacks, and disinformation campaigns against and within the Ukrainian information environment and has committed to further interlacing government services and digital platforms.  

The centrality of this environment to the conduct of this war means that private actors are necessarily enmeshed in the conflict. As providers of products and services used for Ukrainian defense, these companies are an important part of the buttressing structure of that defense. The centrality of private companies in the conduct of the war in Ukraine brings to light new and increasingly important questions about what it means for companies to act as information infrastructure during wartime, including:  

  1. What is the complete incentive structure behind a company’s decision to provide products or services to a state at war? 
  2. How dependent are states on the privately held portions of the information environment, including infrastructure, tools, knowledge, data, skills, and more, for their own national security and defense?  
  3. How can the public and private sectors work together better as partners to understand and prepare these areas of reliance during peace and across the continuum of conflict in a sustained, rather than ad hoc, nature? 

Incentives 

The war in Ukraine spurred an exceptional degree of cooperation and aid from private companies within Ukraine and from around the globe. Much of public messaging around the private sector’s assistance of Ukrainian defense centers around the conviction of company leadership and staff that they were compelled by a responsibility to act. This is certainly one factor in their decision. But the depth of private actor involvement in this conflict demands a more nuanced understanding of the full picture of incentives and disincentives that drive a company’s decision to enter into new, or expand upon existing, business relationships with and in a country at war. What risks, for example, do companies undertake in a war in which Russia has already demonstrated its conviction that private companies are viable military targets? The ViaSat hack was a reminder of the uncertainty that surrounds the designation of dual-use technology, and the impact that such designations have in practice. What role did public recognition play in companies’ decisions to provide products and services, and how might this recognition influence future earnings potential? For example, while their remarks differed in tone, both Elon Musk on Twitter and Microsoft in its special report on Ukraine publicly claimed partial credit for the defense of Ukraine.  

As the war continues into its second year, these questions are important to maintaining Ukraine’s cooperation with these entities. With a better understanding of existing and potential incentives, the companies, the United States, and its allies can make the decision to responsibly aid Ukraine much easier.  

Dependencies 

Private companies play an important role in armed conflict, operating much of the infrastructure that supports the information environment through which both state and non-state actors compete for control. The war in Ukraine has illustrated the willingness of private actors, from Ukrainian telecommunications companies to transnational cloud and satellite companies, to participate as partners in the defense of Ukraine. State dependence on privately held physical infrastructure is not unique to the information environment, but state dependence on infrastructure that is headquartered and operated extraterritorially is a particular feature. 

Prior to and throughout the war, the Ukrainian government has coordinated successfully with local telecommunication companies to expand, preserve, and restore mobile, radio, and internet connectivity to its population. This connectivity preserved what Russia was attempting to dismantle—a free and open Ukrainian information environment through which the Ukrainian government and population can communicate and coordinate. The Ukrainian government has relied on these companies to provide service and connectivity, working alongside them before and during the war to improve infrastructure and to communicate priorities. These companies are truly engaging as partners in Ukrainian defense, especially because this information infrastructure is not just a medium through which Russia launches attacks but an environment that Russia is attempting to seize control of. This dependence has not been unidirectional—the companies themselves are inextricably linked to this conflict through their infrastructure, employees, and customers in Ukraine. Each is dependent to some degree on the other and during times of crisis, their incentives create a dynamic of mutual need. 

The Ukrainian government has also relied on a variety of transnational companies though the provision of technology products or services and information infrastructure. As examined in this report, two areas where the involvement of these companies has been especially impactful are cloud services and satellite internet services. Cloud services have preserved data integrity and security by moving information to data centers distributed around the world, outside of Ukrainian territory and under the cyber-protection of those cloud service companies. Satellite services have enabled flexible and resilient connectivity, once again located and run primarily outside of Ukraine. These companies can provide essential services within the information environment and the physical environment of Ukraine, but are not fundamentally reliant on the integrity of the country. This dynamic is heightened by the fact that cloud service providers like Microsoft, Amazon Web Services, Google, and satellite internet service providers like Space X’s Starlink are operating within a market with global reach and very few competitors. While these companies and others have made the laudable decision to contribute to Ukrainian defense, the fact is that had they not, there are only a few, if any, other companies with comparable capabilities and infrastructure at scale. Additionally, there’s very little Ukraine or even the US government could have done to directly provide the same capabilities and infrastructure.  

Coordination 

Built into the discussions around dependency and incentives is the need for government and the private companies who own and operate information infrastructure to coordinate with each other from a more extensive foundation. While coordination with Ukrainian companies and some transnational companies emerged from sustained effort, many instances of private sector involvement were forged on an ad hoc basis and therefore could not be planned on in advance. The ad hoc approach can produce rapid results, as seen by Minister Fedorov’s tweet at Elon Musk and receipt of Starlink devices just days later. While this approach has been wielded by the Ukrainian government, and the Ministry for Digital Transformation in particular, to great effect, this very same example illustrates the complexity of transforming ad hoc aid into sustainable partnerships. Sustainability is especially important when states are facing threats outside of open war, across the continuum of insecurity and conflict where many of these capabilities and infrastructures will continue to be relied upon. Security and defense in the information environment requires states to work in coordination with a diverse range of local and transnational private actors. 

Recommendations 

Key recommendations from this paper ask the US government, in coordination with the Ukrainian government, to better understand the incentives that surround private sector involvement, to delineate states’ dependency on private information infrastructure, and to improve long-term public-private coordination through three pathways: 

  • Define support parameters. Clarify how private technology companies can and should provide aid 
  • Track support. Create a living database to track the patterns of technological aid to Ukraine from US private companies 
  • Facilitate support requests. Add to the resilience of the Ukrainian information environment by facilitating US private aid.  

Define support parameters 

Private information infrastructure companies will continue to play a key role in this war. However, there are a number of unresolved questions regarding the decisions these companies are making about if, and how, to provide support to the Ukrainian government to sustain its defense. A significant barrier may be the lack of clarity about the risks of partnership in wartime, which may disincentivize action or may alter existing partnerships. Recent SpaceX statements surrounding the bounding of Starlink use is an example, at least in part, of just such a risk calculous in action. The US government and its allies should release a public directive clarifying how companies can ensure that their involvement is in line with US and international law—especially for dual-use technologies. Reaffirming, with consistent guidelines, how the United States defines civilian participation in times of war will be crucial for ensuring that such actions do not unintentionally legitimize private entities as belligerents and legitimate targets in wartime. At the direction of the National Security Advisor, the US Attorney General and Secretary of State, working through the Office of the Legal Advisor at the State Department, should issue public guidance on how US companies can provide essential aid to Ukraine while avoiding the designation of legitimate military target or combatant under the best available interpretation of prevailing law. 

Track support 

While a large amount of support for Ukraine has been given directly by or coordinated through governments, many private companies have started providing technological support directly to the Ukrainian government. Some private companies, especially those with offices or customers in Ukraine, got in touch directly with, or were contacted by, various Ukrainian government offices, often with specific requests depending on the company’s products and services.126 

However, the US government does not have a full and complete picture of this assistance, which limits the ability of US policymakers to track the implications of changing types of support or the nature of the conflict. Policymakers should have access to not only what kind of support is being provided by private US companies, but also the projected period of involvement, what types of support are being requested and denied by companies (in which case, where the US government may be able to act as an alternative provider), and what types of support are being supplied by private sector actors without a significant government equity or involvement. A more fulsome mapping of this assistance and its dependency structure would make it possible for policymakers and others to assess its impact and effectiveness. This data, were it or some version of it publicly available, would also help private companies providing the support to better understand how their contributions fit within the wider context of US assistance and to communicate the effect their products or services are having to stakeholders and shareholders. Such information may play a role in a company’s decision to partner or abstain in the future.

The US government should create a collaborative task force to track US-based private sector support to Ukraine. Because of the wide equities across the US government in this area, this team should be led by the State Department’s Bureau of Cyberspace and Digital Policy and include representatives from USAID, the Department of Defense’s Cyber Policy Office, the National Security Agency’s Collaboration Center, and the Cybersecurity and Infrastructure Security’s Joint Cyber Defense Collaborative. This task force should initially focus on creating a picture of public-private support to Ukraine from entities within the United States, but its remit could extend to work with allies and partners, creating a fulsome picture of international public-private support.

Facilitate support requests 

Tracking the technical support that is requested, promised, and delivered to the Ukrainian government is an important first step toward gaining a better understanding of the evolving shape of the critical role that the private sector is increasingly playing in conflict. But closer tracking, perhaps by an associated body, could go further by acting as a process facilitator. Government offices and agencies have long been facilitators of private aid, but now states are increasingly able to interact with, and request support from, private companies directly, especially for smaller quantities or more specific products and services. While this pathway can be more direct and efficient, it also requires a near constant churn of request, provision, and renewal actions from private companies and Ukrainian government officials.  

Private organizations have stepped into this breach, including the Cyber Defense Assistance Collaboration (CDAC), founded by Greg Rattray and Matthew Murray, now a part of the US-based non-profit CRDF Global. CDAC works with a number of US private technology companies, as well as the National Security and Defense Council of Ukraine and the Ukrainian think tank Global Cyber Cooperative Center, to match the specific needs of Ukrainian government and state-owned enterprises with needed products and services offered by companies working in coordination.127

The growth and reach of this effort demonstrate the potential impact that a government-housed, or even a government-sponsored mechanism, could have in increasing the capacity to facilitate requests from the Ukrainian government, decreasing the number of bureaucratic steps required by Ukrainian government officials while increasing the amount and quality of support they receive. In addition, government facilitation would ease progress toward the previously stated recommendations by building in clarity around what kind of support can be provided and putting facilitation and aid tracking within a single process. As discussed above, this facilitation should start with a focus on US public-private support, but can grow to work alongside similar allied efforts. This could include, for example, coordination with the United Kingdom’s Foreign, Commonwealth and Development Office (FCDO) program, which “enables Ukrainian agencies to access the services of commercial cybersecurity companies.”128 Crucially, this task force, helmed by the State Department’s Bureau of Cyberspace and Digital Policy, would act as a facilitator, not as a restricting body. Its mission in this task would be to make connections and provide information.  

In line with tracking, US government facilitation would enable government entities to communicate where assistance can be most useful, such as shoring up key vulnerabilities or ensuring that essential defense activities are not dependent on a single private sector entity, and ideally, avoiding dependency on a single source of private sector assistance. A company’s financial situation or philanthropic priorities are always subject to change, and the US government should be aware of such risks and create resilience through redundancy.  

Central to this resilience will be the provision of support to bolster key nodes in the Ukrainian telecommunications infrastructure network against not just cyber attacks but also against physical assault, including things like firewalls, mine clearing equipment, and power generators. Aiding the Ukrainian government in the search for another reliable partner for satellite communication devices that offer similar flexibility as Starlink is also necessary, and a representative from the Pentagon has confirmed that such a process is underway, following Musk’s various and contradictory statements regarding the future of SpaceX’s aid to Ukraine back in October.129 Regardless, the entire SpaceX experience illustrates the need to address single dependencies in advance whenever possible. 

A roadblock to ensuring assistance redundancy is the financial ability of companies to provide products and services to the Ukrainian government without charge or to the degree necessary. While the US government does provide funding for private technological assistance (as in the Starlink example), creating a pool of funding that is tied to the aforementioned task force and overseen by the State Department’s Bureau of Cyberspace and Digital Policy, would enable increased flexibility for companies to cover areas of single dependence, even in instances that would require piecemeal rather than one-to-one redundancy. As previously discussed, many companies are providing support out of a belief that it is the right thing to do, both for their customers and as members of a global society. However, depending on whether that support is paid or provided for free, or publicly or privately given, a mechanism that provides government clarity on private sector support, tracks the landscape of US private support to Ukraine, and facilitates support requests would make it easier for companies to make the decision to start or continue to provide support when weighed against the costs and potential risks of offering assistance.

Looking forward and inward 

The questions that have emerged from Ukraine’s experience of defense in and through the information environment are not limited to this context. Private companies have a role in armed conflict and that role seems likely to grow, along with the scale, complexity, and criticality of the information infrastructures they own and operate. Companies will, in some capacity, be participants in the battlespace. This is being demonstrated in real time, exposing gaps that the United States and its allies and partners must address in advance of future conflicts.

Russia’s war on Ukraine has created an environment in which both public and private assistance in support of Ukrainian information infrastructure is motivated by a common aversion toward Russian aggression, as well as a commitment to the stability and protection of the Ukrainian government and people. This war is not over and despite any hopes to the contrary, similar aggressions will occur in new contexts, and with new actors in the future. It is crucial that in conjunction with examining and mitigating the risks related to the involvement of private technology companies in the war in Ukraine, the US government also examines these questions regarding its own national security and defense.

The information environment is increasingly central to not just warfighting but also to the practice of governance and the daily life of populations around the world. Governments and populations live in part within that environment and therefore atop infrastructure that is owned and operated by the private sector. As adversaries seek to reshape the information environment to their own advantage, US and allied public and private sectors must confront the challenges of their existing interdependence. This includes defining in what form national security and defense plans in and through the information environment are dependent upon private companies, developing a better understanding of the differing incentive structures that guide private sector decision-making, and working in coordination with private companies to create a more resilient information infrastructure network through redundancy and diversification. It is difficult to know what forms future conflict and future adversaries will take, or the incentives that may exist for companies in those new contexts, but by better understanding the key role that private information and technology companies already play in this domain, the United States and allies can better prepare for future threats.

About the Authors 

Emma Schroeder is an associate director with the Atlantic Council’s Cyber Statecraft Initiative, within the Digital Forensic Research Lab, and leads the team’s work studying conflict in and through cyberspace. Her focus in this role is on developing statecraft and strategy for cyberspace that is useful for both policymakers and practitioners. Schroeder holds an MA in History of War from King’s College London’s War Studies Department and also attained her BA in International Relations & History from the George Washington University’s Elliott School of International Affairs. 

Sean Dack was a Young Global Professional with the Cyber Statecraft Initiative during the fall of 2022. He is now a Researcher at the NATO Parliamentary Assembly, where he focuses on the long-term strategic and economic implications of Russia’s invasion of Ukraine. Dack graduated from Johns Hopkins School of Advanced International Studies in December 2022 with his MA in Strategic Studies and International Economics. 

Acknowledgements 

The authors thank Justin Sherman, Gregory Rattray, and Gavin Wilde for their comments on earlier drafts of this document, and Trey Herr and the Cyber Statecraft team for their support. The authors also thank all the participants, who shall remain anonymous, in multiple Chatham House Rule discussions and one-on-one conversations about the issue.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    ”The Ministry of Foreign Affairs of the Russian Federation, Convention on International Information Security (2011), https://carnegieendowment.org/files/RUSSIAN-DRAFT-CONVENTION-ON-INTERNATIONAL-INFORMATION-SECURITY.pdf.
2    To learn more about Russian disinformation efforts against Ukraine and its allies, check out the Russian Narratives Reports from the Atlantic Council’s Digital Forensic Research Lab: Nika Aleksejeva et al., Andy Carvin ed., “Narrative Warfare: How the Kremlin and Russian News Outlets Justified a War of Aggression against Ukraine,” Atlantic Council, February 22, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/narrative-warfare/; Roman Osadchuk et al., Andy Carvin ed., “Undermining Ukraine: How the Kremlin Employs Information Operations to Erode Global Confidence in Ukraine,” Atlantic Council, February 22, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/undermining-ukraine/.
3    Previously, the term RuNet described Russian language portions of the global internet accessible anywhere in the world. However, since Russia passed a domestic internet law in May 2019, RuNet has come to refer to a technically isolated version of the internet that services users within the borders of Russia. Gavin Wilde and Justin Sherman, No Water’s Edge: Russia’s Information War and Regime Security, Carnegie Endowment for International Peace, January 4, 2023, https://carnegieendowment.org/2023/01/04/no-water-s-edge-russia-s-information-war-and-regime-security-pub-88644; Justin Sherman, Reassessing Runet: Russian Internet Isolation and Implications for Russian Cyber Behavior, Atlantic Council, July 7, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/reassessing-runet-russian-internet-isolation-and-implications-for-russian-cyber-behavior/.
4    Adam Satariano and Valerie Hopkins, “Russia, Blocked from the Global Internet, Plunges into Digital Isolation,” New York Times, March 7, 2022, https://www.nytimes.com/2022/03/07/technology/russia-ukraine-internet-isolation.html.
5    Gavin Wilde and Justin Sherman, No Water’s Edge: Russia’s Information War and Regime Security, Carnegie Endowment for International Peace, January 4, 2023, https://carnegieendowment.org/2023/01/04/no-water-s-edge-russia-s-information-war-and-regime-security-pub-88644; Stephen Blank, “Russian Information Warfare as Domestic Counterinsurgency,” American Foreign Policy Interests 35, no. 1 (2013): 31–44, https://doi.org/10.1080/10803920.2013.757946.
6    Gavin Wilde, Cyber Operations in Ukraine: Russia’s Unmet Expectations, Carnegie Endowment for International Peace, December 12, 2022, https://carnegieendowment.org/2022/12/12/cyber-operations-in-ukraine-russia-s-unmet-expectations-pub-88607.
7    Tetyana Bohdanova, “Unexpected Revolution: The Role of Social Media in Ukraine’s Euromaidan Uprising,” European View 13, no. 1: (2014), https://doi.org/10.1007/s12290-014-0296-4; Megan MacDuffee Metzger, and Joshua A. Tucker. “Social Media and EuroMaidan: A Review Essay,” Slavic Review 76, no. 1 (2017): 169–91, doi:10.1017/slr.2017.16
8    Jonathon Cosgrove, “The Russian Invasion of the Crimean Peninsula 2014–2015: A Post-Cold War Nuclear Crisis Case Study,” Johns Hopkins (2020), 11–13, https://www.jhuapl.edu/Content/documents/RussianInvasionCrimeanPeninsula.pdf.
9    Steven Pifer, Ukraine: Six Years after the Maidan, Brookings, February 21, 2020, https://www.brookings.edu/blog/order-from-chaos/2020/02/21/ukraine-six-years-after-the-maidan/.
10    Kenneth Geers, ed., Cyber War in Perspective: Russian Aggression Against Ukraine (Tallinn: NATO CCD COE Publications, 2015), 9; Keir Giles, “Russia and Its Neighbours: Old Attitudes, New Capabilities,” in Geers, Cyber War in Perspective, 25; ‘Кримські регіональні підрозділи ПАТ «Укртелеком» офіційно повідомляють про блокування невідомими декількох вузлів зв’язку на півострові’ [Ukrtelekom officially reports blocking of communications nodes on peninsula by unknown actors], Ukrtelekom, February 28, 2014, http://www.ukrtelecom.ua/presscenter/news/official?id=120327.
11    Pavel Polityuk and Jim Finkle, “Ukraine Says Communications Hit, MPs Phones Blocked,” Reuters, March 4, 2014, https://www.reuters.com/article/ukraine-crisis-cybersecurity/ukraine-says-communications-hit-mps-phones-blocked-idINL6N0M12CF20140304.
12    Jen Weedon, “Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine,” in Geers, Cyber War in Perspective, 76; Liisa Past, “Missing in Action: Rhetoric on Cyber Warfare,” in Geers, Cyber War in Perspective, 91; “Ukrtelecom’s Crimean Sub-Branches Officially Report that Unknown People Have Seized Several Telecommunications Nodes in the Crimea,” Ukrtelecom, February 28, 2014, http://en.ukrtelecom.ua/about/news?id=120467; “Feb. 28 Updates on the Crisis in Ukraine,” New York Times, February 28, 2014, https://archive.nytimes.com/thelede.blogs.nytimes.com/2014/02/28/latest-updates-tensions-in-ukraine/?_r=0; “The Crimean Regional Units of PJSC ‘Ukrtelecom’ Officially Inform About the Blocking by Unknown Persons of Several Communication Nodes on the Peninsula,” Ukrtelecom, February 28, 2014, https://web.archive.org/web/20140305001208/, http://www.ukrtelecom.ua/presscenter/news/official?id=120327.
13    Polityuk and Finkle, “Ukraine Says Communications Hit”; John Leyden, “Cyber Battle Apparently under Way in Russia–Ukraine Conflict,” The Register, April 25, 2018, https://www.theregister.com/2014/03/04/ukraine_cyber_conflict/.
14    Fontugne, Ermoshina, and Aben, “The Internet in Crimea.”
15    Frédérick Douzet et al., “Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis,” 2020 12th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, May 26–29, 2020, 157-182, doi: 10.23919/CyCon49761.2020.9131726; Paul Mozur et al., “‘They Are Watching’: Inside Russia’s Vast Surveillance State,” New York Times, September 22, 2022, https://www.nytimes.com/interactive/2022/09/22/technology/russia-putin-surveillance-spying.html
16    Yaropolk Brynykh and Anastasiia Lykholat, “Occupied Crimea: Victims and Oppressors,” Freedom House, August 30, 2018, https://freedomhouse.org/article/occupied-crimea-victims-and-oppressors.
17    Halya Coynash, “Internet Providers Forced to Conceal Total FSB Surveillance in Occupied Crimea and Russia,” Kyiv Post, February 2, 2018, https://www.kyivpost.com/article/opinion/op-ed/halya-coynash-internet-providers-forced-conceal-total-fsb-surveillance-occupied-crimea-russia.html.
18    Joseph Cox, “Russia Built an Underwater Cable to Bring Its Internet to Newly Annexed Crimea,” VICE, August 1, 2014, https://www.vice.com/en/article/ypw35k/russia-built-an-underwater-cable-to-bring-its-internet-to-newly-annexed-crimea.
19    Cox, “Russia Built an Underwater Cable.”
20    Romain Fontugne, Ksenia Ermoshina, and Emile Aben, “The Internet in Crimea: A Case Study on Routing Interregnum,” 2020 IFIP Networking Conference, Paris, France, June 22–25, 2020, https://hal.archives-ouvertes.fr/hal-03100247/document.
21    Sebastian Moss, “How Russia Took over the Internet in Crimea and Eastern Ukraine,” Data Center Dynamics, January 12, 2023, https://www.datacenterdynamics.com/en/analysis/how-russia-took-over-the-internet-in-crimea-and-eastern-ukraine/; “Ukraine: Freedom on the Net 2018 Country Report,” Freedom House, 2019, https://freedomhouse.org/country/ukraine/freedom-net/2018.
22    “Crimea: Freedom in the World 2020 Country Report,” Freedom House, https://freedomhouse.org/country/crimea/freedom-world/2020.
23    Kim Zetter, “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid,” Wired, March 3, 2016, https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/; Andy Greenberg, “The Untold Story of Notpetya, the Most Devastating Cyberattack in History,” Wired, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
24    “Special Report: Ukraine An Overview of Russia’s Cyberattack Activity in Ukraine,” Microsoft Digital Security Unit, April 27, 2022, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd; Kyle Fendorf and Jessie Miller, “Tracking Cyber Operations and Actors in the Russia–Ukraine War,” Council on Foreign Relations, March 24, 2022, https://www.cfr.org/blog/tracking-cyber-operations-and-actors-russia-ukraine-war.
25    Jakub Przetacznik and Simona Tarpova, “Russia’s War on Ukraine: Timeline of Cyber-Attacks,” European Parliament, June 2022, https://www.europarl.europa.eu/RegData/etudes/BRIE/2022/733549/EPRS_BRI(2022)733549_EN.pdf; Catalin Cimpanu, “Hackers Deface Ukrainian Government Websites,” The Record, January 14, 2022, https://therecord.media/hackers-deface-ukrainian-government-websites/.
26    Tom Burt, “Malware Attacks Targeting Ukraine Government,” Microsoft, January 15, 2022, https://blogs.microsoft.com/on-the-issues/2022/01/15/mstic-malware-cyberattacks-ukraine-government/.
27    Roman Osadchuk, Russian Hybrid Threats Report: Evacuations Begin in Ukrainian Breakaway Regions, Atlantic Council, February 18, 2022, https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-hybrid-threats-report-evacuations-begin-in-ukrainian-breakaway-regions/#cyberattack; Sean Lyngaas and Tim Lister, “Cyberattack Hits Websites of Ukraine Defense Ministry and Armed Forces,” CNN, February 15, 2022, https://www.cnn.com/2022/02/15/world/ukraine-cyberattack-intl/index.html.
28    Microsoft, “Special Report Ukraine.”
29    ESET Research: Ukraine Hit by Destructive Attacks Before and During the Russian Invasion with HermeticWiper and IsaacWiper,” ESET, March 1, 2022, https://www.eset.com/int/about/newsroom/press-releases/research/eset-research-ukraine-hit-by-destructive-attacks-before-and-during-the-russian-invasion-with-hermet/; “Ukraine: Disk-Wiping Attacks Precede Russian Invasion,” Symantec Threat Hunter Team, February 24, 2022, https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ukraine-wiper-malware-russia; “Ukraine Computers Hit by Data-Wiping Software as Russia Launched Invasion,” Reuters, February 24, 2022, https://www.reuters.com/world/europe/ukrainian-government-foreign-ministry-parliament-websites-down-2022-02-23/.
30    Britney Nguyen, “Telecom Workers in Occupied Parts of Ukraine Destroyed Software to Avoid Russian Control over Data and Communications,” Business Insider, June 22, 2022, https://www.businessinsider.com/telecom-workers-ukraine-destroyed-software-avoid-russian-control-2022-6; Net Blocks (@netblocks), “Confirmed: A major internet disruption has been registered across #Ukraine on national provider #Ukrtelecom; real-time network data show connectivity collapsing …,” Twitter, March 28, 2022, 10:38 a.m., https://twitter.com/netblocks/status/1508453511176065033; Net Blocks (@netblocks), “Update: Ukraine’s national internet provider Ukrtelecom has confirmed a cyberattack on its core infrastructure. Real-time network data show an ongoing and …,” Twitter, March 28, 2022 11:25 a.m., https://twitter.com/netblocks/status/1508465391244304389; Andrea Peterson, “Traffic at Major Ukrainian Internet Service Provider Ukrtelecom Disrupted,” The Record, March 28, 2022, https://therecord.media/traffic-at-major-ukrainian-internet-service-provider-ukrtelecom-disrupted/; James Andrew Lewis, Cyber War and Ukraine, Center for Strategic and International Studies, January 10, 2023, https://www.csis.org/analysis/cyber-war-and-ukraine.
31    Thomas Brewster, “As Russia Invaded, Hackers Broke into A Ukrainian Internet Provider. Then Did It Again As Bombs Rained Down,” Forbes, March 10, 2022, https://www.forbes.com/sites/thomasbrewster/2022/03/10/cyberattack-on-major-ukraine-internet-provider-causes-major-outages/?sh=51d16b9c6573.
32    “Global Communications: Services, Solutions and Satellite Internet,” ViaSat, accessed November 14, 2022, http://data.danetsoft.com/viasat.com; Matt Burgess, “A Mysterious Satellite Hack Has Victims Far beyond Ukraine,” Wired, March 23, 2022, https://www.wired.com/story/viasat-internet-hack-ukraine-russia/.
33    Michael Kan, “ViaSat Hack Tied to Data-Wiping Malware Designed to Shut down Modems,” PCMag, March 31, 2022, https://www.pcmag.com/news/viasat-hack-tied-to-data-wiping-malware-designed-to-shut-down-modems.
34    “Ka-Sat Network Cyber Attack Overview,” ViaSat, September 12, 2022, https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview.
35    Lee Mathews, “ViaSat Reveals How Russian Hackers Knocked Thousands of Ukrainians Offline,” Forbes, March 31, 2022, https://www.forbes.com/sites/leemathews/2022/03/31/viasat-reveals-how-russian-hackers-knocked-thousands-of-ukrainians-offline/?sh=4683638b60d6; ViaSat, “Ka-Sat Network.”
36    ViaSat, “Ka-Sat Network.”
37    Andrea Valentina, “Why the Viasat Hack Still Echoes,” Aerospace America, November 2022, https://aerospaceamerica.aiaa.org/features/why-the-viasat-hack-still-echoes.
38    Juan Andres Guerrero-Saade and Max van Amerongen, “Acidrain: A Modem Wiper Rains down on Europe,” SentinelOne, April 1, 2022, https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/.
39    Guerrero-Saade and Van Amerongen, “Acidrain.”
40    Joe Uchill, “UK, US, and EU Attribute Viasat Hack Against Ukraine to Russia,” SC Media, June 23, 2022, https://www.scmagazine.com/analysis/threat-intelligence/uk-us-and-eu-attribute-viasat-hack-against-ukraine-to-russia; David E. Sanger and Kate Conger, “Russia Was Behind Cyberattack in Run-Up to Ukraine War, Investigation Finds,” New York Times, May 10, 2022, https://www.nytimes.com/2022/05/10/us/politics/russia-cyberattack-ukraine-war.html.
41    Kim Zetter, “ViaSat Hack ‘Did Not’ Have Huge Impact on Ukrainian Military Communications, Official Says,” Zero Day, September 26, 2022, https://zetter.substack.com/p/viasat-hack-did-not-have-huge-impact; “Satellite Outage Caused ‘Huge Loss in Communications’ at War’s Outset—Ukrainian Official,” Reuters, March 15, 2022, https://www.reuters.com/world/satellite-outage-caused-huge-loss-communications-wars-outset-ukrainian-official-2022-03-15/.
42    ”Reuters, “Satellite Outage.”
43    Sean Lyngaas, “US Satellite Operator Says Persistent Cyberattack at Beginning of Ukraine War Affected Tens of Thousands of Customers, CNN, March 30, 2022, https://www.cnn.com/2022/03/30/politics/ukraine-cyberattack-viasat-satellite/index.html.
44    Zetter, “ViaSat Hack.”
45    Burgess, “A Mysterious Satellite Hack” Zetter, “ViaSat Hack”; Valentino, “Why the ViaSat Hack.”
46    Jurgita Lapienytė, “ViaSat Hack Impacted French Critical Services,” CyberNews, August 22, 2022, https://cybernews.com/news/viasat-hack-impacted-french-critical-services/
47    International Committee of the Red Cross, Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), 1125 UNTS 3 (June 8, 1977), accessed January 18, 2023, https://www.refworld.org/docid/3ae6b36b4.html; Zhanna L. Malekos Smith, “No ‘Bright-Line Rule’ Shines on Targeting Commercial Satellites,” The Hill, November 28, 2022, https://thehill.com/opinion/cybersecurity/3747182-no-bright-line-rule-shines-on-targeting-commercial-satellites/; Anaïs Maroonian, “Proportionality in International Humanitarian Law: A Principle and a Rule,” Lieber Institute West Point, October 24, 2022, https://lieber.westpoint.edu/proportionality-international-humanitarian-law-principle-rule/#:~:text=The%20rule%20of%20proportionality%20requires,destruction%20of%20a%20military%20objective; Travis Normand and Jessica Poarch, “4 Basic Principles,” The Law of Armed Conflict, January 1, 2017, https://loacblog.com/loac-basics/4-basic-principles/.
48    “Statement by Deputy Head of the Russian Delegation Mr. Konstantin Vorontsov at the Thematic Discussion on Outer Space (Disarmament Aspects) in the First Committee of the 77th Session of the Unga,” Permanent Mission of the Russian Federation to the United Nations, October 26, 2022, https://russiaun.ru/en/news/261022_v.
49    Mauro Vignati, “LABScon Replay: Are Digital Technologies Eroding the Principle of Distinction in War?” SentinelOne, November 16, 2022, https://www.sentinelone.com/labs/are-digital-technologies-eroding-the-principle-of-distinction-in-war/
50    Matt Burgess, “Russia Is Taking over Ukraine’s Internet,” Wired, June 15, 2022, https://www.wired.com/story/ukraine-russia-internet-takeover/.
51    Nino Kuninidze et al., “Interim Assessment on Damages to Telecommunication Infrastructure and Resilience of the ICT Ecosystem in Ukraine.”
52    Adam Satariano and Scott Reinhard, “How Russia Took Over Ukraine’s Internet in Occupied Territories,” The New York Times, August 9, 2022, https://www.nytimes.com/interactive/2022/08/09/technology/ukraine-internet-russia-censorship.html; https://time.com/6222111/ukraine-internet-russia-reclaimed-territory/  
53    Thomas Brewster, “The Last Days of Mariupol’s Internet,” Forbes, March 31, 2022, https://www.forbes.com/sites/thomasbrewster/2022/03/31/the-last-days-of-mariupols-internet/.
54    Matt Burgess, “Russia Is Taking over Ukraine’s Internet,” Wired, June 15, 2022, https://www.wired.com/story/ukraine-russia-internet-takeover/; Satariano and Reinhard, “How Russia Took.”
55    ”Vera Bergengruen, “The Battle for Control over Ukraine’s Internet,” Time, October 18, 2022, https://time.com/6222111/ukraine-internet-russia-reclaimed-territory/.
56    Herbert Lin, “Russian Cyber Operations in the Invasion of Ukraine,” Cyber Defense Review (Fall 2022): 35, https://cyberdefensereview.army.mil/Portals/6/Documents/2022_fall/02_Lin.pdf, Herb Lin, “The Emergence of Physically Mediated Cyberattacks?,” Lawfare, May 21, 2022, https://www.lawfareblog.com/emergence-physically-mediated-cyberattacks; “Invaders Use Blackmailing and Intimidation to Force Ukrainian Internet Service Providers to Connect to Russian Networks,” State Service of Special Communications and Information Protection of Ukraine, May 13, 2022, https://cip.gov.ua/en/news/okupanti-shantazhem-i-pogrozami-zmushuyut-ukrayinskikh-provaideriv-pidklyuchatisya-do-rosiiskikh-merezh; Satariano and Reinhard, “How Russia Took.”
57    Gian M. Volpicelli, “How Ukraine’s Internet Can Fend off Russian Attacks,” Wired, March 1, 2022, https://www.wired.com/story/internet-ukraine-russia-cyberattacks/; Satariano and Reinhard, “How Russia Took.” 
58    David R. Marples, “Russia’s War Goals in Ukraine,” Canadian Slavonic Papers 64, no. 2–3 (March 2022): 207–219, https://doi.org/10.1080/00085006.2022.2107837.
59    David Klepper, “Russian Propaganda ‘Outgunned’ by Social Media Rebuttals,” AP News, March 4, 2022, https://apnews.com/article/russia-ukraine-volodymyr-zelenskyy-kyiv-technology-misinformation-5e884b85f8dbb54d16f5f10d105fe850; Marc Champion and Daryna Krasnolutska, “Ukraine’s TV Comedian President Volodymyr Zelenskyy Finds His Role as Wartime Leader,” Japan Times, June 7, 2022, https://www.japantimes.co.jp/news/2022/02/26/world/volodymyr-zelenskyy-wartime-president/;“Российское Телевидение Сообщило Об ‘Бегстве Зеленского’ Из Киева, Но Умолчало Про Жертвы Среди Гражданских,” Агентство, October 10, 2022, https://web.archive.org/web/20221010195154/https://www.agents.media/propaganda-obstreli/.
60    To learn more about Russian disinformation efforts against Ukraine and its allies, check out the Russian Narratives Reports from the Atlantic Council’s Digital Forensic Research Lab:  Nika Aleksejeva et al., Andy Carvin ed., “Narrative Warfare: How the Kremlin and Russian News Outlets Justified a War of Aggression against Ukraine,” Atlantic Council, February 22, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/narrative-warfare/; Roman Osadchuk et al., Andy Carvin ed., “Undermining Ukraine: How the Kremlin Employs Information Operations to Erode Global Confidence in Ukraine,” Atlantic Council, February 22, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/undermining-ukraine/.
61    Олександр Янковський, “‘Бояться Спротиву’. Для Чого РФ Захоплює Мобільний Зв’язок Та Інтернет На Херсонщині?,” Радіо Свобода, May 7, 2022, https://www.radiosvoboda.org/a/novyny-pryazovya-khersonshchyna-okupatsiya-rosiya-mobilnyy-zvyazok-internet/31838946.html
62    Volodymyr Zelenskyy, “Tell People in the Occupied Territories about Ukraine, That the Ukrainian Army Will Definitely Come—Address by President Volodymyr Zelenskyy,” President of Ukraine Official Website, June 13, 2022, https://www.president.gov.ua/en/news/govorit-lyudyam-na-okupovanih-teritoriyah-pro-ukrayinu-pro-t-75801. 
63    Satariano and Reinhard, “How Russia Took.”
64    Michael Sheldon, “Geolocating Russia’s Indiscriminate Shelling of Kharkiv,” DFRLab, March 1, 2022, https://medium.com/dfrlab/geolocating-russias-indiscriminate-shelling-of-kharkiv-deaccc830846; Michael Sheldon, “Kharkiv Neighborhood Experienced Ongoing Shelling Prior to February 28 Attack,” DFRLab, February 28, 2022, https://medium.com/dfrlab/kharkiv-neighborhood-experienced-ongoing-shelling-prior-to-february-28-attack-f767230ad6f6https://maphub.net/Cen4infoRes/russian-ukraine-monitor; Michael Sheldon (@Michael1Sheldon), “Damage to civilian houses in the Zalyutino neighborhood of Kharkiv. https://t.me/c/1347456995/38991 …,” Twitter, February 27, 2022, 4:15 p.m., https://twitter.com/Michael1Sheldon/status/1498044130416594947; Michael Sheldon, “Missile Systems and Tanks Spotted in Russian Far East, Heading West,” DFRLab, January 27, 2022, https://medium.com/dfrlab/missile-systems-and-tanks-spotted-in-russian-far-east-heading-west-6d2a4fe7717a; Jay in Kyiv (@JayinKyiv), “Not yet 24 hours after Ukraine devastated Russian positions in Kherson, a massive Russian convoy is now leaving Melitopol to replace them. This is on Alekseev …,” Twitter, July 12, 2022, 7:50 a.m., https://twitter.com/JayinKyiv/status/1546824416218193921; “Eyes on Russia Map,” Centre for Information Resilience, https://eyesonrussia.org/
65    Katerina Sergatskova, What You Should Know About Life in the Occupied Areas in Ukraine, Wilson Center, September 14, 2022, https://www.wilsoncenter.org/blog-post/what-you-should-know-about-life-occupied-areas-ukraine; Jonathan Landay, “Village near Kherson Rejoices at Russian Rout, Recalls Life under Occupation,” Reuters, November 12, 2022, https://www.reuters.com/world/europe/village-near-kherson-rejoices-russian-rout-recalls-life-under-occupation-2022-11-11/.
66    Andrew Salerno-Garthwaite, “OSINT in Ukraine: Civilians in the Kill Chain and the Information Space,” Global Defence Technology 137 (2022), https://defence.nridigital.com/global_defence_technology_oct22/osint_in_ukraine; “How Has Open-Source Intelligence Influenced the War in Ukraine?” Economist, August 30, 2022, https://www.economist.com/ukraine-osint-pod; Gillian Tett, “Inside Ukraine’s Open-Source War,” Financial Times, July 22, 2022, https://www.ft.com/content/297d3300-1a65-4793-982b-1ba2372241a3; Amy Zegart, “Open Secrets,” Foreign Affairs, January 7, 2023, https://www.foreignaffairs.com/world/open-secrets-ukraine-intelligence-revolution-amy-zegart?utm_source=twitter_posts&utm_campaign=tw_daily_soc&utm_medium=social
67    Lin, “The Emergence.”
68    “Cyber Security Strategy of Ukraine,” Presidential Decree of Ukraine, March 15, 2016, https://ccdcoe.org/uploads/2018/10/NationalCyberSecurityStrategy_Ukraine.pdf.
69    Eric Geller, “Ukraine Prepares to Remove Data from Russia’s Reach,” POLITICO, February 22, 2022, https://www.politico.com/news/2022/02/22/ukraine-centralized-its-data-after-the-last-russian-invasion-now-it-may-need-to-evacuate-it-00010777.  
70    Kuninidze et al., “Interim Assessment.”
71    Kuninidze et al., “Interim Assessment.”
72    “Datagroup to Invest $20 Million into a Large-Scale Network Modernization Project in Partnership with Cisco,” Datagroup, April 8, 2021, https://www.datagroup.ua/en/novyny/datagrup-investuye-20-mln-dolariv-u-masshtabnij-proyekt-iz-m-314.
73    Lauriane Giet, “Eutech4ukraine—Cisco’s Contribution to Bring Connectivity and Cybersecurity to Ukraine and Skills to Ukrainian Refugees,” Futurium, June 22, 2022, https://futurium.ec.europa.eu/en/digital-compass/tech4ukraine/your-support-ukraine/ciscos-contribution-bring-connectivity-and-cybersecurity-ukraine-and-skills-ukrainian-refugees; “Communiqué de Presse Solidarité Européenne Envers l’Ukraine: Nouveau Convoi d’Équipements Informatiques,” Government of France, May 25, 2022, https://minefi.hosting.augure.com/Augure_Minefi/r/ContenuEnLigne/Download?id=4FFB30F8-F59C-45A0-979E-379E3CEC18AF&filename=06%20-%20Solidarit%C3%A9%20europ%C3%A9enne%20envers%20l%E2%80%99Ukraine%20-%20nouveau%20convoi%20d%E2%80%99%C3%A9quipements%20informatiques.pdf
74    ”Atlantic Council, “Ukraine’s Digital Resilience: A conversation with Deputy Prime Minister of Ukraine Mykhailo Fedorov,” December 2, 2022, YouTube video, https://www.youtube.com/watch?v=Vl75e0QU6uE.
75    “Digital Country—Official Website of Ukraine,” Ukraine Now (Government of Ukraine), accessed January 17, 2023, https://ukraine.ua/invest-trade/digitalization/; Atlantic Council, “Ukraine’s Digital Resilience.”
76    Brad Smith, “Extending Our Vital Technology Support for Ukraine,” Microsoft, November 3, 2022, https://blogs.microsoft.com/on-the-issues/2022/11/03/our-tech-support-ukraine/; “How Amazon Is Assisting in Ukraine,” Amazon, March 1, 2022, https://www.aboutamazon.com/news/community/amazons-assistance-in-ukraine; Phil Venables, “How Google Cloud Is Helping Those Affected by War in Ukraine,” Google, March 3, 2022, https://cloud.google.com/blog/products/identity-security/how-google-cloud-is-helping-those-affected-by-war-in-ukraine.
77    Simon Handler, Lily Liu, and Trey Herr, Dude, Where’s My Cloud? A Guide for Wonks and Users, Atlantic Council, July 7, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/report/dude-wheres-my-cloud-a-guide-for-wonks-and-users/.
78    Handler, Liu, and Herr, “Dude, Where’s My Cloud?” 
79    Brad Smith, “Defending Ukraine: Early Lessons from the Cyber War,” Microsoft On the Issues, November 2, 2022, https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/; Smith, “Extending Our Vital Technology.”
80    Amazon, “How Amazon Is Assisting”; Sebastian Moss, “Ukraine Awards Microsoft and AWS Peace Prize for Cloud Services and Digital Support,” Data Center Dynamics, January 12, 2023, https://www.datacenterdynamics.com/en/news/ukraine-awards-microsoft-and-aws-peace-prize-for-cloud-services-digital-support/; Venables, “How Google Cloud”; Kent Walker, “Helping Ukraine,” Google, March 4, 2022, https://blog.google/inside-google/company-announcements/helping-ukraine/.
81    Catherine Stupp, “Ukraine Has Begun Moving Sensitive Data Outside Its Borders,” Wall Street Journal, June 14, 2022, https://www.wsj.com/articles/ukraine-has-begun-moving-sensitive-data-outside-its-borders-11655199002; Atlantic Council, “Ukraine’s Digital Resilience”; Smith, “Defending Ukraine.”
82    Nick Beecroft, Evaluating the International Support to Ukrainian Cyber Defense, Carnegie Endowment for International Peace, November 3, 2022, https://carnegieendowment.org/2022/11/03/evaluating-international-support-to-ukrainian-cyber-defense-pub-88322.
83    Smith, “Defending Ukraine,” 5, 6, 9.
84    Smith, “Defending Ukraine,” 3, 11.
85    Thomas Brewster, “Bombs and Hackers Are Battering Ukraine’s Internet Providers. ‘Hidden Heroes’ Risk Their Lives to Keep Their Country Online,” Forbes, March 15, 2022, https://www.forbes.com/sites/thomasbrewster/2022/03/15/internet-technicians-are-the-hidden-heroes-of-the-russia-ukraine-war/?sh=be5da1428844.
86    Kuninidze et al., “Interim Assessment,” 40.
87     Kuninidze et al., “Interim Assessment,”40; ““Київстар Виділяє 300 Мільйонів Гривень Для Відновлення Цифрової Інфраструктури України,” Київстар, July 4, 2022, https://kyivstar.ua/uk/mm/news-and-promotions/kyyivstar-vydilyaye-300-milyoniv-gryven-dlya-vidnovlennya-cyfrovoyi.
88    Київстар, “Київстар Виділяє”; “Mobile Connection Lifecell—Lifecell Ukraine,” Lifecell UA, accessed January 17, 2023, https://www.lifecell.ua/en/.
89    Ryan Gallagher, “Russia–Ukraine War: Telecom Workers Damage Own Equipment to Thwart Russia,” Bloomberg, June 21, 2022), https://www.bloomberg.com/news/articles/2022-06-21/ukrainian-telecom-workers-damage-own-equipment-to-thwart-russia.
90    Mykhailo Fedorov (@FedorovMykhailo), Twitter, February 26, 2022, 7:06 a.m., https://twitter.com/FedorovMykhailo/status/1497543633293266944?s=20&t=c9Uc7CDXEBr-e5-nd2hEtw.
91    Mykhailo Fedorov (@FedorovMykhailo), “Starlink — here. Thanks, @elonmusk,” Twitter, February 28, 2022, 3:19 p.m., https://twitter.com/FedorovMykhailo/status/1498392515262746630?s=20&t=vtCM9UqgWRkfxfrEHzYTGg
92    Atlantic Council, “Ukraine’s Digital Resilience.”
93    “How Elon Musk’s Satellites Have Saved Ukraine and Changed Warfare,” Economist, January 5, 2023, https://www.economist.com/briefing/2023/01/05/how-elon-musks-satellites-have-saved-ukraine-and-changed-warfare.
94    Alexander Freund, “Ukraine Using Starlink for Drone Strikes,” Deutsche Welle, March 27, 2022, https://www.dw.com/en/ukraine-is-using-elon-musks-starlink-for-drone-strikes/a-61270528.
95    Mykhailo Fedorov (@FedorovMykhailo), “Over 100 cruise missiles attacked 🇺🇦 energy and communications infrastructure. But with Starlink we quickly restored the connection in critical areas. Starlink …,” Twitter, October 12, 2022 3:12 p.m., https://twitter.com/FedorovMykhailo/status/1580275214272802817.
96    Rishi Iyengar, “Why Ukraine Is Stuck with Elon (for Now),” Foreign Policy, November 22, 2022, https://foreignpolicy.com/2022/11/22/ukraine-internet-starlink-elon-musk-russia-war/.
97    Economist, “How Elon Musk’s.”
98    Freund, “Ukraine Using Starlink”; Nick Allen and James Titcomb, “Elon Musk’s Starlink Helping Ukraine to Win the Drone War,” Telegraph, March 18, 2022, https://www.telegraph.co.uk/world-news/2022/03/18/elon-musks-starlink-helping-ukraine-win-drone-war/; Charlie Parker, “Specialist Ukrainian Drone Unit Picks off Invading Russian Forces as They Sleep,” Times, March 18, 2022, https://www.thetimes.co.uk/article/specialist-drone-unit-picks-off-invading-forces-as-they-sleep-zlx3dj7bb.
99    Matthew Gault, “Mysterious Sea Drone Surfaces in Crimea,” Vice, September 26, 2022, https://www.vice.com/en/article/xgy4q7/mysterious-sea-drone-surfaces-in-crimea.
100    Economist, “How Elon Musk’s.”  
101    Akash Sriram, “SpaceX, USAID Deliver 5,000 Satellite Internet Terminals to Ukraine Akash Sriram,” Reuters, April 6, 2022, https://www.reuters.com/technology/spacex-usaid-deliver-5000-satellite-internet-terminals-ukraine-2022-04-06/.
102    Alex Marquardt, “Exclusive: Musk’s Spacex Says It Can No Longer Pay for Critical Satellite Services in Ukraine, Asks Pentagon to Pick up the Tab,” CNN, October 14, 2022, https://www.cnn.com/2022/10/13/politics/elon-musk-spacex-starlink-ukraine.  
103    Elon Musk (@elonmusk), “Ukraine-Russia Peace: – Redo elections of annexed regions under UN supervision. Russia leaves if that is will of the people. – Crimea formally part of Russia, as it has been since 1783 (until …” Twitter, October 3, 2022 12:15 p.m., https://twitter.com/elonmusk/status/1576969255031296000; Andrij Melnyk (@MelnykAndrij), Twitter, October 3, 2022, 12:46 p.m., https://twitter.com/MelnykAndrij/status/1576977000178208768.
104    Elon Musk (@elonmusk), Twitter, October 14, 2022, 3:14 a.m., https://twitter.com/elonmusk/status/1580819437824839681; Elon Musk (@elonmusk), Twitter, October 15, 2022, 2:06 p.m., https://twitter.com/elonmusk/status/1581345747777179651.
105    Elon Musk (@elonmusk), Twitter, October 17, 2022, 3:52 p.m., https://twitter.com/elonmusk/status/1582097354576265217; Sawyer Merrit (@SawyerMerritt), “BREAKING: The Pentagon is considering paying for @SpaceX ‘s Starlink satellite network — which has been a lifeline for Ukraine — from a fund that has been used …,” Twitter, October 17, 2022, 3:09 p.m., https://twitter.com/SawyerMerritt/status/1582086349305262080.
106    Alex Marquardt and Sean Lyngaas, “Ukraine Suffered a Comms Outage When 1,300 SpaceX Satellite Units Went Offline over Funding Issues” CNN, November 7, 2022, https://www.cnn.com/2022/11/04/politics/spacex-ukraine-elon-musk-starlink-internet-outage/; Iyengar, “Why Ukraine Is Stuck.”
107    Ryan Browne, “Ukraine Government Is Seeking Alternatives to Elon Musk’s Starlink, Vice PM Says,” CNBC, November 3, 2022, https://www.cnbc.com/2022/11/03/ukraine-government-seeking-alternatives-to-elon-musks-starlink.html.
108    William Harwood, “SpaceX Launches 40 OneWeb Broadband Satellites, Lighting up Overnight Sky,” CBS News, January 10, 2023, https://www.cbsnews.com/news/spacex-launches-40-oneweb-broadband-satellites-in-overnight-spectacle/.
109    Marquardt and Lyngaas, “Ukraine Suffered”; Mehul Srivastava et al., “Ukrainian Forces Report Starlink Outages During Push Against Russia,” Financial Times, October 7, 2022, https://www.ft.com/content/9a7b922b-2435-4ac7-acdb-0ec9a6dc8397.
110    Alex Marquardt and Kristin Fisher, “SpaceX admits blocking Ukrainian troops from using satellite technology,” CNN, February 9, https://www.cnn.com/2023/02/09/politics/spacex-ukrainian-troops-satellite-technology/index.html.
111    Charles R. Davis, “Elon Musk Blocked Ukraine from Using Starlink in Crimea over Concern that Putin Could Use Nuclear Weapons, Political Analyst Says,” Business Insider, October 11, 2022, https://www.businessinsider.com/elon-musk-blocks-starlink-in-crimea-amid-nuclear-fears-report-2022-10; Elon Musk (@elonmusk), Twitter, February 12, 2022, 4:00 p.m., https://twitter.com/elonmusk/status/1624876021433368578.
112    Mykhailo Fedorov (@FedorovMykhailo), “In 21 days of the war, russian troops has already killed 100 Ukrainian children. they are using DJI products in order to navigate their missile. @DJIGlobal are you sure you want to be a …,” Twitter, March 16, 2022, 8:14 a.m., https://twitter.com/fedorovmykhailo/status/1504068644195733504; Cat Zakrzewski, “4,000 Letters and Four Hours of Sleep: Ukrainian Leader Wages Digital War,” Washington Post, March 30, 2022, https://www.washingtonpost.com/technology/2022/03/30/mykhailo-fedorov-ukraine-digital-front/
113    DJI Global (@DJIGlobal), “Dear Vice Prime Minister Federov: All DJI products are designed for civilian use and do not meet military specifications. The visibility given by AeroScope and further Remote ID …,” Twitter, March 16, 2022, 5:42 p.m., https://twitter.com/DJIGlobal/status/1504206884240183297
114    Mehul Srivastava and Roman Olearchyk, “Starlink Prices in Ukraine Nearly Double as Mobile Networks Falter,” Financial Times, November 29, 2022, https://www.ft.com/content/f69b75cf-c36a-4ab3-9eb7-ad0aa00d230c.
115    Iyengar, “Why Ukraine Is Stuck.”
116    Michael Sheetz, “SpaceX Raises Another $250 Million in Equity, Lifts Total to $2 Billion in 2022,” CNBC, August 5, 2022, https://www.cnbc.com/2022/08/05/elon-musks-spacex-raises-250-million-in-equity.html.
117    “Starshield,” SpaceX, accessed January 17, 2023, https://www.spacex.com/starshield/; Micah Maidenberg and Drew FitzGerald, “Elon Musk’s Spacex Courts Military with New Starshield Project,” Wall Street Journal, December 8, 2022), https://www.wsj.com/articles/elon-musks-spacex-courts-military-with-new-starshield-project-11670511020.  
118    “Maps: Tracking the Russian Invasion of Ukraine,” New York Times, February 14, 2022, https://www.nytimes.com/interactive/2022/world/europe/ukraine-maps.html#:~:text=Ukraine%20has%20reclaimed%2054%20percent,for%20the%20Study%20of%20War; Júlia Ledur, Laris Karklis, Ruby Mellen, Chris Alcantara, Aaron Steckelberg and Lauren Tierney, “Follow the 600-mile front line between Ukrainian and Russian forces,” The Washington Post, February 21, 2023, https://www.washingtonpost.com/world/interactive/2023/russia-ukraine-front-line-map/.
119    Jimmy Rushton (@JimmySecUK), “Ukrainian soldiers deploying a Starlink satellite internet system in liberated Kherson, allowing local residents to communicate with their relatives in other areas of Ukraine,” Twitter, November 12, 2022, 8:07 a.m., https://twitter.com/JimmySecUK/status/1591417328134402050; José Andrés (@chefjoseandres), “@elonmusk While I don’t agree with you about giving voice to people that brings the worst out of all of us, thanks for @SpaceXStarlink in Kherson, a city with no electricity, or in a train from …,” Twitter, November 20, 2022, 1:58 a.m., https://twitter.com/chefjoseandres/status/1594223613795762176.
120    Mykhailo Fedorov (@FedorovMykhailo), “Every front makes its contribution to the upcoming victory. These are Anatoliy, Viktor, Ivan and Andrii from @Vodafone_UA team, who work daily to restore mobile and Internet communications …,” Twitter, April 25, 2022, 1:13 p.m., https://twitter.com/FedorovMykhailo/status/1518639261624455168; Mykhailo Fedorov (@FedorovMykhailo), “Can you see a Starlink? But it’s here. While providers are repairing cable damages, Gostomel’s humanitarian headquarter works via the Starlink. Thanks to @SpaceX …,” Twitter, May 8, 2022, 9:48 a.m., https://twitter.com/FedorovMykhailo/status/1523298788794052615.
121    Thomas Brewster, “Ukraine’s Engineers Dodged Russian Mines to Get Kherson Back Online–with a Little Help from Elon Musk’s Satellites,” Forbes, November 18, 2022, https://www.forbes.com/sites/thomasbrewster/2022/11/18/ukraine-gets-kherson-online-after-russian-retreat-with-elon-musk-starlink-help/?sh=186e24b0ef1e.  
122    Mark Didenko, ed., “Ukrtelecom Car Hits Landmine in Sumy Region, One Dead, Three Injured,” Yahoo!, October 2, 2022, https://www.yahoo.com/video/ukrtelecom-car-hits-landmine-sumy-104300649.html.
123    Vera Bergengruen, “The Battle for Control over Ukraine’s Internet,” Time, October 18, 2022, https://time.com/6222111/ukraine-internet-russia-reclaimed-territory/.
124    Bergengruen, “The Battle for Control over Ukraine’s Internet.”
125    Atlantic Council, “Ukraine’s Digital Resilience: A conversation with Deputy Prime Minister of Ukraine Mykhailo Fedorov,” December 2, 2022, YouTube video, https://www.youtube.com/watch?v=Vl75e0QU6uE; “Keeping connected: connectivity resilience in Ukraine,” EU4Digital, February 13, 2022, https://eufordigital.eu/keeping-connected-connectivity-resilience-in-ukraine/.
126    Greg Rattray, Geoff Brown, and Robert Taj Moore, “The Cyber Defense Assistance Imperative Lessons from Ukraine,” The Aspen Institute, February 16, 2023, https://www.aspeninstitute.org/wp-content/uploads/2023/02/Aspen-Digital_The-Cyber-Defense-Assistance-Imperative-Lessons-from-Ukraine.pdf, 8
127    CRDF Global, “CRDF Global becomes Platform for Cyber Defense Assistance Collaborative (CDAC) for Ukraine,” News 19, November 14, 2022, https://whnt.com/business/press-releases/cision/20221114DC34776/crdf-global-becomes-platform-for-cyber-defense-assistance-collaborative-cdac-for-ukraine/; Dina Temple-Raston, “EXCLUSIVE: Rounding Up a Cyber Posse for Ukraine,” The Record, November 18, 2022, https://therecord.media/exclusive-rounding-up-a-cyber-posse-for-ukraine/; Rattray, Brown, and Moore, “The Cyber Defense Assistance Imperative Lessons from Ukraine.” 
128    Beecroft, Evaluating the International Support.
129    Lee Hudson, “‘There’s Not Just SpaceX’: Pentagon Looks Beyond Starlink after Musk Says He May End Services in Ukraine,” POLITICO, October 14, 2022, https://www.politico.com/news/2022/10/14/starlink-ukraine-elon-musk-pentagon-00061896.

The post A parallel terrain: Public-private defense of the Ukrainian information environment appeared first on Atlantic Council.

]]>
Aziz in Dawn: Banistan: Ignorant leaders, absurd regulation https://www.atlanticcouncil.org/insight-impact/in-the-news/aziz-in-dawn-banistan-ignorant-leaders-absurd-regulation/ Fri, 10 Feb 2023 19:50:00 +0000 https://www.atlanticcouncil.org/?p=653113 The post Aziz in Dawn: <a href="https://www.dawn.com/news/1736201/banistan-ignorant-leaders-absurd-regulation">Banistan: Ignorant leaders, absurd regulation</a> appeared first on Atlantic Council.

]]>

The post Aziz in Dawn: <a href="https://www.dawn.com/news/1736201/banistan-ignorant-leaders-absurd-regulation">Banistan: Ignorant leaders, absurd regulation</a> appeared first on Atlantic Council.

]]>
Russian War Report: Satellite imagery indicates a build-up of air defense missile systems in southern Russia https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-satellite-imagery-indicates-a-build-up-of-air-defense-missile-systems-in-southern-russia/ Fri, 03 Feb 2023 16:45:11 +0000 https://www.atlanticcouncil.org/?p=608353 Satellite imagery suggests the build-up of air defense missile systems in southern Russia while Ukraine warns of a potential spring Russian offensive.

The post Russian War Report: Satellite imagery indicates a build-up of air defense missile systems in southern Russia appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Satellite imagery indicates a build-up of air defense missile systems in southern Russia

Ukraine defense minister warns of new Russian offensive

New Russian fortifications indicate a spring offensive could be on the horizon

Tracking narratives

Russia alleges US bioweapons created COVID, targets Ukrainians

Pro-Russia Telegram channels target Israel following Iran strike

Italy targeted by Russian accusations as Rome prepares new weapons package for Ukraine

Satellite imagery indicates a build-up of air defense missile systems in southern Russia

Satellite imagery reviewed by the DFRLab suggests a new build-up of air defense missile systems in Russia’s southern military region between Rostov-on-Don and Krasnodar. The DFRLab used radar imagery forensics to detect and approximate the relocation of air defense systems near the Azov Sea. As noted by University College London Professor Ollie Ballinger, missile batteries tend to cast recognizable turbulence signals on radar imagery when their systems are activated. This phenomenon has also been documented in the Middle East and the Baltic Sea.

The Sentinel-1 satellite of the European Space Agency collects satellite imagery using radar technology. As military systems also use radar electromagnetic wavelengths in the 5gHz range, referred to as the C-Band in NATO nomenclature, these are exploitable as open-source evidence for military activity and weapons deployment.

Radar imagery, captured between January 25 and January 30, 2023, shows air defense system interference patterns. Source: DFRLab via Sentinel-1 on 5Ghz Interference Locator via Google Earth Engine)
Radar imagery, captured between January 25 and January 30, 2023, shows air defense system interference patterns. Source: DFRLab via Sentinel-1 on 5Ghz Interference Locator via Google Earth Engine)

The DFRLab monitored for deployments of such systems near a field south of Oktyabrskaya in Russia’s Krasnodar Oblast. These systems were likely located close to a military airbase. While the DFRLab cannot confirm their presence in this area nor identify the exact systems, other interference signal patterns along the eastern border of Luhansk and Donetsk could also be interpreted as evidence of more electromagnetic radar-casting defense systems.

Valentin Châtelet, Research Associate, Brussels, Belgium

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Ukraine defense minister warns of new Russian offensive

Ukrainian Defense Minister Oleksii Reznikov warned that Russia might attempt to launch a new offensive before the first anniversary of the Ukraine invasion on February 24. According to Reznikov, Russia is concentrating as many as 500,000 troops along Ukraine’s borders, significantly exceeding the declared 300,000 soldiers. Reznikov speculated that the offensive could come from the east and the south simultaneously. The minister also emphasized that military assistance from allies is needed to repel a possible attack.

Ukrainian military intelligence also stated that Ukraine expects a new wave of fighting in the next two months. Meanwhile, Russian President Vladimir Putin held a meeting to discuss the restoration of infrastructure in Crimea, Belgorod, Bryansk, and Kursk following Ukrainian shelling. He noted that his administration is prioritizing ending Ukrainian shelling along border regions.

On the evening of February 1, Russian forces struck the center of Kramatorsk with a rocket. Three civilians were killed and more than 20 people were injured. At least eight apartments were damaged, with one destroyed. 

Meanwhile, Russian offensive operations have restarted in various locations. In the direction of Kupiansk, the Russian army shelled Dvorichna, Synkivka, Ivanivka, Kyslivka, Kotlyarivka, Tabayivka, Pischane, Novoselivske, and Stelmakhivka. The Russian army continued to attack villages and pressed Ukraine’s army positions toward Lyman, Zaporizhzhia, Kherson, Vuhledar, Avdiivka, and Bakhmut.

Valentin Châtelet, Research Associate, Brussels, Belgium

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

New Russian fortifications indicate a spring offensive could be on the horizon

Russian armed forces have dug trenches in Zaporizhzhia and Kherson Oblasts that the DFRLab has reviewed extensively on social media and satellite imagery. The southern flank in the Russian-occupied Zaporizhzhia Oblast has seen a rise in the build-up of trenches and fortifications stretching from Polohy to Vesele. The DFRLab identified massive underground structures in three different locations, pointing at a Russian reinforcement in their southern positions.

On January 27, trenches stretching twenty-one kilometers and circling Berdyansk’s airport tipped off OSINT researchers to Russia’s expected escalation on the southern flank. The DFRLab identified and documented two other occurrences of defensive build-ups on the eastern bank of the Dnipro River.

Between mid-December and January 31, 2023, Russian soldiers dug up underground trenches in an odd-B shape in the vicinity of Vesele, a village forty kilometers northeast of Melitopol. The DFRLab identified two structures, along with other fortifications across neighboring fields north of Vesele. The other structure, located west of the underground trenches, seems to resemble a defense base immediately connected to the village by a road.

Satellite imagery captured on January 27, 2023, shows new fortifications and trenches north of Vesele. Source: DFRLab via Planet.com
Satellite imagery captured on January 27, 2023, shows new fortifications and trenches north of Vesele. Source: DFRLab via Planet.com

In Mykhailivka, a city facing Zaporizhzhia from the other side of the riverbank, the DFRLab located similar trenches and fortifications. These stretch up to fifteen kilometers long, protecting the entire city near the front line.

Valentin Châtelet, Research Associate, Brussels, Belgium

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russia alleges US bioweapons created COVID, targets Ukrainians

On January 30, Russia’s Ministry of Defense published a collection of conspiracy narratives alleging the United States operates a biological weapons program. The ministry published the initial text on the free and anonymous blogging platform telegra.ph, developed by Telegram for sharing long-form posts. 

The post begins with allegations that the US is involved in the emergence and spread of COVID-19. It names various US agencies and Microsoft founder Bill Gates as key actors in the pandemic. The ministry claims to have acquired more than “20,000 documents, reference and analytical materials, as well as surveyed witnesses and participants of the US biological programs.” The post concludes that these materials “confirm that the Pentagon aimed at creating elements of a biological weapon, and testing it on the population of Ukraine and other countries along the perimeter of the Russian borders.”

The defense ministry shared some of its “evidence” via the cloud service Disk Yandex. The link contains three folders containing unverified documents. The folders are titled “virological studies,” “experiments on Ukrainian citizens and military,” and “Rift Valley fever epidemic.” 

The Facebook account of the Russian embassy in the United States amplified the narrative and shared the documents. The documents also found their way to Kremlin propaganda platforms.

The DFRLab has tracked many instances of Russia spreading falsehoods about the US operating a biological weapons program since the start of the pandemic; Russia now employs similar narratives to justify its war against Ukraine.

Eto Buziashvili, Research Associate, Tbilisi, Georgia

Pro-Russia Telegram channels target Israel following Iran strike

Pro-Russia Telegram channels targeted Israel following a suspected Israeli drone strike against an Iranian ammunition factory on January 28. A few weeks earlier, the United States sanctioned Iran’s defense and aviation sector for supplying Russia with drones that are being used against Ukraine.

The Telegram channels responded to the Iranian strike by spreading anti-Israel and antisemitic narratives. Russian military blogger Roman Saponkov endorsed calls for the “demilitarization of Israel.” The account Операция Z (“Operation Z”) used antisemitic expressions to describe Jewish people. Elsewhere, Kremlin propagandist Vladimir Solovyev shared a post accusing Israel of providing shelter to “Nazis from the ‘Azov’ terrorist group.” Other pro-war channels shared graphic photos with claims that Wagner had found the bodies of Israeli and Polish mercenaries fighting in Ukraine.

Eto Buziashvili, Research Associate, Tbilisi, Georgia

Italy targeted by Russian accusations as Rome prepares new weapons package for Ukraine

Russia’s chief diplomat in Italy accused the country of engaging in anti-Russian discrimination, in an apparent attempt to pressure Italy to stop backing Ukraine and sway public opinion in favor of Russia. Earlier this week, Russian ambassador to Italy Sergey Razov published an open letter, ostensibly in response to comments made by Defense Minister Guido Minister Crosetto on why Ukraine needs international support. Razov accused the Italian government of putting in place “discriminatory restrictions” against Russian citizens. The letter was published on the Facebook account of the Russian embassy in Italy; at the time of writing, it had received more than 2,200 likes, 792 comments, and 698 reshares. 

In January, Italian media outlet Decode39 reported that the Russian embassy in Italy had published a series of social media posts “targeting Italy’s supposed military supplies to Ukraine in a bid to cast doubt on Rome’s logistical support and its effectiveness on the battlefield.” The social media posts were widely reshared and amplified the Kremlin narrative that falsely paints Ukrainians as “neo-Nazis.”   

Italy is poised to send a new package of military aid to Ukraine. “According to Defense Minister Crosetto, the package will contain air defense systems, namely Aspide surface-to-air missiles and the more advanced SAMP/T missile shield, of which some components will be supplied by Rome and others by Paris.  

Mattia Caniglia, Associate Director for Capacity Building, Brussels 

The post Russian War Report: Satellite imagery indicates a build-up of air defense missile systems in southern Russia appeared first on Atlantic Council.

]]>
The 5×5—China’s cyber operations https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-chinas-cyber-operations/ Mon, 30 Jan 2023 05:01:00 +0000 https://www.atlanticcouncil.org/?p=604684 Experts provide insights into China’s cyber behavior, its structure, and how its operations differ from those of other states.

The post The 5×5—China’s cyber operations appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

On October 6, 2022, the Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, and National Security Agency released a joint cybersecurity advisory outlining the top Common Vulnerabilities and Exposures that Chinese state-linked hacking groups have been actively exploiting since 2020 to target US and allied networks. Public reporting indicates that, for the better part of the past two decades, China has consistently engaged in offensive cyber operations, and as the scope of the country’s economic and political ambitions expanded, so has its cyber footprint. The number of China-sponsored and aligned hacking teams are growing, as they develop and deploy offensive cyber capabilities to serve the state’s interests—from economic to national security.

We brought together a group of experts to provide insights into China’s cyber behavior, its structure, and how its operations differ from those of other states.

#1 Is there a particular example that typifies the “Chinese” model of cyber operations?

Dakota Cary, nonresident fellow, Global China Hub, Atlantic Council; consultant, Krebs Stamos Group

“China’s use of the 2021 Microsoft Exchange Server vulnerability to access email servers captures the essence of modern Chinese hacking operations. A small number of teams exploited a vulnerability in a critical system to collecting intelligence on their targets. After the vulnerability became public and their operation’s stealth was compromised, the number of hacking teams using the vulnerability exploded. China has established a mature operational segmentation and capabilities-sharing system, allowing teams to quickly distribute and use a vulnerability after its use was compromised.” 

John Costello, former chief of staff, Office of the National Cyber Director

“No. China’s approach has evolved too quickly; its actors too heterogenous and many. What has remained consistent over time is the principal focus of China’s cyber operations, which, in general, is the economic viability and growth of China’s domestic industry and advancement of its scientific research, development, and modernization efforts. China does conduct what some would call ‘legitimate’ cyber operations, but these are vastly overshadowed by campaigns that are clearly intended to obtain intellectual property, non-public research, or place Chinese interests in an advantageous economic position.” 

Bulelani Jili, nonresident fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council

“What is unique is how the party-state promotes surveillance technology and cyber operations abroad. It utilizes diplomatic exchanges, law enforcement cooperation, and training programs in the Global South. These initiatives not only advance the promotion of surveillance technologies and cyber tools but also support the government’s goals with regard to international norm-making in multilateral and regional institutions.” 

Adam Kozy, independent analyst; CEO and founder, SinaCyber; former official with the FBI’s Cyber Team and Crowdstrike’s Asia-Pacific Analysis Team

“There is not one typical example of Chinese cyber operations in my opinion, as operations have evolved over time and are uneven in their distribution of tooling, access to the vulnerability supply chain, and organization. However, one individual who typifies how the Chinese Communist Party (CCP) has co-opted domestic hacking talent for state-driven espionage purposes is Tan Dailin (谭戴林/aka WickedRose) of WICKED PANDA/APT41 fame. He first began as a patriotic hacker during his time at university in 2000-2002, conducting defacements during the US-Sino hacker war, but was talent spotted by his local People’s Liberation Army (PLA) branch, the Chengdu Military Region Technical Reconnaissance Bureau (TRB) and asked to compete in a hackathon. This was followed by an “internship” where he and his fellow hackers at the NCPH group taught attack/defense courses and appear to have played a role in the 2003-2006 initial Titan Rain attacks probing US and UK government systems. Tan and his friends continued to do contract work for gaming firms, hacking a variety of South Korean, Japanese, and US gaming firms, which gave them experience with high-level vulnerabilities that are able to manipulate at the kernel level and also afforded them stolen gaming certificates allowing their malware to evade antivirus detection. After a brief period where he was reportedly arrested by the Ministry of Public Security (MPS) for hacking other domestic Chinese groups, he reemerged with several new contracting entities that have been noted to work for the Ministry of State Security (MSS) in Chengdu. Tan has essentially made a very comfortable living out of being a cyber mercenary for the Chinese state, using his legacy hacking network to constantly improve and upgrade tools, develop new intrusion techniques, and stay relevant for over twenty years.” 

Jen Roberts, program assistant, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council

“While no one case study stands out to typify a “Chinese” model, Chinese cyber operations blend components of espionage and entrepreneurship and capitalize on China’s pervasiveness in the international economy. One example of this is the Nortel/Huawei example where espionage, at least in part, caused the collapse of the Canadian telecommunications company.”

#2 What role do non-state actors play in China’s approach to cyber operations?

 

Cary: “Chinese security services still have a marked preference for using contracted hacking teams. These groups often raise money from committing criminal acts, in addition to work on behalf of intelligence agencies. Whereas in the United States, the government may purchase vulnerabilities to use on an offensive mission or hire a few companies to conduct cyber defense on a network, the US government does not hire firms to conduct specific offensive operations. In China, the government may hire teams for both offensive and defensive work, including offensive hacking operations.” 

Costello: “Non-state actors play a myriad number of roles. Most notably, Department of Justice and Federal Bureau of Investigation indictments show clear evidence of contractual relationships between the MSS and non-state actors conducting cyber intelligence operations. Less conventional, Chinese hacktivists have on occasion played a limited but substantive role in certain cases, such as cyberattacks against South Korea’s Lotte group during the US Terminal High Altitude Area Defense (THAAD) system kerfuffle in 2017. Hypothetically, China’s military strategy calls for a cyber defense militia; but the contours or reality of mobilization, training, and reliability are unclear. China’s concept of ‘people’s war’ in cyberspace—a familiar adoption of Maoist jargon for new concepts—has been discussed but has yet to be seen in practice in any meaningful form.” 

Jili: “State investment and procurement of public security systems from private firms are driving the development of China’s surveillance ecosystem. Accordingly, private firm work and collaboration with the state are scaling Beijing’s means to conduct surveillance operations on targeted domestic populations that are perceived threats to regime stability. Crucially, given the financial incentives to collaborate with Beijing, private companies have limited reasons not to support state security prerogatives.” 

Kozy: “This question has the issue of mirroring bias. We tend to view things from a United States and Western lens when evaluating whether someone is a state actor or not, because we have very defined lines around what an offensive cyber operator can do acting on behalf of the US government. China has thrived in this grey area, relying on patriotic hackers with tacit state approval at times, hackers with criminal businesses, as well as growing its domestic ability to recruit talented researchers from the private sector and universities. The CCP has historically compelled individuals who would be considered traditionally non-state-affiliated actors to aid campaigns when necessary. Under an authoritarian regime like the CCP, any individual who is in China or ethnically Chinese can become a state actor very quickly. Actors like Tan Dailin do constitute a different type of threat because the CCP effectively co-opts their talents, while turning a blind eye to their criminal, for-profit side businesses that are illegal and have worldwide impact.” 

Roberts: “Chinese non-state actors are very involved in Chinese cyber operations. A wide variety of non-state entities, such as contractors and technology conglomerates (Alibaba, Huawei, etc.), have worked in tandem with the CCP on a variety of research, development, and execution of cyber operations. This relationship is fortified by Chinese disclosure laws and repercussions of violating them. While Russia’s relationship with non-state actors relies on the opaqueness of non-state groups’ relationships with the government, China’s relationship with non-state entities is much more transparent.”

#3 How do China’s cyber operations differ from those of other states in the region?

Cary: “China has the most hackers and bureaucrats on payroll in Asia. Its operations are not different in kind nor process, but scale. While Vietnam’s or India’s cyber operators are able to have some effect in China, they are not operating at the scale at which China is operating. The most significant differentiator—which is still only speculation—is that China likely collects from the backbone of the Internet via agreements or compromise of telecommunication giants like Huawei, China Unicom, etc., as well as accessing undersea cables.” 

Costello: “Scale. The scale of China’s cyber operations dwarfs those of other countries in the region—the complexity and sheer range of targeting, and the number of domestic technology companies whose increasingly global reach may be utilized for intelligence gain and influence. As China’s influence and global reach expands, so too does its self-perceived need to protect and further expand its interests. Cyber serves as a low-risk and often successful tool to accomplish this in economic and security realms.” 

Jili: “While most regional and global players’ cyber operations have a domestic bent, Beijing also actively promotes surveillance technology and practices abroad through diplomatic exchanges, law enforcement cooperation, and training programs. These efforts not only advance the proliferation of Chinese public security systems, but they also support the government’s goals concerning international norm-making in multilateral and regional institutions.” 

Kozy: “China is by far the most aggressive cyber power in its region. It can be debated that Russian cyber operatives are still more advanced in terms of sophistication, but China aggressively conducts computer network exploitations against all of its regional neighbors with specific advanced persistent threat (APT) groups across the PLA and MSS having regional focuses. Some of its neighbors such as India, Vietnam, Japan, and South Korea have advanced capabilities of their own to combat this, but there are regular public references to successful Chinese cyber campaigns against these countries despite significant defensive spending. Regional countries without cyber capabilities likely have long-standing compromises of critical systems.” 

Roberts: “China has a talent for extracting intellectual property and conducting large-scale espionage. While other threat actors in the region, like North Korea, also conduct espionage operations, North Korea’s primary focus is on operations that prioritize fiscal extraction to fund regime activity, while China seems much more intent on collecting data for a variety of purposes. Despite differing capacities, sophistication, and types of operations, the end goals for both states are not all that different—political survival.”

More from the Cyber Statecraft Initiative:

#4 How have China’s offensive cyber operations changed since 2018?

Cary: “China’s emphasis on developing its domestic pipeline of software vulnerabilities is paying off. China has passed policies that co-opt private research on behalf of the security services, support public software vulnerability competitions, and invest in technology to automate software vulnerability discovery. Together, as outlined by Microsoft’s Threat Intelligence Center’s 2022 analysis, China is combining these forces to use more software vulnerabilities now than ever before.”

Costello: “China’s cyber operations have unsurprisingly grown in scale and sophistication. Actors are less ‘noisy’ and China’s tactical approach to cyber operations appears to have evolved towards more scalable operations, namely supply-chain attacks and targeting service providers. These tactics have the advantage of improving the return on investment for an operation or campaign, as they allow compromise of all customers who use the product or service while minimizing risk of discovery. Supply chain attacks or compromise through third-party services can also be more difficult to detect and identify. China’s cyber landscape is not homogenous, and there remains great variability in sophistication across the range of Chinese actors.

As reported by the Director of National Intelligence in the last few years, China has increasingly turned towards targeting US critical infrastructure, particular natural gas pipelines. This is an evolution, though whether it is ‘learning by doing,’ operational preparation of the battlespace, or nascent ventures by a more operationally-focused Strategic Support Force (reorganization into a Space and Cyber Corps from 2015-17) is unclear. Time will most certainly tell.”

Jili: “Since 2018, the party-state has been more active in utilizing platforms like BRICS (Brazil, Russia, India, China, and South Africa), an emerging markets organization, and the Forum on China-Africa Cooperation (FOCAC) to promote digital infrastructure products and investments in the Global South. Principally, through multilateral platforms like FOCAC, Beijing has promoted resolutions to increase aid and cooperation in areas like cybersecurity and cyber operations.”

Kozy: “Intrusions from China have continued unabated since 2018, with a select number of Chinese APTs having periods of inactivity due to COVID-19 shutdowns. The Cyber Security Law and National Intelligence Law, both enacted in 2017, provided additional legal authority for China’s intelligence services to access data and co-opt Chinese companies for use in vaguely worded national security investigations. Of note is China’s efforts to increase the number of domestic cybersecurity conferences and nationally recognized cybersecurity universities as part of ongoing recruitment pipelines for cyber talent. Though there was increased focus from the Western cybersecurity community on MSS-affiliated contractors after the formation of the PLA Strategic Support Force (PLASSF) in 2015, more PLA-affiliated APT groups have emerged since the pandemic with new tactics, techniques, and procedures. The new PLASSF organization means these entities may be compromising high-value targets and then assessing them for use for offensive cyber operations in wartime scenarios or cyber espionage operations.”

Roberts: “Since 2018, Chinese offensive cyber operations have increased in scale. China has reinvigorated its workforce capacity-building efforts to increase the overall quantity and quality of workers. It has tightened its legal regime, cracking down on external vulnerability disclosure. It has also begun significantly investing in disinformation campaigns, especially against Taiwan. This is evident by the Chinese influence in Taiwan’s 2018 and 2020 elections.”

#5 What domestic entities, partnerships, or roles exist in China’s model of cyber operations model that are not present in the United States or Western Europe?

Cary: “China’s emphasis on contracted hackers coincides with divergent levels of trust between the central government and some provincial-level MSS hacking teams. Some researchers maintain that one contracted hacking team pwns targets inside China to do internal security prior to visits by central government leaders. While there is scant evidence that these attitudes and beliefs make their way into operations against foreign targets, they do likely impact the distribution of responsibilities and operations in a way not seen in mature democracies. The politicization of intelligence services is particularly risky in China’s political system.”

Costello: “The extralegal influence of the CCP cannot be overstated. Though the National Security Law, National Intelligence Law, and other laws ostensibly establish a legal foundation for China’s security apparatus, the reality is that the party is not bound strictly to these laws—and they only demonstrate a public indicator of what power it may possess. The lack of any independent judiciary suggests unchecked power of the CCP to co-opt or compel assistance from any citizen or company for which it almost certainly has near-total leverage. While the suspicion of Chinese organizations can be overblown, the idea that the CCP has the power to utilize not each but any organization is sobering and the root of many of these concerns. The lack of rigorous rule of law, in these limited circumstances, is certainly a competitive advantage in the intelligence sphere.”

Jili: “Beijing has nurtured a tech industry and environment that actively support the party-state’s aims to bolster government surveillance and cyber capabilities. From large firms to startups, many companies work with the state to conduct vulnerability research, develop threat detection capabilities, and produce security and intelligence products. While these private firms rely on Chinese venture capital and state loans, they have grown to service a global customer base.”

Kozy: “Starting with the 2015 control of WooYun, China’s largest vulnerability site, the CCP has gained an incredible amount of control of the vulnerability supply chain within China, which affords its cyber actors access to high-value vulnerabilities for use in their campaigns. The aforementioned 2017 laws also made it easier for Chinese authorities to prevent domestic researchers from competing in cyber conferences overseas and improved access to companies doing vulnerability research in China. The CCP’s public crackdowns on Jack Ma, Ant Financial, and many others have shown that the CCP fears the influence its tech firms have and has quickly moved to keep its tech giants loyal to the party; a stark contrast to the relationships that the United States and European Union have with tech giants like Google, Facebook, etc.”

Roberts: “While corporate-government partnerships exist everywhere, what separates the United States and Western Europe from China is the scope and scale of the connective tissue that exists between the two entities. In China, this relationship has more explicit requirements in the cyber domain, especially when it comes to vulnerability disclosure.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—China’s cyber operations appeared first on Atlantic Council.

]]>
Putin is facing defeat in the information war https://www.atlanticcouncil.org/blogs/ukrainealert/putin-is-facing-defeat-in-the-information-war/ Tue, 24 Jan 2023 21:36:06 +0000 https://www.atlanticcouncil.org/?p=605197 Russia's entire invasion of Ukraine has been built on a web of deceit but Putin is now facing defeat in the information war as the gap between the Kremlin's alternative reality and the real world becomes too big to bridge.

The post Putin is facing defeat in the information war appeared first on Atlantic Council.

]]>
As the world prepares to mark International Holocaust Remembrance Day on January 27, the European Union has accused Russia of “trampling on the memory” of the six million Jews who perished in the Holocaust. This rebuke came following controversial recent comments by Russian Foreign Minister Sergei Lavrov, who compared Western support for Ukraine to the Nazi genocide of European Jewry.

Speaking on January 18, Lavrov claimed a coalition of Western countries led by the United States was following in the footsteps of Napoleon and Hitler with the goal of destroying Russia. “They are waging war against our country with the same task: the final solution of the Russian question,” he said in direct reference to Hitler’s infamous “final solution” of the Jewish question.

Lavrov’s Holocaust comparison was met with widespread international criticism. In a strongly worded statement, EU foreign policy chief Josep Borrell said his Russian counterpart’s comments were “entirely misplaced, disrespectful, and trample on the memory of the six million Jewish people, and other victims, who were systematically murdered in the Holocaust. The Russian regime’s manipulation of the truth to justify their illegal war of aggression against Ukraine has reached another unacceptable and despicable low point.”

The Israeli Foreign Ministry branded Lavrov’s remarks “unacceptable,” while French diplomats said the Russian foreign minister’s attempt to compare international opposition to the invasion of Ukraine with the Holocaust was “outrageous and disgraceful.” Meanwhile, UK Foreign Secretary James Cleverly called Lavrov’s comments “totally abhorrent” while noting, “Russia is not the victim. Russia is the aggressor.”

In the US, national security spokesperson John Kirby expressed indignation at Lavrov’s attempt to draw parallels between the Nazi genocide and the response to Russia’s attack on Ukraine. “How dare he compare anything to the Holocaust, let alone a war that they started,” he told reporters at the White House. “It’s almost so absurd that it’s not worth responding to, other than the truly offensive manner in which he tried to cast us in terms of Hitler and the Holocaust.”

This was not Lavrov’s first flirtation with anti-Semitic historical distortions. During an appearance on Italian TV in spring 2022, Russia’s top diplomat sparked outrage by repeating the notorious anti-Semitic trope that Hitler was Jewish. When asked why Russia insists on calling Ukraine a “Nazi state” despite the fact that Ukrainian President Volodymyr Zelenskyy is Jewish, Lavrov replied that Nazi leader Adolf Hitler “also had Jewish blood.”

The fallout from Lavrov’s very public descent into the squalid world of anti-Semitic conspiracy theories was predictably severe. Following a chorus of international condemnation led by Israel, Vladimir Putin was eventually obliged to intervene. In early May, the Russian dictator called the Israeli Prime Minister to personally apologize on behalf of his foreign minister.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

The international backlash over Lavrov’s blunders illustrates the limitations of the propaganda narratives developed by Moscow to justify the invasion of Ukraine. While captive audiences inside Russia have been largely convinced by attempts to blame hostilities on “Ukrainian Nazis” and the “Russophobic West,” these unsubstantiated arguments have proven far less persuasive internationally and have served to further undermine the Kremlin’s dwindling credibility.

Russian attempts to portray Ukrainians as Nazis are nothing new and can be traced back to Soviet wartime propaganda. The tactic has been enthusiastically revived by the Kremlin in recent years to dehumanize Ukrainians and legitimize attempts to extinguish Ukrainian independence. This plays well in modern Russia, where the Putin regime has fostered a cult-like reverence for the Soviet role in World War II that includes the demonizing of all opponents as “fascists.” However, the lack of any actual evidence to support these poisonous allegations has left outside observers deeply skeptical.

As Lavrov himself discovered during last year’s disastrous Italian TV interview, most people living beyond the suffocating confines of the Kremlin propaganda bubble regard the election of Ukraine’s Russian-speaking Jewish President Volodymyr Zelenskyy as convincing proof that Ukraine is anything but a Nazi state. Likewise, the consistent failure of Ukraine’s far right parties to secure more than 2% of the vote in national ballots makes a mockery of Moscow’s entire “Nazi Ukraine” narrative. In the eleven months since the full-scale invasion of Ukraine began, Russia has yet to identify any of the “Nazis” it claims to be fighting or define exactly what the stated war aim of “de-Nazification” means in practice.

Lavrov’s lurid allegations of anti-Russian plots suffer from similar problems. While domestic audiences in Russia have been conditioned for decades to view their country as a blameless victim of irrational Western Russophobia, there is a growing consensus in the wider world that the international community has actually been much too slow to react to the mounting threats posed by Putin’s Russia.

Far from pursuing the destruction of Russia, the West responded to Moscow’s wars of aggression in Georgia and Ukraine with a series of misguided resets and endless policies of appeasement. Indeed, it was not until Putin launched the biggest European conflict since World War II last February that Western leaders finally and reluctantly acknowledged the necessity of countering the Kremlin. Even now, as Russia’s invasion approaches the one-year mark, the debate over Western support for Ukraine remains dominated by excessive caution and a debilitating desire to avoid escalation. These are self-evidently not the actions of an international coalition seeking “the final solution to the Russian question,” as Lavrov so absurdly claims.

It is still far too early for Ukraine to declare victory in the information war. Russian disinformation narratives continue to resonate on the vocal fringes of Western society while also appealing to widespread anti-Western sentiment in much of Asia, Africa, and South America. Nevertheless, the wholesale revulsion over Lavrov’s recent Holocaust remarks is a timely reminder of the increasingly unbridgeable gap separating Russia’s alternative reality from the real world.

Almost one year since the full-scale invasion of Ukraine began, only a handful of fellow pariah states are still prepared to stand with Russia on the global stage as international audiences reject Kremlin claims of phantom fascists and anti-Russian conspiracies. Instead, there is growing recognition that the war in Ukraine is an act of naked imperial aggression that threatens to destabilize the wider world.

Russia’s attack on Ukraine has been built on an unprecedented web of deceit and distortion. As these lies lose their power and the reality of Putin’s genocidal agenda becomes impossible to ignore, a consensus is emerging that the war in Ukraine will only end when Russia is decisively defeated.

Peter Dickinson is Editor of the Atlantic Council’s UkraineAlert Service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Putin is facing defeat in the information war appeared first on Atlantic Council.

]]>
Russian War Report: Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize  https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russian-hacker-wanted-by-the-fbi-reportedly-wins-wagner-hackathon-prize/ Fri, 13 Jan 2023 19:04:07 +0000 https://www.atlanticcouncil.org/?p=602036 In December 2022, Wagner Group organized a hackathon that was won by a man wanted by the FBI for his connection to computer malware.

The post <strong>Russian War Report: Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize</strong>  appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Russian forces claim control of strategic Soledar

Tracking narratives

Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize

Frenzy befalls French company accused of feeding Russian forces on New Year’s Eve

Former head of Russian space agency injured in Donetsk, mails shell fragment to French ambassador

Sputnik Lithuania’s former chief editor arrested

International response

New year brings new military aid for Ukraine

Ukrainian envoy to Georgia discusses deteriorating relations between nations

Russian forces claim control of strategic Soledar

Russia said on January 13 that its forces had taken control of the contested city of Soledar. Recent fighting has been concentrated in Soledar and Bakhmut, two cities in the Donetsk region that are strategically important to Ukrainian and Russian forces. Moscow has been trying to take control of the two cities since last summer. Over the past week, Russia has increased its presence on the fronts with the support of Wagner units. Russia wants control of the Soledar-Bakhmut axis to cut supply lines to the Ukrainian armed forces.  

On January 10, Russian sources claimed that Wagner forces had advanced into Soledar. Interestingly, Wagner financier Yevgeny Prigozhin denied the claim and said the forces were still engaged in fighting. Wagner’s presence was established in a camp near Bakhmut. Soldiers from the Wagner Group and other special forces deployed to Bakhmut after other military units had failed to break through the Ukrainian defense.  

On January 11, Ukrainian Deputy Defense Minister Anna Malyar said that heavy fighting was taking place in Soledar and that Russian forces had replaced the unit operating in the city with fresh troops and increased the number of Wagner soldiers among them. The same day, Prigozhin claimed that Wagner forces had taken control of Soledar. The Ukrainian defense ministry denied the allegation. On January 12, Ukrainian sources shared unconfirmed footage of soldiers driving on the main road connecting Bakhmut and Soledar with Sloviansk and Kostyantynivka to as evidence that the area remained under Ukrainian control.  

Elsewhere, on January 11, the Kremlin announced that Valery Gerasimov would replace Sergei Surovikin as commander of Russian forces in Ukraine. The unexpected move could be interpreted as evidence of a struggle for influence in Russian military circles. Surovikin is considered close to Prigozhin’s entourage, which has criticized senior officers recently, including Gerasimov. Some analysts believe that the change signals a possible military escalation from Russia. 

Furthermore, on January 8, Ukrainian forces repelled a Russian offensive the vicinity of Makiyivka and Stelmakhivka. Further north of Lysychansk, on January 11, Ukraine also repelled an attack on the city of Kreminna. In the neighboring Kharkiv region, aerial threats remain high. On the southern front, the city of Kherson and several cities across the Zaporizhzhia region remain targets of Russian attacks.  

Lastly, a new Maxar satellite image from nearby Bakhmut exemplifies the brutality of war on the frontline in Donetsk. The image shows thousands of craters, indicating the intensity of the artillery shelling and exchange of fire between Ukrainian and Russian forces.

Valentin Châtelet, Research Associate, Brussels, Belgium

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize

In December 2022, the Wagner Group organized a hackathon at its recently opened headquarters in St. Petersburg, for students, developers, analysts, and IT professionals. Wagner announced the hackathon on social media earlier that month. Organizers created the promotional website hakaton.wagnercentr.ru, but the website went offline soon after. A December 8 archive of the website, accessed via the Internet Archive Wayback Machine, revealed that the objective of the hackathon was to “create UAV [unmanned aerial vehicle] positioning systems using video recognition, searching for waypoints by landmarks in the absence of satellite navigation systems and external control.” Hackathon participants were asked to complete the following tasks: display the position of the UAV on the map at any time during the flight; direct the UAV to a point on the map indicated by the operator; provide a search for landmarks, in case of loss of visual reference points during the flight and returning the UAV to the point of departure, in case of a complete loss of communication with the operator.   

On December 9, Ukrainian programmers noticed that hakaton.wagnercentr.ru was hosted by Amazon Web Services and asked users to report the website to Amazon. Calls to report the channel also spread on Telegram, where the channel Empire Burns asked subscribers to report the website and provided instructions on how to do so. Empire Burns claims hakaton.wagnercentr.ru first went offline on December 9, which tallies with archival posts. However, there is no evidence that reporting the website to Amazon resulted in it being taken offline.   

Snapshots of hakaton.wagnercentr.ru from the Wayback Machine show the website was created in a Bitrix24 online workspace. A snapshot captured on December 13 shows an HTTP 301 status, which redirects visitors to Wagner’s main website, wagnercentr.ru. The Wagner website appears to be geo-restricted for visitors outside Russia. 

On December 23, a Wagner Telegram channel posted about the hackathon, claiming more than 100 people applied. In the end, forty-three people divided into twelve teams attended. The two-person team GrAILab Development won first place, the team SR Data-Iskander won second place, and a team from the company Artistrazh received third place. Notably, one of Artistrazh’s co-founders is Igor Turashev, who is wanted by the FBI for his connection to computer malware that the bureau claims infected “tens of thousands of computers, in both North America and Europe, resulting in financial losses in the tens of millions of dollars.” Artistrazh’s team comprised four people who won 200,000 Russian rubles (USD $3,000). OSINT investigators at Molfar confirmed that the Igor Turashev who works at Artistrazh is the same one wanted by the FBI.  

Wagner said that one of the key objectives of the hackathon was the development of IT projects to protect the interests of the Russian army, adding that the knowledge gained during the hackathon could already be applied to clear mines. Wagner said it had also invited some participants to collaborate further. The Wagner Center opened in St. Petersburg in early November 2022; the center’s mission is “to provide a comfortable environment for generating new ideas in order to improve Russia’s defense capability, including information.”

Givi Gigitashvili, DFRLab Research Associate, Warsaw, Poland

Frenzy befalls French company accused of feeding Russian forces on New Year’s Eve

A VKontakte post showing baskets of canned goods produced by the French company Bonduelle being distributed to Russian soldiers on New Year’s Eve has sparked a media frenzy in France. The post alleges that Bonduelle sent Russian soldiers a congratulatory package, telling them to “come back with a win.” The post quotes Ekaterina Eliseeva, the head of Bonduelle’s EurAsia markets. According to a 2019 Forbes article, Eliseeva studied interpretation at an Russian state security academy.  

Bonduelle has issued several statements denying the social media post and calling it fake. However, Bonduelle does maintain operations in Russia “to ensure that the population has access to essential foodstuff.”  

French broadcaster TV 5 Monde discovered that Bonduelle’s Russia division participated in a non-profit effort called Basket of Kindness, sponsored by the Fund of Presidential Grants of Russia. Food and supplies were gathered by food banks to be delivered to vulnerable segments of the population. However, during the collection drive, Dmitry Zharikov, governor of the Russian city of Podolsk, posted on Telegram that the collections would also serve military families.   

The story was shared on national television in France and across several international outlets. The Ukrainian embassy in France criticized Bonduelle for continuing to operate in Russia, claiming it was “making profits in a terrorist country which kills Ukrainians.”

Valentin Châtelet, Research Associate, Brussels, Belgium

Former head of Russian space agency injured in Donetsk, mails shell fragment to French ambassador

Dmitry Rogozin, former head of the Russian space agency Roscosmos, said he was wounded in Ukrainian shelling on December 21, 2022, at the Shesh hotel in Donetsk while “celebrating his birthday.” In response, Rogozin sent a letter to Pierre Lévy, the French ambassador to Russia, with a fragment of the shell.   

In the letter, Rogozin accused the French government of “betraying [Charles] De Gaulle’s cause and becoming a bloodthirsty state in Europe.” The shell fragment was extracted from Rogozin’s spine during surgery and allegedly came from a French CAESAR howitzer. Rogozin requested the fragment be sent to French President Emmanuel Macron. His message was relayed by Russian news agencies, and on Telegram by pro-Russian and French-speaking conspiracy channels.  

At the time of the attack, Rogozin was accompanied by two members of his voluntary unit, “Tsar’s wolves,” who were killed in the attack, according to reporting from RT, RIA Novosti, and others.  

Valentin Châtelet, Research Associate, Brussels, Belgium

Sputnik Lithuania’s former chief editor arrested

On January 6, Marat Kasem, the former chief editor of Sputnik Lithuania, was arrested in Riga, Latvia, on suspicion of “providing economic resources” to a Kremlin propaganda resource under EU sanctions.  

The following day, pro-Kremlin journalists held a small demonstration in support of Kasem in front of the Latvian embassy in Moscow. Russian journalist Dmitry Kiselyov and politician Maria Butina attended the event. 

The demonstration was filmed by Sputnik and amplified with the Russian hashtag  #свободуМаратуКасему (#freedomForMaratKasem) on Telegram channels operating in the Baltic states, including the pro-Russian BALTNEWS, Своих не бросаем! | Свободная Балтика!, and on Butina’s personal channel. The news of Kasem’s arrest also reached the Russian Duma’s Telegram channel, which re-shared Butina’s post. 

Valentin Châtelet, Research Associate, Brussels, Belgium

New year brings new military aid for Ukraine

International efforts in support of Ukraine are continuing in full force in 2023. On January 4, Norway announced it had sent Ukraine another 10,000 155mm artillery shells. These shells can be used in several types of artillery units, including the M109 self-propelled howitzer. On January 5, Germany confirmed it would provide Ukraine with Marder fighting vehicles and a Patriot anti-aircraft missile battery. German news outlet Spiegel also reported that talks are underway to supply Ukraine with additional Gepard anti-aircraft guns and ammunition. 

In addition, UK Foreign Secretary James Cleverly said the British government would supply Ukraine with military equipment capable of delivering a “decisive” strike from a distance. At the end of 2022, UK Defense Secretary Ben Wallace discussed the possibility of transferring Storm Shadow cruise missiles, with a range of up to 250 kilometers. Finland also reported that it is preparing its twelfth package of military assistance to Ukraine.  

US aid to Ukraine is also being reaffirmed with a $2.85 billion package on top of weapon deliveries. Additionally, the US plans to deliver fourteen vehicles equipped with anti-drone systems as part of its security assistance package. The company L3Harris is part of the Pentagon’s contract to develop anti-drone kits. This equipment would help protect Ukrainian civil infrastructure, which has been a frequent Russian target since October 2022.  

On January 6, French President Emmanuel Macron announced that France would supply Ukraine with units of the light AMX-10RC armored reconnaissance vehicle. These vehicles were produced in 1970 and have been used in Afghanistan, the Gulf War, Mali, Kosovo, and Ivory Coast. The French defense ministry also announced that the country was to deliver twenty units of ACMAT Bastion armored personnel carriers. 

On January 11, Ukrainian President Volodymyr Zelenskyy met with Presidents Andrzej Duda of Poland and Gitanas Nauseda of Lithuania in Lviv. During the visit, Duda announced that Poland would deliver fourteen units of the much-awaited German Leopard combat tanks, and Nauseda announced that his country would provide Ukraine with Zenit anti-aircraft systems. 

Meanwhile, the largest manufacturer of containers for the transport of liquified natural gas has ceased operations in Russia. French engineering group Gaztransport & Technigaz (GTT) said it ended operations in Russia after reviewing the latest European sanctions package, which included a ban on engineering services for Russian firms. The group said its contract with Russian shipbuilding company Zvezda to supply fifteen icebreakers to transport liquefied natural gas was suspended effective January 8.

Valentin Châtelet, Research Associate, Brussels, Belgium

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Ukrainian envoy to Georgia discusses deteriorating relations between nations

On January 9, Andrii Kasianov, the Ukrainian Chargé d’Affaires in Georgia, published an article discussing the deteriorating relationship between the two countries. The article stated that the top issues affecting relations were military aid to Ukraine, bilateral sanctions against Russia, visa policies for fleeing Russians, and the legal rights of Mikheil Saakashvili, the imprisoned third president of Georgia, who is also a Ukrainian citizen. 

Kasianov noted that Tbilisi declined Kyiv’s request for military help, specifically for BUK missile systems, which were given to Georgia by Ukraine during Russia’s 2008 invasion. The diplomat said that the weapons request also included Javelin anti-tank systems supplied to Georgia by the United States.  

“Despite the fact that the Georgian government categorically refused to provide military aid, Ukraine opposes the use of this issue in internal political disputes and rejects any accusations of attempts to draw Georgia into a war with the Russian Federation,” Kasianov said. 

Since the Russian invasion of Ukraine, the Georgian Dream-led government has accused Ukraine, the US, and the EU of attempting to drag Georgia into a war with Russia.  

Eto Buziashvili, Research Associate, Tbilisi, Georgia

The post <strong>Russian War Report: Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize</strong>  appeared first on Atlantic Council.

]]>
Post-war Ukraine needs a smart digital transformation strategy https://www.atlanticcouncil.org/blogs/ukrainealert/post-war-ukraine-needs-a-smart-digital-transformation-strategy/ Thu, 12 Jan 2023 15:52:20 +0000 https://www.atlanticcouncil.org/?p=601327 The war with Russia is far from over but it is important to begin looking ahead and setting the stage for Ukraine's post-war digital transformation, writes StrategEast Center president Anatoly Motkin.

The post Post-war Ukraine needs a smart digital transformation strategy appeared first on Atlantic Council.

]]>
The Russian invasion of Ukraine is still far from over, but it is already clear that Ukraine has defended its independence and won the right to become a fully fledged member of the democratic world. This trajectory was further underlined in summer 2022 when Ukraine received official EU candidate nation status.

Ukraine’s future prosperity is not just a matter of ending the war and moving toward membership of the European Union, however. Ahead lies the complex reconstruction of the country’s entire economy and national infrastructure. In order for this to succeed, there can be no return to pre-war conditions. Instead, Ukraine has a once-in-a-lifetime opportunity to reinvent itself as one of the most modern nations on the planet.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Thanks to the unprecedented support of Ukraine’s international partners, today’s ambitious visions for a new Ukrainian economy are entirely feasible. This will in all likelihood be a green economy at the cutting edge of the digital revolution.

President Zelenskyy had already set Ukraine on the road to a digital future long before the horrors of Russia’s full-scale invasion. In the early days of his presidency in spring 2019, Zelenskyy identified digitalization as a national priority and vowed to create “a country in a smartphone.”

On the eve of the Russian invasion, Ukraine had already made significant progress in this direction. More than 10 million Ukrainians, or around one-third of the entire adult population, had installed the Diia app, which offered a range of public services and documents in digital format. The impact of this digitalization has been evident during the war, with Ukrainians frequently using virtual documents to identify themselves and pass checkpoints. 

The tech sector had also established itself as a key engine of the economy in pre-war Ukraine. By the end of 2021, the IT industry was generating around $6.8 billion in annual export earnings, representing approximately 10% of Ukraine’s overall export revenues.

These developments are encouraging and indicate that Ukraine can seize the unique opportunities that may soon emerge. At the same time, the post-war transformation of the country will force the Ukrainian authorities and the domestic tech industry to think on a far larger scale than ever before. International investments alone will dwarf anything seen in Ukraine since the country regained independence in 1991.

Ukraine’s IT industry certainly has the potential to rise to the coming challenges. On the eve of the invasion, there were more than 250,000 IT engineers in the country working for companies that developed advanced solutions for many of the world’s biggest brands. To harness this potential and position the country for future success, Ukraine’s Ministry of Digital Transformation must engage with the world’s leading experts to develop an effective digital transformation strategy.

This strategy must address a series of core issues such as mastering digital skills, engineering digital infrastructure, the digitalization of public services, and the digital transformation of Ukraine’s business environment. Ukraine must adapt its education system to make sure the emerging generation of young Ukrainians are equipped with the necessary English-language and tech skills to drive the country’s transformation forward. Teachers will need to have expert knowledge, while schools must have sufficient internet access and tech tools.

These innovations need to be applied evenly across the country to make sure progress is consistent and no regions are left behind. This is especially important for regions liberated from Russian occupation. Digitalization must also extend to every branch of public services including healthcare, housing, and municipal services.

Even this very brief overview highlights the vast proportions of the undertaking that lies ahead for Ukraine. The envisaged digital revolution will require the involvement of experts in a wide variety of fields including law, education, energy, medicine, and security as well as IT itself.

The experience of the past ten months leaves little room for doubt that the global community will be ready to support Ukraine’s post-war digital transformation. While the Ukrainian Ministry of Digital Transformation will have the task of coordinating the creation of a digital transformation strategy, the Ministry can call on the support of a range of national governments, international financial institutions such as the World Bank and the EBRD, global development agencies, and many of the world’s largest tech companies.    

Today, while Ukraine’s heroic defense against Russian aggression is still underway, it is time to create a broad coalition of allies and establish expert working groups to develop a strategy development fund. The platform for this coalition can be the Digital for Freedom initiative already put forward by the Ministry of Digital Transformation in mid-2022.

Ukraine has already demonstrated that with enough military support, it can win the war. The country’s international partners must also be ready to begin the massive task of reconstruction as soon as circumstances allow. A comprehensive and ambitious digital transformation strategy can serve as one of the foundational documents for the coordination of efforts to make the new Ukraine an example of progress for the entire world.

Anatoly Motkin is president of the StrategEast Center, an independent institution working to develop Eurasia’s digital economy in collaboration with international financial institutions, development agencies, global tech companies, and Eurasian governments.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Post-war Ukraine needs a smart digital transformation strategy appeared first on Atlantic Council.

]]>
Propp in Lawfare: Gentlemen’s Rules for Reading Each Other’s Mail: The New OECD Principles on Government Access to Personal Data Held by Private Sector Entities https://www.atlanticcouncil.org/insight-impact/in-the-news/propp-in-lawfare-gentlemens-rules-for-reading-each-others-mail-the-new-oecd-principles-on-government-access-to-personal-data-held-by-private-sector-entities/ Wed, 11 Jan 2023 15:54:00 +0000 https://www.atlanticcouncil.org/?p=600870 Europe Center nonresident senior fellow Kenneth Propp reviews the finalized version of the Organization for Economic Cooperation and Development’s (OECD) “Declaration on Government Access to Personal Data Held by Private Sector Entities,” which aims to document protections government have in place for access to individuals’ data. The OECD declaration is a notable accomplishment because it […]

The post Propp in Lawfare: Gentlemen’s Rules for Reading Each Other’s Mail: The New OECD Principles on Government Access to Personal Data Held by Private Sector Entities appeared first on Atlantic Council.

]]>

Europe Center nonresident senior fellow Kenneth Propp reviews the finalized version of the Organization for Economic Cooperation and Development’s (OECD) “Declaration on Government Access to Personal Data Held by Private Sector Entities,” which aims to document protections government have in place for access to individuals’ data.

The OECD declaration is a notable accomplishment because it demonstrates the surprising degree of commonality in data access safeguards applied by developed democracies’ national security and law enforcement agencies.

Kenneth Propp

About the author

The post Propp in Lawfare: Gentlemen’s Rules for Reading Each Other’s Mail: The New OECD Principles on Government Access to Personal Data Held by Private Sector Entities appeared first on Atlantic Council.

]]>
Digitalization and transparency are vital for Ukraine’s reconstruction https://www.atlanticcouncil.org/blogs/ukrainealert/digitalization-and-transparency-are-vital-for-ukraines-reconstruction/ Mon, 02 Jan 2023 18:47:43 +0000 https://www.atlanticcouncil.org/?p=598743 Ukraine's reconstruction will depend on digitalization and the recruitment of motivated personnel from the military, writes Deputy Minister for Communities, Territories, and Infrastructure Development Oleksandra Azarkhina.

The post Digitalization and transparency are vital for Ukraine’s reconstruction appeared first on Atlantic Council.

]]>
When you have become used to constant power cuts, regular air raid alerts, and the empty evening streets of Kyiv, a business trip to the United States can feel like being transported to another dimension entirely. However, when I visited Washington DC in the final weeks of 2022, I soon found that the situation in Ukraine was high on the local agenda.

During my brief time in the US, I held over 30 meetings with government officials as well as representatives of the defense, financial, and non-profit sectors. All were deeply immersed in the challenges facing Ukraine and were ready to offer genuine support. Topics of discussion included efforts to boost Ukrainian food exports, strengthen the country’s air defense systems, and facilitate the future reconstruction of Ukraine.

Every conversation also featured an anti-corruption component. This is essential in order to build the kind of transparent and effective partnerships that will help Ukraine move forward. Success will depend on a combination of the right systems and suitably qualified personnel.

Digital tools can play a key role in this process. Ukraine’s reputation as a digital innovator is already recognized across the Atlantic. Two years ago, Ukraine became the world’s first country to grant legal status to electronic passports for domestic use. Hundreds of public services for private citizens and businesses can already be accessed online. More recently, Ukraine occupied second place in Europe for data openness in the 2022 Open Data Maturity ranking.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Ukraine’s digital progress can serve as a solid basis for the country’s recovery. While in the US, I had the opportunity to present plans for a Digital Reconstruction Management System (DRMS), which will serve as a comprehensive online platform that will ensure successful simultaneous implementation of multiple projects across Ukraine. The DRMS will make it possible to manage every stage of Ukraine’s reconstruction projects while providing real-time online information including spending data.

The concept is based on the principle of maximum transparency and the publication of open data in accordance with international norms such as the Open Contracting Data Standard. This digital solution will drive the development of an entire ecosystem. It will create opportunities for businesses around the world to participate in procurement tenders for the reconstruction of Ukraine.

Additional tools will make it possible to monitor contractors, while NGOs will be able to analyze data and create risk indicators. This approach will make the coming reconstruction of Ukraine a model of open governance and open contracting for the entire world.

Ukraine’s digital reconstruction system is set to be launched in early 2023. This initiative is the result of cooperation between the Ukrainian authorities, civil society, and international institutions. It is being implemented together with RISE Ukraine, a coalition of international and Ukrainian NGOs.

Personnel choices will also play a key role in the further evolution of Ukraine’s anti-corruption architecture. Appointing the right people will be critical to this process. In the months and years ahead, Ukraine should look to recruit from within the ranks of the country’s armed forces.

There are currently more people than ever in uniform defending Ukraine. This includes men and women from a variety of professional backgrounds, including many who took up arms following successful careers as civil servants and human rights defenders. According to my friends who are currently serving in the trenches, this experience fundamentally changes a person’s worldview and civic position.

Military veterans will be highly motivated to safeguard Ukraine’s development and the country’s democratic institutions. That is why it is so important for Ukraine to receive support from the US and other international partners for initiatives that will make it possible to integrate veterans into the country’s ongoing anti-corruption efforts.

The provisional idea is to select people with the relevant educational and professional background for training in the most effective approaches to combating corruption. Successful candidates can then join Ukrainian law enforcement and the country’s anti-corruption institutions.

I am confident that by combining digital transparency with a targeted approach to personnel, it will be possible to achieve historic change in Ukraine. This message clearly resonated with our American partners during my recent visit to the United States. Our pursuit of a common goal is a source of inspiration and one more reason to believe Ukraine will win the war.

Oleksandra Azarkhina is Ukraine’s Deputy Minister for Communities, Territories, and Infrastructure Development.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Digitalization and transparency are vital for Ukraine’s reconstruction appeared first on Atlantic Council.

]]>
Vladimir Putin’s failing invasion is fueling the rise of Russia’s far right https://www.atlanticcouncil.org/blogs/ukrainealert/vladimir-putins-failing-invasion-is-fueling-the-rise-of-russias-far-right/ Wed, 14 Dec 2022 17:57:11 +0000 https://www.atlanticcouncil.org/?p=595350 As Vladimir Putin's disastrous invasion continues to unravel, battlefield defeats in Ukraine are having a radicalizing effect on Russian domestic audiences and fueling the rise of the country's ultra-nationalist far right.

The post Vladimir Putin’s failing invasion is fueling the rise of Russia’s far right appeared first on Atlantic Council.

]]>
A new and significant political force is emerging in the shadows of Russia’s invasion of Ukraine. While Vladimir Putin has long cultivated an aggressive brand of Russian nationalism based on imperial identity, battlefield defeats in Ukraine are having a radicalizing effect on domestic audiences and placing the far right at the center of Russia’s shifting political landscape.

Like many dictators throughout history, Putin believed he could strengthen his position at home by waging a small, victorious war. However, he is now learning a painful lesson: if you stake your position as dictator on a quick victory but fail to deliver, you may suffer the fate of Khrushchev after the Cuban Missile Crisis or the Argentinian junta after their disastrous invasion of the Falklands. Losing a conflict that you are expected to win is so thoroughly demoralizing that it puts your entire reign at risk.

Many people now question why Putin embarked on such a reckless invasion at all. In fact, the Russian dictator has always been a betting man. His entire career has been marked by gambles that have paid off handsomely. However, with the full-scale invasion of Ukraine, his luck may finally have run out.

US President Joe Biden describes Putin as a rational actor who has miscalculated. This is probably true, but it is also important to recognize Putin’s miscalculation as a symptom of a flawed worldview that is disconnected from reality. In short, Putin fell into the same trap that eventually catches out many long-serving dictators; he drank his own Kool-Aid.

In a military context, believing in one’s own inflated prowess is catastrophically dangerous. Thanks to decades of propaganda, Russians take it for granted that their country is a military superpower. This myth has been shattered in Ukraine. Despite having less than one-third of Russia’s population, a far smaller economy, and being an emerging democracy rather than a militarized dictatorship, Ukraine has more than held its own for almost a year against the invading Russian army.

While the West has provided Ukraine with significant military aid, the extent of Western involvement in the war should not be overstated. So far, only about one percent of the relevant available Western weaponry has actually been sent to Ukraine. Key partners such as the US, UK, France, and Germany have resisted Ukrainian pleas for tanks, jets, and long-range missiles. Instead, they have provided anti-tank weapons, limited quantities of artillery, and shorter range missile systems. Nevertheless, this has proved sufficient to stop Russia’s offensive and liberate about half of the territory occupied by Putin’s troops during the initial stages of the invasion.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Faced with mounting setbacks in Ukraine, Putin has become increasingly delusional. Rather than acknowledge Russia’s embarrassing defeats and catastrophic losses, he insists everything is going according to plan. This is creating opportunities for Russia’s far right forces, which do not suffer from the same limitations. While Kremlin officials absurdly attempt to portray retreats as “goodwill gestures,” the far right wins over the Russian public by speaking frankly about the country’s military disasters in Ukraine.

Until the invasion began in February 2022, the only political opposition in Russia was represented by jailed anti-corruption activist Alexei Navalny, who had attempted to play broadly by Western democratic rules. When the war started, the remnants of Russian civil society were ruthlessly stamped out. Prominent opposition figures were jailed or forced into exile, while new laws criminalized all forms of public dissent. These trends have intensified over the intervening nine months, extinguishing any lingering hopes of a serious democratic opposition to the Putin regime.

Instead, the most serious challenge to Putinism may come from a newly emerging political movement that is even further to the right on the political spectrum than Putin himself. At present, this is a disorganized but vocal movement that has found its voice in the many unofficial Russian “war correspondents” and social media accounts reporting on the invasion while bypassing the Russia’s Kremlin-controlled mainstream information space. Most write from a Russian nationalist perspective while employing ethnic slurs for Ukrainians. They are unambiguously pro-war and often apparently pro-Putin. However, their content is frequently at odds with Russia’s official propaganda and highly critical of the military officials leading the invasion.

While there is currently no single nationalist leader, the most prominent figure among Russian ultra-nationalists is Yevgeny Prigozhin, the leader of the Wagner Group paramilitary force. Prigozhin once sought to distance himself from Wagner but has recently made his connection very public. He has released footage of his recruitment speeches and has opened a swanky head office in Saint Petersburg. This reflects the rising profile of Wagner itself. Formerly seen as a shadowy mercenary group used by the Kremlin in hybrid war hot spots such as Ukraine, Syria, and Africa to create a veneer of plausible deniability, Wagner has been one of the few Russian military units to perform credibly during the initial stages of the Ukraine invasion and has visibly grown in stature.

With his own public profile on the rise, Prigozhin has begun testing the boundaries by publicly deriding senior figures within the Russian military hierarchy. Meanwhile, his Wagner troops operate in Ukraine as an army-within-an-army, pursuing their own clearly defined battlefield objectives and openly positioning themselves as a military elite in contrast to the under-performing regular Russian army.

Wagner fighters have become the poster boys of the ultra-nationalists, who are themselves less prone to official delusions and more interested in the realities of hard power. Freedom from the constraints of the Kremlin propaganda machine is a major asset in their struggle for credibility among Russian audiences. This makes the far right a potentially formidable opponent in a future internal power struggle against the Putin regime.

It is hard to predict what the world could expect from a post-Putin Russia ruled by far right forces, but there is clearly little room for optimism. An ultra-nationalist successor regime would likely be even more inclined to wage war against Russia’s neighbors while ruthlessly targeting civilians. This extremism would be driven in part by the growing conviction within nationalist circles that Putin is failing in Ukraine precisely because he has not been ruthless enough in his leadership of the war.

Putin’s domestic position is not yet sufficiently weak to talk of an imminent fall from power, but it is already apparent that he is far weaker today than he was just one year ago. At the same time, the full-scale invasion of Ukraine has catapulted a wide range of formerly fringe nationalist figures into the Russian mainstream and transformed Yevgeny Prigozhin into a political heavyweight. This swing to the right has not yet been fully appreciated by many Western observers, but it offers alarming indications of where Russia may be heading politically and must be watched carefully in the months ahead.

Stanislav Shalunov is founder and CEO of NewNode and creator of FireChat.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Vladimir Putin’s failing invasion is fueling the rise of Russia’s far right appeared first on Atlantic Council.

]]>
The 5×5—The cyber year in review https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-the-cyber-year-in-review/ Wed, 14 Dec 2022 05:01:00 +0000 https://www.atlanticcouncil.org/?p=594701 A group of experts reviews the highs and lows of the year in cybersecurity and look forward to 2023. 

The post The 5×5—The cyber year in review appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

One year ago, the global cybersecurity community looked back at 2021 as the year of ransomware, as the number of attacks nearly doubled over the previous year and involved high-profile targets such as the Colonial Pipeline—bringing media and policy attention to the issue. Now, a year later, the surge of ransomware has not slowed, as the number of attacks hit yet another record high—80 percent over 2021—despite initiatives from the White House and the Cybersecurity and Infrastructure Security Agency (CISA). The persistence of ransomware attacks shows that the challenge will not be solved by one government alone, but through cooperation with friends, competitors, and adversaries. 

Russia’s full-scale invasion of Ukraine, the landmark development of 2022, indicates that this challenge will likely remain unsolved for a while. Roughly three-quarters of all ransomware revenue makes its way back to Russia-linked hacking groups, and cooperation with the Kremlin on countering these groups is unlikely to yield much progress anytime soon. Revelations in the aftermath of Russia’s invasion confirmed suspicions that Russian intelligence services not only tolerate ransomware groups but give some of them direct orders. 

Ransomware was not the only cyber issue to define 2022, as other challenges continued, from operational technology to workforce development, and various public and private-sector organizations made notable progress in confronting them. We brought together a group of experts to review the highs and lows of the year in cybersecurity and look forward to 2023. 

#1 What organization, public or private, had the greatest impact on cybersecurity in 2022?

Rep. Jim Langevin, US Representative (D-RI); former commissioner, Cyberspace Solarium Commission

“I think we have really seen the Joint Cyber Defense Collaborative (JCDC) come into its own this year. We saw CISA, through JCDC, lead impressive and coordinated cyber defense efforts in response to some of the most critical cyber emergencies the Nation faced in 2022, including the Log4Shell vulnerability and the heightened threat of Russian cyberattacks after its invasion of Ukraine.” 

Wendy Nather, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; head of advisory CISOs, Cisco

“I would argue that Twitter has had the most impact on cybersecurity. As a global nexus for public discourse, security research, threat intelligence sharing, media resources, and more, its recent implosion has disrupted essential communications and driven many cybersecurity stakeholders to seek connectivity elsewhere. We will probably continue to see the effects of this disruption well into 2023 and possibly beyond.” 

Sarah Powazek, program director, Public Interest Cybersecurity, UC Berkeley Center for Long-Term Cybersecurity

“CISA. The cross-sector performance goals and the sector-specific 100-Day Cyber Review Sprints this year are paving the way for a more complete understanding and encouragement of cybersecurity maturity in different industries. It is finally starting to feel like we have a federal home for nationwide cybersecurity defense.” 

Megan Samford, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; vice president and chief product security officer for energy management, Schneider Electric

“I think all of us feel that it has to be the warfighting efforts that are going on in the background of the Ukraine war—these are the ‘known unknown’ efforts. If we take that off the table though, I would say it is not an organization at all, it is a standard (IEC 62443). As boring as it is to say that standards work, right now industry most needs time for the standards to be adopted to reach a minimum baseline. If we fail to achieve standardization, we will see regulation—both achieve the same things at different paces with different tradeoffs.” 

Gavin Wilde, senior fellow, Technology and International Affairs Program, Carnegie Endowment for International Peace

“The State Special Communications Service of Ukraine (SSSCIP), which has deftly defended and mitigated against Russian cyberattacks throughout Moscow’s war. SSSCIP’s ability to juggle those demands while coordinating and communicating with a vast array of state and commercial partners has improved the landscape for everyone.”

#2 What was the most impactful cyber policy or initiative of 2022? 

Langevin: “The Cyber Incident Reporting for Critical Infrastructure Act, or CIRCIA. Its impact lies not only in its effect—which will dramatically improve the federal government’s visibility of cyber threats to critical infrastructure—but also in the example it has set for how Congress, the executive branch, and the private sector can effectively work together to craft major legislation that will make the country fundamentally safer in cyberspace.” 

Nather: “I have to call out CISA’s election security support at this crucial point in our Nation’s fragile and chaotic state. It continues to provide excellent information and resources—particularly the wonderfully named “What to Expect When You are Expecting an Election” and video training to help election workers protect themselves and the democratic process. Reaching out directly to stakeholders and citizens with the education they need is every bit as important as the ‘public-private partnership’ efforts that most citizens never encounter.” 

Powazek: “CISA’s State and Local Cybersecurity Grant Program and Tribal Cybersecurity Grant Program. The programs will dole out $1 billion in cyber funding to state, local, tribal, and territorial governments over four years, with at least 25 percent of those funds earmarked for rural areas. If that money is invested well, it will be an incredible boon to critical public agencies struggling to improve their cybersecurity maturity, and it can better protect millions of people.” 

Samford: “Software bill of materials (SBOM), but not for the reasons people may think. SBOM is a very useful tool in managing risk, provided that organizations already have good asset inventory capability. In operational technology, asset inventory is an area that asset owners continue to struggle with, so the benefit from SBOM is more of a long-term journey. That is why I say SBOM, but not for the reasons people think. In my mind what I think was most impressive around SBOM was that it demonstrated that the industry can successfully rally and rapidly standardize around very specific asks. SBOM came together because it had three things: 1) common industry understanding of the problem; 2) existing tooling that, for the most part, did not require new training; and 3) government policy and right-sized program management.” 

Wilde: “The European Union’s proposed Cyber Resilience Act, which is poised to update and harmonize the regulatory environment across twenty-seven member states and set benchmarks for product and software security—particularly as both cybercrime and Internet-of-Things applications continue to proliferate. The proposals offer a stark contrast between a forward-looking regulatory regime, and a crisis-driven reporting and mitigation one.”

#3 What is the most important yet under-covered cyber incident of 2022?

Langevin: “I think it is worth reminding ourselves just how serious the ransomware attacks were that crippled the Costa Rican government this year. This was covered in the news, but from a policy perspective, I think it warrants a deeper conversation about what the United States can be doing on the international stage to double down on capacity-building and incident response efforts with allies, particularly those more vulnerable to such debilitating attacks. Part of that conversation needs to include a commitment to ensuring that our government actors, like the State Department’s Bureau of Cyberspace and Digital Policy, have the appropriate resources and authorities to effectively provide that assistance.”

Nather: “The Twilio breach (although Wired did a good job covering it). It is important because although SMS is a somewhat-reviled part of our security infrastructure, it is utterly necessary, and will continue to be long into the future.”

Powazek: “The Los Angeles Unified School District (LSUSD) ransomware attack by Vice Society was highly covered in the news, but I think the implications are resounding. LAUSD leaders refused to pay the ransom, maintained transparency with students and parents, and were able to move forward with minimal downtime. It was a masterclass in incident management, and I was thrilled to see a public institution take a stand against ransomware actors and recover quickly.”

Samford: “Uber’s chief information security officer (CISO) going to jail. This has turned the industry on its head and forced people to challenge what it means to be an executive in this industry and make decisions that can land you—not the chief executive officer or chief legal counsel—in jail. What is the compensation structure for this amount of risk taking? I have heard of CISOs being called the ‘chief look around the corner officer’ or the ‘chief translation officer,’ but now has the CISO become the ‘chief scapegoat officer?”

Wilde: “The US Department of Justice’s use of ‘search and seizure’ authority (Rule 41 of the federal criminal code) to neutralize a botnet orchestrated by the Russian GRU. So many fascinating elements of this story—including the legal and technical implications of the operation, as well as the cultural shift at DOJ—seem to have gone underexamined. Move over, NSPM-13…”

More from the Cyber Statecraft Initiative:

#4 What cybersecurity issue went unaddressed in 2022 but deserves greater attention in 2023?

Langevin: “I am hopeful that this answer proves to be wrong before the end of the year, but right now, it is the lack of a fiscal year (FY) 2023 budget. The federal government has a wide array of new cybersecurity obligations stemming from recent legislation and Biden administration policy, but agencies will struggle to fulfill these responsibilities if Congress does not provide appropriate funding for them to do so. Keeping the government at FY22 funding levels simply is not good enough; if we want to see real progress, we need to pass a budget.” 

Nather: “One trend I see is that there is almost no check on technological complexity, which is the nemesis of security. Simply slapping another ‘pane of glass’ on top of the muddled heap is not a long-term solution. I believe we will see more efforts to consolidate underlying infrastructure for many reasons, among them cost and ease of administration, but cybersecurity will be one of the loudest stakeholders.” 

Powazek: “The United States still does not have a scalable solution for providing proactive cyber assessments to folks who cannot afford to hire a consulting firm. There are lots of toolkits available, but some organizations do not even have the staff or time to consume them, and there is no substitute for face-to-face assistance. We could use more solutions like cybersecurity clinics and regional cyber advisors that address this market failure and help organizations increase resiliency to cyberattacks.” 

Samford: “Coordinated incident response as well as whistleblower protection. If you want safety-level protections in cybersecurity, you need safety-level whistleblower protections. In the culture of safety, based on decades of culture development and nurturing, whistleblowing is a key enabler. It is based on a basic truth that anyone in an organization can ‘stop the line’ if they see unsafe behavior. In cyber, we lack ‘stop the line’ power and, in many cases, individuals fail to report risk because of fear of attribution and retaliation. That is why, in my mind, the topic of whether or not whistleblower protection should become a cyber norm remains something that has gotten little attention but it is a critical decision point in how the cyber community wants to move forward. Will we have more of a tech-based culture or a safety-based culture?  

As far as coordinated incident response, we estimate that upward of 80 percent of the cyber defense capacity resides in the private sector, yet very few mechanisms exist to coordinate these resources alongside a government-led response. We have not yet figured out how to tap that pool of resources, and I fear that we are going to have to learn it quickly one day should such attacks occur that require rapid and consistent response coordination, such as a targeted campaigned cyberattack linked with physical impact on critical infrastructures. Using Incident Command System could solve for this and the ICS4ICS program is picking up this challenge.” 

Wilde: “Privacy and data protection. The ‘Wild West’ of data brokerages and opaque harvesting schemes that enables illicit targeting and exploitation of vulnerable groups poses as much a threat to national security as any foreign-owned applications or state intelligence agencies.”

#5 What do the results of the 2022 midterm elections in the United States portend for cybersecurity legislation in the 118th Congress?

Langevin: “The cybersecurity needs of the country are too great for Congress to get bogged down in partisan fighting, and I think there are bipartisan groups of lawmakers in both chambers who understand that. There may be philosophical differences on certain issues that are more pronounced in a divided Congress, but I expect that we will still see room for effective policymaking to improve the Nation’s cybersecurity. The key to progress, as it would have been no matter who controlled Congress, will be continuing to build Members’ policy capacity on these issues, lending a broader base of political support to those Members who understand the issues and can lead the charge on legislation.”

Nather: “Some of the centrist leaders from both parties who led on cybersecurity, such as John Katko (R-NY) and Jim Langevin (D-RI), are retiring. And Will Hurd (R-TX), who held a similar role—working across the aisle on cybersecurity issues—in the previous Congress, is gone. As the work on cybersecurity legislation has historically stayed largely above the political fray, it will be interesting to see who steps up to build consensus on this critical topic.”

Powazek: “The retirement of policy powerhouses Rep. John Katko and Rep. Jim Langevin leaves an opening for more cyber leadership, and the recent elections are our first glimpse of who those leaders may be. As a Californian, I am particularly excited about Rep. Ted Lieu and Senator Alex Padilla, both of whom are poised for cyber policy leadership.”

Samford: “More focus on zero trust, supply chain, and security of build environments. These are efforts that all have bipartisan support and engagement.”

Wilde: “The retirement of several of the most driven and conversant members does not bode well for major cybersecurity initiatives in Congress next session. Diminished expertise is not only a hurdle from a substantive perspective, but it also makes it difficult to avoid cyber issues falling victim to other political and legislative agendas from key committees.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—The cyber year in review appeared first on Atlantic Council.

]]>
360/StratCom: How policymakers can set a democratic tech agenda for the interconnected world https://www.atlanticcouncil.org/content-series/360stratcom/360-stratcom-how-policymakers-can-set-a-democratic-tech-agenda-for-the-interconnected-world/ Thu, 08 Dec 2022 19:48:31 +0000 https://www.atlanticcouncil.org/?p=593715 The DFRLab assembled policymakers and civil-society leaders together to drive forward a democratic tech agenda that is rights-respecting and inclusive.  

The post 360/StratCom: How policymakers can set a democratic tech agenda for the interconnected world appeared first on Atlantic Council.

]]>
On December 7, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) hosted360/StratCom, its annual government-to-government forum, bringing policymakers and civil-society leaders together to drive forward a democratic tech agenda for the increasingly interconnected world—and ensure that is rights-respecting and inclusive.  

The day kicked off with a panel on anti-lockdown protests and dissent in China moderated by Kenton Thibaut, DFRLab’s resident fellow for China. Following a deadly fire at a residential building in Xinjiang, protests erupted in cities across China, including on almost eighty university campuses. While the protests have been fueled by frustration with China’s strict zero-COVID policy, Xiao Qiang, a research scientist at the University of California, Berkeley, noted the protests have also grown to object to censorship and Xi Jinping’s leadership. The protests mark the failure of Xi’s “prevention and control” security approach, added Sheena Greitens, associate professor at the University of Texas. “It was really interesting, and I imagine troubling, from the standpoint of China’s leaders, to see that model fail initially at multiple places, multiple cities in China when these protests broke out,” she said. While the panelists agreed that China has publicly used a lighter touch in dealing with the protest organizers than it has historically, they expressed concern that this is because surveillance technology provides authorities the ability to identify and target protesters behind closed doors. Maya Wang, associate director of the Asia division at Human Rights Watch, said an important takeaway from the protests is that many people in China seek democracy. 

Next up was a discussion about the Freedom Online Coalition (FOC), a global alliance in pursuit of a democratic tech agenda that ensures a free, open, secure, and interoperable internet for all. With Canada serving as the current chair of the FOC, the session began with remarks from Canadian Deputy Foreign Minister David Morrison. He noted that what unites the FOC is the belief that one of the most pressing challenges is finding a way to benefit from digital technology in a way that protects human rights and upholds democratic values. Morrison noted four essential components of digital inclusion: connectivity, digital literacy, civic participation, and online safety.   

With the United States preparing to serve as the incoming FOC chair, Anne Neuberger, deputy national security adviser for cyber and emerging technologies at the White House, also gave her thoughts on the democratic tech agenda. Neuberger noted that, while the internet has transformed the world, it has also led to a series of troubling developments. “The internet remains a critical tool for those on the front lines of the struggle for human rights, activists; and everyday people from Tehran to Shanghai to Saint Petersburg depend on access to an unblocked, unfiltered internet to communicate and gain information otherwise denied to them by their government.” As FOC chair, the United States will have three main priorities, Neuberger outlined: bolstering existing efforts where the FOC adds unique value, such as condemning governments that misuse technology; strengthening coordination between FOC policies and the foreign assistance that participating states are providing to ensure that national-level technology frameworks around the globe are in alignment with human rights; and strengthening the FOC’s operating mechanics to ensure the organization can have a greater impact in the years to come. 

Another vital goal for the FOC is to recognize and articulate the connection between pluralistic, open societies and a secure, open internet, said Katherine Maher, nonresident senior fellow at the DFRLab and former chief executive officer of Wikipedia. In a panel focusing on how the FOC can live up to its promise , Maher noted that an open internet is a means to an end, as it helps people protect human rights. Moderator Jochai Ben-Avie, chief executive of Connect Humanity and a DFRLab nonresident fellow, echoed this sentiment. “Never before has the call been louder for democratic countries to take coordinated action in defense of a free and open and secure and interoperable internet,” he noted.  

Read more

Report

Dec 6, 2022

An introduction to the Freedom Online Coalition

By Rose Jackson, Leah Fiddler, Jacqueline Malaret

The Freedom Online Coalition (FOC) is comprised of thirty-four member countries committed to advancing Internet freedom and human rights online.

Digital Policy International Organizations

Later in the day, the discussion shifted to the European Union’s (EU) approach to tech governance in a session moderated by Rose Jackson, director of the DFRLab’s Democracy and Tech Initiative. Gerard de Graaf, the European Union’s first ambassador to Silicon Valley, remarked on recent tech industry layoffs, saying that he had been reassured by some tech companies that the cuts would not affect compliance with European regulations. “In the industry, there is an awareness that it’s probably not so wise to start cutting into the areas where, frankly, you probably now need to step up rather than reduce your resources,” he said.  

Meanwhile, Prabhat Agarwal, one of the lead drafters of EU tech legislation and head of unit at the EU’s DG CONNECT Digital Services and Platforms, said that he is working on designing transparency provisions. He noted three key areas that these provisions will cover: user-facing transparency to ensure tech platforms’ terms and conditions are so clear “that even children can understand”; expert transparency that would allow civil society, journalists, and academics the ability to access data intrinsic to their research; and regulator transparency that would enable governments to inspect what happens “under the hood” of the platforms.  

To close out this year’s 360/StratCom programming, Safa Shahwan Edwards, deputy director of the DFRLab’s Cyber Statecraft Initiative, led a conversation with Camille Stewart Gloster, US deputy national cyber director for technology and ecosystem. The discussion centered on how to define and grow a competitive tech workforce. Stewart Gloster noted that technology underpins each person’s life, and it is imperative to raise the collective level of understanding of the tradeoffs people around the world make daily, from privacy to security.  


Layla Mashkoor is an associate editor at the DFRLab. 

The post 360/StratCom: How policymakers can set a democratic tech agenda for the interconnected world appeared first on Atlantic Council.

]]>
FOR RELEASE: DFRLab Democracy + Tech Initiative launches Task Force for a Trustworthy Future Web https://www.atlanticcouncil.org/news/press-releases/release-task-force-for-a-trustworthy-future-web/ Thu, 08 Dec 2022 19:38:58 +0000 https://www.atlanticcouncil.org/?p=593001 The Atlantic Council’s Digital Forensic Research Lab (DFRLab) is proud to announce the launch of its new Task Force for a Trustworthy Future Web.

The post FOR RELEASE: DFRLab Democracy + Tech Initiative launches Task Force for a Trustworthy Future Web appeared first on Atlantic Council.

]]>
WASHINGTON, DC – December 8, 2022 – While the Internet of today is rife with unsolved challenges impacting everyday life and democracy, the internet of tomorrow is already being built. The Atlantic Council’s Democracy + Tech Initiative at the Digital Forensic Research Lab (DFRLab) is proud to announce the launch of its new Task Force for a Trustworthy Future Web.

The Task Force will chart a clear and action-oriented roadmap for future online ecosystems to protect users’ rights, support innovation, and center trust and safety principles. Its work is timely given the fragility of platforms, the imperative to tackle critical yet oftentimes overlooked trust and safety challenges, and the need for new tools and approaches. It is a unique opportunity to pull together leaders from across the social media, gaming, ad-tech, and XR industries; global civil society and research groups, and public sector bodies to collaborate on building a vision for a healthier digital world.

The community and work we’ve built at the DFRLab was made for this moment. This task force is about moving from a reactive to proactive agenda for the role these technologies play in our lives today, tomorrow, and a generation from now,” said Rose Jackson, Director of the Democracy + Tech Initiative.

Led by DFRLab Resident Senior Fellow Kat Duffy, the Task Force will be guided by a steering committee of experts representing the broad cross-section of expertise required to build a healthier, more trustworthy web.

We need to build off what we’ve already done well to protect people online and thoughtfully apply that to the different realities of future digital ecosystems.” said Camille François, Senior Director of Trust and Safety at Niantic. “But we also need to invest in identifying and filling the gaps where new tools, research, and knowledge can help us improve trust and safety moving forward.”

The Task Force is designed to be global in scope to ensure the needs of the majority of the world are integrated from the start.

“It is imperative to build a future digital world that reflects the needs and concerns of people and communities around the globe, rather than an elite few.” said Nighat Dad, Executive Director of Digital Rights Foundation, Pakistan and Oversight Board member. “To do so, we need stronger, sustainable mechanisms not only for incorporating the expertise of global civil society, but also for shifting power to the Global Majority to set our own agendas for collaboration and innovation.”

With generous support from Schmidt Futures and the William and Flora Hewlett Foundation, the Task Force will generate rigorously researched, community driven, and transparent proposals to mitigate digital harms.

The Task Force will be housed at the Atlantic Council’s Democracy + Tech Initiative at the Digital Forensic Research Lab; an action-oriented center producing timely research, driving policy change, and building a global coalition dedicated to ensuring human rights, transparency, and accountability in our global information ecosystem.

For more questions about the Task Force, please reach out to futureweb@atlanticcouncil.org.

###

The post FOR RELEASE: DFRLab Democracy + Tech Initiative launches Task Force for a Trustworthy Future Web appeared first on Atlantic Council.

]]>
Holes in the great fire wall: Dissent and protests in China https://www.atlanticcouncil.org/content-series/360stratcom/holes-in-the-great-fire-wall-dissent-and-protests-in-china/ Thu, 08 Dec 2022 16:41:45 +0000 https://www.atlanticcouncil.org/?p=593524 At 360/StratCom, the DFRLab hosted a panel of experts on China’s Communist Party, surveillance architecture, protest, and the information environment for a conversation on the implications of recent events for China.

The post Holes in the great fire wall: Dissent and protests in China appeared first on Atlantic Council.

]]>

In contrast to many countries currently living with the COVID-19 virus, Chinese leader Xi Jinping has tried to reduce infections to zero with his “dynamic” zero-COVID policy. Preventing infections in China over the past few years, according to the Chinese government, meant locking people in their homes and welding their doors, sending those exposed to COVID-19 to quarantine camps, and lining millions of people up for tests each day, sometimes in the freezing cold. Xi’s policy has in turn contributed to China’s slower-than-predicted economic growth rate and high youth unemployment. 

After a fire erupted in November in an apartment building in Urumqi, Xinjiang—a city that was under a one-hundred-day lockdown—and ten residents perished, protests spread widely across major cities in China. Protesters clashed with police and epidemic workers, calling for the end of the lockdowns and some even demanding Xi’s resignation. Since the peak of the protests, Beijing has detailed plans to relax COVID-19 restrictions and reduce testing requirements. 

To discuss the recent lockdown demonstrations in China, DFRLab Resident China Fellow Kenton Thibaut moderated a panel at the Digital Forensic Research Lab’s 360/StratCom this year. Maya Wang, associate director at Human Rights Watch, observed that dissatisfaction with the COVID-19 restrictions has grown steadily over the three years of strict enforcement. “The bottled-up energy essentially exploded,” she remarked. However, it was not just the fire that prompted the unrest. Wang explained that prior grievances also laid the groundwork for the protests today, such as the twenty-seven people killed in the crash of a bus carrying people to quarantine in September and the Sitong Bridge protest before the China’s Twentieth Communist Party Congress. 

On why Xinjiang became the focal point for the large protests, Sheena Greitens, associate professor at the LBJ School of University of Texas Austin, stated that Xinjiang was a test case for Xi’s national-security concept. According to Greitens, the Chinese leader’s strategic goal appeared to be to prevent large-scale protests from spreading between locations, economic classes, and ethnic groups. Yet the fire, Greitens added, brought commonality and solidarity between the Han majority in the rest of China and the Uyghur minority in Xinjiang. She added that these protests tested the security apparatus and revealed shortcomings in the system. “I don’t think that this means the system overall has failed,” said Greitens. The capabilities the Chinese government have built are still useful for interrupting protests and punishing individuals who have participated.  

Xiao Qiang, research scientist and the founder of US-based China Digital Times, also underscored the importance of the Sitong Bridge protests for inspiring the messages in the recent protests. Xiao said the Sitong Bridge and the current demonstrations were “so different from previous ones in the last thirty years” because their focus went beyond COVID-19: They also targeted the government’s censorship and Xi’s leadership. He also recounted how information about the protests flowed across borders. Protesters circumvented the Chinese internet firewall using virtual private networks (VPNs) to send videos to volunteer activists worldwide, he explained. For example, a Twitter user in Italy quickly reposted protest videos sent by protesters and then sent the videos “immediately back to China so that people in the city almost in real time know where the protests are,” Xiao explained. This fluid information environment, he added, overwhelmed the Chinese censorship mechanisms. 

While the crackdowns on these large-scale mobilizations have been much less harsh than crackdowns in 1989, Greitens cautioned against painting the regime as becoming more tolerant of opposition, remarking that the Chinese Communist Party has shifted punishment from public spheres, such as the protest areas, to “individualized, targeted private spaces that we can’t see.”  

As the protests wound down, some observers were disappointed by the results and that there has been no structural political change. But Wang offered more nuance: “Even in the West… things do not change overnight,” noted Wang. “People should not expect any differently from China. People should also not discount the inspiration that these protests brought… The protests are important this time because they give people hope they are not alone,” she said. 

As everyone in China has been affected by the lockdowns in some way, the protests have also included people from all walks of life. Xiao highlighted the participation of students across eighty university campuses, indicating the extent to which young people disagree with the direction Xi is taking China. The students, he said, do not see the same hope for their future given what they perceive as China’s current trajectory. The gender dynamics underpinning the protests were also striking, with Wang noting that women in China are becoming more vocal and organizing protests: “The participation of women is often the central muscle that keeps these movements going in many parts of the world,” she said. 

The post Holes in the great fire wall: Dissent and protests in China appeared first on Atlantic Council.

]]>
The call for coordinated action for a free, open, and interoperable internet https://www.atlanticcouncil.org/content-series/360stratcom/the-call-for-coordinated-action-for-a-free-open-and-inoperable-internet/ Thu, 08 Dec 2022 14:33:27 +0000 https://www.atlanticcouncil.org/?p=593513 The DFRLab, as part of its annual 360/StratCom event, convened a discussion about the FOC, including the need to coordinate action to protect a free, open, secure, and interoperable internet.

The post The call for coordinated action for a free, open, and interoperable internet appeared first on Atlantic Council.

]]>

The Freedom Online Coalition (FOC), founded a decade ago, is one of a number of coalitions, alliances, and forums that exist to advance human rights online. As part of its annual 360/StratCom event, the Atlantic Council’s Digital Forensic Research Lab, convened a discussion about the FOC, including the need to coordinate action to protect a free, open, secure, and interoperable internet—and how the FOC should establish itself as a useful vehicle for coordinating digital policy. The panelists also discussed what steps the United States should take as it assumes the FOC leadership position from Canada for the years 2023 and 2024. 

David Morrison, Canadian deputy foreign minister of global affairs, introduced the conversation. Morrison reflected on the work Canada accomplished in 2022 as chair of the FOC, as well as what challenges remain as the United States takes control in 2023.  

This year, the FOC saw crises that required clear pushbacks against repression online, including Russian disinformation campaigns in Ukraine and the Iranian government’s censorship of the internet, both of which proved the value of the FOC. Morrison highlighted how the FOC can play a lead role in speaking out against such infringements of human rights online, in part because the FOC is a collective powered by civil society and industry.  

Read more

Report

Dec 6, 2022

An introduction to the Freedom Online Coalition

By Rose Jackson, Leah Fiddler, Jacqueline Malaret

The Freedom Online Coalition (FOC) is comprised of thirty-four member countries committed to advancing Internet freedom and human rights online.

Digital Policy International Organizations

Morrison then passed the microphone to Anne Neuberger—deputy national security advisor, cyber and emerging technologies—who spoke about US priorities as incoming FOC chair.  

Neuberger highlighted how the United States is happy to build upon Canada’s previous work as chair and revisited the role the United States played in the past, particularly in the organization’s founding. With the support of US President Joe Biden and a strong foundation set by Canada’s leadership in 2022, Neuberger said she is optimistic that the United States can expand the FOC’s role to improve strategic planning, counter the rise of digital misinformation, and promote safe spaces for marginalized groups such as women, LGBTQ communities, and the disability community. In addition, the United States remains committed to speaking out against Russian and Iranian oppression.  

Both Morrison and Neuberger celebrated the expansion of the FOC with the addition of Chile. With membership now at thirty-five countries, Morrison noted how the FOC represents a coalition of countries that believe in responding collectively to digital threats against democracy. 

To follow up the opening remarks provided by the Canadian and US government representatives, DFRLab nonresident fellow Jochai Ben-Avie moderated a panel featuring Tatiana Tropina, assistant professor in cybersecurity governance at Leiden University; Katherine Maher, nonresident senior fellow at DFRLab; and Jason Pielemeier, executive director of the Global Network Initiative, to provide insight into the role civil society and industry play in the FOC, as well as improving the coalition’s efficacy. The panelists discussed how the FOC should play a greater role in coordinating countries that believe in using democratic norms to advance human rights, acting as a vehicle to accomplish this because it has expertise, global reach, and a coalition of like-minded countries with the potential to work together. 

Looking at the potential of the FOC, the panelists noted the difference in geopolitical contexts between when the organization was founded and today, and that the FOC’s utility is particularly salient because of democratic backsliding in many parts of the world. The panel asserted that, while the optimism that the internet would be a democratizing force has fallen away due to the use of its technology to repress citizens, this should spur even greater motivation to engage within and beyond the FOC.  

Panelists then discussed another issue facing the FOC: increasing internal coordination. On one hand, they mentioned, the power of the FOC comes from its reach with the countries comprising its membership. On the other hand, there is a disconnect between the norms that the FOC stands for and the difficulties of actualizing these norms. As Tropina noted, the most pressing issue keeping the FOC from being more effective is not membership inclusion but clarifying the FOC’s role, stating how countries cannot play a leading role without doing the work themselves. The FOC should go “go back to basics and extend its membership based on some really identified values and principles,” she concluded. 

The panel concluded by acknowledging that, while it feels as if technology constantly outpaces the institutions created in the past, there are core identifying democratic values that stay constant, and that should drive the FOC’s future action.  


Erika Hsu is a young global professional with the Digital Forensic Research Lab.   

The post The call for coordinated action for a free, open, and interoperable internet appeared first on Atlantic Council.

]]>
An introduction to the Freedom Online Coalition https://www.atlanticcouncil.org/in-depth-research-reports/report/introduction-freedom-online-coalition/ Tue, 06 Dec 2022 20:00:00 +0000 https://www.atlanticcouncil.org/?p=591776 The Freedom Online Coalition (FOC) is comprised of thirty-four member countries committed to advancing Internet freedom and human rights online.

The post An introduction to the Freedom Online Coalition appeared first on Atlantic Council.

]]>

Understanding the first ten years of the world’s democratic tech alliance

Democratic and authoritarian nations are in a global competition for the digital world, amid a bid to renew or remake the world order. On one side is the long-standing global norm that the Internet is a global good, governed by a multistakeholder community and designed to be free, open, secure, and interoperable. On the other side is a model antithetical to the universal rights and democratic norms around which the United States and its allies organize. That authoritarian model advances a version of the Internet in which states leverage technology to shatter citizen expectations of privacy, free expression, and assembly.

Core to the authoritarian strategy are efforts to drive a wedge between the historically effective alliance of democratic nations working collectively to ensure everyone, everywhere can benefit from a digital ecosystem in which basic rights are embedded. The growing variance in approach between democratic countries in governing their own use of technology only serves to broaden that wedge. As the authoritarian model spreads, it is politically and practically shifting the online experience of billions of people, including those within democracies. The stability and sustainability of a free, open, secure, and interoperable Internet relies on democracies’ ability to rebuke these efforts and defend the Internet as a key infrastructure to advance human rights. In addition to countering authoritarian repression abroad, this includes grounding their own use of technology in democratic principles and working to prevent emerging innovations from being misused to undermine human rights at home and around the world. A failure to do so will only accelerate the authoritarian capture of the Internet, and cause a global loss in access to speech, expression, and prosperity.

It is no surprise, then, that policymakers increasingly call for “democratic tech alliances” on everything from supply chains to emerging technology to global Internet freedom. This has renewed attention to the Freedom Online Coalition (FOC), which comprises thirty-five member countries committed to advancing Internet freedom and human rights online. The FOC’s mission is more relevant now than ever in its eleven-year history, providing opportunities for its member states to

  • coordinate public and private diplomatic action in response to threats to democracy and human rights online;
  • collaborate in multistakeholder and multilateral forums to bolster human-rights-aligned norms and standards for the digital ecosystem; and
  • maintain a trusted space for collaboration with civil-society and industry actors that serves as a center of gravity for joint strategic action.

At the same time, the FOC as an institution is at an inflection point. As democracies seek mechanisms to drive collaboration and action in an increasingly adversarial global space, FOC member countries have an opportunity to strengthen, clarify, and focus energy through the coalition. Doing so will require members to address long-standing debates related to its scope of work, incentives, and impact in international forums. 

This primer on the FOC is intended to serve as an introduction to the entity, summarizing its structure and development over time. In the final section, this introduction provides an overview of the key tensions that member countries will need to address to make the coalition more effective, credible, and durable.

The document is based on a literature review of publicly available information on the FOC website, including the coalition’s descriptions of its activities, meeting minutes, declarations, and other materials related to convenings and workstreams. Additionally, DFRLab staff interviewed civil-society leaders from around the world who have worked in partnership with the coalition, and consulted with others present during the FOC’s founding and various iterations of its development. Staff also consulted former US government and other member-nation officials, and contacted the FOC Support Unit for information about its structure, budget, and workstreams.

What is the Freedom Online Coalition?

The Freedom Online Coalition is a multilateral group of thirty-five countries that coordinates diplomatic discussion and possible response on salient issues involving Internet freedom and digital rights. The central aim of the FOC is to ensure “that the human rights that people have offline enjoy the same protection online.”1 The coalition aims to protect Internet freedom and ensure that digital rights are a priority in policymaking around the world. At its founding in 2011, the FOC focused predominantly on organizing diplomatic responses to threats to freedom of expression and association online, including threats related to content filtering, network disruptions, surveillance technology, and censorship. As the impacts of technology and the Internet become increasingly central in international and political discourse, the FOC has also considered the rights implications of cybersecurity, digital authoritarianism, and digital equality and access. The FOC has also sought to engage more formally with the private sector and civil society through thematic working groups, the FOC Advisory Network, and periodic external-stakeholder engagements. 

Origins of the Coalition

Throughout the early twenty-first century, Internet connectivity increased around the world, as did its impact on political expression and attitudes. While citizens had started to leverage technology to organize protest movements as early as Iran’s 2009 Green Movement, the 2011 Arab Spring captivated the attention of much of the world and thrust social media platforms to center stage. As a result, governments and companies alike scrambled to make sense of the increasingly central role the Internet was playing in geopolitics. As activists deployed digital tools to organize protests and broadcast the subsequent brutal crackdowns, authoritarian governments sought to censor content, surveil citizens, or shutter open platforms altogether to reassert government control. Amid this dangerous match between citizens and authoritarian states, democratic governments explored how best to support those seeking to extend universal rights to and through the Internet.

In the United States, the nascent idea of “Internet Freedom” percolated as a foreign policy priority, with then Secretary of State Hillary Clinton leading a dedicated Internet freedom agenda. This new US government focus was based principally on values Clinton set out in a January 2010 address, notably promising to increase funding and diplomatic engagement on the issue set, and to seek opportunities to partner with other governments to do the same.2 In the following years, the US government created the Open Technology Fund to develop anti-surveillance and anti-censorship tools for activists in authoritarian states, and secured bipartisan resources from the US Congress for the State Department’s Bureau of Democracy, Human Rights, and Labor to support those on the front lines of Internet freedom globally.3 It was in this context that the United States joined thirteen other countries in the Netherlands on December 8, 2011, to formally launch the FOC at the inaugural Freedom Online Conference, with the seemingly simple commitment to “engage together to protect human rights online.”4

Current Coalition structure and operations

The FOC is not a legal entity, and member contributions are made on a voluntary basis. The official structure and procedure for the coalition have been developed over time and are still somewhat ad hoc.5 The FOC is led each year by a different country chair, which is selected after members state their interest and the full coalition votes on the slate. The chair is supported by the “Friends of the Chair,” a rotating group of FOC member states intended to ensure continuity and consistency through the yearly transitions.6 Each year, the chair of the FOC assumes responsibility for coordinating the coalition, setting its agenda, providing diplomatic support, and hosting the Freedom Online Conference. Annually since 2017, the FOC has published its goals in a program of action that outlines substantive and organizational priorities for the upcoming year.“7 The coalition makes key decisions at annual conferences, on the sidelines of international convenings, and through continued communications throughout the year.

An organizational chart of the FOC’s current structure.

In addition to its core diplomatic-coordination role, the FOC also conducts outreach and programming with civil society and industry. The FOC advisory network (FOC-AN), created in 2017 and launched in 2018, is a group of nongovernmental stakeholders that provides FOC member governments with advice and serves as the main mechanism for the FOC to receive the insights of civil society and the broader multistakeholder community.8 The FOC also currently operates three task forces and a working group, each of which includes government, industry, and civil-society representatives: the Task Force on Artificial Intelligence and Human Rights; the Task Force on Digital Equality; the Task Force on Internet Shutdowns; and the Silicon Valley Working Group, which is particularly focused on engaging industry in the FOC’s work. 

The current criteria to become an FOC member state are laid out in the Stockholm Terms of Reference, which were adopted in 2017. They require countries to demonstrate a strong commitment to human rights and Internet freedom—both domestically and through their foreign policy—as well as to be members in good standing of other democracy-focused multistakeholder and intergovernmental organizations and forums.“9 To be removed from the coalition, a country can voluntarily withdraw, or its membership can be terminated following a recommendation from the chair or “Friend of the Chair” and a review of the government’s actions. After such a recommendation, a case is prepared and sent to the full FOC, and, if there are no objections, the member is terminated from the coalition. This procedure has never been used.

The chair and “Friends of the Chair” effectively function as the rotating FOC secretariat, which is staffed by a Support Unit housed at Global Partners Digital (GPD), based in London.10 This support function was not created until 2014, and the funding, personnel, structure, ownership, and terms of reference are a patchwork that developed over the intervening years. GPD was selected by the FOC, in part, because it was already engaged in the digital-rights space and had existing funding through the US Department of State. The Support Unit is run by the executive director of GPD and three dedicated staff members. Its primary responsibilities are serving as the main point of contact for FOC members, organizing member convenings and conference calls, communicating with the FOC Advisory Network, supporting task-force communications, maintaining the FOC internal listserv, providing substantive guidance when appropriate, and administering the FOC website and social media accounts.

Funding for the Support Unit fluctuates on an annual basis, dependent on voluntary contributions from member states via flexible grant agreements.11 The Support Unit’s funding has steadily increased over the past five years, with a budget of just over $625,000 in 2022. The Support Unit reports against the requirements of each individual grant signed with the respective FOC members, and its day-to-day activities are mandated by an internal program of action developed in partnership with the chair and “Friends of the Chair” cohort. The Support Unit then reports against this broader program of action with updates on the funding for its own operations, as well as for discrete projects and efforts of the FOC more broadly. Noting concerns around the unpredictability of this funding arrangement, the 2017 Stockholm Terms of Reference established a mandate for a voluntary member-state “Funding Coordination Group,” though it never became operational.

Coalition workstreams and outputs

Freedom Online Conference

The FOC’s most visible output is the Freedom Online Conference, which doubles as a stakeholder gathering and annual meeting of member states to discuss the state of digital rights and coordinate diplomatic strategies in response. Since the inaugural conference in The Hague in 2011, the FOC has held eight additional conferences: one every year except for 2017, 2019, and 2022.12 FOC Conferences are hosted by each year’s chair, and have been held in Nairobi, Kenya (2012); Tunis, Tunisia (2013); Tallinn, Estonia (2014); Ulaanbaatar, Mongolia (2015); San José, Costa Rica (2016); Berlin, Germany (2018); Accra, Ghana (early 2020 as part of Ghana’s 2019 chairship); and Helsinki, Finland (2021). Instead of a conference this year, FOC chair Canada opted to convene strategic retreats in Paris and Rome for member countries and the FOC-AN.

Each conference convenes FOC member countries, civil society, and industry for panels, workshops, and plenary sessions. The annual conference also serves as a platform to discuss organizational changes for the coalition itself, and is often used to initiate strategic reviews and to negotiate or publish new terms of reference, other official documents, or processes. A summary of these gatherings and the resulting statements can be found in Annex I. 

In addition to the Freedom Online Conference, the FOC has, on occasion, convened on the sidelines of various international forums, including the Organization for Security and Cooperation in Europe (OSCE), the International Telecommunication Union (ITU), the Internet Governance Forum (IGF), and the Stockholm Internet Forum.

Joint statements
The FOC publishes joint statements responding to challenges to Internet freedom. The FOC’s earliest statements stressed the importance of freedom of expression and compelled governments to protect it online. As the coalition evolved, it published joint statements on a wider range of topics related to digital rights, comprising Internet shutdowns and content filtering, disinformation, state surveillance, cybersecurity, and artificial intelligence. A list of these statements can be found in Annex II. The coalition as an entity has only once published a country-specific statement: in 2013, it condemned Internet legislation introduced in Vietnam that restricted access and limited online speech.“13 This statement led to significant debate within the coalition about the appropriateness of country-specific statements, due to sensitivities around complicating direct diplomatic relationships. Since then, the lack of direct government references in FOC statements has been a topic of debate, particularly as governments from Nigeria to Russia have moved to ban platforms or restrict Internet access in their countries.

In 2022, the Canadian government, as chair, led an effort to amend the Stockholm Terms of Reference to create a process for a form of “country-specific” statements—joint statements in which member states have the option of endorsing a statement critical of a named government, which is then distributed by the FOC. Additionally, the chair of the FOC can issue a “chair statement,” in which the chair drafts and issues a statement, and other member states have the option to endorse it. While the “country-specific” process has never been used, in March 2022, Canada issued a chair statement, condemning the Russian government for sponsoring and spreading disinformation to justify its invasion of Ukraine, with nineteen FOC member countries choosing to sign on.14

Diplomatic coordination
Core to the FOC mission is diplomatic coordination on issues related to human rights online and Internet freedom. The result of this diplomatic coordination may not always be publicly evident. As the Internet freedom field grows, and digital issues are infused into an increasing number of policy areas, one of the more important functions of the FOC Support Unit is maintaining the list of contacts responsible within each government system for Internet freedom and digital issues, particularly as points of contact within diplomatic missions frequently rotate. These contacts and regular engagement across governments are a sure, but uneven, benefit. The coalition has faced regular calls to increase the relevance and effectiveness of its diplomatic engagement, but doing so will depend on the ability to call the right person at the right time on the right issue.

Engagement with the multistakeholder internet community
At its inception, multistakeholder engagement with the FOC was relatively open and unrestricted. Civil society participated at the annual conference and was encouraged to make recommendations for, and provide input on, joint statements. In recent years, the FOC formalized mechanisms to include civil society and industry in its work through the FOC-AN (discussed above) and Silicon Valley Working Group. The FOC-AN standardized civil-society engagement, and has also helped to narrow which individuals and organizations are able to regularly access the coalition. 

Additionally, the coalition has long collaborated with the multistakeholder community through a mixture of working groups and task forces. Since its creation, the FOC has run a total of eight such efforts, focused on everything from cybersecurity to digital inclusion, with four currently running. The efficacy of these working groups has been mixed, with early efforts garnering a fair amount of participation. Over time, however, insufficient resourcing—and a lack of clear aims and outputs—led some early participants to disengage with the coalition. A common complaint has been a lack of clarity on what the expected outputs and impact of these working groups could or should be, and a disconnection from contentious and important policy issues actively under debate.

By way of example, in the wake of the Edward Snowden disclosures beginning in June 2013, civil society and FOC members leveraged the now sunset “Internet Free and Secure” working group to drive serious discussions about state surveillance, civil liberties, and human rights—including domestic and international stakeholders who do not often sit at the same tables. While the discussion was highly relevant, the lack of follow-on action or member-country attention to the group’s recommendations left some civil-society collaborators disillusioned with the coalition more broadly.15

Support to frontline defenders and the Internet freedom ecosystem
While there is yet to be a reliable and dedicated funding stream for the FOC itself, the coalition launched the Digital Defenders Partnership (DDP) fund in 2012, administered by the nonprofit Hivos.16 The stated purpose of the pooled fund is to support frontline digital defenders. The ministries of foreign affairs of Australia, Canada, Czechia, Denmark, Estonia, Finland, Germany, Latvia, the Netherlands, and the United Kingdom, along with the Swedish International Development Agency (SIDA) and the US State Department, have contributed funding. Its current budget is 3.5 million euros through 2023. An exhaustive list of projects administered via the fund is not publicly available, though Hivos’s website cites implementation in Brazil, Yemen, and Russia.17

Coalition changes over time

Since its formation in 2011, the FOC has been in an iterative cycle, adding new functions and support, debating impact, and assessing opportunities to strengthen the entity. After its creation in 2011, the founding members reconvened in 2012 in Nairobi, in an effort to reinforce global support for, and relevance of, the coalition. The resulting Nairobi Terms of Reference established the annual rotation of the chairmanship on a voluntary basis, outlined the responsibility of the chair to host the annual conference, and delineated criteria for new members wishing to join.“18 It also initiated a conversation about with what substantive issues the coalition might engage, created the Digital Defenders Partnership and rallied funding for it, and identified forums and opportunities for the FOC to drive its action beyond the yearly gathering.

In 2013, the group convened in Tunis, in a nod to one of the earlier Arab Spring countries in the midst of a democratic transition. There, it established three working groups: An Internet Free and Secure; Digital Development and Openness; and Privacy and Transparency Online.19 The purpose of the working groups was to facilitate ad hoc convenings outside of the Freedom Online Conference, focused on specific topics under the umbrella of Internet freedom. The working groups also brought new stakeholders into the fold, giving civil society and industry the ostensible opportunity to strategically advise FOC governments and shape both domestic and international outcomes. The mandates of the original three working groups officially ended in 2017.

In 2014, current events drove the agenda at the coalition’s fourth formal gathering in Tallinn, Estonia, stalling what had been steady momentum in building clarity and action around the group. The Snowden disclosures hit newsstands in June 2013, with thousands of classified documents leaking to the press over the following year, bringing to light the extent of the US government’s digital-surveillance practices.“20 For an entity focused on governments restricting Internet access and human-rights abuses, accusations of one of its founding members advancing extraconstitutional surveillance through the Internet was an unavoidable earthquake and credibility challenge. That year’s “Recommendations for Freedom Online,” referred to as the Tallinn Agenda, doubled down on the coalition’s founding principles.21 In addition to restating the coalition’s commitment to protect digital rights, it acknowledged the growing global concern around surveillance, and called on governments to establish strong domestic oversight of the deployment of such technologies.

Despite these foundational debates, FOC countries managed to advance organizational development at the Tallinn event, creating a secretariat and tapping GPD (as discussed above) to host the Support Unit, enabled through an increase of funding through an existing grant from the US government.

In 2015, Mongolia hosted the Freedom Online Conference in Ulaanbaatar (in a nod to growing concerns about China’s regional and global digital authoritarianism), where the coalition renewed the mandates of the original three working groups. In the wake of the 2014 disclosures, enthusiasm within the coalition waned, causing a change of focus to the need to reinvigorate and reform the wayward effort. Beyond featuring Mongolia’s leadership in a highly geopolitically contested region, the 2015 Ulaanbaatar conference’s primary contribution was the creation of an internal working group tasked with a strategic review of the organization. The strategic review was led by the United States and supported by the Netherlands, the United Kingdom, and other member countries. The group contracted an outside expert to lead a concurrent external survey, the full results of which are included in the table at the end of this document.  

The FOC published the results of that “external strategic review” at the 2016 conference in San José, Costa Rica, finding that, while there was still broad support for the coalition, member states saw a need to clarify the mandate of the FOC and identify clear overarching goals and outputs.“22 Building on the results of the review, member states released the San José Statement, which reaffirmed the coalition’s core principles, and outlined a work plan to strengthen the FOC by increasing coherence among and expanding membership, improving the coalition’s and cross-regional coordination, and building external relationships.“23

The strategic review and subsequent conversations around it in San José laid the groundwork for one of the most significant sets of structural changes and formalization since the founding of the coalition, the revision of the Nairobi Terms of Reference. The coalition formalized these updates in what is called the Stockholm Terms of Reference.24 It is notable that this significant update occurred during one of the two years when the FOC had no chair. As there was no Freedom Online Conference that year, the updated terms of reference were adopted on the sidelines of the Stockholm Internet Forum in 2017. These new terms updated and expanded the structure of the coalition and clarified its workstreams. Notably, it expanded the procedure for a new member to join, established an “observer status,” and introduced a procedure for a government to either leave or have its membership revoked. Further, the Stockholm Terms of Reference established an organizational structure for the FOC that included outlining the responsibilities and election of the annual chair, establishing the “Friends of the Chair” structure, and clarifying working methods, including the process for issuing FOC statements.

The Stockholm Terms of Reference also restated the importance of the ad hoc working groups and created the FOC-AN, a new track for multistakeholder engagement, as discussed earlier. Finally, the new terms reframed the work of the FOC secretariat, formalizing the Support Unit as a neutral third party responsible for facilitating collaboration and coordinating convenings for FOC members.25 This more inward-looking work occurred in the months following the 2016 US presidential election, amid rising global concern with a proliferation of disinformation online and brazen foreign interference in core democratic processes. Amid the shift in US administrations, the FOC released a joint statement condemning state-sponsored disinformation in 2017.

In 2018, Germany took over the FOC chair and formally launched the FOC-AN, later hosting the Freedom Online Conference in Berlin. In 2019, during Ghana’s term as chair, the FOC created a limited one-year task force on “Cybersecurity and Human Rights.”26 Ghana hosted its conference early the following year in Accra with the theme of “Achieving a Common Vision for Internet Freedom,” which did not advance any organizational changes.27 FOC members released a joint statement on digital equality at the Accra conference, after which the FOC established a task force focused on bridging the digital divide and on topics of diversity, equity, and inclusion more broadly. Despite lacking a chair from March 2020 until January 2021, the FOC in that same time period established a Task Force on Artificial Intelligence and Human Rights and issued three joint statements on topics ranging from COVID-19’s impact on Internet freedom to disinformation and artificial intelligence. This was the highest rate of statement releases in the coalition’s history.

Finland took over as chair in 2021 as the FOC celebrated its tenth anniversary. That year’s Helsinki Declaration restated the group’s commitment to the protection of digital rights a decade on.28 The FOC also created a task force on Internet Shutdowns, as well as the Silicon Valley Working Group, which was intended to promote the work of the coalition and provide continuous engagement between parts of the tech industry and FOC governments.29

As chair in 2022, adapting to COVID-19 concerns and accommodating the US-hosted virtual Summit for Democracy, Canada opted not to host a conference. Instead, it organized a strategic retreat for FOC members and the FOC-AN in Paris, and convened regional workshops on Internet freedom and digital rights across North America, Europe, the Middle East and North Africa, Asia-Pacific, Sub-Saharan Africa, and Latin America. The goal of these workshops is to update the Tallinn Agenda, with a new “Ottawa Agenda.”

Key issues and debates

As democracies and autocracies grapple over the future of the Internet, the Freedom Online Coalition is regularly raised as a conceptually important body with disappointing impact. The rationale for a venue for likeminded countries to coordinate shared approaches seems clear, and is often suggested anew by those seeking to address concerning trends in the digital world. Yet, the FOC is often overlooked or dismissed in those very conversations, leaving the coalition floating as yet another well-intended, poorly resourced international body, neither engaged seriously enough to be made central to an increasingly urgent issue nor fully disavowed to make way for something new.

This crisis of legitimacy is driven by a thematic set of perennial debates and questions that span the operational and substantive. For those newly engaging with the FOC, understanding these fault lines and strategic debates will be an important starting point. Below is an overarching summary of some of the key issues at play.

Mission and scope

The FOC was created originally to enable likeminded democracies to coordinate diplomatic action around state-based Internet repression. In its narrowest conception, this could be limited to coordinating individual country statements. In its most expansive conception, it could include growing the slate of countries proactively advancing a free, open, secure, and interoperable Internet. Divergent views on where on this spectrum the FOC should sit is one recurring debate that drives different strategies for the growth and focus of the coalition.

Another related debate centers on the tensions inherent in democratic nations organizing to call out the undemocratic actions of other countries, while sometimes replicating those same actions within their own borders. This dynamic was most evident in the wake of the Snowden disclosures, but it certainly extends to more recent questions around tech governance and regulation, and the significant variance between member-country domestic approaches. For some, this lack of willingness to “look within” undermines the worthiness and credibility of the coalition as a whole.

Funding and leadership

The FOC has never had a dedicated source of funding, and this lack of clear resourcing has implications for what it means to chair the group, what is achievable through it, and the ability to plan for more than a year at a time. This also impacts mechanisms for a support structure to carry out the work of the coalition through transitions.

The coalition is also impacted by an unequal and uncertain funding stream from each of its member states. Over the course of former US President Donald Trump’s administration, the FOC and other Internet freedom initiatives were disrupted by bipartisan reductions in US government funding. Some argue that this precariousness could be solved by an expansion of funding commitments from other members, while others feel that a broad reevaluation of funding strategy at large is vastly overdue.

Relatedly, with leadership of the FOC changing annually, there are limits to what “programs of action” can be carried through, with some arguing for longer terms and others believing the yearly rotating model better matches global examples.

Support and staffing

The FOC did not have a support mechanism until 2014, when the US government increased an existing grant to a United Kingdom-based organization to provide secretariat functions for the chair and FOC members. The expectations for that arrangement were more clearly articulated in 2017, but the setup remains somewhat ad hoc. Further, some have suggested that there is a conflict of interest in housing the Support Unit at an organization involved in the digital-rights space, saying that an organization that acts simultaneously as a key facilitator of the FOC and a civil-society advocate can wield asymmetric influence. 

How a Support Unit is funded, housed, directed, and functions has major ramifications for the capacity and aims of the FOC itself. Many of the ideas for institutional learning, more intentional coordination and campaigns, greater support for working groups, task forces, and initiatives, and broader FOC strengthening depend on a stable and resourced Support Unit. The FOC is not the first organization to struggle with identifying funding for support mechanisms, but there is broad agreement that finding a sustainable model is essential.

Membership

From its inception, the FOC has been sensitive to the risk of appearing to be a club of Western countries lecturing the rest of the world. Member countries have sought to find regional balance in peers, but it is unquestionable that the group remains largely Western, with very few members from the “global majority.” While few argue that the FOC should not work to grow the community of countries aligned and coordinating on Internet freedom issues, how, when, and in what way to do so are still subjects of significant debate.

Simultaneously, there are others focused on ensuring FOC members are accountable to the principles of the coalition. Some are concerned that a sole focus on expanding national representation could result in a watering down of approach and substance and could detract from efforts to push existing countries to contend with difficult inconsistencies in their domestic and international approaches. For others, an expansion of membership is secondary to driving powerful countries to more successfully and seriously leverage their power to advance the cause of Internet freedom, whether diplomatically, or through foreign assistance or other means.

While none of these aims is necessarily contradictory with any other, optimizing for one or the other will lead to different approaches in funding, support, agenda, and mission—as well as affect the overall impact of the coalition itself.

Incentives

For those wishing to expand FOC membership, a common discussion focuses on what would incentivize countries to join. Are there streams of funding, support, or information sharing that could be made available only to members? Are there things the FOC can advance for member countries? For example, sharing good practices on digital public infrastructure or other digital-inclusion tools like advancing digital literacy? Simultaneously, are there any downsides for countries not joining the FOC? Those familiar with the FOC’s operations flag this as an important and underexamined element of the coalition’s potential approach.

Impact

Perhaps the single most important debate focuses on what success should look like for the FOC. With so many different visions for the coalition, and a real challenge to Internet freedom globally, it is no surprise few people are satisfied with the group’s achievements. The question of impact is closely tied to the debate around the FOC’s core mission and scope. For some, the FOC would be more impactful if it more successfully helped countries coordinate diplomatic responses behind the scenes. For others, success would include more forceful and collaborative public rebukes of antidemocratic actions.

Impact could also be demonstrated by the FOC’s ability to marshal resources and attention at high-impact moments such as the consideration of antidemocratic tech regulations, or situations like that in Russia in 2021, when the government coerced Apple and Google to remove a political-organizing app from their app stores.30 There is also the question of how the FOC advances its work, whether through loose coordination of member and nonmember states at international forums (such as the International Telecommunication Union or the UN General Assembly) or solely through its own coalition.

Finally, for some, the end goal of the coalition should be more countries and people buying into a proactive vision of Internet freedom based on international human-rights law and norms. In some ways, clarity on what the FOC is not focused on may be just as important as clarity on its mission and goals. There is a real risk that the FOC collapses under the weight of undifferentiated expectations. Clarifying and building agreement around FOC priorities, mandate, and scope is, therefore, essential.


This primer is based on a literature review of publicly available information on the FOC website, including the coalition’s descriptions of its activities, meeting minutes, declarations, and other documents related to convenings and workstreams. Additionally, DFRLab staff interviewed civil-society leaders from around the world who have worked in partnership with the coalition (at its inception, or through the FOC-AN or working groups), and consulted with others present during the founding and various iterations of the FOC’s development. Staff also consulted former US government and other member-nation officials and contacted the FOC Support Unit (Global Partners Digital) for information about its structure, budget, and workstreams.

The DFRLab is grateful to the individuals who contributed their expertise as we prepared this resource. Particular thanks are owed to Jochai Ben-Avie, Jessica Dheere, Eileen Donahoe, Verónica Ferrari, Katharine Kendrick, Mallory Knodel, Sarah Labowitz, Emma Llanso, Katherine Maher, Susan Morgan, Christopher Painter, Jason Pielemeier, Chris Riley, and Michael Samway.


Annex I: Timeline: Evolution of FOC Structure

Annex II: Timeline: FOC Joint Statements

Annex III: Glossary: FOC Terms

Coalition Chair: The chair of the coalition is responsible for coordinating the day-to-day meetings and strategy of the coalition, as well as providing diplomatic and political support for coalition convenings. Chairs may elect to host the Freedom Online Conference. The chairmanship rotates on an annual basis.

Digital Defenders Partnership (DDP): The Digital Defenders Partnership is a fund initiated by the FOC and managed by Hivos, which is intended to support digital-rights activists and human-rights defenders.

Freedom Online Conference: The Freedom Online Conference is a multistakeholder convening hosted semiannually by the coalition chair. The purpose of the conference is to advance the chair’s goals, laid out in the program of action, and facilitate discussions on Internet freedom issues relevant to the local context of the conference.

Friends of the Chair: The “Friends of the Chair” are a group of FOC members that provide support to the coalition chair. The purpose of this grouping is to ensure continuity between annual rotations of the chairmanship.

FOC Advisory Network (FOC-AN): The FOC Advisory Network is the formal mechanism for the FOC to engage with the broader multistakeholder Internet community and global civil society.

Joint Statement: Joint statements allow all member governments of the FOC to react together, and to prioritize issues related to Internet freedom. These statements include all members of the coalition.

  • Country-Specific Statement: Country-specific statements are exceptional joint statements intended to call out the actions of a specific government that is threatening online freedoms. In this instance, the statements are opt in, and member countries may affirmatively choose to endorse them.
  • Chair Statement: The chair of the FOC may issue a statement that is related to Internet freedom or that calls out the actions of a specific government. Member states may choose to opt in and endorse the statement of the chair.

Program of Action: The program of action is an agenda authored by the coalition chair and “Friends of the Chair” that sets the priorities for the coalition on an annual basis.

Support Unit: The Support Unit assists the coalition by providing administrative and logistical work to advance the goals laid out in the program of action.

Ad hoc working groups and task forces: Ad hoc working groups and task forces are established by the “Friends of the Chair” and are focused on a narrow substantive mandate. They typically comprise multistakeholder experts and are used to drive action and advise the coalition on issues related to their mandate.

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

1    “Freedom Online: Joint Action for Free Expression on the Internet,” Freedom Online Coalition, December 8–9, 2011.
2    Hilary Rodham Clinton, “Remarks on Internet Freedom,” (remarks at the Newseum, Washington, DC, January 21, 2010), https://2009-2017.state.gov/secretary/20092013clinton/rm/2010/01/135519.htm
3    “About: Open Technology Fund,” Open Technology Fund, last visited November 9, 2022, https://www.opentech.fund/about/
4    “Freedom Online: Joint Action for Free Expression on the Internet.” The founding members of the FOC include Austria, Canada, Costa Rica, the Czech Republic, Finland, France, Estonia, Ghana, Ireland, Kenya, Latvia, the Republic of Maldives, Mexico, Mongolia, the Netherlands, Sweden, Tunisia, the United Kingdom, and the United States.
5    “Structure, Freedom Online Coalition,” Freedom Online Coalition, last visited November 9, 2022, http://freedomonlinecoalition.com/structure
6    Ibid. Current “Friends of the Chair” include Canada (2022 chair of the FOC), Denmark, Estonia, Finland, France, Germany, Ghana, the Netherlands, Switzerland, the United Kingdom, and the United States
7    Aims and Priorities, Freedom Online Coalition,” Freedom Online Coalition, last visited November 9, 2022, http://freedomonlinecoalition.com/aims-and-priorities.
8    “Advisory Network, Freedom Online Coalition,” Freedom Online Coalition, last visited November 9, 2022, http://freedomonlinecoalition.com/advisory-network.
9    Stockholm Terms of Reference of the Freedom Online Coalition,” Freedom Online Coalition, May 16, 2017, https://freedomonlinecoalition.com/document/the-stockholm-terms-of-reference/.
10    “Global Partners Digital,” Global Partners Digital, last visited November 9, 2022, https://www.gp-digital.org. The “Friends of the Chair” convene on a monthly basis, and the minutes of these calls are published at: “Friends of the Chair Monthly Call #1,” Freedom Online Coalition, last visited November 9, 2022, https://freedomonlinecoalition.com/wp-content/uploads/2022/04/Minutes-from-the-Friends-of-the-Chair-Call-1-January-1.pdf.
11    Member states that contributed to the Support Unit’s 2022–2023 budget include Australia, Canada, Estonia, Finland, Ireland, the Netherlands, Switzerland, and the United States.
12    The FOC did not have a chair in 2017 or 2020. The 2019 chair (Ghana) hosted its conference in February 2020.
13    FOC Joint Statement on The Socialist Republic of Vietnam’s Decree 72,” Freedom Online Coalition, August 2013, https://freedomonlinecoalition.com/wp-content/uploads/2021/06/FOC-Joint-Statement-on-The-Socialist-Republic-of-Vietnams-Decree-72.pdf.
14    “Statement on Behalf of the Chair of The Freedom Online Coalition: A Call to Action on State-Sponsored Disinformation in Ukraine,” Freedom Online Coalition, March 2, 2022, https://www.canada.ca/en/global-affairs/news/2022/03/statement-on-behalf-of-the-chair-of-the-freedom-online-coalition-a-call-to-action-on-state-sponsored-disinformation-in-ukraine.html.
15    “Recommendations for Human Rights Based Approaches to Cybersecurity,” Internet Free & Secure Initiative, last visited November 9, 2022, https://freeandsecure.online/recommendations/.
17    Ibid.
18    Freedom Online Coalition (FOC) Terms of Reference,” Freedom Online Coalition, September 6, 2012, https://freedomonlinecoalition.com/wp-content/uploads/2021/05/Nairobi-Terms-of-Reference.pdf.
19    “Ad Hoc Working Groups & Other Entities,” Freedom Online Coalition, last visited November 9, 2022, https://freedomonlinecoalition.com/ad-hoc-working-groups-task-forces.
20    Snowden Revelations,” Lawfare, last visited November 9, 2022, https://www.lawfareblog.com/snowden-revelations.
21    “Recommendations for Freedom Online,” Freedom Online Coalition, April 28, 2014, https://freedomonlinecoalition.com/wp-content/uploads/2021/05/FOC-recommendations-consensus.pdf.
22    Looking Back to Move Ahead: Freedom Online Coalition Strategic Review Outcome. Final Report and Recommendations of the FOC Strategic Review Working Group May 2015–October 16,” Freedom Online Coalition, October 17–18, 2016, https://freedomonlinecoalition.com/wp-content/uploads/2021/05/FOC-SRWG-Outcome-bundle_FINAL-1.pdf.
23    The San Jose Statement of the Freedom Online Coalition Regarding the Outcome of the 2016 Strategic Review,” Freedom Online Coalition, October 17–18, 2016.
24    “Stockholm Terms of Reference of the Freedom Online Coalition.”
25    The support unit remains housed at Global Digital Partners (GDP), with its most recent contract renewed in 2020.
26    “Ad Hoc Working Groups & Other Entities.”
27    Ibid.
28    “FOC 10th Anniversary Helsinki Declaration—Towards a Rules-based, Democratic and Digitally Inclusive World,” Freedom Online Coalition, December 2–3, 2021, https://freedomonlinecoalition.com/wp-content/uploads/2021/12/FOC-10th-Anniversary-Helsinki-Declaration-Towards-a-Rules-based-Democratic-and-Digitally-Inclusive-World.pdf.
29    Ibid.
30    Greg Miller and Joseph Menn, “Putin’s Prewar Moves Against U.S. Tech Giants Laid Groundwork for Crackdown on Free Expression,” Washington Post, March 12, 2022, https://www.washingtonpost.com/world/2022/03/12/russia-putin-google-apple-navalny.

The post An introduction to the Freedom Online Coalition appeared first on Atlantic Council.

]]>
Russian War Report: Russian Telegram channel spreads digitally modified photo of Poland’s prime minister https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russian-telegram-channel-spreads-digitally-modified-photo-of-polands-prime-minister/ Fri, 02 Dec 2022 19:42:18 +0000 https://www.atlanticcouncil.org/?p=591046 Russian Telegram channels disseminated a manipulated photo showing Polish Prime Minister Mateusz Morawiecki at a monument during his visit to Ukraine.

The post Russian War Report: Russian Telegram channel spreads digitally modified photo of Poland’s prime minister appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Heavy fighting in the Bakhmut trenches as Russia continues to attack critical Ukrainian infrastructure

Tracking narratives

Russian Telegram channel spreads digitally modified photo of Poland’s prime minister

War crimes and human rights abuses

New reports of Russian forces killing Ukrainian civilians

International response

European Parliament declares Russia a state sponsor of terrorism

US, Bulgaria, Lithuania expand support efforts

Heavy fighting in the Bakhmut trenches as Russia continues to attack critical Ukrainian infrastructure

The Russian army has been implementing defensive facilities in the Kherson region since October, preparing for either a Ukrainian army advance or an organized retreat. Russian forces remain entrenched in various parts of Kherson and southern Ukraine. Ukrainian forces reportedly damaged a rail bridge north of Melitopol that served as a critical supply route for Russian troops. 

After the successful Ukrainian counteroffensive in Kherson, Russian forces are likely to increase attacks on critical infrastructure, such as factories and warehouses. On November 19, the Russian armed forces attacked the Motor Sich plant in Zaporizhzhia with Iranian drones. Video emerged on Telegram of explosions at the site of the attack. The plant manufactures aircraft engines and industrial marine gas turbines.  

Russian forces are also expected to escalate the front line in the Donetsk region after the retreat at Kherson. The situation remains dire in Bakhmut, a strategically important city that has seen months of fighting as Russia attempts to capture the territory, which would provide the Russian army with an opportunity to launch an offensive. According to the Guardian, hundreds of soldiers from both sides are killed or wounded on the Bakhmut front on a daily basis. The fighting on the front includes artillery fire, with Ukrainian forces managing to inflict losses on Russian units with precision-guided shells. Bakhmut is heavily fortified and has sustained significant damage. Ukrainian forces also conduct patrols inside the city, fearing possible infiltration behind the defensive line.  

Ukraine’s Zaporizhzhia nuclear power plant was shelled on November 19 and November 20, according to the International Atomic Energy Agency, which warned that such attacks risk causing a nuclear disaster. Russia and Ukraine blamed each other for the attack on the facility, which is in Russian-controlled territory. While some media reports claim Russian forces are preparing to abandon the Zaporizhzhia power plant, the Kremlin denies it plans to leave the facility. The Russian wartime administration recently promoted the chief engineer of the Zaporizhzhia nuclear power plant to director.  

On November 23, Russia launched a large-scale missile attack targeting different regions of Ukraine, including Kyiv, where a missile hit a high-rise building. Strikes took place on critical infrastructure facilities across Ukraine, causing electrical outages that stretched from Kyiv to the western city of Lviv. Meanwhile, Moldova also experienced electrical outages as a result of the shelling in Ukraine, including in the occupied region of Transnistria. On December 1, electricity in Kherson was cut due to Russian shelling. Ukrainian authorities, fearing new attacks, began evacuating civilians from recently liberated areas of Kherson and Mykolaiv. Attacks targeting energy infrastructure will likely continue during the winter months and the new year.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russian Telegram channel spreads digitally modified photo of Poland’s prime minister

On November 26, a Russian Telegram channel disseminated a manipulated photo showing Polish Prime Minister Mateusz Morawiecki at a Stepan Bandera monument during his visit to Ukraine. The image was digitally modified, with the original photo of the prime minister taken at a memorial to Holodomor victims. The Russian Telegram channel Ненасытный Гардемарин (“Insatiable Gardes-Marine”) shared a false quote they alleged to have come from Morawiecki: “The memory of this great fighter against Russians will remain in our hearts forever. Bandera has always been a great friend of the Polish people.”  

Stepan Bandera is a polarizing figure in Poland and Ukraine for his role in the massacre of Polish civilians in 1943-1944. The Polish fact-checking platform Konkret 24 confirmed the alleged photo at the Bandera monument was digitally modified. The prime minister’s office published authentic images taken during Morawiecki’s visit to a monument for Holodomor victims in Kyiv, where he laid a symbolic wreath. The forgery extracted the prime minister and his companion’s bodies from the original photo, flipped the image, and then added it to a photo of the Stepan Bandera statue. A Yandex reverse image search revealed that the photo of the Stepan Bandera statue previously appeared on multiple websites, including Wikipedia.

Top: Prime Minister Morawiecki in front of the monument to Holodomor victims in Kyiv. Bottom left: the digitally modified image; Bottom right: a copy of the original Bandera monument photo on Wikipedia. (Sources: @PremierRP/archive, top; Telegram/archive, bottom left; Wikipedia/archive, bottom right)
Top: Prime Minister Morawiecki in front of the monument to Holodomor victims in Kyiv. Bottom left: the digitally modified image; Bottom right: a copy of the original Bandera monument photo on Wikipedia. (Sources: @PremierRP/archive, top; Telegram/archive, bottom left; Wikipedia/archive, bottom right)

Two days before Morawiecki’s visit to Kyiv, pro-Kremlin Russian Telegram channels also spread images of forged questionnaires allegedly prepared by the Polish embassy in Ukraine. The pro-Kremlin Telegram channel Украина.ру (Ukraine.ru) asserted that the embassy organized the questionnaires to ask Ukrainian citizens whether they wanted to be under a Polish “protectorate.” The Telegram post also included a photo of a forged letter addressed to the Polish the consuls general in the Ukrainian cities of Lutsk and Lviv, asking them to conduct public opinion polls in Lviv and Volyn. According to the letter, the Consuls should submit the results of the polls to the embassy no later than November 21.  

The Telegram post also contained a video of a printer making copies of the questionnaires. The documents contained the logos of two Polish organizations, the White Eagle Association of Poles (Orzeł Biały) and the Polish-Ukrainian Cooperation Foundation (PAUCI). The forged documents are written in Ukrainian. Konkret24 translated the documents and found three questions visible in the video regarding the respondent’s nationality, whether they count on Poland increasing support for Ukraine, and a partially obscured question appearing to ask their thoughts on a Polish protectorate over the Volyn region.  

A spokesperson for the Polish foreign ministry denied the questionnaires were authentic. “Entries regarding the preparations for the referendum on joining the western regions of Ukraine to Poland are disinformation,” he stated.  

The alleged forgery appears to be another attempt to trigger disputes between Poland and Ukraine. The DFRLab has previously reported on similar false claims that Poland intends to occupy the Western part of Ukraine.

Givi Gigitashvili, Research Associate, Warsaw, Poland

New reports of Russian forces killing Ukrainian civilians

Russian armed forces reportedly killed a family on November 18 in the village of Komysh-Zoria, Zaporizhzhia, according to Ukrainian news agency Ukrainska Pravda, citing anonymous law enforcement officials and Ukrainian security services. The online Ukrainian publication Obozrevatel also reported on the killing, claiming that pro-Russian militants from the Donetsk People’s Republic and soldiers from Ossetia drove into the occupied settlement to Pochtovaya Street, where the family had lived.  

Radio Free Europe/Radio Liberty’s Ukraine division published an article on November 30 about atrocities reportedly committed by a high-ranking Russian officer. Sergey Safonov, commander of the 27th Separate Guards Motor Rifle Brigade, allegedly stabbed an elderly Ukrainian woman to death while retreating from the Kharkiv region.  

Meanwhile on November 22, a Russian missile strike damaged a maternity ward at the central district municipal hospital in Vilnyansk, Zaporizhzhia. Civilian casualties were reported.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

European Parliament declares Russia a state sponsor of terrorism

On November 23 , members of the European Parliament voted to adopt a resolution designating Russia as a state sponsor of terrorism. The final vote was 494 in favor and fifty-eight against, with forty-four abstentions. The resolution was in response to Russian atrocities in the war against Ukraine, including strikes against hospitals, schools, shelters, and other civilian targets. The resolution also called for the Russian state-backed Wagner Group and Chechen forces led by Ramzan Kadyrov to be added to the European Union’s list of persons, groups, and entities involved in terrorist acts. 

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

US, Bulgaria, Lithuania expand support efforts 

The US Department of Defense submitted a purchase order for the production of UKR/TPQ-50 lightweight anti-mine radars for use in Ukraine. These radars can track the trajectory of mortar fire at up to ten kilometers, calculating the location of the mortar. The order is scheduled to be completed in June 2023.  

According to Bulgarian Minister of Defense Dimitar Stoyanov, Bulgaria will send at least nine Boeing C-17 Globemasters to Ukraine. Bulgaria has sought logistical assistance from the US and the United Kingdom to help deliver the shipment of military transport aircraft. 

Lithuania, meanwhile, will provide Ukraine forces with 25,000 pieces of winter clothing. The country’s defense ministry will spend $2 million purchasing warm clothing for Ukraine, according to Ukrainian sources.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

The post Russian War Report: Russian Telegram channel spreads digitally modified photo of Poland’s prime minister appeared first on Atlantic Council.

]]>
Evanina testifies to Senate Select Committee on Intelligence https://www.atlanticcouncil.org/insight-impact/in-the-news/evanina-testifies-for-the-senate-committee-on-intelligence/ Fri, 02 Dec 2022 15:11:02 +0000 https://www.atlanticcouncil.org/?p=580656 William Evanina testifies on the growing cyber threat posed to US business and academic institutions.

The post Evanina testifies to Senate Select Committee on Intelligence appeared first on Atlantic Council.

]]>

On September 21, the Scowcroft Center for Strategy and Security’s Nonresident Senior Fellow William Evanina testified before the Senate Select Committee on Intelligence. In his testimony, Evanina discussed the growing cyber threat posed to US business and academic institutions.

America faces an unprecedented sophistication and persistence of threats by nation state actors, cyber criminals, hacktivists and terrorist organizations. Corporate America and academia have become the new counterintelligence battlespace for our nation state adversaries, especially the Communist Party of China.

William Evanina
Forward Defense

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Evanina testifies to Senate Select Committee on Intelligence appeared first on Atlantic Council.

]]>
Ness in Centre for European Perspective’s “Strategic partnership for a secure and digital Europe” report: Is the Glass Half Empty or Half Full? https://www.atlanticcouncil.org/insight-impact/in-the-news/ness-in-centre-for-european-perspectives-strategic-partnership-for-a-secure-and-digital-europe-report-is-the-glass-half-empty-or-half-full/ Tue, 22 Nov 2022 15:57:00 +0000 https://www.atlanticcouncil.org/?p=600881 Europe Center nonresident senior fellow Susan Ness authored a section of the report Strategic partnership for a secure and digital Europe Forging a digitally advanced future with deepened transatlantic cooperation organized by the Centre for European Perspective, assessing the role of the EU-US Trade and Technology Council in aligning transatlantic democracies. The war in Ukraine […]

The post Ness in Centre for European Perspective’s “Strategic partnership for a secure and digital Europe” report: Is the Glass Half Empty or Half Full? appeared first on Atlantic Council.

]]>

Europe Center nonresident senior fellow Susan Ness authored a section of the report Strategic partnership for a secure and digital Europe Forging a digitally advanced future with deepened transatlantic cooperation organized by the Centre for European Perspective, assessing the role of the EU-US Trade and Technology Council in aligning transatlantic democracies.

The war in Ukraine underscored on both sides of the Atlantic the urgency of achieving greater alignment on technology to demonstrate transatlantic unity and to promote democratic values as a bulwark against the malicious use of cyberspace by despotic regimes.

Susan Ness

About the author

The post Ness in Centre for European Perspective’s “Strategic partnership for a secure and digital Europe” report: Is the Glass Half Empty or Half Full? appeared first on Atlantic Council.

]]>
The cyber strategy and operations of Hamas: Green flags and green hats https://www.atlanticcouncil.org/in-depth-research-reports/report/the-cyber-strategy-and-operations-of-hamas-green-flags-and-green-hats/ Mon, 07 Nov 2022 05:01:00 +0000 https://www.atlanticcouncil.org/?p=579898 This report seeks to highlight Hamas as an emerging and capable cyber actor, and help the policy community understand how similar non-state groups may leverage the cyber domain in the future.

The post The cyber strategy and operations of Hamas: Green flags and green hats appeared first on Atlantic Council.

]]>

Executive summary

Cyberspace as a domain of conflict often creates an asymmetric advantage for comparably less capable or under-resourced actors to compete against relatively stronger counterparts.1 As such, a panoply of non-state actors is increasingly acquiring capabilities and integrating offensive cyber operations into their toolkits to further their strategic aims. From financially driven criminal ransomware groups to politically inspired patriot hacking collectives, non-state actors have a wide range of motivations for turning to offensive cyber capabilities. A number of these non-state actors have histories rooted almost entirely in armed kinetic violence, from professional military contractors to drug cartels, and the United States and its allies are still grappling with how to deal with them in the cyber context.2 Militant and terrorist organizations have their own specific motivations for acquiring offensive cyber capabilities, and their operations therefore warrant close examination by the United States and its allies to develop effective countermeasures.

While most academic scholarship and government strategies on counterterrorism are beginning to recognize and address the integral role of some forms of online activity, such as digital media and propaganda on behalf of terrorist organizations, insufficient attention has been given to the offensive cyber capabilities of these actors. Moreover, US strategy,3 public intelligence assessments, and academic literature on global cyber threats to the United States overwhelmingly focuses on the “big four” nation-state adversaries—China, Russia, Iran, and North Korea. Before more recent efforts to address the surge in financially driven criminal ransomware operations, the United States and its allies deployed policy countermeasures overwhelmingly designed for use against state actors.

To the extent that US counterterrorism strategy addresses the offensive cyber threat from terrorist organizations, it is focused on defending critical infrastructure against the physical consequences of a cyberattack. Hamas, despite being a well-studied militant and terrorist organization, is expanding its offensive cyber and information capabilities, a fact that is largely overlooked by counterterrorism and cyber analysts alike. Overshadowed by the specter of a catastrophic cyberattack from other entities, the real and ongoing cyber threats posed by Hamas prioritize espionage and information operations.

This report seeks to highlight Hamas as an emerging and capable cyber actor, first by explaining Hamas’s overall strategy, a critical facet for understanding the group’s use of cyber operations. Next, an analysis will show how Hamas’s cyber activities do not indicate a sudden shift in strategy but, rather, a realignment that augments operations. In other words, offensive cyber operations are a new way for Hamas to do old things better. Finally, the policy community is urged to think differently about how it approaches similar non-state groups that may leverage the cyber domain in the future. This report can be used as a case study for understanding the development and implementation of cyber tools by non-state entities.

As the title of this report suggests, Hamas is like a green hat hacker—a term that is not specific to the group but recognized in the information security community as someone who is relatively new to the hacking world, lacking sophistication but fully committed to making an impact and keen to learn along the way.4 Hamas has demonstrated steady improvement in its cyber capabilities and operations over time, especially in its espionage operations against internal and external targets. At the same time, the organization’s improvisation, deployment of relatively unsophisticated tools, and efforts to influence audiences are all hallmarks of terrorist strategies. This behavior is in some ways similar to the Russian concept of “information confrontation,” featuring a blend of technical, information, and psychological operations aimed at wielding influence over the information environment.5

Understanding these dynamics, as well as how cyber operations fit into the overall strategy, is key to the US development of effective countermeasures against terrorist organizations’ offensive cyber operations.

“Pwn” goal

In the summer of 2018, as teams competed in the International Federation of Association Football (FIFA) World Cup in Russia, Israeli soldiers followed the excitement on their smartphones from an Israel Defense Forces (IDF) base thousands of miles away. Like others in Israel, the soldiers were using a new Android application called Golden Cup, available for free from the Google Play store. The program was promoted in the lead up to the tournament as “the fastest app for live scores and fixtures for the World Cup.”6 The easy-to-use application delivered as advertised—and more.

Once installed, the application communicated with its command-and-control server to surreptitiously download malicious payloads onto user devices. The payloads infected the target devices with spyware, a variety of malware that discreetly monitors the target’s device and steals its information, usually for harmful use against the target individual.7 In this particular case, the spyware was intentionally deployed after the application was downloaded from the Google Play store in order to bypass Google’s security screening process.8 This allowed the spyware operator to remotely execute code on user smartphones to track locations, access cameras and microphones, download images, monitor calls, and exfiltrate files.

Golden Cup users, which included Israeli civilians and soldiers alike, did not realize that their devices were infected with spyware. As soldiers went about their daily routines on bases, the spyware operators reaped reams of data from the compromised smartphones. In just a few weeks of discreet collection, before discovery by IDF security, the adversary successfully collected non-public information about various IDF bases, offices, and military hardware, such as tanks and armored vehicles.9

The same adversary targeted Israeli soldiers with several other malicious Android applications throughout the summer of 2018. A fitness application that tracks user running routes collected the phone numbers of soldiers jogging in a particularly sensitive geographic location. After collecting these numbers, the adversary targeted the soldiers with requests to download a second application that then installed spyware. Additional targeting of Israeli soldiers that same summer included social engineering campaigns encouraging targets to download various spyware-laced dating applications with names like Wink Chat and Glance Love, prompting the IDF to launch the aptly named Operation Broken Heart in response.10

Surprisingly, this cyber espionage campaign was not the work of a nation-state actor. Although the clever tradecraft exhibited in each operation featured many of the hallmarks of a foreign intelligence service, neither Israel’s geopolitical nemesis Iran nor China,11 an increasingly active Middle East regional player, was involved.12 Instead, the campaign was the work of Hamas.

1. Introduction

The asymmetric advantage afforded by cyberspace is leading a panoply of non-state actors to acquire and use offensive cyber capabilities to compete against relatively stronger counterparts. The cyber threat from criminal ransomware organizations has been well documented, yet a range of other non-state actors traditionally involved in armed kinetic violence, from professional military contractors to drug cartels, is also trying their hand at offensive cyber operations, and the United States and its allies are still grappling with how to respond. Each actor has a discreet motivation for dabbling in cyber activities, and lumping them all into one bucket of non-state actors can complicate efforts to study and address their actions. The operations of militant and terrorist organizations in particular warrant close examination by the United States and its allies in order to develop effective countermeasures.

A robust online presence is essential for modern terrorist organizations. They rely on the internet to recruit members, fund operations, indoctrinate target audiences, and garner attention on a global scale—all key functions for maintaining organizational relevance and for surviving.13 The 2022 Annual Threat Assessment from the US Intelligence Community suggests that terrorist groups will continue to leverage digital media and internet platforms to inspire attacks that threaten the United States and US interests abroad.14 Recent academic scholarship on counterterrorism concurs, acknowledging the centrality of the internet to various organizations, ranging from domestic right-wing extremists to international jihadists, and their efforts to radicalize, organize, and communicate.

The US government has taken major steps in recent years to counter terrorist organizations in and through cyberspace. The declassification of documents on Joint Task Force Ares and Operation Glowing Symphony, which began in 2016, sheds light on complex US Cyber Command efforts to combat the Islamic State in cyberspace, specifically targeting the group’s social media and propaganda efforts and leveraging cyber operations to support broader kinetic operations on the battlefield.15 The latest US National Strategy for Counterterrorism, published in 2018, stresses the need to impede terrorist organizations from leveraging the internet to inspire and enable attacks.16

Indeed, continued efforts to counter the evolving social media and propaganda tools of terrorist organizations will be critical, but this will not comprehensively address the digital threat posed by these groups. Counterterrorism scholarship and government strategies have paid scant attention to the offensive cyber capabilities and operations of terrorist organizations, tools that are related but distinct from other forms of online influence. Activities of this variety do not necessarily cause catastrophic physical harm, but their capacity to influence public perception and, potentially, the course of political events should be cause for concern.

Several well-discussed, politically significant non-state actors with histories rooted almost entirely in kinetic violence are developing, or otherwise acquiring, offensive cyber capabilities to further their interests. More scrutiny of these actors, their motivations, and how they strategically deploy offensive cyber capabilities in conjunction with evolving propaganda and kinetic efforts is warranted to better orient toward the threat.

Hamas, a Palestinian political party and militant terrorist organization that serves as the de facto governing body of the Gaza Strip, is one such actor. The group’s burgeoning cyber capabilities, alongside its propaganda tactics, pose a threat to Israel, the Palestinian Authority, and US interests in the region—especially in tandem with the group’s capacities to fund, organize, inspire, and execute kinetic attacks. This combination of capabilities has historically been the dominion of more powerful state actors. However, the integration of offensive cyber capabilities into the arsenals of traditionally kinetic non-state actors, including militant organizations, is on the rise due to partnerships with state guarantors and the general proliferation of these competencies worldwide.

This report seeks to highlight the offensive cyber and information capabilities and behavior of Hamas. First, a broad overview of Hamas’s overall strategy is provided, an understanding of which is key for evaluating its cyber activities. Second, this report analyzes the types of offensive cyber operations in which Hamas engages, showing that the adoption of cyber capabilities does not indicate a sudden shift in strategy but, rather, a realignment of strategy and an augmentation of operations. In other words, offensive cyber operations are a new way to do old things better. Third, this report aims to push the policy community to think differently about its approach to similar non-state groups that may leverage the cyber domain in the future.

2. Overview of Hamas’s strategy

Principles and philosophy

Founded in the late 1980s, Harakat al-Muqawamah al-Islamiyyah, translated as the Islamic Resistance Movement and better known as Hamas, is a Palestinian religious political party and militant organization. After Israel disengaged from the Gaza Strip in 2005, Hamas used its 2006 Palestinian legislative election victory to take over militarily from rival political party Fatah in 2007. The group has served as the de facto ruler of Gaza ever since, effectively dividing the Palestinian Territories into two entities, with the West Bank governed by the Hamas-rejected and Fatah-controlled Palestinian Authority.17

Hamas’s overarching objectives are largely premised on its founding principles—terminating what it views as the illegitimate State of Israel and establishing Islamic, Palestinian rule.18 The group’s grand strategy comprises two general areas of focus: resisting Israel and gaining political clout with the Palestinian people. These objectives are interconnected and mutually reinforcing, as Hamas’s public resistance to Israel feeds Palestinian perceptions of the group as the leader of the Palestinian cause.19

Map of Israel and the Palestinian Territories.
Source: Nations Online Project

Despite Hamas’s maximalist public position on Israel, the organization’s leaders are rational actors who logically understand the longevity and power of the State of Israel. Where the group can make meaningful inroads is in Palestinian politics, trying to win public support from the more secular, ruling Fatah party and positioning itself to lead a future Palestinian state. Looming uncertainty about the future of an already weak Palestinian Authority, led by the aging President Mahmoud Abbas, coupled with popular demand for elections, presents a potential opportunity for Hamas to fill a leadership vacuum.20

To further these objectives, Hamas attracts attention by frequently generating and capitalizing on instability. The group inflames already tumultuous situations to foster an environment of extremism, working against those who are willing to cooperate in the earnest pursuit of a peaceful solution to the Israel–Palestine conflict. Hamas uses terror tactics to influence public perception and to steer political outcomes, but still must exercise strategic restraint to avoid retaliation that could be militarily and politically damaging. Given these self-imposed restraints, Hamas seeks alternative methods of influence that are less likely to result in blowback.

Terrorism strategy

Hamas’s terror tactics have included suicide bombings,21 indiscriminate rocket fire,22 sniper attacks,23 incendiary balloon launches,24 knifings,25 and civilian kidnappings,26 all in support of its larger information strategy to project a strong image and to steer political outcomes. Through these activities, Hamas aims to undermine Israel and the Palestinian Authority27 and challenge the Palestine Liberation Organization’s (PLO)28 standing as the “sole representative of the Palestinian people.”

Terrorism forms the foundation of Hamas’s approach, and the organization’s leadership openly promotes such activities.29 While the group’s terror tactics have evolved over time, they have consistently been employed against civilian targets to provoke fear, generate publicity, and achieve political objectives. Israeli communities targeted by terrorism, as well as Palestinians in Gaza living under Hamas rule, suffer from considerable physical and psychological stress,30 driving Israeli policymakers to carry out military operations, often continuing a vicious cycle that feeds into Hamas’s information campaign.

These terrorist tactics follow a coercive logic that aligns with Hamas’s greater messaging objectives. Robert Pape’s “The Strategic Logic of Suicide Terrorism” specifically names Hamas as an organization with a track record of perpetrating strategically timed suicide terrorist attacks for coercive political effect.31 In 1995, for example, Hamas conducted a flurry of suicide attacks, killing dozens of civilians in an attempt to pressure the Israeli government to withdraw from certain locations in the West Bank. Once negotiations were underway between Israel and the PLO, Hamas temporarily suspended the attacks, only to resume them against Israeli targets when diplomatic progress appeared to stall. Israel would eventually partially withdraw from several West Bank cities later that year.32

Similarly, just several months before Israel’s 1996 general election, incumbent Labor Party Prime Minister Shimon Peres led the polls by roughly 20 percent in his reelection bid against Benjamin Netanyahu and the Likud Party. However, a spate of Hamas suicide bombings cut Peres’s lead and Netanyahu emerged victorious.33 The attacks were designed to weaken the reelection bid of Peres, widely viewed as the candidate most likely to advance the peace process, and strengthen the candidacy of Netanyahu. Deliberate terror campaigns such as these demonstrate the power Hamas wields over Israeli politics.34

The Israeli security establishment has learned lessons from the phenomenon of suicide terrorism, implementing countermeasures to foil attacks. Since the mid-2000s, Hamas has shifted its focus to firing rockets of various ranges and precision from the Gaza Strip at civilian population centers in Israel.35 The rocket attacks became frequent after Israel’s disengagement from Gaza in 2005, ebbing and flowing in alignment with significant political events.36 For instance, the organization targeted towns in southern Israel with sustained rocket fire in the lead up to the country’s general election in 2009 to discourage Israelis from voting for pro-peace candidates.37

A rocket fired from the Gaza Strip into Israel, 2008.
Source: Flickr/paffairs_sanfrancisco

Strategic restraint

Each of these terror tactics has the powerful potential to generate publicity with Israelis, Palestinians, and audiences elsewhere. However, unrestrained terrorism comes at a cost, something Hamas understands. Hamas must weigh its desire to carry out attacks with the concomitant risks, including an unfavorable international perception, military retaliation, infrastructure damage, and internal economic and political pressures.

Hamas addresses this in a number of ways. First, it limits its operations, almost exclusively, to Israel and the Palestinian Territories. Hamas has learned from the failures of other Palestinian terrorist organizations, whose operations beyond Israel’s borders were often counterproductive, attracting legitimate international criticism of these groups.38 Such operations also run the risk of alienating critical Hamas benefactors like Qatar and Turkey.39 These states, which maintain important relationships with the United States—not to mention burgeoning ties with Israel—could pressure Hamas to course correct, if not outright withdraw their support for the organization.40 The continued flow of billions of dollars in funding from benefactors like Qatar is critical, not just to Hamas’s capacity to conduct terror attacks and wage war,41 but also to its efforts to reconstruct infrastructure and provide social services in the Gaza Strip, both key factors for building its political legitimacy among Palestinians.42

Second, with each terrorist attack, Hamas must weigh the potential for a forceful Israeli military response. The cycle of terrorism and retaliation periodically escalates into full-scale wars that feature Israeli air strikes and ground invasions of Gaza. These periodic operations are known in the Israeli security establishment as “mowing the grass,” a component of Israel’s strategy to keep Hamas’s arsenal of rockets, small arms, and infrastructure, including its elaborate underground tunnel network, from growing out of control like weeds in an unkempt lawn.43 Hamas’s restraint has been apparent since May 2021, when Israel conducted Operation Guardian of the Walls, a roughly two-week campaign of mostly airstrikes and artillery fire aimed at slashing the group’s rocket arsenal and production capabilities, crippling its tunnels, and eliminating many of its top commanders. Hamas is thought to be recovering and restocking since the ceasefire, carefully avoiding engaging in provocations that could ignite another confrontation before the group is ready.

Third, and critically, since mid-2021, the last year-plus of the Israel–Hamas conflict has been one of the quietest in decades due to the Israeli Bennett–Lapid government’s implementation of a sizable civil and economic program for Gaza.44 The program expands the number of permits for Palestinians from Gaza to work in Israel, where the daily wages of one worker are enough to support an additional ten Palestinians.45 Israel’s Defense Ministry signed off on a plan to gradually increase work permit quotas for Palestinians from Gaza to an unprecedented 20,000, with reports suggesting plans to eventually increase that number to 30,000.46 For an impoverished territory with an unemployment rate of around 50 percent, permits to work in Israel improve the lives of Palestinians and stabilize the economy. The program also introduced economic incentives for Hamas to keep the peace—conducting attacks could result in snap restrictions on permits and border crossing closures, leading to a public backlash, as well as internal political blowback within the group. The power of this economic tool was evident throughout Israel’s Operation Breaking Dawn in August 2022, during which Israel conducted a three-day operation to eliminate key military assets and personnel of the Palestinian Islamic Jihad (PIJ), another Gaza-based terrorist organization. Israel was careful to communicate its intention to target PIJ, not Hamas. Ordinarily a ready-and-willing belligerent in such flare-ups, Hamas did nothing to restrain the PIJ but remained conspicuously on the sidelines, refraining from fighting out of its interest in resuming border crossings as quickly as possible.47

Searching for alternatives

Given these limitations, blowbacks, and self-imposed restraints, Hamas is finding alternative methods of influence. Under the leadership of its Gaza chief Yahya Sinwar, Hamas is endeavoring to inspire Arab Israelis and West Bank Palestinians to continue the struggle by taking up arms and sparking an intifada while the group nurses itself back to strength.48 To further this effort, Hamas is turning to more insidious means of operating in the information space to garner support and ignite conflagrations without further jeopardizing its public reputation, weapons stockpiles, infrastructure, or the economic well-being of the Palestinians living under its control. Like many state actors working to advance strategic ambitions, Hamas has turned to offensive cyber operations as a means of competing below the threshold of armed conflict.

Deploying offensive cyber capabilities involves exceptionally low risks and costs for operators. For groups like Hamas that are worried about potential retaliation, these operations present an effective alternative to kinetic operations that would otherwise provoke an immediate response. Most national cyber operation countermeasures are geared toward state adversaries and, in general, finding an appropriate response to non-state actors in this area has been challenging. Many state attempts to retaliate and deter have been toothless, resulting in little alteration of the adversary’s calculations.49

3. Hamas’s cyber strategy

The nature of the cyber domain allows weak actors, like Hamas, to engage and inflict far more damage on powerful actors, like Israel, than would otherwise be possible in conventional conflict.50 This asymmetry means that cyberspace offers intrinsically covert opportunities to store, transfer, and deploy consequential capabilities with far less need for organizational resources and financial or human capacity than in industrial warfare. Well-suited to support information campaigns, cyber capabilities are useful for influencing an audience without drawing the attention and repercussions of more conspicuous operations, like terrorism. In these ways, cyber operations fit into Hamas’s overall strategy and emphasis on building public perception and influence. Making sense of this strategy allows a greater understanding of past Hamas cyber operations, and how the group will likely operate in the cyber domain going forward.

More than meets the eye

Aerial imagery of a Hamas cyber operations facility destroyed by the Israel Defense Forces in the Gaza Strip in May 2019.
Source: Israel Defense Forces

Hamas’s cyber capabilities, while relatively nascent and lacking the sophisticated tools of other hacking groups, should not be underestimated. It comes as a surprise to many security experts that Hamas—chronically plagued by electricity shortages in the Gaza Strip, with an average of just ten to twelve hours of electricity per day—even possesses cyber capabilities.51 Israel’s control over the telecommunications frequencies and infrastructure of the Gaza Strip raises further doubts about how Hamas could operate a cyber program.52 However, in 2019, Israel deemed the offensive cyber threat to be critical enough that after thwarting an operation, the IDF carried out a strike to destroy Hamas’s cyber headquarters,53 one of the first acknowledged kinetic operations by a military in response to a cyber operation. However, despite an IDF spokesperson’s claim that “Hamas no longer has cyber capabilities after our strike,” public reporting has highlighted various Hamas cyber operations in the ensuing months and years.54

This dismissive attitude toward Hamas’s cyber threat also overlooks the group’s operations from outside the confines of the Gaza Strip. Turkish President Recep Tayyip Erdoğan and his AKP Party share ideological sympathies with Hamas and have extended citizenship to Hamas leadership.55 The group’s leaders have allegedly used Turkey as a base for planning attacks and even as a safe haven for an overseas cyber facility.56 Hamas maintains even more robust relationships with other state supporters, namely Iran and Qatar, which provide financing, safe havens, and weapons technology.57 With the assistance of state benefactors, Hamas will continue to develop offensive cyber and information capabilities that, if overlooked, could result in geopolitical consequences.

For at least a decade, Hamas has engaged in cyber operations against Israeli and Palestinian targets. These operations can be divided in two broad operational categories that align with Hamas’s overall strategy: espionage and information. The first category, cyber espionage operations, accounts for the majority of Hamas’s publicly reported cyber activity and underpins the group’s information operations.

Espionage operations

Like any state or non-state actor, Hamas relies on quality intelligence to provide its leadership and commanders with decision-making advantages in the political and military arenas. The theft of valuable secrets from Israel, rival Palestinian factions, and individuals within its own ranks provides Hamas with strategic and operational leverage, and is thus prioritized in its cyber operations.

The Internal Security Force (ISF) is Hamas’s primary intelligence organization, comprised of members of the al-Majd security force from within the larger Izz al-Din al-Qassam Brigades, a military wing of Hamas. The ISF’s responsibilities range from espionage to quashing political opposition and dissent from within the party and its security apparatus.58 The range of the ISF’s missions manifests through Hamas’s cyber operations.

Tactical evolution

Naturally, Israel is a primary target of Hamas’s cyber espionage. These operations have become commonplace over the last several years, gradually evolving from broad, blunt tactics into more tailored, sophisticated approaches. The group’s initial tactics focused on a “spray and pray” approach, distributing impersonal emails with malicious attachments to a large number of targets, hoping that a subset would bite. For example, an operation that began in mid-2013 and was discovered in February 2015 entailed Hamas operators luring targets with the promise of pornographic videos that were really malware apps. The operators relied on their victims—which included targets across the government, military, academic, transportation, and infrastructure sectors—withholding information about the incidents from their workplace information technology departments, out of shame for clicking on pornography at work, thereby maximizing access and time on the target.59

Later, Hamas operations implemented various tactical updates to increase their chances of success. In September 2015, the group began including links rather than attachments, non-pornographic lures such as automobile accident videos, and additional encryption of the exfiltrated data.60 Another campaign, publicized in February 2017, involved a more personalized approach using social engineering techniques to target IDF personnel with malware from fake Facebook accounts.61 In subsequent years, the group began rolling out a variety of smartphone applications and marketing websites to surreptitiously install mobile remote access trojans on target devices. In 2018, the group implanted spyware on smartphones by masquerading as Red Alert, a rocket siren application for Israelis.62 Similarly in 2020, Hamas targeted Israelis through dating apps with names like Catch&See and GrixyApp.63 As previously mentioned, Hamas also cloaked its spyware in a seemingly benign World Cup application that allowed the group to collect information on a variety of IDF military installations and hardware, including armored vehicles. These are all areas Hamas commanders have demonstrated interest in learning more about in order to gain a potential advantage in a future kinetic conflict.64

According to the Israeli threat intelligence firm Cybereason, more recent discoveries indicate a “new level of sophistication” in Hamas’s operations.65 In April 2022, a cyber espionage campaign targeting individuals from the Israeli military, law enforcement, and emergency services used previously undocumented malware featuring enhanced stealth mechanisms. This indicates that Hamas is taking more steps to protect operational security than ever.66 The infection vector for this particular campaign was through social engineering on platforms like Facebook, a hallmark of many Hamas espionage operations, to dupe targets into downloading trojanized applications. Once the malware is downloaded, Hamas operators can access a wide range of information from the device’s documents, camera, and microphone, acquiring immense data on the target’s whereabouts, interactions, and more. Information collected off of military, law enforcement, and emergency services personnel can be useful on its own or for its potential extortion value.

As part of its power struggle with the Palestinian Authority and rival Fatah party, Hamas targets Palestinian political and security officials with similar operations. In another creative cyber espionage operation targeting the Palestinian Authority, Hamas operators used hidden malware to exfiltrate information from the widely used cloud platform Dropbox.67 The same operation targeted political and government officials in Egypt,68 an actor Hamas is keen to surveil given its shared border with the Gaza Strip and role brokering ceasefires and other negotiations between Israel and Hamas.

Other common targets of Hamas’s cyber espionage campaigns are members of its own organization. One of the ISF’s roles is counterintelligence, a supremely important field to an organization that is rife with internecine political rivalries,69 as well as paranoia about the watchful eyes of Israeli and other intelligence services. According to Western intelligence sources, one of the main missions of Hamas’s cyber facility in Turkey is deploying counterintelligence against Hamas dissenters and spies.70 Hamas is sensitive to the possibility of Palestinians within its ranks and others acting as “collaborators” with Israel, and the group occasionally summarily executes individuals on the suspicion of serving as Israeli intelligence informants.71

Information operations

While the bulk of Hamas’s cyber operations place a premium on information gathering, a subset involves using this information to further its efforts to influence the public. This broadly defined category of information operations comprises everything from hack-and-leaks to defacements to social media campaigns that advance beneficial narratives.

Hack-and-leak operations, when hackers acquire secret or otherwise sensitive information and subsequently make it public, are clear attempts to shift public opinion and “simulate scandal.”72 The strategic dissemination of stolen documents, images, and videos—potentially manipulated—at critical junctures can be a windfall for a group like Hamas. In December 2014, Hamas claimed credit for hacking the IDF’s classified network and posting multiple videos taken earlier in the year of Israel’s Operation Protective Edge in the Gaza Strip.73 The clips, which were superimposed with Arabic captions by Hamas,74 depicted sensitive details about the IDF’s operation, including two separate instances of Israeli forces engaging terrorists infiltrating Israel—one group infiltrating by sea en route to Kibbutz Zikim and one group via a tunnel under the border into Kibbutz Ein HaShlosha—to engage in kidnappings. One of the raids resulted in a fight that lasted for roughly six hours and the death of two Israelis.75 By leaking the footage, including images of the dead Israelis, Hamas sought to project itself as a strong leader to Palestinians and to instill fear among Israelis, boasting about its ability to infiltrate Israel, kill Israelis, and return to Gaza. These operations are intended to demonstrate Hamas’s strength on two levels: first, their ability to hack and steal valuable material from Israel and second, their boldness in carrying out attacks to further the Palestinian national cause.

Defacement is another tool in Hamas’s cyber arsenal. This sort of operation, a form of online vandalism that usually involves breaching a website to post propaganda, is not so much devastating as it is a nuisance.76 The operations are intended to embarrass the targets, albeit temporarily, and generate a psychological effect on an audience. In 2012, during Israel’s Operation Cast Lead in the Gaza Strip, Hamas claimed responsibility for attacks on Israeli websites, including the IDF’s Homefront Command, asserting that the cyber operations were “an integral part of the war against Israel.”77 Since then, Hamas has demonstrated its ability to reach potentially wider audiences through defacement operations. Notably, in July 2014 during Operation Protective Edge, Hamas gained access to the satellite broadcast of Israel’s Channel 10 television station for a few minutes, broadcasting images purportedly depicting Palestinians injured by Israeli airstrikes in the Gaza Strip. The Hamas hackers also displayed a threat in Hebrew text: “If your government does not agree to our terms, then prepare yourself for an extended stay in shelters.”78

Hamas has conducted defacement operations itself and has relied on an army of “patriotic hackers.” Patriotic hacking, cyberattacks against a perceived adversary performed by individuals on behalf of a nation, is not unique to the Israeli–Palestinian conflict. States have turned to sympathetic citizens around the world for support, often directing individual hackers to deface adversaries’ websites, as Ukraine did after Russia’s 2022 invasion.79 Similarly, Hamas seeks to inspire hackers from around the Middle East to “resist” Israel, resulting in the defacement of websites belonging to the Tel Aviv Stock Exchange and Israel’s national airline El Al by Arab hackers.80

In tandem with its embrace of patriotic hackers, Hamas seeks to multiply its propaganda efforts by enlisting the help of Palestinians on the street for less technical operations. To some extent, Hamas uses social media in similar ways to other terrorist organizations to inspire violence, urging Palestinians to attack Jews in Israel and the West Bank, for instance.81 However, the group goes a step further, encouraging Palestinians in Gaza to contribute to its efforts by providing guidelines for social media posting. The instructions, provided by Hamas’s Interior Ministry, detail how Palestinians should post about the conflict and discuss it with outsiders, including preferred terminology and practices such as, “Anyone killed or martyred is to be called a civilian from Gaza or Palestine, before we talk about his status in jihad or his military rank. Don’t forget to always add ‘innocent civilian’ or ‘innocent citizen’ in your description of those killed in Israeli attacks on Gaza.” Other instructions include, “Avoid publishing pictures of rockets fired into Israel from [Gaza] city centers. This [would] provide a pretext for attacking residential areas in the Gaza Strip.”82 Information campaigns like these extend beyond follower indoctrination and leave a tangible mark on international public discourse, as well as structure the course of conflict with Israel.

Hamas’s ability to leverage the cyber domain to shape the information landscape can have serious implications on geopolitics. Given the age and unpopularity of Palestinian President Mahmoud Abbas—polling shows that 80 percent of Palestinians want him to resign—as well as the fragile state of the Palestinian Authority,83 the Palestinian public’s desire for elections, and general uncertainty about the future, Hamas’s information operations can have a particularly potent effect on a discourse that is already contentious. The same can be said, to some extent, for the information environment in Israel, where political instability has resulted in five elections in just three and a half years.84 When executed strategically, information operations can play an influencing, if not deciding, role in electoral outcomes, as demonstrated by Russia’s interference in the 2016 US presidential election.85 A well-timed hack-and-leak operation, like Russia’s breach of the Democratic National Committee’s networks and dissemination of its emails, could majorly influence the momentum of political events in both Israel and Palestine.86 Continued failure to reach a two-state solution in the Israeli–Palestinian conflict will jeopardize Israel’s diplomatic relationships,87 as well as stability in the wider Middle East.88

4. Where do Hamas’s cyber operations go from here?

As outlined in its founding charter, as long as Hamas exists, it will place a premium on influencing audiences—friendly, adversarial, and undecided—and mobilizing them to bend political outcomes toward its ultimate objectives.89 Terrorism has been a central element of the group’s influence agenda, but cyber and information operations offer alternative and complementary options for engagement. It stands to reason that as Hamas’s cyber capabilities steadily evolve and improve, those of similar organizations will do the same.

Further Israeli efforts to curb terrorism through a cocktail of economic programs and advancements in defensive technologies, such as its integrated air defense system, raise questions about how Hamas and similar groups’ incentive structures may change their calculi in light of evolving state countermeasures. There is no Iron Dome in cyberspace. Militant and terrorist organizations are not changing their strategies of integrating cyber and information operations into their repertoires. Instead, they are finding new means of achieving old goals. Important questions for future research include:

  • If states like Iran transfer increasingly advanced kinetic weaponry to terrorist organizations like Hamas, PIJ, Hezbollah, Kata’ib Hezbollah, and the Houthis, to what extent does this assistance extend to offensive cyber capabilities? What will this support look like in the future, and will these groups depend on state support to sustain their cyber operations?
  • What lessons is Hamas drawing from the past year of relative calm with Israel that may influence the cadence and variety of its cyber operations? How might these lessons influence similar organizations around the world?
  • What sorts of operations, such as financially motivated ransomware and cybercrime, has Hamas not engaged in? Will Hamas and comparable organizations learn from and adopt operations that are similar to other variously motivated non-state actors?
  • What restrictions and incentives can the United States and its allies implement to curb the transfer of cyber capabilities to terrorist organizations?

Cyber capabilities are advancing rapidly worldwide and more advanced technologies are increasingly accessible, enabling relatively weak actors to compete with strong actors like never before. Few controls exist to effectively counter this proliferation of offensive cyber capabilities, and the technical and financial barriers for organizations like Hamas to compete in this domain remain low.90 Either by obtaining and deploying highly impactful tools, or by developing relationships with hacking groups in third-party countries to carry out operations, the threat from Hamas’s cyber and information capabilities will grow.

Just like the group’s rocket terror program, which began with crude, short-range, and inaccurate Qassam rockets that the group cobbled together from scratch, Hamas’s cyber program began with rather unsophisticated tools. Over the years, as the group obtained increasingly sophisticated, accurate, and long-range rockets from external benefactors like Iran, so too have Hamas’s cyber capabilities advanced in scale and sophistication.

Conclusion

Remarking on Hamas’s creative cyber campaigns, a lieutenant colonel in the IDF’s Cyber Directorate noted, “I’m not going to say they are not powerful or weak. They are interesting.”91 Observers should not view Hamas’s foray into cyber operations as an indication of a sudden organizational strategic shift. For its entire existence, the group has used terrorism as a means of garnering public attention and affecting the information environment, seizing strategic opportunities to influence the course of political events. As outside pressures change the group’s incentives to engage in provocative kinetic operations, cyber capabilities present alternative options for Hamas to advance its strategy. Hamas’s cyber capabilities will continue to advance, and the group will likely continue to leverage these tools in ways that will wield maximum influence over the information environment. Understanding how Hamas’s strategy and incentive structure guides its decision to leverage offensive cyber operations can provide insights, on a wider scale, about how non-state actors develop and implement cyber tools, and how the United States and its allies may be better able to counter these trends.

About the author

Acknowledgements

The author would like to thank several individuals, without whose support this report would not look the same. First and foremost, thank you to Trey Herr and Emma Schroeder, director and associate director of the Atlantic Council’s Cyber Statecraft Initiative, respectively, for helping from the start of this effort by participating in collaborative brainstorming sessions and providing extensive editorial feedback throughout. The author also owes a debt of gratitude to several individuals for generously offering their time to review various iterations of this document. Thanks to Ambassador Daniel Shapiro, Shanie Reichman, Yulia Shalomov, Stewart Scott, Madison Cullinan, and additional individuals who shall remain anonymous for valuable insights and feedback throughout the development of this report. Additionally, thank you to Valerie Bilgri for editing and Donald Partyka and Anais Gonzalez for designing the final document.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1     Michael Schmitt, “Normative Voids and Asymmetry in Cyberspace,” Just Security, December 29, 2014, https://www.justsecurity.org/18685/normative-voids-asymmetry-cyberspace/.
2     Emma Schroeder et al., Hackers, Hoodies, and Helmets: Technology and the Changing Face of Russian Private Military ContractorsAtlantic Council, July 25, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/technology-change-and-the-changing-face-of-russian-private-military-contractors; Cecile Schilis-Gallego and Nina Lakhani, “It’s a Free For All: How Hi-Tech Spyware Ends Up in the Hands of Mexico’s Cartels,” Guardian (UK), December 7, 2020, https://www.theguardian.com/world/2020/dec/07/mexico-cartels-drugs-spying-corruption.
3     The White House, National Security Strategy, October 2022, https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf.; Emma Schroeder, Stewart Scott, and Trey Herr, Victory Reimagined: Toward a More Cohesive US Cyber StrategyAtlantic Council, June 14, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/victory-reimagined/.
4     Clare Stouffer, “15 Types of Hackers + Hacking Protection Tips for 2022,” Norton, May 2, 2022, https://us.norton.com/internetsecurity-emerging-threats-types-of-hackers.html#Greenhat.
5     Janne Hakala and Jazlyn Melnychuk, “Russia’s Strategy in Cyberspace,” NATO Strategic Communications Centre of Excellence, June 2021, https://stratcomcoe.org/cuploads/pfiles/Nato-Cyber-Report_15-06-2021.pdf.
6     Roy Iarchy and Eyal Rynkowski, “GoldenCup: New Cyber Threat Targeting World Cup Fans,” Broadcom Software, July 5, 2018, https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans.
7     “Spyware,” MalwareBytes, https://www.malwarebytes.com/spyware.
8     Taylor Armerding, “Golden Cup App Was a World Cup of Trouble,” Synopsys, July 12, 2022, https://www.synopsys.com/blogs/software-security/golden-cup-app-world-cup-trouble/.
9     Yaniv Kubovich, “Hamas Cyber Ops Spied on Hundreds of Israeli Soldiers Using Fake World Cup, Dating Apps,” Haaretz, July 3, 2018, https://www.haaretz.com/israel-news/hamas-cyber-ops-spied-on-israeli-soldiers-using-fake-world-cup-app-1.6241773.
11     J.D. Work, Troubled Vision: Understanding Recent Israeli–Iranian Offensive Cyber ExchangesAtlantic Council, July 22, 2020, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/troubled-vision-understanding-israeli-iranian-offensive-cyber-exchanges/.
12     Amos Harel, “How Deep Has Chinese Intelligence Penetrated Israel?” Haaretz, February 25, 2022, https://www.haaretz.com/israel-news/.premium-how-deep-has-chinese-intelligence-penetrated-israel-1.10633942.
13     “Propaganda, Extremism and Online Recruitment Tactics,” Anti-Defamation League, April 4, 2016, https://www.adl.org/education/resources/tools-and-strategies/table-talk/propaganda-extremism-online-recruitment.
14     Office of the Director of National Intelligence, Annual Threat Assessment of the US Intelligence Community, February 7, 2022, https://www.dni.gov/files/ODNI/documents/assessments/ATA-2022-Unclassified-Report.pdf.
15     National Security Archive, “USCYBERCOM After Action Assessments of Operation GLOWING SYMPHONY,” January 21, 2020, https://nsarchive.gwu.edu/briefing-book/cyber-vault/2020-01-21/uscybercom-after-action-assessments-operation-glowing-symphony.
16     The White House, National Strategy for Counterterrorism of the United States of America, October 2018, https://www.dni.gov/files/NCTC/documents/news_documents/NSCT.pdf.
17     “Hamas: The Palestinian Militant Group That Rules Gaza,” BBC, July 1, 2022, https://www.bbc.com/news/world-middle-east-13331522.
18    “The Covenant of the Islamic Resistance Movement,” August 18, 1988, https://avalon.law.yale.edu/20th_century/hamas.asp.
19    Gur Laish, “The Amorites Iniquity – A Comparative Analysis of Israeli and Hamas Strategies in Gaza,” Infinity Journal 2, no. 2 (Spring 2022), https://www.militarystrategymagazine.com/article/the-amorites-iniquity-a-comparative-analysis-of-israeli-and-hamas-strategies-in-gaza/.
20     Khaled Abu Toameh, “PA Popularity Among Palestinians at an All-Time Low,” Jerusalem Post, November 18, 2021, https://www.jpost.com/middle-east/pa-popularity-among-palestinians-at-an-all-time-low-685438.
21     “16 Killed in Suicide Bombings on Buses in Israel: Hamas Claims Responsibility,” CNN, September 1, 2004, http://edition.cnn.com/2004/WORLD/meast/08/31/mideast/.
22     “Hamas Rocket Fire a War Crime, Human Rights Watch Says,” BBC News, August 12, 2021, https://www.bbc.com/news/world-middle-east-58183968.
23     Isabel Kershner, “Hamas Militants Take Credit for Sniper Attack,” New York Times, March 20, 2007, https://www.nytimes.com/2007/03/20/world/middleeast/19cnd-mideast.html.
24     “Hamas Operatives Launch Incendiary Balloons into Israel,” AP News, September 4, 2021, https://apnews.com/article/technology-middle-east-africa-israel-hamas-6538690359c8de18ef78d34139d05535.
25     Mai Abu Hasaneen, “Israel Targets Hamas Leader after Call to Attack Israelis with ‘Cleaver, Ax or Knife,’” Al-Monitor, May 15, 2022, https://www.al-monitor.com/originals/2022/05/israel-targets-hamas-leader-after-call-attack-israelis-cleaver-ax-or-knife.
26     Ralph Ellis and Michael Schwartz, “Mom Speaks Out on 3 Abducted Teens as Israeli PM Blames Hamas,” CNN, June 15, 2014, https://www.cnn.com/2014/06/15/world/meast/west-bank-jewish-teens-missing.
27     The Palestinian National Authority (PA) is the official governmental body of the State of Palestine, exercising administrative and security control over Area A of the Palestinian Territories, and only administrative control over Area B of the Territories. The PA is controlled by Fatah, Hamas’s most significant political rival, and is the legitimate ruler of the Gaza Strip, although Hamas exercises de facto control of the territory.
28     The Palestine Liberation Organization (PLO) is the political organization that is broadly recognized by the international community as the sole legitimate representative of the Palestinian people. The PLO recognizes Israel, setting it apart from Hamas, which is not a member of the organization.
29    Hamas is designated as a foreign terrorist organization by the US State Department and has earned similar designations from dozens of other countries and international bodies, including Australia, Canada, the European Union, the Organization of American States, Israel, Japan, New Zealand, and the United Kingdom. Jotam Confino, “Calls to Assassinate Hamas Leadership as Terror Death Toll Reaches 19,” Jewish Chronicle, May 12, 2022, https://www.thejc.com/news/world/calls-to-assassinate-hamas-leadership-as-terror-death-tolls-reaches-19-19wCeFxlx3w40gFCKQ9xSx; Byron Kaye, “Australia Lists All of Hamas as a Terrorist Group,” Reuters, March 4, 2022, https://www.reuters.com/world/middle-east/australia-lists-all-hamas-terrorist-group-2022-03-04; Public Safety Canada, “Currently Listed Entities,” Government of Canada, https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/lstd-ntts/crrnt-lstd-ntts-en.aspx; “COUNCIL IMPLEMENTING REGULATION (EU) 2020/19 of 13 January 2020 implementing Article 2(3) of Regulation (EC) No 2580/2001 on Specific Restrictive Measures Directed Against Certain Persons and Entities with a View to Combating Terrorism, and Repealing Implementing Regulation (EU) 2019/1337,” Official Journal of the European Union, January 13, 2020, https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L:2020:008I:FULL&from=EN; Organization of American States, “Qualification of Hamas as a Terrorist Organization by the OAS General Secretariat,” May 17, 2021, https://www.oas.org/en/media_center/press_release.asp?sCodigo=E-051/21; Ministry of Foreign Affairs, “Japan’s Foreign Policy in Major Diplomatic Fields,” Japan, 2005, https://www.mofa.go.jp/policy/other/bluebook/2005/ch3-a.pdf; “UK Parliament Approves Designation of Hamas as a Terrorist Group,” Haaretz, November 26, 2021, https://www.haaretz.com/israel-news/.premium-u-k-parliament-approves-designation-of-hamas-as-a-terrorist-group-1.10419344.
30     Nathan R. Stein et al., “The Differential Impact of Terrorism on Two Israeli Communities,” American Journal of Orthopsychiatry, American Psychological Association, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3814032/.
31     Robert A. Pape, “The Strategic Logic of Suicide Terrorism,” The American Political Science Review, August 2003, https://www.jstor.org/stable/3117613?seq=6#metadata_info_tab_contents.
32     “Arabs Celebrate Israeli Withdrawal,” South Florida Sun-Sentinel, October 26, 1995, https://www.sun-sentinel.com/news/fl-xpm-1995-10-26-9510260008-story.html.
33    Brent Sadler, “Suicide Bombings Scar Peres’ Political Ambitions,” CNN, May 28, 1996, http://www.cnn.com/WORLD/9605/28/israel.impact/index.html.
34    Akiva Eldar, “The Power Hamas Holds Over Israel’s Elections,” Al-Monitor, February 11, 2020, https://www.al-monitor.com/originals/2020/02/israel-us-palestinians-hamas-donald-trump-peace-plan.html.
35    Yoram Schweitzer, “The Rise and Fall of Suicide Bombings in the Second Intifada,” The Institute for National Security Studies, October 2010, https://www.inss.org.il/wp-content/uploads/sites/2/systemfiles/(FILE)1289896644.pdf; Beverley Milton-Edwards and Stephen Farrell, Hamas: The Islamic Resistance Movement (Polity Press, 2013), https://www.google.com/books/edition/Hamas/ozLNNbwqlAEC?hl=en&gbpv=1.
36    Ministry of Foreign Affairs, “Rocket Fire from Gaza and Ceasefire Violations after Operation Cast Lead (Jan 2009),” State of Israel, March 16, 2016, https://embassies.gov.il/MFA/FOREIGNPOLICY/Terrorism/Pages/Palestinian_ceasefire_violations_since_end_Operation_Cast_Lead.aspx.
37    “PA: Hamas Rockets Are Bid to Sway Israeli Election,” Associated Press, September 2, 2009, https://web.archive.org/web/20090308033654/http://haaretz.com/hasen/spages/1062761.html.
38     National Consortium for the Study of Terrorism and Responses to Terrorism, “Global Terrorism Database,” University of Maryland, https://www.start.umd.edu/gtd/search/Results.aspx?page=2&casualties_type=&casualties_max=&perpetrator=838&count=100&expanded=yes&charttype=line&chart=overtime&ob=GTDID&od=desc#results-table
39     US Congress, House of Representatives, Subcommittee on the Middle East and North Africa and Subcommittee on Terrorism, Nonproliferation, and Trade, Hamas Benefactors: A Network of Terror, Joint Hearing before the Subcommittee on the Middle East and North Africa and the Subcommittee on Terrorism, Nonproliferation, and Trade of the Committee on Foreign Affairs, 113th Congress, September 9, 2014, https://www.govinfo.gov/content/pkg/CHRG-113hhrg89738/html/CHRG-113hhrg89738.htm.
40     “Hamas Faces Risk, Opportunity from Warming Israel–Turkey Ties,” France 24, March 16, 2022, https://www.france24.com/en/live-news/20220316-hamas-faces-risk-opportunity-from-warming-israel-turkey-ties; Sean Mathews, “Israeli Military Officials Sent to Qatar as US Works to Bolster Security Cooperation,” Middle East Eye, July 8, 2022, https://www.middleeasteye.net/news/qatar-israel-military-officials-dispatched-amid-us-efforts-bolster-security.
41     Nitsana Darshan-Leitner, “Qatar is Financing Palestinian Terror and Trying to Hide It,” Jerusalem Post, February 18, 2022, https://www.jpost.com/opinion/article-696824.
42     Shahar Klaiman, “Qatar Pledges $500M to Rebuild Gaza, Hamas Vows Transparency,” Israel Hayom, May 27, 2021, https://www.israelhayom.com/2021/05/27/qatar-pledges-500m-to-gaza-rebuild-hamas-vows-transparency; Jodi Rudoren, “Qatar Emir Visits Gaza, Pledging $400 Million to Hamas,” New York Times, October 23, 2012, https://www.nytimes.com/2012/10/24/world/middleeast/pledging-400-million-qatari-emir-makes-historic-visit-to-gaza-strip.html.
43     Adam Taylor, “With Strikes Targeting Rockets and Tunnels, the Israeli Tactic of ‘Mowing the Grass’ Returns to Gaza,” May 14, 2021, https://www.washingtonpost.com/world/2021/05/14/israel-gaza-history/.
44     “What Just Happened in Gaza?” Israel Policy Forum, YouTube, https://www.youtube.com/watch?v=XqHjQo0ybvM&t=59s.
45     Michael Koplow, “Proof of Concept for a Better Gaza Policy,” Israel Policy Forum, August 11, 2022, https://israelpolicyforum.org/2022/08/11/proof-of-concept-for-a-better-gaza-policy; Tani Goldstein, “The Number of Workers from Gaza Increased, and the Peace Was Maintained,” Zman Yisrael, April 4, 2022, https://www.zman.co.il/302028/popup/.
46     Aaron Boxerman, “Israel to Allow 2,000 More Palestinian Workers to Enter from Gaza,” Times of Israel, June 16, 2022, https://www.timesofisrael.com/israel-to-allow-2000-more-palestinian-workers-to-enter-from-gaza/.
47     “Operation Breaking Dawn Overview,” Israel Policy Forum, August 8, 2022, https://israelpolicyforum.org/2022/08/08/operation-breaking-dawn-overview/.
48     Aaron Boxerman, “Hamas’s Sinwar Threatens a ‘Regional, Religious War’ if Al-Aqsa is Again ‘Violated,’” Times of Israel, April 30, 2022, https://www.timesofisrael.com/sinwar-warns-israel-hamas-wont-hesitate-to-take-any-steps-if-al-aqsa-is-violated/.
49     Safa Shahwan Edwards and Simon Handler, “The 5×5—How Retaliation Shapes Cyber Conflict,” Atlantic Council, https://www.atlanticcouncil.org/commentary/the-5×5-how-retaliation-shapes-cyber-conflict/.
50     Andrew Phillips, “The Asymmetric Nature of Cyber Warfare,” USNI News, October 14, 2012, https://news.usni.org/2012/10/14/asymmetric-nature-cyber-warfare.
51    “Gaza: ICRC Survey Shows Heavy Toll of Chronic Power Shortages on Exhausted Families,” International Committee of the Red Cross, July 29, 2021, https://www.icrcnewsroom.org/story/en/1961/gaza-icrc-survey-shows-heavy-toll-of-chronic-power-shortages-on-exhausted-families.
52    Daniel Avis and Fadwa Hodali, “World Bank to Israel: Let Palestinians Upgrade Mobile Network,” Bloomberg, February 8, 2022, https://www.bloomberg.com/news/articles/2022-02-08/world-bank-to-israel-let-palestinians-upgrade-mobile-network.
53    Israel Defense Forces (@IDF), “CLEARED FOR RELEASE: We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed,” Twitter, May 5, 2019, https://twitter.com/IDF/status/1125066395010699264.
54    Zak Doffman, “Israel Responds to Cyber Attack with Air Strike on Cyber Attackers in World First,” Forbes, May 6, 2019, https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-military-strikes-and-destroys-hamas-cyber-hq-in-world-first/?sh=654fbba9afb5.
55    “Turkey Said to Grant Citizenship to Hamas Brass Planning Attacks from Istanbul,” Times of Israel, August 16, 2020, https://www.timesofisrael.com/turkey-said-to-grant-citizenship-to-hamas-brass-planning-attacks-from-istanbul/.
56    Anshel Pfeffer, “Hamas Uses Secret Cyberwar Base in Turkey to Target Enemies,” Times (UK), October 22, 2020, https://www.thetimes.co.uk/article/hamas-running-secret-cyberwar-hq-in-turkey-29mz50sxs.
57    David Shamah, “Qatari Tech Helps Hamas in Tunnels, Rockets: Expert,” Times of Israel, July 31, 2014, https://www.timesofisrael.com/qatari-tech-helps-hamas-in-tunnels-rockets-expert; Dion Nissenbaum, Sune Engel Rasmussen, and Benoit Faucon, “With Iranian Help, Hamas Builds ‘Made in Gaza’ Rockets and Drones to Target Israel,” Wall Street Journal, May 20, 2021, https://www.wsj.com/articles/with-iranian-help-hamas-builds-made-in-gaza-rockets-and-drones-to-target-israel-11621535346.
58     “Internal Security Force (ISF) – Hamas,” Mapping Palestinian Politics, European Council on Foreign Relations, https://ecfr.eu/special/mapping_palestinian_politics/internal_security_force/.
59     “Operation Arid Viper: Bypassing the Iron Dome,” Trend Micro, February 16, 2015, https://www.trendmicro.com/vinfo/es/security/news/cyber-attacks/operation-arid-viper-bypassing-the-iron-dome; “Sexually Explicit Material Used as Lures in Recent Cyber Attacks,” Trend Micro, February 18, 2015, https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/sexually-explicit-material-used-as-lures-in-cyber-attacks?linkId=12425812.
60     “Operation Arid Viper Slithers Back into View,” Proofpoint, September 18, 2015, https://www.proofpoint.com/us/threat-insight/post/Operation-Arid-Viper-Slithers-Back-Into-View.
61     “Hamas Uses Fake Facebook Profiles to Target Israeli Soldiers,” Israel Defense Forces, February 2, 2017, https://www.idf.il/en/minisites/hamas/hamas-uses-fake-facebook-profiles-to-target-israeli-soldiers/.
62     Yossi Melman, “Hamas Attempted to Plant Spyware in ‘Red Alert’ Rocket Siren App,” Jerusalem Post, August 14, 2018, https://www.jpost.com/arab-israeli-conflict/hamas-attempted-to-plant-spyware-in-red-alert-rocket-siren-app-564789.
63     “Hamas Android Malware on IDF Soldiers—This is How it Happened,” Checkpoint, February 16, 2020, https://research.checkpoint.com/2020/hamas-android-malware-on-idf-soldiers-this-is-how-it-happened/.
64     Yaniv Kubovich, “Hamas Cyber Ops Spied on Hundreds of Israeli Soldiers Using Fake World Cup, Dating Apps,” Haaretz, July 3, 2018, https://www.haaretz.com/israel-news/hamas-cyber-ops-spied-on-israeli-soldiers-using-fake-world-cup-app-1.6241773; Ben Caspit, “Gilad Shalit’s Capture, in His Own Words,” Jerusalem Post, March 30, 2013, https://www.jpost.com/features/in-thespotlight/gilad-schalits-capture-in-his-own-words-part-ii-308198.
65     Omer Benjakob, “Exposed Hamas Espionage Campaign Against Israelis Shows ‘New Levels of Sophistication,’” Haaretz, April 7, 2022, https://www.haaretz.com/israel-news/tech-news/2022-04-07/ty-article/.premium/exposed-hamas-espionage-campaign-shows-new-levels-of-sophistication/00000180-5b9c-dc66-a392-7fdf14ff0000.
66     Cybereason Nocturnus, “Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials,” Cybereason, April 6, 2022, https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targeting-israeli-officials?hs_amp=true.
67     Cybereason Nocturnus, “New Malware Arsenal Abusing Cloud Platforms in Middle East Espionage Campaign,” Cybereason, December 9, 2020, https://www.cybereason.com/blog/new-malware-arsenal-abusing-cloud-platforms-in-middle-east-espionage-campaign.
68     Sean Lyngaas, “Hackers Leverage Facebook, Dropbox to Spy on Egypt, Palestinians,” December 9, 2020, CyberScoop, https://www.cyberscoop.com/molerats-cybereason-gaza-espionage-palestine/.
69     Adnan Abu Amer, “Hamas Holds Internal Elections Ahead of Palestinian General Elections,” Al-Monitor, February 26, 2021, https://www.al-monitor.com/originals/2021/02/hamas-internal-elections-gaza-west-bank-palestinian.html.
71     “Hamas Kills 22 Suspected ‘Collaborators,’” Times of Israel, August 22, 2014, https://www.timesofisrael.com/hamas-said-to-kill-11-suspected-collaborators; “Hamas Executes Three ‘Israel Collaborators’ in Gaza,” BBC, April 6, 2017, https://www.bbc.com/news/world-middle-east-39513190.
72     James Shires, “Hack-and-Leak Operations and US Cyber Policy,” War on the Rocks, August 14, 2020, https://warontherocks.com/2020/08/the-simulation-of-scandal/.
73     Ben Tufft, “Hamas Claims it Hacked IDF Computers to Leak Sensitive Details of Previous Operations,” Independent, December 14, 2014, https://www.independent.co.uk/news/world/middle-east/hamas-claims-it-hacked-idf-computers-to-leak-sensitive-details-of-previous-operations-9923742.html.
74     Tova Dvorin, “Hamas: ‘We Hacked into IDF Computers,’” Israel National News, December 14, 2014, https://www.israelnationalnews.com/news/188618#.VI2CKiusV8E
75     Ari Yashar, “IDF Kills Hamas Terrorists Who Breached Border,” Israel National News, July 8, 2014, https://www.israelnationalnews.com/news/182666; Gil Ronen and Tova Dvorin, “Terrorists Tunnel into Israel: Two Soldiers Killed,” Israel National News, July 19, 2014, https://www.israelnationalnews.com/news/183076.
76     “Website Defacement Attack,” Imperva, https://www.imperva.com/learn/application-security/website-defacement-attack/.
77     Omer Dostri, “Hamas Cyber Activity Against Israel,” The Jerusalem Institute for Strategy and Security, October 15, 2018, https://jiss.org.il/en/dostri-hamas-cyber-activity-against-israel/.
78     WAQAS, “Israel’s Channel 10 TV Station Hacked by Hamas,” Hackread, July 16, 2014, https://www.hackread.com/hamas-hacks-israels-channel-10-tv-station/.
79     Joseph Marks, “Ukraine is Turning to Hacktivists for Help,” Washington Post, March 1, 2022, https://www.washingtonpost.com/politics/2022/03/01/ukraine-is-turning-hacktivists-help/.
80     “Israeli Websites Offline of ‘Maintenance’ as Hamas Praises Hackers,” The National, January 15, 2012, https://www.thenationalnews.com/world/mena/israeli-websites-offline-of-maintenance-as-hamas-praises-hackers-1.406178.
81     Dov Lieber and Adam Rasgon, “Hamas Media Campaign Urges Attacks on Jews by Palestinians in Israel and West Bank,” Wall Street Journal, May 2, 2022, https://www.wsj.com/articles/hamas-media-campaign-urges-attacks-on-jews-by-palestinians-in-israel-and-west-bank-11651511641.
82     “Hamas Interior Ministry to Social Media Activists: Always Call the Dead ‘Innocent Civilians’; Don’t Post Photos of Rockets Being Fired from Civilian Population Centers,” Middle East Media Research Institute, July 17, 2014, https://www.memri.org/reports/hamas-interior-ministry-social-media-activists-always-call-dead-innocent-civilians-dont-post#_edn1.
83     Joseph Krauss, “Poll Finds 80% of Palestinians Want Abbas to Resign,” AP News, September 21, 2021, https://apnews.com/article/middle-east-jerusalem-israel-mahmoud-abbas-hamas-5a716da863a603ab5f117548ea85379d.
84     Patrick Kingsley and Isabel Kershner, “Israel’s Government Collapses, Setting Up 5th Election in 3 Years,” New York Times, June 20, 2022, https://www.nytimes.com/2022/06/20/world/middleeast/israel-election-government-collapse.html.
85     Patrick Howell O’Neill, “Why Security Experts Are Braced for the Next Election Hack-and-Leak,” MIT Technology Review, September 29, 2020, https://www.technologyreview.com/2020/09/29/1009101/why-security-experts-are-braced-for-the-next-election-hack-and-leak/.
86     Eric Lipton, David E. Sanger, and Scott Shane, “The Perfect Weapon: How Russian Cyberpower Invaded the US,” New York Times, December 13, 2016, https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html.
87     Ben Samuels, “No Normalization with Israel Until Two-State Solution Reached, Saudi FM Says,” Haaretz, July 16, 2022, https://www.haaretz.com/middle-east-news/2022-07-16/ty-article/.premium/no-normalization-with-israel-until-two-state-solution-reached-saudi-fm-says/00000182-0614-d213-adda-17bd7b2d0000.
88     Ibrahim Fraihat, “Palestine: Still Key to Stability in the Middle East,” Brookings Institution, January 28, 2016, https://www.brookings.edu/opinions/palestine-still-key-to-stability-in-the-middle-east/.
89     Israel Foreign Ministry, “The Charter of Allah: The Platform of the Islamic Resistance Movement (Hamas),” Information Division, https://irp.fas.org/world/para/docs/880818.htm.
90     “The Proliferation of Offensive Cyber Capabilities,” Cyber Statecraft Initiative, Digital Forensic Research Lab, Atlantic Council, https://www.atlanticcouncil.org/programs/digital-forensic-research-lab/cyber-statecraft-initiative/the-proliferation-of-offensive-cyber-capabilities/.
91     Neri Zilber, “Inside the Cyber Honey Traps of Hamas,” The Daily Beast, March 1, 2020, https://www.thedailybeast.com/inside-the-cyber-honey-traps-of-hamas.

The post The cyber strategy and operations of Hamas: Green flags and green hats appeared first on Atlantic Council.

]]>
Digital sovereignty in practice: The EU’s push to shape the new global economy https://www.atlanticcouncil.org/in-depth-research-reports/report/digital-sovereignty-in-practice-the-eus-push-to-shape-the-new-global-economy/ Wed, 02 Nov 2022 18:00:00 +0000 https://www.atlanticcouncil.org/?p=580405 What does the European Union's push for "digital sovereignty" mean in practice? Frances Burwell and Ken Propp provide an update to digital sovereignty and its transatlantic impacts.

The post Digital sovereignty in practice: The EU’s push to shape the new global economy appeared first on Atlantic Council.

]]>

As the digital landscape grows, the European Union (EU) is advancing its efforts to expand its indigenous technological capacities and establish global governance norms. This effort has significant implications for the economic and political underpinnings of the US-EU relationship.

Under the leadership of European Commission President Ursula von der Leyen, the idea of “digital sovereignty” has become a central—albeit nebulous and controversial—guiding principle for Europe’s engagement on digital and tech affairs.

Three years after von der Leyen first spoke of digital sovereignty, this Europe Center report explores what the concept has meant in practice, building on its 2020 report “The European Union and the search for digital sovereignty: Building “Fortress Europe” or preparing for a new world?”. The report identifies three common elements to digital sovereignty:

  • a greater commitment to supporting technology development within the EU;
  • an effort to elaborate global norms to govern data and the digital environment; and
  • greater restrictions on non-EU actors in the EU market.

This direction has outsized implications for the transatlantic relationship. By concentrating on digitizing the European economy and investing in technology capabilities, the EU hopes to make up for current shortfalls and to compete more robustly with digital powerhouses based in the United States and China. In areas such as artificial intelligence—where global norms and standards have yet to emerge—the EU sees its own regulatory efforts as a potential international “gold standard”, like the role that the General Data Protection Regulation has played across the globe.

These measures are not without controversy. For example, the Digital Markets Act, which imposes restrictions on the largest platform companies operating in Europe, is anticipated to affect US firms predominantly, and current proposals for a cybersecurity certification of cloud service providers would limit ownership by non-EU companies. These moves have led to tensions in the US-EU economic relationship—at a time where transatlantic unity is critical in an increasingly geopolitical world.  

What is the future of EU digital sovereignty? The European Union will continue to insist that European technology and innovation respect its own concepts of fundamental rights. The report also sees opportunities for democracies to build coalitions to fight growing authoritarian challenges to the liberal order. The global digital realm remains unwieldy and difficult to govern. Yet through creative and determined collaboration in the US-EU Trade and Technology Council, among other fora, policymakers on both sides of the Atlantic can begin to craft a common democratic approach to digital governance, benefiting an open global economy.

The post Digital sovereignty in practice: The EU’s push to shape the new global economy appeared first on Atlantic Council.

]]>
Should Ukraine pursue closer ties with Taiwan? https://www.atlanticcouncil.org/blogs/ukrainealert/should-ukraine-pursue-closer-ties-with-taiwan/ Tue, 01 Nov 2022 23:49:02 +0000 https://www.atlanticcouncil.org/?p=581631 In recent years China has emerged as Ukraine's leading trade partner but the war unleashed by Vladimir Putin has created a geopolitical climate where closer Taiwan-Ukraine ties may make sense, writes Michael Druckman.

The post Should Ukraine pursue closer ties with Taiwan? appeared first on Atlantic Council.

]]>
The unintended consequences of Vladimir Putin’s disastrous war in Ukraine will be studied for years to come, with ongoing geopolitical repercussions already evident from North America to East Asia. Russia’s rapidly unraveling invasion has served as a warning to Putin’s ally, Chinese leader Xi Jinping, as he mulls a possible attempt to retake Taiwan.

Meanwhile, Taiwan is pursuing an ambitious global charm offensive to shore up its international relationships, including efforts to enhance bilateral ties with Ukraine. The Ukrainian government now has an opportunity to broaden and deepen the strategic relationship between these two embattled democracies.

Prior to Russia’s February 2022 offensive, Taiwan had almost zero visibility inside Ukraine. Its trade office presence in Kyiv was both intentionally minimized by Taipei and largely ignored by the Ukrainian authorities, who remained cautious about antagonizing China while welcoming strong Chinese trade links as a counterweight to Russia. Indeed, in the years prior to Putin’s full-scale invasion, China had emerged as Ukraine’s largest trade partner and a key market for Ukrainian exports.

The events of the past eight months have transformed the geopolitical climate, with Russia’s invasion also altering the dynamics of bilateral ties between Taipei and Kyiv. Given Xi Jinping’s open support for the Kremlin, the prospect of Ukraine resuming its earlier relationship with China is increasingly impractical, making the possibility of stronger economic and diplomatic ties with Taiwan potentially more attractive.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Taiwan is currently playing a quiet but steady role in Ukraine, including support for rebuilding civilian infrastructure in cities like Kharkiv. Ukraine’s parliament has responded to these overtures with steps of its own to enhance ties with Taiwan, including a newly-formed multi-party group within parliament to promote “closer friendship, trade, and cultural ties.” The Ukrainian government could soon look to extend cooperation into practical areas where both countries can trade best practices and complement each other’s experience of resisting authoritarian aggression.

Closer ties with Taiwan could potentially bolster Ukraine’s efforts to pursue a competitive and diverse market for its goods, a requirement of the country’s association agreement with the EU. The European Parliament has been vocal in its support for enhanced economic relations between Ukraine and Taiwan. Advancements in this area would not only offer Ukraine economic benefits, but could also smooth the path toward further EU integration.

The e-governance and information space offers obvious opportunities for closer cooperation. Ukraine’s ability to maintain the functions of government at all levels since the full-scale Russian invasion began on February 24 is an area worthy of greater international study, particularly in terms of how Ukraine’s decentralized approach to local government has empowered city officials to be proactive in communications, planning, and coordination with citizens. The country’s postal service, tax revenue collection, online banking payments, and e-government services on Ukraine’s Diya app have all functioned smoothly despite the enormous challenges posed by Russia’s invasion.

The Ukrainian government’s masterly use of social media and other communications channels to not only convey important information and build morale inside Ukraine but also effectively communicate to the international community is of enormous interest to Taiwan. Plans are already being developed by Ukraine’s Ministry of Digital Transformation to send a delegation of Ukrainian MPs to Taipei later this year. Similar initiatives would likely be welcomed and met with considerable interest.

Meetings between Ukrainian and Taiwanese representatives within the framework of larger EU gatherings to discuss the lessons already learned from Ukraine’s wartime experience would be beneficial for European and Taiwanese partners. Such gatherings would also provide an EU backdrop that could help Ukraine assess the challenges that European states and their municipalities currently face from Chinese influence.

Taiwan’s readiness to assist Ukrainian cities in addressing the damage wrought by Russia’s war and Taipei’s direct outreach to Ukrainian mayors during summer 2022 are strong arguments for a seat at the table in designing a post-war support package for Ukraine. Taiwanese involvement in reconstruction planning and the strategic rebuilding of Ukrainian cities could bring greater innovation and lead to expanded trade opportunities.

Ukraine could additionally benefit from Taiwan’s technological know-how, investment, innovation, and access to new markets in Asia. At the same time, strengthening public and diplomatic relations would potentially help both countries in their shared strategic goal of resisting authoritarian aggression.

As Ukraine moves closer to what would be an historic victory over Russia, the country will face a whole range of fresh challenges such as maintaining international interest in the post-war reconstruction process. There will also be new opportunities for Ukraine to assume an enhanced role among the world’s democracies. A fully-fledged partnership with Taiwan could deliver a range of important benefits to Ukraine as it begins this next chapter.

Michael Druckman is resident program director for Ukraine at the International Republican Institute.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Should Ukraine pursue closer ties with Taiwan? appeared first on Atlantic Council.

]]>
Russian War Report: Heavy fighting expected in Kherson as Prigozhin aims to boost Wagner operations https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-heavy-fighting-expected-in-kherson-as-prigozhin-aims-to-boost-wagner-operations/ Fri, 28 Oct 2022 18:15:00 +0000 https://www.atlanticcouncil.org/?p=580580 As Russian forces move ammunition and equipment toward Kherson, heavy fighting is expected in the city as Ukrainian forces fight to liberate the region.

The post Russian War Report: Heavy fighting expected in Kherson as Prigozhin aims to boost Wagner operations appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Heavy fighting expected in Kherson, Prigozhin aims to boost Wagner operations

Tracking narratives

Russia again accuses Ukraine of plotting to use a “dirty bomb”

Facebook ads spread pro-Russian narratives

Polish Senate declares Russia a terrorist regime

Heavy fighting expected in Kherson, Prigozhin aims to boost Wagner operations

Ukraine’s Southern Operational Command stated on October 21 that Russian forces are actively transferring ammunition, military equipment, and units from the Dnipro River’s west bank to the east bank. Russian forces are likely not fully withdrawing from the upper Kherson region but preparing to defend the city. Humanitarian facilities in Kherson have also reportedly ceased operations. 

Russia continues to use missiles and drones against critical infrastructure in Ukraine. The Ukrainian Armed Forces reported that on October 23 Russia conducted at least two missile strikes and twenty-five airstrikes. Ukrainian forces also said they shot down twelve Iranian-made Shahed-136 drones. Civilian infrastructure in Mykolaiv, Zaporizhzhia, and Novotavrycheske were among the targeted areas.  

Meanwhile, Russian bloggers reported that Yevgeny Prigozhin, the main financier of the Wagner Group, is sponsoring the formation of a volunteer battalion, with recruitment led by former Russian officer Igor Girkin. Girkin is a critic of the Russian military command and a prominent figure among the Russian nationalists who participated in the annexation of Crimea in 2014. The Russian army is depending more heavily on Wagner fighters to gain territory in Bakhmut, which Russia has been trying to seize for months. Additionally, according to Russian sources, Wagner is recruiting crews for Pantsir-S1 and S-300 missile systems, Man-portable air-defense systems (MANPADS), electronic warfare, Su-25 aircraft, and other equipment. While Wagner fighters utilize the infrastructure of the Russian military, the group’s equipment and operations are funded separately. It appears that Wagner’s command wants to strengthen the unit’s independence on the battlefield. 

There is also an increasing possibility of ethnic conflicts among soldiers as racial discrimination emerges among Russian military ranks. Footage released on October 24 showed a Russian officer beating a Muslim soldier allegedly for attempting to pray. Russian commentators have denied the authenticity of the clip. However, this is not an isolated case, as two Tajikistan nationals are suspected of being behind a deadly shooting at a training ground in Russia’s Belgorod region on October 15.  

In addition, General Oleksiy Gromov, a senior Ukrainian military official, said on October 27 that Belarus is preparing for an escalation. As evidence, he said that Russian officers are now checking the degree of combat readiness of Belarusian military units and that “secret transfers of personnel, equipment and military maneuvers continue in the country.” 

Gromov’s claims have not been independently verified.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russia again accuses Ukraine of plotting to use a “dirty bomb”

Russian President Vladimir Putin claimed on October 27 that Ukraine is plotting to use a “dirty bomb,” reigniting a narrative that has spread through pro-Kremlin sources since the early days of the war. Russian state media outlets amplified the latest iteration of the claim.   

In remarks delivered to the Kremlin-associated Valdai Discussion Club, Putin acknowledged that Russian intelligence services intentionally published information about Ukraine’s “dirty bomb.” He said that Kyiv authorities “are doing everything to cover up the traces of the preparation.” Putin also stated that he “instructed [Russian Defense Minister] Shoigu to call all of his colleagues and inform them.” Shoigu indeed called his Western counterparts on October 23 to warn that Ukraine was planning to use a “dirty bomb.”  

Along with Putin, Russian Foreign Ministry spokesperson Maria Zakharova claimed that Ukraine’s goal “is to blame Russia for using weapons of mass destruction,” while simultaneously planning to use WMDs against Russia.  

On October 26, the Kremlin-owned outlet RIA published an article, based on an anonymous source, that claimed Kyiv had “already completed the technical preparations for the dirty bomb provocation.” The article stated that Ukraine’s state-owned rocket manufacturer “prepared a mockup of a rocket, which is planned to be filled with radioactive material, then supposedly to shoot it down over the exclusion zone of the Chernobyl nuclear power plant and announce the launch of a nuclear charge by the Russian armed forces.” 

On October 24, Igor Kirillov, chief of the radiation, chemical and biological defense forces of the Russian army, claimed that “Kyiv possesses the scientific base for creating a dirty bomb.” According to Kirillov’s comments, the “dirty bomb” can be prepared at the research base research base of the Kharkiv Institute of Physics and Technology. He added that this institute participated in the nuclear program of the Soviet Union. 

Along with these statements from Russian officials, Kremlin-owned and pro-Kremlin media outlets have amplified the accusation. While some outlets explained the mechanics and usage of dirty bombs, others claimed that the United Nations Security Council has already stopped Ukraine from deploying a “dirty bomb.” 

The DFRLab has previously reported on Russia’s attempts to propagate the narrative that Ukraine plans to utilize “dirty bombs.”

Eto Buziashvili, Research Associate, Tbilisi, Georgia

Facebook ads spread pro-Russian narratives

This week, the DFRLab observed multiple Facebook ads spreading pro-Russian narratives that criticized Ukrainian anti-air defense systems, claimed that Ukraine is under external control, called for the removal of Ukrainian President Volodymyr Zelenskyy, and discredited the Ukrainian government. User comments responding the ads expressed anger towards their content, with some accounts saying they were reporting the ads. The narratives are another example of how ad platforms can be exploited in influence operations. The DFRLab has previously reported on how Facebook ads are used to spread disinformation.

A composite image of three pro-Kremlin and anti-Ukraine ads (Source: Jsc Performance, left; Rulleonto, top right; For You 2, bottom right)
A composite image of three pro-Kremlin and anti-Ukraine ads (Source: Jsc Performance, left; Rulleonto, top right; For You 2, bottom right) 

The DFRLab identified at least four different pages that amplified disinformation through Facebook ads. The pages have abstract names and profile pictures. They published and advertised a single post in Russian featuring poorly made caricatures, usually stolen from Russian or Belarusian sources. The pages have only a few followers but are not newly created, with some dating prior to the Russian invasion of Ukraine on February 24. 

A composite image of two Facebook posts (top left and right) and the source images, one from the Russian state-owned outlet Minskaya Pravda (bottom left), and another from the pro-Kremlin outlet Regnum (top right). (Sources: Ruliop, top left; Rulleonto/archive top right; Minskaya Pravda, bottom left; Regnum, bottom right)
A composite image of two Facebook posts (top left and right) and the source images, one from the Russian state-owned outlet Minskaya Pravda (bottom left), and another from the pro-Kremlin outlet Regnum (top right). (Sources: Ruliop, top left; Rulleonto/archive top right; Minskaya Pravda, bottom left; Regnum, bottom right) 

As all of the ads and pages were removed at the time of publication. As all of the ads and pages had been removed at the time of writing, the DFRLab could not establish its precise reach, but one ad in the library received between 200,000 and 250,000 impressions. Other ads received between 800 and 1,000 engagements.

The Facebook ads and pages appear to be linked to a network based in Russia identified by the DFRLab and other outlets earlier this fall. According to a spokesperson for Facebook’s parent company, Meta: “We detected and removed these ads and the associated Pages. We’ve also blocked hundreds of domains as part of our ongoing work to prevent the networks we took down from reconstituting on our platform. As we said last month, this operation is persistent in trying to set up new domains spoofing news organizations and drive people across social media to these websites. The majority of this operation’s accounts, Pages and ads on our platforms were detected and removed by our automated systems. We keep updating our threat report, including the list of spoofed domains, to help inform open-source research by security researchers and our industry peers.”

Roman Osadchuk, Research Associate

Polish Senate declares Russia a terrorist regime 

On October 26, the Polish Senate passed a resolution declaring Russia a terrorist regime. Eighty-five senators voted in favor of the resolution while fifteen others abstained. The resolution states that Russian armed forces “unleashed a brutal war with Ukraine” and that the purpose of the conflict is to “wipe out a sovereign country from the map and destroy the Ukrainian nation.” The Senate condemned Russian aggression and called “all countries in favor of peace, democracy and human rights to recognize the authorities of the Russian Federation as a terrorist regime.” The Senate also praised all institutions and organizations that undertake research and document war crimes committed against Ukraine.  

On October 27, Senate Marshal Tomasz Grodzki announced that a “strong” cyberattack on Senate servers was underway and added that he did not know if the attack was related with the adoption of the resolution on Russia or whether it was a coincidence.  

On October 18, the Parliament of Estonia also adopted a resolution declaring Russia a terrorist state, following Lithuania and Latvia, who have also designated Russia as a terrorist state. On October 13, the parliamentary assembly of the Council of Europe  also passed a resolution declaring Russia a terrorist regime.

Givi Gigitashvili, Research Associate, Warsaw, Poland

The post Russian War Report: Heavy fighting expected in Kherson as Prigozhin aims to boost Wagner operations appeared first on Atlantic Council.

]]>
The 5×5—Non-state armed groups in cyber conflict https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-non-state-armed-groups-in-cyber-conflict/ Wed, 26 Oct 2022 04:01:00 +0000 https://www.atlanticcouncil.org/?p=579094 Five experts from various backgrounds assess the emerging threats posed by non-state armed groups in cyber conflict.

The post The 5×5—Non-state armed groups in cyber conflict appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

Non-state organizations native to cyberspace, like patriotic hacking collectives and ransomware groups, continue to impact geopolitics through cyber operations. But, increasingly, non-state armed groups with histories rooted entirely in kinetic violence are adopting offensive cyber capabilities to further their strategic objectives. Each of these groups has its own motivations for acquiring these capabilities and its strategy to employ them, making developing effective countermeasures difficult for the United States and its allies. In Ukraine, the Russian government is increasingly outsourcing military activities to private military companies, such as the Wagner Group, and it may continue to do so for cyber and information operations. In Mexico, drug cartels are purchasing state-of-the-art malware to target journalists and other opponents. Elsewhere, militant and terrorist organizations such as Hezbollah and Boko Haram have employed cyber capabilities to bolster their existing operations and efficacy in violence against various states.

The proliferation of offensive cyber capabilities and low barriers to acquiring and deploying some of these powerful tools suggest that the cyber capacities of non-state armed groups will only continue to grow. We brought together five experts from various backgrounds to assess the emerging cyber threats posed by non-state armed groups and discuss how the United States and its allies can address them.

#1 How significant is the cyber threat posed by non-state armed groups to the United States and its allies? What kinds of entities should they be concerned about?

Sean McFate, nonresident senior fellow, Africa Center, Atlantic Council; professor, Georgetown University’s Walsh School of Foreign Service and the National Defense University:

“Currently, the most powerful non-state armed groups that use cyber do it on behalf of a state, offering a modicum of plausible deniability. For example, The Concord Group in Russia is owned by Yevgeny Prigozhin, an oligarch close to Putin. Under the Concord Group is the Wagner Group (mercenaries) and the Internet Research Agency, also known as “the troll farm.” Outsourcing these capabilities lowers the barrier of entry into modern conflicts and allows the Kremlin to purse riskier stratagems.”

Steph Shample, non-resident scholar, Cyber Program, Middle East Institute; senior analyst, Team Cymru:

“The cyber threat posed by independent actors or criminal groups—not advanced persistent threats (APT)—is high, and the first impact is primarily financial. Ransomware flourishes among non-state groups, and can makes these actors, at times, millions of dollars. Consider the SamSam ransomware operations, carried out by Iranian nationals. According to the publicized indictments, the two actors were not found to have ties to the Iranian government, but they took in $6 million in profit—and that is just what was traceable. The second impact is reputational damage for businesses. Once they are impacted by a cyber incident, building the trust of users back is often more difficult than recouping financial loss. Entities to worry about include fields and industries that do not have robust cyber protection or excessive funds, as malicious actors often go after them. These industries include academia, healthcare, and smaller government entities like cities and municipalities.”

Aaron Brantly, associate professor of political science and director, Tech4Humanity lab, Virginia Tech:

“Non-state armed groups do not pose a significant cyber threat at present to the United States and its allies. There are very few examples of non-state actors not affiliated or acting as proxies for states that have the capacity to develop and utilize vulnerabilities to achieve substantial effect. The threat posed by these groups increases when they act as proxies and leverage state capacity and motivation. It is conceivable that non-state armed groups may use cyberattacks to engage in criminal attacks to achieve financial benefits to fund kinetic activities. Yet, developing the capacity to carry out armed attacks and cyberattacks often require members with different skillsets.”

Maggie Smith, research scientist and assistant professor, Army Cyber Institute, United States Military Academy:

The views expressed are those of the author, and do not reflect the official position of the Army Cyber Institute, United States Military Academy, Department of the Army, or Department of Defense.

“I find the most confounding factor of non-state groups to be their motivations for attacking particular targets. Motivations can be financial, ideological, religious, grievance-based, or entities could be targeted for fun—the options are endless and they are not static. Therefore, our traditional intelligence and the indicators and warnings that typically tip and cue us to threats, may not be there. This makes defending against non-state actors that much more unpredictable, confusing, and challenging than defending against states.”

Jon Lindsay, associate professor, School of Cybersecurity and Privacy, Georgia Institute of Technology (Georgia Tech):

“The greatest threat to the United States remains other nuclear-armed states, as well as collective existential threats like climate change and pandemics. Non-state actors are a serious but less severe threat, and cyber is the least severe tool in their kits. Cyber is a minor feature of a minor threat to the United States and its allies.”

#2 How do strategies vary among different types of non-state armed groups and compare with those of states when it comes to cyber capabilities?

Lindsay: “A really interesting feature of the cyber revolution is the democratization of deception. The classic strategies of intelligence—espionage, subversion, disinformation, counterintelligence, and secret diplomacy—that were once practiced mainly by states are now within reach of many actors. The more interesting variation may be in capabilities—states can do more for many reasons—than in strategy. Like it or not, we are all actors, intermediaries, and targets of intelligence.”

McFate: “Outsourcing cyber threats allows states to circumnavigate international and domestic laws. This creates moral hazard in foreign policymaking because it lessens the likelihood of punishment by the international community.”

Brantly: “Whether terrorist organizations or insurgencies, armed groups historically use violence to achieve effects. The strategy of armed groups is to shift the public view of an organization, or issue in such a way as to compel a state actor to respond. Cyber threats do not achieve the same level of visibility that kinetic violence does, and are therefore strategically and tactically less useful to non-state groups. By contrast, state actors seek intelligence and signaling capabilities that control escalation. Because cyberattacks are frequently considered less impactful due to several factors including reversibility, levels of violence, etc., they are a robust tool to enable broader strategic objectives.”

Shample: “There is often overlap. If we again think about APT groups, or those directly sponsored by state governments—the “big four” US adversaries include Iran, China, North Korea, and Russia. All of these countries have mandatory conscription, so all men (and in selective cases, women) have to serve in these countries’ militaries. That mandatory military training can be fulfilled by going through one of their cyber academies and acting as what the United States and Five Eyes community considers a “malicious cyber actor.” Mandatory service is completed eventually, but then these actors can go and act on their own accord, using the training they received to cover their online tracks. State-trained individuals become part of the non-state actor community. They take their learned skills, they share them with other actors on forums and chat platforms, and voila. With training and sophistication, along with a way to evade tracking from their home countries, these individuals continue to improve their skills and networks online, which is a very serious problem. They are sophisticated and able to keep acting in a criminal capacity. The more sophisticated actors can also sell ready-to-use kits, such as Ransomware-as-a-Service, phishing kits, and so on that are premade and do not take high skill to use. The trained malicious actor can not only act independently, but they could have an additional stream of revenue selling kits and supplies to other malicious actors. It is an entire underground ecosystem that I see on closed forums all the time.”

Smith: “One difference is that strategies are more ad hoc or responsive and shift when a non-state group’s motivation for attacking changes. For example, Killnet, the now-infamous pro-Russian hacker group that has been conducting distributed denial-of-service attacks (DDoS) against European nations since March, started off as a DDoS tool that criminal and threat actors could purchase. Just after updating the version of the tool in March, the non-state, but pro-Russian criminals behind Killnet pulled the tool offline and declared that the name was now an umbrella term applied to hacktivism against Russia’s enemies.”

#3 What makes cyber capabilities attractive (or not) to these kinds of non-state groups?

Lindsay: “The obvious answer: cyber tools are low cost and low risk. Cyber becomes an attractive option to actors that lack the means or resolve to use more effective instruments of power. The more that an actor is concerned about adverse consequences like retaliation, punishment, and law enforcement, the more likely they are to use cyber capabilities.”

McFate: “Cyber is important, but not in ways people often think. It gives us new ways of doing old things: sabotage, theft, propaganda, deception, and espionage. Cyber war’s real power is malign information, not sabotage like Stuxnet. In an information age, disinformation is more important than firepower. Who cares about the sword if you can manipulate the mind that wields it?”

Brantly: “Cyber capabilities are less attractive to non-state armed groups because their cost-to-impact ratio is less than kinetic violence. At present, insurgents are unlikely to win by using cyberattacks, and terrorist organizations are unlikely to draw the desired levels of attention to their cause through cyber means that they would by comparable kinetic means. Where attacks disrupt, embarrass an adversary, or facilitate financial concerns of non-state armed groups, such attacks are more likely.”

Shample: “Pseudo-anonymity, of course. They can act from anywhere, target any entity, use obfuscation technology to cover their tracks, and target cryptocurrency to raise money. First, they can cover their tracks completely/partially. Second, they may have enough obscurity to provide plausible cover and not be officially tracked and charged, despite suspicion. Third, they can make a decent amount of money and/or cause damage without any personal harm that comes back to themselves. Fourth, they are able to be impactful and gain notoriety amongst the criminal contingent. The criminal underground is very ego driven, so if an actor can successfully impact a large business or organization, and in so doing make world-wide news, this only helps them gain traction and followers in their community. And they build, keep learning, and repeat, fueled by their financial success and notoriety.”

Smith: “Cyber capabilities are attractive for a lot of reasons—e.g., they can be executed remotely, purchased, obfuscated, difficult to positively attribute, among other attributes that make them easier to execute than a kinetic attack—but if I were a malicious cyber actor, I would be in the business because nation states are still figuring how to respond to cyberattacks. There is not an internationally agreed upon definition for what constitutes a cyberattack, when a cyberattack becomes an act of war, or any concrete estimation for what a proportional response to a cyberattack should be. Additionally, the legal mechanisms for prosecuting cyber activities are still being developed, so as a criminal, the fuzziness and ability to attack an asset within a country without clear consequences is very attractive—especially when law enforcement cyber capabilities are stretched thin and the courts have yet to catch up to technology (or have judges that do not understand the technology used in a case).”

More from the Cyber Statecraft Initiative:

#4 Where does existing theory or policy fall short in addressing the risks posed by the offensive cyber operations of non-state armed groups?

Lindsay: “Generally, we need more theory and empirical research about intelligence contests of any kind. Secret statecraft, and not only by states, is an understudied area in security studies, and it is also a hot research frontier. I do think that the conventional wisdom tends to overstate the threat of cyber from any kind of group, but it is consistent with the paranoid style of American politics.” 

McFate: “How many conferences have you been to where ‘experts’ bicker about whether a cyberattack constitutes war or not? Who cares? US policymakers and academic theorists think about war like pregnancy: you either are or are not. But, in truth, there is no such thing as war or peace; it is really war and peace. Our adversaries do not suffer from this bizarre false dichotomy and exploit our schizoid view of international relations. They wage war but disguise it as peace to us. Cyberattacks are perfect weapons because we spend more time on definitions than on solutions. We need more supple minds at the strategic helm.” 

Brantly: “Many scholars have focused on proxy actors operating in and through cyberspace. The theories and policies developed on the motivations and actions of proxies is robust. This subfield has grown substantially within the last three to four years. Some theorizing has focused on the use of cyber means by terrorist organizations, but most of the research in this area has been speculative. Little theorizing has been done on the use of cyberattacks by non-state armed groups that are not operating as proxies or terrorist organizations. Although there are few examples of such organizations using cyberattacks, increased analysis on this area is potentially warranted.” 

Shample: “The United States and its allies are overly focused on state-sponsored actors. This is because they can issue things like sanctions against state-tied actors, and have press conferences publicizing pomp and circumstance. They ignore the criminal contingent because they usually cannot publicly sanction them. This is short-sighted. The United States needs to combine its intelligence and military efforts to focus on all malicious actors, state-sponsored, criminal groups, and individual/independent actors. Stop worrying about sanctions—malicious APTs often laugh at sanctions from countries without extradition, and the sanctions will quite literally never impact them. They joke about them on underground forums and then continue attacking.” 

Smith: “An area that I am working on is the threats posed by non-state actors during periods of conflict—even ones that we cheer on from afar. The Russian invasion of Ukraine and the subsequent rise of the Ukrainian IT Army and pro-Russian groups like Killnet really complicate the conflict and have shown how organized non-military, non-state-sponsored, and mixed-nationality groups can have a direct impact on the modern battlefield. For entities like US Cyber Command and our foreign counterparts, this is an area of concern, as it is really the modern instantiation of civilians on the battlefield. When do those civilians become enemy combatants and how to we deal with them? Those questions are not answered yet and they are further complicated by the various motivations among groups that I discussed above.”

#5 How can the United States and its allies address the cyber threats posed by the many disparate non-state armed groups around the world?

Lindsay: “We should start by accepting that cyber conflict is both inevitable and tolerable. Cyberattacks are part of the societal search algorithm for identifying vulnerabilities that need to be patched, which helps us to build a better society. The United States and its allies should continue to work on the low-hanging fruit of cybercrime, privacy, and intelligence coordination (which are not really hanging that low), rather than focusing on bigger but more mythical threats. The small stuff will help with the big stuff.” 

McFate: “Three ways. First, better defense. Beyond the ‘ones and zeros’ warriors, we need to find ways to make Americans smarter consumers of information. Second, we need to get far more aggressive in our response. I feel like the United States is a goalie at a penalty shootout. If you want to deter cyberattacks, then start punching back hard until the bullies stop. Destroy problematic servers. Go after the people connected to them. Perhaps the United States should explore getting back into the dark arts again, as it once did during the Cold War. Lastly, enlist the private sector. ‘Hack back’ companies can chase down hackers like privateers. It is crazy in 2022 that we do not allow this, especially since the National Security Agency does not protect multinational corporations or civil society’s cybersecurity.”

Brantly: “The United States and its allies have already addressed cyber threats posed by different groups through the establishment of civilian and military organizations designed to identify and counter all manner of cyber threats. The United States has pushed out security standards through the National Institute of Standards and Technology, and US Cyber Command and the military cyber commands have worked to provide continuous intelligence on the cyber activities of potential adversaries. Continuing to strengthen organizations and standards that identify and counter cybersecurity threats remains important. Building norms around what is and is not acceptable behavior in cyberspace and what are critical cybersecurity practices among public and private sector actors will continue to constrain malicious behavior within this evolving domain of interaction. There is no single golden solution. Rather, addressing cybersecurity threats posed by all manner of actors requires multiple ongoing concurrent policy, regulatory, normative, and organizational actions.”

Shample: “If all entities working cyber operations (law enforcement, intelligence, and military) worked together and with the private sector more, the world would benefit. The private sector can move quicker with respect to changing infrastructure and the quickness of tracking malicious actors. Cyber criminals know they need to set up, act, and then usually tear down their infrastructure, change, and rebuild from scratch so as to avoid tracking. Cyber truly takes all efforts, all kinds of people working it together to be effective. There is too much focus on state-sponsored vs. criminal, and there is too much information not shared among practitioners. Counterterrorism focused analysis needs to be combined with combatting weapons and human trafficking and counter-narcotics, which all then come back to a financial focus. Terrorists like ISIS and others have been observed funding their operations by selling weapons, drugs, or humans, and then putting those funds into cryptocurrency. We have pillars of specialists that focus on one area, but there needs to be more combined efforts vs. singular-focused efforts. Underground forums need to be monitored. Telegram, discord, and dark web forums all need more monitoring. There needs to be a collective effort to combat serious cyber threats, versus dividing efforts and keeping ‘separate’ tracking. Government, military, and law enforcement need to work with the private sector and share the appropriate amount of information to take down criminal networks. There are too many solo efforts vs. a collective one to truly eradicate the malicious cyber criminals.”

Smith: “First, there is no silver bullet because there are so many variables to consider for each threat as it arises—context, composition, etc. are all confounding factors to consider. But I think that international partnerships and domestic partnerships with the private sector and critical infrastructure owners are the key to addressing non-state cyber actors and the threats they pose. The more we communicate and share intelligence and information among partners, the better we will be at anticipating threats and mitigating risk, while also ensuring that we are steadily working to create an ecosystem of support, skills, knowledge, processes and partnerships to combat the multi-modal threats coming from non-state cyber actors.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Non-state armed groups in cyber conflict appeared first on Atlantic Council.

]]>
Ukraine’s growing tech sector offers hope amid wartime economic pain https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-growing-tech-sector-offers-hope-amid-wartime-economic-pain/ Fri, 21 Oct 2022 16:05:15 +0000 https://www.atlanticcouncil.org/?p=578079 Ukraine's tech sector offers a rare glimmer of light amid the economic gloom of Russia's ongoing invasion with Ukrainian IT industry export revenues actually up by 23% during the first six months of 2022.

The post Ukraine’s growing tech sector offers hope amid wartime economic pain appeared first on Atlantic Council.

]]>
The invasion unleashed by Vladimir Putin on February 24 has had a devastating impact on the Ukrainian economy, with the latest World Bank forecast predicting Ukrainian GDP will contract by an eye-watering 35% in 2022. Amid this wartime economic gloom, Ukraine’s tech sector is a rare source of optimism.

According to data from the National Bank of Ukraine, IT industry export revenues actually increased by 23% year-on-year during the first six months of 2022 to reach $3.74 billion. This remarkable performance is part of a far longer growth trend stretching back to the turn of the millennium that has seen the Ukrainian tech sector emerge as an engine of the national economy and an increasingly influential factor shaping the broader development of the country.

Ukraine’s tech potential first began to attract international attention around a decade ago with the emergence of Ukrainian-founded companies such as Grammarly, GitLab, airSlate, and Preply. These success stories sparked speculation over whether Ukraine was set to become the world’s next “unicorn factory.” By 2020, the Ukrainian IT sector accounted for 8.3% of total exports and was a key contributor to Ukrainian GDP.

The rise of the country’s tech sector is driving the digitization of Ukrainian society. In recent years, Ukraine has witnessed a dramatic increase in cashless payments and other FinTech innovations. Following his election in 2019, Ukrainian President Volodymyr Zelenskyy established the Ministry of Digital Transformation to facilitate what Zelenskyy has called the creation of “a state within a smartphone.”

Prior to this year’s Russian invasion, the ministry oversaw the launch of digital options to replace a range of bureaucratic processes and secured legal recognition for digital versions of state-issued documents such as passports and driving licenses. With the tech sector now demonstrating remarkable wartime resilience, many believe this ongoing digitalization holds the key to Ukraine’s future.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

The IT industry has played a crucial role in expanding the Ukrainian middle class thanks to average salaries in the range of $3,000 per month compared to a national average of approximately $500. One continuing IT industry trend is the strong market share of IT outsourcing. At present, pure product development accounts for only 16% of the IT industry in Ukraine.

Efforts to find investors for new projects have long been complicated by security concerns related to Russian aggression. Eveline Buchatskiy, VP of Special Projects at Ukrainian IT company airSlate, recalls a time when investing in the next Ukrainian startup was a competitive affair. Unfortunately, she says, the venture capital investment climate deteriorated following the outbreak of hostilities with Russia in 2014. Today, airSlate focuses heavily on Ukrainian-based product development, with Buchatskiy confident that the appeal of Ukrainian tech creativity still outweighs the obvious threats created by Russia’s ongoing invasion.

DroneUA founder Valerii Iakovenko is a good example of this creativity. Iakovenko is a medical doctor, turned insurance banker, turned tech entrepreneur. Nine years ago, he and his business partner set out to create ecosystems that support the use of tech in the agricultural industry. According to his data, use of DroneUA’s agriculture drones helps farmers increase agricultural yield by 4% for corn and 2% for wheat. At scale, these percentages are significant, especially given Ukraine’s status as one of the world’s leading agricultural producers.

Last year, the DroneUA team set their sights on the task of providing additional reliable energy sources, with Iakovenko’s team working toward a sustainable marketplace for energy production. This is easier said than done. Not only are supply chains problematic, but increased production requires a growing network of installers and maintenance techs. Additionally, self-sufficient energy production systems are cost-prohibitive. Iakovenko sees the electric independence segment of the tech sector as ready for investment, “once we win the war.” In the meantime, he is focusing on his current priority of providing self-supporting power for Starlink systems.

In order to reach its true potential, Ukraine’s tech sector requires a suitable legal framework. Former US Ambassador to Ukraine Steven Pifer highlights the need for increased legislative stability moving forward. This is particularly salient in the IT sector where proprietary data protection is a key element of business success.

In 2020, Ukraine established the Ukrainian Intellectual Property Institute to address these concerns. The same year, Ukraine also launched the National Intellectual Property Authority (NIPA). More recently, the Ukraine IT Association formed an IT Law Committee to address IP protection concerns specifically in the tech space.

These efforts are needed for many reasons, but it is also important to acknowledge the risks they create in the current environment. Establishing extensive legal protections places potential limitations on innovation within the tech sector. This is particularly relevant for businesses that are trying to innovate and adapt rapidly to changing circumstances. Businesses are faced with the choice of holding on to the advantages of IP protections or sharing data to support Ukrainian innovation and accepting the risk therein.

In recent years, there has been significant discussion over how to help the IT sector transition from IT outsourcing to IT service. Recommendations have centered on targeted taxation, sector integration, talent acquisition, and intellectual property protection. Ukraine looked to increase taxes on non-Ukrainian-owned companies in 2022 to promote local innovation. However, increasing taxes on foreign companies willing to accept the risk of operating in Ukraine could further stall progress. Meanwhile, the December 2021 launch of Ukrainian tech hub Diia City aims to offer further taxation incentives. Diia City significantly reduces the tax burden on IT sector businesses and employees. The project looks to create the largest innovation hub in Europe.

Sector integration continues to provide market growth opportunities. The drive for tech solutions is particularly palpable in the Ukrainian agriculture sector. According to Iakovenko, Ukrainian farmers are often young, eager for tech adoption, and unburdened by a bias for traditional practices. Ukrainian farmers are already utilizing satellite data to determine crop fertility and planting schedules. They also lead the world in terms of drone usage in agriculture.

One key problem facing Ukrainian IT companies is finding enough qualified recruits to maintain the tech sector’s robust growth rate. In order to overcome mounting personnel shortages, the sector has previously sought to attract international talent from nearby Poland, Romania, and elsewhere. However, this is currently unrealistic due to the ongoing Russian invasion.

The Ukrainian government can address shortages through scholarships, increased trade school-style education, and an expansion of the Ukrainian IT Creative Fund. These intermediate and long-term solutions make good sense but do not directly address the current situation. With the increase of Ukrainians moving abroad to escape the war, the government could offer tax waivers to Ukrainian workers outside the country continuing to work for Ukrainian companies remotely. While this will not grow the workforce, it will help diminish the talent drain.

The Ukrainian IT industry is moving forward while adapting to the extreme circumstances created by Russia’s invasion. Much still needs to be done in order to maximize the obvious potential of the country’s tech talent, but the mood within the sector remains overwhelmingly optimistic. This optimism is based on the many resourceful and committed people who are driving Ukraine’s digital progress and shaping the country’s future.

Dathan Duplichen is a graduate of the Ford Dorsey Master’s in International Policy program at Stanford University and a European Foreign Area Officer for the United States Department of Defense. Opinions expressed in this article are those of the author and do not represent the United States Department of Defense.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s growing tech sector offers hope amid wartime economic pain appeared first on Atlantic Council.

]]>
Propp in International Association of Privacy Professionals: The redress mechanism in the Privacy Shield successor: On the independence and effective powers of the DPRC https://www.atlanticcouncil.org/insight-impact/in-the-news/propp-in-international-association-of-privacy-professionals-the-redress-mechanism-in-the-privacy-shield-successor-on-the-independence-and-effective-powers-of-the-dprc/ Mon, 17 Oct 2022 12:49:59 +0000 https://www.atlanticcouncil.org/?p=576286 Europe Center nonresident senior fellow Kenneth Propp, with co-authors Peter Swire and Théodore Christakis, reacts to the details of the White House “Executive Order On Enhancing Safeguards For United States Signals Intelligence Activities” to implement changes to safeguard the free flow of data between the European Union and the United States, and the creation of […]

The post Propp in International Association of Privacy Professionals: The redress mechanism in the Privacy Shield successor: On the independence and effective powers of the DPRC appeared first on Atlantic Council.

]]>

Europe Center nonresident senior fellow Kenneth Propp, with co-authors Peter Swire and Théodore Christakis, reacts to the details of the White House “Executive Order On Enhancing Safeguards For United States Signals Intelligence Activities” to implement changes to safeguard the free flow of data between the European Union and the United States, and the creation of a Data Protection Review Court.

The new U.S. regime will only pass muster in the Court of Justice of the European Union if it meets EU legal requirements. In this initial article, we focus on one key set of issues — would the decisions of the new Data Protection Review Court meet the relevant EU legal requirements for independence and effectiveness in deciding upon a complaint for redress by an EU person? We suggest that this could indeed be the case.

Kenneth Propp, Peter Swire, and Théodore Christakis

About the author

The post Propp in International Association of Privacy Professionals: The redress mechanism in the Privacy Shield successor: On the independence and effective powers of the DPRC appeared first on Atlantic Council.

]]>
Russian War Report: Ukraine recaptures territory as Russia uses Iranian drone near Kyiv https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-ukrainian-recaptures-territory-as-russia-uses-iranian-drone-near-kyiv/ Fri, 07 Oct 2022 17:15:57 +0000 https://www.atlanticcouncil.org/?p=574066 Russia has began its use of Iranian-made drones to try and slow the Ukrainian counter-offensive, a mass grave found near Lyman, and Russian Telegram praises the "pro-Russia" coup in Burkina Faso.

The post Russian War Report: Ukraine recaptures territory as Russia uses Iranian drone near Kyiv appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Ukraine recaptures territory as Russia uses Iranian drone near Kyiv

Russian-occupied Georgian region of Abkhazia announces call for military service

Media policy

Russian court fines TikTok for ‘LGBT propaganda,’ Twitch for ‘fakes’

War crimes and human rights abuses

Mass grave uncovered in Lyman as rocket attack hits Zaporizhzha

International response

Russian Telegram channels praise “pro-Russian” coup in Burkina Faso

Ukrainian recaptures territory as Russia uses Iranian drone near Kyiv

The Ukrainian offensive continues to pressure Russian forces in southern and eastern Ukraine. On October 5, Ukrainian forces captured Hrekivka and Makiivka in Luhansk Oblast, approximately twenty kilometers southwest of Svatove. Fighting also continues in Kharkiv Oblast, where the Ukrainian military recently recaptured Hlushkivka. Ukraine’s Southern Operational Command confirmed on October 4 that it had liberated Lyubimivka, Khreshchenivka, Zolta Balka, Bilyaivka, Ukrainka, Velyka Oleksandrivka, Mala Oleksandrivka, and Davydiv Brid. It appears that withdrawing Russian forces are destroying their own weapons reserves, likely to prevent Ukrainian forces from capturing equipment as they advance.  

On October 5, the Russian army conducted another strike with an Iranian-made Shahed-136 drone in Bila Tserkva, Kyiv Oblast; this is the first strike in the Kyiv area since June. The strike resulted in the destruction of civilian buildings. This indicates that Russian forces are using advanced weaponry to target areas far from the active combat zones. The tactic of striking civilian infrastructure away from the frontlines has previously been used by Russia, presumably to add pressure on the civilian population and the Ukrainian administration. Ukrainian Brigadier General Oleksiy Hromov said that Russian forces have used a total of eighty-six Iranian Shahed-136 drones, of which, Ukraine has destroyed 60 percent; this has not been independently confirmed. In addition, for the first time since August, Russian Tu-22 M3 bombers reportedly launched Kh-22 missiles from Belarusian airspace against the Khmelnytskyi region.  

This week, Russian President Vladimir Putin issued a decree transferring control of the Zaporizhzhia nuclear power plant (ZNPP) to the Russian state-controlled company Rosenergoatom. The Ukrainian army reported that Russian officials are coercing plant workers into obtaining Russian passports and signing employment contracts with Rosenergoatom.  

In addition, Putin deferred mobilization for all students in Russia, including part-time and masters’ students. Putin’s motivations are not clear, but this could be the result of increasing domestic resistance to the mobilization. Putin criticized the defense ministry for difficulties with the mobilization’s roll-out.   

Meanwhile, police in Russia’s major cities appear to be using surveillance software to search for men who have failed to report for military service. According to Astra Press, run by independent Russian journalists, on October 3 and 4, at least ten men suspected of “evading mobilization” were captured by surveillance cameras in Moscow. Four of them were detained by the police and sent to a military enlistment office.   

Further, according to the United Nations, the humanitarian situation in Izium and Kupiansk “is extremely concerning following months of intense hostilities that have left behind a path of destruction.” In Izium, essential services have been decimated, leaving as many as 9,000 people in the town completely dependent on humanitarian aid. In Kupiansk, shelling and hostilities have forced more than 4,000 people to spend most of their time in bunkers and basements, with extremely limited access to vital items.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russian-occupied Georgian region of Abkhazia announces call for military service

Following Putin’s recent announcement of a partial mobilization in Russia, citizens of the Russian-occupied Georgian regions of Abkhazia and South Ossetia questioned whether they would be included in the mobilization order. On October 3, Aslan Bzhania, the de facto president of Abkhazia, signed a conscription decree approving urgent military service for citizens aged eighteen to twenty-seven. 

On September 21, the day of Putin’s mobilization announcement, a statement quoting Russian Defense Minister Nikolai Pankov circulated in Abkhazian Telegram channels. It claimed that Abkhazia wouldn’t be able to avoid the mobilization. The Abkhazia Ministry of Foreign Affairs said the statement was “fake” and a “provocation” to harm Abkhazia-Russia relations. On September 24, independent media outlet Meduza cited a “source close to the Russian president’s administration” to report that the Kremlin was considering the mobilization of citizens from Abkhazia and South Ossetia.  

In South Ossetia, the de facto defense ministry denied reports circulating on Telegram that claimed servicemen of the 4th Russian military base, stationed in the South Ossetian capital of Tskhinvali, were handing out draft mobilization notices. 

On September 29, the South Ossetian defense ministry recommended that its staff, both military servicemen and civilian personnel, cross the Russian border using their South Ossetian passports. “Most citizens of the Republic of South Ossetia are also citizens of the Russian Federation. Thus, those registered on the territory of the Russian Federation, are subject to the partial mobilization and draft notices will be handed to them,” the statement said.

Sopo Gelava, Research Associate, Tbilisi, Georgia

Russian court fines TikTok for ‘LGBT propaganda,’ Twitch for ‘fakes

A Russian court on Tuesday fined TikTok for not removing “LGBT propaganda” that violated Russian laws.  

Kremlin-owned media outlet RIA reported that a court in Moscow fined TikTok three million rubles (USD $50,000) “for refusing to remove LGBT propaganda.” Russia’s internet censor Roskomnadzor also accused TikTok of “promoting non-traditional values, LGBT, feminism, and a distorted representation of traditional sexual values.” 

Meanwhile, the livestreaming platform Twitch faces fines for publishing content about the war in Ukraine that Russia deems “fake.” 

On October 18, the same court will examine two cases against Twitch, which is owned by Amazon. According to RIA, Twitch is accused of refusing to remove “fakes about the Russian army during a special operation in Ukraine.” The cases were initiated after Twitch hosted an interview with Oleksiy Arestovych, a military reporter and adviser to Ukrainian President Volodymyr Zelenskyy.  

The latest legal actions are a continuation of Russia’s assault on Western technology companies. In July, a Russian court fined Google 22 billion rubles (USD $360 million) for failing to remove unfavorable content about Russia’s war in Ukraine.

Eto Buziashvili, Research Associate, Washington, DC

Mass grave uncovered in Lyman as rocket attack hits Zaporizhzhia

A new mass grave was uncovered in the city of Lyman after it was recently liberated by Ukrainian forces. According to Ukrainian reports, the bodies have not all been identified, as they may have been left on the streets for a long period of time before burial.  

In Zaporizhzhia, several people were killed in a rocket attack launched by the Russian army on October 6. Rescue operations continued throughout the day as people were believed to be buried under the wreckage.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria

Russian Telegram channels praise “pro-Russian” coup in Burkina Faso

For the second time in eight months, Burkina Faso was the scene of a military coup d’état. On September 30, Captain Ibrahim Traoré overthrew Lieutenant-Colonel Paul-Henri Sandaogo Damiba, who himself ousted the country’s democratically elected president in January after urging the then-president to hire Wagner Group to fight Islamist insurgents. 

Celebrations of the coup saw Burkinabe citizens holding Russian flags and chanting “to hell with France.” Sergei Markov, a pro-government analyst in Moscow, said “our people” had assisted the coup. Wagner founder Yevgeny Prigozhin also warmly congratulated Captain Traore. Prigozhin expressed similar sentiments following the January coup.  

Social media sites in Burkina Faso saw an uptick in pro-Russian messaging before both the most recent coup and the January coup. 

On Telegram, Kremlin propaganda channels with hundreds of thousands of followers praised the “joining of Ibrahim Traore and the country of honest people to the anti-colonial alliance with Russia.” These Telegram channels also claimed that Russia had effectively taken control of three West African countries – Mali, the Central African Republic and now Burkina Faso – from the “French neocolonial empire.” Following the coup, protesters, some waving Russian flags, attacked the French embassy in Burkina Faso and vandalized a French cultural center.  

Notably, many Telegram channels stated that “Niger and its uranium mines are next in line.” On September 19, a protest in the capital of Niger saw Nigerien citizens calling for France’s removal while carrying Russian flags.

Tessa Knight, Research Associate

The post Russian War Report: Ukraine recaptures territory as Russia uses Iranian drone near Kyiv appeared first on Atlantic Council.

]]>
Referendum coverage proves media is still vulnerable to Russian disinformation https://www.atlanticcouncil.org/blogs/ukrainealert/referendum-coverage-proves-media-is-still-vulnerable-to-russian-disinformation/ Thu, 29 Sep 2022 14:16:41 +0000 https://www.atlanticcouncil.org/?p=571314 International coverage of Russia's sham referendums in occupied regions of Ukraine has served to highlight the continued influence of Kremlin disinformation at some of the world's leading media outlets, writes Peter Dickinson.

The post Referendum coverage proves media is still vulnerable to Russian disinformation appeared first on Atlantic Council.

]]>
According to the Kremlin, millions of Ukrainian civilians who have been subjected to seven months of brutal Russian occupation just voted overwhelmingly to join their oppressors. This claim is self-evidently absurd and grotesque, but that did not prevent multiple international media outlets from reporting on Russia’s sham referendums in a matter-of-fact manner that risked lending a veneer of legitimacy to Vladimir Putin’s ongoing war of imperial aggression.

“Over 96% said to favour joining Russia in first vote results from occupied Ukraine regions,” declared Reuters in a tweet that uncritically cited Moscow’s highly improbable referendum results. Reuters also published an equally inaccurate news report titled, “Big majority said to favour joining Russia in first vote results of occupied Ukraine regions.” Meanwhile, the Financial Times led with the dangerously unhelpful headline, “Russian-held referendums in occupied Ukraine opt for annexation.”

There was also considerable confusion in the international press over exactly who was behind these bogus votes. The world’s oldest news agency, Agence France-Presse (AFP), referred to Russia’s occupation administrations in Ukraine as “Pro-Moscow authorities,” while Germany’s DW attributed the ballots to “separatists in Ukraine.” Such terminology implies a locally-driven conflict and absolves Russia of responsibility for what remains Europe’s most unambiguous act of international aggression since the days of Hitler and Stalin.

Unsurprisingly, this troubling coverage of Russia’s sham referendums sparked an online backlash. To their credit, some of the worst offenders deleted the posts in question and edited headlines in order to more accurately reflect the reality of the situation. However, the damage had already been done. Millions of people around the world had been exposed to deeply misleading reports from trusted news sources that reinforced Russian disinformation and endowed Putin’s fake ballots with a credibility they did not deserve.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

This is not a new problem. From the very beginning of the Russian attack on Ukraine in spring 2014 until the full-scale invasion of February 2022, Moscow consistently sought to disguise its involvement by portraying the unfolding hostilities as a fight between the Ukrainian authorities and homegrown separatist movements. The international media often served as invaluable if unwitting accomplices in these efforts, with many of the world’s most prominent outlets choosing to prioritize impartiality over accuracy in their coverage of the conflict.

In practice, this typically meant giving equal weight to Russian denials despite overwhelming evidence that Moscow was simply lying. For example, nobody seriously questioned the fact that the “Little Green Men” who seized Crimea in early 2014 were in fact Russian soldiers, but most media coverage of the armed takeover stopped short of explicitly saying so. Likewise, while Russia’s subsequent military intervention in eastern Ukraine was widely recognized as the world’s worst-kept secret, international news reports frequently presented the ensuing conflict in ambiguous terms that suggested the extent of Russia’s participation was genuinely in doubt.

Securing Kremlin-friendly coverage from international correspondents has long been a key goal of Russia’s disinformation strategy. In an October 2021 interview, Russian MP Alexander Borodai spelled out Moscow’s efforts to manipulate the international media. Borodai is no ordinary Russian parliamentarian. Prior to entering the Duma via Russia’s September 2021 parliamentary elections as a representative of Vladimir Putin’s United Russia party, Borodai was best known for having served in summer 2014 as prime minister of the so-called Donetsk People’s Republic (DPR), the separatist republic created by the Kremlin in eastern Ukraine.

Asked why he left his post in Donetsk so abruptly in August 2014, Borodai explained that his exit was deemed necessary in order to hoodwink the international media regarding Russia’s role in the war. “At that time, the leadership of the Donetsk People’s Republic was a strange spectacle,” he recalled. “I am from Moscow. My first deputy was from Moscow. The power ministries were all controlled by Muscovites, and defense minister Igor Strelkov (Igor Girkin) was also from Moscow. It was a little too blatant from a propaganda perspective. There was no propaganda issue with domestic audiences in Russia, but the situation in the international information space was more difficult in this context. It was clear that it would be necessary to identify new leaders from among the local [Ukrainian] population.”

The world’s media has moved on considerably since 2014 and the early days of Russia’s attack on Ukraine. Indeed, the shock of this year’s full-scale invasion has brought much-needed clarity to coverage of the conflict and has led to a sharp decline in the number of outlets ready to unquestioningly quote the Kremlin as a credible source. It is also important to acknowledge that much of the reporting coming out of Ukraine since February has been truly world class, with courageous journalists bringing the unvarnished reality of the war to international audiences, often at great personal risk. Tragically, a number of correspondents have been killed in the line of duty.

While the bravery and professionalism of individual journalists reporting from Ukraine is not in question, the problematic portrayal of Russia’s recent fake referendums by much of the international media is a reminder that serious issues do remain. It is obviously farcical to employ the language of democracy when reporting on ballots conducted at gunpoint, much as it is obscene to imply that people under military occupation are able to express themselves freely. Errors of this magnitude reflect the continued success of Russian efforts to disguise the true nature of the war.

For more than eight years, disinformation has been at the heart of Russia’s attack on Ukraine. Putin lied about Russian soldiers in Crimea and eastern Ukraine; he lied about preparations for a full-scale invasion; and he lied about plans to annex Ukrainian territory. In reality, it is now painfully clear that Russia is waging an old-fashioned war of imperial expansion and intends to extinguish Ukrainian statehood altogether. International media outlets that allow Russian narratives to go unchallenged are putting themselves at risk of becoming inadvertent accomplices in this criminal agenda.

Peter Dickinson is Editor of the Atlantic Council’s UkraineAlert Service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Referendum coverage proves media is still vulnerable to Russian disinformation appeared first on Atlantic Council.

]]>
The 5×5—The Internet of Things and national security https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-the-internet-of-things-and-national-security/ Wed, 28 Sep 2022 04:01:00 +0000 https://www.atlanticcouncil.org/?p=566471 Five experts from various backgrounds assess the national security challenges posed by IoT and discuss potential solutions.

The post The 5×5—The Internet of Things and national security appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

The connection of mundane household gadgets, industrial machinery, lifesaving healthcare technologies, vehicles, and more to the Internet has probably helped modern society to be more convenient and efficient. IoT devices worldwide number over 13 billion, a number that is estimated to balloon to over 29 billion by 2030. For all its benefits, the resultant web of connected devices, collectively known as the Internet of Things (IoT), has exposed everyday users, as well as entire economic sectors, to cybersecurity threats. For example, criminal groups have exploited IoT product insecurities to infect hundreds of thousands of devices around the world with malware in order to enlist them in distributed denial-of-service attacks against targets. 

Inadequate cybersecurity across the IoT ecosystem is inherently a US national security issue due to IoT’s ubiquity, integration across all areas of life, and potential to put an incredible number of individuals’ data and physical safety at risk. We brought together five experts from various backgrounds to assess the national security challenges posed by IoT and discuss potential solutions.

#1 What isn’t the Internet of Things (IoT)?

Irina Brassassociate professor in regulation, innovation, and public policy, Department of Science, Technology, Engineering, and Public Policy (STEaPP), University College London:

“IoT is not just our everyday physical devices embedded with sensing (data capture) or actuation capabilities, like a smart lightbulb or a thermostat. ‘Smart’ devices are just the endpoint of a much more complex ‘infrastructure of interconnected entities, people, systems and information resources together with services, which processes and reacts to information from the physical world and virtual world’ (ISO/IEC 20924: 2021). This consensus-based definition, agreed in an international standard, is particularly telling of the highly dynamic and pervasive nature of IoT ecosystems which capture, transfer, analyze data, and take actions on our behalf. While IoT ecosystems are functional, poor device security specifications and practices in these highly dynamic environments create infrastructures that are not always secure, transparent, or trustworthy.”

Katerina Megasprogram manager, Cybersecurity for the Internet of Things (IoT) Program, National Institute of Standards and Technology (NIST):

“Likely very little, which would explain why the US National Cyber Director, Chris Inglis, at a NIST public workshop [on August 17, 2022] referred to the ‘Internet of Everything.’ IoT is the product of the worlds of information technology (IT) and operational technology (OT) converging. The IoT is a system of interconnected components including devices that sense, actuate, collect/analyze/process data, and are connected to the Internet either directly or through some intermediary system. While a shrinking number of systems still fall outside of this definition, what we used to think of as traditional OT systems based on PLC architectures with no connectivity to the Internet are, in fact, more and more connected to the Internet and meet the above definition of IoT systems.”

Bruce Schneierfellow, Berkman-Klein Center for Internet and Society, Harvard University; adjunct lecturer in public policy, Harvard Kennedy School:

“Ha! A salami sandwich is not the Internet of Things. A sense of comradeship towards your friends is not the Internet of Things. I am not the Internet of Things. Neither are you. The Internet of Things is the connected totality of computers that are not generally interacted with using traditional keyboards and screens. They’re ‘things’ first and computers second: cars, refrigerators, drones, thermostats, pacemakers.”

Justin Shermannonresident fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab):

“There is no single definition of IoT, and how to scope IoT is a key policy and technical question. Regardless, basically every definition of IoT rightfully excludes the core underpinnings of the global Internet itself—internet service provider (ISP) networks that bring online connectivity to people’s homes and offices, submarine cables that haul internet traffic between continents, and so on.”

Sarah Zatkochief scientist, Cyber ITL:

“IoT is not modern or state of the art. The hardware on the outside may look sleek and shiny, but under the hood there is old software built with out-of-date compilers running on old chip architectures. MIPS, a reduced instruction set computer (RISC) architecture, was used in the largest portion of the IoT products that we have tested.”

#2 Why should national security policymakers care about the cybersecurity of IoT products?

Brass: “Many IoT devices currently on the market have known security vulnerabilities, such as default passwords and unclear software update policies. Users are typically unaware of these vulnerabilities, purchase IoT devices, set and forget them. These practices do not occur just at the consumer level, although there are many examples of how insecure and unsafe our ‘smart homes’ have become. They take place in critical sectors of strategic national importance such as our healthcare system. For instance, the Internet of Medical Things (IoMT) is known to be especially vulnerable to cyberattacks, data leaks, and ransomware because a lot of IoMT devices, such as IV pumps, have known security vulnerabilities but continue to be purchased and remain in constant use for a long time, with limited user awareness of their potential exposure to serious compromise.”

Megas: “I think the combination of the nature and ubiquity of IoT technology are the perfect storm. IoT has taken existing concerns and put them on steroids by increasing both the attack surface and also impacts, if you think of risk as the product of likelihood (IoT is everywhere) and impact (automated interactions with the physical world). In traditional IT systems, a compromised system could produce faulty data to the end user, however, typically there was always a human in the loop that would take (or prevent) action on the physical world based on this data. With the actuating capabilities we are seeing in most IoT and the associated level of automation (which will only increase as IoT systems incorporate AI), the impact of a compromised IoT system is likely going to be higher. As more computing devices are put on the Internet, they become available for botnets to be installed, which can result in significant national economic damage as in the case of Mirai. Lastly, because this technology is so ubiquitous, the vast amount of data collected—from proprietary information from a factory to video footage from a recreational drone to sound sensors collected from around a smart city—can both be accessed through a breach, shared, and used by other nations without anyone’s knowledge, even without a cybersecurity failure.”

Schneier: “Because the security of the IoT affects the security of the nation. It’s all one big network, and everything is connected.”

Sherman: “IoT products are used in a number of critical sectors, ranging from healthcare to energy, and hacks of those products could be financially costly and disrupt those sectors’ operations. There are even IoT devices that can produce physical effects, like small internet-linked machines hooked into manufacturing lines, and hackers could exploit vulnerabilities in those devices to cause real-world damage. In general, securing IoT products is also part of securing the overall internet ecosystem: IoT devices plug into many other internet systems and increasingly constitute a greater percentage of all internet devices used in the world.”

Zatko: “IoT is ubiquitous. Even when a ‘smart’ device is not necessary, at this point it is often difficult or impossible to find a ‘dumb’ one. Their presence often punches holes in network environment security, so they are common access points for attacks.”

#3 What kinds of threats are there to the cybersecurity of IoT devices that differ from information technology (IT) or other forms of operational technology (OT)?

Brass: “The kinds of vulnerabilities per se might not differ—ultimately, you still have devices running software that can be exploited by malicious actors. What differs is the scale and, in some cases, the severity of the outcome. IoT ecosystems are highly interconnected. Compromising a single device is often sufficient to gain the foothold necessary to exploit other devices in the system and even the entire system. The transnational dimension of IoT cybersecurity should also not be neglected. The 2016 Mirai attack showed how compromised IoT devices with poor security specifications (default passwords), located around the world, can be very easily exploited to target internet infrastructure in different jurisdictions.”

Megas: “I am not sure whether there are different threats for IoT, OT, and IT systems. They are converging more and more, so it is not meaningful to try to create artificial lines of distinction. This might be one of those instances where I say the dreaded phrase ‘it depends.’  It is possible that there are some loosely coupled IoT systems in which the components that are IoT devices do not sit behind more security capable components, but are more directly accessing the Internet (and therefore more directly accessible by threat actors). This could mean that vulnerabilities in these IoT systems are more easily exploitable and thus easier targets. Also, the nature of IoT systems that can interact with the physical world could affect the motivations of threat actors. The focus on many risks to traditional IT systems is around the data and its potential theft, but attacks on IoT can impact the real world. For instance, modifying the sensors at a water treatment plant can throw off readings and lead the system to incorrectly adjust how much fluoride is added to the water.”

Schneier: “The IoT is where security meets safety. Insecure spreadsheets can compromise your data. Insecure IoT devices can compromise your life.”

Sherman: “Typically, IoT devices use less energy, have less memory, and have much less computing power than traditional IT devices such as laptops, or even smartphones. This can make it more difficult to integrate traditional IT cybersecurity features and processes into IoT devices. To boot, manufactures often produce IoT devices and products with terrible security—installing default, universal passwords and other bad features on the manufacturing line that end up undermining their cybersecurity once deployed. In part, this happens because smaller manufacturers are essentially pumping IoT devices off the manufacturing line.”

Zatko: “Users often forget to consider IoT devices when they think about their computing environment’s safety, but even if they did, IoT devices are not always able to be patched. Sometimes software bugs in IoT operating systems are hard-coded or otherwise inaccessible, as opposed to purely software products, where changes are much easier to affect. This makes getting the software as safe as possible from the get go particularly important.”

More from the Cyber Statecraft Initiative:

#4 What is the greatest challenge to improving the security of the IoT ecosystem?

Brass: “These days, we very often focus on behavioral change—what can individual users or organizations do to improve their cyber hygiene and general cybersecurity practices? While this is an important step in securing the IoT, it is not sufficient because it places the burden on a large, non-homogenous, distributed set of users. Let us turn the problem around to its origin. Then, the greatest challenge becomes how to ensure that IoT devices and systems produced and sold all over the world have baseline security specifications, that manufacturers have responsible lifecycle care for their products, and that distributors and retailers do not compromise on device security in favor of lower priced items. This is not an easy challenge, but it is not impossible either.”

Megas: “There is a role for everyone in the IoT ecosystem. Setting aside the few organizations developing their own IoT systems for their own use, the majority of IoT technologies are purchased or acquired. One of the challenges that I see is educating everyone that there are two critical roles in supporting cybersecurity of the IoT ecosystem: those of the producers of the IoT products and those of the customers, both enterprise and consumers. While this dynamic is not new between producer and buyers, the relationships in IoT lack maturity. While producers need to build securable products that meet the needs and expectations of their customers, the customers are responsible for securing the product that operates in the customer environment. Identifying cybersecurity baselines for IoT products is a start in defining the cybersecurity capabilities producers should build into a product to meet the needs and expectations of their customers. However, one size does not fit all. A baseline is a good start for minimal cybersecurity, but we want to encourage tailoring baselines commensurate to the risk for those products whose use carries greater higher risk. 

Beyond the IoT product manufacturer’s role, there are network-based approaches that can contribute to better cybersecurity (such as using device intent signaling), that might be implemented by other ecosystem members. Vendors of IoT can ensure that their customers recognize the importance of cybersecurity. Enterprises should consider using risk management frameworks, such as the NIST Cybersecurity Framework, to manage their risks that arise out of the use of IoT technology. Formalizing and promoting recognition of the role in product organizations for a Chief Product Security Officer (CPSO) is also critical. Given that most C-suites and boards are starting to recognize the importance of the CISO towards securing their organizations’ operations, we need to also promote the visibility of the CPSO responsible for ensuring that the products that companies sell have the appropriate cybersecurity features that meet the companies’ strategic brand positioning and other factors.”

Schneier: “Economics. The buyers and sellers of the products don’t care, and no one wants to regulate the industry.”

Sherman: “As with many cybersecurity issues, the greatest challenge is getting companies that have been grossly underinvesting in security to do more, while also producing government regulations and guidance that are technically sound, roughly compatible with regulations and guidance in other countries, and that do not raise the barrier too much so as to cut out small players—though, if we want better security, some barrier-raising is necessary. It is a very boring answer, but there has been a lot of great work done already on IoT security by the National Institute of Standards and Technology, other governments, various industry groups, etc. The central challenge is better coordinating those efforts, fixing bad market incentives, and appropriately filling in the gaps.”

Zatko: “There are so many vendors, and many of them are not capable of producing secure products from scratch. It is currently too hard for even a well-meaning vendor to do the ‘right’ thing.”

#5 How can the United States and its allies promote security across the IoT ecosystem when a large portion of devices are manufactured outside their jurisdictions?

Brass: “Achieving an international baseline of responsible IoT security requires political and diplomatic will to adopt and align legislation that promotes the security of internet-connected devices and infrastructures. The good news is that we are seeing policy change in this direction in several jurisdictions, such as the IoT Cybersecurity Improvement Act in the United States, the Product Security and Telecommunications Infrastructure Bill in the United Kingdom, and several cybersecurity certification and labelling schemes such as CLS in Singapore. As IoT cybersecurity becomes a priority for several governments, the United States and its allies can be the driving force behind international cooperation and convergence towards an agreed set of responsible IoT security practices that underpin legislative initiatives around the world.”

Megas: “Continuing to share lessons learned with others. Educating customers, both consumers as well as enterprise customers, on the importance of seeking out products that support minimum cybersecurity.”

Schneier: “Regulation. It is the same that way we handle security and safety with any other product. You are not allowed to sell poisoned baby food or pajamas that catch on fire, even if those products are manufactured outside of the United States.”

Sherman: “US allies and partners are already doing important work on IoT cybersecurity—from security efforts led by the UK government to an emerging IoT labeling scheme in Singapore. The United States can work and collaborate with these other countries to help drive security progress on devices made and sold all around the world. Others have argued that the United States should exert regulatory leverage over whichever US-based companies it can to push progress internationally, too, such as with Nathaniel Kim, Trey Herr, and Bruce Schneier’s “reversing the cascade” idea.”

Zatko: “By open sourcing security-forward tools and secure operating systems for common architectures like MIPS and ARM, the United States could make it easier for vendors to make secure products. Vendors do not intentionally make bad, insecure products—they do it because making secure products is currently too difficult and thus too expensive. However, they often use open-source operating systems, tool kits, and libraries for the base of their products, and securing those resources will do a great deal to improve the whole security stance.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—The Internet of Things and national security appeared first on Atlantic Council.

]]>
From the UN to The Late Show, Ukraine’s diplomats are winning https://www.atlanticcouncil.org/blogs/ukrainealert/from-the-un-to-the-late-show-ukraines-diplomats-are-winning/ Mon, 26 Sep 2022 15:35:53 +0000 https://www.atlanticcouncil.org/?p=570192 Ukrainian Foreign Minister Dmytro Kuleba recently quipped at the UN that "Russian diplomats flee almost as aptly as Russian soldiers.” This one-liner was typical of the creative diplomacy that is bolstering Ukraine's war effort.

The post From the UN to The Late Show, Ukraine’s diplomats are winning appeared first on Atlantic Council.

]]>
Ukrainian Foreign Minister Dmytro Kuleba delivered one of the more memorable quotes of the war during his recent visit to New York. Commenting on Russian Foreign Minister Sergei Lavrov’s hasty departure from a United Nations Security Council session on Ukraine, Kuleba quipped, “I also noted today that Russian diplomats flee almost as aptly as Russian soldiers.”

Just hours after Kuleba’s instantly viral one-liner hit social media, he was starring on The Late Show with Stephen Colbert. Ukraine’s top diplomat received a rousing reception on the flagship US talk show, including a standing ovation from the studio audience in honor of the Ukrainian people and the country’s armed forces. Speaking with dignity, candor, and a dash of humor, Kuleba concisely expressed Ukraine’s view of the Russian invasion in a nine-minute interview that was hailed as a masterclass in public diplomacy.

The Ukrainian Foreign Minister’s strong showing in New York was a good example of the innovative approaches that are enabling Ukraine to gain the upper hand over Russia on the diplomatic front. In many ways, this confrontation is a generational clash between two very different diplomatic schools. While Russia is still represented by a Soviet-era generation of diplomats epitomized by 72-year-old Cold War veteran Sergei Lavrov, Ukrainian diplomats who came of age in the post-Soviet era are embracing new methods and achieving considerable success.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Ukraine’s wartime diplomacy has already delivered numerous significant results. These include securing the largest military support for any ally since World War II, along with unprecedented sanctions against Russia and other measures to increase Moscow’s international isolation. With the war now in its eighth month, the broad alliance of international partnerships created and nurtured by Ukrainian diplomats shows no signs of weakening.

What has Ukrainian diplomacy been doing differently in support of the country’s strategic interests? Based on personal interaction with and observation of Ukrainian diplomats at work, several aspects of Ukraine’s new diplomacy are noteworthy.

One key feature is empowerment. I first met Dmytro Kuleba when he was an advisor to the Ukrainian President a few years before his 2020 appointment as the country’s Foreign Minister. At the time, he gave the impression of a thoroughly modern person. It was also clear that Kuleba feels entirely at home as a manager of issues, relationships, and teams. In concert with Ukraine’s Defense Ministry, he appears to be providing explicit direction to Ukraine’s diplomats in the form of specific, country-based military support goals. This approach is combined with an expectation of proactivity on the part of individual ambassadors.

Thirty years after Ukraine’s independence, Kuleba is presiding over the final dismantling of the inherited Soviet diplomatic corps, which was notoriously clunky, bureaucratic, and sometimes truly under-skilled. Amid the pressure and pace of a full-blown war, a new organizational culture is emerging at the Ukrainian Ministry of Foreign Affairs that includes self-belief, positivity, and an emphasis on initiative.

Savvy communication is at the heart of Ukraine’s diplomatic progress. As part of their empowerment, Ukraine’s current generation of diplomats have strong license to communicate. Ministry officials in Kyiv and Ukrainian ambassadors around the world are now routinely using a wide array of contemporary channels including social media, traditional mass media, stakeholder relations, and cultural ties in order to build Ukraine’s image and articulate the country’s wartime needs. The innovative and often unorthodox use of social media by Ukrainian officials has won particular praise.

Ukraine’s clever communication is very sensitive to the cultural norms and expectations of individual audiences. Ukrainian Ambassador to Australia Vasyl Myroshnychenko noted recently that media skills are now central to successful diplomacy. “The impact of the full-scale Russian invasion on Ukraine’s diplomacy can be compared to the influence of COVID-19 on digital transformation,” he commented. “One of the key changes has been in the communications sphere. The ability of our ambassadors to provide compelling arguments for why a host nation should support Ukraine has played an important role in rallying military assistance. Being media savvy and fully proficient in the local language is no longer just an advantage. It is a must at times of war.”

Ukraine’s diplomatic engagement with partner governments and international audiences is particularly important in terms of the struggle against Russian disinformation. While Russian embassies often serve as hubs for anti-Ukrainian fakes and efforts to weaken Western unity, Ukraine’s diplomatic corps has framed its communication as accessible, reasonable, fact-based, and engagingly human. Today’s Ukrainian diplomats are not afraid to demonstrate a sense of humor or employ pop culture references in ways that would have shocked their stuffy Soviet predecessors.

This positive framing of Ukraine, Ukrainians, and their future is attractive and encourages international audiences to engage. Modern communications studies consistently show that how you communicate, especially in terms of tonality and timing, is as important as the actual message you are communicating. This is a lesson Ukrainian diplomats have clearly learned.

Ukraine’s wartime embrace of public diplomacy has been particularly striking. The country’s diplomats are now regularly in newspapers, on TV, at conferences, and in corporate boardrooms articulating their country’s needs and making the case for further support. This approach is designed to reach not only political partners, policy experts, and diplomatic representatives, but also the general public. Ukraine’s emphasis of public diplomacy reflects an awareness that public opinion in democracies is critical to maintaining policy support.

The success of Ukraine’s wartime diplomacy is rooted in the same progressive values that are helping the country to advance on the battlefield and as a young democracy. These values reflect a nation that feels increasingly at ease with itself and confident of its position as part of the wider democratic world. Ukrainian diplomats are winning because they have a winning story to tell and the skills to do so effectively. Their progress mirrors Ukraine’s historic coming of age over the past seven months and captures the spirit of a country that is finally finding its voice on the international stage.

Pete Shmigel is an Australian writer with a background in politics, mental health, and Ukrainian issues.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post From the UN to The Late Show, Ukraine’s diplomats are winning appeared first on Atlantic Council.

]]>
Russian War Report: Russia conducts partial mobilization amid battlefield losses https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russia-conducts-partial-mobilization-amid-battlefield-losses/ Fri, 23 Sep 2022 17:13:02 +0000 https://www.atlanticcouncil.org/?p=569614 As Ukraine's advances into its eastern territory put Russia under additional pressure, Putin declared a partial mobilization in the country.

The post Russian War Report: Russia conducts partial mobilization amid battlefield losses appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Russia conducts partial mobilization amid battlefield losses

Documenting dissent

Russians protest and flee the country as partial mobilization announced

War crimes and human rights abuses

Sri Lankans trapped in Kharkiv accuse Russia of torture

Russia conducts partial mobilization amid battlefield losses

As the DFRLab noted in last week’s report, Ukraine’s advancements in eastern Ukraine would put pressure on Russian President Vladimir Putin to compensate for the Kremlin’s military losses. On Wednesday, September 21, Putin declared a partial mobilization in the country, vowing to use “all means necessary” to achieve Russia’s aims against Ukraine and the West. Putin’s declaration provoked worldwide condemnation.  

Russian Defense Minister Sergei Shoigu said a total of 300,000 reservists would be called up into service. He said the country’s pool of potential recruits “amounts to 25 million people, and a little more than one percent of this number falls under partial mobilization.” Cadets could also be called to duty if they have an in-demand specialty, added Andrei Kartapolov, head of the State Duma Defense Committee. He noted that officers who are under 45 years old, as well as soldiers, foremen, and warrant officers under 35, would mobilize first.  

According to unconfirmed reports from Ukrainian media, volunteer battalions have already been formed in the Russian regions of Vladivostok, Kirov, Voronezh, Chuvashia, and Bashkiria. On September 16, authorities in Vladivostok announced they were sending letters to men with military experience between the ages of 25 and 63, inviting them to join the BARS (БАРС) reserves unit. Russian media reported that volunteers would receive a salary of 220,000 rubles ($3,500), allowances of 200,000 rubles ($3,300), and awards of up to 300,000 rubles ($4,900) for the destruction of Ukrainian equipment or killing of servicemen; they would also receive official veteran status, giving them access to additional state benefits. To further incentivize Russians, the ruling party proposed that academic leave for students participating in the army would be guaranteed.  

In Kirov, Governor Alexander Sokolov announced the creation of the Shironin Battalion, named after Soviet war hero Peter Shironin. Sokolov said a previous battalion had already departed for Ukraine. Magadan Governor Sergey Nosov announced financial support for self-mobilization and called on people to recruit even in the smallest of Russia’s regions. Meanwhile, the leaders of Voronezh, Chuvashia, and Bashkiria also reported mobilizations were underway and that 1,000 volunteers from each of these areas had already joined the army.  

The mobilization of civilian efforts did not stop there. According to the Russian branch of Radio Free Europe/Radio Liberty, employees of Gazprom are being forced to contribute at least 1,000 rubles ($17) for medication for Russian soldiers wounded in Ukraine. According to RFE journalist Mark Krutov, workers from the gas giant based in Yakutia have previously received messages asking them to contribute funds, but this is the first instance of a mandatory “crowdfunding” effort. These measures are likely the result of growing supply problems within the Russian army, which lacks vital materials, including medicine.  

Russian casualty statistics remain unclear, as the Kremlin has not released updates since March 25, when the Russian Ministry of Defense reported that losses in Ukraine exceeded 5,000. On September 5, UK Defense Minister Ben Wallace said 25,000 Russian soldiers had died in Ukraine, while another 80,000 soldiers had been wounded, taken prisoner, or refused to participate in the war.  

Not long after the mobilization was announced, Russia approved a law that would provide Russian citizenship to foreigners who fight on behalf of Moscow for at least one year. On September 20, information emerged that the reception of foreigners for military service in Russia would begin at the Sakharovo Migrant Center in Moscow. The center is intended for refugees from Africa, the Middle East, and former Soviet republics, but Moscow authorities have now opened a military bureau inside the center. Moscow had previously proposed that foreign recruits would receive a Russian passport in exchange for three years of service.  

Alongside the mobilization announcement, Russia activated its proxies in the occupied Ukrainian territories. On September 19, the Donetsk and Luhansk People’s Republics announced plans to hold a referendum on accession to Russia. One day later, Volodymyr Saldo, the head of the Kherson wartime administration, also announced a referendum on joining Russia.  

Meanwhile, a video emerged on September 16 showing a BARS-16 fighter thanking Russia for the aid sent to the frontlines. BARS-16 is known as the Kuban Unit and currently has about 1,000 fighters, with 400 soldiers located in Lyman. The unit is well regarded in Russia, with media presenting the unit, made up of Kuban Cossacks, as a key social pillar supporting Russia in the war. This indicates that moving forward the Kremlin will likely rely on smaller, motivated military units.  

Meanwhile on the frontlines, the Ukrainian Navy reported that four Russian warships equipped with up to thirty two Kalibr missiles are combat-ready in the Black Sea. At the same time, Ukrainian special forces, particularly the Kraken unit, crossed the strategic Oskil river and reached the eastern part of Kupiansk.  

Elsewhere, Ukraine’s 93rd Brigade said Russia had lost a T-80U-series tank, meaning Russia’s 4th Tank Division has lost a full regiment’s worth of tanks, according to Rob Lee, senior fellow at the Foreign Policy Research Institute. Lee added that Russia only has two remaining tank regiments. 

Lastly, according to Ukraine’s 92nd Mechanized Brigade, the Iranian-made Shahed-136 drone has already destroyed two 152mm self-propelled howitzers, two 122mm self-propelled howitzers, and two BTR armored infantry vehicles.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

Russians protest and flee the country as partial mobilization announced

Following the September 21 announcement of a partial Russian mobilization, opposition figures and anti-war activists held protests in more than thirty cities across the country. More than 330,000 people have also signed an online petition against the mobilization. 

The Moscow Prosecutor’s Office threatened that Russians may face administrative punishment and imprisonment of up to fifteen years for organizing, participating, or promoting anti-mobilization protests.  

On the day of the announcement, police arrested at least 1,386 protesters across the country, according to OVD-Info, which monitors political persecution in Russia. In some cases, police used force against the protesters. Since the February 24 invasion of Ukraine, OVD-Info has documented more than 16,000 detentions resulting from anti-war protests and the filing of nearly 4,000 administrative complaints against the army. 

Soon after Putin announced the partial mobilization, some Russians sought to flee the country, mostly to destinations that permit visa-free travel. “Virtually all flights from Russia to available foreign destinations in the coming days were sold out on Wednesday,” the Moscow Times reported. Deutsche Welle noted there was also high demand for domestic tickets to border cities where Russians could cross a land border. A video from Radio Free Europe showed a long traffic jam at the Russia-Georgia border crossing on Wednesday evening.  

Anastasia Burakova, founder of the Ark Project, which helps Russians who have fled the country due to the Ukraine war, told Current Times that all flights to Kazakhstan, Armenia, and Kyrgyzstan, where Russians can enter without a visa, were sold out for the coming days. Meanwhile, Serbian President Aleksandar Vučić remarked, “Moscow-Belgrade flight ticket jumped to almost €9,000 on the black market because of the mobilization, and many other reasons.”  

A Google Trends analysis for September 21 revealed a spike in searches for questions including “where can you go from Russia without passport” (“Kуда можно уехать из россии без загранпаспорта”); “where can you go without a visa” (“Kуда можно поехать без визы”); “where to go from Russia” (“Kуда уехать из россии”), and “how to break a hand” (“Kак сломать руку”). This indicates that Russians were actively searching for ways to leave the country, or possibly even injure themselves to avoid service.

Google Trends data shows that on September 21 there was an increase in searches for phrases related to leaving Russia and breaking a hand. (Sources: Google Trends/archive, top left; Google Trends/archive, top right; Google Trends/archive, bottom left; Google Trends/archive, bottom right)
Google Trends data shows that on September 21 there was an increase in searches for phrases related to leaving Russia and breaking a hand. (Sources: Google Trends/archive, top left; Google Trends/archive, top right; Google Trends/archive, bottom left; Google Trends/archive, bottom right)

On the day of the announcement, rumors emerged on social media that Russian airlines had stopped selling tickets to Russian men aged 18 to 65 who could not provide a certificate showing military enrollment. However, several airlines, including Aeroflot, Pobeda, and S7 Airlines, confirmed to Russian media that there were no restrictions on ticket sales. Russia’s rail service also confirmed there were no restrictions on their ticket sales.

Givi Gigitashvili, Research Associate, Warsaw, Poland. 

Sri Lankans trapped in Kharkiv accuse Russia of torture

Seven Sri Lankan citizens, including six men and one woman, were held captive in Vovchansk, Kharkiv Oblast, during the Russian occupation of the city. The former prisoners told Ukrainian media that they were tortured, starved, and humiliated. 

The Sri Lankan citizens arrived in Ukraine three weeks before Russian invaded the country, according to Serhii Bolvinov, chief of the investigation department of the national police of Kharkiv. 

Investigator Volodymyr Yakimenko said an investigation is being carried out under Part 1 of Article 438 of the Criminal Code of Ukraine, which deals with violations of the law and customs of war.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

The post Russian War Report: Russia conducts partial mobilization amid battlefield losses appeared first on Atlantic Council.

]]>
Propp in European Law Blog: European Cybersecurity Regulation Takes a Sovereign Turn https://www.atlanticcouncil.org/insight-impact/in-the-news/propp-in-european-law-blog-european-cybersecurity-regulation-takes-a-sovereign-turn/ Mon, 12 Sep 2022 14:19:00 +0000 https://www.atlanticcouncil.org/?p=565762 Europe Center nonresident senior fellow Kenneth Propp explores the status and implications of a European Union initiative to create an EU-wide certification framework for ICT products and services (EUCS). New cybersecurity regulation thus is seen as another way to safeguard Europe’s ‘sovereign’ interest in protecting data from foreign government access.  It also would reinforce separate […]

The post Propp in European Law Blog: European Cybersecurity Regulation Takes a Sovereign Turn appeared first on Atlantic Council.

]]>

Europe Center nonresident senior fellow Kenneth Propp explores the status and implications of a European Union initiative to create an EU-wide certification framework for ICT products and services (EUCS).

New cybersecurity regulation thus is seen as another way to safeguard Europe’s ‘sovereign’ interest in protecting data from foreign government access.  It also would reinforce separate European efforts to bolster smaller, home-grown cloud service providers, including through the GAIA-X project to create an interoperable network “explicitly based on principles of ‘sovereignty-by-design,’” as a leading European technology lawyer has characterized it.

Kenneth Propp

About the author

The post Propp in European Law Blog: European Cybersecurity Regulation Takes a Sovereign Turn appeared first on Atlantic Council.

]]>
Russian War Report: Ukraine counterattacks in Kherson as Russia prepares new deployments https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-ukraine-counterattacks-in-kherson-as-russia-prepares-new-deployments/ Fri, 02 Sep 2022 21:11:36 +0000 https://www.atlanticcouncil.org/?p=562547 Ukrainian forces targeted Russian military command-and-control elements in northwestern Kherson, while Russian forces attempted a limited ground assault in the same area.

The post Russian War Report: Ukraine counterattacks in Kherson as Russia prepares new deployments appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Ukraine counterattacks in Kherson as Russia prepares new deployments

Media policy

Russia approves Yandex sale of media assets to VK

Tracking narratives

Austrian tabloid uses false images to claim Darya Dugina’s killer was stabbed to death

Additional reading

Pro-Kremlin Wikipedia alternative off to a rough start

Ukraine counterattacks in Kherson as Russia prepares new deployments 

On August 29, the anniversary of the 2014 massacre of 366 Ukrainian soldiers in Ilovaisk, the Ukrainian army launched a counter-offensive against Russian forces in Kherson. Kherson was the first major city to fall after Russia re-invaded Ukraine in February. Kyiv’s generals have hinted for months that they were preparing a counter-offensive. They launched the attack in the early hours of the 29th after laying the groundwork the previous night by striking key bridges and command points. 

Ukrainian forces targeted Russian military command-and-control elements in northwestern Kherson, while Russian forces attempted a limited ground assault in the same area. Ukraine’s Southern Command reported that damage to the Antonovsky and Darivka bridges made them impassable for heavy equipment. Ukrainian forces also attacked Nova Kakhovka. 

Media reports indicate that fierce fighting erupted on August 30 in the city of Kherson, and heavy gunfire could be heard near the city center. However, it is unclear whether Ukrainian troops had entered Kherson or whether the fighting in the city’s streets was between Russian forces and partisans loyal to Kyiv. On September 1, surveillance footage appeared online showing Russian forces waving white flags, reportedly in the Kherson region, according to Ukrainian channels. 

In addition, the military command in Moscow may soon encounter problems with the contingents stationed in Central Asia scheduled to be redeployed to Ukraine. According to Ukrainian intelligence reports, Russian military units in Kazakhstan (who were deployed there in January as protests erupted) refused to return and participate in the war against Ukraine. The official reason for the refusal was the lack of special air transport. There are roughly 1,000 troops in Kazakhstan with weapons and equipment, currently located near critical infrastructure sites such as airports, oil warehouses, and the Baikonur spaceport. Russia has already pulled almost all of its military contingents from Tajikistan and Armenia to participate in the war in Ukraine. 

Also on August 29, Maxar published satellite images of the Zaporizhzhia nuclear power plant. The photos show Russian military equipment sheltered near one of the reactors. On September 1, a team of fourteen experts from the International Atomic Energy Agency (IAEA) finally visited the plant after a prolonged delay caused by the Russian authorities. IAEA Director Rafael Grossi said the visit was complete, but the IAEA “is here to stay and will maintain a continued presence at Zaporizhzhia nuclear power plant.”

Newly released Maxar satellite images of the Zaporizhzhya nuclear power plant. (Source:  Maxar/archive) 

Meanwhile, volunteer battalions from Russia’s 3rd Army Corps are expected to be deployed to resume offensive operations in southern and eastern Ukraine. Images of the 3rd Army Corps training in Mulino, Nizhny Novgorod Oblast, indicate that troops are training with more advanced equipment, including BMP-3 infantry fighting vehicles, T-80BVM and T-90M battle tanks, and the latest variant of the AK-12 assault rifle. 

Previous Russian volunteer battalions that fought in Ukraine, including the North Ossetian Alania battalion, went into battle with older equipment. It appears that the Russian military intends to send the 3rd Army Corps units into offensive operations with the hope of regaining momentum on the front line. The T-80BVM and T-90M tanks from Mulino were seen on August 27 in Rostov Oblast, indicating that parts of the 3rd Army Corps are being deployed to locations close to the Ukraine border. 

Russian forces also carried out a limited ground attack near the western outskirts of Donetsk on August 27 and have advanced into the outskirts of Krasnohorivka. Russian troops are continuing efforts to flank Avdiivka from the north and firing upon Ukrainian positions along the Avdiivka-Donetsk frontline.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

Russia approves Yandex sale of media assets to VK

Russia’s Federal Antimonopoly Service (FAS) approved a deal on August 30 allowing Yandex and VKontakte (VK) to exchange assets, in a move that will further restrict the flow of information in Russia. As part of the deal, Yandex will sell its search engine, news aggregator and Zen content platform to the state-controlled social media network VK. In exchange, Yandex will acquire Delivery Club, the largest food delivery company in Russia. 

As part of the deal, FAS will require both companies to comply with specific conditions “in order to maintain competition in their respective markets.” Yandex is prohibited from taking measures that would reduce the use of Delivery Club by restaurants or creating incentives for partners and couriers of Yandex.Food. VK, in turn, is obligated to request and obtain user consent for personal data processing on both Zen and News. 

Russian-owned news outlet TASS explained what the deal means for both companies. To understand VK’s strategic interest, they wrote, one “should take into account that it [VK] has recently turned into a quasi-state structure.” TASS noted that Gazprom, the Russian national gas company, is indirectly in control of the voting shares of VK. Companies dependent on the state, they added, “often perform social functions, at the same time acting as an instrument for implementing state policy.” TASS explained that VK has a “keen interest in Yandex’s media projects” because it would strengthen Russia’s “presence in new mass and popular segment of digital media, as well as expanding control over this area.” 

As for Yandex, TASS says the deal is an opportunity to “depoliticize” its business. TASS notes that international sanctions have heightened the risks for Yandex from a regulatory perspective. “Potentially risky assets will simply be exchanged for a promising politically ‘neutral’ Delivery Club project,” they added.

Eto Buziashvili, Research Associate, Washington DC

Austrian tabloid uses false images to claim Darya Dugina’s killer was stabbed to death

A right-wing Austrian tabloid published a story on August 28 claiming the woman accused of murdering Darya Dugina was stabbed to death. Exxpress, a tabloid associated with conservative and right-wing Austrian politicians, also reported that Natalya Vovk, the woman Kremlin media allege murdered Dugina, was found dead with “seventeen stab wounds and a piece of paper in her hand.” The article cited a “message that spread like wildfire on Telegram” as the source. 

Dugina was the daughter of Alexander Dugin, a Russian philosopher considered to be the founder of the Russkiy Mir ideology, which the Kremlin employs as justification for its war against Ukraine. 

The article’s lead image is a composite featuring a photo of Natalya Vovk, previously published in pro-Kremlin outlets, and a blurred photo of a woman lying on a bed. However, the blurred image is an old photo first published in July 22, 2020, according to a report by the Kremlin-controlled outlet REN TV.

Screenshots show Exxpress recycled an old photo to claim the woman accused of murdering Dugina had been killed. The pink boxes highlight the dates of publications. The green boxes highlight the blurred image of the woman. (Source: Exxpress/archive, left; REN TV/archive, right)
Screenshots show Exxpress recycled an old photo to claim the woman accused of murdering Dugina had been killed. The pink boxes highlight the dates of publications. The green boxes highlight the blurred image of the woman. (Source: Exxpress/archive, left; REN TV/archive, right)

Additionally, the Exxpress article shared an ID card which it claims was used by Vovk; however, the caption notes that the ID is fake. The photo on the ID actually shows Margarita Simonyan, editor-in-chief of the Kremlin-owned news outlet RT. 

Pro-Kremlin Telegram channels previously circulated an ID card they allege belongs to Vovk and proves she is a member of the Azov battalion. Twitter user @issandjumal conducted a photo forensic analysis on the ID card and concluded the image had been manipulated. 

In response to the fake Vovk ID, the Facebook account of the National Guard of Ukraine appeared to troll Russia by sharing several obviously photoshopped ID cards, replacing the photo with well-known Russian media figures, including Simonyan. 

Anton Gerashchenko, an advisor to the Ukrainian Interior Ministry, shared the fake Simonyan ID card with the caption, “We also know how to draw and make photo collages. Look at what character we have serving in the National Guard right now.”

Screenshots show Exxpress sharing the fake Margarita Simonyan ID, left, and Gerashchenko’s Facebook post, right.  (Source: Exxpress/archive, left; Anton Gerashchenko/archive, right)
Screenshots show Exxpress sharing the fake Margarita Simonyan ID, left, and Gerashchenko’s Facebook post, right.  (Source: Exxpress/archive, left; Anton Gerashchenko/archive, right)

Soon after the story was published, Kremlin-owned media outlets such as RIA Novosti in Crimea reported that Vovk had been killed, citing Exxpress as their source. The pro-Kremlin Russian actress Yana Poplavskaya amplified the false Exxpress story and suggested, “Those who order a murder do not leave the executers alive.” Several Russian media outlets, including RIA FAN, Ekonomika Segodnya, Slovo I Delo, and PolitEkspert, reported on Poplavskaya’s comment. Other well-known figures also amplified the story, including TV presenter Vladimir Sergienko and Ukrainian pro-Kremlin activists Olga Shariy and Anatoly Shariy

Eventually, pro-Kremlin outlets debunked the Exxpress article. RBC said it reached out to the Austrian Interior Ministry to inquire about Vovk’s death. “We can inform you that no such case is known in Austria,” the ministry told RBC. “Therefore, we cannot confirm the accuracy of this information.” Multiple Russian media outlets reported on the Austrian statement. 

Some pro-Kremlin media outlets, such as Tsargrad and REN TV, suggested in their debunks that Exxpress was fooled by an unnamed click-bait Telegram post that sought to garner subscribers. 

One day after Exxpress published the report on Vovk’s alleged murder, it published a follow-up story stating, “The first reports that the Ukrainian had been murdered were not confirmed by Moscow.” Despite this, Exxpress continued to use the fake image of the Simonyan ID card. 

Kremlin-controlled media outlets have previously suggested that Vovk fled from Moscow to Estonia and then to Austria, where she was allegedly spotted in a hotel. This may have given credence to the Austrian tabloid’s reporting on Vovk. 

The case of the Austrian tabloid demonstrates the diversity of actors capitalizing on the unsolved murder of Darya Dugina. 

Nika Aleksejeva, Lead Researcher, Riga, Latvia

Pro-Kremlin Wikipedia alternative off to a rough start

Runiversalis (руни.рф), a newly launched Russian analog of the internet encyclopedia Wikipedia, is an attempt to spread Russian propaganda and disinformation in the guise of a wiki. Beyond using the underlying software architecture employed by Wikipedia, it’s a wiki in name only. Read more about it in the latest analysis from the DFRLab’s Eto Buziashvili and Andy Carvin. 

Eto Buziashvili, Research Associate, Washington DC

Andy Carvin, Resident Senior Fellow and Managing Editor, Washington DC

The post Russian War Report: Ukraine counterattacks in Kherson as Russia prepares new deployments appeared first on Atlantic Council.

]]>
Russia’s self-defeating invasion: Why Vladimir Putin has lost Ukraine forever https://www.atlanticcouncil.org/blogs/ukrainealert/russias-self-defeating-invasion-why-vladimir-putin-has-lost-ukraine-forever/ Fri, 02 Sep 2022 19:06:31 +0000 https://www.atlanticcouncil.org/?p=562310 The Russian invasion of Ukraine aimed to extinguish Ukrainian statehood and return the country to the Kremlin orbit. Instead, the war unleashed by Putin has sparked an unprecedented wave of de-Russification.

The post Russia’s self-defeating invasion: Why Vladimir Putin has lost Ukraine forever appeared first on Atlantic Council.

]]>
Russia’s genocidal invasion of Ukraine was meant to extinguish Ukrainian statehood and eradicate Ukrainian identity. Instead, it is turbocharging the de-Russification of the country. In the six months since the invasion began, Ukrainian support for de-Russification has become a truly nationwide phenomenon, reaching record highs far in excess of the significantly more modest public backing for de-Communization policies following the country’s 2014 Euromaidan Revolution. This wartime trend is rapidly reversing centuries of Russification and directly undermining Vladimir Putin’s dreams of a new Russian Empire.

Putin’s criminal war is having a truly historic impact on Ukrainian society and bringing Ukrainians together in a quite literal sense. The invasion has forced millions of Ukrainians to flee to the west of the country, where they have either sought refuge or traveled further into the EU. This has led to unprecedented intermingling between Ukrainians from different regions of the country, which is fueling feelings of solidarity and national integration. Recent opinion polls consistently indicate converging opinions on national identity, language, relations with Russia, and future geopolitical objectives among Ukrainians from all regions of the country. One of the national issues Ukrainians are now most united on is the need for de-Russification.

A further factor driving national integration is the mobilization of hundreds of thousands of Ukrainians to serve in the country’s military, with many deploying to frontline regions in the east and the south. Likewise, Ukraine’s large volunteer force is based throughout the country, bringing a wide variety of people from different professional and regional backgrounds into contact with each other for the first time.

The invasion is also speeding up Ukraine’s linguistic de-Russification, with the Russian language now increasingly associated with military aggression. The number of Ukrainians who support Ukrainian as the country’s official state language has risen to 86%. Just 2% of Ukrainians believe Moscow’s claims of a “genocide” against the country’s Russian speakers, but the deliberate weaponization of the Russian language by Vladimir Putin has led many Ukrainians to view the language less favorably.

At the same time, Russian remains widely used in everyday life throughout Ukraine. Language change is a slow process with Russian-speakers typically becoming bilingual before fully adopting Ukrainian. Recent data indicates that 85% use both Ukrainian and Russian at home while just 13% of the Ukrainian population uses only Russian.

Ethnic re-identification appears to be proceeding at a faster pace with 92% of Ukrainian citizens now declaring themselves ethnic Ukrainian in one recent survey. This figure would make Ukraine the third most homogeneous country in Europe after Portugal and Poland. Meanwhile, only 5% of today’s Ukrainian population identified as ethnic Russians in the same survey, representing a striking decline from 22% in the 1989 Soviet census and 17% in the 2001 Ukrainian census.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Ukraine’s relationship with the past is undergoing radical change in response to Russia’s invasion, leading to a widening of the memory divide separating the two neighboring countries. Only 11% of Ukrainians now express nostalgia for the USSR compared to approximately two-thirds of Russians. Likewise, 84% of Ukrainians hold a negative view of Stalin while most Russians have a positive attitude toward the Soviet dictator.

Meanwhile, Ukrainian attitudes toward the country’s twentieth century liberation movement have experienced a major shift. During the early decades of Ukrainian independence, public opinion was often deeply divided on the issue of Ukrainian nationalist groups. This began to change following the 2014 Euromaidan Revolution, when 41% expressed positive views of the OUN (Organization of Ukrainian Nationalists) and UPA (Ukrainian Insurgent Army). Since the February 2022 invasion, this figure has rocketed to 81%.

Ukrainians are now less inclined to differentiate between the Kremlin and ordinary Russians. Following the invasion of Crimea and eastern Ukraine in 2014, a majority of Ukrainians blamed Russia’s leadership. However, they now overwhelmingly hold both the Kremlin and the Russian people responsible for the current invasion. As a consequence, the number of Ukrainians who express positive views of Russians has plummeted from 47% in 2018 to just 3% today.

This collapse in positive attitudes toward ordinary Russians is not difficult to explain. Everything from polling data to anecdotal evidence demonstrates overwhelming Russian public support for the invasion of Ukraine. Millions of Ukrainians with relatives in Russia have personal experience of their family members either applauding the war or accusing them of lying about the horrors of the invasion.

It is also striking that the vast majority of civilian victims during the first six months of the invasion have been the same Russian-speaking Ukrainians in the south and east of the country who Putin claims to be protecting. Tens of thousands were murdered in Mariupol alone, while dozens of other towns and villages have been similarly reduced to ruins in regions of Ukraine that the Kremlin cynically trumpets as “historical Russian lands.”

Given the scale of the carnage, it is hardly surprising that 89% of Ukrainians believe the Kremlin is committing genocide in Ukraine. Almost nine in ten Ukrainians think Russia is seeking the destruction of the Ukrainian state and Ukrainian national identity, while half regard Russia as a fascist regime.

This sense that Ukraine is facing an existential challenge is fueling de-Russification and is also driving Ukrainians to reject any talk of a compromise peace. There is a strong sense throughout the country that without a decisive victory, Ukraine will never be secure. Around half of Ukrainians believe there can never be reconciliation with Russia and another third think it may only become possible in two to three decades. In other words, 78% of Ukrainians rule out any normalization of relations with Russia for at least a generation.

De-Russification at the official level has seen openly pro-Kremlin political parties banned and pro-Kremlin media shuttered. The Russian Orthodox Church (ROC) in Ukraine is on life support with only 4% of Ukrainians now professing membership. This is compared to 54% who identify as members of the Orthodox Church of Ukraine. With the Ukrainian government recently imposing sanctions on ROC head Patriarch Kirill and seven leading members of the ROC clergy for their role in the invasion, the ROC has an uncertain future in Ukraine.

Ukraine’s school curriculum is undergoing wartime de-Russification, with Ukrainian schoolchildren no longer studying Russian language and literature. The cultural de-Russification process also includes the removal of monuments to Russian literary figures such as Pushkin and Dostoyevsky, along with changes to thousands of street and place names across the country.

Monuments to Russian-Ukrainian friendship along with Russian and Soviet history are being rebranded or pulled down. In Kyiv, a prominent monument to Russian-Ukrainian friendship has been renamed while the city’s iconic motherland monument will have its Soviet crest replaced by a Ukrainian tryzub (trident). In Odesa, debate is raging about whether to remove the monument to Russian Empress Catherine the Great.

Irrespective of how long the war will last, it already seems clear that the end product will be a de-Russified and Europeanized Ukraine. This is exactly what Vladimir Putin hoped to prevent. The Russian dictator’s genocidal invasion is both a crime and a blunder on a scale unparalleled in modern European history.

Taras Kuzio is a Professor of Political Science at the National University of Kyiv Mohyla Academy.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Russia’s self-defeating invasion: Why Vladimir Putin has lost Ukraine forever appeared first on Atlantic Council.

]]>
Decolonizing Crimean history https://www.atlanticcouncil.org/blogs/ukrainealert/decolonizing-crimean-history/ Tue, 30 Aug 2022 17:16:39 +0000 https://www.atlanticcouncil.org/?p=561001 A new online educational initiative is aiming to decolonize Crimean history and challenge the problematic international tendency to view the lands of the former Soviet Union through a Russian prism.

The post Decolonizing Crimean history appeared first on Atlantic Council.

]]>
Russia’s war against Ukraine did not begin with the invasion of February 24. Instead, the conflict started almost exactly eight years earlier in February 2014 with the seizure of Ukraine’s Crimean peninsula. The Russian occupation of Crimea was a watershed moment in modern European history. It was the first time since WWII that one European country had invaded and attempted to annex the territory of another.

Russian President Vladimir Putin’s bid to redraw Europe’s borders by force was accompanied by one of the most sophisticated information offensives ever launched. As the Ukrainian Armed Forces fight to end the occupation of Crimea, it is also vitally important to debunk the disinformation promoted by the Kremlin to justify the 2014 takeover of the Ukrainian peninsula.

A recently launched English-language online course aims to educate international audiences about Crimean history. Developed by the Ukrainian Institute and EdEra online education studio with the support of the International Renaissance Foundation, the “Crimea: History and People” initiative explores the history and culture of the Crimean Tatars while telling the story of Crimea from the perspective of the peninsula’s indigenous people. This approach aims to decolonize the history of Crimea and counter the many imperial Russian narratives that continue to dominate international perceptions.

This initiative is arguably long overdue. Ever since the Russian invasion in early 2014, Moscow’s false claim that Crimea is “historically Russian land” has remained largely unchallenged in the international arena. In reality, Russia did not appear until relatively late in Crimea’s more than two thousand years of recorded history, with the Russian Empire annexing the peninsula in the final years of eighteenth century. Prior to this, Crimea had been home to the Crimean Khanate for over three hundred years, a far longer span than the subsequent period spent under Russian rule. This is largely overlooked in Russian histories and is rarely referenced in international coverage of Crimea. Instead, the peninsula is misleadingly portrayed as part of Russia’s ancient heritage. This helps legitimize Moscow’s wholly illegitimate claims to Crimea.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Since Ukraine became independent in 1991, the process of decolonizing the country’s past has been slowly gathering pace. A more nuanced study of the entire post-Soviet region that goes beyond traditional Russia-centric approaches is essential for anyone seeking to make sense of contemporary Ukraine or looking to understand the origins of the invasion launched by the Kremlin in February 2022. This is perhaps nowhere truer than on the issue of Crimea.

For decades following the Soviet collapse, many international observers spoke favorably of the “civilized” divorce between Russia and Ukraine. They often identified Crimea in particular as a success story, noting the absence of violent conflict and praising the compromises that made it possible to manage the return of the Crimean Tatars from Soviet exile along with the division of the Black Sea Fleet.

The true picture of Crimea in the 1990s is not quite so rosy. While open conflict was indeed avoided, the volatile political debates that raged over the future of the peninsula highlighted the continued strength of imperial sentiment in the supposedly democratic and pro-Western Russia of the Boris Yeltsin era. Russian politicians agitated against Ukraine over the issue of Crimea throughout the 1990s and were often accused of fueling separatist movements on the peninsula. As Paul D’Anieri noted in his 2019 book Ukraine and Russia: From Civilized Divorce to Uncivil War, “Even many Russian liberals who accepted Ukraine’s independence believed that Crimea, Sevastopol, and the Black Sea Fleet were Russian.”

Simmering imperial anger in Russia over the loss of Crimea was a warning sign of potential conflict that went unheeded and ultimately led to today’s war. It is now painfully apparent that Russian society as a whole has never fully accepted the loss of Ukraine and still clings to obsolete notions of the country’s place within Russian imperial identity. Failure to move beyond the imperial past in the 1990s has turned modern Russia into a backward-looking country that is driven by a revisionist desire to reassert its authority over former colonies rather than building pragmatic neighborly relations.

The Western world must share some of the blame for this tragic reality. During the 1990s, many Western politicians and academics continued to view the post-Soviet world through a Russian prism while embracing Kremlin-friendly historical narratives shaped by centuries of Czarist imperialism. This helped to justify Russia’s continued regional dominance while reducing the newly independent peoples of the former USSR to the status of footnotes in their own national stories. It is now time to challenge such outdated thinking and decolonize perceptions of the entire post-Soviet region.

For far too long, academic courses at Western universities focusing on Eastern European studies have placed disproportionate emphasis on understanding Russia. In the years to come, this needs to change. Instead, Western academics must dedicate far more time to understanding Ukraine. Learning about the complex history of Crimea from a non-Russian perspective is an important step in the right direction.

Dr. Oleksandra Gaidai is Head of Academic Programmes at the Ukrainian Institute.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Decolonizing Crimean history appeared first on Atlantic Council.

]]>
Information warfare in the air littoral: Talking with the world https://www.atlanticcouncil.org/content-series/airpower-after-ukraine/information-warfare-in-the-air-littoral-talking-with-the-world/ Tue, 30 Aug 2022 13:00:00 +0000 https://www.atlanticcouncil.org/?p=555913 Information operations play a crucial role in generating mass in the air littoral, the airspace between ground forces.

The post Information warfare in the air littoral: Talking with the world appeared first on Atlantic Council.

]]>
In the early days of the ongoing war in Ukraine, Kyiv put out calls over Facebook for civilians to donate their drones or sign up to join drone units. Informal donation pages were set up, too, along with online efforts to bring civilian drones into the country. Russian volunteers caught on and tried to emulate the practice, although their attempts were less successful than the Ukrainians’ efforts. Nevertheless, the donation of drones supports both actors in generating and sustaining concentrated military power (or mass in military parlance)—a significant factor in the contest over the air littoral, the airspace between ground forces and high-altitude fighters and bombers.

The importance of mass in the air littoral

The systems that are employed to contest the air littoral—drones, loitering munitions, and low-flying missiles—are often cheap and disposable. Swarming attacks of numerous drones, loitering munitions, and missiles can overwhelm target defenses, but with high attrition rates. If stocks run out and cannot be replenished, the air littoral cannot be used for guiding artillery strikes or gathering and sharing propaganda. Global public-facing information warfare operations can encourage the building of mass, hinder adversary attempts to build mass, and reduce strategic effects of air littoral competition.

The role of information operations in generating mass

Information operations may encourage (or hinder) support from allies in generating mass. The United States provided Ukraine with hundreds of Switchblade loitering munitions. Though American national interest was certainly an influential factor, Ukraine’s success in garnering international sympathy for its unexpected combat prowess and capacity to fight the Russian army also played a big role. The Ukrainians have used memes of “Saint Javelin” and farmers towing away Russian tanks to crowdsource military and humanitarian donations. Lithuania provides the clearest example: the nation crowdfunded five million euros to buy Ukraine a new Bayraktar TB2 drone. Then Turkey gave the TB2 to Ukraine for free, suggesting the funds be used for humanitarian support. Ukraine also generated mass through an unconventional source: civilians. Although not an information operation itself, civilian engagement may support a larger narrative about how all of Ukrainian society is deeply committed to the war effort.

Of course, since early 2014, Russia has also launched its own information operations, often centered on weapons and defenses for contesting the air littoral. Russia continues to push disinformation regarding a fake Ukrainian chemical and biological weapons program to justify the invasion and discourage sympathy and support for Ukraine. The Russian Ministry of Defense has even accused Ukraine of conducting a “drone chemical attack” against Russian forces. In addition, Russia has conducted information operations seemingly designed to degrade Ukraine’s ability to generate mass in the air littoral. For example, Russia claims to have fielded a new anti-drone laser, but the United States has pushed back on the report, with a Department of Defense official saying that he had not seen “anything to corroborate reports of lasers being used” in Ukraine. Although it is possible that the United States might have just not found the evidence, disinformation about fielding a fancy new countermeasure could be intended to discourage Western drone resupply and induce greater caution on Ukrainian drone deployments.

In addition, cyber warfare—another important aspect of information warfare more broadly—can help generate mass while attempting to disrupt the other side’s ability to do the same. For example, the hacking collective Anonymous, furious with Russian actions in Ukraine, claims to have hacked drone manufacturers, capturing various documents on planning and tactics (exactly how useful these documents are remains unclear). Such information could be used to design better countermeasures or improve Ukrainian systems. Alternatively, cyber espionage and attacks could be used to identify potential vulnerabilities—cyber, physical, or electronic—to sabotage supply chains, targeting critical part manufacturers when Russia has few (or no) alternative producers. More broadly, this example illustrates the importance adversaries place on the use of information operations to generate and sustain mass in the air littoral, and the growing importance of physical, electronic, and cyberattacks to interdict air-littoral weapon systems.

Information environment in the air littoral

An open question is how to best counter such efforts. The Russia-Ukraine conflict has seen significant use of Distributed Denial of Service (DDOS) attacks, which could be leveled against websites hosting drone recruitment messages, or local Internet providers. Alternatively, an adversary could, say, hack into the Facebook account hosting the message, or set up a fake effort to divert some of the drones. Taking down an entire channel would be difficult and would most likely produce only limited effects—the longest Facebook outage in history lasted 14 hours. Nevertheless, the open-source nature of social media websites could allow an adversary to collect useful intelligence. If an adversary knows the manufacturer and model of the drones being provided, they can also know operating parameters, potential vulnerabilities, and which countermeasures are most effective. They could also target supply chains, perhaps through information attacks.

A civilian’s drone-captured footage of Russian troop movements has little impact if the civilian cannot share the footage with those individuals capable of attacking the troops, emplacing obstacles to inhibit movement, avoiding the troops, or otherwise reacting to troop movements. Likewise, the civilian almost certainly will not know which unit to call. That means the military would require the capacity to find the video on the Internet, provide an alternative means for the civilian to upload the video, and relay the video to the appropriate units.

Of course, delays in information sharing can still have meaningful effects. A Ukrainian drone captured footage of a Russian soldier appearing to shoot a civilian who surrendered. If the operator had to wait weeks or months to share the video, the opportunity for it to have an impact could have been lost: states might have already decided whether to provide or withhold support. The video might go viral, stuck on the front page of world newspapers, but the conflict may be too far along for it to make a difference. Even more modest delays—days or just hours—might prevent action on particularly time-sensitive information. Direct attacks on popular information-sharing channels (Telegram, Twitter, Facebook) might have limited effects if a prolonged outage forces a sharing group to migrate to a new channel. However, because global companies with major information-technology capabilities operate those channels, extended outages are unlikely.

Preparing to wage information warfare in the air littoral

The information environment is compressing the tactical, operational, and strategic levels of warfare, especially in the air littoral. Tactical victories and errors can go viral, spreading from Wellington to Timbuktu. Winning the information warfare contest can mean that the victor receives more missiles, intelligence information, and humanitarian support. Losing can result in cyberattacks from anarchic nonstate actors, and adversaries empowered with outside support. The United States and allied forces need to be prepared: they should hold wargames and exercises to explore how information operations interact with the air littoral; explore ways to use civilian engagement to support air-littoral stocks; ensure that information awareness is baked deeply into military organizations; and strengthen mechanisms for interagency collaboration on information operations. Today, an act of violence can echo throughout the world.

***

Zachary Kallenborn is a Policy Fellow at the Schar School of Policy and Government, a Research Affiliate with the Unconventional Weapons and Technology Division of the National Consortium for the Study of Terrorism and Responses to Terrorism (START), an officially proclaimed US Army “Mad Scientist,” and national security consultant.

Read more essays in the series

Airpower after Ukraine: The future of air warfare

Airpower experts and practitioners examine interim lessons from the war in Ukraine and consider applications for twenty-first century air and space forces.

Forward Defense

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Information warfare in the air littoral: Talking with the world appeared first on Atlantic Council.

]]>
Russian War Report: Russian missile strike targets railway station https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russian-missile-strike-targets-railway-station/ Fri, 26 Aug 2022 13:00:00 +0000 https://www.atlanticcouncil.org/?p=560092 During Ukraine's Independence Day celebrations, a Russian missile struck a railway station, killing fifteen and wounding another fifty.

The post Russian War Report: Russian missile strike targets railway station appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Russian missile strike targets railway station

Tracking narratives

Pro-Kremlin forces falsified letter about Ukrainian casualties

Documenting dissent

Ex-head of Russian news aggregator launches alternative platform

War crimes and human rights abuses

Occupying administration order “detaches” Zaporizhzhia from Ukraine

International response

Far right and far left populist Twitter accounts in Italy gained traction by posting pro-Russian and anti-Ukraine position regarding death of Darya Dugina

Russian missile strike targets railway station

The Air Force of the Armed Forces of Ukraine said that during August 24’s Ukrainian Independence Day celebrations, the Russian Air Force carried out more than 200 flights to simulate missile strikes on the territory of Ukraine in order to activate air sirens and sow panic among the population. In the midst of this, a Russian missile attack at the railway station in the central Dnipropetrovsk region killed fifteen people and wounded another fifty. The attack occurred in in the village of Chaplyne, which is far from the front lines, and there are no known military sites in the area. 

Meanwhile, Russian authorities deployed security forces in the Luhansk region, probably in response to decreasing support for the war and the increasing reluctance among local residents to fight outside the province. The Ministry of the Interior of the so-called Luhansk People’s Republic (LPR) announced on August 23 that its staff had carried out joint patrols with police units from the Interior Ministry of St. Petersburg and Leningrad region in Starobilsk, Schastia, and Stanytsia Luhanska. The previous day, it announced that Russian national guard units maintained security during the celebration of the Russian Banner Day in Starobilsk.  

While news reports speculate that the General Staff of the Armed Forces of the Russian Federation are insisting on a general mobilization, evidence for such a move remains unclear. The Russian army still worries that announcing a mobilization would be a widely unpopular move, especially in western parts of the country. However, there is a need for military reinforcements on the front lines in Ukraine and the occupied territories, where resistance continues. On August 25, for example, President Putin signed an order for the Defense Ministry to plan for an increase of 137,000 troops as of January 2023. 

Meanwhile, news broke that same day that the Security Service of Ukraine (SBU) arrested agents of the Russian Federation who coordinated the attack on Kyiv at the start of the invasion. According to the news reports, the SBU managed to neutralize the group, composed of residents of Kyiv. The press service of the SBU echoed these reports. 

The Ukrainian forces also continued to shell military sites linked to the Russian army this week. On August 24, a military depot was hit in the city of Tokmak, currently under Russian control, in response to Russian shelling in the Zaporizhzhia region. Two days earlier, the Ukrainian army shelled positions in Russian-occupied Kherson. In Crimea, Sevastopol has been targeted multiple times with drones since August 21, while in Donetsk, a munition depot was destroyed in a Ukrainian army rocket attack. 

Against this backdrop, Russian forces continue to make slow progress. After several weeks of false reports that the Russian army had taken over the village of Pisky, they were finally successful on August 23, when Russian and Donetsk separatist forces occupied the village after heavy fighting. The Ukrainian army tried to regain control but has thus far been unsuccessful thanks to the Russian artillery superiority in the area.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

Pro-Kremlin forces falsified letter about Ukrainian casualties

On Ukrainian Independence Day, multiple pro-Kremlin Telegram channels and media posted a photo of a screen featuring a forged letter regarding casualties in the Armed Forces of Ukraine. The letter imitated a response from Valerii Zaluzhnyi, Commander-in-Chief of the Armed Forces of Ukraine, to Oleksiy Danilov, Secretary of the National Security and Defense Council. The forgery claimed that as of July 1, there were 76,640 dead, 42,704 injured, and 7,244 in captivity. This went against Zaluzhnyi’s claim that Ukraine has lost almost 9,000 soldiers.  

The letter was debunked by Hanna Maliar, Deputy Minister of Defense, alongside fact-checking NGO StopFake and the Center of Strategic Communications. First, the letterhead is incorrect, so Zaluzhnyi would not have signed such a document. Second, the letter features numerous grammatical mistakes that suggest crude translations from Russian. For instance, the word “оборони” (defense) featured the Ukrainian letter “і” at the end of the word. This letter is located at the same button on the keyboard as the Russian letter “ы,” which goes at the end of the Russian version of this word. And instead of using the official name of the Armed Forces of Ukraine, the colloquial term “Armed Forces” was used, which is not something that would have been featured in the official correspondence.  

This is not the first forgery to emerge from pro-Kremlin sources; the DFRLab has covered several similar cases. Notably, some pro-Kremlin sources acknowledged that the latest letter appeared fake, identifying problems with the letter while sharing it anyway. RIAFAN and several Telegram channels avoided featuring the letter but described it as genuine and indicative of the Ukrainian army’s weakness. Another channel rounded up overall casualties to “nearly 200,000” total losses, though provided no evidence to support it. The exact total of Ukrainian casualties remains unknown. 

Roman Osadchuk, Research Associate

Ex-head of Russian news aggregator launches alternative platform

Lev Gershenzon, the former head of Russian news aggregator Yandex.News, has launched a beta version of The True Story, an alternative service that reportedly will aggregate news content currently censored by Yandex.News. 

In an August 22 Facebook post,  Gershenzon stated that the goal of the new project is to illustrate the major events of a day and provide links to media and social media coverage. According to Gershenzon, The True Story “ranks stories, headlines, and external content, but the choice – where to read the details, whose opinion to believe, and which one to disagree with – always remains with the reader.” This way, he continued, users receive not just atomized news, but “the opportunity to look at the event from different angles.”  

The True Story is currently aggregating content from media outlets labeled as foreign agents in Russia and blocked by Russian state censor Roskomnadzor, including Current Time TV (Настоящее Время) and Radio Free Europe. 

The True Story’s about section highlights that it is independent and plans to hand over the tools for managing “their information bubbles” to individual users. The website indicates that the initial financial resources were provided by its founder and grants, and that the platform currently operates with the help of volunteers. In the future, it hopes to rely on financial support from users. The aggregator does not displaying advertising, arguing that ads “significantly worsen the user experience and make the service dependent on advertisers.”  

The True Story runs a Telegram channel, which was created on July 6 and became operational on August 21. At the time of writing, the channel had more than 4,000 subscribers. It shares news aggregated on The True Story website, with posts garnering an average of three to four thousand views.  

Lev Gershenzon was the head of Yandex.News from 2005 to 2012. Following Russia’s February 2022 re-invasion of Ukraine, he called the aggregator “a key element in hiding information about the war” and called on his former colleagues to quit and not to be “accomplices in a terrible crime.”  

According to the independent Russian investigative outlet The Insider, Yandex recently sold its news aggregator and Zen platform to Russian social network VK.

Eto Buziashvili, Research Associate, Washington DC

Occupying administration order “detaches” Zaporizhzhia from Ukraine

Yevhen Balytskyi, head of the Occupation Administration in the Zaporizhzhia Region, signed an order defining Ukrainian citizens arriving in the occupied area as persons seeking temporary asylum on the basis of Russian law. The order requires the registration of Ukrainian and Russian citizens based on their residence or place of arrival in areas occupied by Russia and requires the distribution of temporary IDs to all “non-citizenship persons.” The Russian occupation authorities classify all Ukrainians entering the occupied territories in the Zaporizhzhia region as “refugees running from persecution” in Ukraine.  

The order also identifies Ukraine as a separate country of which Zaporizhzhia is no longer a part. The wartime administration has effectively detached the region from Ukraine, violating international law and the human rights of the local population. 

Meanwhile, the Krasnodar regional administration published information about a program in which Russian authorities transferred over 1,000 Ukrainian children from Mariupol to Tyumen, Irkutsk, Kemerovo, and the Altai region, where Russian families had “adopted” them. The administration added that more than 300 children are still waiting to “familiarize themselves with their new families” and that citizens who decide to adopt these children will receive a one-time bonus from the state. The announcement was later removed but Internet users captured screenshots of it. 

The forced relocation of children is a violation of the Convention on the Prevention and Punishment of the Crime of Genocide.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

Far right and far left populist Twitter accounts in Italy gained traction by posting pro-Russian and anti-Ukraine position regarding death of Darya Dugina

According to a DFRLab analysis conducted using the social media monitoring tool Meltwater Explore, Italy was the top location of Twitter accounts using the hashtag #Dugina in reference to the death of Darya Dugina. Dugina was the daughter of Aleksandr Dugin, a Russian nationalist philosopher who developed the so-called “Russian World” ideology used by the Kremlin as an excuse to wage war against Ukraine.

Screenshot of top locations for the #Dugina hashtag on Twitter. (Source: @nikaaleksejeva/DFRLab via Meltwater) 

The top retweeted tweets in Italian that contained pro-Russian and anti-Ukrainian or anti-Western sentiment were posted by accounts representing Italian far-right and far-left populists. One account, @AsaDragan, used the popular fascist slogan “Dio, Patria, Famiglia” in his bio, while @Qua_Agatha expressed anti-migrant and anti-vaxx sentiments. The account @antonio_bordin often shared anti-Western sentiments and populist criticisms of Italian Prime minister Mario Draghi, as did the account @tutinodavide. AntiUkrainian sentiment was expressed by the account @francescocantin. 

Dugina died the night of August 20 in a car explosion that the Russian Federal Security Service (FSB) blamed on “Ukrainian special services” and a woman named Natalya Vovk, who they questionably alleged was a fighter with the Ukrainian Azov regiment, which Russia considers terrorist organization. At the same time, a Russian underground organization called the National Republican Army took credit for the car explosion, according to Ilya Ponamorev, a former member of Russian Parliament who voted against the annexation of Crimea in 2014 and went in exile to Ukraine.  

These developments come at a delicate time as Italians are slated to elect their next parliament on September 25, and represents the latest evidence that the country shows a substantial weakness to Russian disinformation and others forms of interference. Recently, former Russian President Dmitry Medvedev urged Italian voters to “punish” their government for “opposing Moscow” through the electoral ballot. This wasn’t the first time he has attacked Draghi’s government, nor the first instance of Russian interference in Italian politics. The Parliament’s Intelligence Committee (COPASIR), in a report published this August, explained that Italy “could be used as a “picklock” to force and weaken the Euro-Atlantic front. “Damaging the country can also weaken its projection in the wider Mediterranean, so as to favor the growing Russian strategic presence in Northern Africa, the Sahel and the Balkans,” the report suggested.

Nika Aleksejeva, Lead Researcher, Riga, Latvia

Mattia Caniglia, Associate Director, Brussels, Belgium

The post Russian War Report: Russian missile strike targets railway station appeared first on Atlantic Council.

]]>
Chinese discourse power: Ambitions and reality in the digital domain https://www.atlanticcouncil.org/in-depth-research-reports/report/chinese-discourse-power-ambitions-and-reality-in-the-digital-domain/ Wed, 24 Aug 2022 04:00:00 +0000 https://www.atlanticcouncil.org/?p=555866 The CCP has embarked on a concerted strategy to gain control over the global digital and information environment. Its goal: create an alternative global order with China at its heart.

The post Chinese discourse power: Ambitions and reality in the digital domain appeared first on Atlantic Council.

]]>

Executive Summary

As China’s military and economic power has grown, so has its ambition to shape global norms to suit its priorities. China believes that the United States currently dominates the international system, and sees growing Western opposition to China as evidence that the current order is now a threat to the continued security of the Chinese Communist Party (CCP). As such, China’s leadership has come to see its ability to reshape the international order—or, at least, to decenter US power within it—as essential to the party’s future.

China’s leaders have clearly articulated that they believe that Western countries, and especially the United States, have been able to exert global dominance because they possess what China terms “discourse power” (话语权): a type of narrative agenda-setting ability focused on reshaping global governance, values, and norms to legitimize and facilitate the expression of state power.

For the CCP, gaining discourse power translates into an ability to increase China’s geopolitical power by creating consensus around an alternative, China-led international order—one that privileges state sovereignty over civil liberties, and that subordinates human rights to state security. China has identified both the digital realm and the geographic regions of the Global South as arenas of opportunity in advancing its goals and gaining a discourse-power advantage over the United States.

China’s leadership has been transparent in outlining its goals for both gaining discourse power and implementing a strategy for doing so. Chinese government scholars believe that discourse power comprises two, mutually reinforcing components: the “power to speak,” or to articulate a coherent vision for the world order, and the “power to be heard,” or to have audiences have exposure to, and then to buy into, this message. This involves embedding cultural values within a system so that it comes to structure the relations between states—in both subjective terms (such as norms) and objective terms (such as rules and standards). To operationalize its strategies for gaining discourse power, China has embarked on a major restructuring of the party-state to ensure that the CCP Central Committee—the seat of CCP leadership, of which Xi Jinping is the head—retains direct oversight over the bodies responsible for carrying out China’s discourse-power goals.

Chinese official and academic writings also show that the CCP has come to see the digital arena as crucial in its discourse-power strategy, seeing the opportunities brought about by the Fourth Industrial Revolution as offering a chance to disrupt the hegemony of the West. As one Chinese government official wrote in July 2020, “technological changes in different periods throughout history not only bring about economic changes, but also affect changes in the global power structure […] The digital economy is prompting a reshuffle, and China has the opportunity to gain a first-mover advantage.” Beijing has made clear its intentions to command the digital world, announcing its aims to dominate advanced-technology manufacturing by 2025, to lead in international standards setting by 2035, and to become a “cyber superpower” by 2050.

As such, China has embarked on a concerted strategy to gain discourse power via the digital domain. It has done so through several mechanisms: by shaping local information ecosystems via social and digital media platforms, by promoting CCP-approved norms for digital governance and Chinese-developed international technical standards, and by offering the physical digital and Internet infrastructure on which these information ecosystems rely at an affordable cost, and with no conditions for how it is used.

China also sees the Global South as potentially more receptive to its norms and governance principles, and as an attractive market for Chinese digital-infrastructure offerings. China’s external propaganda narratives couch Beijing’s activities in the digital sphere as ultimately aimed at granting countries more power over the development and direction of their digital economies.

China has promoted the norm of “cyber sovereignty” (网络主权)—in China’s definition, the right of each country to exert total control over the Internet within its borders—in various international organizations, technical standards-setting bodies, and its commercial relations with countries interested in Chinese products and services. In its external propaganda messaging, China often targets audiences with narratives that erode the legitimacy of the liberal democratic framework and that resonate with local experience; for example, in the Global South, Chinese messaging on digital cooperation emphasizes a shared distrust of Western governments or a shared experience as “developing” (to use China’s term) countries.

In actuality, however, China’s strategy is less about a true attempt to make the digital world more inclusive, and more about supporting the Chinese government’s leadership goals. While boosting its economic growth and protecting its ability to exert political control domestically are two major goals of China’s promotion of cyber sovereignty, Beijing sees laying the necessary groundwork for gaining a discourse-power advantage over the West as another key objective. As Adam Segal puts it, “cyber sovereignty represents a pushback against the attempted universalization of [Western] norms [regarding privacy, free speech, access to information, and the role of regulation] that has become the default of the current operating system, as well as a reassertion of the priority of governments over non-state actors.”

China sees engaging in targeted messaging, and gaining support for its normative framework across various audiences, as better positioning it to gain the discourse power it sees as essential for reshaping the international environment in a way that better facilitates the expression of Chinese power. Additionally, China’s leaders fundamentally do not believe that the Chinese perspective can be “heard” unless they can make the soil fertile globally for their message to seed.

As such, China’s strategy around discourse power should not be understood as an attempt to turn the world into an authoritarian stage. China is clear in emphasizing its agnosticism with regard to the domestic political characteristics of the governments with which it engages. To this end, it is less important to China whether countries support “cyber sovereignty” because it offers them more freedom in determining their digital futures, or whether governments see support for this approach as an opportunity to clamp down on Internet freedoms. In either case, China gains discourse power by increasing buy-in for its vision of the global digital order, bringing it closer to achieving its aims of gaining a comparative advantage over the West.

Lastly, while China has advanced presence and strategy in standard-setting bodies, normative spaces, the digital information ecosystem, and the provision of physical infrastructure, the Western world’s approach has been more piecemeal and reactive. Notably, China is advancing much of this strategy through the very mechanisms the United States and its allies created to govern and shape a “free, open, secure, and interoperable” digital world. Chinese leaders have taken a bet on the West’s overconfidence in its systems and have built a relatively successful strategy of quietly shaping, repurposing, and encircling them to advance China’s discourse power. Any effort to counter this reshaping, therefore, relies on the democratic world reinvigorating its engagement in these spaces, more clearly defining mutually reinforcing industrial, commercial, and geopolitical strategies, and doubling down on creating a more geographically inclusive, multistakeholder, collaborative system.

The post Chinese discourse power: Ambitions and reality in the digital domain appeared first on Atlantic Council.

]]>
Russian War Report: Russia and Ukraine warn Zaporizhzhia nuclear plant facing imminent threat https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russia-and-ukraine-warn-zaporizhzhia-nuclear-plant-facing-imminent-threat/ Fri, 19 Aug 2022 16:06:49 +0000 https://www.atlanticcouncil.org/?p=557829 The Russian occupation of Ukraine’s Zaporizhzhia nuclear power plant continues to provoke fear among the international community in light of renewed shelling around the plant.

The post Russian War Report: Russia and Ukraine warn Zaporizhzhia nuclear plant facing imminent threat appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Russia and Ukraine warn Zaporizhzhia nuclear plant facing imminent threat 

Tracking narratives

Forged Kuleba letter asks Poland to name street after Stepan Bandera

Media Policy

Russia announces plans to build online system to detect prohibited content

War crimes and human rights abuses

Russian occupation administration conducts campaign of arrests in Kherson

International response

Russia and Turkey spar over alleged weapons contract

Ukrainians crowdfund Finnish satellite for armed forces

Russia and Ukraine warn Zaporizhzhia nuclear plant facing imminent threat

The Russian occupation of Ukraine’s Zaporizhzhia nuclear power plant continues to provoke fear among the international community in light of renewed shelling around the plant. Russian command in the area employs the facility for housing troops and military equipment, effectively using the plant as a shield against any possible Ukrainian attempt to retake the area. Ukraine and Russia have exchanged accusations about who is behind the shelling, both issuing warnings that the opposing side might attack the plant. 

Earlier this month, independent Russia-focused publication The Insider published a video in which Russian military trucks enter the territory of the nuclear power plant and unload cargo. The column of trucks reportedly arrived on August 2. According to the video, Russian forces are mining the territory around the nuclear power plant. The Insider also reported that about 500 Russian soldiers are stationed at the Zaporizhzhia plant, alongside military equipment, including armored vehicles, anti-aircraft installations, and equipment for radiochemical detection. New footage also emerged on August 18 showing military trucks inside the plant. 

Russia has accused Ukraine of preparing a “provocation at the Zaporizhzhia nuclear power plant” during UN Secretary-General Antonio Guterres’s visit to Ukraine this week. The Russian Ministry of Defense also claimed that the Ukrainian 44th Artillery Brigade from Nikopol would strike the Zaporizhzhia plant on August 19. No evidence was provided to support either accusation. Ukraine’s Energoatom, which oversees the country’s nuclear plants, has established a crisis headquarters to handle any possible incidents at the Zaporizhzhia nuclear power plant. Meanwhile, Ukrainian military intelligence issued a statement on Facebook on August 18 warning against a false-flag operation by Russia on August 19. 

Located in the city of Enerhodar, Zaporizhzhia is the largest nuclear power plant in Europe. Since March 2022, it has been under the control of Russian troops. The UN has urged Russia to withdraw troops from the nuclear power plant and to establish a safe perimeter. The pro-Russian administration of the Zaporizhzhia region has been silent on the subject. 

Meanwhile, the Ukrainian army continues to attack Russian forces along frontlines and occupied territories. A Russian base was reportedly destroyed in Amvrosiivka, Donetsk region, on August 17. On the same day, a Russian base in Lysychansk was also attacked. The Ukrainian government also admitted that it was behind recent explosions in Crimea. On August 16, reports arose of thick smoke and multiple explosions at Gvardeyskoe airbase in Crimea. On the evening of August 18, Russian air defenses stopped a Ukrainian drone attack in the Kerch area.  

In Kherson, the occupying Russian administration the telecommunication company Norma-4, which could signal an attempt to cut off residents of the region from the outside world. After Russian forces took control of Kherson’s internet in May, several service providers went dark as Russia rerouted internet traffic from Kherson through Russian networks. 

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

Forged Kuleba letter asks Poland to name street after Stepan Bandera

On August 16, the Russian Telegram channel Джокер ДНР (“Joker DNR”) published a forged letter falsely attributed to Ukrainian Foreign Minister Dmytro Kuleba. In the letter, Kuleba is portrayed as asking Polish authorities to rename Belwederska Street in Warsaw, where the Russian Embassy is located, to Stepan Bandera Street, after the controversial far-right leader of the Ukrainian Insurgent Army in World War II. The forged letter claims that changing the street name to Stepan Bandera street would be seen as a gesture of support for Ukrainians. The letter highlights that Russia changed the names of the streets in Moscow where the embassies of the United States and the United Kingdom are located. The letter is not dated, and Dmytro Kuleba’s signature appears to be copied from a publicly available letter signed by him in 2021.  

On August 17, the Telegram channel published another forged document, allegedly signed by Marcin Przydacz, Poland’s Deputy Minister of Foreign Affairs. The document contains several orders allegedly issued by Przydacz, including an order for the president of the Polish Institute of National Remembrance to provide a written expert opinion on the possibility of changing the name of the street in Warsaw “to honor the national hero of Ukraine Stepan Bandera.” It also proposes a campaign to increase the popularity of Stepan Bandera among Polish citizens. 

Marcin Przydac confirmed on Twitter that the document was a forgery. “The linguistic errors clearly point to the potential authors of this provocation,” he said.

The forged letter on the left was allegedly written by Dmytro Kuleba and the forged document on the right was allegedly issued by Marcin Przydacz. (Source: Telegram/archive, left; Telegram/archive, right)
The forged letter on the left was allegedly written by Dmytro Kuleba and the forged document on the right was allegedly issued by Marcin Przydacz. (Source: Telegram/archive, left; Telegram/archive, right)

The Joker DNR Telegram channel also published a post that contained screenshots of Facebook posts from the accounts of Polish nationals Piotr Górka, an expert in the history of the Polish Air Force, and Dariusz Walusiak, a Polish historian and documentarian. Górka has previously written a book that was published by the Institute of National Remembrance, the organization mentioned in Przydacz’s forged document. Górka’s Facebook post claims that he fully supports the Polish government’s decision to change the name of Belwederska Street to Stepan Bandera Street. At the time of writing, Górka’s Facebook account was no longer available.  

Dariusz Walusiak shared Górka’s Facebook post on the timeline of more than twenty Facebook users, including Adam Kalita, who works at the Krakow branch of the Institute of National Remembrance; Jan Kasprzyk, head of the Office for War Veterans and Victims of Oppression; and Alicja Kondraciuk, a Polish public figure living in Krakow. He also shared the post on Facebook groups. At the time of writing, Walusiak’s Facebook account was no longer available, but the DFRLab was able to archive Facebook posts before they disappeared.

Screenshot of post published by Piotr Górka’s Facebook account (left), screenshot of post published by Dariush Walusiak’s Facebook account (middle), and screenshots of Walusiak sharing Górka’s post on Facebook timelines. (Source: Facebook)
Screenshot of post published by Piotr Górka’s Facebook account (left), screenshot of post published by Dariush Walusiak’s Facebook account (middle), and screenshots of Walusiak sharing Górka’s post on Facebook timelines. (Source: Facebook) 

The Joker DNR Telegram channel frequently publishes documents that it alleges are “leaked.” Some of these documents contain personal information about Ukrainian soldiers. According to cybersecurity firm Mandiant, the Telegram account is a Russia-aligned hacktivist group with connections to another threat actor, Ghostwriter. The tactic of taking over social media accounts to push false or leaked documents is quite similar to Ghostwriter’s tactics. The DFRLab has previously reported on an information operation attributed to Ghostwriter in which social media accounts of Polish nationals were hacked to plant false information.  

The possibility exists that the owners of the Joker DNR Telegram account hacked the accounts of Górka and Walusiak, but the DFRLab is unable to confirm this. The selection of people the Walusiak account shared Górka’s post with indicates there may have been an effort to alert people who would have strongly opposed the “plan” to change the street name.

Givi Gigitashvili, Research Associate, Warsaw, Poland

Russia announces plans to build online system to detect prohibited content

Russian censor Roskomnadzor has allocated 57.7 million rubles (nearly USD $1 million) to launch the Oculus internet surveillance system for detecting “prohibited data” by mid-December, Russian outlet Kommersant.ru reported. 

According to the report, the surveillance system will be built on neural networks and will “analyze photos, videos and texts on websites, social networks and messengers for prohibited information, including homosexual propaganda and the manufacture of drugs and weapons,” Kommersant stated. 

The system is expected to have a capacity of analyzing 200,000 images per day, meaning that Oculus could be able to analyze two frames per second, Russian outlet RBC reported. Prohibited content that would be a subject to Oculus monitoring includes extremism and terrorism materials, calls for “illegal” mass gatherings, expressions of “clear disrespect” for the state and official symbols, and the “promotion of non-traditional sexual relations.”  

An unnamed source from “a large IT company” told Kommersant that the implementation of such a project under the suggested budget and timeline is “almost impossible.”  

The development of the Oculus system appears to the next step in Russia’s domestic internet surveillance and censorship toolbox.  

Eto Buziashvili, Research Associate, Washington DC

Russian occupation administration conducts campaign of arrests in Kherson

Reports of abuse and arrests are increasing in southern Ukraine territory occupied by Russia. Recently published reports and witness testimonies from the city of Kherson document Russian troops going door-to-door to search belongings, mobile phones, and documents. The Russian occupation administration arrests anyone it suspects of assisting Ukraine against the Russian forces in the region. 

Witness testimonies also show that the Russian administration holds civilians and members of the Ukrainian administration in basements, including the mayor of Kherson.

Ruslan Trad, Resident Fellow for Security Research, Sofia, Bulgaria 

Russia and Turkey spar over alleged weapons contract

Dmitry Shugaev, head of Russia’s federal service for military-technical cooperation, announced on August 16 that Turkey had signed a new contract to purchase a “second batch” of Russian S-400 anti-aircraft missile systems. Ismail Demir, president of Turkey’s Defense Industry Agency, which is responsible for procurement, was quick to deny the allegation. “There is no new development. According to the agreement made on the first day, the process continues, ” Demir said. The initial deal between Russia and Turkey was struck in 2017. 

An unnamed Turkish defense official also told Reuters that there were no new agreements. “The original contract that was signed with Russia for the purchase of S-400s already included two batches. The purchase of a second batch was included in the original plan and the related contract.”

Kremlin-controlled media outlets such as RIA Novosti, RBC, and Izvestiya reported on August 18 that Russia had started fulfilling the contract with Turkey by delivering the second batch of S-400 anti-aircraft missile systems. 

One day before Shugaev’s announcement, the Russian Minister of Industry and Trade, Denis Manturov, told Kremlin-controlled news agency Interfax that negotiations about the delivery of a “new batch” of S-400 anti-aircraft missile systems were “continuing.” 

Turkey, a NATO member state, purchased Russian S-400 anti-aircraft missile systems in December 2017. In response, the US prohibited the transfer of F-35 fighter aircraft to Turkey in 2019. Most recently, the US approved the sale of F-16 fighter jets to Turkey, after Turkey dropped objections to Sweden and Finland joining NATO. Kremlin’s media campaign about the “new” S-400 deal with Turkey may be an attempt to sow divisions among NATO member states.  

Nika Aleksejeva, Lead Researcher, Riga, Latvia

Ukrainians crowdfund Finnish satellite for armed forces

A Ukrainian foundation launched by popular TV host Serhiy Prytula announced on Thursday that it had signed a deal with Finnish satellite company ICEYE to purchase a radar satellite for the Ukrainian Armed Forces.

A crowdfunding effort launched by the Serhiy Prytula Charity Foundation raised USD $20 million in June to buy Bayraktar drones for the Ukrainian military. However, Turkish defense firm Baykar refused to accept the money and donated three military drones to Ukraine instead. Prytula said that after consulting with Ukraine’s Ministry of Defense, the charity foundation purchased a satellite with the money that had been raised for the Bayraktar drones. 

Eto Buziashvili, Research Associate, Washington DC 

The post Russian War Report: Russia and Ukraine warn Zaporizhzhia nuclear plant facing imminent threat appeared first on Atlantic Council.

]]>
Putin has forced Ukrainians to view Russian culture as a weapon of war https://www.atlanticcouncil.org/blogs/ukrainealert/putin-has-forced-ukrainians-to-view-russian-culture-as-a-weapon-of-war/ Mon, 08 Aug 2022 16:15:27 +0000 https://www.atlanticcouncil.org/?p=554548 Efforts to reduce Russia's cultural footprint in Ukraine have sparked criticism but in reality it is Putin who has weaponized Russian culture and forced Ukrainians to view the likes of Pushkin and Dostoevsky as tools of empire.

The post Putin has forced Ukrainians to view Russian culture as a weapon of war appeared first on Atlantic Council.

]]>
The Russian invasion of Ukraine has amplified the ongoing debate over Russia’s cultural presence in Ukrainian society and accelerated efforts to remove vestiges of the imperial past. Some Russian intellectuals have voiced concern over the targeting of Russian culture in Ukraine, with author Mikhail Shishkin going as far as to ask in a recent piece for The Atlantic whether a Ukrainian author would “speak up for Pushkin.”

This raises challenging questions regarding the separation of culture from politics and the role played by culture in Russian imperialism. With Russian troops occupying vast swathes of Ukraine and Russian President Vladimir Putin proudly declaring the return of “historic Russian lands,” is now the right time for Russian intellectuals to rally in defense of Pushkin?

Figures like Shishkin certainly have the right to speak out over perceived attacks on Russian culture in wartime Ukraine. Yet others also have the right to challenge the intent behind such statements. As Russia’s genocidal campaign enters its sixth month with no apparent end in sight, what message do famous Russian intellectuals wish to convey when they use their name recognition to focus on the preservation of Russian culture in Ukraine? Are they really tone-deaf to the centuries of imperial politics underpinning the formerly dominant position of Russian culture in Ukraine? Do they not see how Putin has weaponized Russian culture in his quest to rebuild the Russian Empire?

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Russia is committing genocide against the Ukrainian people and making no secret of the fact. On the contrary, the overwhelming physical evidence of war crimes in Ukraine itself is supported by an endless array of proofs from Russian officials and propagandists in Moscow that demonstrate clear and unambiguous genocidal intent.

Since the invasion began on February 24, testimonies of survivors who fled Russian occupation have made clear that Putin’s ultimate objective is to wipe Ukraine off the map. Russian troops are trying to achieve this criminal goal through a combination of mass murder, terror tactics, deportation and depopulation. Mass graves have been uncovered wherever Russian troops have been forced to retreat. The Ukrainian authorities have been overwhelmed with accounts of torture and sexual violence. Thousands of Ukrainian children have been forcibly relocated to Russia. Air raid sirens sound in nearly every region of Ukraine on a weekly or sometimes daily basis. Civilian buildings are frequently the target of missile strikes. Millions of Ukrainians have fled their homes. No part of the country is safe.

Meanwhile, Kremlin TV pundits routinely question the legitimacy of Ukrainian statehood and call for the forced “re-education” of Ukrainians to rob them of their Ukrainian identity. Officials declare that Ukraine “no longer exists,” while editorials in Russian state media confirm the invasion’s stated military goal of “de-Nazification” actually means “de-Ukrainianization.” Former Russian President Dmitry Medvedev, who the West once naively hailed as a liberal change-maker, now regularly posts deranged anti-Ukrainian messages on his Telegram channel alongside maps of Ukraine divided up among Russia and other neighboring countries.

Throughout occupied Ukraine, the campaign to erase Ukrainian identity frequently employs Russian cultural icons. For example, billboards featuring giant portraits of Pushkin have been erected in the occupied city of Kherson in southern Ukraine as part of efforts to promote Russia’s imperial claims. In such circumstances, it is only natural that Ukrainians would begin to view Russian culture as an extension of Russian military aggression and cling more fiercely to their national identity instead.

Several noted Ukrainian authors who wrote mostly in Russian until the invasion have underlined how the conflict has made it impossible to separate culture from politics.

One such example is Volodymyr Rafeyenko, who wrote Mondegreen, his first novel in Ukrainian, after fleeing his native Donetsk in 2014. As he explained in a recent piece for Literary Hub, he was fully prepared to be a bilingual author but everything changed following the start of the full-scale invasion in February. “Genocide, the murders of children and adults, rapes, torture, the destruction of churches and museums, kindergartens and schools. Beastly, ungodly cruelty. All of this will be closely connected with the Russian language. And nothing can be done about it. The Russian language in its entirety has become obscene, speech outside the bounds of decent human discourse. And these days, if I have to use it in some private communication, I always feel something like disgust mixed with shame, guilt and physical pain.” After February 24, Rafeyenko found himself displaced yet again due to Russian aggression when he and his wife were trapped in the occupied suburbs of Kyiv. Thanks to the help of friends, they were able to evacuate to the west of the country.

The daily brutality of Russia’s invasion has compelled many Ukrainian artists to call on the world to suspend any and all cooperation with the Russian cultural sphere for as long as the war continues. Critics like Mikhail Shishkin have argued that it is Putin and not Pushkin who is directly responsible for the crimes taking place in Ukraine. Many Russian liberals appear to find it incomprehensible that poetry and other forms of high art could be spoken of in the same vein as mass torture, kidnapping, rape, and murder. Such posturing is either conveniently shortsighted or intellectually dishonest. 

For centuries, Russian literature has played an important role in the shaping of negative imperialistic stereotypes about Ukraine. The country has routinely been depicted as a backward and inferior region of Russia that is incapable of self-rule and undeserving of statehood. One particularly notorious example is the infamous poem by celebrated Soviet dissident Joseph Brodsky entitled “On the Independence of Ukraine,” which was written during the breakup of the Soviet Union. In this vicious and vulgar poem, he uses a Russian ethnic slur to refer to Ukrainians and contemptuously declares that on their deathbeds, Ukrainians will forsake nineteenth-century Ukrainian national poet Taras Shevchenko in favor of Pushkin.

Brodsky’s poem sheds light on a painful truth that many in the West are still struggling to grasp. While Russian literary figures have traditionally been lionized by Western audiences as symbols of a freer Russia, their readiness to take a stand against the autocracy of the Russian state does not necessarily make them natural allies of the Ukrainian national project. Indeed, Ukrainians have long noted that Russian liberalism ends at the Ukrainian border.

None of this means that the tonedeaf words of Russian writers such as Mikhail Shishkin are tantamount to war crimes committed by the Russian army. However, understanding the nuances of Russian-Ukrainian relations should compel us to reexamine how the public sphere engages the topic of Ukraine. This is especially true in the context of ongoing Russian aggression and against an historic backdrop of Russian imperialism. Ideally, the current war should spark a fundamental shift in international perceptions of Ukraine and expose the folly of attempting to view the country through a Russian prism.

Russian artists, like Ukrainian artists, have been victims of the Russian state in its many ugly forms. Yet political oppression should not be confused with genocide. While Russian authors like Mikhail Shishkin sit in exile and mourn the loss of Pushkin statues in Ukraine, their Ukrainian contemporaries such as Oleh Sentsov, Artem Chapeye, Artem Chekh, Oleksandr Mykhed, Illarion Pavliuk, Stanislav Aseyev, Pavlo Stekh, Yaryna Chornohuz and many more have taken up arms to save their country from destruction. In the final analysis, it is their nation-building experience and not the fate of Pushkin that is the true story of this war. This is a story the world desperately needs to hear. 

Kate Tsurkan is a Ukraine-based American writer and Chief Editor of Apofenie Magazine.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Putin has forced Ukrainians to view Russian culture as a weapon of war appeared first on Atlantic Council.

]]>
Russian War Report: Russia minimizes Ukrainian damage of strategic bridge in Kherson https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russia-minimizes-damage-kherson-bridge/ Fri, 29 Jul 2022 15:01:34 +0000 https://www.atlanticcouncil.org/?p=551828 Russian downplays damage done by Ukrainian forces to a strategic bridge in Kherson while planning to annex occupied parts of Ukraine.

The post Russian War Report: Russia minimizes Ukrainian damage of strategic bridge in Kherson appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine—as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union—the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Russia minimizes Ukrainian damage of strategic bridge in Kherson

Tracking narratives

Ukraine’s security service claims to uncover Russian plan to annex occupied territories of Ukraine

Documenting dissent

VPN downloads surge in Russia as authorities crack down on Internet access

Russia minimizes Ukrainian damage of strategic bridge in Kherson

During a video speech on July 27, Ukrainian President Volodymir Zelensky stated that the Ukrainian military had disabled the Antonovsky bridge in Kherson to the point that was no longer usable by occupying Russian forces. The bridge has been targeted by Ukrainian forces for more than a week. While it remains standing, it has been hit multiple times by high-precision HIMARS munitions provided by the US.  

Kremlin-controlled news agency RIA Novosti initially reported the bridge was still “intact” and “all missiles were intercepted by air defense systems.” Later, the outlet cited Kiril Stremousov, the pro-Kremlin deputy head of occupied Kherson, who acknowledged that “traffic on the Antonovsky bridge is blocked.” Stremousov qualified his remarks to RIA Novosti by stating “a big part of the [Ukrainian] missiles were intercepted by the air defense system,” suggesting that not all Ukrainian missiles had been intercepted by Russia, as first reported by RIA. He also claimed without evidence that “American specialists” were manning the HIMARS systems rather than Ukrainians. Some hours later, RIA Novosti added that “specialists are studying the damage done to Antonovsky bridge” and that “the bridge will be restored.” Meanwhile, alternative means to cross the river like pontoon bridges will be used, Stremousov said

While the Antonovsky bridge has been damaged, it has not been destroyed, as some Kherson-based Telegram channels have suggested. According to local Telegram channels, Ukrainian Armed Forces began shelling the bridge on July 19. As the DFRLab reported last week, damage to the bridge can be corroborated by satellite imagery. On images provided by Planet.com, dated July 20 and July 27, dark spots of missile damaged can be seen; these spots were absent in a July 18 satellite image.

Satellite images of Antonovsky bridge in Kherson. The pink frames highlight damage done to the bridge. (Source: @nikaaleksejeva/DFRLab via Planet.com) 
Satellite images of Antonovsky bridge in Kherson. The pink frames highlight damage done to the bridge. (Source: @nikaaleksejeva/DFRLab via Planet.com) 

Screenshot from video documenting holes through the Antonovsky bridge. (Source: Insayder UA/archive) 

Screenshot of video showing bridge damage. (Source: Insayder UA/archive

The Antonovsky bridge is the main crossing point over the Dniepr River used to supply Russian occupying forces in Kherson. Destruction of the bridge is part of ongoing Ukrainian attempts to de-occupy Kherson.

Nika Aleksejeva, Lead Researcher, Riga, Latvia

Ukraine’s security service claims to uncover Russian plan to annex occupied territories of Ukraine

The Security Service of Ukraine (SBU) claimed to have exposed a Russian plan to annex occupied parts of eastern Ukraine. On July 26, the SBU stated that Russia had begun an active phase of preparing “a pseudo-referendum” on joining occupied Ukrainian territories with Russia. According to the statement, Russia plans to carry it out with the so-called Donetsk People’s Republic and rename the annexed Ukrainian territory “Greater Russia.”  

To prepare the ground for annexation, the USB stated, Russia planned to send Kremlin pundits to Russian-occupied territories to “spread propaganda in support of the pseudo-referendum [on joining Russia] and set up ‘polling stations.’” Concurrently, Russia would use Kremlin media “to reach more than 50 million viewers from Russia and eastern Ukraine with their propaganda about fake events.” 

The SBU published documents that supposedly revealed how Russia has prepared an appeal allegedly from local Ukrainian residents to the leadership of the occupation administration on the “accession” of the Donetsk region into Russia. The documents provided by the SBU are dated August 1, 2022, suggesting they were intended to be released later.

While the SBU claims cannot be independently verified, in recent days, various Russian actors on VK and Telegram, as well as fringe Russian outlets, have started to promote the propaganda slogan “For Greater Russia.” Some outlets boasted that for the last eight years, the Donetsk People’s Republic has defended Russia’s border, building a bridge between the region and Russia, and that Vladimir Putin was changing the world by taking over the region. Other fringe outlets suggested that when Russia defeats Ukraine, the creation of a “Greater Russia” will encourage the world to ally with Russia rather than the United States. Links to these narratives were spread by pro-Kremlin accounts on the Russian social network VK.

(Alexey Gumilyov, left; Горячая точка | Донецк | ДНР | ЛНР | Новороссия, center; ИнфоСоюз, right via VK)
(Alexey Gumilyov, left; Горячая точка | Донецк | ДНР | ЛНР | Новороссия, center; ИнфоСоюз, right via VK)

On Telegram, the channel Za Большую Россию (“For Greater Russia”) was created on June 27 and began activity on July 1. It currently has more than 2,800 subscribers. The channel shares narratives regarding Russia liberating Ukraine’s eastern regions, as well as information on issuing Russian passports for residents of the occupied territories. 

Eto Buziashvili, Research Associate, Washington DC

VPN downloads surge in Russia as authorities crack down on Internet access

On July 26, Russian media outlet RBC wrote that VPN services were downloaded in Russia six times more frequently in July than they had been in January, prior to Russia’s invasion of Ukraine. Since March, they reported, Russia has downloaded VPN apps more than any country besides India.  

More specifically, VPN services in Russia were downloaded more than 12 million times during first three weeks of July, compared to two million times in January. VPN download data was provided by the app market intelligence company AppMagic. According to Stanislav Shakirov, founder of Roskomsvoboda, a Russian NGO that protects digital rights of citizens, the VPN penetration rate in Russia is around 30%, proportionally similar to usage in China. VPN services allow Russians to bypass local restrictions preventing access to certain sites, as well as maintain their privacy on the Web. It is worth noting that the number of VPN downloads in Russia should not be equated with the number of new VPN users, as one user can download multiple VPN services. 

Google Trends analysis shows a significant spike in Russia-based user searches for “VPN” and the Russian equivalent “ВПН” at the beginning in March. Google Trends also showed that these keyword searches were most common in the cities of Moscow and Saint Petersburg, as well as Moscow and Kaliningrad oblasts.

A screengrab from a Google Trends query showing the relative increase in Google searches for “VPN” (blue) and ““ВПН” (red) originating from Russia. These show relative search volumes over time, and not specific volumes of searches. (Source: DFRLab via Google Trends)
A screengrab from a Google Trends query showing the relative increase in Google searches for “VPN” (blue) and ““ВПН” (red) originating from Russia. These show relative search volumes over time, and not specific volumes of searches. (Source: DFRLab via Google Trends)

The DFRLab used Meltwater Explore to track mentions of “VPN” and “ВПН” across multiple platforms and found that these keywords were mentioned more than 1,000 times per day on average between February 1 and July 25. Mentions spiked above 7,500 mentions per day following Russia’s February 24 invasion of Ukraine, then decreased over the course of March. 

Meltwater Explore search results show mentions of “VPN” and “ВПН” from February 1 until July 25, 2022. (Source: Meltwater Explore)
Meltwater Explore search results show mentions of “VPN” and “ВПН” from February 1 until July 25, 2022. (Source: Meltwater Explore)

Since the start of the invasion, Russia has tried to censor news about the war, blocking hundreds of foreign and Russian websites. On July 22, the VPN review website Top10VPN reported that Russia had blocked 2,633 websites since February 24, the majority of which were news websites.

Tables show distribution of websites blocked by Russian authorities by type and origin of websites. (Source: Top10VPN/archive.) 
Tables show distribution of websites blocked by Russian authorities by type and origin of websites. (Source: Top10VPN/archive.) 

It is worth underlining that Russia also tries to block VPN use in the country; at least 15 VPN services have been blocked so far. This, however, has not prevented Russians from using other VPN services to access the global Internet. In June, 2022,  Maxut Shadayev, Russian minister for digital development, communications, and mass media, argued that Facebook, Instagram, and Twitter accounted for 10-12 percent of all internet traffic in Russia prior to the invasion. After Russian authorities blocked these platforms, traffic decreased by 80 percent, he claimed. 

Givi Gigitashvili, research associate, Warsaw, Poland

The post Russian War Report: Russia minimizes Ukrainian damage of strategic bridge in Kherson appeared first on Atlantic Council.

]]>
Vogue diplomacy: First Lady Olena Zelenska is Ukraine’s secret weapon https://www.atlanticcouncil.org/blogs/ukrainealert/vogue-diplomacy-first-lady-olena-zelenska-is-ukraines-secret-weapon/ Thu, 28 Jul 2022 20:32:08 +0000 https://www.atlanticcouncil.org/?p=551783 Ukraine's First Lady Olena Zelenska has recently sparked debate by posing for a Vogue photo shoot with celebrity photographer Annie Leibovitz that some slammed as frivolous but others praised as a soft power masterstroke.

The post Vogue diplomacy: First Lady Olena Zelenska is Ukraine’s secret weapon appeared first on Atlantic Council.

]]>
Ukraine’s First Lady Olena Zelenska spent the early months of the Russian invasion far away from the limelight. She is now making up for lost time and has recently embarked on a high-profile US visit before hosting an international summit in Kyiv. While these initiatives have generated considerable publicity, Zelenska’s most eye-catching appearance has been in a photo shoot for Vogue magazine.

Zelenska’s Vogue portraits were taken by legendary photographer Annie Leibovitz, with the First Lady captured alone and together with her husband, Ukrainian President Volodymyr Zelenskyy. Leibovitz’s photos of Ukraine’s presidential couple are instantly iconic and have proved a viral sensation on social media. Zelenska’s appearance in Vogue has also sparked controversy, with some critics branding the decision tone-deaf at a time when the entire Ukrainian nation is fighting for survival.

Predictably, much of this criticism has come from Russia itself and from pro-Kremlin voices in the West, with numerous commentators pointing to Zelenska’s Vogue appearance as evidence that the scale of the war in Ukraine has been somehow exaggerated. Nor has the backlash been limited to Ukraine’s geopolitical adversaries. Many Ukrainians have also voiced their unease over the images, with some accusing their country’s First Lady of engaging in inappropriate PR.

These negative responses to Zelenska’s Vogue interview are understandable but short-sighted. Crucially, they fail to recognize the importance of keeping Ukraine in the international headlines and misunderstand the nature of Olena Zelenska’s role as the First Lady of a country that finds itself at war with a superpower. An attention-grabbing photo shoot with a global media brand is a smart move by Zelenska that plays to Ukraine’s strengths and enhances the country’s ability to punch well above its weight in the information war against Russia. At a time when scenes of death and destruction in Ukraine have lost the power to shock, she offers a compelling personal perspective that brings home the reality of the war to outside observers.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

The battle for global opinion is one of the most important fronts in the Russo-Ukrainian War. Ukraine’s ability to defend itself depends heavily on the continued flow of Western arms and money, which in turn can only be assured as long as public opinion throughout the democratic world remains firmly on Ukraine’s side. This cannot be taken for granted.

With Russia’s invasion now in its sixth month, a degree of Ukraine fatigue has already begun to set in and international media coverage of the war has noticeably declined. As attention turns elsewhere, Western leaders will find it more and more challenging to prioritize support for Ukraine or enforce sanctions measures that call for sacrifices from their own electorates.

Russia is well aware of this and is actively working on the information front to undermine Western resolve. Moscow’s clumsy initial efforts to portray the invasion as an anti-Nazi crusade have now been largely abandoned in favor of a subtler narrative that highlights the supposed futility of arming Ukraine while stressing the need to end the fighting. The Kremlin hopes this seemingly sensible message will resonate with jaded Western audiences and lead to mounting pressure on Kyiv to accept a compromise peace.

The consequences for Ukraine could be calamitous. Ukrainians are well aware that any ceasefire at this point would allow the Kremlin to consolidate its grip over regions in the south and east of the country that have been occupied since February 2022, while also potentially paving the way for the next stage of Russia’s campaign to extinguish Ukrainian statehood. This is why it is so important to keep the invasion in the news and underline the maximalist nature of Russia’s war aims. Zelenska’s Vogue appearance succeeded on both counts.

Even the most vocal of critics would have to concede that the Ukrainian First Lady’s Vogue portraits have attracted a lot of attention. This was achieved without resorting to sensationalism. On the contrary, Annie Leibovitz’s images are stunning yet authentic, capturing the emotional bond between Zelenska and her husband in a manner that also reflects the gravity of the circumstances and the life-changing experiences of the past five months.

Perhaps the most striking image of all features Zelenska seated alone on some steps inside an anonymous government building against a backdrop of sandbags that serves as a jarring reminder of the war. With elbows resting on knees, She stares straight ahead into the camera with an unaffected intensity that suggests both strength and exhaustion. It is a superb portrait that goes beyond traditional war reporting in its ability to communicate Ukraine’s deep trauma and the country’s remarkable resilience.

Zelenska is undeniably photogenic but her recent public appearances have allowed her to demonstrate that she is much more than just a pretty face. The Ukrainian First Lady clearly has much to say and uses her Vogue interview effectively to put the horrors of the Russian invasion into a relatable human context. “The first weeks after the war broke out we were just shocked,” she recounts at one point. “After Bucha we understood it was a war intended to exterminate us all. A war of extermination.”

As a wife and mother who has never courted publicity and famously preferred to remain backstage during her husband’s showbiz career, Zelenska enjoys a degree of authenticity that few politicians can match. This makes it possible for her to reach audiences that would be unlikely to engage with more traditional political messaging. She is now taking full advantage of this credibility to share Ukraine’s story with the outside world.  

Ukraine is hopelessly outgunned on the information front and cannot hope to match Russia’s resources. But while the Kremlin can count on multi-billion dollar budgets along with extensive networks of contacts and sympathizers throughout the ranks of the Western establishment, Ukraine has the priceless advantage of truth on its side. The key task now facing Kyiv is to keep Ukraine in the global spotlight and continue communicating with as wide an audience as possible.

If Ukraine can maintain current levels of public engagement and support, the country has a good chance of achieving an historic victory over Russia. In the potentially decisive battle to shape international opinion, First Lady Olena Zelenska may well be Ukraine’s secret weapon.

Peter Dickinson is Editor of the Atlantic Council’s UkraineAlert Service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Vogue diplomacy: First Lady Olena Zelenska is Ukraine’s secret weapon appeared first on Atlantic Council.

]]>
Ukraine’s tech excellence is playing a vital role in the war against Russia https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-tech-excellence-is-playing-a-vital-role-in-the-war-against-russia/ Wed, 27 Jul 2022 16:24:39 +0000 https://www.atlanticcouncil.org/?p=551024 Ukraine's tech sector excellence is playing a key role in the war against Russia by providing rapid solutions to frontline challenges in ways that the more traditional top-down Russian military simply cannot match. 

The post Ukraine’s tech excellence is playing a vital role in the war against Russia appeared first on Atlantic Council.

]]>
Russia’s invasion of Ukraine is now in its sixth month with no end in sight to what is already Europe’s largest conflict since WWII. In the months following the outbreak of hostilities on February 24, the courage of the Ukrainian nation has earned admiration around the world. Many international observers are encountering Ukraine for the first time and are learning that in addition to their remarkable resilience, Ukrainians are also extremely innovative with high levels of digital literacy.

This tech sector strength is driving the Ukrainian response to Russia’s imperial aggression. It is enabling the country to defy and in many instances defeat one of the world’s leading military superpowers. A start-up culture that owes much to Ukraine’s vibrant IT industry is providing rapid solutions to frontline challenges in ways that the more traditional top-down Russian military simply cannot match. 

The tech component of Ukraine’s battlefield success is perhaps not as surprising as it might at first appear. According to the 2022 Global Skills Report by Coursera, the country ranks among the global top ten in terms of technological skills.

This high position reflects the impressive progress made in recent years to support the growth of the country’s IT sector and to foster greater digital literacy throughout Ukrainian society. Since 2019, the Ukrainian authorities have prioritized digital skills and have sought to promote learning through the Diia.Digital Education online platform, which serves as an “educational Netflix” featuring courses conducted by experts and celebrities.

This approach appears to be working. The platform currently boasts a completion rate of 80% among those who sign up for courses. Nor has Russia’s invasion prevented Ukrainians from enhancing their IT skills. Around 60,000 Ukrainians have registered for courses since the start of the war, with the most popular topics being training for new tech sector professions, media literacy, and cyber hygiene.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Ukraine’s emphasis on digital innovation was shaping the country long before Putin launched his full-scale invasion on February 24. In 2021, Ukraine became the first country in the world to give digital passports the same legal status as physical passports for domestic use. Ukraine was the fourth European country to introduce digital driving licenses and also developed the world’s fastest online business registration service. 

Efforts to promote greater digitization continue despite today’s wartime conditions. This is recognized as important for the war effort and is also seen as an essential ingredient for Ukraine’s post-war recovery. I am convinced that tech-focused educational initiatives must remain a strategic priority for the country. By 2025, 85% of all occupations will require digital skills.

The Ukrainian authorities are currently supporting a project to train 5,000 internally displaced women for new careers in the creative and tech industries. There is clearly huge demand for such tech-related retraining opportunities, with the application process for the first phase of this initiative attracting around 36,000 candidates.

A pilot project to reform computer studies within the Ukrainian school system is also proceeding against the backdrop of the ongoing Russian invasion. The first stage will begin in September and will feature 50 secondary schools, before being scaled up to the entire country next year. Thanks to this project, an estimated four million Ukrainian schoolchildren will gain access to a state-of-the-art digital education.

Ukraine’s broader transformation into a genuinely digital state is continuing despite the disruption of the war. This progress is perhaps most visible in terms of the Diia.City project. Two weeks before the Russian invasion, Ukraine launched this special economic initiative offering some of the most attractive taxation terms in the world for tech companies. Ukrainian and international IT companies have continued to sign up to the Diia.City project since the outbreak of hostilities, with a total of 260 companies now registered. Clearly, they believe in Ukrainian victory and are confident about the country’s future development as a digital powerhouse.

Digital services have been launched to support those in the combat zone, allowing them to apply online for financial assistance. Likewise, the Diia mobile app allows anyone to financially support the Ukrainian military via a few clicks. Ukrainians can use the country’s digital platforms to report news of Russian military deployments in their localities and can submit digital reports detailing property damage.

The team at the Ministry of Digital Transformation is currently working with thousands of volunteers to wage a digital war against Russia on the information and cyber fronts. The ministry has initiated the creation of Ukraine’s very own IT army, which brings together specialists from Ukraine and other countries around the world. Today, this army consists of more than 250,000 IT volunteers participating in what is widely recognized as the world’s first cyber war.

Ukraine’s innovative use of technology is allowing the country to punch above its weight and defend itself against a much larger enemy. This experience will be studied for years to come as an example of how digital literacy and tech excellence can cancel out the traditional advantages of conventional military strength and transform the modern battlefield. The future of the world will be shaped by technology and today’s Ukraine is leading the way. 

Valeriya Ionan is Ukraine’s Deputy Minister for Eurointegration at the Ministry of Digital Transformation

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s tech excellence is playing a vital role in the war against Russia appeared first on Atlantic Council.

]]>
Investing in Ukraine’s brains is vital for the country’s post-war prosperity https://www.atlanticcouncil.org/blogs/ukrainealert/investing-in-ukraines-brains-is-vital-for-the-countrys-post-war-prosperity/ Sun, 03 Jul 2022 12:30:22 +0000 https://www.atlanticcouncil.org/?p=543734 International support for the development of Ukraine's education and tech sectors could hold the key to a strong and sovereign Ukrainian state once the current war with Putin's Russia is over, writes Gerson S. Sher.

The post Investing in Ukraine’s brains is vital for the country’s post-war prosperity appeared first on Atlantic Council.

]]>
In America’s recent USD 40 billion military and humanitarian assistance package for Ukraine, there was not a word about support for scientific research, higher education or industrial high-tech innovation in Ukraine. And yet these areas are absolutely vital if Ukraine is to be a sustainable, sovereign, and independent country.

For the past thirty years, Ukraine has experienced a massive brain drain of young, talented and dynamic scientific researchers, students, and innovators to the more attractive and lucrative laboratories and industries of Europe, Asia, and North America. This loss has been severely exacerbated by the current Russian invasion of the country. While there have been large-scale efforts to accommodate Ukrainian refugees in temporary positions abroad, it can be assumed that many will never return to their homeland.

It suffices to look to the wartime role of the Ukrainian IT sector to understand why advanced scientific research, education, and high-tech entrepreneurship are so essential to the country’s military and economic security. Since the outbreak of hostilities just over four months ago, young Ukrainian cyber warriors have stunningly upended expectations that Russian military and criminal hackers (which may be one and the same) would destroy Ukraine through cvber warfare.  

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Ukrainian science goes much deeper than cyber-defense. In materials science, physics, mathematical modeling, engineering and a range of other areas, Ukraine’s advanced scientific research has made a significant impact not only in terms of international scientific publications but also in the world of technology and commerce.

Importantly, the strength of Ukrainian science and technology is not limited to the civilian sphere and has historically been closely tied to defense production. The famed Paton Electric Welding Institute in Kyiv has not only conducted leading-edge research on metallurgy and welding; it was also a primary producer of Soviet tanks as well as special metals for submarines and aircraft. Ukraine must also venture in new directions in the life sciences, in part to research countermeasures to biological warfare as well as to prevent the spread of disease among farm animals.

Major restructuring is necessary in order to get the most out of Ukraine’s tech potential. Much like other countries throughout the former Soviet bloc, Ukraine has inherited Russia’s heavily top-down, bureaucratic and inefficient research system. The concept of the modern research university, combining advanced research and education at all levels and contributing to technological innovation through linkages with industry, is still largely absent in Ukraine. Due to the thirty-year post-Soviet brain drain, a very high priority must now be placed on the education of the next generations of Ukrainian scientists and engineers.

Other post-Soviet countries have realigned their research and higher education systems in diverse ways and to varying degrees. Reforms have gained some traction in Ukraine since the country’s 2014 Revolution of Dignity, but in most areas progress remains painfully slow.

In this light, the radical devastation of war presents both deep challenges and major opportunities. In the words of the seventeenth century English historian Thomas Fuller, as put to music by the Mamas and the Papas, “the darkest hour of the night comes just before the dawn.”

As of now, the humanitarian and reconstruction assistance agenda of the United States government is silent on directed support for Ukraine’s science and technology sector. There are multiple opportunities for USAID and others to make a difference. There are also multiple opportunities not only to fail through inaction or lack of vision, but also for US assistance to fall behind support from other sources such as the European Union.

It is time for the US government to wake up and realize that for Ukraine to enter the modern world of knowledge economies, action is required now. Even before major physical reconstruction is underway, or simultaneously with it, there is an urgent need to address the immediate financial crisis in Ukrainian science, directing short-term support especially to those young scientists remaining in Ukraine. It is also essential to strengthen and realign the Ukrainian research, higher education, and technological innovation systems to succeed in the world of economic competitiveness and global cooperation.

There is now an ideal opportunity to look at these key issues in a fresh light and take bold steps. Without such thought and planning, throwing money at the problem will not have a lasting impact. As a senior Ukrainian member of the RESET-Ukraine working group informally remarked, “We need to change the system. If you go back to the old system, nothing will change.”

Only willingness to engage in significant system change, the kind that will lift Ukrainian research, education, and innovation to standards and practices resembling those in Europe and elsewhere, will inspire the confidence needed in order for external funders to provide the higher magnitudes of financing necessary in order make a long-term and sustainable difference.

Direct assistance grants, support for Ukrainian STEM programs especially in higher education, and jump-start grants to small high-tech Ukrainian businesses along the lines of the US Small Business Innovation Research (SBIR) program can go a long way, dollar for dollar, toward ensuring the long-term economic health and vitality of a sovereign and independent Ukraine. But these efforts must go hand in hand with a blueprint for systemic change, one that works for all Ukrainian stakeholders.

That is why the US National Academies of Sciences, Engineering, and Medicine have created an informal working group called Rebuilding Engineering, Science, Education, and Technology (RESET-Ukraine) to work together with our Ukrainian colleagues to consider the best practices of other countries in realigning their national research systems for the twenty-first century. Our work is already underway. But such efforts cannot fully reach their potential unaccompanied by a clear commitment, first and foremost, from the United States and other governments to put material assistance in this field high on the agenda.

Gerson S. Sher is a retired civil servant and foundation executive whose forty-year career involved leadership of scientific cooperation with the countries of the former Soviet Union. He is the author of “From Pugwash to Putin: A Critical History of US-Soviet Scientific Cooperation” (Bloomington, Indiana University Press, 2019), and is co-chair of the US National Academies of Science, Engineering, and Medicine’s informal working group, RESET-Ukraine.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Investing in Ukraine’s brains is vital for the country’s post-war prosperity appeared first on Atlantic Council.

]]>
The 5×5—Cybercrime and national security https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-cybercrime-and-national-security/ Wed, 29 Jun 2022 04:01:00 +0000 https://www.atlanticcouncil.org/?p=541720 Five experts weigh in on emerging trends in cybercrime and their impacts on national security. 

The post The 5×5—Cybercrime and national security appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

From bank fraud to malware to romance scams, cybercrime is everywhere. The Federal Bureau of Investigation’s 2021 Internet Crime Report cited $7 billion in cybercrime-related losses, double the losses reported in 2019. The totality of these losses has a major impact on the US economy, in addition to the lives of affected individuals and businesses that may watch their bank accounts drained and confidential information stolen.

But cybercrime is far from a purely economic problem; real national security concerns are wrapped up in the issue as well. Just as cybercriminals learn from each other, state hacking groups learn from cybercriminals, and vice versa. Cybercriminal infrastructure and even cybercriminals themselves have been coopted by governments in the past, and there is evidence of states potentially acquiring tooling from the cybercriminal underground.

Cybercrime is, of course, not a uniquely US problem. Like with all forms of crime, cybercriminals seek to connect with and learn from each other. Criminal forums, marketplaces, group chats, and even Facebook pages are watering holes for this underground economy, allowing threat actors to adapt techniques to their unique environments and targeting all around the world. British fraudsters have targeted customers’ sensitive personal information online in order to commit tax fraud. Brazilian malware developers have manipulated electronic invoices issued in the country to their names. Financially-motivated threat actors have targeted Australian superannuation accounts.

We brought together five experts with a range of perspectives to weigh in on emerging trends in cybercrime and their impacts on national security. 

#1 How does cybercrime impact national security?

Marina E. Nogales Fulwoodglobal head – cyber external engagement, global response & intelligence, Santander Group:

“Cybercrime impacts national security in different ways, including by offering a fertile ground for organized crime and hostile nation states to obtain and launder illicit profits; threatening the economic stability of households, enterprises and governments; and, in some cases, disrupting supply chains and leaving critical sectors paralyzed. The paradigm shift ‘from online criminal activity to national security threat’ was bolstered by the recent ransomware attacks against Colonial Pipeline and Kaseya that prompted the classification of ransomware as a national security matter. The nationwide Conti ransomware attacks against Costa Rica’s public and private sector, and the country’s subsequent state of emergency declaration, is another clear example.”

Ian W. Graysenior director of intelligence, Flashpoint:

“To understand how cybercrime impacts national security, it is important to have a proper understanding of the motivations of cybercriminals and adversaries alike. There also may be substantial overlap with the tactics, techniques, and procedures (TTPs) employed by various threat actors, regardless of motivation. Cybercrime is often financially motivated. However, the same threat actors that are monetizing initial access to a network may also be selling that access to a state-sponsored adversary, whether they know it or not. State-sponsored adversaries may be employing proxies to deflect attribution attempts, thereby providing plausible deniability. The same TTPs that are often associated with less sophisticated cybercrime—social engineering, credential stealing malware, brute-forcing or credential stuffing—are also effective in state-sponsored attacks that can have a larger impact on national security.”

Matthew Noyescyber policy and strategy director, US Secret Service:

The views presented are his own and do not necessarily reflect the views of any agency of the United States Government.

“For over forty years, cybercrime has presented the risk of unauthorized access to national security information and associated information systems. Today, this risk is heightened by the growth of highly profitable transnational cybercriminal networks. These transnational criminal networks have both conducted and enabled highly disruptive cyber incidents that have impacted the operation of critical infrastructure and essential services. These criminal networks may serve as proxies for malicious foreign government activities or provide a degree of plausible deniability to foreign government security services for their own malicious cyber activities.”

Mario Rojascyber security and threat intelligence subject matter expert, Maltego:

“Cybercrime impacts our society on all levels, and national security is not exempt from the reach of cyber criminals, who target government agencies for financial gain, cyber warfare, or simply as a challenge. These cyber criminals undermine the security of our countries by attacking critical infrastructure such as hospitals, gas pipelines, and even military networks.”

Dmitry Smilyanetsprincipal product manager, Recorded Future:

“Espionage, attacks on critical infrastructure, account takeover (ATO) for government officials and employees, election meddling, and disinformation, are among the top threats to national security that I can see coming from the financially motivated actors.”

#2 Given limited resources, should counter-cybercrime efforts focus on a particular country/region or does the issue warrant a holistic approach?

Fulwood: “Cybercrime is borderless, and combatting it requires the widest level of international cooperation possible, encompassing stakeholders from government, law enforcement, and the private sector. As an example of this, most successful law enforcement counter-cybercrime operations have benefitted from internationally-coordinated frameworks, while many private sector companies have acquired a leading role in disrupting and providing investigative support to the public sector.”

Gray: “Holistic. Employing a fractured approach to countering cybercrime would have detrimental effects on developing internet standards. The globe is already interconnected, save for a few countries that choose to isolate in order to impact state control over internet usage. While certain countries are often associated with specific cybercrimes (like Russia and ransomware or China and intellectual property theft), it is vital that defensive efforts are implemented in a coordinated manner, even if attack vectors or objectives are varied. As a result, improving the defense of domestic networks, including strong public-private partnerships, is the best approach to countering cybercrime. This should be followed by building the capabilities of our multinational partners, including best practices and intelligence sharing.”

Noyes: “Resource allocation is the key question. Ross Anderson, et al. well captured it in a 2012 paper: “As for the more direct question of what should be done, our figures suggest that we should spend less in anticipation of cybercrime (on antivirus, firewalls, etc.) and more in response that is, on the prosaic business of hunting down cyber-criminals and throwing them in jail.” This analysis still holds up when you consider estimates of $1.75 billion in global spending on cybersecurity products and services, relative to the modest investments in law enforcement efforts and overall decline in fraud prosecutions. Transnational cybercriminal networks are global, and a wholistic approach is necessary to deter their criminal activity, reduce the profitability of their crimes, and successfully arrest and prosecute those that engage in these crimes.”

Rojas: “Governments and private institutions should cooperate, not only sharing knowledge and resources but also creating and supporting organizations to fight cybercrime and help educate the public.”

Smilyanets: “This decision should be made after the proper evaluation of risk is done, as well as the assessment of potential losses. Human life is first, but then, I believe the priority should be aligned with expectations of future damages.”

#3 What is an emerging cybercrime trend that we should be keeping an eye on?

Fulwood: “An emerging trend commonly observed is the symbiotic relationship that access brokers and ransomware groups enjoy. According to industry experts, in 2021, the average time between a network access offer and a ransomware group breaching the same company was seventy-one days. Therefore, closely monitoring access sales in underground forums and other channels used by cybercriminals can provide invaluable early-warning alerts for soon-to-be-breached companies.”

Gray: “The types of ways to steal someone’s identity have changed significantly over the last few years. Whereas username and password may have once been sufficient to gain access to an individual’s account and personal information, increased user awareness, multi-factor authentication, and cybersecurity have mitigated these types of attacks. The introduction of log shops that sell browser fingerprints, new methods of bypassing multi-factor authentication—like social engineering, SIM swapping, and more automated bypass methods like OTP bots, for example—all demonstrate the evolution of identity fraud that could result in account takeover.”

Noyes: “The growing illicit value transfer through the theft and illicit use of digital assets. Kevin Webach’s 2022testimony before the Senate highlighted this risk, stating, “When digital asset and DeFi firms demonstrate their inability to safeguard assets, and engage in behavior that suggests ill-intent or inconsistency, it should result in a drop in trust. The fact that many such firms, and the market as a whole, do not experience such a reaction, indicates that investors may not rationally be assessing risks. This could be a recipe for disaster.”

Rojas: “Supply chain attacks are an emerging threat that targets software developers and suppliers intending to access source codes, build processes, or update tools by infecting legitimate applications to spread malware. A great example of these attacks was the one that involved SolarWinds and affected thousands of customers, including government agencies around the world.”

Smilyanets: “Credential stealers such as RedLine, Vidar, and Raccoon pose a very serious threat to corporations, governments, and individuals. We see steady growth in that market as well as a strong correlation with ransomware attacks growth. 50 percent of ransomware attacks start from ATO of network access credentials previously compromised by information stealers.”

More from the Cyber Statecraft Initiative:

#4 What forms of cybercrime are impactful but do not get enough attention?

Fulwood: “While sophisticated and emerging forms of cyberattacks are widely reported by industry and news outlets, other types of cybercrime, like phishing, have been normalized. Despite its simple nature, phishing is a pervasive threat that every year yields countless economic losses.”

Gray: “Synthetic Identity Fraud (SIF). This crime involves leveraging legitimate personally identifiable information (PII) to create a false identity that can be used for several malicious purposes, including establishing lines of credit or committing financial fraud. During the COVID-19 pandemic, threat actors would leverage stolen PII to take advantage of the US government relief programs, like the CARES Act. Some agencies estimate that over $100 billion in taxpayer money was stolen by fraudsters stealing or creating fake identities to claim unemployment benefits from state workforce agencies. 

Attacks like ransomware and business email compromise (BEC) generally attract a lot of attention for their high payouts and business disruptions. However, “smaller” forms of fraud are more common and also generate major losses when employed en masse.”

Noyes: “More attention is warranted on BEC and similar fraud schemes, which are the economic foundation for transnational cybercriminals. While ransomware understandably gets significant attention due to its potential to disrupt critical infrastructure and essential services, the known and estimated financial losses to BEC and related cyber-fraud schemes are far greater. For example, in 2021 the Internet Crime Complaint Center received19,954 BEC complains with adjusted loss of $2.4 billion relative to 3,729 ransomware complaints with adjusted loss of $49.2 million.”

Rojas: “SIM swapping is a technique utilized by cybercriminals for diverse purposes, more recently to sidestep two-factor authentication solutions, granting them access to resources that otherwise would be out of reach; a passive reaction from service providers increases the efficacy of this technique.”

Smilyanets: “With every year, a digital identity becomes more and more valuable. The average internet user has approximately fifty passwords saved in his browser. Threat actors steal not just your passwords, but the browser’s fingerprints, and cookies with session tokens. That allows them to create synthetic identities, impersonate victims with high fidelity, and gain access to corporate infrastructure protected by multi-factor authentication.”

#5 How can the United States and its allies encourage cooperation from other countries on combatting cybercrime? 

Fulwood: “The United States and its allies can encourage cooperation by enabling more public-private collaboration and incorporating industry expertise in task forces and initiatives.”

Gray: “The relationship between international cybercrime, state-sponsored threat actors, and a burgeoning effort to establish coordinated and like-minded initiatives to thwart cybercrime, is quite complicated. However, existing international treaties like the Budapest Convention on Cybercrime, aims to establish a cooperative framework to combat cyber threats, and non-binding efforts like the Tallinn Manual, actively aim to address international legal issues when operating in cyberspace. Russia, meanwhile, has pushed back on the Budapest Convention and proposed its own Cybercrime Treaty to the United Nations (UN Resolution 74/247), broadening the definition of cybercrime and scope of their authority. Suffice it to say, it is extremely important for the United States and its allies to establish a firm understanding of the threat landscape and its shared security goals.”

Noyes: “Skillful diplomacy, public engagement, and coordinated application of various forms of sanctions and incentives have proven effective at fostering international law enforcement cooperation on a range of issues. Even when some states limit their cooperation, or actively interfere in the law enforcement activities of other countries, law enforcement agencies have proven effectiveness in apprehending persons and seizing assets when they are in cooperative jurisdictions. For example, consider the case of the arrest of Alexander Vinnik coupled with the shutdown and civil complaint against BTC-e, which was described as a major exchange converting ransomware payments from cryptocurrency to fiat currency. Enforcing the law in this manner not only helps to deter and disrupt transnational cybercriminals, but also reinforces norms of the rule of law, international stability, and encourages further international law enforcement cooperation.”

Rojas: “Sharing resources, tools, case studies, and white papers have proven invaluable for the private sector as cybersecurity professionals learn from those and can prevent and even disrupt the work of cybercriminals. Governments can also take advantage of these techniques to get other countries and organizations involved in the fight against cybercrime.”

Smilyanets: “Leading by great example in investigations and prosecutions will encourage partner states.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Scowcroft Center for Strategy and Security. He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

Liv Rowley is an assistant director at the Atlantic Council’s Cyber Statecraft Initiative.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Cybercrime and national security appeared first on Atlantic Council.

]]>
Roberts quoted in the Financial Times on Elon Musk’s Starlink as it relates to China https://www.atlanticcouncil.org/insight-impact/in-the-news/roberts-quoted-in-the-financial-times-on-china-and-elon-musks-starlink/ Tue, 21 Jun 2022 18:48:00 +0000 https://www.atlanticcouncil.org/?p=549176 On June 20, Dexter Tiff Roberts was quoted in an article, “Elon Musk’s Starlink aid to Ukraine triggers scrutiny in China over US military links,” in the Financial Times. In this article, Roberts argues that China will begin imposing restrictions on foreign companies as a consequence of the threat that Starlink is posing to Beijing.   […]

The post Roberts quoted in the Financial Times on Elon Musk’s Starlink as it relates to China appeared first on Atlantic Council.

]]>

On June 20, Dexter Tiff Roberts was quoted in an article, “Elon Musk’s Starlink aid to Ukraine triggers scrutiny in China over US military links,” in the Financial Times. In this article, Roberts argues that China will begin imposing restrictions on foreign companies as a consequence of the threat that Starlink is posing to Beijing.  

Read more about the author:

The post Roberts quoted in the Financial Times on Elon Musk’s Starlink as it relates to China appeared first on Atlantic Council.

]]>
White in CyberScoop on Russia and information operations https://www.atlanticcouncil.org/insight-impact/in-the-news/white-in-cyberscoop-on-russia-and-information-operations/ Thu, 16 Jun 2022 20:37:00 +0000 https://www.atlanticcouncil.org/?p=540749 "TJ" White was quoted in CyberScoop saying that the Russian focus on information operations has been unyielding. White, however, argued that Russian information war objectives have been thwarted to a large degree by Starlink satellite internet and by the fact that many Ukrainians have virtual private networks.

The post White in CyberScoop on Russia and information operations appeared first on Atlantic Council.

]]>

On June 16, Forward Defense nonresident senior fellow Timothy J. “TJ” White was quoted in CyberScoop saying that the Russian focus on information operations has been unyielding. White, however, argued that Russian information war objectives have been thwarted to a large degree by Starlink satellite internet and by the fact that many Ukrainians have virtual private networks. White remarked that, despite the centrality of information operations to the present conflict, the US defense community still lacks coherent definitions in this area.

“[W]e haven’t decided yet what is or isn’t information operations, information warfare, cyberspace operations, operations in cyberspace that enable information operations”

TJ White
Forward Defense

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post White in CyberScoop on Russia and information operations appeared first on Atlantic Council.

]]>
Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar https://www.atlanticcouncil.org/blogs/ukrainealert/vladimir-putins-ukraine-invasion-is-the-worlds-first-full-scale-cyberwar/ Wed, 15 Jun 2022 14:53:00 +0000 https://www.atlanticcouncil.org/?p=537587 The current Russo-Ukrainian War is a major milestone in our developing understanding of cyber security. It is now clear that the invasion unleashed by Vladimir Putin on February 24 is the world’s first full-scale cyberwar.

The post Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar appeared first on Atlantic Council.

]]>
Ever since the dawn of the Internet Age, the potential to weaponize digital technologies as tools of international aggression has been known. This was underlined by Russia’s 2007 cyber-attack on Estonia, which was widely recognized as the first such act by one state against another. In 2016, NATO officially recognized cyberspace as a field of military operations alongside the more traditional domains of land, sea and air.

The current Russo-Ukrainian War represents the next major milestone in our rapidly developing understanding of cyber security. It is now becoming increasingly apparent that the invasion unleashed by Vladimir Putin on February 24 is the world’s first full-scale cyberwar.

It will take many years to fully digest the lessons of this landmark conflict and assess the implications for the future of international security. However, it is already possible to draw a number of preliminary conclusions that have consequences for individuals, organizations and national governments around the world.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

The current war has confirmed that while Russian hackers often exist outside of official state structures, they are highly integrated into the country’s security apparatus and their work is closely coordinated with other military operations. Much as mercenary military forces such as the Wagner Group are used by the Kremlin to blur the lines between state and non-state actors, hackers form an unofficial but important branch of modern Russia’s offensive capabilities.

One month before the current invasion began, hackers hit Ukraine with a severe cyber-attack designed to weaken government structures and prepare the ground for the coming offensive. Critical infrastructure was targeted along with private data in a bid to undermine Ukraine’s ability to defend itself.

Again and again during the first few months of the conflict, we have witnessed the coordination of cyber operations with more conventional forms of warfare. On one entirely typical occasion, a cyber-attack on the Odesa City Council in southern Ukraine was timed to coincide with cruise missile strikes against the city.  

Just as the Russian army routinely disregards the rules of war, Russian hackers also appear to have no boundaries regarding legitimate targets for cyber-attacks. Popular targets have included vital non-military infrastructure such as energy and utilities providers. Hospitals and first responders have been subjected to cyber-attacks designed to disrupt the provision of emergency services in the immediate aftermath of airstrikes. As millions of Ukrainian refugees fled the fighting during the first month of the war, hackers attacked humanitarian organizations.

Individuals are also targets. Every Ukrainian citizen is potentially at risk of cyber-attack, with hacked personal data providing the Russian security services with opportunities to gain backdoor access to Ukrainian organizations and identify potential opponents or prepare tailored propaganda campaigns.

The scale of the cyber warfare currently being conducted against Ukraine is unprecedented but not entirely unexpected. Large-scale attacks began during the 2013-14 Euromaidan protests and initially enjoyed considerable success. This was followed by more ambitious attempts to hack into the Ukrainian electricity grid and spark power blackouts. Then came the Petya and NotPetya international cyber-attacks of 2016-17, which centered on Ukraine and caused huge global disruption.

It is clear that Russia’s current cyber offensive involves cybercriminals working in cooperation with military personnel while enjoying access to official intelligence data. This approach is relatively cheap, with cybercriminals often able to finance their operations using standard cyber fraud techniques. The idea of collaboration between the state and criminal elements is also nothing new. However, it is noteworthy that in this case, the state in question has a permanent seat on the United Nations Security Council. 

Perhaps the single most important outcome of the cyberwar so far is that we now have a much better picture of the enemy. We are able to see the threats posed by Russia and also assess Moscow’s limitations. Just as naval threats are countered by missiles and mines, cyber security is achievable given sufficient knowledge and resources.

Ukraine has come under unprecedented cyber-attack on a daily basis for more than a quarter of a year, but the Ukrainian authorities have managed to maintain basic utility services for the vast majority of the country. Even more striking is the fact that mobile communications and internet connection disruption has been minimal. In many instances, Ukrainians have been able to access online information while under Russian bombardment. 

One key lesson from the past few months is the need for everyone to take responsibility for their own cyber security. This applies to individuals and organizations alike. Neglecting cyber security risks creating weak links in wider systems which can have disastrous consequences for large numbers of people. Likewise, businesses should not rely on the state to take care of cyber security and should be prepared to invest in sensible precautions. This can no longer be viewed as an optional extra.

International cooperation is also vital for strong cyber security. Ukraine has received invaluable support from a number of partner countries while sharing its own experience and expertise. Much as the internet itself does not recognize national boundaries, the most successful cyber security efforts are also international in nature.

The Russian invasion of Ukraine has underlined the expansion of the modern battlefield to include almost every aspect of everyday life. The rise of the internet and the increasing ubiquity of digital technologies means that virtually anything from water supplies to banking services can and will be weaponized.

For years, the Kremlin has been developing the tools to carry out such attacks. The international community was slow to recognize the true implications of this strategy and is now engaged in a desperate game of catchup. The war in Ukraine has highlighted the military functions performed by hackers and the centrality of cyber-attacks to modern warfare. Restricting Russian access to modern technologies should therefore be viewed as an international security priority.

The Russo-Ukrainian War is the world’s first full-scale cyberwar but it will not be the last. On the contrary, all future conflicts will have a strong cyber component. In order to survive, cyber security will be just as important as maintaining a strong conventional military.

Yurii Shchyhol is head of Ukraine’s State Service of Special Communications and Information Protection.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar appeared first on Atlantic Council.

]]>
Don’t let digital authoritarians lead the way in connecting the world https://www.atlanticcouncil.org/blogs/new-atlanticist/dont-let-digital-authoritarians-lead-the-way-in-connecting-the-world/ Wed, 08 Jun 2022 19:15:23 +0000 https://www.atlanticcouncil.org/?p=534538 The democracies of the world aren't stepping up enough to connect billions of unconnected people. Here's what they can do.

The post Don’t let digital authoritarians lead the way in connecting the world appeared first on Atlantic Council.

]]>
Expanding internet access to the nearly half of humanity that’s currently unconnected is critical not only for economic and social development, but for national security and the future of democracy. Yet it’s largely not the democracies of the world stepping up to connect those billions of people—it’s digital authoritarians.

Consider China: Through its “Digital Silk Road,” Beijing is spending tens of billions of dollars to build the internet abroad, with the China Development Bank often financing the purchase of equipment from Chinese-owned, -backed, or -affiliated companies. For instance, Huawei alone reportedly controls 29 percent of the global market for network equipment. If the status quo continues, most new internet users will take their first online steps into a state-controlled, authoritarian-inclined digital landscape. At each step in this journey—from the fiber they use to connect to the hardware and the software they use once online—their data will feed Chinese firms that have few qualms about supporting Beijing’s authoritarian agenda. 

Not only is China increasing its control over critical infrastructure and enhancing its surveillance capabilities, but it is also expanding its sphere of influence. For many governments interested in expanding internet access and growing their digital economies, Chinese financing is often the only option. In Africa, for example, Chinese investment in information and communications technology (ICT) infrastructure surpasses spending from African governments, Group of Seven (G7) nations, and multilateral agencies combined. Despite the fact that virtually all democracies have interests that are threatened by the expansion of authoritarian control over internet infrastructure, the democratic world hasn’t come up with a compelling alternative to Chinese financing.

US President Joe Biden’s Build Back Better World initiative and the European Union’s Global Gateway strategy both aim to mobilize development and private capital to invest in infrastructure in low- and middle-income countries. But neither of these initiatives is expected to provide enough resources or funding needed to counter China’s digital ambitions—or enable the types of community-focused connectivity providers that can best connect the unconnected. If democratic leaders want to meaningfully tackle digital divides in a way that promotes openness, democracy, and human rights online, the world needs substantially more money and new strategies to connect the hardest-to-reach people. 

Financing the digital future

Failed efforts to close the gap have largely been a result of the false belief that the free market will deliver ubiquitous digitalization. But with more than twenty-five years of opportunity, and hundreds of billions of dollars in government subsidies for domestic expansion, it’s clear that traditional telecom operators alone will not connect everyone. Time and again, these operators have created broadband deserts and practiced modern forms of digital “redlining,” or leaving behind communities they deem too poor or too remote to be sufficiently attractive to connect.

I co-founded Connect Humanity, a fund to accelerate digital equity, out of a steadfast conviction that it’s possible to change the way broadband is built in order to connect everyone. We know how to connect people; it’s not a complex technical challenge. There are a plethora of viable operating and business models, and community connectivity providers—a collection of municipal networks, community networks, cooperatives, and other smaller and social ventures grounded in their communities—have already shown remarkable progress in connecting people in areas that have previously been left out. 

In South Africa, Zenzeleni, a community-owned wireless service provider, offers affordable and reliable internet access to rural residents at the same speeds as those in the country’s urban centers. In Mexico, Rhizomatica is profitably connecting underserved rural indigenous communities. The most affordable broadband in the world is arguably a municipal network in Ammon, Idaho, which offers residents lightning-fast 1GB upload and download speeds for less than ten dollars per month.

These are the types of operators that can lead the world toward universal internet access, connecting the hardest-to-reach communities and often delivering better service at much lower prices. That’s because they’re maximizing value for the communities they serve, not far away shareholders. But they frequently turn a profit, and nearly all struggle with access to capital.  

A Global Fund for Digital Equity

Most of these networks are too big for microfinance and philanthropy and too small for the huge loans offered by development-finance institutions, international aid, and commercial banks. Even when these connectivity providers have projects big enough for the latter, communities must often overcome discrimination or a lack of understanding from investors who are accustomed to working with traditional operators and don’t yet understand that other models are better-placed to provide internet for some communities.

A Global Fund for Digital Equity, led by an alliance of democratic countries, could fill this capital gap by providing the right types and sizes of support—primarily in the form of long-term, low-interest financing—for the community connectivity providers that have repeatedly proven able to connect the unconnected. There is precedent for such a fund in both enterprise funds and green banks; in both models, government funds have underwritten financial institutions dedicated to spurring the development of strategic but underserved markets. These funds have returned the principal to the governments while enabling new communities of entrepreneurs to emerge and flourish. Loans and credit guarantees from the US Development Finance Corporation (DFC) provide another useful model.

In addition to significant amounts of money, there is an urgent need for intermediaries that can disburse grants and loans in the sizes, structures, and blends tailored to the target communities and the operators serving them. Root Capital, for instance, has leveraged DFC credit facilities and guarantees to distribute $1.6 billion to small farming businesses across the Global South to improve the lives of more than ten million people in farming families, and has generated $4.6 billion in economic activity. Similar structures and intermediaries will be key to achieving digital equity for all.

The need to expand internet access to everyone—in a way that offers viable alternatives to China’s funding and vision for the internet—has never been clearer. The future of democracy, human rights, economic opportunity, and national security may all depend on it. But this demands that democracies of the world get off the sidelines, commit significant resources, and support the community-based models that have proven successful for connecting the unconnected. Will they step up, or continue to allow digital authoritarians to shape the online experience of billions of people?


Jochai Ben-Avie is a nonresident fellow at the Atlantic Council’s Digital Forensic Research Lab, the co-founder and chief executive of Connect Humanity, and a Truman National Security Fellow. A version of this post was published on Connect Humanity’s blog.

The post Don’t let digital authoritarians lead the way in connecting the world appeared first on Atlantic Council.

]]>
360/OS Contested Realities | Connected Futures day 2 round-up https://www.atlanticcouncil.org/content-series/360os/360-os-contested-realities-connected-futures-day-2-round-up/ Wed, 08 Jun 2022 00:16:35 +0000 https://www.atlanticcouncil.org/?p=534267 All the highlights from the second day of the Digital Forensic Research Lab's 360/OS event in Brussels.

The post 360/OS Contested Realities | Connected Futures day 2 round-up appeared first on Atlantic Council.

]]>
The second and final day of the DFRLab’s annual 360/Open Summit event—and all of the captivating discussions—has come to a close. If you missed the day’s events, below you will find short recaps of each session. You can find coverage of the first day here.

In conversation: Audrey Tang and Laís Martins

The second day of 360/OS began with a discussion between Taiwanese Digital Minster Audrey Tang and Persephone Miel Fellow Laís Martins. Tang likened harsh crackdowns on online spaces to COVID-19 lockdowns. Instead, governments should strive to create “vaccines” that prevent viral disinformation, she said. The most effective “vaccine” to counter disinformation is to empower internet users and promote digital literacy. Informed users are less likely to believe and share disinformation.

Panel | Election integrity in a digital world

The next session featured a conversation about how disinformation threatens democracy and what strategies can ensure elections remain fair and balanced. The discussion was moderated by Julia Brothers, senior advisor at the National Democratic Institute. She was joined on stage by Vukosava Crnjanski, founder and director of the Center for Research, Transparency, and Accountability (CRTA); Caio C. V. Machado, director of Instituto Vero; Anis Samaali, an electoral observation expert with the European Centre for Electoral Support; and Ellen Weintraub, commissioner of the US Federal Election Commission. Civil society organizations and citizen observers who independently assess elections require better access to Facebook ads data, said Samaali. They need to be considered real stakeholders because they are the ones who maintain the integrity of elections.

Panel | Investing in a secure, democratic digital future for all

Next up, Jochai Ben Avie, co-founder and chief executive of Connect Humanity, moderated a discussion about the need to improve connectivity around the world and the dangers of China spearheading telecommunications networks in the Global South. Panelists included Catalina Escobar, co-founder and chief strategy officer at Makaia; Mark Gitenstein, the US ambassador to the European Union; and Malavika Jayaram, the executive director of Digital Asia Hub. The United States can’t match the contributions China makes in Global South infrastructure, said Gitenstein, but with more input from private businesses, progress could be made. However, Escobar noted that many of the “big investors” are putting money into high-end tech products, like the metaverse, which will only widen the gap between the connected and unconnected world.

Transcript

Jun 7, 2022

These organizations are on the front lines of internet equity—and countering China’s influence

By Atlantic Council

Will democracies make the investments in digital equity needed to expand access to health and education, political participation, and economic opportunity?

Civil Society Cybersecurity

Panel | Democracy game changer: Ending violence against women online

The first panel of the afternoon discussed the consequences of toxic online environments preventing women from being able to participate in political life. Moderator Moira Whelan, director of democracy and technology at the National Democratic Institute, led a conversation with Tracy Chou, CEO of Block Party; Nighat Dad, executive director of the Digital Rights Foundation; Helena Mølgaard Hansen, deputy tech ambassador in the Office of Denmark’s Tech Ambassador; and Amalia Toledo, lead public policy specialist at Wikimedia Foundation.

New Atlanticist

Jun 7, 2022

Digital violence is the number one barrier to women participating in public life. Here’s how to start fixing it.

By Nick Fouriezos

Just 16 percent of women in politics said they received a timely and effective response to escalations of digital violence. It’s time to fix that, say panelists at 360/Open Summit.

Africa Europe & Eurasia

Panel | The Digital Services and Markets Act package: What happened, and what comes next?

Next, representatives from the European Commission’s Directorate-General for Communications Networks, Content and Technology (DG Connect) spoke with Kate Klonick, assistant professor at St. John’s University School of Law. Having helped craft the Digital Service Act and Digital Markets Act, Prabhat Agarwal, head of the Digital Services and Platforms Unit at DG Connect, and Gerard de Graaf, director of digital economy and coordination at DG Connect, shared their insights on the support they received for their proposals to hold platforms more accountable. They said that the acts would see multi-layer enforcement involving not just state regulators but also civil society actors as agents of change.

Transcript

Jun 7, 2022

The EU Digital Services Act and Digital Markets Act could become global models, say the bills’ drafters

By Atlantic Council

Two of the leading Digital Services Act and Digital Markets Act drafters talk about the future of the policy package—and how citizens will be key to helping bring about transparency and accountability online.

Civil Society European Union

Keynote | In conversation: Secretary Antony J. Blinken and Maria Ressa

A collaboration between the DFRLab and RightsCon saw US Secretary of State Antony Blinken interviewed by Nobel Peace Prize recipient, journalist, and founder of Rappler Maria Ressa, with opening remarks from Rob Berschinski, special assistant to US President Joe Biden. They discussed the role of governments in protecting human-rights defenders online, and the use of technology and information in crises. Making major news, Blinken announced that the United States will become the chair of the Freedom Online Coalition for the first time. He called for capacity-building measures for global actors in order to combat the threat from mis- and disinformation. Meanwhile, Ressa stressed that the next few years are crucial for the survival of democracy and what is urgently needed is a positive, affirmative, and democratic vision of technology in the twenty-first century.

Transcript

Jun 7, 2022

Blinken on protecting human rights online: It’ll take ‘day-in and day-out vigilance’

By Atlantic Council

Secretary of State Antony Blinken joins Maria Ressa for a conversation on stopping democratic backsliding online at 360/Open Summit.

Civil Society Cybersecurity

Introductory remarks from Acting GEC Coordinator Leah Bray

As the threat of malicious foreign interference in domestic affairs becomes more significant with each passing day, Leah Bray, the Acting Coordinator at the Global Engagement Center (GEC) under the US Department of State shared the work done by the Center. With virtually no barrier to entry, state and non-state actors now have the means to inject deception and confusion into the nervous system of society on a scale and rapidity that eclipses anything seen before, Bray said. Focusing on how Russia has weaponized technology against the world, Bray said that disinformation has become a staple of Russia’s geopolitical strategy.

Panel | Influence operations in a hyperconnected world

The next session discussed how influence operations and threat actors recycle strategies and narratives across different parts of the world. Panelists included David Agranovich, director of global threat disruption at Meta; Alicia Wanless, director of the Partnership for Countering Influence Operations at the Carnegie Endowment for International Peace; and Min Hsuan Wu (aka “Ttcat”), co-founder and CEO of Doublethink Lab. Lizza Dwoskin, Silicon Valley correspondent at the Washington Post, led the panelists through a conversation that called on platforms to confront their own role in protecting users in different cultural contexts. They all agreed that the answer lies in transparency and open data sharing through regular operational reports that are made available to governments and the public alike.

Transcript

Jun 7, 2022

The war in Ukraine shows the disinformation landscape has changed. Here’s what platforms should do about it.

By Atlantic Council

Panelists at the 360/Open Summit discuss whether information threats like malign foreign influence or disinfo-for-hire firms are becoming more diffuse.

Civil Society Cybersecurity

Lightning talk | Remarks from Baiba Braže

As Russia continues its military campaign in Ukraine, Baiba Braže, assistant secretary general for public diplomacy in NATO’s Public Diplomacy Division, shared how informational threats have forced NATO to adapt and engage in new ways. Regardless of how Ukraine wins its war of liberation, “we face a new reality,” she said. During her remarks, she stressed the need to defend NATO’s values in the digital space, adding that the open-source research field is at the forefront of defense in our information spaces. Recognizing that no government can individually address the threats, she said that NATO is bringing the trans-Atlantic community together to develop common standards.

Panel | How sovereign hammers are fracturing the internet, and what democracies can do about it

In the final session of the conference, Kat Duffy, nonresident fellow with the DFRLab, moderated a discussion about fractures in global policies about the internet and what that means for the world. She was joined by Kenton Thibaut, DFRLab resident China fellow; Usama Khilji, executive director of Bolo Bhi; and David Frautschy, senior director for European government and regulatory affairs at Internet Society. All panelists agreed on the importance of digital sovereignty for national security. Highlighting the role of China and Russia, Thibaut said that where China seeks to transform the system, Russia seeks to disrupt it. Khilji noted that products built for censorship were being made in Western democracies and exported to repressive regimes. With more and more countries taking inspiration from each other in digital authoritarianism, the solution lies in reinvesting, doubling down, and innovating on how to support multi-stakeholder engagement.

360/Open Summit 2022: Contested Realities, Connected Futures.
June 6-7, 2022

360/Open Summit 2022

360/Open Summit is DFRLab’s annual, flagship event that convenes global policymakers and journalists, activists and advocates, and industry representatives for two days of cutting-edge programming.  

The post 360/OS Contested Realities | Connected Futures day 2 round-up appeared first on Atlantic Council.

]]>
These organizations are on the front lines of internet equity—and countering China’s influence https://www.atlanticcouncil.org/news/transcripts/these-organizations-are-on-the-front-lines-of-internet-equity-and-countering-chinas-influence/ Tue, 07 Jun 2022 21:11:41 +0000 https://www.atlanticcouncil.org/?p=534046 Will democracies make the investments in digital equity needed to expand access to health and education, political participation, and economic opportunity?

The post These organizations are on the front lines of internet equity—and countering China’s influence appeared first on Atlantic Council.

]]>
Watch the panel

360/Open Summit: Contested Realities | Connected Futures

June 6-7, 2022

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) hosts 360/Open Summit: Contested Realities | Connected Futures in Brussels, Belgium.

Event transcript

Uncorrected transcript: Check against delivery

Speakers

Mark Gitenstein
Ambassador of the United States to the European Union, US Mission to the EU

Catalina Escobar
Co-Founder and Chief Strategy Officer, Makaia

Malavika Jayaram
Executive Director, Digital Asia Hub

Moderator

Jochai Ben-Avie
Co-Founder and Chief Executive, Connect Humanity

JOCHAI BEN-AVIE: Good morning, good afternoon, good evening wherever you are. Thank you for being with us.

My name’s Jochai Ben-Avie. I am the co-founder and chief executive of Connect Humanity—we are a fund to accelerate digital equity—and, as you heard, a nonresident fellow at the Atlantic Council’s DFRLab.

Let’s start with a sobering truth. Even under the most generous accounting, three billion people lack access to the internet. That number from the ITU, which you might hear sometime, counts anyone who has used the internet at least once in the last three months. When you add people who don’t have reliable access, the number goes up. When you count people who don’t have high-speed access, that number goes substantially up. When you add people who can’t afford the internet, the number goes way up. When you add the people who lack the digital literacy to meaningfully use the internet to improve their lives, the number goes even higher still. And estimates that cannot—estimates of the cost to connect everyone range from $428 billion to in excess of 2.2 trillion dollars, and committing those funds has never been more important.

During the pandemic, we’ve seen just how important the internet is, sometimes painfully so, right? Those numbers hide the fact that what we’re talking about is kids being able to go to school. It’s about folks being able to work remotely and provide for their families, to engage with their communities, to talk to their doctor and find access about the vaccine, to participate in democracy, and so much more. What we have is a world where billions of people are falling further behind just by staying where they are.

Connect Humanity, the organization I’m privileged to lead, was started by a group of colleagues who came together by the overwhelming feeling that it doesn’t have to be this way. We generally know how to connect the unconnected. That’s not the hard part. And we generally know that traditional telecom operators—your AT&Ts and Vodafones of the world—have not and will not connect everyone. It’s simply not in their business model to do so. It’s not a problem the market is going to solve.

And so at Connect Humanity we focus on nontraditional operators—the sort of community networks, cooperatives, municipal networks, smaller operators—folks who are more grounded in their communities, often community-owned, who have different business models and different incentives. But most of these communities and most of these operators struggle nearly universally with access to capital. They’re often too big for philanthropy and microfinance and too small for direct foreign investment, international aid organizations, and commercial bank loans. Our existing funding mechanisms, simply put, have a much easier time funding a large company to build a billion-dollar submarine cable than to give a million dollars or even a hundred thousand dollars to an underserved community.

And even for the many governments of the world who are looking to connect their people, there are few choices. Indeed, often the only choice for the governments who want to invest in connecting their people is Chinese financing. In Africa, Chinese investment in ICT infrastructure surpasses spending from African governments, G7 nations, and multilateral agencies combined. Chinese financing often comes with Chinese vendors and construction companies, Chinese hardware, Chinese software, and Chinese control. For many if not most of the world, their first online steps will be on Chinese infrastructure owned by Chinese-controlled operators, with all that data available to the Chinese government. In doing so, China’s expanding not just their surveillance capabilities but also their influence over vast swaths of the world.

A huge part of this is through the Chinese Belt and Road Initiative, and at least 146 countries are currently receiving support from China through the Belt and Road Initiative. And as we’ll hear from our panel today, this raises real challenges for democracy, human rights, economic opportunity, and ultimately national security. And I should add that at a time when climate change is increasingly being recognized as a national-security threat and network equipment produces as much carbon-dioxide emissions as the airline sector, we must also think about the energy resources that will be used to connect the other half of the world.

And whether it’s climate change or awareness raised by the pandemic about the need to expand reliable, affordable access to the internet, the democratic world largely has not come up with a compelling answer to Chinese money—with democracy, human rights, economic development, and national security hanging in the balance.

And with that, let me bring in our panel. I’m joined today and honored to be joined by US Ambassador to the EU Mark Gitenstein; Malavika Jayaram, the executive director of the Digital Asia Hub; and Catalina Escobar, the co-founder and chief strategy officer of Makaia.

Let’s start with Catalina. I know it’s late for you. Appreciate you being here with us today. Your organization, Makaia, has been doing great work to connect the unconnected and underserved communities across Colombia, especially in formerly FARC-controlled territories. Maybe you can set the stage for us by describing what internet access in Colombia has meant for the peace and reconciliation process, economic development, and political participation. And why is it that a nonprofit organization like yours is connecting people and not the large telecoms in your country?

CATALINA ESCOBAR: Well, hi, everybody. Jochai, thank you for the introduction and for having me here. Also, hi to my fellow panelists.

It’s very great to be here. Actually, it’s not late. It’s early in the morning. It’s 4:30 in the morning, so. I’m based here in Medellin, Colombia, but super excited to be virtually here.

So, to answer your question, so a little bit of background. So Makaia is a nonprofit organization created and based here in Colombia. We have been up and running for sixteen years and our purpose is to build capacities for social development using technology and innovation.

So why did we end up doing a connectivity project in the peace zones in Colombia? So we actually have worked in two of the municipalities that have been determined to be essential for the peace process in Colombia. But the reason why we ended up doing connectivity is because, I mean, at the beginning it wasn’t like, oh, let’s do our connectivity project in these two municipalities. The reason why it ended up there is because we wanted to do a technical support process for coffee growers in those municipalities. So the purpose was not connectivity itself; the purpose was to bring tech capacities, digital skills to coffee growers. We started in one of the peace zones. So it started as a—as a digital skills project.

When we went to the zone in the first visit—I actually went to that first visit—we realized that it was impossible to do a digital skills and tech capacity project because there was no connectivity. And when I say no connectivity, it’s like no connectivity at all. Our cell phones didn’t work when we were visiting the coffee growers. So we sort of had to go back to the basics and said, OK, what are we going to have to do here?

We were super fortunate that the funder was flexible, because when funders are not flexible these type of unexpected circumstances are very difficult to manage. And the funder was Lavazza Foundation—Lavazza, like the coffee company—because they wanted to engage coffee growers more and better into their value chain. So we went to Lavazza and we say, hey, there’s no connectivity; we need to start from the basics. And they said, OK, do whatever you have to do. So I think that there’s one lesson learned, and it’s that funder flexibility is super important in these type of projects.

So I guess—so we ended up connecting five coffee farms and some schools using TV white spaces. The legislation had recently passed in Colombia, so it was like a really, really good moment to do a pilot using TV white spaces.

And I think another lesson is that it was connectivity with a purpose. It wasn’t connectivity just for providing connectivity; it was connectivity to improve the quality and the efficiency of the coffee value chain. So we were connecting coffee growers to teach them about prices; about quality; about how to engage with Lavazza, which is their final purchaser of the coffee; and things like that.

And then we replicated this project in another peace zone, in another peace municipality in Colombia. And I can talk more later about the small cooperatives that are starting to provide internet access.

JOCHAI BEN-AVIE: Wonderful.

CATALINA ESCOBAR: But going back, Jochai, to your other question, why do—large telecoms don’t engage? Actually, our first thought was let’s go to the telecoms and ask them to bring internet access to these municipalities. It was not possible. After many conversations, we realized that for them—basically, that the answer from them is there is no market. And when they just say that, it sort of closes the door for any possible future conversations. And that’s why we are so aligned to the Connect Humanity purpose, that small operators, cooperatives, coffee-grower cooperatives are really the solutions for these isolated communities around the world.

So that’s why a nonprofit ended up doing a connectivity project, because we needed connectivity for a specific purpose. And now it’s been transferred to local, small cooperatives that are doing the connectivity. And as I said, I can talk more about that later.

JOCHAI BEN-AVIE: Thank you, Catalina. I appreciate it.

And I think this really emphasizes, again, how it’s not just network operators who can build the internet, right? It is—you know, people search the internet not for connectivity’s sake, but to improve their lives. And so we see coffee growers who are developing their own internet networks to meet their needs, often where the market won’t otherwise solve for that problem.

To continue our sort of scene-setting, Mr. Ambassador, maybe I can turn to you. During your time as ambassador in Romania, you supported some extremely successful civic tech programs. Could you share a bit about what happened and why, and how important the internet was to those efforts?

MARK GITENSTEIN: Well, thank you, Jochai.

First of all, I want to give credit to your partner, Chris Worman, who helped me come up with this idea. But it was 2010. I came to Romania as US ambassador in 2009 with a mandate to deal with the issue of anticorruption and rule of law, which is still a problem in Romania but there’s been tremendous progress—primarily, by the way, because of its membership in the EU. It’s one of the reasons I wanted this job. So it’s late 2010. The Arab Spring had just started. About a couple of months before that, I had seen something very surprising in Romania. By the way, the infrastructure in Romania for the internet was actually pretty good. But social media was just emerging in Romania, and I became aware of the fact that the fastest-growing Facebook market probably in the world, certainly in Europe, was in Bucharest. But the other thing is around that same time there had been an activist nongovernmental-organization-sponsored event countrywide in Romania. It was actually designed to clean up the trash on a single day, and they got hundreds of thousands of Romanians on the street in a single day.

So I thought, watching what was happening in the Arab Spring where social media drove a lot of activism, I said, why can’t we do this with anticorruption in Romania? And into my office popped Chris Worman, who was then running TechSoup Romania, which we can talk about later if you want. TechSoup’s a great organization that focuses on many of these issues. And I told him, I said, why can’t we have a MoveOn.org in Romania that’s focused on anticorruption? He says, well, here’s an idea. Let’s find some money. Turned out there was ninety thousand dollars available—just shows you how a small amount of money can have a huge impact—in one of our accounts at the embassy. And he says, why don’t we do what he called a competition. And so we sent out a communication to almost every activist in Romania. Before it was over—it turns out within a couple of weeks we had reached 1.2 million Romanians out of eighteen—there’s only eighteen million people in Romania. That was pretty remarkable.

And they came back, and the idea of the competition was give us an idea for how you can use social media to fight corruption. It came back with 150 ideas, and then we had a conclave of and had a voting system where if you were invited you got to vote on the best ideas. We narrowed it down to ten ideas, and then we had a vote, and I think we funded five ideas. And between the cost of the—of the—of getting everybody to Bucharest—paying for their travel, et cetera—and the money, we had maybe ten thousand dollars for each of these internet websites, which in Romania was a lot of money. And one of those—they were all very successful, but one of them you may have heard of. Funky Citizens is a great organization that has since become one of the most important activist organizations in Romania. I think one-third of all people online are on the Funky Citizens website.

And after I left in 2012, I learned that not only did they create their own MoveOn.org—it’s called Click It, I think, or Click On; it has 1.2 million people online in 2017—you may have read about this—there was an effort by the new majority party to undo all of the work we had done on anticorruption. And through this organization, between Click It and Funky Citizens, they got six hundred thousand people on the street in Bucharest—it was on the front page of the Wall Street Journal—and they basically reversed what happened—what was happening in Romania. And it was all spontaneous. But we built—what we did is we built social-media capability to fight corruption and it’s had a huge impact.

By the way, Funky Citizens—I just learned this this morning; Elena Calistru, who runs Funky Citizens, had mentioned this to me, but I was stunned by it—within two days of the war, they raised six hundred thousand dollars online, which in Romania is a huge amount of money. They sent fifteen semis full of food and help into Ukraine and they have moved out tens of thousands of refugees just through that organization with Sean Penn’s organization.

So here ninety thousand dollars, and that’s what we were able to do with ninety thousand dollars, a small amount of money, using infrastructure. Now, the Arab Spring didn’t turn out so well—but it certainly served as a good model.

JOCHAI BEN-AVIE: Maybe I can ask you about another model. I mean, this is—I think really demonstrates the power of civil society and civic tech, but really only possible in a country with ubiquitous access.

MARK GITENSTEIN: Yeah.

JOCHAI BEN-AVIE: And you know, I know Chris and you have spoken about sort of the role of the SEED Act in helping to sort of catalyze that kind of investment in Eastern and sort of Central Europe. I wonder if you could speak briefly about what the SEED Act is/was and sort of the role it played, and then we’ll—

MARK GITENSTEIN: Yeah. I can’t remember what the actual letters mean, by the SEED Act, I can tell you what it—it was passed in 1989. I actually just researched the legislative history coming over in the car just now. It was passed in 1989. It’s back in an era when there really was bipartisan collaboration in the Senate, unlike today. And I actually read through the debate.

By the way, Biden then was the chairman of the European Affairs Subcommittee of the Foreign Relations Committee. It was his substitute that actually passed the Senate, and it had two big elements in it that were very relevant. One, it was designed to provide money to Central and Eastern Europe—this is right after the wall came down—for things like social media and internet—the internet was in its infancy in those days—but also money for what was known as enterprise funds. And enterprise funds were, in effect, venture capital funds created in each—initially in just Poland and Hungary, and then expanded to all of Central and Eastern Europe. And these funds were designed to fund, in effect, tech companies, but other enterprises.

One of the companies that they funded in Romania was Bitdefender. I don’t know if you know what Bitdefender is, one of the top cybersecurity companies in the world now. That money, in turn, when the money came back into the venture fund, was used to fund a foundation. That’s where Chris is today; he’s on the board of that foundation. And so that’s become—and this happened throughout Central and Eastern Europe. The most successful, actually, was in Poland, where they actually created equity markets, powerful equity markets which are driving democracy and free markets in Poland. And it’s now happening in Romania.

So the SEED Act was a small amount of money that was put in each of these countries to fund private-sector but also public-sector, but very targeted and focused on capacity building. By the way, the ninety thousand dollars was SEED Act money. So it’s an incredibly smart investment by the US in both free markets and democracy capacity building.

JOCHAI BEN-AVIE: Thank you, Mr. Ambassador. I think that’s a fascinating model and one we can learn from, and I think also speaks to the type of flexible funding that Catalina was speaking of earlier. It’s a model that I wish we would see more of, you know, in—from democracies around the world.

MARK GITENSTEIN: Can I—can I just add something to that? The reason it worked is because Romanian activists were making the decisions. They were not being made in Washington. Very important.

JOCHAI BEN-AVIE: I think that’s essential, right? I think it’s about empowering local communities to be, you know, in control of their digital futures, and we need to always be keeping that in mind as we think about funding these kinds of efforts.

Speaking of people who are not thinking about that, you know, to the extent that any nation is really investing the billions if not trillions of dollars that it’s going to take to connect everyone, frankly, it’s China. Which brings me to our final speaker, Malavika. I was wondering if you could hopefully comment on sort of: What is the scale of China’s investment in global internet infrastructure, and how does that fit into the country’s broader geopolitical strategy? And how worried should we be about this from a national security and human rights perspective?

MALAVIKA JAYARAM: Thanks, Jochai. Thanks, Rose and everyone else, for having me here.

This is a really contested and polarizing topic, so I’m really glad we’re discussing it here. Even in the framing of the question, you go straight from mentioning China to going to what does this mean for human rights, right? So the fact that those two things are so intimately tied I think makes this a really important conversation.

On the question of scale, I mean, you can look this up and find all kinds of data on, you know, Wikimedia and all of the interwebs, so I’m not going to bore you with statistics. But I think qualitatively when we think of scale you’ve all heard of what’s now the Belt and Road Initiative, what was formerly known as One Belt, One Road. And I want to bring that up first because I think even the name change is really significant when it comes to understanding China’s political ambitions.

There was criticism—even though it literally translates, you know, from Mandarin from “yidai yilu,” which is One Belt, One Road—even though that’s the literal translation, there was this sort of PR job done to it which assumed that the idea of thinking of it as a singular idea—a singular belt, a singular road—was problematic both as a narrative but also as an actual fact because there will be five roads, there will be many belts, many roads. So I think moving away from the idea of the singular was also very powerful because it was implying that there is something pluralistic about this idea, there is some kind of element of inclusion attached to this, and it wasn’t China trying to capture the single road or the single narrative but that it was open to influence, it was open to negotiation, it was open to conversation and dialogue. And so it was felt that this would be a much better name for the initiative, so Belt and Road was less contested.

And I think that’s also interesting because even the word “initiative” implies that it’s a work in progress, right? It implies that it’s not fully baked, it’s open to what partners want. And the thing that’s very compelling—I mean, you can have all kinds of statistics about, you know, 100 and countries—180 countries have signed deals, it affects so many countries, so many places already have infrastructure, but I think what’s very compelling is this narrative that pushes it into the context of a trade war, right? You’re bringing it into the context of a competition not just between competition for who provides infrastructure and funds it, but a competition around ideas and ideologies, right? Do you go the American, human-rights-respecting, freedom-oriented approach, or do you want the authoritarian Chinese, human-rights-violating approach—which, as all binaries are, is a very reductive, terrible way to start, but that’s often how it’s seen, right? And I think you’ll find the truth might be somewhere in the middle or it may be skewed a little closer to one side.

But despite the fact that it’s a very binary narrative, you’ll see a lot of stuff about: Why is China buying up all the ports? Why is Sri Lanka, you know, now in thrall to global debt-trap diplomacy? Why is China using Trojan horses to enter Europe? Or Macron saying roads are not a one-way street, right, or words to that effect, that it’s a two-way thing?

So you still have these very emotive, very powerful narratives that pitch the Chinese effort as sort of, you know, dead on arrival, which belies the actual influence it has in the region. And I think that’s particularly dangerous because in an era when there’s a lot of love of strongmen in Asia, a lot of love for dictators, a lot of feeling that, you know, we need to stand up to countries, especially as America’s power in the world is seen as a little diminished relative to what it used to be. I mean, nature abhors a vacuum. Apparently, so does China, right? It sees an infrastructure deficit and says: Why don’t we go plug that gap? America is involved with internal affairs, domestic politics, not so outward-looking as it used to be—or at least so goes the narrative, which we can dispute—why don’t we go and plug this gap and actually start building out infrastructure that America currently isn’t interested in, Europe isn’t interested in, right? They’re busy drafting the GDPR. Why don’t we just go and, like, flout data-protection policies around the world and build out this infrastructure? So I think that’s kind of the context in which we’re seeing this.

I also want to point out a couple of other things, which is that we act as if surveillance is the monopoly of a country like China, except that as we’ve been talking about throughout this conference it isn’t, right? We have the term “surveillance capitalism” as being one of the most-touted words we use today. That’s a very American phenomenon. It’s very linked to a particular economic model, a very particular political ideology. You don’t have surveillance authoritarianism. You don’t have surveillance neocolonialism or neoimperialism, right? So the fact that surveillance as a business model is so closely tied to a Silicon Valley approach, to capitalistic ideas around data extraction/exploitation, I think we need to sort of name the fact that it’s not an us versus them. Surveillance is an endemic problem the world over.

Having said that, to what extent do backdoors that China might provide or Chinese telecom companies provide or the fact that the data is available for the mothership to view, to what extent does that—to the second part of your question—to what extent does that affect human rights? And I think that is a very, very grave danger. We’ve seen with, you know, the hacking of the African Union headquarters, entirely built and financed by China, and so many other examples that the idea of, like, ET phoning home is not, you know, something in the movies; it actually happens. So I think that risk is inherent.

And I think the other risk that’s really, really important is the extent to which civil society is placed under personal physical risks even to work in this space—to advocate for inclusion, to advocate for connectivity, even just connecting coffee growers, right, when there are political interests at snuffing out coffee growers and handing over that land to powerful, you know, property barons. So I think the idea of data infrastructure surveillance capabilities is very, very real, and the extent to which we don’t adopt infrastructure, you know, and be agnostic to the sort of social construct in which it’s built, the politics in which it’s embedded, I think that’s really key to understanding what China’s trying to do here.

JOCHAI BEN-AVIE: Absolutely.

I want to pick up on the point, though, you raised about the idea that the perception that the US and the EU are more focused on domestic concerns at the moment and in that void we are seeing China and other authoritarians step in. It’s not just China, although, obviously, massive compared to anyone else. Ambassador Gitenstein, Secretary Blinken recently called China, quote, “the most serious long-term challenge to the international order.” In the face of this kind of massive investment, these kind of partnerships with apparently 180-some countries, you know, and in doing so that increase in influence, of—you know, of surveillance capability, of control over the online experience of billions of people, what is the US government’s approach to countering the Chinese government in the internet-infrastructure space?

MARK GITENSTEIN: Well, first of all, picking up on a point that both of you just made about the investment in Belt and Road, 146 countries I think you said? Yeah.

JOCHAI BEN-AVIE: A hundred fifty-six.

MARK GITENSTEIN: A hundred fifty-six. Well, if you took the names of those countries and laid them against the last UN vote, I’ll bet you it’s almost completely coterminous. That tells you part of the answer.

I mean, remember what that vote was on. It was—there were two votes, actually. One was on sanctioning the Russians, you know, publicly for what they had done on Ukraine, and the other was on the Human Rights Council. The notion that Russia could sit on the Human Rights Council when they’re murdering people in Bucha is appalling. And yet, many of the recipients of that money voted against us. And what—if you count up all the population in those countries, 60 or 70 percent of the world actually disagrees with us on what’s happening on our position on Ukraine. What does that tell you?

And you know, it’s not simply an issue of democracy versus autocracy, which my friend the president likes to use—I use it myself—but it’s rule-based order, as that great diplomat in Kenya points out. You know, if boundaries are no longer sanctified, if they’re no longer respected, any country in the world is subject to being basically taken over by the neocolonialists. And to be a little demagogic here, the real colonialists in the world right now are the Russians and the Chinese. They’re doing what the Europeans did in the nineteenth century. They’re buying countries, taking over countries. And the Belt and Road Initiative is not some—done out of the kindness of Xi’s heart; it’s done to take control of these countries and the narrative in these countries and to counter the democratic and humanitarian interests of the West and the Europeans and the United States. And it’s extremely dangerous.

And what is the United States doing? Not enough, that’s all I can tell you. I think, you know, I would like to see the Global South to be at least where Romania was when I got there in 2009, which means an independent infrastructure in the internet, and I don’t know if that’s possible right now. I think we’re never going to match—you know, I’ve seen the numbers—ten billion dollars, twenty billion dollars, thirty billion dollars spent by the Chinese alone in the Global South or in Africa alone. We’re not going to match that. But maybe if the private sector gets engaged and we take the issue more seriously at every mission in Africa with every US ambassador, which we’re not doing right now, it would have an impact.

JOCHAI BEN-AVIE: We’re going to run out of time on this panel, unfortunately. I feel like we could talk about this for hours.

And so maybe we can close by asking what would it look like. What would—if you could wave a magic wand to really help meet the sort of funding need that exists here—as I say pretty much every day, connecting the unconnected is an incredibly capital-intensive business. And so I wonder, maybe Catalina first to you, you know, if you could wave a magic wand to help support folks like yourself who are connecting communities that the markets and governments have often sort of left behind, what kind of support do you need?

CATALINA ESCOBAR: Thank you. I think there’s—I’ve been thinking a lot about this, and I think there’s two things.

I think one is, like, I don’t know if this is the right word in English, like demystifying the access issue. Because, for example, here in Colombia people believe that everybody’s connected because, yes, the big cities and the main municipalities are connected. So I think that demystifying this, that everybody’s connected. So talk more, advocate more about all the unconnected people.

The recent report from the Alliance for Affordable Internet talks about a topic that I really like, and it is the meaningful connectivity. So it’s not just having people connected, but with the adequate device, with the adequate skills, and all the capacities to really, really take advantage of the connectivity. In Colombia, it’s 26 percent, so only 26 percent of the people have meaningful connectivity. But when you go to the Ministry of the ICT or you go to the—to the telecoms, they believe that everybody’s connected. So we need to talk more about the unconnected.

And the other thing that I feel that we need, of course, is funding, but funding for the fundamentals, because it seems like digital skills are not attractive enough for the—for the international community, and people think that youth are digital natives. But, yes, they could use technology, but are they using it for the right things and for the right reasons? So I think that we need to demystify a lot of things.

And the other thing about funding—and I’m going to finish with this—is that we seem to be living, like, in two worlds. So it’s like when you talk about funds, it seems like the big investors are trying to put their money in the Metaverse and in other, like, super high-technology solutions, but that is just going to be increasing the gaps because there is this whole investment around the super-high-end technologies that is needed but we can never forget the other end of the world that has no connectivity, no skills, no knowledge.

So I would summarize it, Jochai, in those two things: a lot of advocacy and funding for the fundamentals—digital skills, digital access that needs to—needs to be on the agenda again because it seems to be out of the agenda lately.

JOCHAI BEN-AVIE: Sounds like you have a lot on your wish list, Catalina, but I think that—

CATALINA ESCOBAR: Yes, I do.

JOCHAI BEN-AVIE:—demonstrates the complexity of this topic.

We’re going to run out of time in just a few seconds at this point, but, Malavika, maybe final word sort of responding to what would you like to see if you had that magic wand. What would you do?

MALAVIKA JAYARAM: I think I would like to see people in the Global South treated as equal collaborators and participants in their own futures, like you mentioned—not as victims to be saved by someone else, not as, you know, passive people, not as recipients of largesse that someone else decides somewhere far away—and actually help design the products, the solutions, the services that they need. So I think that that’s kind of biggest on my wish list.

But I think the last thing is also that we need to look at how people actually use the internet after it’s been provided. We often see connectivity as a destination, and once the connection’s been switched on it’s like, OK, we’re done, our work here is done, without actually looking to what happens—how they actually use it, where they meet roadblocks, what Jonathan Donner calls an after-access lens. I think that’s really important to see where actual problems exist to keep iterating and improving on them.

JOCHAI BEN-AVIE: Absolutely. And that’s why at Connect Humanity we often talk about digital equity and not just connectivity, right?

Thank you to our panel. Thank you to our hosts for a fascinating conversation. I think what we’ve heard is that digital equity is one of the great challenges of our time. And if we care about advancing democracy, human—protecting human rights, expanding economic opportunity, and defending national security, we must confront and offer viable alternatives and substantially more funding to solve this challenge. And yet, despite virtually all democratic countries having interests affected by increasing Chinese control of the internet, the democracies of the world have largely been on the sidelines. That said, there are good models like the SEED Act that we heard about earlier today that we can learn from and leverage as we think about how to meet this funding gap.

And it’s not just a matter of pouring money into this issue. Our existing funding mechanisms and telecom models, as we’ve heard, won’t be sufficient to connect the unconnected to achieve digital equity. And so we need to evolve conventional understanding of what a network operator looks like—might be coffee growers—and can deliver funding in the sizes and structures that operators require to meet the needs in their underserved communities.

Thank you so much for this conversation, and looking forward to working with many of you as we work on this challenge. Thank you.

CATALINA ESCOBAR: Thank you.

Watch the full event

The post These organizations are on the front lines of internet equity—and countering China’s influence appeared first on Atlantic Council.

]]>
Digital violence is the number one barrier to women participating in public life. Here’s how to start fixing it. https://www.atlanticcouncil.org/blogs/new-atlanticist/digital-violence-is-the-number-one-barrier-to-women-participating-in-public-life-heres-how-to-start-fixing-it/ Tue, 07 Jun 2022 21:11:32 +0000 https://www.atlanticcouncil.org/?p=534194 Just 16 percent of women in politics said they received a timely and effective response to escalations of digital violence. It's time to fix that, say panelists at 360/Open Summit.

The post Digital violence is the number one barrier to women participating in public life. Here’s how to start fixing it. appeared first on Atlantic Council.

]]>
Watch the full event

For people to participate fully in their government, they must first feel safe. But for women, the top impediment to participating in public life isn’t a physical threat, but one emerging online: the threat of digital violence. 

That’s what Moira Whelan, director of democracy and technology at the National Democratic Institute, came away with after conducting roundtable discussions with ninety women in politics across seven countries spanning Latin America, Eastern Europe, Africa, and South and Southeast Asia. 

Just 16 percent of women in politics said they received a timely and effective response to escalations of digital violence, Whelan said, underscoring the need for action while leading a panel discussion at this year’s 360/Open Summit in Brussels, hosted by the Atlantic Council’s Digital Forensic Research Lab.

She was joined by Amalia Toledo, a researcher on gender and tech issues in Latin America; Nighat Dad, executive director of the Digital Rights Foundation; Tracy Chou, CEO and founder of Block Party; and Helena Mølgaard Hansen, the deputy tech ambassador of the Office of Denmark’s Tech Ambassador. Here are some more key takeaways from the conversation.

The state of digital violence

  • It is clear, wherever you are on the political spectrum, that if you are a woman in politics you will experience violence online, said Toledo, who is based in Colombia. “But it’s also clear,” she added, “that not everyone receives the same amount of violence.” Some factors that exacerbate violence include being a woman of color and challenging the status quo, such as questioning patriarchal systems in Latin America.
  • “This takes place everywhere,” added Hansen, whose native Denmark launched the Tech for Democracy initiative in 2021, in response to the Biden administration’s Summit for Democracy. The goal: To make tech work for democracy, as opposed to against it, Hansen said: “We’ve seen the dark side, some might say, in how new technologies can be used against human rights.” 
  • “So much of platform design right now puts the entire burden on the person receiving the abuse,” Chou said, giving an example of a Reddit AMA where she would have had to individually block or report each of the “four thousand trolls” one-by-one to limit harassment. The road to a solution could include automatic data collection, so as not to re-traumatize victims, as well as helper functions that allow others to report on a victim’s behalf, she said. 

Potential pitfalls online

  • Western democracies must be careful when proposing strict regulations, however. “Our governments replicate those laws” and then weaponize them, said Dad, a lawyer from Pakistan, where an act ostensibly aimed at protecting women online has actually been used against women journalists, human-rights defenders, and #MeToo activists. “Pakistan or India or Nepal or Bangladesh will be like ‘Western democracies are doing it, so why can’t we?’ That’s the justification they give to us.”
  • Regulation is “an important tool,” Hansen added, “but we need to do it the right way.” That means bringing in a wide array of stakeholders, from governments and civil society to private industry, which is why Denmark is using its Tech for Democracy initiative to facilitate conversations across sectors and nations. Dad, who sits on the oversight board of Meta, has seen how broader discussions can lead to change, as the board has issued 108 binding recommendations and seen 64 percent of them fully implemented so far. “This is one of the first self-regulatory models of a company that I’ve been a part of, and I think it’s a solution other companies can look to,” she said. 
  • Her concern speaks to one of the greatest issues in advocating for change on tech platforms, as Chou puts it: “The people who have never worked there are trying to propose things that would never make sense from inside.” A product engineer who has worked everywhere from Pinterest and Quora to Google and Facebook, Chou’s solution was to establish Block Party, a suite of anti-harassment tools to help users better control their online experience rather than rely on tech companies to enact change that wouldn’t serve their bottom line. “Safety will never be their number one priority,” Chou said.

What can be done?

  • One area where regulation can help: Requiring that platforms allow more third-party tool integration. Twitter is a platform that is “very open,” Chou said, with APIs that make it easier for developers to build tools like Block Party. Other platforms, including Meta-owned platforms such as Facebook, are less open. That makes it “difficult for researchers to understand what’s happening, difficult to hold platforms to account, and almost impossible for anybody else to build solutions,” Chou said. 
  • Opening up platforms would also help address the issues around “a lack of prioritization” in different markets. “The platforms themselves are never going to spend as many resources in all these different countries as they do in the United States or these major markets,” Chou said. “Distributing that access across developers can enable people in different markets and different countries to build their own solutions.”
  • Hansen noted how Denmark has crafted “The Copenhagen Pledge,” a “framework of Tech for Democracy” to unite governments, civil society, and technology companies in support of developing technologies that benefit democracy and human rights. With the United States, Denmark is also launching a global partnership for action on gender-based online harassment and abuse.

Watch the panel

Nick Fouriezos is an Atlanta-based writer with bylines from every US state and six continents. Follow him on Twitter @nick4iezos.

The post Digital violence is the number one barrier to women participating in public life. Here’s how to start fixing it. appeared first on Atlantic Council.

]]>
The war in Ukraine shows the disinformation landscape has changed. Here’s what platforms should do about it. https://www.atlanticcouncil.org/news/transcripts/the-war-in-ukraine-shows-the-disinformation-landscape-has-changed-heres-what-platforms-should-do-about-it/ Tue, 07 Jun 2022 21:11:23 +0000 https://www.atlanticcouncil.org/?p=534071 Panelists at the 360/Open Summit discuss whether information threats like malign foreign influence or disinfo-for-hire firms are becoming more diffuse.

The post The war in Ukraine shows the disinformation landscape has changed. Here’s what platforms should do about it. appeared first on Atlantic Council.

]]>
Watch the panel

360/Open Summit: Contested Realities | Connected Futures

June 6-7, 2022

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) hosts 360/Open Summit: Contested Realities | Connected Futures in Brussels, Belgium.

Event transcript

Uncorrected transcript: Check against delivery

Speakers

David Agranovich
Director, Global Threat Disruption, Meta

Alicia Wanless
Director, Partnership for Countering Influence Operations, Carnegie Endowment for International Peace

Min Hsuan Wu (aka “Ttcat”)
Co-Founder and CEO, Doublethink Labs

Moderator

Lizza Dwoskin
Silicon Valley Correspondent, the Washington Post

LIZZA DWOSKIN: So first I’d like to introduce—right next to me, I’d like to introduce David Agranovich. He is the director of global threat disruption at Meta, the company formerly known as Facebook. So he coordinates the identification and disruption of influence-operation networks across Facebook. And prior to joining Facebook, he served as the director for intelligence at the National Security Council at the White House, where he led the US government’s efforts to address foreign interference.

Next to him, we have Alicia Wanless, who we’re meeting for the first time. Alicia’s the director of the Partnership for Countering Influence Operations and the Carnegie Endowment for International Peace. She researches how people shape and are shaped by changing—the changing information space. She conducts content and network analyses and has developed original models for identifying and analyzing digital propaganda campaigns.

And then we have Ttcat. You’ll have to tell me how to pronounce your last name. How do I pronounce your last name?

MIN HSUAN WU: My last name is Wu. It’s kind of easier. But my first name is Min Hsuan.

LIZZA DWOSKIN: Perfect. Better than I.

MIN HSUAN WU: All right, just go back to Ttcat. All right.

LIZZA DWOSKIN: Better than I. He’s the—he’s the co-founder and CEO of Doublethink Labs, and they’re really at the forefront of the effort to track Chinese and Chinese-language disinformation. He’s an activist and a campaigner around a number of social movements in Taiwan, including the anti-nuclear movement, environmental, LGBTQ, and human rights movement, and as I said is on the forefront of tracking disinformation by China.

So I want to jump in and say when Graham asked me to do this panel, he said it came out of a conversation he and I had last year when I had just come back from Israel. And I was tracking a disinformation-for-hire company—not going to say the name because it’s related to a forthcoming article in the Washington Post—but this company essentially is one of many that have proliferated around the world that governments or political actors can hire if they want to run a disinformation campaign and they want to outsource it somewhere. And I called Graham because I was thinking about how much the world has changed since we first—myself and other journalists first started reporting and uncovering Russian interference in the 2016 election and the platforms’ very weak response to it; just kind of wasn’t prepared for it.

So I wanted to spend some time chatting with you guys today, you guys and gal, about how different the world looks today than the way it did, how different the defenses are, how different the attackers are, and how the landscape has changed. And then what are the responses to that changing landscape, both from governments and from platforms and from civil society?

So I want to start with the question we’re all talking about, the most pressing reality, which is the war in Ukraine, and David, ask you, how does the world look different from where you sit at Meta than it did before February 27, before the war?

DAVID AGRANOVICH: Thanks for kicking us off. I think it’s a really topical question, particularly given how much Ukraine has focused on the conversations here at the conference over the last few days.

Maybe just for a little bit of grounding, my team has been working across the company with our threat investigative teams to look for, identify, disrupt, and then build kind of resilience into our systems around influence operations for the last several years. I joined the company back in mid-2018. That effort was already underway after the 2016 elections.

And so some of the things I’ll talk about in terms of what we saw from particularly Russian influence operations around the February 24 invasion of Ukraine are predicated on the trends we’ve observed over the last four or so years of Russian activity.

And I’ll break this up maybe into three main categories: First, kind of what looks different from a preparation perspective, what looks different from a response perspective, and then what looks different from a capabilities-across-society perspective.

On the preparation piece, I think one of the biggest differences here was in the weeks leading up to the 24th of February, you saw a substantial shift in the ways that both platform companies prepared for, you know, Russia crossing the line of control in eastern Ukraine as well as the way that governments and civil society were engaging around the possibility of influence operations, disinformation, surrounding the crisis.

When I was still at the White House, I was working on the global response to the poisonings in Salisbury in the UK of Sergei Skripal and his daughter. And at the time it was really hard for governments to share information about what we thought people were going to push as disinformation narratives, and it was very difficult to kind of get ahead of what at the time felt like a very agile disinformation apparatus surrounding the Russian government.

Ahead of the 24th of February, you saw these somewhat unprecedented strategic disclosures that narrowed the operating space of Russian disinformation operators by the US government, by NATO, by the Ukrainian government and others.

On the platform side, several platform companies spent the weeks in the run-up to the 24th of February preparing for what we expected to see, what would we need to detect, refreshing our investigations into known Russian-linked disinformation operations we had previously detected. And so when the 24th rolled around, there was already this very constrained operating space. I mean, this was the response piece. And there were platforms ready to look for them, civil-society researchers… who were already out there with capacity to look for this stuff.

And so though we saw several influence operations linked to known Russia-linked disinfo networks, they didn’t seem to get much traction, either on the platform or in the broader media ecosystem. That’s not to say that there isn’t a threat there, but rather that the defenders were more prepared.

The last thing I wanted to touch on was the capabilities piece, the strategic disclosures, the preparation work, that gave us fertile ground to continue our work in kind of constraining this type of influence-operations activity. But now that we are in the post-initial-invasion phase of the operation, the war isn’t over, right. Neither is it over on the ground nor is it over in the information space.

And so I think what we’ll need to focus on is ensuring that these early victories of essentially constraining the success of some of these operations aren’t lost as kind of global attention continues to shift from issue to issue. And so that’s an area I think, I hope, we’ll have a chance to focus on a bit here.

LIZZA DWOSKIN: Right, because the world, of course, was actively debunking Russian disinformation in the beginning of the war. And there were so many—you know, the whole of the world was responding. And now that the world isn’t paying as much attention, that’s where perhaps these influence operations then can get more traction.

Alicia, what do you think?

ALICIA WANLESS: Well, I’ve been looking at problems like propaganda and disinformation since about 2014. And so the longer tale of that is that I think that the bigger change now, even since 2014 but not necessarily because of Ukraine, was a greater awareness that we have problems in an information space.

When it comes to Ukraine, I think what it’s demonstrated is a lack of a multistakeholder response, that we really didn’t have a strategy, particularly in the West, that could bridge the gap between, say, industry, civil society, and governments. And in that way they were working in their own field, their own sector. But even within each one, they tend to work in their own area and were broken up by topics. So one team over here might be working on disinformation. It might be foreign-originating. Another one might be strategic communications. Another one would be cybersecurity. And all of these things are part of the information environment.

And even within companies, they work on single-policy enforcements. They’ve got teams that do singular and different things. And those don’t necessarily come together. But then between those stakeholders, the trust between them, the languages that they’re speaking, they are not usually the same, and they haven’t really collaborated. There’s been more tension than not before the conflict.

So what we do have here is a unique opportunity, if there is a will, to build a stakeholder response that actually helps create efficiencies in terms of how things are coming in. So, for example, what we see is maybe governments making multiple requests to companies and not coming together. Well, maybe multilateral institutions would be the better bet to do a singular briefing, but also companies providing greater information to stakeholders like civil society and the government as well in advance, to be able to get ahead of a threat.

But the key here is that we have to find standards and systems that make this safe and collaborative and that there is some sort of an outcome with lines in the sand, because ultimately this is the thing we’re missing the most, rules of engagement and a strategy.

LIZZA DWOSKIN: Well, it’s interesting, because I—you know, I saw, actually—and David and I were talking about this before the panel—that the companies were willing—at least the platforms were willing to draw a line in the sand, you know, and take a side, which is different.

But to your point, you know, you have Google that decides they’re going to ban any content that distorts real-world events. And Facebook has a different policy and they’re going to, you know, allow people to criticize Putin and potentially Russians. And, you know, they were all—you know, there wasn’t a uniform response from the companies, even though, in some ways, there was maybe more uniform response than we’ve seen in the past.

What do you think, David?

DAVID AGRANOVICH: So—

LIZZA DWOSKIN: You brought that up with me before.

DAVID AGRANOVICH: I do think that there’s coordination between kind of the threat-investigative sides of companies that’s grown out of the 2016 period. And so you saw this around elections, whether it was in the US or in the Philippines or in Brazil or in India.

But in particular, I think one of the challenges around setting these types of content-moderation policies—and I know Emerson and Katie talked about this yesterday—is in these fast-changing periods of potentially global conflicts or ethnic strife, it’s difficult and, I think, perhaps not always the best position to rely on the platform companies to be the leading indicator of where we want those lines to be drawn.

This is actually, I think, a place where civil society, where governments, particularly can lead, because these types of decisions have effects on people’s lives. And having a clear kind of norm-setting across the industry would be really useful.

LIZZA DWOSKIN: But I feel like in this case there was a war. And pretty much the whole world, civil society and the companies, were against it.

DAVID AGRANOVICH: I think that’s right.

LIZZA DWOSKIN: So is this something that—you know, we talked before about how this is unusual for platforms to draw a line in the sand like this politically.

DAVID AGRANOVICH: I think that—I mean, there’s some helpful guiding principles here. And I’d be interested in kind of Alicia’s take in particular of how we take this from just, like, platform policy to, like, strategic.

But the guiding principle is how do you protect the people who are using your platform. And in the context of people in Ukraine, right, that is how do you protect their accounts? How do you give them tools to lock their profiles down so that if the city that they’re in is taken over by an invader, they can quickly hide the information that might get them into trouble?

But it also means how do you protect, for example, dissenting voices in Russia, where talking openly about the war might result in physical-security risks or risks of imprisonment and the like? And so I think that that guiding principle, that I would argue pretty much all platforms should have—how do you protect the people who are using your platform—can help, you know, bridge some of the differences in how the platforms approach these types of problems.

LIZZA DWOSKIN: Mmm hmm. What do you think?

ALICIA WANLESS: I’m not going to comment on that specifically. But I do think that there are also other areas where it makes it painfully apparent that we aren’t really coordinated. Now, stepping aside from Ukraine, bringing Ttcat in—this is something that we talk about quite a bit—in terms of even just the research community.

So you have a very wide and diverse group of people who are working on research related to influence operations. They might be in civil society, nonprofits, think tanks. They might be academics. But all of them are almost entirely working in isolation, building up their own data pipelines that don’t necessarily get reused. And we’re talking about research that’s really engineering resource-heavy, and that’s extremely costly. And we haven’t really found a mechanism to come together to be able so share that type of resource, build up datasets that we can use together, and have representative samples. And this is—this is just one example where we lack coordination.

MIN HSUAN WU: Me? All right.

ALICIA WANLESS: Yeah. Just—I’m giving you the floor.

MIN HSUAN WU: Yeah, all right.

LIZZA DWOSKIN: She’s looking at you.

MIN HSUAN WU: So thank you so much. All right. So especially when you’re talking about the data, it’s not only on Facebook or Twitter, which they granted certain access to the research group for the API. We are also talking about a platform like Weibo or WeChat or TikTok or Douyin that’s even harder, right? And they are consistently changing their rules for people to collecting those data.

And in fact, actually, I know that there is a business model for industry. When they collecting those data, they were actually exchange those dataset from company to company so they can build up more data for the older clients. And we don’t have those exchange mechanism in our community. So I think that’s also very hard.

Just quoting one, like, very good Ukrainian partners here I just met last night, they say he found four different group of people in this summit collecting the same dataset with them, right?

LIZZA DWOSKIN: Really?

MIN HSUAN WU: So we are all collecting data and spending money and also build up those dashboard, and we definitely need some more coordinated efforts from our community.

LIZZA DWOSKIN: So that’s a really interesting idea, like creating a central repository of all information influence operations and evidence of them across the platforms that any researcher can use. Is it feasible?

MIN HSUAN WU: Yeah, but it also is like we spend a lot of money collecting those data because we think that collecting those data, it will be able to help us to investigate what’s happening inside those dataset in the future. But actually, we are collecting the data more than what we can do for analysis because we are also facing the capacity issue for the analysis of this data. So, yeah.

LIZZA DWOSKIN: This is a question actually on that, which is, you know, Russia will be taken to court for war crimes. And what happens to all the—all the content that platforms deleted because they were fighting these influence operations during the war? Can that be retrieved in legal cases?

ALICIA WANLESS: I was just going to say, this here is another massive gap that we have in terms of regulation that governs how we actually deal with our modern information environment and the information within it and who actually gets to dictate that. Most laws—I’m not a lawyer, so I’m going to qualify this—tend to happen at a national level, but we don’t necessarily even have that in place right now, much less some sort of international agreement of what could happen and where. So, again, we have this massive, gaping hole that we weren’t prepared for. And yes, it takes years to build up for that.

My hope is that with something like Ukraine it’s enough of a force-multiplying factor that we come together and we’re aware of this—we’re aware of the wider information environment, the lack of guidelines that we have, the lack of norms, et cetera, and that we suddenly, hopefully, have impetus from governments to take a charge on that and do something.

DAVID AGRANOVICH: Maybe just to plus-one that, I think it’s—to Ttcat’s point, the industry’s responses to particularly the question of how do you archive and enable research are very different platform by platform, in no small part, as Alicia noted, because there hasn’t been a lot of clear guidance from regulators or democratic governments of, like, what people actually want to see and how they want that data shared and with whom they want that data shared.

Similarly, right—so my background is more on the traditional security/cybersecurity space. The law and the norms around information sharing for, like, cybersecurity threat indicators, as folks who work on the cybersecurity front know, is much clearer, right? There are vehicles explicitly designed to enable companies and research organizations to share information about cybersecurity threats. We don’t have that in any clear form whatsoever around issues like influence operations.

ALICIA WANLESS: We don’t even have it for data sharing for research purposes, although I’m really hopeful for that EDMO report.

MIN HSUAN WU: If I may, but bottom line is that those public opinions or whatever the content that push your platform or other platforms essentially is not the data owned by the tech company. It’s the data about our own society, our countries, what’s happening there, what people are talking about there. So it should be public available or at least for a research group to understand what is happening to our citizens, what are they talking about, what are they producing, right?

LIZZA DWOSKIN: You know, you’re right. It’s a societal—it’s a societal record. But then it kind of—it actually comes back to the question that, I think, sparked this panel and my conversation with Graham, which is, OK, we’re just starting to have these global frameworks for cyber weapons and laws, but disinformation and influence operation is their weapons and there’s no framework both in terms of sharing data, how governments should handle it, and it seems like it’s a void and then one—you know, the example here.

Do you all think that there should be that a government or global governments or international bodies should come in, therefore, and, like, mandate, for example, that platforms archive influence operations, that they share it publicly in uniform ways? Do you think that that should be mandated by governments?

ALICIA WANLESS: Can I start?

LIZZA DWOSKIN: Yeah.

ALICIA WANLESS: I think we should start with the first step, which would be transparency or operational reporting of online services to understand what even data they have beyond that, because influence operations and disinformation is one part of the problem.

I mean, we—I’m sorry, David. I’m picking on you now. We don’t understand how the policies are developed. Well, the people who didn’t work for the companies don’t understand how the policies were developed. We don’t necessarily understand how they’re enforced or what research is happening, and then this research comes out and leaks and it erodes more trust in our information environment, and these things need to be rectified.

So first step, I would say, is that governments should regulate operational reporting to inform how companies are working. It would be ideal if a number of countries came together and broadly harmonized that. Maybe a place like the OECD leads on this and that would be extremely helpful and expedite things.

That would inform researchers on what information is available to research and also inform policymakers on how we can do regulation to actually control things and archive stuff like that.

LIZZA DWOSKIN: Then it wouldn’t be as fun for journalists because we depend on leaks.

What about a question on—what about—you know, we haven’t talked yet about the disinformation from our hire industry but it’s something, David, that Meta has actually talked a lot about in your reports, which is that it used to be, you know, that governments would pay for this directly. Now they’re, increasingly, outsourcing it.

Tell me—tell us about that world, and how does that world get regulated? What can prevent this from happening, this gray space?

DAVID AGRANOVICH: So it’s a difficult question in no small part, I think, because disinformation for hire definitionally and PR agency are not hugely different definitions, right. It’s more what those companies end up doing.

But that said, right, we—so our teams put out a report last year about surveillance for hire industry, right—your NSO Groups, your Black Cubes of the world—and one of the things that, I think, worried us the most about these surveillance companies was not only are they engaged in these egregious abuses of people’s privacy by hacking their phones, hacking their accounts, hacking their email addresses, they do so for commercial gain for any customer that’s willing to pay and in doing so they hide the people behind them, right.

Oftentimes, if you look at our surveillance for hire report you’ll notice that in almost all of those cases we weren’t really able to identify the clients. We could tell you exactly what company was providing the services but the whole business model is hiding who that ultimate client is.

Whereas if you look at our influence operations reporting going back a few years, there’s a ton of this very specific attribution to governments, to intelligence services, including some of the very sophisticated services in Russia.

And so one of the big risks around disinfo for hire is that it creates this whole industry that, essentially, just hides from all of our views, whether you’re an OSINT researcher or an investigator at a platform company, who is actually paying for it, who is driving these operations, and why are they targeting the people they’re targeting.

How do you regulate them? Some of the challenge here is that we’ve taken down a handful of disinfo for hire firms. We’ve banned them from our platform when we find them because their business model violates our policies.

But I can’t think of a single example where the people who ran the operations at the firms or where the firms themselves faced any meaningful business impact for doing so, right. Those people still work in the PR industry. The firms themselves still have very large clients all over the world.

Until there are some actual costs for engaging in this behavior beyond Facebook taking down your accounts and then trying to embarrass you in a public blog post, it’s hard to imagine that a profitable business model isn’t going to continue driving that type of PR and ad agency activity.

ALICIA WANLESS: And the politicians benefit from using it. This happens quite a lot. Maybe not the politicians, but in Taiwan—

MIN HSUAN WU: Yes. So lots of different tactic that—by the Chinese information operation mode is that—we published a report last year. There’s four different one that people commonly noticed that those, like, state-funded media, they do a lot of the propaganda working with other media outlets. Or you see a lot of patriotics or the cyber troop, they’re trolling the people around. But that’s an easy one, right?

So, but the hard one is the one you just mentioned, that when they hire people actually in your society, in your country, that the people who create those content is Taiwanese or the people who promote that content is also Taiwanese, how do you defenses then be higher or they are just people have a different idea or different political opinion with you within your democratic society?

So to increase the cost for those activities, and also shrinking their business model or profit model, I think it’s essential that—to prevent those things, because in the end of the day they are the one—whatever they do for politician for business, for make-up company products—what they do is they input a lot of inauthentic content, opinions, and pretend that it’s genuine to the audience in your society. So I think that should be at least a social norm that you don’t engage with those PR firm or marketing company that provide those service at all.

LIZZA DWOSKIN: Yeah. I’ve done some reporting on this in the Philippines, and I really felt like this disinfo for hire individual, it’s, like, a hot new job for a twenty-something in the global south. Because you can make money, you can be online, you can become an influencer. Or, if you were already an influencer, you can get paid for political sponsorships. But, yeah, it just sounds like, from what you all are saying, I don’t—it doesn’t sound like there’s really any incentive from any government to actually stop this.

ALICIA WANLESS: I would like to distinguish between the people who work in the bureaucracies and the politicians. Because my experience has been those inside the government would like to do things, and they would like to clean up the information environment and make it more reliable. Politicians don’t have the vested interest, usually.

LIZZA DWOSKIN: I want to open it up for questions in a minute. So would love to see your questions, if anyone wants to come up to the mic, or you can send a question already. Ttcat, while people are teeing up their questions, I did want to go—I did want to go back to Russia and Ukraine, because you’ve done so much research on China’s involvement in that conflict. And I wanted to ask you about how you see China walking a fine line in terms of the disinformation it will echo, and where it diverges.

MIN HSUAN WU: Right. So ever since the war started—well, back to February 22nd, that our team started special taskforce, everybody work over hour, and published the digest every day, and a look at how China state media, influencers, and also those nationalist media outlets are pushing those narrative against Ukraine. They copy a lot of things from Russia. They translated a lot of things. And they tweet—they twist whatever Zelensky say to another meaning, and push that to the Chinese-speaking citizens.

First of all, I want to say two things here. One is that oftentimes when you heard, like, something like this, it feels, like, very exhausted, right? So it’s like something far away. But actually those disinformation or propaganda campaign in Chinese language is not only about China people. It’s also about the Chinese speaking world, like in Malaysia, in Singapore, in Taiwan, in Australia, Canada. Everywhere the diaspora community. Ask your friend whether they—what news outlets they are reading in New York, in Vancouver. And all over the place they read the news on WeChat and also all this—you know, whatever Chinese news is available there. So, first of all, it’s not only about the people within China.

Second, think about what they do stuff on the war until now, it’s over one hundred days. They are pushing this narrative, dragging those Chinese audience away from Western country, Western value. They are attacking that… Whatever they do, they are preparing the environment—the information environment. That’s exactly what Russia did in 2014. They start to demonize Ukraine and prepare those propaganda. Of course, some people don’t believe. Some people don’t believe. But that’s just right now, one hundred days, right? How about two years later? How about four years later when they keep pushing those narrative?

LIZZA DWOSKIN: So you’re talking about preparing for an invasion of—laying the groundwork for an invasion of Taiwan?

MIN HSUAN WU: I don’t want to jump that conclusion, but I would say they are preparing for whatever things they want to do, because it’s all pre-justified. They don’t need to explain to their citizen why we don’t want to help Ukraine anymore, right, why we want to help Russia today. Yeah, because they’re already—there’s already a lot of narrative and justification out there by those disinformation.

LIZZA DWOSKIN: And then you—yeah.

ALICIA WANLESS: They see the information environment as a system and have for a long time. They’re not quibbling over definitions like we are and debating this. They have a center of gravity to understand it and they have a strategy. We don’t.

LIZZA DWOSKIN: But, you know, Ttcat, when we were talking earlier, I thought it was real interesting how you said, you know, there’s so many limits to where Chinese disinformation will go in support of Russia. How you said that they will not—they will not mimic the narrative around independence in the Donbas region.

MIN HSUAN WU: Yeah, right. There’s an ecosystem, right? So there’s an ecosystem for—if you want to make profit, I can recommend this new gig for you guys—because we have lots of White people here—make a video or a TikTok video that promote how great China is. Then you will become an influencer. That’s how they work. So this nationalism created a huge nationalism interest, become a new business model. So China government doesn’t have to pay you as an influencer. Once you follow their narrative, follow their state media, whatever they are talking today. You open the People’s Daily, CGTN, whatever the hot topic today, you just follow it, then you gain followers. You gain traffic. You gain profit. That’s how they work. So this whole bottom up or decentralized network is what we’re dealing with right now for the space.

LIZZA DWOSKIN: And why is it not as profitable to be an anti-government influencer?

MIN HSUAN WU: Oh, yes. That’s a good question. So I think a lot—we don’t have that much yet, but I do see a lot of people are going that direction right now in Taiwan or in other places, as a diaspora community. They also do that, but they are not as profitable as China citizens—the pro-China one, yes. I don’t know why.

LIZZA DWOSKIN: If no one else is itching to jump in, we can go to a question. So we have a question here which says: It feels like the discussion around accountability by social media platforms happens only in reference to Western companies. What leverage does the democratic world have over platforms like VKontakte, Telegram, and WeChat? Great question.

MIN HSUAN WU: Right. That’s a question I also want to ask. I don’t have the answers, yes.

LIZZA DWOSKIN: Does anyone want to take that?

ALICIA WANLESS: Well, yeah, no, it’s—I mean, it’s the same as, like, GDPR and the EU. It will apply to where that law is placed. So, I mean, the West has the same options, I wouldn’t advocate for it, that Russia has taken, and China has taken, in kicking out companies that don’t comply with the way that they’ve decided they’re going to regulate their information space. So it’s possible. It’s there. I think the emphasis for a long time has been on the major American ones because they’re there at home and they’ve taken a central role in our own information ecosystem.

DAVID AGRANOVICH: I do think one thing that can help here is, so, one of the things that we’ve been trying to do more and more of in our own analytical reporting is calling out the platforms that we see content spread to, right? I think more and more—and I imagine most of the Sherlocks in the room would agree—these operations are inherently cross-platform. And so one thing we’ve done, in particularly the operations around Ukraine, we called out the fact that we saw, you know, Facebook profiles who were designed to backstop content written on websites that were primarily amplified on VKontakte and OdnoKlassniki, for example. So in some ways, hopefully, just raising some of this awareness of how these other platforms play in the global information ecosystem, in hopes that it will then inform some of the regulatory conversations.

ALICIA WANLESS: We need to look at things as a system.

LIZZA DWOSKIN: I’m just laughing because you said that before, so. Because you believe it.

ALICIA WANLESS: Yeah, I do. I think that’s the only way we can get out of this. The information environment is like the physical environment. If we don’t start looking at the systemic, we have no way out of this. We will just constantly be reacting as we are.

 LIZZA DWOSKIN: But what is systemic? You know, WeChat, they’re not going to face pressure from their government the way that the American platforms face pressure from their governments to crack down on this stuff. They’re just not.

ALICIA WANLESS: No, but they may not be operating in the environments that they are right now. I mean, they can be banned. We see that they can—things can be banned. Russia banned. China’s banned. I mean, I’m not advocating for—

LIZZA DWOSKIN: Or TikTok could be banned in the United States.

ALICIA WANLESS: Exactly. That’s what I’m saying.

LIZZA DWOSKIN: Yeah.

MIN HSUAN WU: I don’t want to put you cold water, but what they can do is they can separate a company and promote a different version, like what TikTok and Douyin does. So and actually, WeChat is—Weibo is also—they have an international version. So whatever you download is actually—there’s a different—you probably see different stuff or different—you face different content moderation standards.

ALICIA WANLESS: Yeah. TikTok US is, technically, separate, I believe.

MIN HSUAN WU: Yes.

ALICIA WANLESS: But, again, global information ecosystem.

LIZZA DWOSKIN: There was someone who raised their hand over there. Yes. I think—oh, OK.

Q: Hi. So my name is Omri Preiss. I’m the director of Alliance4Europe and also part of the DISARM Foundation. I want to thank you for the really interesting panel and also a great discussion that we had at a session yesterday.

And DISARM stands for Disinformation Analysis and Risk Management. It’s exactly the kind of framework, it’s a common language on disinformation that we’re talking about here, basically, applying cybersecurity approaches to share information. It’s based on MITRE ATT&CK, for those who are familiar, and it’s something that we’ve been working on to bring stakeholders together around how we get this off the ground in a way that really enables information flows in a way that is, you know, transparent to the community and really is able to engage, you know, those in this space.

Now, Alliance4Europe has been working on this kind of cooperation building for the last several years and what we see is that there is a reason why everyone wants to have their own thing and want to invest their resources in one specific space or one specific project.

Everyone wants to have their funding, their branding, and the right to do so. Everyone wants to have their own great idea. And so the genuine question, I think, that we face as an organization and as a community and in establishing these common resources is how do we do that in a way that is a win-win for everyone.

How do we enable everyone to have a common interest to use these tools together, to share information together, and not feel like oh, well, I just lost a bit of funding to that guy because they’re going to steal my idea, or, you know, how do I shine through?

How do we really solve this collective action problem and show everyone, like, you can buy into this forum and feel that you’re going to gain for it for your own advancement as well as advancing the community and the common cause that we have, which is to have, you know, a democracy that is safe in the digital world and being able to really communicate together?

So over to you.

LIZZA DWOSKIN: I’m going to ask one person to address that for a minute so we can get to some more questions, whoever wants to take it.

MIN HSUAN WU: I can.

ALICIA WANLESS: If you want.

MIN HSUAN WU: Well, we start our work by—we think that we want to build a cross-platform database that our analysis, just put a keyword, they can gather all the data from Weibo, from all these, like, China junk news site. And turns out, well, we did it in just a few months, then they changed. Then we keep spending the money, try to adopt it, and it’s never done.

So I would suggest that maybe we can develop our competitive strengths in analysis or other way. Once we have—if we have a joint—if we can—if we don’t need to bother for collecting those data, we can spend our money and our time on developing an algorithm or develop training our analysis or building up our capacity, yeah, because we will never be better than who owns the data, right? Yeah.

LIZZA DWOSKIN: I see another question on the board, which is how does the model of surveillance capitalism driving major social media platforms enable the disinformation for hire industry, and what challenges do the design of the platforms pose in formulating lasting change? Which, I’m assuming, has to do with the fact that disinformation can be controversial and enraging and get clicks.

Who wants to take that for a minute?

ALICIA WANLESS: That’s a full-on research paper question. To answer in less than three minutes, I think, would be a little bit much.

I mean, I think it’s not just surveillance capitalism. It’s the role of influence in our society that we are just not having a frank conversation about. I mean, this goes beyond influence operations and disinformation to the very fundamental basis of our legitimacy.

I mean, we have influence happening everywhere to sell us things, to get us to vote for somebody, and for some reason in democracies we have not had that moment to come and really discuss how far is too far, at what point do people lose their agency, and to get to that we need to accelerate research around the impact of these things, and we’re not going to do that unless we start to pool resources and have shared engineering infrastructure, something as big as a CERN for the information environment.

LIZZA DWOSKIN: OK. You have had a question for a while.

Q: Hey, yeah. My name’s Justin, Code for Africa. We track a lot of this stuff across twenty-one countries in Africa at the moment, and you’ve hit on a lot of important points that we’ve been trying to hit on with our partners.

Disinformation’s super profitable. It’s a boom industry in places like Kenya. It’s not just disinfo for hire; there’s a whole subset of sub-economies inside there. But we’re seeing the same kind of playbooks being used everywhere from Sudan through to Ethiopia, Burkina Faso, Mali, kind of you name it, regardless of language or audience. It’s cross-platform. It wherever possible tries to use vernacular to avoid algorithmic kind of detection. It’s franchise-driven—specifically in the cases that we monitor, Russia protagonists franchising out to local kind of implementers.

What are we doing—and so I’ve got a three-part quick question. What are we doing to stop the fragmentation that’s happened where even within the platforms your fact-checking teams were and the people who are trying to debunk the misleading information were completely separate from the threat-disruption teams? There’s this firewall between them, and we’re seeing that play out in the rest of kind of the ecosystem now as well. Fact-checkers are not speaking to the guys who are doing, you know, kind of the work that DFRLabs or others do ourselves. So that’s the first question, because it’s part of—it’s something that the people driving the disinformation, they don’t see this distinction. They’re leveraging all of that. So that’s the first one.

The second one is that the enablers who are building this wish-fulfillment infrastructure are not just the political kind of PR click-for-hire people. It’s the scams—the scam artists who are building mass audiences, almost like an Amazon delivery service for disinformation operators. What are we doing to take them down, or if not taking them down to map them out? At the moment in Africa, we’re seeing there’s a massive campaign to drive everyone on Facebook and Twitter onto dark social, specifically because enforcement’s getting better.

And then the third question was kind of slightly self-serving. Ttcat mentioned it. It’s local nuance, understanding the local ecosystem. Most of the people doing work in the space are in the North. What are we doing to support kind of in-country, in-region analysts, researchers, and the people who join the dots?

ALICIA WANLESS: I’m not sure that was so much as questions as important statements that needed to be heard because it, again, reiterates the lack of coordination, the lack of bringing all of the different bits of knowledge that we have generated together and the lack of an international, interconnected approach to this. I don’t have answers in that amount of time.

LIZZA DWOSKIN: It looks—is anyone else itching to take that?

MIN HSUAN WU: Yeah. I don’t have an answer for others, but in sum I echo whatever Justin just said that, yes, for the—for the local context. But also in some region, like for the region where I from, I feel like we need more digital Sherlock. We need more capacity building for—training more people who also understand their local context, local language, and local political context, and also can do those analysis work.

Frankly, lots of people asked me, do you know what China do information operation in Thailand or in Middle East? How I supposed to know, right? So we don’t live there, right, and we are not—as long as we don’t have the chance to send people actually there, whatever tools or whatever knowledge that we have and join with this community, we will never find out what they do there.

So that’s my kind of response, or, yeah.

LIZZA DWOSKIN: Did you want to?

DAVID AGRANOVICH: Maybe just—knowing that we’re almost out of time.

So I did want to echo, I think, Alicia and Ttcat, right? A lot of those points are really important, particularly the scams piece, the fact that I think we’ve seen this growth in these kind of scam and spam actors trying to get into this business.

But the most important takeaway of those three points is the importance of enabling communities like Sherlocks all over the world, in particular people who have that ability to dive really deep in local context, understand not just what’s happening on the internet in a particular country but what’s happening on the ground.

And I know one of the priorities of the folks on my team is not just building some of the tools that I know some of the folks here are familiar with to archive and share information about influence operations; it was also working directly with some of these teams. So hopefully we’ll have a chance, for those of you I haven’t met, to talk after this panel because it’s something I think we really do want to do more of.

LIZZA DWOSKIN: Well, I just want to thank all of you because I learned so much from the panel. I was thinking very quickly about the theme that we—oh yeah, I want to remind everyone that you can get this content and other relevant event information, the agenda, on the DFRLabs website and also their social media account, so go check that out.

Yeah, I learned a ton. Thinking about the—going back to the beginning where I asked how is the world different from six years ago when there was the IRA infiltrating American social media companies in the US election, and now it’s like a million small IRAs with all sorts of different motives paid by different actors. And it’s really fascinating to hear the collective knowledge in this room, actually, about how to tackle this problem, so it helps my coverage a lot. So thank you so much.

Watch the full event

The post The war in Ukraine shows the disinformation landscape has changed. Here’s what platforms should do about it. appeared first on Atlantic Council.

]]>
Blinken on protecting human rights online: It’ll take ‘day-in and day-out vigilance’ https://www.atlanticcouncil.org/news/transcripts/blinken-on-protecting-human-rights-online-itll-take-day-in-and-day-out-vigilence/ Tue, 07 Jun 2022 21:10:27 +0000 https://www.atlanticcouncil.org/?p=534014 Secretary of State Antony Blinken joins Maria Ressa for a conversation on stopping democratic backsliding online at 360/Open Summit.

The post Blinken on protecting human rights online: It’ll take ‘day-in and day-out vigilance’ appeared first on Atlantic Council.

]]>
Watch the keynote

360/Open Summit: Contested Realities | Connected Futures

June 6-7, 2022

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) hosts 360/Open Summit: Contested Realities | Connected Futures in Brussels, Belgium.

Event transcript

Uncorrected transcript: Check against delivery

Speakers

Robert G. Berschinski
Senior Director for Democracy and Human Rights, US National Security Council

Maria Ressa
CEO and Nobel Peace Prize Winner, Rappler

Secretary Antony J. Blinken
Secretary of State, US Department of State

ROBERT G. BERSCHINSKI: Hi, everybody. I feel like that was kind of the equivalent of what we’ve all experienced in terms of giving our speech on Zoom with the—with the mute button still on. So thanks. Thanks, Rose. Thanks, Melissa, if you’re still out there, and to everybody at RightsCon. And thanks to DFRLab for putting on this session and for the opportunity to join you to introduce Secretary of State Antony Blinken and Maria Ressa.

It’s been a real pleasure to have spent the last two days participating in discussions at the forefront of democracy and human rights. And I say that, really, with everyone here in mind, but particularly with respect to those truly on the frontlines who have felt the impact for the struggle for human rights and democracy in deeply personal ways. These are women like… Carine Kanimba, someone I had the chance to speak in depth with a couple of nights ago, and also the woman that we’ll hear from shortly, Maria Ressa.

Before we turn to that interview, I want to take a few moments to reflect on what President Biden and so many of you both in the room and at home know is a key challenge of our time: demonstrating that democracy, rather than autocracy, is best poised to deliver for its citizens. In December, as I hope most in the room know, President Biden hosted one hundred governmental leaders, democratic opposition figures, activists, and business and civil society leaders from around the world in what we termed the first Summit for Democracy. Both Secretary Blinken and Maria Ressa spoke at the summit on a panel focused on media freedom and sustainability, and that issue alone reflects the ramifications that technology has had on the world around us.

A free media is, of course, the bedrock of pluralistic discourse and a healthy democratic society. But in—the digital age, as many of you also know, has fundamentally altered the business model that has sustained and enabled independent journalism now for decades. One recent study suggests that the move to digital advertising alone eliminated nearly $24 billion in annual advertising revenue for public-interest media between 2017 and last year, 2021. The economic vulnerability of the media has resulted in its capture and closure around the world. And this trend has, of course, been further compounded by governments who seek to silence critical voices through internet shutdowns, censorship, digital harassment, and political and regulatory pressure that incentivizes acquiescence or leads to media capture. At the same time, digital technologies have enabled individuals, groups, and governments to create, disseminate, and amplify manipulated information for their own political, ideological, and commercial interests.

So now we’re at a point in time where the costs of producing high-quality journalism are high while the costs of disseminating false information and silencing critical voices, like the one we’ll hear from shortly, are relatively low. And communities around the world are being impacted by this every day—not least in the United States, where an estimated quarter of newspapers have closed in just the last fifteen years. And that means fewer local trusted voices informing our debate.

So all of us joining in the 360/OS and in RightsCon are keenly aware of the human-rights impacts of this and other technology-enabled challenges. And while this could be a moment of despair, the breadth of debate, discussion, and participation at events like this reflects another new trend, one where governments and activists and companies are increasingly working together trying to break down their silos to productively design for and mitigate the risks from new technologies. And we know authoritarian governments and other actors will continue to develop and abuse technologies for their own political and financial benefit. We know they seek to rewrite the rules of the international system and the norms that govern technology.

So that’s why the Biden administration is driving an agenda in which critical and emerging technologies work for and not against democratic societies. To give one example, two months ago the United States launched, with sixty of our partners around the world, the Declaration for the Future of the Internet. This is a political commitment among declaration partners to advance a positive vision for the internet and digital technologies.

We’re backing our political commitment with expanded investments to support internet freedom as well as digital safety and security for targeted groups while improving cybersecurity, and in parallel, under the auspices of the Summit for Democracy, we’ve launched hundreds of millions of new dollars in programming to expand our support for free and independent media, to fight corruption, to bolster democratic reformers, and defend free and fair election processes, and in the wake of Russia’s aggression against Ukraine we further expanded our investments in Europe and Eurasia in these thematic areas.

We’re also working to more effectively hold to account those who abuse technology to unlawfully surveille and harass human rights defenders, journalists, and opposition leaders, just as Melissa was mentioning in the intro in terms of the discussion at RightsCon.

Yesterday, panelists stood on this stage and detailed harrowing accounts of being targeted via commercial spyware technology among other forms of what we in the US government are increasingly referring to as transnational repression.

The United States views the unlawful or inappropriate use of this technology as a national security issue. So in October of last year, we updated our export control rules governing items that can be used for malicious cyber activities, and then in November we added four foreign companies, including but not limited to NSO Group, to the Department of Commerce’s Entity List, based on evidence that these firms developed and supplied spyware to foreign governments that then used the tools provided to maliciously target government officials, journalists, business people, activists, and embassy workers, and we intend to do much more in this space using all the tools at our disposal.

At the same time, we’re placing renewed emphasis on supporting multi stakeholder initiatives like the Freedom Online Coalition and the OSCD’s work on reinforcing democracy.

Just over one year ago, we joined the Christchurch Call to eliminate terrorist and violent extremist content online, and then in November we announced our support for the Paris Call for trust and security in cyberspace. And we’re working also with key allies and partners on new initiatives like the global partnership for action to end online harassment and abuse, and, as those here in Brussels know well, the US-EU Trade and Technology Council.

Yet, we know that no single commitment, program, or action is going to resolve all of the challenges that we’ve been discussing over the course of the last few days and that we’ll hear momentarily from the US Secretary of State.

Russia’s aggression in Ukraine underscores the importance of taking a holistic approach to continuing threats to democracy diplomatically, militarily, economically, and in the information realm. But by working together, by doing exactly what all of you are here doing today, governments, advocates, researchers in the private sector together across disciplines, regions, and responsibilities, we can and we are driving change that’s going to prove to be asymmetrically advantageous for democracies.

We’re pursuing efforts to close the gap in digital access and driving innovation in ways that are going to foster inclusion, equity, and accountability, and support human rights rather than undermining them.

So, momentarily, Secretary Blinken will provide more on the breadth of efforts that the US is taking to advance this agenda in his interview with Maria Ressa. Maria and her team at Rappler and so many other journalists, human rights defenders, and activists, including many of you here in Brussels and online, have demonstrated courage and commitment against a global tide of democratic backsliding.

So with that, I’m very pleased to announce a woman who epitomizes courage and conviction, Nobel Peace Prize-winning journalist Maria Ressa, in conversation with the US Secretary of State Tony Blinken.

Thank you.

MARIA RESSA: Hello, everyone. Thank you so much for joining us. I am Maria Ressa from the Philippines. What an honor to have US Secretary of State Antony Blinken with us today at a crucial moment for all of us working for a better digital rights world.

Secretary Blinken, thank you for joining us.

ANTONY J. BLINKEN: Maria, great to be with you and great to be with everyone.

This is really a pleasure for me. I’m thrilled to be hosted by RightsCon, to be talking to you. I want to say greetings to everyone from the 360/Open Summit and from around the world who is, in one way or another, logged on, tuned in, and joining this conversation.

You know, it’s so important from our perspective that the United States, likeminded governments—but especially with civil society, with nongovernmental organizations, with think tanks, with the private sector—work to protect human rights online, work to demonstrate that our democracies can deliver for people as we navigate this extraordinary digital transformation that is having an impact on the lives of virtually everyone on this planet.

One thing I wanted to say at the outset, before we get into the conversation, is I am very pleased to announce that for the first time the United States will become chair of the Freedom Online Coalition in 2023. We want to strengthen the coalition. We want to bring more members on board. We want to make it a center of action for ensuring a free and open digital future. And this in part is going to be building on Canada’s terrific work as the current chair and really trying to carry it forward. So I’m really pleased to do that, to be able to announce that.

And Maria, it’s great to be with you. You have been, you are, an extraordinarily courageous champion of freedom of speech, freedom of press and media, and freedom for a digital future that we all want and we hope to build together. So thank you for being willing to have this conversation today.

MARIA RESSA: Well, you know, that’s really great to hear from you, Mr. Secretary, exactly at this moment in time when, you know, it seems at times hopeless. And you never want to be hopeless, right.

So let me ask you—you’ve been very outspoken about the way digital authoritarians have used tech to abuse human rights; you know, a growing trend that people like us on the front lines increasingly defenseless. I mean, what have you seen globally? And what can you do about it?

ANTONY J. BLINKEN: So you’re right. Unfortunately, that’s exactly what we’re seeing.

Look, I think, as in so many ways, when we saw the emergence of a lot of this technology, starting mostly in the 1990s, the early 2000s, I think there was great hope that it would be inexorably a force for openness, transparency, freedom. And, of course, in many ways it is. But we’re also seeing, of course, the abuse of this technology in various ways, including by repressive governments trying to control populations, to stifle dissent, to surveil and censor. We see that, of course, in the PRC with technology being used, for example, for mass surveillance, including of the Uyghurs and other minorities.

So the question is, what is to be done? What do we do about it? And there are a number of things that we need to do and, in fact, that we are doing.

One is to start by calling things out. That’s often the basis for everything. We have to call out the abusive technology, including digital authoritarianism.

Second, as I mentioned, we’re going to be taking on the chairmanship of the Freedom Online Coalition. We’re working to strengthen it. And this is an important vehicle to try to protect and advance internet freedom and to push back against digital authoritarianism.

Very practically speaking, there are a number of things that we—countries, nongovernmental organizations, and others—are doing to, for example, get anti-censorship technology into the hands of people who need it so that they have the tools to push back against the misuse of technology in an authoritarian way. We set up a multinational fund to do that at the Summit for Democracy that we hosted last year; and then, for example, putting export controls on surveillance technology to make sure that technology that we and other countries are producing that could have a dual use and be misused for the surveillance of populations, that doesn’t get into the wrong hands.

That takes working together. One country alone can’t do it. And, in fact, governments alone can’t effectively do it. We need to build these coalitions to make sure that we identify where technology should not go because it’s being misused, and then we’re together to make sure that it doesn’t get there.

MARIA RESSA: Yeah, I agree with working together. Mr. Secretary, you know that early on I said that the tech platforms that took control—became the gatekeepers from journalists abdicated responsibility for protecting the public sphere. And in some ways it’s taken so long to get government regulations that, in a way, governments have also abdicated responsibility. We’re just starting to see the beginning of this rollout in the spring from the EU, right.

And yet we know the impact of disinformation. In the Philippines we have seen disinformation repeatedly change our history. It’s that Milan Kundera quote; you know, the struggle of man against power. Well, we’ve forgotten really quickly. And disinformation is being used to manipulate our biology.

Where do you see—what can you do about this? And how do we fight back, given that there are more than thirty elections this year? And you can’t have integrity of elections if you don’t have integrity of facts.

ANTONY J. BLINKEN: Couldn’t agree with you more. And, you know, this has been one of the other changes that we thought was going to be totally for the good, but, of course, that hasn’t been the case.

In the United States a few decades ago, information that most people used in their daily lives, there was a common foundation, because there were actually a fairly limited number of sources of the information that people got. We had three television networks back then. We didn’t have cable. We didn’t have an internet. We didn’t have talk radio, et cetera, et cetera. And the hope, of course, was that the democratization of information would be a good thing overall. And fundamentally I believe that’s still the case.

But as a result of this, as a result of this disaggregation, you’ve lost exactly what you said, which are sort of the trusted mediators who can make sure that information, to the greatest extent possible, is actually backed up by the facts. And at the same time, the technology itself has allowed the abuse and the spreading of misinformation and disinformation in ways that we probably didn’t fully anticipate or imagine.

So we see authoritarian governments using this. We see it, for example, right now in the Russian aggression against Ukraine. We saw it in 2014 when Russia initially went at Ukraine and was using information as a weapon of war. So in that particular instance and in this instance, we’ve actually reversed this on them, precisely by using information, real information, to call out what we saw them preparing and working to do.

And being able to do that and to bring to the world everything that we were seeing about the planned Russian aggression, and to lay out exactly the steps they were likely to take, and which unfortunately they did, I think, has done a profound service to making sure that credible information is what carries the day and disinformation is undermined.

But there are a number of things that we can here again and we are doing to combat the misuse of information. Again, we start by exposing it. And we start by sharing the information that we have, working with others, again, in a coordinated way. We have at the State Department something called the Global Engagement Center, which is focused intensely on finding, exposing disinformation, the techniques that are used by those who are propagating it, and in a coordinated way, working with other countries, pushing back on it and giving people the tools to do it.

It’s critical for us that we also build the capacity of partners around the world, both governments but also journalists, nongovernmental organizations, civil society. There are a number of things that we’re doing. We have initiatives to help give people fact-checking tools to make sure that the information that they’re getting actually is backed up by the facts and to show when it’s not.

Digital literacy training, which is so critical to understanding what people are consuming and being able to separate the wheat from the chaff, the true from the misinformation and disinformation.

Bolstering independent media. This is so critical. The single best check and balance against misinformation and disinformation is an effective, independent media. And we have initiatives to do that, including, as appropriate, financing and other things.

We see that there’s a deliberate attack to take down independent media, to take down nongovernmental organizations that are operating in this space. So we’re putting in place protections. For example, countries actually try to use legal means—or I should say legal in quotation marks—legal means through lawsuits, as you know very well—

MARIA RESSA: Yes.

ANTONY J. BLINKEN:—and through regulatory challenge. Well, we’re putting in place programs, funding, to enable people, institutions, media organizations, to actually push back on that. All of these things together are part of what we need to do.

And finally, it’s so critical that we and you, this entire community, work with the platforms to find ways to more effectively ensure that they’re not being abused and used as a means of propagating misinformation, disinformation. Of course, it’s primarily on the platforms themselves to take the steps necessary to push back against that. I hope very much that we can continue to do that in a collaborative fashion. And sharing the information, what we’re seeing, for example, with the platforms, we’ve found that when we’ve been able to point them to malicious actors using the platforms in abusive ways, they’ve been responsive in making sure those actors can’t do it. But of course, it’s a moving target. And for every bad actor that you take off, maybe it comes back under another guise or something else pops up. So we have to be vigilant. We have to be relentlessly focused on this. And I hope that we can do this in a cooperative or collaborative way.

MARIA RESSA: Well, that’s certainly what we’ve been trying to do. But what we’ve seen in the last—you mentioned 2014 until now, right? The disinformation, the splintered reality that allowed Russia to annex Crimea, and then eight years later to invade Ukraine, those meta-narratives were seeded, the platforms were told about it, not much was done. And the question, of course, is would we be at this place if more was done, right?

But I guess this is—this does to the last—the crucial question, which is: We have had impunity in the virtual world. And that impunity, you have one-thousand-page document from the Senate that outlines what Russian disinformation did in 2016 in the United States. That impunity has filtered in the real world, and really severed the checks and balances that are there. I guess the—and here, to quote Shoshana Zuboff, where she just says: We live in one world.

And if you don’t have rule of law in the virtual world, you know, how can you have rule of law in the real world? And this goes back to what is your democratic vision? I think that’s what’s been missing, is that we don’t have a democratic vision for the twenty-first century with this technology that we have. What is that you have?

ANTONY J. BLINKEN: Yeah, Maria, I think you’re exactly right. And first, let me say, look, we’ve been awoken to this challenge over the last years. And I think for me it certainly started particularly in 2014 with the initial Russian aggression against Ukraine, and the use of misinformation and disinformation as a weapon to war, as critical to their campaign. And then, of course, we saw the interference in our elections. And all of that has created a—I think, an increasingly greater consciousness of the challenge, and the need to do something about it.

But doing something about it starts with exactly what you said, which is advancing a positive vision, an affirmative vision of what this future should look like. A vision of an open, free, global, interoperable, secure, reliable internet. One of the ways we’ve done that is with this declaration for the future of the internet that now some sixty countries have joined onto, that actually lays out what this positive vision is. We’re working in concrete ways, though, not just to put out the vision, but to realize it.

MARIA RESSA: So what are the concrete steps that you’re taking?

ANTONY J. BLINKEN: So much of the work that we’re doing is to make sure that we, and other likeminded countries, are at the table when so many of the rules and norms that are going to shape the future of the internet are being decided. And we’re doing that in a variety of ways. We’ve come together with the European Union through something we’ve stood up called the Trade and Technology Council, to make sure that we’re working together to advance these different norms and standards. There’s growing convergence between the United States and the European Union on this vision for the future. Now we put that in practice by bringing our combined weight together everywhere these rules and norms are being shaped.

We’re making sure that we’re investing in our own capacity to do that. Here at the State Department over just six months we stood up a new bureau for cyberspace and digital policy. We will soon have a senior envoy to deal with emerging technologies to make sure that to the extent values are infused in technology, they’ll be liberal values not illiberal ones, and making sure that technology is used for the good and to advance democracy, not to—not to undermine it.

We’ve been working to make sure that after last year’s Summit for Democracy we make this year a year for action in terms of implementing many of the concrete initiatives that were announced at the summit, including some that I mentioned a short while ago in terms of supporting independent media, giving people the tools they need to combat censorship, making sure that journalists and other organizations under siege can fight back and have the tools and the means to do so.

We, as I mentioned, have initiated a declaration for the future of the internet with sixty countries so far, making sure that we’re all aligned in a shared vision and trying to advance it. And finally, the institutions that are actually doing this work, that are deciding how all the technology that we share is being used, it’s hugely important that people who share this vision, share these values, are running these institutions.

There’s a hugely important election for the head of the International Telecommunications Union coming up. And the candidate we support, Doreen Bogdan-Martin, is someone of vision and of value who can help advance this shared perspective that we have. So it’s one of those—one of those things where probably 99.999 percent of people have no idea what the ITU is or how important this election is, but we’re very focused on it, and making sure that someone with a shared vision can drive this forward.

Last thing I’ll say, Maria, is this: I think everyone present today is at the heart of this effort. Civil society, nongovernmental organizations, the private sector, independent media working together, holding governments to account, and then ideally all of us joining forces. When you put all that together, it’s a very powerful force, and it’s one that I’m convinced can carry the day in making sure that the future of technology and the future of the internet is on that actually advances freedom, that advances democratic principles, and that makes sure that together we can build a future that reflects the values that we share.

So the work that every single one of you is doing in ways big and small, that’s what really counts. And I’m just pleased for the opportunity to spend a few minutes talking about how we see it, how we think about it. Especially, Maria, with you. So thank you.

MARIA RESSA: No, thank you so much, Secretary Blinken. Can I quick—just one quick question, because you—

ANTONY J. BLINKEN: Of course.

MARIA RESSA: So you mentioned leaning in. Sheryl Sandberg just said that she would be leaving Meta this—at the end of this year. These are American companies that did have values that were infused into their design—and, again, probably not by their design—but encouraged the death of democracies in many parts of the world. In Norway just last week, I kind of thought the next two years will be critical for the survival of democracy. And there were people from Kyiv, from Ukraine who really said that they received the most help from ordinary people. You’ve just asked us all to work together. I guess, you know, is there a timetable? You know, long term, yes, education. Medium term, yes, laws. In the short term, how can we stop what Anne Applebaum called Autocracy, Inc. from taking over in this period of chaos?

ANTONY J. BLINKEN: Maria, I think we all have to be seized with the fierce urgency of now. And, yes, many of the things that we’re talking about will play out over time. Much of this is not flipping a light switch or turning on or off a computer. It does take time. But if we bring to it together a sense of—a sense of urgency and a sense of determination, that’s hugely important. And if this entire community is galvanized, I think we can make—we can make a real difference. But that requires day-in and day-out vigilance. It requires day-in, day-out action. And I think what we’ll see, if we—if we do it right and do it in a sustained way, is you take a step and you look and it doesn’t look like you’ve traveled very far. But my hope and expectation is that over the next few years we will take many steps together and we’ll actually recognize that we traveled a great distance.

The hard reality that we face, and it’s a cliché but it’s profoundly true, technology itself isn’t inherently good or bad. How it’s used determines whether it’s for the good or for the bad. And if we marshal all of our forces together, I think we carry a great weight into this fight to make sure, to the best of our ability, that technology is used for the good. That it’s used to advance a more open, more free, more democratic world. And that it’s not misused and abused to undermine those basic principles. But I think we have to have exactly what you’ve said, a real sense of urgency about that, a real sense of vigilance, a determination to call out misuse and abuse, a determination on the part of nongovernmental organizations and civil society to hold governments and hold the private sector to account. And I’m—I remain optimistic that, marshalling all of these forces together with that sense of urgency, we can make a difference and we can shape a future that is more open, more tolerant, and actually supports and defend freedom and democracy and doesn’t undermine it. That’s the objective.

But look, we have to show, all of us in different ways, that we can actually deliver on this. So I recognize declarations are good. Calling things out are good. But what really counts is action that makes a change, action that deals with the problem. None of that is easy, but we’re determined to do it and we’re determined to do it together.

MARIA RESSA: Fantastic. Thank you so much for your time, Secretary Blinken.

ANTONY J. BLINKEN: Thanks, Maria.

Watch the full event

The post Blinken on protecting human rights online: It’ll take ‘day-in and day-out vigilance’ appeared first on Atlantic Council.

]]>
The EU Digital Services Act and Digital Markets Act could become global models, say the bills’ drafters https://www.atlanticcouncil.org/news/transcripts/the-eu-digital-services-act-and-digital-markets-act-could-become-global-models-say-the-bills-drafters/ Tue, 07 Jun 2022 21:09:44 +0000 https://www.atlanticcouncil.org/?p=534034 Two of the leading Digital Services Act and Digital Markets Act drafters talk about the future of the policy package—and how citizens will be key to helping bring about transparency and accountability online.

The post The EU Digital Services Act and Digital Markets Act could become global models, say the bills’ drafters appeared first on Atlantic Council.

]]>
Watch the full event

360/Open Summit: Contested Realities | Connected Futures

June 6-7, 2022

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) hosts 360/Open Summit: Contested Realities | Connected Futures in Brussels, Belgium.

Event transcript

Uncorrected transcript: Check against delivery

Speakers

Prabhat Agarwal
Head of Unit, Digital Services and Platforms, DG Connect, European Commission

Gerard de Graaf
Director for Digital Transformation, DG Connect, European Commission

Moderator

Kate Klonick
Professor, St. John’s University School of Law

KATE KLONICK: Thank you so much. Thank you, Rose. Good afternoon. My name is Kate Klonick. I’m a professor at St. John’s Law School and a fellow at the Brookings Institution and the Yale Information Society Project. And my research and writing for the last decade have focused on content moderation and online speech governance on private platforms.

So I am especially excited to be here to moderate what should be a fascinating panel, The Digital Services and Markets Act Package: What happened and what comes next, two of the leading drafters—with two of the leading drafters of the regulations. Prabhat Agarwal, head of Unit of Digital Services and Platforms at DG Connect, European Commission, and Gerard de Graaf, director for digital transformation at DG Connect at the European Commission. So welcome to you both, and thank you for being here to talk to us about the [Digital Services Act (DSA)] and the [Digital Markets Act (DMA)].

I wanted to start with a little bit of framing and perspective. So it was just a year ago, as Rose mentioned, that you had joined this conference virtually to discuss the process of framing the DSA. For those uninitiated, the Digital Service Act, or the DSA, aims to protect users’ rights to freedom of expression, while also empowering them to report illegal content, protecting their privacy, and allowing them to see why certain online ads or content are shown to them. Its companion act, the Digital Markets Act, or DMA, which establishes a set of narrowly defined objective criteria for qualifying a large online platform as a so-called gatekeeper, is a type of competition-protecting bill.

And these EU bills are the first of its kind—comprehensive regulatory framework for governing digital services. The DMA and DSA provide rules across a range of topics—from liability to content moderation, from transparency reporting to competition, with global implications as numerous other countries attempt to tackle the same issues. I wanted to start out by asking both of you, on the eve of this act’s, like, rocketing through drafting, what your thoughts have been on the process generally, but in the last year in particular since you joined this conference.

And I’ll start with you, Prabhat.

PRABHAT AGARWAL: Thanks, Kate. Well, it’s been a rollercoaster, I should say. You know, so first of all, I would say there’s been an amazing amount of support for the kind of initiatives and ideas that we put forward. Since we spoke last summer we took the proposals to the Council of the EU, which is where all twenty-seven member states come together. And both the Digital Services Act and the Digital Markets Act were supported unanimously by all member states, in a very relatively short period of time after we spoke. So less than twelve months after we presented the proposals in November of last year.

And in a very short period after that, in December of last year, the European Parliament voted its position on these two acts, also, again, with overwhelming majorities. So I think the highlight really has been the amazing amount of political support that we had across all political parties, across all member states, for the kind of ideas that we are putting forward. That’s, I think, the highlight for me in the last twelve months. And of course, then it led to a very quick agreement early on in the first quarter. Now we’re in the finalization process.

So the main takeaway was when I spoke to you, together with Gerard last time here, I think we didn’t—we knew that here was a lot of support. We didn’t quite anticipate that there was this much support. That’s how I would say.

GERARD DE GRAAF: I would fully agree to that. I think what was particularly heartening was to see that the approach which we had taken, which was a systematic approach, so kind of that the platforms needed to be regulated on the systemic risks that they posed to society, that that approach—which, in a way, was actually inspired by banking regulation, was strongly endorsed. That it’s important that platforms have kind of risk management in place, that they have due diligence obligations.

I think that—so the discussion wasn’t on what we call the architecture, on the fundamentals of the proposals. It was more—and that was another interesting fact, is we thought we had made an ambitious proposal in December 2020. And typically what you have in a negotiation with the Council and the Parliament is that they try to put it down a little bit, and then you end up somewhere around the original proposal. Here we had both the Council and the Parliament saying it’s ambitious, but it’s not yet ambitious enough. So, actually, the end result, the kind of—the measure as it was adopted at the end is even more ambitious than what we proposed in December 2020. And I think that’s unique. I mean, I don’t think we have lived that very often.

I think on the DMA a bit, the same approach here to say, look, we cannot rely on antitrust rules alone. I mean, the movement—I mean, the market is moving very fast. We need to—kind of to equip ourselves with an instrument that can actually address these issues upfront, I mean in an ex-ante way. I think also there was a lot of support.

And similarly to what happened on the DSA. I mean, we put forward, actually—I mean, Prabhat and I, we discussed, like, is—I mean, we put eighteen unfair practices in the original proposal of the DMA. And I think we often asked ourselves the question, well, is this going to fly politically? Is this—is this what the market can bear? And interestingly, yes. And some of these proposals would further be enforced in the—in the process.

KATE KLONICK: So can we talk a little bit about how the DSA is going to be implemented? I think you’ve—people have described it and you’ve described it as having a multilayer process with many different, like, parties and stakeholders implementing different parts of it. Explain kind of how you got to that solution and how you envision it kind of playing out.

PRABHAT AGARWAL: I can start and maybe—first of all, this is a fundamental difference between the DSA, which deals more with content moderation and speech-related issues and illegal content, disinformation. Of course, naturally speaking, language issues are a big factor there; you know, disinformation in one member state is very different from another member state. So the role the member states play in the Digital Services Act is very different from the Digital Markets Act, where we’re talking about unfair practices, and what’s unfair in one country is also unfair in another country.

So from the outset, the Digital Markets Act had foreseen a centralized enforcement by the European Commission of the rules in unfair trading, but a decentralized enforcement of the Digital Services Act, giving member states across the European Union the main power.

Now, like Gerard was saying, in the previous intervention, actually, during the negotiations member states said, well, actually, we would really like to bundle this power in the European Commission as well and have the European Commission be the primary enforcer. So that’s one layer. Of course, we still have to work with member states’ authorities because we don’t speak all the languages. We don’t understand all the national context and the nuances. And we see, particularly in the field of disinformation, enormous sophistication of actors in spreading disinformation, which requires local and cultural context.

I think there’s a second element to this is that multilayer enforcement means action by the regulator. It also means actually empowering third parties, like civil-society actors, to uncover things. And we’ve seen journalists’ investigations or civil-society investigations in the United States; you know, organizations such as ProPublica have shone a light on some of the shortcomings or some of the, you know, problems out there.

We have seen that these are very powerful levers for actions and for change. And so we’ve built into the Digital Services Act, but also in the Digital Markets Act, powerful transparency and accountability levers that actually activate this. This is the second layer, I would say, of enforcement. And then there’s, of course, new powers for the users, Gerard, that we put in as well, huh?

GERARD DE GRAAF: Yes. I mean… action. So all of us, we will have a role. If we see something on the platform and we think it’s illegal or it’s disinformation, you can notify that. Then the platform has to—it becomes aware. It will have actual knowledge, which the European Union triggers the liability, or at least removes the liability exemption. And then there’s an interaction, and the platform will have to explain what it has done. Has it removed it, not removed it? Also the person who posted it will need to be brought into this discussion.

So that’s certainly something that is empowering that allows all of us to play an active role in ensuring that kind of what is on the internet is safe, and at the same time our fundamental rights are preserved.

There’s other elements there; the access of researchers, for example. There’s a legal base that gives researchers a right of access, vetted researchers the right of access. They can look under the hood of the platform. They can uncover situations that so far have escaped our attention. So a platform can’t say, sorry, but I’m not going to give you access. There’s a legal ground for access.

We will have independent audits. At least once a year a platform will need to undergo an independent audit where the auditor comes in, and a bit like what an auditor does in a company or in a financial institution, in a bank, it just looks at all the systems and it will find also certain vulnerabilities that then will need to be addressed by the platform.

There will be reporting. At the moment, there is reporting but is it the kind of meaningful reporting which we would like to receive, we, as regulators—I mean, the civil society, I mean the member states. I mean, that’s—there will be kind of clear templates for what we think is meaningful reporting. And then you can see also from the report what platforms are in terms of, for example, content moderation, how much they are investing content moderation in minority languages as an example.

So this is a multilayer. It’s not just the European Commission, which, of course, will be the central enforcement authority, but it is a multilayer, a multistakeholder kind of enforcement structure that, I think, can work if we all contribute to making it work.

KATE KLONICK: And I know we are on a quick timeline today because we have something coming up on this shortly, so I’m going to skip to kind of the DMA and speaking about the DMA. If we come back, I have a couple of follow-up questions on the DSA.

But one of the things that that the DSA has kind of—or the DMA—one critique of the DMA was that it effectively kind of forfeits competition and consumer choice as a way of shaping platform behavior in favor of having kind of more heavily regulated entities, and, obviously, the DMA is, in part, an answer to that.

And so can you talk a little bit more about how the DMA and, particularly, explain the gatekeeper function and the gatekeeper label and how that will work for the companies?

PRABHAT AGARWAL: So the notion of a gatekeeper, actually, simply is meant to reflect the fact that there are certain situations where platforms inter mediate access between an enormous amount of end users—you and me—and a large number of businesses.

You know, one of the clearest examples are app stores. So app stores you have millions of developers and billions of users of app stores, you know, but you only really have two app stores, at least in the Western world. So that actually means that a gatekeeper function is that somebody who sets the rules of the game at the same time, you know, hasn’t—leaves no opportunity for people to go around it.

So we have this notion that there’s a dependency relationship between business users and end users by a gatekeeper, through a gatekeeper, that they—there is a certain amount of financial power associated with this relationship. So it needs to have a certain amount of turnover to qualify as a gatekeeper and the situation needs to be entrenched so it’s not just a quick flash in the pan like situation but over multiple years the situation persists.

And these criteria are spelled out in the law—in black letter law. They’re backed by an impact assessment where we looked at the different market characteristics that were going on, and what is really meant to be captured here is the unusual network effects—data-driven network effects that lead to a kind of a—this particular situation of lock in or dependency and that characterizes the platform economy.

KATE KLONICK: OK.

Gerard, would you characterize how the DMA thinks about platforms as thinking of them as utilities, thinking about them as regulating them as in the US, as we’ve heard, as common carriers or as some type of, like, basic function that is necessary to be regulated rather than left wholly up to competition?

GERARD DE GRAAF: Well, I mean, they are gatekeepers. So if you are, like, a small business or you’re a small hotel, I mean, it’s very difficult to be successful if you don’t partner with Booking.com or it’s very difficult, very hard, to be successful if you ignore Amazon as a marketplace because you, basically, forgo a very important part of potential turnover.

And then we have observed practices like self-preferencing, tying certain conditions that are being imposed. You cannot offer better deals for your hotel outside of the platform that we have and so the political decision-makers in the European Union have now defined as unfair and, therefore, should be prohibited. There are other kind of practices. These are the don’ts. These are the do’s. Companies that say, look, I’m providing services, for example, through the app store. I’m an editor. I sell a newspaper through the app store. I have no idea who the customers are. I have no relationship with the customer. I can’t get the data even kind of consistent with the GDPR. I cannot find out who the customers are and then maybe tailor a bit my product more to their expectations. So that that’s a do.

Giving access to data is a requirement. Interoperability that is also foreseen. So those practices, I mean, now need to be implemented. It will have a fundamental effect on the business models of these gatekeepers. When you think about sideloading in the app store, you will—in the future you will be able to download apps that do not come through the app store, if you have an iPhone. So in a way, we break open that ecosystem. That would be fundamental changes. But we think these fundamental changes are necessary.

And the argument, like regulation, is, per se, bad for competition. Well, it’s the other way around. We don’t see another way, I mean, through competition policy, for example, to get rid of what we consider these unfair practices. We believe that this will unleash a lot of innovation, a lot of competition, benefits for the user, benefits for businesses, benefits for app developers. So the argument, oh, this is regulation and therefore must be constraining and reducing innovation, we reject completely out of hand.

KATE KLONICK: So one of the—finally, I think this will be our last question—but one of the final kind of critiques or one of the major critiques of the GDPR and now the DSA and DMA is that EU is essentially regulating for the world, from this place of kind of—of market power, and also kind of an ability. You actually have a semi—a mostly functioning legislative process, unlike other countries I won’t name. And but there is—just can you say a little bit about the criticism around the Brussels effect, and, like—and whether or not, like, that’s even necessarily a bad thing in this context?

PRABHAT AGARWAL: And I think the fact is that other regions are struggling with similar problems is not a kind of secret. You know, and people around the world share a problem analysis on how we—how do we—how do we fight, you know, fake news or disinformation campaigns, while preserving freedom of expression? How do we ensure that the markets that are dominated by these very—platforms with very strong network effects, that we maintain possibilities for competitive entry and fair practices? You know, we’re not the only jurisdiction that has kind of struggled—is struggling with this.

So I would say that the problem definition is pretty widely shared across the globe. Now the fact is not everybody is going to come to a solution, or is not necessarily going to come to the same solution. I think that’s also normal because there are different legal systems out there. For the DSA, where fundamental rights are stake and freedom of expression is at stake, I think it’s very important that we kind of orient ourselves with international human rights norms. That’s what we try to do in the drafting of the process. But even looking beyond, I think that these are also opportunities for cooperation at a global stage—you know, in the next stage during the implementation.

And one thing I often say is that the DSA in particular is going to be a huge data generation machine. And I think we’ll need to cooperate across borders to harness that data, and to create insights. You know, and this is a little bit how we view, in this context, the Brussels effect. It’s not necessarily us imposing rules on everyone else, but just creating a platform for collaboration on the important issues.

KATE KLONICK: Gerard, do you want to—

DE GRAAF: I mean, our mandate is to regulate for Europe. We don’t regulate for the world. Even though some of the companies are outside of the European Union, they target the European Union, and therefore they are within scope. When we were kind of making the proposals, and when they were regulated, we were mindful of the kind of—at least, say, the—that the DSA, the DMA could become a reference point for other countries around the world.

And I think if you look at it rather broadly, you see three models, particularly in terms of, like, the regulating the internet. Less so for kind of the DMA. And one model is the Chinese, Russian, Turkey model, which is a very repressive model. It’s a very kind of authoritarian model. You have the European model. And then you have a model which hopefully will be changing, but of course that depends on kind of political developments, which is a laissez-faire model, which is the US model, at least until quite recently.

We think that, as Prabhat said, there’s a lot of countries—we’ve been approached very, very intensively by countries around the world who want to know and ask many of the questions that no doubt cross your mind. Why this? Why not that? Et cetera. So we are spending a lot of time on explaining, because these countries are also looking to regulate or looking to legislate. So they’re looking for a source of inspiration. I mean, we have therefore also a very important responsibility to make sure that it works, that it can work. So the implementation is going to be very critical.

But we will want to offer, I think, as democratic societies and we work a lot with the US in the TTC. And the problem analysis I think is shared. We will need to offer too, as democratic societies, an attractive alternative to those countries who kind of—either are already implementing kind of repressive policies like China and Russia, but there’s a lot of countries who are, like, on the fence, who in the next, say, couple of months and years are going to decide which type of regulatory model are we going to join? Is it the Chinese, Russian, Turkish model? Or is like the European model? And hopefully which will kind of—more kind of interventions on the US side. I think that is the key question for the next couple of years. And if that’s called the Brussels effect, it’s fine for us.

KATE KLONICK: Thank you so much. This was—this was fast, but wonderful. And I think that we got to do kind of a very high-level kind of understanding of both the role of the drafting and the multistakeholder nature of it, the multistakeholder nature of implementation. And we will see where the DSA is next year, hopefully. Thank you.

Watch the full event

The post The EU Digital Services Act and Digital Markets Act could become global models, say the bills’ drafters appeared first on Atlantic Council.

]]>
Ukraine at 360/OS: How Russian disinformation is fueling the war https://www.atlanticcouncil.org/content-series/360os/ukraine-at-360-os-how-russian-disinformation-is-fueling-the-war/ Tue, 07 Jun 2022 21:03:13 +0000 https://www.atlanticcouncil.org/?p=534215 The Digital Forensic Research Lab's 360/Open Summit dug into the online ramifications of Russia's war in Ukraine, and what democracies should do now.

The post Ukraine at 360/OS: How Russian disinformation is fueling the war appeared first on Atlantic Council.

]]>
At the start of the Digital Forensic Research Lab’s (DFRLab) 2022 360/Open Summit conference in Brussels on June 6 and 7, members of the DFRLab previewed an upcoming research report on Ukraine that involved reviewing more than three thousand fact checks and five hundred pro-Kremlin Telegram channels to gain a deeper understanding of how the Russian information space operates. DFRLab Research Associate Roman Osadchuk spoke about the “avalanche of disinformation” coming from Russia that seeks to dehumanize Ukrainians. Alongside Russia’s invasion of Ukraine, a torrent of false narratives were used to justify the war, including falsely equating Ukrainians with Nazis, accusing Ukraine of having “biolabs” capable of building “dirty nuclear bombs,” and blaming the United States and NATO for provoking the war.

In the panel Another open source record of war, Liubov Tsybulska, founder of the Centre for Strategic Communications and Information Security in the Ministry of Culture and Information Policy of Ukraine, called out the contradictory behavior of Western states as it pertains to words versus actions. Tsybulska said, “This war also exposes a crisis of values in the West. Some of these values are very declarative and not followed by action.”

In the weeks after Russia invaded Ukraine, social media platforms and European governments imposed restrictions on Russian state-owned media in a bid to minimize the impact of Kremlin disinformation. However, in a day two session titled How sovereign hammers are fracturing the internet, and what democracies can do about it, Usama Khilji, executive director at Bolo Bhi, noted that the unprecendented decision could have unintended consequences in the future. It will encourage other governments to censor the news websites of countries with which they share unfriendly relations, he noted, warning that this will result in state media filling the information void. These actions build walls within the internet. Khilji advocated for allowing citizens, not states, to make decisions about what information they consume.

But as DFRLab’s Lead Researcher for the Baltics Nika Aleksejeva noted in the lightning talk False start: How the Kremlin lied its way to war, the issue is inherently complex. For nearly a decade, Russia has worked to undermine digital literacy among Russian citizens by repeatedly sharing propaganda that dehumanizes Ukrainians and asserts Russia’s dominance. Allowing citizens to make decisions about what content they absorb must also coincide with promoting digital literacy.

As Aleksejeva noted, even after the arms are put down, the question remains: How do we overcome Russian propaganda that will continue to spread online?

Watch the panels


Layla Mashkoor is an associate editor at the Digital Forensic Research Lab.

Iain Robertson is a deputy managing editor at the Digital Forensic Research Lab.

The post Ukraine at 360/OS: How Russian disinformation is fueling the war appeared first on Atlantic Council.

]]>
Moderating non-English content: Transparency and local contexts are critical https://www.atlanticcouncil.org/content-series/360os/moderating-non-english-content-transparency-and-local-contexts-are-critical/ Tue, 07 Jun 2022 14:09:52 +0000 https://www.atlanticcouncil.org/?p=533837 The decisions made by content moderators and algorithms have significant impacts, not only in online information spaces but also offline.

The post Moderating non-English content: Transparency and local contexts are critical appeared first on Atlantic Council.

]]>
Watch the full event

Platforms face no shortage of challenges when it comes to moderating non-English content. It’s not an easy task to create automated systems that can understand local contexts, delicate nuances, and different dialects. Yet there is no room to fail in this space: The decisions made by content moderators and algorithms have significant impacts, not only in online information spaces but also offline.

Platforms have a responsibility to their users across the globe. They have a responsibility to rein in hate speech, to not suppress users in authoritarian countries advocating for change, and to support users in conflict zones who rely on social media to document war crimes and human-rights abuses.

At a panel discussion Monday during the Digital Forensic Research Lab’s 360/Open Summit in Brussels, Scott Hale, director of research at Meedan, advocated for tech platforms to build through community. “This is where community organizations just excel to such a greater extent,” he said. “They have their ear on the ground, they know about the long-running issues in these communities, and those sorts of perspectives should absolutely inform the design of policy and the enforcement of policy adjudication.”

Design is political, but that means it can be changed to make improvements. At the moment, platforms are designed to make a profit, noted Dragana Kaurin, founder of Localization Lab. Despite social media companies being spaces where speech norms are determined and political landscapes are shaped, decision making is motivated by profit. For civil society organizations, this is the largest obstacle to overcome when advocating for more resilient content moderation systems.

The question remains: How can markets be incentivized to better align with the needs of social media users based outside of the West? Often, when platforms are motivated to make changes, it is the result of being influenced by Western media or advertisers. Reflecting on how design often omits the contexts of people outside the West, Kaurin said: “People find their own ways to adapt [to platform design], but we don’t want people to adapt. We want people to see themselves in the technology.”

Marwa Fatafta, the MENA Policy Manager at Access Now, noted that platforms have offered leniency to Ukrainian activists in allowing them to call for violence against invading Russians or President Vladimir Putin. Yet activists in the Middle East and North Africa see their content removed when advocating for violence against an invading force or authoritarian government.

This imbalance was on display during the Gaza war in May 2021, when Palestinian activists who documented Israeli forces storming Al Aqsa mosque, the third-holiest site in Islam, had their content removed from Instagram. In May 2022, Iranian activists faced a similar situation when content that used the phrase “death to” was removed en masse, but in Iran, the phrase has a history of being used symbolically to call for change, rather than as an actual call for violence.

Fatafta noted that many solutions already exist, they just need to be implemented. “There is no shortage of coverage, there is no shortage of human-rights experts [and] content moderation experts that can pinpoint what’s exactly problematic in Mexico, in Palestine, in Myanmar,” Fatafta said. “It’s about willpower. It’s a political decision first and foremost and of course a financial one.” For Kaurin, the solution starts with transparency for content-moderation systems—both in policy decisions and implementation: “Being accountable to users is the most important thing, and this is how we have trust.”


Layla Mashkoor is an associate editor at the Atlantic Council’s Digital Forensic Research Lab.

Watch the panel

The post Moderating non-English content: Transparency and local contexts are critical appeared first on Atlantic Council.

]]>
360/OS Contested Realities | Connected Futures day 1 round-up https://www.atlanticcouncil.org/content-series/360os/360-os-contested-realities-coordinated-futures-day-1-round-up/ Mon, 06 Jun 2022 20:39:35 +0000 https://www.atlanticcouncil.org/?p=533560 Catch up on all the highlights from the first day of the Digital Forensic Research Lab's summit in Brussels.

The post 360/OS Contested Realities | Connected Futures day 1 round-up appeared first on Atlantic Council.

]]>
The first of two exciting and jam-packed days is complete. If you missed the day’s events from the Digital Forensic Research Lab’s 360/Open Summit, catch up below with brief descriptions of each session, alongside videos and links to supplemental content.

Lightning Talk | False start: How the Kremlin lied its way to war

The first session of the day featured the DFRLab’s own Roman Osadchuk, Nika Aleksejeva, and Ingrid Dickinson. Osadchuk dialed in from Ukraine to discuss Russia’s online attacks on his home country and the real-life impact they have, saying “Russians do horrible things to Ukrainians, partially because they [Russians] were taught they [Ukrainians] were not human.” After the brief question-and-answer session with Osadchuk, Aleksejeva and Dickinson previewed the work they’ve been doing looking at Russia’s narrative build-up in advance of its invasion of Ukraine. The research will be presented as a report at a later date.

Panel | Another open-source record of war

Next up, a panel discussing how open-source information can aid in the documentation of war crimes. The panel featured Liubov Tsybulska, founder of the Centre for Strategic Communications and Information Security in the Ministry of Culture and Information Policy of Ukraine; Charlotte Godart, investigator and trainer with Bellingcat, dialing in remotely; and Janis Sarts, director of the NATO Strategic Communications Centre of Excellence. Alice Stollmeyer, founder and executive director of Defend Democracy, served as moderator.

Lightning Talk | Platform policy: A domain of war?

The morning session closed out with another Lightning Talk, this time featuring DFRLab Assistant Director Jacqueline Malaret, Resident Senior Fellow Emerson Brooking, and Anchor Change CEO Katie Harbath, who discussed the role social media platform policies play in times of war. “Platforms are actors in conflict,” said Brooking. The unprecedented actions taken by platforms against Russia after the invasion of Ukraine immediately affected how the Russian government and its propaganda apparatus could spread messages. They also impacted how Ukrainians could communicate their plight with the outside world.

Panel | Digital authoritarianism on the open market: The case of the NSO Group

In the afternoon, Miranda Patrucic, deputy editor in chief of regional stories and Central Asia at the Organized Crime and Corruption Reporting Project, moderated a discussion about digital authoritarianism, exploring the impacts of software like the NSO Group’s Pegasus spyware. Panelists included Carine Kanimba, an activist and chief of staff at Flat World Partners; Donncha Ó Cearbhaill, the acting head of Amnesty International’s Security Lab; and Szabolcs Panyi, investigative journalist at Direkt36. “These tools are open for misuses, not just by different authoritarian governments, but also by democracies worldwide,” noted Patrucic.

New Atlanticist

Jun 6, 2022

Spyware like Pegasus is a warning: Digital authoritarianism can happen in democracies, too

By Nick Fouriezos

Journalists and citizens targeted by spyware warn the audience at the Digital Forensic Research Lab’s 360/Open Summit about the proliferation of state-sponsored digital surveillance.

Africa Cybersecurity

Panel | Moderating non-English content: Challenges and solutions for platforms operating globally

In the next session, Alex González Ormerod, the Latin America editor at Rest of World moderated a discussion about the challenges platforms face when moderating non-English content—and what potential solutions exist. Panelists included Marwa Fatafta, MENA policy manager at Access Now; Scott Hale, director of research at Meedan; and Dragana Kaurin, the founder of the Localization Lab. Panelists noted that solutions to improve content moderation practices exist but that there is a lack of willpower to make the necessary changes. For Kaurin, transparency is one of the most urgent needs, not only in policy decisions but also in implementation: “Being accountable to users is the most important thing.”

Lightning Talk | Hong Kong campaigns coordinator for the Inter-Parliamentary Alliance on China (IPAC)

Political and digital-rights activist Chung Ching Kwong shared how the Hong Kong government has weaponized technology to surveil and repress defenders of democracy by passing its draconian national-security law. With access to online information massively restricted, Hong Kong has been trapped in a black box where every action is monitored, and citizens are subjected to the same tactics employed by China in Xinjiang province. Detailing the extent of digital authoritarianism in Hong Kong, Chung Ching Kwong encouraged others to imagine technological systems where users are not seen as products and invasive data collection is disincentivized.

Panel | Democracy in a decentralized digital world

Next up, a panel discussed the future of the internet—specifically Web3 technologies—and what it means for democracy. Featured in the panel were Alex Zerden, adjunct senior fellow with the Energy, Economics, and Security Program at the Center for a New American Security; Nanjira Sambuli, a fellow in the Technology and International Affairs Program with the Carnegie Endowment for International Peace; and Cathy Mulligan, professor of computer science at the Instituto Superior Técnico, University of Lisbon; with Khushbu Shah O’Shea, editorial director at Rest of World, serving as moderator. The panelists sought to separate facts from hype when discussing Web3, pointing out that there is a substantial conflict between the claims made about the “decentralization” of the internet and the reality of equal access for all. Even in this brave new world, the question remains: Who gets to hold the power?

Transcript

Jun 6, 2022

Web3 is set to transform the internet. Can it bring global social and economic change?

By Atlantic Council

The decentralized digital world is on the rise; here’s what that means for political, economic, and social rights worldwide.

Civil Society Internet

Lightning Talk | Innovating against adversaries

Nathaniel Gleicher, head of security policy at Meta, outlined the advantage enjoyed by adversarial threat actors but highlighted how a corresponding “defender advantage” also exists. According to Gleicher, an attacker’s advantage is one-off, comprising the ability to surprise and do so quickly, but defenders enjoy a stronger advantage—one of strategy and time. He said that employing public disclosure and transparency as a form of deterrence often weakens the effectiveness of threat actors.

Panel | Augmented harms in augmented reality

No conversation on connected futures is complete without a deep dive into the world of augmented reality and what life looks like in the metaverse. Our final panel of the day featured Daniel Castaño, founding partner at Mokzy; Kat Lo, content moderation lead and product researcher with Meedan; and Kimberly Voll, co-founder of the Fair Play Alliance, in conversation with DFRLab Nonresident Fellow Brittan Heller. The panelists agreed that the age of immersive technology is here but also sounded alarms on the harms that come from operating in a system where bodily autonomy doesn’t exist but the trauma is the same.

Transcript

Jun 6, 2022

What happens when toxic online behavior enters the metaverse?

By Atlantic Council

As technology and reality intersect, policymakers are going to need to prepare for a world integrated with virtual and augmented reality.

Civil Society Internet

The post 360/OS Contested Realities | Connected Futures day 1 round-up appeared first on Atlantic Council.

]]>
Spyware like Pegasus is a warning: Digital authoritarianism can happen in democracies, too https://www.atlanticcouncil.org/blogs/new-atlanticist/spyware-like-pegasus-is-a-warning-digital-authoritarianism-can-happen-in-democracies-too/ Mon, 06 Jun 2022 20:21:37 +0000 https://www.atlanticcouncil.org/?p=533539 Journalists and citizens targeted by spyware warn the audience at the Digital Forensic Research Lab's 360/Open Summit about the proliferation of state-sponsored digital surveillance.

The post Spyware like Pegasus is a warning: Digital authoritarianism can happen in democracies, too appeared first on Atlantic Council.

]]>
Watch the full event

When Szabolcs Panyi discovered he had been targeted by Pegasus spyware, his reaction was understandable: “Well, I freaked out,” the Hungarian journalist said, as he was in the middle of investigating the powerful, Russian-controlled International Investment Bank. He wondered why he had been targeted and how he had installed the malware. “What’s going to happen to my sources?” 

For Panyi and many other journalists in Hungary, it was the first direct evidence of something they had long suspected: That they were being watched by the Viktor Orbán government in Budapest. And they weren’t alone, as was revealed by an extensive coordinated global investigation by journalists and nonprofits.

Carine Kanimba—a dual US-Belgian citizen working to free her father, Paul Rusesabagina, the imprisoned Rwandan activist who inspired the film Hotel Rwanda—was one of the fifty thousand phone surveillance targets revealed in the investigation. Studying the data, Kanimba and Amnesty International discovered that the software had been active during a meeting she had with the Belgian foreign minister. “From the moment I walked in to the moment I walked out, the software was active—not only spying on me, but spying on the [Belgian] government and the other officials I’m interacting with to free my father.”

Kanimba and Panyi spoke Monday at a panel discussion on “Digital Authoritarianism on the Open Market,” hosted by the Atlantic Council’s Digital Forensic Research Lab at this year’s 360/Open Summit in Brussels. Here are some more key takeaways from the conversation. 

The lay of a land in the shadows

  • It’s not just governments known for privacy abuses that are using digital surveillance tools like Pegasus, warned panel moderator Miranda Patrucic, the deputy editor in chief for regional stories and central Asia for the Organized Crime and Corruption Reporting Project: “These tools are open for misuses, not just by different authoritarian governments, but also by democracies worldwide.”
  • State-sponsored digital surveillance is not a new industry, added Donncha Ó Cearbhaill, acting head of Security Lab at Amnesty International. For example, such surveillance tools were used against civil society during the early days of the Arab Spring, and the National Security Agency carried out an illegal spying program in the United States. 
  • Some spy tech programs have been successfully exposed. Milan-based Area Spa was raided by Italian authorities in 2016 after being accused of working with Syria. Munich-based FinFisher was raided by German authorities in 2020 after its tech was used by the Turkish government and others, and has since shut down. 
  • While the tech changes, the targets often stay the same: “The same individuals the states see as a threat are being targeted again and again, by new companies and new software that is getting more and more sophisticated over time,” Cearbhaill said.

What is being done?

  • Panyi and other Hungarian journalists are taking legal action to discover why they were targeted, as well as suing Israeli government officials for approving the sale of Pegasus to Hungary, given its record for cracking down on the media. While he’s not confident they will succeed, Panyi says the goal is to spread awareness. “If a relatively unknown journalist from a small country can become a target, you can imagine what can happen to others,” Panyi said. 
  • France and Israel opened investigations into the NSO Group after the Pegasus Project was published, while the US Department of Commerce added the NSO Group to its Entity List for trade restrictions. Companies responded, too, with Apple suing the NSO Group and Amazon Web Services shutting down infrastructure and accounts linked to the company. WhatsApp now sends notifications to those who may have been exposed to Pegasus software, which has led to new spyware cases discovered in Jordan and El Salvador. “Activists, journalists, we have power. We were able to make a difference, even with tools like that, and obviously we need more support, and more action,” Patrucic said.
  • Still, direct policy action has been limited, outside of a European Union parliamentary inquiry. “Several states, while they are critical of activists in their own countries getting targeted, they have so far been reluctant to put in meaningful regulation on these tools because they also benefit from an open system where they can apply these tools without much transparency,” Cearbhaill said, adding that better export controls would help states and the public track the use of surveillance tech as it is sold across borders.

Trying to protect against surveillance

  • All of the panel speakers have adjusted their behaviors since discovering the surveillance. Kanimba got rid of her surveilled phone only to find tracking on newer devices, too. That’s led her family to somewhat drastic measures when talking about sensitive topics. “Since everyone is frightened, we put all our phones in the microwave,” she said. “I don’t know that it works, but at least it makes everyone feel safe. But unfortunately, there’s no way until there is more work done by our governments.”
  • Panyi has changed the ways he works with sensitive information, especially as his team prepares legal actions, which could be ruined if Hungarian intelligence hacked their communications and shared them with Israel. Teaming with Forbidden Stories, Amnesty International, and large international outlets like the Guardian and the Washington Post gave smaller newsrooms like his some tech and legal cover, Panyi said: “With the PR firm employed by NSO group, or the legal threats, you can imagine what kind of power and money that involves.”
  • Source protection has taken on even greater importance to journalists. Panyi relies more often on “old-school methods” to schedule meetings and gather information, such as using code words and conducting interviews in public spaces. “I’m pretty sure that as technology develops, there are going to be new Pegasuses, but if you just leave your phone behind… I think, relatively, you should be fine.” 

Nick Fouriezos is an Atlanta-based writer with bylines from every US state and six continents. Follow him on Twitter @nick4iezos.

Watch the panel

The post Spyware like Pegasus is a warning: Digital authoritarianism can happen in democracies, too appeared first on Atlantic Council.

]]>
What happens when toxic online behavior enters the metaverse? https://www.atlanticcouncil.org/news/transcripts/what-happens-when-toxic-online-behavior-enters-the-metaverse/ Mon, 06 Jun 2022 19:08:26 +0000 https://www.atlanticcouncil.org/?p=533418 As technology and reality intersect, policymakers are going to need to prepare for a world integrated with virtual and augmented reality.

The post What happens when toxic online behavior enters the metaverse? appeared first on Atlantic Council.

]]>
Watch the panel

360/Open Summit: Contested Realities | Connected Futures

June 6-7, 2022

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) hosts 360/Open Summit: Contested Realities | Connected Futures in Brussels, Belgium.

Event transcript

Uncorrected transcript: Check against delivery

Speakers

Daniel Castaño
Founding Partner, Mokzy

Katherine Lo
Content Moderation Lead, Meedan (US)

Kimberly Voll
Co-Founder, Fair Play Alliance

Moderator

Brittan Heller
Nonresident Fellow, Digital Forensic Research Lab, Atlantic Council

BRITTAN HELLER: So welcome to the last panel of the day. I stand between you and beer, chocolate, and waffles. And so we’re going to have a good time, we’re going to talk about this, we’re going to get excited, and then we’re going to go talk about it afterwards together.

My name is Brittan Heller. I am a fellow at the Digital Forensic Research Lab focusing on AR, VR, and technology…

I have brought some panelists with me here today, one of them virtually when we can get her up here. And I’m going to ask the panelists to introduce themselves so that this is more conversational. So, Kat, why don’t you go first?

KATHERINE LO: I’m Kat Lo. I’m content moderation lead at Meedan and I work with fact-checkers, human rights defenders, journalists, and targets of harassment and hate to think about what the product implication of content moderation decisions are and how to translate, you know, policy decisions into making—designing a product that would actually protect people because it often doesn’t happen despite our best attempts.

DANIEL CASTAÑO: Hi, everyone. My name is Daniel Castaño. I’m from Colombia. I’m a law professor at the Universidad Nacional de Colombia, and I’m also a consultant working for big tech and emerging technologies privacy policy and digital ethics.

BRITTAN HELLER: And Kim, why don’t you go now.

KIMBERLY VOLL: Hello. Can you hear me OK?

BRITTAN HELLER: Yeah.

KIMBERLY VOLL: Excellent. Hello from Vancouver, Canada. Thanks for having me from all the way over here.

As mentioned, my name is Kimberly Voll. I co-founded and today co-run the Fair Play Alliance, which is a cross industry initiative of over 250 gaming companies around the world. We focus on using game development to encourage healthier behavior, reduce disruptive or harmful behavior online—in games and in online spaces more broadly.

By day I’m also the studio head at Brace Yourself Games here in Vancouver, Canada, and my kind of background is a mix of—I’m a researcher, designer, developer, and a long-time game maker. I focus a lot on digital social dynamics; what it means to thrive in digital spaces. And on the formal side, I have a PhD in Computer Science, specializing in artificial intelligence (AI), as well as an Honors Degree in Cognitive Science. I’m very happy to be here.

BRITTAN HELLER: Thank you. So, I’m going to give you a trigger warning, where when you talk about content moderation and online harms, sometimes it can involve very sensitive issues. So, if you feel like you are upset, please feel free to go get some water. Please feel free to step out, and please feel free to talk to us afterwards about it.

So, with that, we’re going to dive right in. My first questions for the panelists are—what is the metaverse? There’s many definitions going—going around. What is the metaverse? What are the major differences between AR and VR technology, and what does the hardware scape look like?

So, Kim, do you want to start?

KIMBERLY VOLL: Sure, yeah. I mean, for me I think it’s important to talk from the perspective of what I think about as metaversal technology. I think there’s a lot of oversimplification of things like saying the metaverse is VR or vice versa. But I think, zooming back, there’s really sort of three key pieces to what we’re seeing in terms of metaversal tech and our move toward this concept of the metaverse.

The first is interactivity. So, I think we’re seeing a dramatic increase of the fidelity of the ways in which we can interact with each other in digital spaces. So, notably, this is where VR plays a very important role, but I think it is not exclusive to VR. I think we’re going to see a lot of broadening of technologies and ways in which we interact. It’s just that right now this sort of frontier of fidelity sits with the modern VR technology.

I think the second one is economic. So, obviously, we talk a lot about NFTs and those sorts of technologies kind of pushing the boundaries of economies, and regardless of where you fall on that scale—I don’t want to derail us going down that road—but I think what we’re seeing is a shift in how we think about the economics in online spaces and a more fully formed concept of digital ownership, or lack thereof, depending upon how we want to take it.

And then, the third one is just scale. So, we’re talking platform scalability. You know, taking us from, say, 10,000 concurrent users to, you know, hundreds of millions or, even by some conceptions, infinite sized communities.

So, I think this really has shifted—we’re no longer broken up into small communities, but we have the potential to interact at huge, huge scales that we just haven’t really seen before.

BRITTAN HELLER: So, how many here have you—how many people here have used virtual reality? We have a smattering. How many people have used augmented reality? How many people have used snap lenses on your phone? How many people have used Instagram filters? How many people have used QR codes?

So, everyone who put their hand up at least once has used immersive technology, or metaversal technology, or digital worlds, AR and VR. The age of this immersive technology is here. It’s just many people don’t realize it yet.

So, Daniel, do you want to talk a little bit about the hardware scape, what the hardware looks like now?

DANIEL CASTAÑO: Sure. Well, that’s a big difference that we need to make when we talk about the metaverse and immersive technology.

So, we have basically two different technologies that can be combined. We have augmented reality. We have virtual reality, and we have mixed reality.

Basically, like a very broad definition would be a combination between hardware and software, whose synergy is able to produce immersive ecosystems. And when we have such a broad definition, it might lay in the intersection with other two different concepts that comes from the 1990s. So that’s something very interesting, Brittan.

The metaverse has been around for over thirty years. The thing is that the gateways are unequally distributed. And that’s what’s happening right now. But we have other two concepts. The first one is the cyberspace, and that takes us to the famous discussion, Larry Lessig, that gave rise to the Law of the Horse. So how difference is really the cyberspace from what’s happening right now. And now we have a more recent concept, coined by Luciano Floridi from Oxford, which is the infosphere.

So, basically, we’re living in an infosphere where our reality is augmented by different technologies. So every time we use ways to go from a point A to a point B, can we say that we’re navigating through the metaverse? And I want to end the question.

BRITTAN HELLER: When I think about the metaverse, I actually think about this. The metaverse is a pervasive social-computing-based platform designed to replace the functionality of your cell phone. It will be constantly on. You will not be able to turn it off. And so if you think about the type of interfaces that are coming out, they’re similar to Apple watches or smart glasses, with the capability to have you take pictures without hands, to use your voice to control calls, to post things to social media with just a touch. This is what the metaverse is going to be. It’s going to be the next generation of hardware that we use to access online spaces.

And so, Kat, what do you think the major differences between AR and VR are?

KATHERINE LO: That’s a good question. I think, for me, VR—at least how people conceptualize it is very distinct from what you see as, like, your embodiment in real life. There’s a separate sense of embodiment in VR and AR. Yeah, I think AR to many people is how you feel embodied in the real world and how you use technology as, like, a lens to see, like, the real world.

I don’t think that’s necessarily what they are differently, but I think in conversations that people have, there is this very clear distinction for some that I guess will be kind of combined with a lot of new products coming out, I guess, like Project Cambria and things like that. And so I guess it’ll be interesting to see when they become a lot more matched together.

But, yeah, I think what’s interesting here is the distinctions between how people are talking about the metaverse, say, on Twitter or something and how we’re conceiving of it as this very all-encompassing experience where, yeah, AR and VR aren’t necessarily distinct concepts.

For me, the most interesting thing about the metaverse is that the hardware is not set yet. And so what this means is that you can access augmented reality, which I define as a digital overlay onto present space, which is why I said a QR code is augmented reality. You know, an Instagram filter is augmented reality. The type of functions you used during the pandemic to try on clothes, and then you get it and think, oh, that doesn’t look quite right, does it, but it lets you try it on virtually, that’s augmented reality.

Virtual reality is more what you access through an all-encompassing headset at this point. And that’s characterized by things researchers call immersion and presence, which means you feel like you are really there. If you haven’t tried this, I put my 101-year-old grandmother in my headset over Thanksgiving and I asked her what happened. And she said it’s incredible. I was at the bottom of the ocean and a blue whale came by and we made eye contact, and there were these swarms of turtles and fish. It was one of the most amazing things of my life. And I said, Grandma, that’s fascinating, because what happened was I put a helmet on you and you listened to a soundtrack coming out of the straps and you watched images go before your eyes. That’s what happened. But the way she described it was the content like she was really there.

So immersion is created by all of these elements that make it feel like your real, actual reality. Mixed reality is going to be when you can blink between the two. And so I think that they’re converging to that point, but we’re not quite there yet. The reason I bring this up is because it’s going to have very substantial distinctions when we get to questions like online harms and safety risks and challenges—something that’s an overlay on your real world will have very different threat factors than something that you are in comprehensively, if that makes any sense.

So if you haven’t tried virtual reality and augmented reality, I highly recommend trying it. You don’t really understand the persuasiveness and magic of this stuff until you do it. One of the first things that I did was flying through a redwood forest and being able to look at it above and through and going down to the roots and seeing it from all those perspectives, and then I jumped off a building, so—and I have to tell you, that felt really real. So let’s now move from setting the scene to talking about the problems.

Kat, what are some of the safety risks and challenges that you see emerging from users in VR?

KATHERINE LO: You know, I think talking about the distinction between AR and VR has reminded me of a major risk that I think a lot of people discount, so earlier I tweeted about going in a VR chat, which is a social VR world—

BRITTAN HELLER: Don’t start there.

KATHERINE LO: Yeah. Don’t go there. Don’t go there first. Play the fun music games; those are great. But I went into a VR chat, which is known for being, like, very customizable, very open world, and within the first minute or so, the first thing I saw were people running around and chanting the N-word, and the second thing, about ten minutes later, were a bunch of people swarming a girl, and I clicked on her profile and she said she was fifteen. And that tweet, for some reason, went viral and the responses kind of were twofold; it was a bunch of people saying that happened to me too, this is why I don’t go in that space anymore, I don’t feel safe, and then a bunch of people saying, well, just take the VR—just take the headset off; why don’t you just take it off? And I think a lot of people don’t really recognize VR as being such a real, embodied experience, and as a result they don’t take it seriously the same way.

I think—so it’s like the difference between being in a park—like, are people yelling a bunch of slurs at you versus being in VR or being on social media? People seem to often treat the VR space as being on social media more often where they’re just sort of yelling at you and they say, well, just log off. Now it’s, just take the VR headset off. And I think that kind of is a blanket concept for a lot of these issues where you have things like grooming of children where now with the Quest 2, which is a headset that is much cheaper—now has come out parents are buying these for their kids like in the thousands and you have a bunch of kids hopping on VR chat, which is—and many other platforms that are technically [for adults] but kids can go anywhere. Like, kids will find a way to get on any platform and there’s just no regulations around it. You see people groping women in these spaces and, yeah, the problem is that people have bodies in these spaces but they don’t have autonomy, like they can’t push back, necessarily. I mean, some platforms have now instituted, like, boundaries, like, by default, that make it so that people can’t get into your space, although simultaneously some of the social norms in VR is asking people to take that boundary off so that you can properly socialize.

So there are just a lot of challenges. I’m trying not to enumerate too many.

BRITTAN HELLER: Yeah, in VR chat your avatar can be anything. Mine is a flying toaster for a Windows 95 callback but—

KATHERINE LO: Nice.

BRITTAN HELLER:—you can be anything and let your mind go. That’s where people go.

KATHERINE LO: Yeah. And unfortunately, people use it also for extremist imagery or even less extremist but things that are a bit more innocuous, and unfortunately, since things aren’t, like, in text form, it’s very hard to detect it, to have a paper trail to even prove it. So people—you know, people don’t even seem to report things that often on these platforms, but if they do report things, what kind of evidence do you provide? And a lot of platforms have a lot of answers to it and none of them are terribly effective, necessarily. But yeah, so you have, I guess, the whole gamut.

BRITTAN HELLER: Kim, can you explain for us some of the risks that are endemic to AR as opposed to VR?

KIMBERLY VOLL: Yeah. I mean, you know, plus-one to everything Kat just said in terms of those difficulties and the huge range of challenges that we see in these spaces. And VR is interesting because it brings that huge amount of fidelity to the experience. And so it mimics a lot of our human-to-human interactions in ways that we don’t have the social infrastructure or social protocols, or all of the fixings, if you will, that we have in meat space. We don’t have those in these high-fidelity experiences. And yet, the fidelity prompts us to behave, in a way, as if we do. And so that’s one of the big fundamental, I think, breakdowns in VR.

When you take a look at AR, though, you know, these are not as high-fidelity experiences, in a sense that what we are trying to do is take something that is, you know, artificial or digital, and supplant it on our otherwise offline reality, and mix those two things together. And that gives rise to, I think, a bunch of different interesting other problems. So, you know, some, I think, overlap, but they take different forms. So in AR, you know, thinking about things like privacy and profiling, because we’re mixing our realities in ways that point to us in very specific senses, so people can get more information about us, for example.

And on the flipside, we can actually present ourselves in ways where, you know, I might have an advantage over you because I have more information about you, I just happen to be wearing something that is feeding me some level of information that you don’t necessarily know about. So it can create these power imbalances in strange and interesting ways. I think we’re just not used to thinking about that in our—in our day-to-day lives. And then I think, like, all of the other things from VR, even though the fidelity of the experience is different in nature, I think those come over as well.

So, you know, you see the harassment. You see the abuse. You see potential for predatory conduct—grooming, extremism, those more extreme things. And then you also see the wide range of just, if you will, social foibles. You know, like, I think one of—at the heart of a lot of this is the ambiguity that exits between figuring out people’s intent, the intersection of cultures or subcultures or norms, even just recognizing what’s happening, that situations can be fundamentally more ambiguous in these spaces. So I think there’s a lot more care that needs to go into just how we architect these spaces, how we moderate these spaces, and how we train ourselves as human beings now operating in these hybridized, digitized, non-digitized spaces.

BRITTAN HELLER: That’s really astute. Some of the work that I’ve done has focused on location-based stalking through augmented reality, because a lot of times when you play these games on your phone, you’re actually creating a real-time map of where you are and broadcasting it out to the world. So be a little wary. It’s fun, but think about the dynamics of how the game works. Also, stalking and impersonation-based harms, because there’s no way to really authenticate yet that you are who you are, even if your avatar looks like that person.

I think there’s two points that I wanted to bring up before moving on. One—and I have a bit of momnesia, so we may just stick with one—one is that you don’t have to be photorealistic in AR and VR for it to feel real to you. Researchers actually use AR and VR for PTSD treatment. And they do that for veterans. And they find that it’s more effective to have it be representative or cartoony, because your brain fills in the gaps. So when people think about it being real, it doesn’t have to look real for it to feel like it’s actually happening to you.

And, second, the way that you experience events or people in AR and VR is like your reality. These experiences, like when I talked about my grandmother, are processed through your hippocampus. And what that means is that it’s imprinted on your brain in the same way that you create memories. So when people say that they were sexually assaulted or sexually harassed in AR and VR, it’s because it feels like they were. It feels like somebody came into their living room and groped them. It does not feel like they read a harsh Twitter thread. It’s very, very different. So I am a former prosecutor. And the way that people describe these experiences, for me, are the same way that people who were physically or sexually assaulted would describe it, when I’d be doing cases.

So let’s talk a little bit about content moderation now that people are looking at me with eyes like this. Daniel, what do you—what do you think are the important differences between social media content moderation and AR/VR moderation, other than the—like, the risks of it feeling real?

DANIEL CASTAÑO: Well, I think it hits really different because this kind of technology has a direct incidence on the plasticity of the human mind, so you feel it directly.

The other big problem is: What kind of tools are you going to use? What kind of tools are you going to develop to moderate content? It is enough to have, like, human content moderators, or do we need to use AI? But I won’t jump into the AI question yet.

So, first of all, it’s very difficult to define the rules because it is a totally different world. So even if you recap on the definition of the metaverse, it is a digital world that is beyond our analog world and that is unbound from any social or value that we have in our current cultures.

So our first approach will be: What kind of methodology, what kind of instruments should we develop and should we devise to convey standards of conduct? Is it enough just to publish, you know, like a laundry list when you start your immersive experience, or should we come up with a different way to convey those standards?

And then the second problem will be: How should we enforce them? Should we use AI? Should we just—we were just looking to a video before coming to our talk. In the United Arab Emirates, they are putting police officers in the metaverse. So is that a way to enforce that—like beyond the community standards, just moving to, you know, state law?

So I would say that those are the biggest challenges of content moderation in social media and then in VR.

BRITTAN HELLER: Kim, would you be able to go into more detail about how content moderation currently works in some of the larger experiences that many people go to, so Horizon Worlds or Ray-Ban Stories?

KIMBERLY VOLL: Yeah. I mean, I think that—like, Daniel covered a lot of I think what the key challenges are of these spaces. It’s not the same as being able to just—to just do, if you will, text moderation, not to imply that that’s easy. It’s a very difficult space and we’re struggling as an industry to get traction. It’s getting better, but we’ve got a lot to do there. So, you know, the high fidelity of the experiences means that it is very, very difficult for us to track things. And even if—the flipside—we were to get really good at tracking high-fidelity experiences, there is a whole question that arises around privacy and surveillance because now we’re very good at detecting the things that we do in our worlds, and we don’t necessarily want to go down that road. So figuring out sort of what that happy medium is, I think, is one of the key pieces.

A lot of what we see today is taking advantage of things that we use in flat spaces. So if there are tech-space experiences or increasingly voice chats, you know, trying to moderate, use the flat experience moderation tools in these more high-fidelity experiences, that’s very limited because there’s so much more going on in these spaces, as was mentioned earlier. You know, like your proximity to people, how you’re moving about that world is a vector for causing harassment and stress in other individuals.

So probably the most effective form that we have today is actually having some form of human observation. So chaperones in spaces or bouncers, if you like, like people that are there with the express purpose of monitoring what is transpiring in these spaces and taking action to, you know, cut off someone’s access if they think they’re doing something inappropriate, et cetera.

That’s, obviously, very difficult because it doesn’t scale. You know, we actually need a human who’s in the rig who’s monitoring these things. It also doesn’t scale in some respects because it can be very difficult to differentiate what’s happening in these spaces. You know, part of the richness of these worlds is the ability to take on different identities. This is actually a really important part of this space and the cultures evolving around these, and it also attracts a wide range of people who have more or less experience in these spaces, come from a variety of different cultures. That mix of things means that we’re stumbling all over ourselves. Like, things are going wrong at a pretty frequent basis, and it can sometimes be hard to differentiate what is an innocent mistake versus something that is more intentional or even more sinister.

And so, like, that scaling question, then, is one of having enough experience to start to detect the nuances to know that, oh, that person is doing what they’re doing because their headset crashed or, you know, they clearly don’t know what they’re doing and they’re bumbling about. Versus, you know, that person has now clicked into that person’s space so many times, and at a particular angle, that they’re definitely doing something inappropriate there. So there’s a lot of those, I think, really interesting challenges that make this space so incredibly difficult.

BRITTAN HELLER: Yeah. When I advise AR and VR companies, the one thing I wish they remembered is that this is not social media. You cannot just take community standards or codes of conduct from a 2D content and conduct code and transfer it into a 3D environment, where you’re going to need content, conduct, and environment. There’s kind of a joke that when Lego made a virtual world it almost bankrupted itself trying to keep teenage boys from terraforming phalluses into the world. And it’s kind of foreseeable, but it illustrates that you really need to think about what user-generated content is going to look like in this space. And it’s going to be environmental. And how are you going to do that?

Right now content moderation in social media is predicated on AI classifiers. We do not have classifiers for human-to-human behavioral interactions, for environmental interactions and, Kim said, the talk to text transcription is lagging. So it can’t be done in real time in the same way. This is—this is the Rubicon that AR and VR will have to cross before content moderation is effective. We might have the rules, but we won’t have the enforcement regime that needs to follow.

So I talked a little bit about the “Children of the Corn” and the Lego world. Daniel, is this just a part of online culture? And Kim mentioned global communities. How are we supposed to create a metaverse for all people?

DANIEL CASTAÑO: Well, that’s actually a great question. I think we should start from global rules, but they should be locally informed. And what should be the language that the metaverse should be speaking? I suggest that it’s something that I call the language of legality. The enlightened language of legality, which is a combination of different things. First thing, we need a constitution for the Metaverse—a binding constitution for the Metaverse. The second thing, we need that constitution to have a separation of powers. We need someone that makes the rules. We need someone enforcing the rules. And then if controversy arises, we need someone that adjudicates that kind of disputes.

Third, we need the legality. So we need to bind the behavior of everyone that is partaking in immersive spaces, afford, of course, human rights protection. So I think that if we speak the language of legality, then we can have a common ground for building a universal metaverse. But then one thing is to coin the principles. That’s very easy and that’s something that is happening today with AI. We have a bunch of AI principles, but then it’s very difficult to bring them to practice.

So we need to figure out ways on how we can actually build a metaverse that conveys the language of legality. And that’s something that we should count, for example, constitutionality by design or rule of law by design. And it’s basically teaching everyone—engineers, developers, lawyers, policymakers, civil society—how we can actually embed those principles in the architecture of the metaverse. I think that’s the only way in which we can build a metaverse for everyone…

Watch the full event

The post What happens when toxic online behavior enters the metaverse? appeared first on Atlantic Council.

]]>
Web3 is set to transform the internet. Can it bring global social and economic change? https://www.atlanticcouncil.org/news/transcripts/web3-is-set-to-transform-the-internet-can-it-bring-global-social-and-economic-change/ Mon, 06 Jun 2022 17:49:11 +0000 https://www.atlanticcouncil.org/?p=533414 The decentralized digital world is on the rise; here's what that means for political, economic, and social rights worldwide.

The post Web3 is set to transform the internet. Can it bring global social and economic change? appeared first on Atlantic Council.

]]>
Watch the full event

360/Open Summit: Contested Realities | Connected Futures

June 6-7, 2022

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) hosts 360/Open Summit: Contested Realities | Connected Futures in Brussels, Belgium.

Event transcript

Uncorrected transcript: Check against delivery

Speakers

Alex Zerden
Adjunct Senior Fellow, Center for a New American Security

Nanjira Sambuli
Fellow, Carnegie Endowment for International Peace

Cathy Mulligan
European Research Area Chair, University of Lisbon

Moderator

Khushbu Shah
Editorial Director, Rest of World

KHUSHBU SHAH: So most people don’t even know what Web3 is. In a casual poll done by Harvard Business Review, their readers in March 2022 said that about 70 percent of them didn’t know what the term meant—what crypto was, what bitcoin was, Bored Ape Yacht Club, and how—let alone what—the tech behind it might accomplish. So, through its supporters and advocates, it’s been linked to the potential to unlock ambitions around decentralization, to be a remedy to excessive centralization, which can stymie coordination, erode freedom, democracy, economic stability.

But even before we get to that question in the future, what is Web3? How are we going to use it? What does it mean for our future? What are its limitations and points of opportunity?

And so we have three incredible experts. First, Alex Zerden, who is the adjunct senior fellow, Energy, Economics and Security Program at the Center for a New American Security; Nanjira Sambuli, who’s a Fellow for Technology and International Affairs Program at the Carnegie Endowment for International Peace; and joining us from Portugal, Cathy Mulligan, who’s a professor and director of DCentral Lab.

And so, Cathy, I think the first and most important question is what is Web3? Is it even real?

CATHY MULLIGAN: Let me, I mean, first say thank you for having me as a giant head in your presentation today. It’s great to be here.

I think for me, you know, the most important thing about Web3 is actually it doesn’t yet exist. What it is, is it’s a name. It’s a placeholder for a set of technologies that are under development in today’s world. So actually there isn’t a clear definition of Web3 as it stands today.

You know, its original meaning when we started to talk, when we heard whispers of Web3 at the beginning, was looking at things like Semantic Web and the use of open data across the internet to connect Web technologies together in a new and more integrated fashion. What we’re starting to see in today’s world is this idea of Web3 are these sorts of decentralization, blockchain, NFTs all starting to also be put forward as part of Web3.

That being said, basically, Web3 can be whatever you actually really want it to be. And for me, I think Web3 is really about looking at the power structures and the relationships that exist in the Web technologies and working out new ways of interacting around those and then developing the underlying technologies in response to those needs and requirements rather than what is happening today, really, which is that the requirements are being forced onto this moniker of Web3.

KHUSHBU SHAH: Thank you.

So, Nanjira and Alex, what do supporters believe it’ll be able to do? So, in theory, what does it promise? And then, in practice, what’s actually happening?

ALEX ZERDEN: So happy to kick it off, and thank you all for having me.

I think it is an idea that we—I agree with Cathy—that we don’t know where this is going to go. But I think there is a large cultural, economic, and technological movement afoot. And I had the opportunity to work in the Obama administration working on fintech strategy. And we worked on a report and a framework in saying: Where are new and emerging technologies going?

And a model that we had was the Clinton administration in the 1990s wrote a similar report about ecommerce. And so, in the middle of the tech boom, there was a lot of froth. There was a lot of venture investment. There was a lot of movement of people, of communities, onto this new internet that was more widely and publicly accessible. And many of those companies no longer exist today. Many of those projects no longer exist today.

But what was created was a vision for more integrated economic and digitally enabled platforms; and good, bad, and ugly. I mean, I think there’s a lot of challenges with that. We see it on the security side. We see it on the financial-inclusion side. We see in a range of different vectors. But at the end of the day, I really agree that we are dealing with a new culture, a new community, and I think a desire coming both out of the financial crisis and addressing other structural societal challenges, whether that’s driven by the pandemic or elsewhere, that people are looking for new opportunities, new technologies and new solutions for existing social, economic, political problems.

NANJIRA SAMBULI: I would add to that that it’s also about the governance, right. I think a lot of that movement in technologies is converging around challenging the existing models of governance at both local and global levels. So there are discontents about who’s been included, who’s been excluded, and who’s trying to disrupt the status quo, especially if it’s not been serving them. That’s an interesting undercurrent, often not spoken about, when we see a movement like this.

So really it’s, I think, for the first time, one iteration of tech movement where we’re seeing all these things being discussed in parallel. And hopefully that could help us complicate the conversation about what can work, what type, what substance, going forward.

KHUSHBU SHAH: Cathy, are there any unintended consequences of depending on something like Web3 for users in terms of governance and power?

CATHY MULLIGAN: Yeah, absolutely. So, you know, what we’ve been seeing in our research is we’ve been looking a lot at the down movement and also a lot of the, you know, different voting mechanisms that have been used.

And the idea behind the downs is that they’re supposed be decentralized autonomous organizations, and everybody is supposed to be able to vote, and everybody is supposed to have some kind of egalitarian sort of nirvana in these technologies that are being developed. The reality is that it’s really based on whoever has the most ethereum or the most money has the most voting power. So ultimately, you know, the power structures are not that different to what is happening in the day-to-day, where the person with the most money wins.

So there are a huge number of unintended consequences. You know, thinking that this is really decentralized is a big risk, I think, for many people. And it depends what you mean by decentralization. But the other issue is, of course, that the more that you rely on these kind of technologies, the greater and more embedded the digital inequalities become. So I think there’s a balance of power problem emerging in the world around control and access of data. And the Web3 technologies definitely feed into that as, you know, the previous lightning speaker was very competently highlighting.

KHUSHBU SHAH: Alex, you mentioned that this is—Web3 is creating new culture and new community, it’s new tech. You know, it’s also being utilized by big tech that was part of Web2. So is there the potential for Web3 to reinforce the current strata of power with companies like Google, and Meta, and Facebook—or, sorry—Amazon taking on stablecoin, crypto?

ALEX ZERDEN: Yeah, absolutely. And so we’re seeing what is a lot of tension and a lot of potential contradictions in this space. As Cathy mentioned, a push towards decentralization, but then a lot of actors involved in the space, particularly investors and technologists, are coming from very centralized, very well-resourced organizations, entities, and individuals.

And so within that, I mean, I think there is a very emblematic case study that we’ve seen just crop up over the past several years, which was the launch and ultimate decline of the libra/diem stablecoin project that was ultimately nonprofit Swiss organization backed by many large financial and technology companies, but for better, for worse, heavily associated with Facebook, now Meta. And while the organization attempted to develop a regulatory first, a highly technology inclusive and financially inclusive financial product that had regulatory support, it ultimately did not prevail.

Earlier this year the company dissolved. It sold its technology to a US bank. And just really serves as a proposition for the strong, legal, legislative, regulatory opposition—and other stakeholder opposition for substantial engagement and fundamental game-changing engagement between large technology companies and these new and emerging technologies. Particularly here, we saw, with a stablecoin product.

KHUSHBU SHAH: Nanjira, so thinking about that, and what we’ve seen happen with Web2, what’s currently happening with Web3, what does the landscape look like in the rest of the world? What’s the potential for opportunity there? Is there any?

NANJIRA SAMBULI: Yeah. I mean, at the moment you see, for example, in a number of African countries, people really trying to buy into the positive vision around Web3. And I think one really interesting space there has been the crypto finance dimension, where a number of African countries have users who are leading in the world with peer-to-peer crypto transactions. And that’s just really an indicator that the existing financial system is not working for them, so much so that somebody would rather, in a sense, risk a lot, or risk it all, in the crypto markets.

Now, what’s really interesting is that in terms of the infrastructure, in terms of the builders, there’s still not enough inclusion for some parts of the world, but there’s really an enthusiasm to be part of it and to write a chapter in how all these technologies are interpreted, appropriated, and so on. So it does really make a signal for those studying, those saying they’re supporting the building of whatever Web3 will be, to think about inclusion differently. Not that you build in the transatlantic and then you sort of export it to the rest of the world, but monitor the different movements and how people are trying to adapt to these technologies that are somehow within reach, but appropriating them to signal what is not working.

And that’s making for some really interesting tensions also with the governance in some of these countries, where you’re just seeing net attempts at banning stuff. And you’re, like, we’ve passed that era, man. I mean, like, think about a different way of doing it. And you’re seeing the tensions between generations as well, because then you have the regulators who lived through, you know, some wars. And others are living through new wars. And they’re, like, we don’t understand one another. So it’s really good lens in the rest of the world, really, to see how—what’s was talking about, the governance, the tech, the actors sort of converging in a complicated way, beyond what we would typically see in the sort of US-Europe dimension.

KHUSHBU SHAH: So, to that end, I have a question for all three of you: Can this—can Web3 lead to a truly decentralized system? Is that even possible? What’s happening? Who would like to take it?

ALEX ZERDEN: Happy to jump on it. I mean, I think there’s going to be features of decentralization. There’s going to be features of centralization. I think we’re in, again, a very nascent and early space, and I think this is a competitive atmosphere right now, one, among like-minded democratic countries and partners; and then, also, with—against authoritarian regimes of who is going to have the prevailing legal/regulatory regimes as well as technological supremacy in this case.

Coming from the national security perspective, the Biden administration released an executive order on digital assets really focusing on bringing these technologies into a sound regulatory framework, but what they called for was a study. So they wanted, across a number of verticals of international competitiveness, more further looking at US central bank digital currency and technology development, responsible national security considerations for the prevention of illicit financial uses—money laundering, terrorism financing, weapons proliferation, and ransomware. And then here in the EU—it’s timely that we’re in Brussels—they’re undergoing a major reconsideration of the framework for markets and crypt assets, and to understand what the future of digital asset regulation looks like here, and—while China, you know, very aggressively develops a central bank digital currency that is highly centralized, highly prone to surveillance equities. And I think the competition right now is both for technology, for talent, as well as for the most sound legal and regulatory regime that will enable these new technologies both in a centralized, decentralized, or some type of hybrid fashion to take root and to thrive, and I think that’s going to be the challenge over the next ten to twenty years.

NANJIRA SAMBULI: I think it’s more than just the tech, right, or the vision, all these competing interests in different geographies and how they play out. I mean, I think sometimes it’s even a question of whether we are all just bundling, you know, expectations around a certain term, because in a sense what happens is some systems compromise in a sense and become interoperable. And we’re seeing that with the conversations around open banking. You might see a lot more people get comfortable and get off the very, in a sense, extreme interpretation of decentralization.

That said, I think what we are seeing with this movement and why it’s converging around tech is just basically discontentment with the status quo. I read once that somebody said, you know, blockchain was a really a trauma response to the 2008 financial crisis, and it’s not a wrong way to put it. There are the systems that prevail in the world that are not working, and I think their value is being assigned and hope’s being assigned and, in fact, trust being assigned to this new idea of building something and hopefully seeding your expectations, your hopes, your aspirations to challenge what exists and probably did not include a lot of people. So time will tell and different geographies will tell.

KHUSHBU SHAH: Alex, I think you’ve worked on—sorry, Cathy. Please. Standard mute button.

CATHY MULLIGAN: Apologies. Sorry.

I was just going to say, I mean, you know, just actually, also, from a purely technological perspective, to classify these as decentralized technologies is really quite dangerous. So if you look at the traffic on bitcoin and ethereum, I think it’s 90—I think 90 percent of ethereum traffic and 95 percent of bitcoin traffic traverses one of ten networks in the world. There’s no such thing as decentralized or anonymous, actually, in this kind of space, and I think that’s a fallacy.

And what really worries me is people are using this as a response to—I completely agree with Nanjira. This is a response to status quo. There’s a problem with the status quo, but thinking that these technologies are going to solve that for us I think is massively dangerous. And we need to be extremely careful and think really deeply about how we implement them, but more importantly how we communicate…

And then, finally, you know, the thing about becoming totally decentralized, I don’t actually understand it anyway. We’re humans, right? I mean, if we become totally decentralized, we’re all living as one individual so it’s completely separated from each other. You know, it’s about humanity and it’s about our social norms, and the rest is the technology.

So sorry to interrupt.

KHUSHBU SHAH: Well, Cathy—so, building off of that last point, so, you know, you mentioned that it could be quite dangerous to think about it as a decentralized technology. So—and then you mentioned the risks. And I think if—Alex and Cathy and Nanjira, if you could, build on this. Alex, I’ll come to you first. Are there risks, to Cathy’s point, in utilizing crypto or blockchain when human rights are in question, when we’re trying to talk about digital and democracy in one go, and governance and power?

ALEX ZERDEN: No, absolutely. And I think Cathy rightly called that out, that there is somewhat of a—there is tension right now between the concepts of decentralization and what is actually occurring. Also, most transactions are occurring through centralized exchanges for the snapshot today. I think there is a world where things move towards—you know, it looks a little bit different in the future and so I think that’s what the framing might be. But with respect to human rights issues, particularly with authoritarian regimes, I mean, I think we need to be very conscious about engaging particularly the financial use cases of sending money into authoritarian regimes. These are transactions that are on publicly available blockchains that anyone with a computer and internet connection can access, good, bad, or ugly, and so malign actors seek to use that just as, you know, those in the human rights community, those for financial inclusion also to use it.

And we’re seeing some things take root, so, for instance, Afghanistan: There are pilot projects underway to use stablecoins to provide better access to financial services for humanitarian assistance and some development aid, while still not falling afoul of sanctions against the Taliban under EU, US, and other laws. We’ve seen a use case of funds going into Venezuela against the Maduro regime to support the Guaidó regime for front-line health care workers, but these are nascent and these are, again, very early use cases. And to Cathy’s point, much of this is in a permission, in a controlled setting that doesn’t have the features of decentralization that some proponents may suggest for it. And again, so I think this gets to how do we enable it in a more financially inclusive way? How do we take the best of current market activities and then add other features that promote broader social goals?

NANJIRA SAMBULI: You know, to that, it would be really important—especially for groups that work on the rights space—to also remember that there’s the indivisibility of rights so that we also afford a nuanced way, when we calibrate this question of rights. And this tension always comes up a lot and when it gets too uncomfortable, then we fall into the dichotomy of authoritarian and democratic, which is about economic rights, because the tension will inevitably come up where, for some places, access to certain technologies does get them out of a dependency. And a good example here of a tension that’s playing out with Web3 as a moniker is in the Central African Republic. I don’t know how many of you know that it’s the second country in the world to try and adopt bitcoin as legal currency.

Now, whatever motivations behind the tech adoption of it versus the political motivations are not—are very important to analyze together, so that when we talk about rights in that context, it’s also about the right that the people of CAR, whether it’s their government representing them as a legitimate partner or not, to dissociate themselves from a system that actually does undermine their economic well-being. So that kind of complication is so important about how we will be talking about rights. We already have been behind in how we analyze the rights question, as far as what one will call Web2 or prevailing technologies go. But that indivisibility will be very important, especially when you’re thinking about rest of the world, because different countries will be like, well, what about our economic rights, you know, versus political? And it’s pointless to have rights sort of danced around as a trade-off, so bringing that entire complexity of these kinds of rights many people need to realize in real time will be very important.

KHUSHBU SHAH: So you mentioned rights tied to economic stability and financial opportunity. So so much of the emphasis of Web3 is financial, right? So is that even—does that leave any room for a translation of Web3 into democracy and power? Do you see any way that that could translate? Cathy, would you like to take that?

CATHY MULLIGAN: Sorry, I keep forgetting to unmute. Sorry, could you repeat the question? I missed the last bit.

KHUSHBU SHAH: Sure. So, you know, as you were all saying, so much of the emphasis of Web3 is financial and, you know, Nanjira was talking about rights as a trade-off for that reason, potentially. So is there room for translation of Web3 into democracy and power and governance when so much of the focus is finance and economics?

CATHY MULLIGAN: Yeah, absolutely. So I think—one of the fundamental issues, one of the fundamental problems with the cryptocurrency space and decentralization space for me at the moment is the fact that everyone is focusing on—you know, they’re focused on the price, which to me is a very bizarre thing to focus on. You know, the least interesting thing is the dollar price of bitcoin or ethereum or any of these technologies. What is actually genuinely interesting is the way that they are attempting to challenge the power structures.

One of the key things that I think is very important around the Web3 space is the fact that this technology needs to be designed, discussed, and communicated with everybody. We’re at a point in time where technology is not just sitting within the boundaries of a corporate environment. It’s moved beyond the boundaries of the firm and it’s now in our society and our economy in a very broad and deep way. That means this technology belongs to everybody. It belongs to everybody to help define what its future is.

So, you know, often I will talk to people who feel that they don’t know anything about Web3 and therefore don’t have the right to make any kind of requirements or place requirements on this technology. But quite frankly, everybody should be placing requirements on this technology, from teachers to politicians to lawmakers to people who drive buses. This is a technology for everybody to help define.

NANJIRA SAMBULI: That is so true because all too often, even in how we talk about, write about technologies, we have this unintended effect of intimidating the very people who should seed values or challenge the assumptions.

And even just taking it from a sort of, like, dichotomy of transatlantic and rest of world, there’s a whole imposition dynamic where we have to wait till the citizens of the US and Europe impose upon the companies and the—and the governments to do this thing. And the rest of us are, like, since we are not being heard in your corner of the world, it does—it does play to what Cathy’s saying.

So to your question about how the dance between the technology, democracy, and power go, I think we’re seeing it little by little but then it ends up becoming a tradeoff. When, you know, Kenyans and Nigerians, for example, list global indices as users of peer-to-peer crypto, they’re trying to get back power from the banks because the cost placed on even revolutionary technologies like M-Pesa in my country, Kenya, become so priced. And people are like, you know what, forget that; I will risk it in the crypto markets to make sure the dollar amount of whatever I’m trying to send gets to the other side—says that the structure, the power that a few other people have gotten despite the revolution that was brought by the technology is being calibrated.

So going forward, really analyzing beyond talking about the tech will be very important because following the people and in a sense following the money will get us to understand the shifting dynamics between the values we want to see in the world.

ALEX ZERDEN: Yeah, and I think that’s been a beachhead. I mean, I have a bias coming from the financial regulatory space, but I’m actually very, very bullish on where the technologies go that are completely and wholly unrelated to financial services. I think this has been a way to incentivize market participation. There’s been a tremendous amount of investment activity and interest.

But getting back to some first principles, I mean, we say crypto shorthand, but that—it comes from cryptography. And I think we are seeing really game-changing investment and engagement from both investors and technologists in improving cybersecurity and improving cryptography to preserve personal information, whether that be financial or otherwise. And that’s been the most interesting shift to me, seeing some of the brightest minds from government, from technology, from finance, from other spaces move into Web3, this very, again, amorphous space, but to—as a signal to really invest in new and emerging technologies for social goals. I think people are looking for, you know, purpose. And we have an anonymous individual or group of individuals—Satoshi Nakamoto, who founded bitcoin, you know, in the thralls of the—of the financial crisis. But you know, I think there is this effort to push towards greater privacy preserving and greater security in how—and disintermediation in how financial transactions occur. But I’m happy to make a bet—happy to be wrong, but hopefully I’m right—in ten or twenty years the use cases of these new and emerging technologies will be much farther beyond these initial financial case studies we have.

KHUSHBU SHAH: So one last—oh, yes, Cathy. Please go.

CATHY MULLIGAN: I was just going to say I would absolutely love to know what Satoshi Nakamoto’s perspective is on what’s happened in the crypto markets.

KHUSHBU SHAH: So that was my last—that’s my last question, actually, before we answer some questions from the audience, which is, so, in recent weeks we’ve seen a significant shift and a lot of chaos—Web3; cryptocurrency; even stablecoin, which was meant to sort of offset some of the instability of crypto. So it’s sort of faltering, right? Crypto’s faltering. NFTs have imploded. So are we at—I know you just gave me some solutions, but is the bubble bursting? Forecast something for us.

ALEX ZERDEN: Oh, I love it right now. And I’m not—I mean, you know, I feel for those who got in the market late and people have lost a lot of money, and I want to be sympathetic and somewhat empathetic to that. But I think this is where the most creativity comes in. I think this is where the most dedicated creators are investing and putting their time and staying through not just the froth and the heady days. And I’m really, really excited for what comes out of this cycle of it and this downcycle.

NANJIRA SAMBULI: I guess it’s refreshing that the hype crashed faster than with Web2. We waited a bit too long and we rode the wave. So, yeah, where we come from here gets more interesting. I agree with Alex on that.

CATHY MULLIGAN: And as a researcher, can I just say now doing my research is a lot cheaper?

KHUSHBU SHAH: So, with that, I think we have a few questions. First one: The conversation on Web3 appears reminiscent of techno-democratic optimism that accompanied the emergence of Web1, Web2. You’ve all touched on this. Do you think that the aspect of decentralization and user empowerment are farfetched and we should proactively regulate the space preventatively?

NANJIRA SAMBULI: Well, I don’t know about regulating preventively and what that would look like, because that sounds deeply political, right. But I think it’s an opportunity to also make sure we reverse this narrative that regulation is always behind innovation. I think the regulatory space also has to adapt at a quasi-faster speed than, you know, the innovation, because we need the guardrails. We need to have balance. And I think what Web1, what Web2 have shown us, this notion of just innovate first and apologize later, the move fast, break things is breaking things big time.

So I would say it’s an opportunity to see whether the regulators should be retiring a lot more people and getting fresh perspectives, right, would be great into the space, because we do need people who are thinking about how we prevent what’s happening now from being the norm or being a constant disruption. That’s how I would think about regulation.

ALEX ZERDEN: Yeah. I think there have been a lot of lessons learned from Web2, so the creation of larger tech companies and the kind of lack of regulation, arguably, at the outset. I think there’s a much more reduced window now. And I think regulators and legislators, as well as civil society, are much more proactive now.

There is a regulatory framework in place for a lot of crypto today. There’s, I think, surprisingly, again, a bipartisan consensus from the Trump administration to the Biden administration in a lot of ways from the US side about the need of responsible innovation. That has been the buzzword or buzzphrase essentially since the Obama administration. And so we have this continuity.

And we’re seeing potential bipartisan legislation hit just this week from Senators Loomis and Senator Gillibrand on ways to be more proactive. Government still needs to stay on its game. It is a lagging indicator as new and emerging technologies come to the fore. But I think there have been a lot of lessons from big tech that are being integrated right now. And we also saw that in the Biden administration’s executive order.

CATHY MULLIGAN: There’s also some really, really interesting examples. You know, there’s a new regulator interaction going on in the United Kingdom which is looking at, you know, bringing Ofgem together with the FCA together with the ICO, which are, you know, the different types of regulators for the different parts of the digital world. And they’re pulling them together in a new way to try and understand the overlaps between the types of regulation.

I think the other thing is we are rapidly moving into an area of technology being so complex and so difficult it’s actually almost very difficult for a human person—you know, a human to fully comprehend all of the implications. What I would love to see is, you know, we’re seeing all of this technology rolled out by corporations, I think we need our governments to be as tech-savvy and also as well funded from a technical perspective, because what you would need are, you know, regulators who are using technology to flag to themselves, oh, there’s a problem emerging over here.

That’s a new type of regulatory approach where they’re watching what’s emerging on the market. They’re getting that from a data-driven perspective rather than from, you know, a human perspective. So I think there’s a double-edged sword here. And the more technology that’s out in the market, the more technology the regulator is going to need. And it also requires a new type, as Nanjira and Alex have mentioned, a new type of person in that regulatory environment.

KHUSHBU SHAH: So that leads me to the final question, which is we’re at a crossroads right now. We actually—it’s very hard to see the future. So what is the best-case scenario from each one of you, and what is the worst-case scenario? How—could this potentially implode, and how so?

You want to take that first?

ALEX ZERDEN: Sure. I mean, I think, kind of consistent with how some of the biggest optimists think about this, this is a new layer of the internet. This spawns a new generation of technological innovation that helps a lot of people, either for financial inclusion, increasing access to technology, increasing—improving democratic participation. I mean, I think there’s a maximalist case there. The downside is I think some of the—technology is inherently neutral. So I think there is a lot of overlay here about how it’s used and, potentially on the downside, exploited, where this leads to greater social harms, greater social ills, and is an accelerant rather than another force to kind of exacerbate existing social economic inequalities and tensions.

NANJIRA SAMBULI: I would speak of an interesting case scenario as the most positive, least negative outcome, just because, again, all the interests including geopolitical ones that are playing out. The demand that, you know, Web3 is taking on technologies means it’s playing into the demand for the raw minerals and the extractive industries involved, and climate, and energy. All those are being roped in, into what this happens. Best case scenario, everybody figures it out and we combine and move along. But really, the resources—if one person starts saying we want to keep this for ourselves versus the other, all those interesting tensions will continue to play out. So brace yourselves, I suppose.

KHUSHBU SHAH: Were you—to ask for more information, I think we’re already seeing it play out. Have you—sort of, where are—I think we are in some kind of worst-case scenarios in terms of climate and the effect—

NANJIRA SAMBULI: And just even in democracy. I mean, the—some dependencies have been created on certain technologies. And I’ll speak on this in terms of development. Some parts of the world being told: You need this technology to get X or Y done has already put people in such a fraught space that it’s—the solution has become more technology to get you out of the bad technology. And so that leads us into this space where I’ll very concretely put in the example of the Kenyan election that’s about to happen, where we’ve been procuring technology, election tech, to, you know, foolproof the election. And now we are in the cycle of procuring more tech for the reelection cycling, making the elections more and more expensive, while they become more and more illegitimate.

So if somebody then now presents Web3 oriented—we were just talking about votecoin, right? You can hook up this thing where there’s a blockchain that will, you know, be immutable, and all that. Those dependencies will continue to be created, but the burden is being borne by those who should not be taking on the hype cycle, those who should be doing the incremental stuff. That, for me, is the biggest risk. And we’ll continue to see a lot more of that. And then if you do not toe a line, if you do not vote a certain way at the UN, lights out, right? That’s a real scenario we could be looking into. So interesting case scenario at best, with a smile.

CATHY MULLIGAN: Well, I guess I will give mine. I’ll start with the negative scenario, from my perspective. You know, the worst-case scenario for me is this all gets co-opted, you know, by financiers, you know, by corporations. And then you end up with—it’s a form of corporations becoming a de facto government if you are not properly controlling for some of these activities. Where, you know, digital technologies move beyond the boundaries of the firm, they start having really big sort of effects across lots of different parts of society.

The utopian vision that I hope—you know, I continue to work for increasingly worried that it might not happen. But that—you know, for me, bitcoin and all of these kind of things, they’re actually the world’s greatest thought experiment that we have in our generation. It’s a fantastic though experiment about one thing: What is money and what is power? And what does it actually mean? What do we need money to be? Or else, what do we need these digital power relationships to do for us? So the utopian vision would be that we actually collectively, as humanity, manage to have a decent discussion around some of those things, and implement some of the ideas within that technology.

KHUSHBU SHAH: Any answers, anyone?

NANJIRA SAMBULI: No. I was just going to say, Cathy would know that we’ve tried to be in a room in those conversations. And those have not gone well. No, it will be also another experiment in global governance too, I think, because we’re all being affected by these technologies in disproportionate ways. However, all too often when—and we’re seeing this even in this time we’re living in—people who come together to say they want to think about the future of tech, always assume it’s about those who should be in the room and those who create the tech, and often not those who also use—you know, presumers, as I call them, the mix of consumers who then appropriate in creative ways, and therefore have a say. So it’s also really an interesting experiment in how you make truly global governance, not just of technologies but of a digital age.

KHUSHBU SHAH: That is a really interesting point to end on. And I have so many questions for later. Now I wanted to thank all three of you for engaging in this conversation. And thanks to all of you for listening in.

Watch the full event

The post Web3 is set to transform the internet. Can it bring global social and economic change? appeared first on Atlantic Council.

]]>
More than three-quarters of Russians still support Putin’s Ukraine War https://www.atlanticcouncil.org/blogs/ukrainealert/more-than-three-quarters-of-russians-still-support-putins-ukraine-war/ Mon, 06 Jun 2022 17:43:47 +0000 https://www.atlanticcouncil.org/?p=533404 The latest polling data from Russia indicates that public support for the invasion of Ukraine remains strong despite higher than expected Russian casualties and widespread accusations of war crimes.

The post More than three-quarters of Russians still support Putin’s Ukraine War appeared first on Atlantic Council.

]]>
The latest polling data from Russia indicates that public support for the invasion of Ukraine remains strong despite higher than expected casualties and widespread accusations of war crimes.

A survey conducted in late May by Russia’s only remaining independent pollster, the Levada Center, found that 77% of Russians currently back the war. This represented a slight increase on the corresponding figure for April, when 74% of respondents voiced support for the ongoing invasion.

There has been considerable speculation over scale of Russian backing for the war in Ukraine, with critics questioning the credibility of numerous government-linked surveys showing strong levels of support. While any attempt to accurately gauge opinion in a dictatorship is notoriously difficult, the Levada Center’s recent data is likely to be the most legitimate available indication of public feeling toward the war.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

While younger Russians were less likely to back the invasion, the survey identified comfortable majorities in favor of the war among every single age group. Sixty percent of 18-24 year old respondents voiced their support, rising to eighty three percent of those aged over 55. Nor is there much expectation of a quick victory, with almost half respondents (44%) predicting that the war would last for at least a further six months.

These figures are bad news for anyone hoping to see a domestic backlash within Russia as the war in Ukraine drags on and the costs become increasingly apparent to ordinary Russians. On the contrary, the slight rise in support since April suggests that a majority of Russians have accepted today’s wartime conditions as the new normal and are largely supportive of the Kremlin’s official narrative.

Since the outbreak of hostilities, the Putin regime has worked hard to control domestic perceptions of the conflict, which it euphemistically calls a “special military operation.” Draconian new legislation was adopted in the first days of the war introducing tough penalties for any media coverage that deviated from the official Kremlin narrative, while any attempts to stage anti-war protests have been ruthlessly stamped out.

So far, the Kremlin’s precautions have proven highly effective. During the first three months of hostilities in Ukraine, no major anti-war rallies have taken place anywhere in Russia. Instead, those who opposed the invasion have largely chosen to keep quiet or have left the country.

Despite multiple reports of concern behind the scenes, the regime has also remained solidly supportive of the war with no prominent figures seeking to protect their reputations by stepping down or speaking out against the invasion. This absence of high-level resignations was inadvertently underlined in early May when mid-ranking Russian diplomat Boris Bondarev made global headlines by announcing his decision to resign over the war.  

The one area where opposition to the war is increasingly evident is within the ranks of Russian military itself. Since the outbreak of hostilities in late February, significant numbers of Russian troops have refused to fight in Ukraine or have abandoned their units and deserted.

While the exact number of Russians refusing to follow orders remains a closely guarded secret, one widely reported incident saw 115 members of Russia’s National Guard dismissed after they refused to fight in Ukraine. Meanwhile, a lawyer representing Russians who do not want to participate in the invasion has claimed that he’s been contacted by more than a thousand soldiers.

Collapsing morale within Putin’s military may now represent the greatest single threat to Russia’s war effort. While the Kremlin-controlled Russian media can disguise the true nature of the war indefinitely, those on the frontlines know the reality of Russia’s losses and are well aware of the atrocities being committed against the Ukrainian civilian population. As more and more soldiers seek to escape the Ukrainian meat grinder, Putin faces challenges finding enough troops to maintain the invasion without taking the politically risky move of ordering a general mobilization.  

There are signs that the Kremlin is already beginning to face manpower issues. Recent legislation removed age limits for Russian soldiers in an apparent bid to fill out depleted ranks by recruiting men over the age of forty. The regime has also been relying on ethnic minority soldiers from many of Russia’s poorest regions along with conscripts from Russian-occupied eastern Ukraine. If mounting losses and desertions force the Kremlin to enlist thousands of young Russians from Moscow and St. Petersburg, the current pro-war consensus may not survive.

Peter Dickinson is Editor of the Atlantic Council’s UkraineAlert Service.   

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post More than three-quarters of Russians still support Putin’s Ukraine War appeared first on Atlantic Council.

]]>
Now is the right time to launch a Digital Marshall Plan for Ukraine  https://www.atlanticcouncil.org/blogs/ukrainealert/now-is-the-right-time-to-launch-a-digital-marshall-plan-for-ukraine/ Mon, 30 May 2022 12:02:27 +0000 https://www.atlanticcouncil.org/?p=530449 As the world explores the challenges of rebuilding Ukraine, one smart option may be to initiate a Digital Marshall Plan that will play to Ukraine's existing tech strengths while securing the country's modernization.

The post Now is the right time to launch a Digital Marshall Plan for Ukraine  appeared first on Atlantic Council.

]]>
The Russo-Ukrainian War is now in its fourth month. While there is currently no end in sight to the carnage, discussions are already underway over what kind of Ukraine should emerge during the post-war period.

The war unleashed by Vladimir Putin on February 24 is widely acknowledged as the largest and most destructive European conflict since WWII. Tens of thousands of Ukrainians have been killed during the first three months of the invasion, while the damage done by Putin’s forces has been estimated at hundreds of billions of dollars. Whole cities have already been destroyed, while Russia’s heavy reliance on airstrikes and artillery bombardments means the tragic toll will continue to rise.  

Clearly, rebuilding Ukraine will be a Herculean task requiring unprecedented financing and the full participation of the international community. It is also vital that plans for the new Ukraine should reflect the country’s immediate needs and competitive advantages. This is why it makes sense to begin work without delay on a Digital Marshall Plan that will harness Ukraine’s tech excellence and enable Ukrainians to continue the important progress made in recent years.

The war is being prosecuted across multiple strata, including the informational and digital spaces. While soldiers defend Ukraine on the battlefield, the country’s Ministry of Digital Transformation and the Ukrainian IT community are developing a sustainable digital rear. 

From the first days of the war, the Ministry has been working with other state bodies to actively increase Ukraine’s digital resilience. These efforts have included creating a layered system of cyber defense for state IT infrastructure and adapting public e-services.

Digital diplomacy has become a critically important field of activity for the Ministry. Minister of Digital Transformation Mykhailo Fedorov has appealed to hundreds of technology companies asking them to join the technological blockade of Russia while calling on them to stop paying taxes to the Russian budget and develop a presence in Ukraine.

An enormous amount of work has also been done to improve the digital defense capability of the Ukrainian state. In cooperation with the Ukrainian blockchain community, the Ministry of Digital Transformation launched a large-scale fundraising campaign gathering crypto donations for ammunition purchases. The Ministry of Digital Transformation and Ukrainian IT companies have launched a number of specific projects to protect civilians such as the Air Alarm App, while also supporting refugees and those living in Russian-occupied regions of the country.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Anyone familiar with the pre-war structure of the Ukrainian economy will not be surprised by the prominent role of the Ministry of Digital Transformation and the country’s IT industry as a whole in the current conflict. President Zelenskyy came to power in spring 2019 promising a digital transformation. As soon as he took office, he began implementing the “Country in a Smartphone” program.

During the pre-war years of Zelenskyy’s presidency, hundreds of public services were digitalized. The Diya smartphone application was central to these efforts and became the main personal ID for millions of Ukrainians. By digitizing government services, the authorities were able to simplify bureaucratic processes and dramatically reduce the scope for corruption within state agencies.

It is important to note that the digital transformation of Ukraine has never relied on the purchase of imported solutions. Instead, it has been based almost exclusively on the tailored work of Ukrainian IT engineers. This is only natural given the remarkable rise of the Ukrainian IT sector over the past few decades.  

The Ukrainian IT industry has been the main driver of rising export revenues for a number of years. In 2021, Ukrainian IT exports grew 36% year-on-year to total USD 6.8 billion, representing 10% of the country’s total exports. Meanwhile, the number of Ukrainians employed in the IT industry increased from 200,000 to 250,000. This growth was set to accelerate further in 2022 until the war intervened.

According to current World Bank forecasts, Ukraine’s GDP in 2022 will fall by more than 45%. Depending on the course of the war, this figure could rise significantly. Ukraine’s Western partners are well aware of the need to keep the Ukrainian economy afloat while also preparing for the massive rebuilding project that will eventually follow. British Prime Minister Boris Johnson has publicly backed a new Marshall Plan for Ukraine. Other world leaders have also voiced their support for this initiative.

The immediate priority will be to repair the catastrophic damage done to Ukrainian homes, hospitals, schools, roads, bridges, airports, industries, and other vital elements of national infrastructure. At the same time, the most effective long-term use of resources may be to focus on strengthening Ukraine’s digital economy and the country’s IT industry. Investing in this sector will have an immediate economic impact and will create the largest number of jobs. After all, global studies consistently indicate that every new work place in the IT industry creates five more jobs in non-related service industries.

What should a Digital Marshall Plan for Ukraine look like? First of all, it should feature large-scale strategic investment in the digital transformation of Ukraine including all public services, healthcare, and education. This will lead to the radical modernization of the Ukrainian public sector while creating huge demand for the services of Ukrainian IT companies, many of which have lost their Western customer bases due to the war.

Meanwhile, investment into the rapid retraining of Ukrainians from other professional backgrounds will help to drastically reduce unemployment. Even before the war, the Ukrainian IT industry consistently suffered from a shortage of personnel. With industrial facilities across the country destroyed and whole sectors of the economy on pause as a result of the Russian invasion, unemployment is a major issue in today’s Ukraine. Comprehensive training programs can enable tens of thousands of Ukrainians to become qualified IT specialists and find new work during the initial post-war period or possibly even sooner. 

The Ukrainian IT industry must not only be preserved but also brought to the next level. To make this happen, Ukraine and the country’s partners should work together to create attractive financial conditions that will encourage more of the world’s leading tech companies to open Ukrainian hubs and R&D centers.

It is also necessary to establish a large-scale “fund of funds” for IT entrepreneurs that will invest in venture funds operating in Ukraine. Startups were fast becoming the most important growth point of the Ukrainian tech sector before the war and have huge potential for the future. Once the conflict is over, Ukrainian innovators will bring the many tech solutions created during the war to global markets. International interest is likely to be intense.

Work on a Digital Marshall Plan needs to begin now. The rebuilding of Ukraine will necessarily take many years and looks set to be one of the most challenging international undertakings of the twenty-first century. Investing in the Ukrainian IT industry now will provide an immediate and significant economic boost. It will also enable the country to develop an optimized digital infrastructure that will lay the foundations for future prosperity and help secure Ukraine’s place among the community of European democracies.

Anatoly Motkin is president of the StrategEast Center for a New Economy, a non-profit organization with offices in the United States, Ukraine, Georgia, and Kyrgyzstan.

Further reading


The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Now is the right time to launch a Digital Marshall Plan for Ukraine  appeared first on Atlantic Council.

]]>
The Putin puzzle: Why is the Russian dictator so obsessed with Ukraine? https://www.atlanticcouncil.org/blogs/ukrainealert/the-putin-puzzle-why-is-the-russian-dictator-so-obsessed-with-ukraine/ Tue, 24 May 2022 22:22:08 +0000 https://www.atlanticcouncil.org/?p=528054 Vladimir Putin has sought to justify his invasion of Ukraine by claiming the country has no right to exist but in reality modern Ukraine enjoys a level of democratic legitimacy that far exceeds his own authoritarian regime.

The post The Putin puzzle: Why is the Russian dictator so obsessed with Ukraine? appeared first on Atlantic Council.

]]>
Why did Vladimir Putin invade Ukraine? In the three months since the invasion began, the Russian dictator has put forward a wide range of different rationalizations blaming the war on everything from NATO enlargement to imaginary Ukrainian Nazis. But throughout it all, his one consistent message has been the alleged illegitimacy of the Ukrainian state.

Such rhetoric is nothing new. For years, Putin has denied Ukraine’s right to exist while insisting that Ukrainians are really Russians (“one people”). He has repeatedly accused modern Ukraine of occupying historically Russian lands and has dismissed the entire notion of a separate Ukrainian national identity as an artificial invention created by outside forces seeking to weaken Russia from within.

The full extent of Putin’s Ukraine obsession was laid bare in a 5,000-word essay on the supposed “historical unity” of Russians and Ukrainians that was published in July 2021, just seven months before the Russian invasion. Posing as both amateur historian and amateur philosopher, Putin conveniently ignored centuries of imperial oppression before expressing his confidence that “true sovereignty of Ukraine is possible only in partnership with Russia.”

Insofar as “sovereignty” means freedom from external control, Putin’s statement is Orwellian-level nonsense. This chilling document was correctly interpreted by many as a declaration of war on Ukrainian statehood. It was subsequently made required reading for all members of the Russian military.

Events on the battlefield have since exposed the absurdity of Putin’s core arguments. If he has any lingering doubts regarding the reality of the Ukrainian nation, he need only consult the Russian soldiers who lost the Battle for Kyiv and were forced to retreat entirely from northern Ukraine after suffering catastrophic losses. Indeed, it is hard to think of a more comprehensive debunking of the whole “one people” myth.  

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Putin’s attempts to deny Ukrainian identity are easily dismissed but his insistence on the purported illegitimacy of modern Ukraine is worth exploring in further detail as it raises some interesting questions regarding the true causes of today’s war.

The foundational principle around which the Founding Fathers created the United States was the notion that those who govern can derive their legitimacy from only one source, namely the people they seek to govern. This idea of government “of the people, by the people, for the people,” as expressed by President Lincoln at Gettysburg in 1863, has come to be recognized as the basic principle underpinning all modern democratic systems.

The ideas of democratic rule and free elections have become so popular around the world that even totalitarian states often include the label “Democratic” in their respective country’s names, as is the case with the North Korean “Democratic People’s Republic of Korea.” Similarly, dictatorships such as Putin’s Russia still feel the need to stage faux elections in order to maintain the pretense of democratic legitimacy.

Much to Putin’s chagrin, modern Ukraine does not share his own regime’s lack of legitimacy. Far from it, in fact. In December 1991, Ukrainians took part in a nationwide referendum on independence from the Soviet Union that saw over 90% of voters back the creation of an independent Ukraine. Crucially, clear majorities supported independence in every single Ukrainian region including Crimea (54%) and the two regions that make up the Russian-occupied Donbas, Luhansk (83%) and Donetsk (76%). The vote was widely acknowledged as free and fair, setting a democratic standard that would gradually become the norm in Ukraine during the coming decades of independence.

Ukraine’s most recent election cycle in 2019 reflected the continuing consolidation of the country’s democracy. Despite running as a complete outsider with no political experience whatsoever, Volodymyr Zelenskyy was able to secure a landslide election victory over incumbent Petro Poroshenko in April 2019 and become Ukraine’s sixth president. Three months later, his newly established political party made history once again with a record win in Ukraine’s parliamentary election. Zelenskyy’s success reflected the highly competitive nature of Ukraine’s political system while underscoring the genuine legitimacy that the country’s democratic culture helps to bestow upon this state.

In the past few months, the courage and commitment demonstrated by millions of Ukrainians in the face of foreign invasion have vividly reaffirmed the legitimacy of Ukrainian statehood. The country has responded to Russia’s invasion with an unprecedented wave of national mobilization that has seen huge numbers volunteer for the armed forces and many more make breathtaking sacrifices in support of their nation’s defense. This remarkable show of unity and resilience has inspired the watching world while making a mockery of Putin’s ramblings.

By comparison, Russia’s post-Soviet development could hardly be more different. When the Soviet Union collapsed in 1991, nobody was offered the opportunity to vote in a referendum on whether they wished to be part of the Russian Federation. When Chechnya attempted to break away from Russia in the early 1990s, Moscow waged two bloody wars to crush that independence movement.  

Since coming to power at the turn of the millennium, Putin has had his political opponents murdered, jailed or exiled. He has steadily reversed the limited democratic gains of the 1990s and now completely controls the entire political system along with the media. All forms of dissent are outlawed. The crackdown on alternative voices in Putin’s Russia has become so surrealistic that people are now routinely arrested for holding up blank placards in public spaces.

Despite the country’s slide into authoritarianism, Russia still officially goes through the motions of regular election cycles in order to renew Putin’s mandate to rule. However, the increasing absurdity of these choreographed campaigns merely serves to underscore the illegitimacy rather than the legitimacy of the entire regime. 

This places Putin’s efforts to portray Ukraine as illegitimate in an entirely different light. By almost any measure, President Zelenskyy enjoys far more personal legitimacy than Putin, while democratic Ukraine is an infinitely more legitimate state than autocratic Russia.

Putin is well aware of this fact. He also understands that if a democratic Ukraine is allowed to gain strength and prosper, it will likely inspire Russians to seek similar changes in their own country. In other words, he regards the existence of a free and democratic Ukraine as an existential threat to the future of his own autocratic regime.

This helps to explain why Putin has chosen to gamble everything on the destruction of the Ukrainian state. From the Russian ruler’s perspective, independent Ukraine is an intolerable reminder that democratic legitimacy is entirely possible in the Slavic heartlands of the former USSR. Unless Ukraine is destroyed, Putin fears Russia itself may enter a new era of collapse that will continue the process begun in 1991.

Bohdan Vitvitsky is a former Resident Legal Advisor at the US Embassy in Ukraine and Special Advisor to Ukraine’s Prosecutor General.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post The Putin puzzle: Why is the Russian dictator so obsessed with Ukraine? appeared first on Atlantic Council.

]]>
Nia quoted in Bloomberg on the implications of Elon Musk’s overtaking of Twitter for activists and companies https://www.atlanticcouncil.org/insight-impact/in-the-news/nia-quoted-in-bloomberg-on-the-implications-of-elon-musks-overtaking-of-twitter-for-activists-and-companies/ Sun, 08 May 2022 18:14:00 +0000 https://www.atlanticcouncil.org/?p=523801 The post Nia quoted in Bloomberg on the implications of Elon Musk’s overtaking of Twitter for activists and companies appeared first on Atlantic Council.

]]>

The post Nia quoted in Bloomberg on the implications of Elon Musk’s overtaking of Twitter for activists and companies appeared first on Atlantic Council.

]]>
Russian War Report: Belarus launches “combat preparedness test” https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-belarus-preparedness-test/ Fri, 06 May 2022 18:14:45 +0000 https://www.atlanticcouncil.org/?p=520966 The Belarusian military began unannounced combat drills, the Kremlin drops the term "denazification," and a Latin American RT influencer resigns.

The post Russian War Report: Belarus launches “combat preparedness test” appeared first on Atlantic Council.

]]>
As Russia continues its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than seven years of experience monitoring the situation in Ukraine, as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union, the DFRLab’s global team presents the latest installment of the Russian War Report. 

Security

Belarus launches “combat preparedness test”

Continuous Russian attacks pound Azovstal

Tracking Narratives

Russia promotes Ukrainian grandmother with Soviet flag, while she says that they distorted her motives

Russia denies mobilization plans as state agencies search for “mobilization experts”

Kremlin drops the use of term “denazification” as many Russians did not understand it

Pro-Kremlin influencer in Latin America resigns from RT but sticks to old narratives

Media Policy

Yandex News aggregator whitelisting Kremlin-approved outlets

Belarus launches “combat preparedness test”

On May 4, the Belarusian military started unannounced combat drills. The Belarusian opposition reported on the “sudden combat preparedness test,” which is outside the usual cycle of Belarusian military exercises. A similar exercise was conducted in May 2021, when numerous Belarusian military units were put on high alert as well. The current unannounced exercise is likely a response to Defender Europe 2022, a large-scale military exercise conducted by the US and nineteen European countries over the course of May, as well as NATO exercises in Georgia, Latvia, Lithuania, North Macedonia, and Norway.

The day after the start of the Belarusian combat drills, videos started surfacing showing Belarusian forces on the move. These videos documented large military formations allegedly moving towards its borders with Poland, Latvia, and Lithuania. A British intelligence report suggested that Russia may use the military exercise in Belarus to deter Ukrainian forces. Although the report did not observe any specific threat from in the exercise, Russia will “likely seek to inflate the threat posed to Ukraine” by the training, it said.

https://twitter.com/elskorpione/status/1522015038650912769
A video showing Belarusian forces on the move. (Source: @elskorpione/Archive)

Lukas Andriukaitis, Associate Director, Brussels, Belgium

Continuous Russian attacks pound Azovstal

The Ukrainian garrison at the Azovstal steel plant in Mariupol continues to hold its ground despite relentless Russian bombardment. New footage of the factory being shelled surfaced on May 6, showing Russian artillery attacks from multiple angles. That same day, Ukrainian presidential adviser Andriy Yermak announced that another five hundred civilians were evacuated from Mariupol.

https://twitter.com/SputnikATO/status/1522480445639823360
May 6 video of Azovstal being shelled by the Russian forces. (Source: SputnikATO/Archive)

On May 5, photos surfaced showing workers changing street signs in Mariupol from Ukrainian into Russian. Meanwhile, a video that surfaced on May 4 showed that there are still Ukrainian troops inside the factory with combat capabilities. However, a video appeal from a military medic in Azovstal reported on a dire situation of people dying of diseases, due to the lack of antibiotics and other medicine. The medic, a Crimean Tatar of Turkic Giray descent, directed his appeal at Turkey.

Lukas Andriukaitis, Associate Director, Brussels, Belgium

Russia promotes Ukrainian grandmother with Soviet flag, while she says that they distorted her motives

In early April, a video of a grandmother greeting Ukrainian soldiers with the Soviet flag surfaced on the web. She had apparently thought that they were Russian soldiers, and greeted them with the Soviet flag. When the soldiers gave her food but stomped on the flag, however, she refused to take the food, claiming that her parents had fought for that flag. The grandmother became a prominent figure for Russian propagandists, who started erecting sculptures, and commissioning murals and banners.

On May 5, the Ukrainian Center for Strategic Communications found her and conducted an interview. After Russians shelled her yard, Ukrainian soldiers evacuated her and her husband to a nearby city. “Things are lousy, of course, since Russia went so evil on us, it’s very lousy,” she said, adding, “I did not think they would be bombing us this way.” While asked about her recent prominence in Russia, she replied, “It would’ve been better if I had not become famous and there was no war.” She also thought that she could “placate” Russians, she said, which is why she greeted the soldiers with the Soviet flag, hoping it could help avoid additional shelling and nudge them to resolve issues diplomatically. Russian propaganda tried to twist the interview by groundlessly claiming that Ukraine bombed her house and pressured her into these statements. 

Roman Osadchuk, Research Associate

Russia denies mobilization plans as state agencies search for “mobilization experts”

Amid Kremlin denials of planning to declare a full-scale mobilization in Russia, several Russian state agencies have started opening vacancies for “mobilization experts.” The job listings, which have appeared in Russian online job portals, were placed by various Russian state agencies, including the Russian Postal Service, the Federal Tax Service, the Ministry of Internal Affairs, and the Federal Service for Alcohol Market Regulation. 

Kevin Rothrock, managing editor of Meduza, tweeted the screengrabs initially shared by the SOTA Telegram channel, which identifies itself as Russian news platform.

Russian news Telegram channel SOTA shared screengrabs of job postings for “mobilization experts” placed by various Russian state agencies. (Source: SOTA)
Russian news Telegram channel SOTA shared screengrabs of job postings for “mobilization experts” placed by various Russian state agencies. (Source: SOTA)

The DFRLab verified the job listings and found that they have mostly appeared on the Russian online job portal nn.hh.ru. Some vacancies state in their titles that they are searching for mobilization experts and civil defense specialists. Other vacancies, such as a consultant on electronic signatures and electronic document storage, indicate in their job description that a person should be capable of “organizing and carrying out activities for the preparation of mobilization” in wartime or a state of emergency. 

Some of these vacancies were placed on April 29, while the latest ones were announced on May 4 and May 5. All of the listings include a requirement that candidates must be able to carry out mobilization activities.

Eto Buziashvili, Research Associate, Washington, DC

Kremlin drops the use of term “denazification” as many Russians did not understand it

Proekt, an independent investigate journalism outlet in Russia, learned from four sources close to Kremlin propaganda planning, that regular Russians did not understand the term “denazification,” which has been used by Vladimir Putin to justify his full-scale invasion into Ukraine. This conclusion was made after telephone surveys showed respondents having difficulties explaining the term. Proekt also cited the example of Kremlin propagandist Dmitry Kiselov attempting to explain the term during his TV show on February 27 and March 6, then later dropping the term altogether. 

The DFRLab confirmed a decrease in use of the keyword “denazification” by Russian media outlets soon after the start of the invasion of February 24, using online content analysis tool Meltwater. The decrease began in the beginning of March, around the same time the telephone surveying reportedly took place. The graph below displays usage of the term over time by Kremlin-owned media, pro-Kremlin media, and independent Russian outlets.

Number of “denazification” keyword mentions in Russian media from February 24 to May 6, 2022. (Source: Meltwater Explore)
Number of “denazification” keyword mentions in Russian media from February 24 to May 6, 2022. (Source: Meltwater Explore)

Nika Aleksejeva, Lead Researcher, Riga, Latvia

Pro-Kremlin influencer in Latin America resigns from RT but sticks to old narratives

On May 3, Inna Afinogenova, a Russian journalist previously associated with RT en Español and the RT-affiliated channel Ahí Les Va! (“There it goes!”), published a video on her personal YouTube account in which she explained that she has left RT and would no longer appear in Ahí Les Va! videos. 

According to Afinogenova, “I do not agree with this war…. Who can agree with a war? Just a few, [but] I am not among them….I have never agreed with any war because I know – and I know it from having suffered it myself – how these actions affect civilians above all.” 

Despite Afinogenova’s disagreement over Russia’s invasion of Ukraine, she continued to push anti-NATO and anti-EU narratives that she previously highlighted as an RT journalist. She cited “NATO’s aggressiveness” and “Ukrainian ultranationalists,” as well as narratives around Ukraine receiving weapons from other countries. Her latest remarks reflected similar statements from a March 1 video she made for Ahí Les Va!.

At the time of writing, her latest video has reached more than 135,000 views. Afinogenova’s YouTube channel, which she created the day before posting the video, has amassed more than 28,000 subscribers. The video has garnered more than 4,500 interactions on Facebook and around 15,000 interactions on Twitter.

Screenshot of Afinogenova’s YouTube channel and metrics.
Screenshot of Afinogenova’s YouTube channel and metrics. (Source: DFRLab)

Esteban Ponce de León, Research Associate, Bogota, Colombia

Yandex News aggregator whitelisting Kremlin-approved outlets

Yandex, the equivalent of Google for the Russian online market, has been whitelisting fifteen Kremlin-approved media outlets in Russia to display their news most prominently, according to an investigation by Meduza. The known outlets are: Izvestiya, RIA Novosti, TASS, Interfax, Rosiyskaya Gazeta, Kommersant, Vedomosti, RBK, Gazeta.ru, RT, Lenta, Regnum, Nezavisimaya Gazeta, and Vzglyad. The DFRLab has routinely spotted these outlets spreading Kremlin propaganda and disinformation on a regular basis.

Meduza journalist Svetlana Reyter talked with current and former Yandex employees, who told her that the list was created in 2015 by order of Russia’s office of the president, then activated in 2016 when Russia passed a law regulating the activity of online news aggregators. 

Following Russia’s February 2022 invastion of Ukraine, Lev Gershenzon, the former head of Yandex News, called on his former colleagues to stop promoting propaganda outlets. This reportedly started a discussion in Yandex that resulted in a decision to sell Yandex News and Yandex Dzen, the company’s blogging platform. The decision to sell both products went public in mid-March. By the end of April, it became known that VKontakte (VK), Russia’s largest social network, is buying both products. VK is under direct influence of the Kremlin. The head of VK, Vladimir Kirienko, is also the son of Sergey Kirienko, first deputy chief of staff to the office of President Putin.

On April 26, Meduza cited multiple anonymous sources from Yandex saying that the company is planning to split into two parts. One part will continue working within the Russian market, while other will focus internationally. Yandex’s PR department has denied the claim.

Nika Aleksejeva, Lead Researcher, Riga, Latvia

The post Russian War Report: Belarus launches “combat preparedness test” appeared first on Atlantic Council.

]]>
Nia quoted in the Washington Post on long-term implications of Elon Musk’s control over Twitter https://www.atlanticcouncil.org/insight-impact/in-the-news/nia-quoted-in-the-washington-post-on-long-term-implications-of-elon-musks-control-over-twitter/ Thu, 05 May 2022 13:37:00 +0000 https://www.atlanticcouncil.org/?p=520878 The post Nia quoted in the Washington Post on long-term implications of Elon Musk’s control over Twitter appeared first on Atlantic Council.

]]>

The post Nia quoted in the Washington Post on long-term implications of Elon Musk’s control over Twitter appeared first on Atlantic Council.

]]>
Ukraine War Diary: “You can never really get used to the air raid sirens” https://www.atlanticcouncil.org/blogs/ukrainealert/ukraine-war-diary-you-can-never-really-get-used-to-the-air-raid-sirens/ Sat, 30 Apr 2022 17:11:11 +0000 https://www.atlanticcouncil.org/?p=518920 Ukrainian media personality Vitaly Sych has kept a war diary recounting his experiences and observations during the past two terrifying and heroic months as Ukrainians have adjusted to Vladimir Putin’s criminal invasion.

The post Ukraine War Diary: “You can never really get used to the air raid sirens” appeared first on Atlantic Council.

]]>
Now in its third month, the Russian invasion of Ukraine has stunned the world and sparked the biggest international security crisis of the twenty-first century. Beyond the headlines, the war has plunged an entire nation of more than 40 million Ukrainians into a barely imaginable world of grief, fear and chaos. Leading Ukrainian media personality Vitaly Sych has kept a war diary recounting his experiences and observations during the past two terrifying and heroic months as Ukrainians have adjusted to the new realities of Vladimir Putin’s criminal invasion.

UKRAINE WAR DIARY: PART I

When my wife hurriedly woke me up in the early hours of Febuary 24 and I first looked out of the window, I could not believe my eyes. The familiar panoramic view from our apartment on the twentieth floor overlooking the Dnipro River was now dotted with huge columns of black smoke. Our entire building was shaking from explosions as missiles rained down on the outskirts of Kyiv.

The unthinkable had happened. Even though we all knew Russia had amassed a huge army on the Ukrainian border, I remained convinced until the very last moment that it was all a geopolitical bluff. Like so many Ukrainians, I could not believe anyone would launch a full-scale military invasion in the center of Europe. Such things simply did not happen anymore. Not in 2022.

I grabbed my phone and was immediately confronted by footage of Russian President Vladimir Putin proclaiming the start of a “special military operation” in Ukraine. His speech was completely unhinged and full of wild historical distortions. “This is war,” I said to my wife. 

For weeks I had downplayed her concerns about a possible war, often while gently teasing her and making sarcastic remarks. Despite my apparent confidence, my wife had remained unconvinced. She kept the tank of the car full, evening purchasing and filling an extra petrol canister. She packed changes of clothes and personal documents for all the family and bought lots of dry food. I thought this was over the top and said so. Sadly, she turned out to be right.

The day had barely begun, but it was already time to get our eight-year-old twins Peter and Anna out of the city. We had read numerous reports from the British and US intelligence services describing in detail how Russian security forces had compiled kill lists of Ukrainian journalists, activists, and politicians hostile to Moscow who were to be rounded up and executed during the initial stages of the occupation. My wife and I knew my name must be somewhere on those lists.

A brief look at my Facebook profile or a glance through the magazine I manage would be enough to get me into trouble with the Russians. My magazine’s last cover page before we were forced to suspend publication due to the war had featured Putin alongside senile Russian dictators Lenin and Stalin. All three were portrayed in wheelchairs styled to invoke a well-known Soviet photo of Lenin’s last days. The headline read “Kremlin Madhouse.” This was entirely in keeping with the spirit of the publication. It was clearly unwise for us to stay in Kyiv.

We picked up my wife’s mother and tried but failed to leave town. By 9am, all roads leading out of the Ukrainian capital were at a standstill. A massive exodus was underway as terrified Kyivans looked to escape the city and head west away from the advancing Russian tanks.

After a couple of hours spent hopelessly stuck in traffic we gave up and went home, only to learn that the Russians were already trying to land troops at Gostomel Airport, which is located in the Kyiv suburbs to the northwest of the city. It was obvious that we had to evacuate urgently. This time we chose the southern highway instead of the jammed western route. As we moved slowly toward the city limits, jet fighters roared low above our heads. I still don’t know whether they were Russian or Ukrainian planes. Eventually, we managed to exit Kyiv.

We headed to Vinnytsya where my mother lives. A 250-kilometer trip that typically takes three hours took us 10 hours. We drove mostly along godforsaken backroads that would normally be empty except for the odd tractor or perhaps even a horse and cart. But today these roads were jammed with caravans of cars ranging from simple hatchbacks to luxury jeeps. It seemed as though half of Ukraine was on the move, carrying their worldly belongings with them.   

My wife cried the whole way. With good reason, she thought we might never be able to go home again. We had left our entire lives behind us in a matter of minutes; our apartment, our house near Kyiv that we had spent so long saving up for, our jobs, everything.

We could not even take our beloved cat with us, who can barely cope with the one-hour trip out to our summer house and would have been unable to handle the long and stressful escape in a crowded car. Thankfully, we were able to save our cat by mailing our apartment keys to neighbors who now make sure he is well fed and cared for. During those first nightmare moments of the war when we were forced to make life-changing choices in an instant, the most difficult decision of all was the one to leave our cat.

It soon became clear that we had made the right decision as our journey evolved into a three-day marathon with six people crammed into one car. By midnight we reached my mother’s apartment in Vinnytsya. It was the first time we had felt relatively safe since that horrible day had dawned.

After a brief stopover, we decided to take my mother with us and head further west. The journey from Vinnytsya to Lviv is normally a five-hour drive but it now took more than three times as long. At some point during the night we lost our navigation signal while passing through a forest and found ourselves in complete darkness. As we tried to get our bearings, a nearby airbase was struck by a Russian missile. It was the kind of scene you expect to see in a horror movie and it will remain forever imprinted on my mind.

We eventually reached Lviv. By this point, I was completely exhausted. I had been driving for more than 24 hours and was running on pure adrenaline. Stress had robbed me of my appetite and I had barely eaten anything since leaving Kyiv.

The last leg of our journey still lay ahead and was perhaps the hardest. I had to get my family to the border but I would not be leaving Ukraine with them. Due to the imposition of martial law in the hours following Russia’s invasion, I could not exit the country. No Ukrainian men aged eighteen to sixy could. And to be frank, I would not have gone even if it had been possible. All of my male workmates and lots of female colleagues had stayed behind, some of them even remaining in Kyiv. I would never have forgiven myself if I had left. 

After a short sleep in Lviv, we began exploring our chances of getting to the border. Poland is less than eighty kilometers from Lviv, but crossing into the EU in the first days of the war was no simple matter. All of the checkpoints were completely jammed with people and the delay times were insane. At some crossings, cars were advised that they could be waiting for up to a week.

We checked the train station and it looked like Kabul before the arrival of the Taliban, with women and children screaming and trying to squeeze onto trains departing for Poland. Many families had simply abandoned their suitcases on the platform.

This scene was enough to convince us against taking the train. Instead, we decided to head south toward the Slovak border where, according to reports, queues were significantly shorter. This last stretch took me a further 16 sleepless hours, with our journey regularly broken up by document checks at the many paramilitary block posts that had sprung up like mushrooms in those first few wartime days. 

The plan was to get my family over the border into Slovakia where friends of friends would pick them up and drive them to Bratislava. From there, they would fly to Dublin. My sister is married to an Irishman and was waiting for them in the Irish capital.

After more than three days of almost non-stop driving that felt like three weeks, we finally reached the border. Our farewells were mercifully short. As we kissed and hugged our goodbyes, I had no idea if I would ever see my family again. They crossed into Slovakia and were finally safe. A week later, The Irish Times would publish an article about my family’s escape headlined “Now we have a chance to cry.”

I remained on the Ukrainian side of the border. I was now alone. Like everyone else still in Ukraine, I was facing a future of grave uncertainty. I returned to Lviv and my wartime life began.

UKRAINE WAR DIARY: PART II

“Are you still alive?” read the text message from my colleague and radio show partner Serhiy Fursa. I immediately understood that the noise which had woken me up minutes before was the sound of Russian ballistic missiles. I peered out of my window and saw smoke rising from somewhere in the downtown area of Lviv. Five Russian missiles had hit the city, leaving seven dead and dozens wounded. Serhiy said he actually watched three of the missiles from his balcony but failed to take a video.

This was the third Russian airstrike on Lviv, a city close to the EU border that is generally regarded as safe. “Are we still going to do our radio show today?” I asked Serhiy. “Why not?” he replied. So we did. Since settling in Lviv during the early days of the war, we have already broadcast more than 40 episodes of the show. We go on air every day, always around lunchtime.

My accommodation in Lviv is an apartment rented by a colleague of mine who is a partner in the investment banking firm that owns our media house. All of the partners in the company, including the Czech owner, have relocated to Lviv. Even though his Czech passport would have allowed him to leave Ukraine, he decided to stay with his people.

We soon learned that we had been very lucky to get an apartment for just the two of us. Others have had to cram four or five into a single apartment as internally displaced people from across Ukraine have flooded into Lviv. As a result, the city is now packed full and finding available accommodation is next to impossible. We have even begun to joke that we shouldn’t invite any colleagues over to our flat in case they stop talking to us when they see our luxurious living conditions. 

There are only two problems with our flat. The first is actually more of an inconvenience. I have to share a bed with another man. We have bought separate pillows and blankets, of course. But the fact remains that I’ve been sleeping with a man for more than a month. Life will never be the same again!

The other problem is more significant. As with all real estate, location is the most important feature. And in our case, this is definitely a problem. The apartment we are renting is close to a huge military base and the local headquarters of the Ukrainian intelligence service. This makes it an obvious target for Russian missiles.

The threat of Russian airstrikes is no longer hyperthetical. Indeed, the ambassador of Kazakhstan was living just a few blocks away until recently but was advised by his security team to move out of the neighborhood. This apparent danger is a source of amusement to locals. When they find out where we live, they joke that our landlord should actually be paying us. To make matters worse, the apartment is on the top floor of the building. A prime location indeed!

The military base next door has an outdoor area with all sorts of old Soviet-era military equipment on display. There are tanks, artillery, and rocket launchers dating back to WWII and the Cold War. Given the often poor quality of Russian intelligence and satellite imagery, we wonder whether they might mistake these museum exhibits for the real thing and launch an airstrike. Such speculation would once have been amusing but it is now no longer funny.   

After several deadly Russian missile attacks that killed dozens of Ukrainian soldiers, the Ukrainian military has introduced new protocols. When the sirens go off in the city, hundreds of military personnel with Kalashnikovs stream out of the military base next to us and disperse in order to make sure there are no concentrations of soldiers in any one place. They then hang out for hours on end in nearby parks and residential yards. 

Air raid sirens come every day and every night, often at about three or four in the morning. You can hear the sirens throughout the city. It is ubiquitous and sticks in your head like the beat of a bad pop song. After a few hours, the second siren indicates that the danger has passed. I still can’t distinguish between the two. If you miss the first one because you are asleep, you think the second one is the start of an air attack. Sometimes we have to ask each other: is this the first or second siren?

To liven things up even more, my apartment mate has downloaded an application that notifies him of airstrikes with a tremendous alarm. He jumps up in bed and obviously I cannot avoid also hearing it. After that, nobody can sleep. Digital technology is not always helpful.

Living under the constant threat of Russian airstrikes is a chilling experience. The missiles themselves are accompanied by the distinct smell of death. Even though the Russians insist they only target military infrastructure, in reality they often hit civilian targets and kill ordinary Ukrainians.

In Syria, Russia fired a total of about 100 missiles over a five-year period. In Ukraine, the Russian military launched more than 1,500 missiles during the first month and half of the war alone.  Some were launched from Belarus. Others were shot from bombers over the Black Sea. Their range leaves nobody in Ukraine immune. Nowhere in the country is truly safe.

Everybody in Lviv seems to have grown used to air raid sirens. I was out jogging in the park one morning when the siren sounded. It had almost no visible effect. Parents continued strolling with children and old people remained engrossed in their conversations on park benches. One elderly lady turned to her granddaughter and said calmly but firmly, “Don’t worry. We’ll be fine.” 

I can’t help thinking that this sense of calm is false. We won’t be fine. In truth, you can never really get used to the air raid sirens. The first thing I’d like to do when this war is over is go somewhere abroad where I will not have to hear any airstrike warnings at all.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

UKRAINE WAR DIARY: PART III

The first days of the war were incredibly tough professionally as I attempted to somehow keep our media holding from collapsing. I lost contact with colleagues and had no idea whether they were being bombed in Kharkiv or were somewhere on the road trying to evacuate their families. Some people simply disappeared. Others struggled to cope with the emotional stress of the situation and were unable to work. One of our most prominent colleagues suffered a breakdown and began publishing crazy fake posts on social media.

I eventually had to accept that I could not help everyone and decided to focus on sustaining our operation and supporting as many colleagues as possible. Without exception, the war has been a personal crisis for all of us.

About a week after the war begin, the dust began to settle and we were able to get an idea of where we might be heading as a media organization. Nothing was straightforward. Our star reporter was sheltering from Russian airstrikes in Kyiv’s metro system. Our weekend editor was stuck in Kharkiv under heavy bombardment and we temporarily lost touch with him. Thankfully, we later learned he had survived.

The head of our English-language operation, a Scotsman, had to evacuate his family to Glasgow. This meant that responsibility for English-language coverage fell to a young Ukrainian editor who was also busy trying to help her grandmother cope in an apartment with poor wifi connection on Kyiv’s left bank.

Our financial and IT reporters had joined the Ukrainian army. Our chief designer and political editor weren’t planning to join the army but were drafted in Lviv when they arrived with their families. Our two most prominent radio presenters joined the territorial defense force in Kyiv. The procedure for signing up in wartime was so simple that they merely had to appear with their IDs in order to receive a Kalashnikov.

For a while, I feared we would not have enough people to run our company. Despite having been one of the largest news organizations in Ukraine on the eve of the war, it looked like we might not survive.

Then things stabilized. Or at least, we achieved as much stability as is possible during wartime. The Russians turned out to be far less sophisticated that everybody had expected and failed to knock out the Ukrainian internet. Dozens of our team reached safe places with decent internet connections in western Ukraine. Despite facing unfamiliar and often highly challenging living conditions, we gradually got back to work.   

For obvious reasons, we ceased publication of our weekly magazine. Colleagues who normally focused on topics like sports, tech, auto news, entertainment and science were asked to forget about their previous lives and strengthen our war coverge. We went into 24/7 mode, pumping out non-stop content during night shifts and over weekends in Ukrainian, Russian and English.

We were soon producing 300 news items per day and ranking among the top two most visited sites in Ukraine. In March, our audience skyrocketed and reached 25 million unique users along with around half a billion page views.

In recognition of this success, we became the target of a major Russian cyber-attack. Despite being under physical Russian bombardment in Kyiv Oblast at the time, our chief programmer managed to get us back online. He was also able to upgrade our cyber security to levels that have prevented any repeat cyber-attacks.

While we cranked up our online coverage to a wartime tempo, we relocated part of our radio equipment to Lviv and organized an improvised new studio in a shopping mall where we were given two rooms free of charge. Before the war, our FM radio covered 44 major cities across Ukraine. This number has been slightly reduced by the Russian habit of taking down our transmitters in occupied Ukrainian cities like Kherson and Melitopol. Nevertheless, we continue to broadcast to more than 30 cities as well as via YouTube and online.

I started a daily radio show in tandem with a well-known investment banker and blogger who also relocated to Lviv. He speaks Ukrainian and I speak Russian on air. Our idea was not just to analyze key events but to support our audience. Working on the assumption that listeners already knew the most recent headlines and were aware of any bad news, we figured we would focus on positive developments such as Russia’s economic woes, international support for Ukraine, and signs of internal divisions in Moscow.

We are not fools and understand the gravity of the situation. At the same time, we want to provide a glimmer of hope and also some much needed humor. Russia’s top officials and propagandists are all legitimate targets and there is certainly no shortage of good reasons to ridicule them.

Air raid sirens can be very disruptive when you’re trying to do a live radio broadcast. Every time the sirens start up, the shopping mall shuts down and everyone runs to the shelter. We eventually decided to stay put and continue our broadcasts. The alternative would be to leave our radio frequency blank for hours on end.

Ukrainians seem to appreciate what we’re trying to do. Our YouTube audience grew fivefold in just one month, even though we have no cameras in the studio and only offer an audio stream.

The single most rewarding episode of our wartime broadcasting experience came from Bucha, the Kyiv suburb where Russian forces committed war crimes that shocked the world. One old lady emerged following the liberation of Bucha and recounted how she had spent weeks in a basement listening to nothing but our radio station. When she met our reporter, she hugged her and burst into tears. This tale alone made all our efforts seem worthwhile.

UKRAINE WAR DIARY: PART IV

When I first arrived in Lviv in the last days of February, the city looked and felt like it was on the verge of an apocalypse. This usually vibrant hub of tourism, culture and history had become a ghost town. The streets were empty while only a few of Lviv’s famed cafes and bars remained open. There was a ban on alcohol sales and all shops were closed except for food stores and pharmacies.

Despite this eery quiet, Lviv was by then already packed with refugees from Kyiv and other Ukrainian cities. I often ran into acquaintances from the capital including restaurateurs, bankers, and fellow journalists. It felt as though we had all become part of a new chapter in Erich Maria Remarque’s classic WWII refugee novel “The Night in Lisbon.”

The many members of this displaced tribe tended to spend most of their time on the phone trying to help friends and family who were still under bombardment or stuck in occupied regions of the country. I was no exception.

My eldest daughter, Masha, who is twenty-six, was trapped in Kyiv with her boyfriend. By the time they had decided that they needed to leave the city, it was too late. Evacuation had become too dangerous. Their home district in the north of the city was the scene of shelling and street battles as Russian troops sought to advance into the heart of Kyiv.

Masha spent a week in a basement hiding from Russian bombs. She would call me regularly, crying and sharing reports about Chechen forces who were said to be closing in on Kyiv. The Chechens would soon enter the city and rape all the women, she said. As we later learned, these fears were justified. But at that point, I was more interested in trying to calm her down by telling her that the Chechens had already suffered catastrophic losses in Bucha, including the death of their most notorious general. This was also true. One week later, Masha and her boyfriend were eventually able to leave the city and head south. It was a huge personal relief for me. Millions of Ukrainians were not so fortunate.

Even though Lviv didn’t experience anything like the problems in Kyiv, food did become scarce. Buckwheat, rice and pasta were the first to disappear as people prepared for the worst and stocked up on long-lasting foodstuffs. I must admit that I was partly to blame, purchasing enough food for an entire month. Supply chains for things like chicken and dairy products also soon broke down, leaving shoppers with little to choose from except the most expensive brands of tea, coffee, delicacies and cookies. With all the empty shelves in the stores, it started to feel a little bit like going back to the USSR.

During the early weeks of the war, many people in Lviv feared that Putin would convince Belarusian dictator Alyaksandr Lukashenka to join the invasion and launch an offensive into the Volyn region. This would bring the war right to the borders of Lviv. Despite at least four separate warnings of an imminent invasion, the Belarusians still haven’t ventured into Ukraine. Lukashenka is certainly a monster but he is not a complete idiot, it would seem. He also has access to reliable data on the sheer scale of Russian losses in Ukraine due to the fact that many Russian casualties have been brought back across the border to Belarusian hospitals and morgues.  

When not doing my radio show, I found myself sharing an office with investment bankers who had also moved to western Ukraine from Kyiv. Like millions of their fellow Ukrainians, these finance professionals followed frontline military developments closely online and cheered the destruction of each successive Russian military convoy. 

Monitoring Russian losses quickly became the most popular form of wartime entertainment for Ukrainians. The idea of deriving pleasure from footage of military carnage and dead soldiers would have seemed perverse or even obscene just weeks earlier, but graphic content now circulated in large quantities through a growing number of telegram channels, often accompanied by black humor. Many women discovered that they also enjoyed looking at such grim images.   

You wouldn’t expect this kind of behavior from a healthy person during peacetime. But everything changes after you’ve read hundreds of reports about children bombed, ordinary Ukrainians executed and women gang-raped, especially when the crime scenes are so familiar and the victims are personal acquaintances.

The endless accounts of Russian atrocities have taken their toll on Ukrainians in many ways. Almost everyone I know has trouble sleeping. There is also much fury and hunger for revenge. One of our radio hosts asked listeners what they would do if presented with a button that could instantly kill all Russians, including friends and relatives. He was half-joking, of course, but was also honest enough to admit that he would personally press the button without hesitation. The general consensus among listeners seemed to be that such an opportunity would be tempting.

During our radio discussions, we also pondered the question of how much blame could be attached to ordinary Russians. Had they given Putin a mandate for the war and the mass murder of Ukrainians, or was it all his personal responsibility? After the first few weeks of the war, this debate became redundant when independent polls indicated that more than 80% of Russians supported the war.

Of course, it is difficult to find entirely objective opinion polls in a totalitarian country. But the figures emerging out of Russia as the war progressed were entirely in line with a wide range of anecdotal evident suggesting that a clear majority of Russians backed the invasion of Ukraine. Ukrainians are also well aware that it was not Putin who personally bombed Kharkiv or executed civilians in Bucha. These crimes were committed by Russian servicemen who received their orders from Russian officers. They could have refused but they chose not to.    

My wife’s sister lives on Moscow. She moved there when she was 16 and is now a Russian citizen. She and her husband were terrified when the war began. They were ashamed and called many times to offer words of support. They followed news of the war closely and knew all the details about the horrors taking place in Mariupol, Kyiv and Kharkiv. This demonstrated once again that talk of Russians living in an information vacuum is wishful thinking. If the average Russian wants to access accurate information about the war, they can do so easily.  

Three weeks into the war, my sister-in-law’s fourteen-year-old daughter came home from her Moscow school and asked whether it was true their country was killing children in Ukraine. They answered that yes, it was true, but asked her not to tell anyone. By then, the old Stalinist tradition had returned to Russian schools, with teachers asking kids what their parents were saying at home about the war and reporting any criticism to the authorities.

The reality is that the Russian public does not want to know the truth. The lies they are fed by the Putin regime make them feel good and they are afraid to leave their comfort zone. For years, highly emotional propaganda on Russian TV has fueled imperialistic sentiments among the Russian public while dehumanizing Ukrainians. Many Russians now simply refuse to believe information about atrocities in Ukraine and dismiss the overwhelming evidence of war crimes as fake. I am not at all surprised by such attitudes. It is extremely difficult to admit that you’ve been so comprehensively misled by your own leaders and convinced to support a criminal war.

Millions of extended Russian-Ukrainian families have been divided by the conflict. A former classmate of mine from Chelyabinsk, a Russian city in the southern Ural Mountains, moved to Ukraine many years ago. He recently tried to explain the realities of the war to his mother back in Russia. She refused to listen and declared that everything he said was fake. “Am I fake, too?” he asked. They have not been in contact since.  

UKRAINE WAR DIARY: PART V

My taxi driver yesterday was Serhiy from Mariupol. He and his family had managed to leave the devastated Ukrainian port city just before the Russians encircled it. He had since become a taxi driver to make a living. Mariupol is not just a global news headline. It is a vast and unfolding human tragedy that casts a pall of sadness and terror over all Ukraine. If there is a hell on earth right now, it is Mariupol.  

So it was only natural that I wanted to talk. Serhiy said 95% of residential buildings in the city, including his own, had been destroyed. Around 100 people among his personal acquaintances had been killed. He said that most of the information he had came from survivors, both those still trapped inside Mariupol and the lucky ones who had managed to escape. As he recounted these horrors, I was struck by the lack of emotion. Maybe he had become apathetic or didn’t want to offload the burden of his pain onto me. 

What astonished me most of all was his plan to return home and rebuild Mariupol. “As long as it remains in Ukraine,” he added. I know plenty of people who have serious emotional reservations about going back to cities that have suffered much less destruction than Mariupol. His experience moved me deeply, but there was little I could offer him except a generous tip.

Russia has good reason for pushing so hard to take Mariupol. Putin desperately needs some kind of success for domestic consumption ahead of Victory Day on May 9. The annual celebration of the Soviet Union’s defeat of Nazi Germany plays a central role in modern Russian mythology. This year’s holiday must be marked by a new triumph.

There is another less obvious but equally important reason why Russia is determined to seize Mariupol at all costs. The Kremlin simply cannot afford to let the world see what it has done to the city. Current estimates indicate a death toll of between 10,000 and 30,000 civilians during the two-month siege. In other words, the destruction of Mariupol dwarfs the atrocities committed in Bucha and is likely one of the biggest war crimes in Europe since WWII.

At the other end of Ukraine, life has returned to Lviv. The city’s population has grown by 30% since the start of the war. Shops and movie theaters are now open once again. The alcohol ban has been partially lifted with everything available except for hard liquor. As a result, restaurants and bars are full. The crowds are cosmopolitan and often include lots of foreign journalists as well as people who have relocated to Lviv from across Ukraine.

During the weekends, the shopping mall that serves as the Lviv base for our radio station is absolutely full of people. The main indication that life is still far from normal remains the ubiquity of air raid sirens. Most shoppers would probably be happy to stay, I imagine, but due to wartime regulations all stores close and everyone must take cover.

I have recently received news that my summer house north of Kyiv in the village of Nova Bogdanivka was pillaged by Russian soldiers. I invested so much of my time and energy there renovating, building a summer terrace, and planting a garden. It is also a home where my family spent most of our weekends and nine whole months during the height of the Covid pandemic. At least the Russians didn’t burn it down.

Nova Bogdanivka was on the frontline and was the scene of heavy fighting for a month. I learned about all the developments there from a Telegram channel that united all residents of our 250-house community. When the war began, most of us left for other parts of Ukraine or for the relative security of nearby Kyiv. A handful of residents stayed behind in the village. During the fighting, they were forced to hide in basements to survive and were very cautious about discussing their situation in case any of the details somehow leaked out and reached the Russians.

At some point, a village resident published a photo of my neighbor’s SUV dotted with bullet holes. His son recognized the car in the photo and begged everybody in our Telegram group for help. It was a terrifying moment. Nobody could do anything and everybody knew it was our neighbor. Later we learnt he had died.

On reflection, our village was actually lucky. One resident was killed and all of our houses were looted by Russian troops or “orcs” as they are universally referred to in our Telegram group. The neighboring village was far less fortunate. Every third house was completely destroyed by heavy artillery. The fate of this neighboring village became the subject of a harrowing feature-length report by independent Russian news site Meduza detailing multiple murders and rapes by Russian troops. Relatively speaking, we have nothing to complain about.

My neighbors from Nova Bogdanivka have begun uploading photos from their security cameras to our messenger group. It turns out that the Russians stole anything they could carry from carpets and vacuum cleaners to used clothes and kitchen cutlery. Some of them filled up suitcases with stolen items. I can understand why a soldier might decide to steal money or jewelry, but why would anyone want to take somebody else’s clothing or knives and forks?

“The second army in the world,” as my neighbors sarcastically describe the Russians, turned out to be a bunch of impoverished bums. Nova Bogdanivka residents who managed to talk to the invaders discovered that most came from the poorest regions of Russia including the North Caucasus, Siberia and the Far East. Some of them admitted that they had only previously seen asphalt roads on TV. Whether he intended to or not, Putin has conducted a “special operation” to show the whole world the poverty and degradation of the Russian military and modern Russian society as a whole.

I have not yet learned the full extent of the damage to our house. It is still too early to check as the retreating Russians left mines and booby traps throughout the village. I don’t know when we will be able to go back, but I am already terrified by the thought of our eight-year-old twins Peter and Anna going for a walk in the village or just playing in our garden. I fear this lingering sense of dread will be with us for many more years to come.

Vitaly Sych is Chief Editor of NV media house which includes a weekly magazine, national talk radio station, and news site (NV.ua). This war diary was originally published in the German language by Die Zeit newspaper.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine War Diary: “You can never really get used to the air raid sirens” appeared first on Atlantic Council.

]]>
Beyond Putin: Russian imperialism is the No. 1 threat to global security https://www.atlanticcouncil.org/blogs/ukrainealert/beyond-putin-russian-imperialism-is-the-no-1-threat-to-global-security/ Wed, 27 Apr 2022 21:48:59 +0000 https://www.atlanticcouncil.org/?p=517957 Many Western leaders accuse Vladimir Putin of single-handedly sparking the current war in Ukraine but in reality the roots of the conflict are far deeper and reflect longstanding Russian imperial attitudes toward Ukraine.

The post Beyond Putin: Russian imperialism is the No. 1 threat to global security appeared first on Atlantic Council.

]]>
Since the invasion of Ukraine began two months ago, Western leaders including US President Joe Biden and German Chancellor Olaf Scholz have sought to place the blame exclusively on Vladimir Putin while absolving the Russian people. Such assertions may be politically convenient but they are also dangerously misleading. Far from dragging his reluctant compatriots into war, Putin is himself a symptom of the unapologetically imperialistic outlook that shapes modern Russia’s relationship with the outside world and fuels the country’s insatiable appetite for external aggression.

An understanding of Russia’s imperial instincts is essential for anyone looking to make sense of the seemingly senseless war crimes currently taking place in Ukraine. After all, it was not Putin who committed rape, torture, and mass murder in towns and villages across Ukraine. Putin did not fly the jets or fire the artillery that reduced entire Ukrainian cities to rubble. Likewise, he did not personally produce the endless stream of Russian propaganda films, TV shows, fake news bulletins, and social media posts dehumanizing Ukrainians and demonizing the West. These crimes were only possible thanks to the millions of Russians who willingly participated in the process or offered their enthusiastic support over a period of many years. 

While politicians and commentators in the West continue to promote the comforting notion that Russians are themselves victims of Putin’s regime, virtually all the available evidence points to strong Russian public support for the war in Ukraine. A recent survey conducted by Russia’s only internationally respected independent pollster, the Levada Center, found that 81% of Russians back the invasion of Ukraine with just 14% opposed. Another recent Levada Center poll identified a 12% surge in Vladimir Putin’s approval rating since the beginning of the war. These results have been mirrored in numerous other polls and surveys.

Meanwhile, the anti-war movement inside Russia remains underwhelming. There have been some public protests in major Russian cities, but these rallies have failed to attract significant numbers and been easily contained by the authorities. Rather than engaging in anti-war activism, most of the Russians who claim to oppose the regime have stayed silent or chosen exile and voluntarily left the country.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

Positive Russian attitudes toward the war are rooted in longstanding perceptions of Ukraine as part of Russia’s imperial heartlands. Despite the passage of three decades since the collapse of the Soviet Union, many Russians have never fully come to terms with the idea of an independent Ukraine and continue to regard the country as an indivisible element of historic Russia that has been artificially separated from the motherland.

Putin did not invent such sentiments but he has proven highly skilled at exploiting them. In his many speeches and essays on the Ukraine issue, he has consistently appealed to Russia’s imperial aspirations while playing on widespread resentment at the country’s post-Soviet humiliations and loss of superpower status. When Putin laments the fall of the USSR as the “demise of historical Russia,” ordinary Russians understand that it is primarily Ukraine he has in mind.

The Russian leader’s refusal to recognize Ukrainian statehood is not only a rejection of the post-1991 settlement. It is entirely in line with traditional Russian thinking and echoes key tenets of Czarist imperial doctrine dating back centuries. Putin routinely denies Ukraine’s right to exist and has frequently accused modern Ukraine of occupying historically Russian lands while dismissing Ukraine’s entire centuries-long statehood struggle as a Western ploy to destabilize Russia. On the eve of the invasion, he called Ukraine “an inalienable part of our own history, culture and spiritual space.”

Putin is particularly fond of declaring that Russians and Ukrainians are “one people.” This insistence that Ukrainians and Russians are part of the same whole has long been a central theme of Russian imperial propaganda toward Ukraine and provides the ideological basis for the current war. By positioning Ukraine as rightfully Russian, it reframes the unprovoked invasion of a peaceful neighbor as a justified response to a grave historical injustice.

In recent months, the Russian ruler has gone even further. He has branded modern Ukraine an “anti-Russia” that can no longer be tolerated while claiming the country has been taken over by the West. This resonates deeply with the Russian public, which has traditionally associated any manifestations of Ukrainian statehood with treachery and extremism.

We are currently witnessing the criminal consequences of these imperial delusions. Russian soldiers who have been encouraged to dismiss Ukrainians as traitors and view Ukraine itself as an anti-Russian invention are now engaging in war crimes that are entirely in keeping with the genocidal tone adopted by Putin and other Kremlin officials. As Voltaire once warned, “Those who can make you believe absurdities can make you commit atrocities.”

On the domestic front, the Kremlin-controlled mainstream media openly discusses the need to destroy Ukraine. For example, an article published by Russian state news agency RIA Novosti on April 3 made clear that Putin’s talk of “de-nazification” is actually code for the “de-Ukrainianization” of Ukraine. This chilling text laid out a detailed plan for the elimination of the Ukrainian nation and was branded a “genocide handbook” by Yale historian Timothy Snyder.       

If Russian imperialism is not confronted and defeated in Ukraine, other countries will soon face similar threats. While Ukraine appears to be a particular obsession for both Putin and the wider Russian public, the list of other potential victims is long. The Baltic states and Moldova are among the most likely to become targets of Russian imperial aggression, while the nations of Central Asia are clearly at risk. It is also worth noting that Poland and Finland were once part of the Russian Empire that Putin longs to resurrect. 

For almost three decades, Western leaders have approached successive acts of Russian imperial aggression as isolated incidents and have sought to downplay their significance while focusing on the economic advantages of continuing to do business with Moscow. This has only served to encourage the Kremlin. The Chechen wars of the early post-Soviet years were followed by the 2008 invasion of Georgia and the 2014 seizure of Crimea. The current war is the latest milestone in this grim sequence but it will not be the last. Resurgent Russian imperialism now clearly poses the biggest single challenge to global security. Countering this threat must be the international community’s top priority.  

Volodymyr Vakhitov is an assistant professor at the Kyiv School of Economics and head of BeSmart, the Center for Behavioral Studies and Communications. Natalia Zaika is a researcher at BeSmart, the Center for Behavioral Studies and Communications.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Beyond Putin: Russian imperialism is the No. 1 threat to global security appeared first on Atlantic Council.

]]>
New stamp captures Ukraine’s resolve to defy Putin and defeat Russia https://www.atlanticcouncil.org/blogs/ukrainealert/new-stamp-captures-ukraines-resolve-to-defy-putin-and-defeat-russia/ Sat, 23 Apr 2022 23:32:32 +0000 https://www.atlanticcouncil.org/?p=516213 A new Ukrainian postage stamp commemorating an iconic act of resistance to Vladimir Putin’s invasion has become a symbol of surging patriotic pride and growing confidence in Ukraine’s eventual victory over Russia.

The post New stamp captures Ukraine’s resolve to defy Putin and defeat Russia appeared first on Atlantic Council.

]]>
A new Ukrainian postage stamp commemorating an iconic act of resistance to Putin’s invasion has proved a huge hit with the public amid surging patriotic pride and growing confidence in Ukraine’s eventual victory over Russia.

The recently released stamp depicts a celebrated episode from the very first day of the war on February 24 that saw an isolated detachment of Ukrainian troops stationed on Snake Island in the Black Sea defy the might of the Russian navy. Despite being hopelessly outgunned by the approaching flagship of the Russian Black Sea Fleet, Ukrainian soldier Roman Hrybov rejected Russian demands to surrender while offering the epic response: “Russian Warship, Go F*ck Yourself.”

This memorable quote captured the mood of furious defiance then sweeping the nation and was immediately adopted as an unofficial slogan of the Ukrainian war effort. Many regarded the use of obscene language as particularly fitting and saw in it a direct echo of the legendarily profanity-laden seventeenth century reply of the Ukrainian Cossacks to a similar surrender demand from the Ottoman Sultan.  

Within days, Hrybov’s industrial language was adorning billboards across the country and dominating social media. The incident also inspired Igor Smelyansky, the CEO of Ukrainian postal service Ukrposhta, to launch a national online competition for a commemorative stamp. This resulted in a winning design that can justifiably be called an instant classic, featuring a lone Ukrainian soldier directing an obscene gesture toward the Moskva, Russia’s Black Sea flagship.

Subscribe to UkraineAlert

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.



  • This field is for validation purposes and should be left unchanged.

With emotions running high in wartime Ukraine, interest in the planned stamp was already intense ahead of its official April 13 presentation. This excitement then escalated to entirely new levels one day after the launch when Ukrainian forces sank the Russian warship depicted on the stamp. The sinking of Putin’s flagship was a humiliating blow for Russia and a massive morale boost for Ukraine. It also guaranteed a prominent place in modern Ukrainian folklore for the country’s recently released commemorative stamp.

Demand for the new stamp surged following the sinking of the Moskva. Thousands of Ukrainians queued for hours at post offices across the country in order to get their hands on this little piece of history, with many expressing their pride in the country’s defiant stance and mounting military successes. The international media loved the story and provided enthusiastic coverage, with the stamp even making it onto the prestigious US late night talk show circuit.

Needless to say, not everyone was thrilled by this success. Efforts to make the stamp available for online purchase ran into difficulties when the site was hit by a massive cyber-attack. This presumably reflected simmering Russian anger at the fate of the Black Sea flagship and resentment over the obvious international admiration for Ukraine’s courageous resistance to Putin’s invasion.

The stamp’s one million print run is now almost entirely sold out. With Ukrposhta ruling out any further printing, the stamp has become something of a collector’s item and is being offered on sites such as eBay at vastly inflated prices. Meanwhile, a successor stamp is being prepared with a similar but updated design reflecting the fact that the Russian warship in question did in fact go exactly where instructed by the defenders of Snake Island.

Unsurprisingly, the original stamp design has now taken on a life of its own as a source of memes. It is just one of the many humorous and inspirational Ukrainian themes to flood online platforms since the outbreak of hostilities two months ago as Ukraine has comprehensively outmuscled Russia in the battle for social media dominance. Ukrainian President Volodymyr Zelenskyy has become something of a one-man meme generation industry, while few memes have proved as consistently popular as the endless footage of Ukrainian tractors towing away Russian tanks.  

Russia’s invasion of Ukraine is no laughing matter, of course. The sheer scale of the war crimes currently being committed against the Ukrainian civilian population has stunned the global community and led to accusations of genocide from international leaders such as US President Joe Biden and his predecessor Donald Trump. With Russia suffering battlefield losses but still possessing overwhelming military strength, many observers fear the worst is yet to come.

This makes it all the more remarkable that Ukrainians have been able to maintain not only their humanity but also their sense of humor. The combination of raw courage and irreverent mockery that has characterized Ukraine’s response to Putin’s invasion has inspired the world and completely transformed outside perceptions of the country. Crucially, it has also helped convince more and more Ukrainians that they will ultimately emerge victorious. There is perhaps no more powerful symbol of this indomitable spirit than the tale of a Russian warship that attempted to intimidate Ukraine into submission but ended up on the front of a bestselling Ukrainian stamp and at the bottom of the Black Sea.

Peter Dickinson is Editor of the Atlantic Council’s UkraineAlert Service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post New stamp captures Ukraine’s resolve to defy Putin and defeat Russia appeared first on Atlantic Council.

]]>
Russian War Report: Forged document claims Ukraine is selling surplus weapons to African countries https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-forged-document-claims-ukraine-is-selling-surplus-weapons-to-african-countries/ Fri, 22 Apr 2022 17:52:29 +0000 https://www.atlanticcouncil.org/?p=516045 A Kremlin-tied Telegram channel published a forged document claiming that Ukraine was selling surplus weapons to African countries.

The post Russian War Report: Forged document claims Ukraine is selling surplus weapons to African countries appeared first on Atlantic Council.

]]>
As Russia expands its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than five years of experience monitoring the situation in Ukraine, as well as Russia’s use of propaganda and disinformation to undermine the United States, NATO, and the European Union, the DFRLab’s global team presents the latest installment of the Russian War Report.

Tracking narratives

Forged document claims Ukraine is selling surplus weapons to African countries

Putin declares victory in Mariupol despite inability to capture steelworks

Media policy

Russia’s flight regulator recommends airlines prepare for flying without GPS

Forged document claims Ukraine is selling surplus weapons to African countries

On April 19, the Kremlin-tied Telegram channel Rezident published a forged document claiming that Ukraine was selling surplus weapons to African countries. The letter, dated March 29, was purported to be written by the Ministry of Defense in response to a request from a member of Ukrainian parliament. The letter cites Amendment Number 1919 from the Decree of the Cabinet of Ministers of Ukraine, introduced in 2001, which allows the ministry to sell surplus weapons to other nations. The Telegram post alleged that Ukraine planned to sell armored cars, tanks, submachine guns, rifles, grenades, and bulletproof vests to African countries – “Everything that is so lacking on the front line,” the channel stated.

The letter also claimed that the company NVK Techimpex was responsible for selling the surplus weapons, citing a supposedly 970-page document that outlines the deal. The document was not included in the post.

While the letterhead is an exact copy of official defense ministry documents, the signature of Defense Minister Oleksii Reznikov differs from his usual signature. In addition, the document states the readiness of the ministry to cooperate with “Deputy Control,” a defunct deputy association in the Ukrainian parliament that existed from 2014 to 2019; its Facebook page was last active in January 2018. Further, the document features Reznikov’s initials written in Russian rather than Ukrainian. The document displays the initials “А.Ю.,” which is correct in Russian, but in Ukrainian the initials should read “О.Ю.” This suggests a Russian speaker forged the letter. 

The document was posted as part of a composite image alongside two other pictures – one of an Angolan soldier in 1988 and the other of members of the Movement for Unity and Jihad in West Africa (MUJWA). The Telegram channel Rezident posted the composite image with a caption that said, “While Ukrainian soldiers are dying due to the absence of weaponry, clerks from the Ministry of Defense are selling it under the premise of redundancy.” The channel called the alleged sale a “cunning scheme of enrichment.”

Rezident’s post was amplified by other Kremlintied Ukrainian Telegram channels, including ZeRada and Legitimniy. Russian Telegram channels also amplified the claim. The narrative spread to several pro-Kremlin VKontakte pages and multiple Twitter accounts. In addition, Russian media reported on the purported sale of Ukrainian weapons.

The day after the post, Rezident cited “rumors” to claim that Ukrainian President Volodymyr Zelenskyy was infuriated by the weapons sales.

Roman Osadchuk, Research Associate

Putin declares victory in Mariupol despite inability to capture steelworks

On April 21, Russian Defense Minister Sergei Shoigu briefed President Vladimir Putin on the situation in Ukraine. Shoigu reported that Russian troops had taken control of Mariupol, save for the territory of the Azovstal steelworks, where Russian armed forces have besieged more than 2,000 members of the Azov battalion. According to the Telegraph, “The Azovstal factory has been described as a ‘city under a city’ because of its vast network of underground shelters and tunnels.” 

Putin congratulated Shoigu for successfully liberating Mariupol and placing it under Russian control. He ordered Shoigu to stop the assault on the Azovstal steel plant and instructed him to block the Azovstal industrial zone “so that even a fly cannot pass through.”  

Shoigu did not mention that Ukrainian civilians are also hiding within the Azovstal compound. On April 19, Eduard Basurin, spokesman for the self-proclaimed Donetsk People’s Republic militia, claimed that Ukraine was lying about the presence of civilians within the Azovstal factory grounds. However Ukrainian Deputy Prime Minister Iryna Vereshchuk said on April 21 that up to 1,000 civilians were in hiding at the factory. 

In response to Russia claiming control of Mariupol, US State Department Spokesman Ned Price said, “Ukrainian forces still hold ground in Mariupol, and Russian President Vladimir Putin’s claim to have liberated the city is disinformation.”

BBC Russia suggested three possible explanations for why Putin commanded Shoigu not to storm the Azovstal plant. First, Azovstal is a heavily fortified area, meaning the assault could last weeks, with potential losses for the Russian forces and no guaranteed victory. Second, Putin may want to achieve at least a partial victory by Victory Day celebrations on May 9 marking Russia’s victory over Nazi forces in 1945; he could be planning to announce the success of the “military operation” in Ukraine that day. Third, Azovstal is one of the largest metallurgical plants in Europe, so Russia may want to capture the plant for future use without inflicting too much damage.

Givi Gigitashvili, Research Associate, Warsaw, Poland

Russia’s flight regulator recommends airlines prepare for flying without GPS

Rosaviatsiya, Russia’s Federal Air Transport Agency, recommended that airlines prepare for flights that will not be dependent on the Global Positioning System (GPS), the US government global navigation service. The pro-Kremlin outlet iz.ru claimed that the recommendations is connected with the system’s possible shutdown in Russia, as well as the threat of GPS jamming and spoofing when flying in Russia’s Kaliningrad region, over the Black Sea, east of Finland, and over the Mediterranean.

According to iz.ru, the European aviation regulator had previously warned about possible navigation system failures, which could lead an aircraft to deviate from routes and no longer perform safe landing procedures. Rosaviatsiya advised Russian pilots to “immediately inform air traffic controllers of glitches, degradation and abnormal performance of GPS.” The airlines were recommended to prepare their summer flights for these contingencies.

Earlier, Russian outlets reported that the United States might consider disconnecting Russia from the GPS navigation system as part of its sanctions targeting Russia. On March 19, Dmitry Rogozin, head of Russian space corporation Roscosmos, stated that such a possibility existed, but it would be technically very difficult “since the GPS orbital constellation cannot be selectively switched off in the direction of Russia.” Rogozin noted that Russia’s GLONASS navigation system would still ensure the global accuracy of airline navigation.

At the time of writing, the Kremlin had not commented on Rosaviatsiya’s recommendation to abandon GPS.

Eto Buziashvili, Research Associate, Washington, DC

The post Russian War Report: Forged document claims Ukraine is selling surplus weapons to African countries appeared first on Atlantic Council.

]]>
Russian War Report: Google refutes misleading claims about blurring Russian military assets https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-google-refutes-misleading-claims-about-blurring-russian-military-assets/ Wed, 20 Apr 2022 19:39:05 +0000 https://www.atlanticcouncil.org/?p=515171 Thousands of posts online claim Google Maps unblurred satellite images of Russian military installations. Meanwhile, Russia hesitates to ban YouTube and a troll campaign distracts from Bucha.

The post Russian War Report: Google refutes misleading claims about blurring Russian military assets appeared first on Atlantic Council.

]]>
Media policy

Confusion over misleading claims that Google Maps changed its Russian satellite imagery policy

Russian censors hesitate to ban YouTube

New Russian commission latest indicator country might eventually disconnect from global internet

Tracking narratives

Troll campaign targeted Polish public figures to distract from Bucha massacre coverage

Confusion over misleading claims that Google Maps changed its Russian satellite imagery policy

On April 18, thousands of posts appeared across Twitter claiming that Google Maps had supposedly unblurred satellite images of Russian military installations. These reports caused a wave of excitement among curious internet users, as searches for “google maps Russian military bases” increased significantly

Google Maps quickly released a statement denying that it had made any recent changes to its satellite imagery of Russia. According to the statement, unblurred versions of the imagery were already available on Google Maps, while independent researchers noted they had been able to access these kinds of images for years. 

Although the original source of the Google Maps rumor is still unclear, the earliest mention identified so far is by defence-ua.com on April 17, the day before it spread heavily across Twitter. The article, “Find Putin’s Bunker: Google has opened high-quality satellite images of all strategic points in Russia,” included multiple satellite images of Russian bases and equipment. For example, one photo showed recent imagery of the Russian naval carrier Admiral Kuznetsov in Murmansk, Russia. Using Google Earth, however, the DFRLab found high-resolution Google imagery of the ship dating back to 2019 that was also unblurred.

Screenshot of recent Google imagery of the Admiral Kuznetsov, which defence-ua.com claimed had only become available in high resolution recently. (Source: defence-ua.com)
Screenshot of recent Google imagery of the Admiral Kuznetsov, which defence-ua.com claimed had only become available in high resolution recently. (Source: defence-ua.com)
Screenshot of July 2019 imagery of the Admiral Kuznetsov, undergoing refitting at the same location in Murmansk. The image shows no signs of blurring. (Source: Google Earth)
Screenshot of July 2019 imagery of the Admiral Kuznetsov, undergoing refitting at the same location in Murmansk. The image shows no signs of blurring. (Source: Google Earth)

Some coverage pointed to an April 18 tweet by @ArmedForcesUkr as the source, but text and images from this tweet matched the defence-ua.com article from the previous day, suggesting the Twitter account relied on the article as its source. Twitter suspended @ArmedForcesUkr sometime on April 19, although the reason is currently unknown. While previously cited by Ukrainian government officials, it was not a verified government account.

Screenshot of the ArmedForcesUkr tweet with text translated. (Source: @ArmedForcesUkr/archive)
Screenshot of the @ArmedForcesUkr tweet with text translated. (Source: @ArmedForcesUkr/archive)

At the time publishing, it is unknown whether the original article was a misunderstanding or intentional disinformation. The incident has already been used by Russian outlets to bolster their claims that Ukrainian information sources cannot be trusted. 

—Ingrid Dickinson, Young Global Professional, Washington DC

Russian censors hesitate to ban YouTube

The Russian government’s unwillingness to ban access to YouTube—after two months of escalating threats and intimidation—is revealing the practical limits of the Kremlin’s censorship regime. It also demonstrates the inadequacy of video-hosting alternatives offered by Russia’s domestic technology sector.

YouTube had approximately 91 million Russian users in 2021, making it the most popular public-facing internet platform in the country. For more than a decade, YouTube has essentially monopolized video hosting in the country. Rutube—Gazprom’s competing video service that was launched contemporaneously with YouTube in the mid-2000s—had just 3 million users in 2021. VK Video, made available to VKontakte users in late 2021 and marketed as a YouTube competitor, does not appear to have significantly threatened YouTube’s market share.

The scale and durability of YouTube’s popularity appears to have given pause to Russian censors. In recent weeks, Roskomnadzor has accused Youtube (and its owner Google) of being a “tool of anti-Russian information warfare,” issued numerous demands for the reinstatement of government YouTube channels, banned the advertising of Google products, and even ordered Yandex and other domestic Russian search engines to append a warning label to YouTube links. Russian courts have threatened YouTube with fines, while Russian legislators have proposed an official ban. Yet in practice, nearly a month after Russia officially blocked Facebook and Instagram, YouTube remains as accessible as it was before the war began.

At the same time, the Russian government has undertaken a largely anemic public relations campaign to push Russian users toward domestic video alternatives. According to reporting by Kevin Rothkrock, VKontakte has begun advertising a tool to automate video migration from YouTube to VK Video, while Rutube has reformed its cumbersome content moderation requirements that previously required manual review of every uploaded video, as creators can now bypass this requirement by uploading a copy of their passports. At least one Russian YouTuber claims that bots have begun spamming his YouTube comments section with links to Rutube.

Although the user base of Russian video services appears to be growing – the Rutube app saw 1.1 million new downloads in March 2022 – these Russian alternatives remain dwarfed by YouTube. Should the Russian government institute a formal YouTube ban, it will mark an unprecedented and deeply unpopular disruption of the Russian internet.

Emerson T. Brooking, Resident Senior Fellow, Washington DC

New Russian commission latest indicator country might eventually disconnect from global internet

Last week, Russian President Vladimir Putin signed a decree to create an interagency commission of the Security Council of the Russian Federation that will work on issues related to the country’s technological sovereignty and critical information infrastructure. 

According to TASS, the commission will ensure the “technological independence of critical information infrastructure objects from foreign technologies in the field of creation and production of domestic products.” It will be led by Dmitry Medvedev, the former president and prime minister currently serving as deputy chairman of Russia’s security council. The Kremlin-owned outlet RIA, meanwhile, explained that critical information infrastructure includes “information systems of government agencies, enterprises of the military-industrial complex, healthcare organizations, transport, communications, credit and financial sector, energy, fuel, nuclear, rocket and space, mining, metallurgical and chemical industries.”

In February of 2021, Medvedev stated that Russia was “legislatively and technologically ready to disconnect from the global internet,” though later added that there were “no signs yet that this could happen.”

The newly created commission consists of up to thirty members, including Russia’s ministers of defense, foreign affairs, and emergency situations, as well as directors of the Foreign Intelligence Service (SVR) and the Federal Security Service (FSB); general directors of space agency Roscosmos; state nuclear energy corporation Rosatom; and state corporation for developing and manufacturing advanced technology Rostec.

Eto Buziashvili, Research Associate, Washington, DC

Troll campaign targeted Polish public figures to distract from Bucha massacre coverage

As the killing of Ukrainian civilians in Bucha dominated headlines in early April, a “large-scale troll attack” took place in Poland. According to EUvsDisinfo, the campaign was an attempt to divert public attention from the massacre. In an April 12 report on the incident, EUvsDisinfo described three main components of the attack. First, it sent threatening emails Polish public figures; this was followed by a second wave emails to Polish media alleging Ukraine had committed war crimes. Finally, the campaign attempted to make the 1943 Volyn massacre trend on Twitter.  

EUvsDisinfo reported that an account sent emails containing death threats to hundreds of Polish public figures. Several politicians, including Radosław Sikorski, Dariusz Matecki, Maciej Lasek, and others, published screenshots revealing they all received identical messages. The emails were hostile and violent, threatening death with an air gun, ax, or immolation. The screenshots showed that an account named “Marcin Mikołajczak” sent the emails; it is unclear whether this name is a pseudonym.

Soon afterwards on April 5, Polish media figures were flooded with emails purported to be sent by ordinary Russians who wanted to report crimes committed by Ukraine. The messages, written in English and Polish, claimed that the Ukrainian army was committing war crimes. At least one of the emails contained a link to a graphic video published on Telegram claiming to show Russian soldiers who were tortured and killed by Ukrainian forces. A screenshot of the spam emails published by digital policy analyst and PhD candidate Katarzyna Chojecka revealed that repeated emails were received within intervals of only a few minutes.

The third component of the troll attack was an attempt to make the 1943 Volyn massacre trend on Twitter. EUvsDisinfo said that the topic trended on Polish Twitter on April 4 and 5, while the Polish fact-checking organization Konkret 24 reported via Getdaytrends.com that Volyn trended on April 10 and “rzeź wołyńska” (“Volyn massacre”) last trended in July 2019.  

The DFRLab used social media analysis tool Meltwater Explore to analyze mentions of “Wołyń” (Volyn in English) and “rzeź wołyńska” (Volyn massacre). We found that these keywords were mentioned around 1,300 times on Twitter on April 4 and 1,166 times on April 5, more than doubling from April 3. Subsequent spikes took place on April 10 and 13.

Mentions of “Wołyń” (Volyn in English) and “rzeź wołyńska” (Volyn massacre) on Twitter from March 22, 2022, to April 20, 2022. (Source: Meltwater Explore)
Mentions of “Wołyń” (Volyn in English) and “rzeź wołyńska” (Volyn massacre) on Twitter from March 22, 2022, to April 20, 2022. (Source: Meltwater Explore)

Givi Gigitashvili, Research Associate, Warsaw, Poland

The post Russian War Report: Google refutes misleading claims about blurring Russian military assets appeared first on Atlantic Council.

]]>
China’s discourse power operations in the Global South https://www.atlanticcouncil.org/in-depth-research-reports/report/chinas-discourse-power-operations-in-the-global-south/ Wed, 20 Apr 2022 13:00:00 +0000 https://www.atlanticcouncil.org/?p=513726 An overview of China’s discourse power activities in the Global South, including the regions of Sub-Saharan Africa, Latin America, and the Middle East. It outlines the processes through which China leverages its diplomatic, media, and political positions in these regions to gain influence, and assesses the impacts of these activities for democratic resilience worldwide.

The post China’s discourse power operations in the Global South appeared first on Atlantic Council.

]]>
An overview of Chinese activities in Sub-Saharan Africa, Latin America, and the Middle East

As China’s military and economic power has grown, so too has its investment in propaganda and influence operations. Following Xi Jinping’s rise to power and China’s adoption of a more confrontational foreign policy, the country saw a need to sway global public opinion in its favor. Beijing refers to this as “discourse power,” a strategy to increase China’s standing on the world stage by promoting pro-China narratives while criticizing geopolitical rivals. The end goal is to shape a world that is more amenable to China’s expressions, and expansion, of power.

China sees the Global South as an important vector for enhancing discourse power and has deployed a number of tactics to disseminate Chinese Communist Party (CCP)-approved narratives there. Two pillars of its strategy include “using international friends for international propaganda” (通过国际友人开展国际传播) and “borrowing a boat out to sea (借船出海).” The first pillar relies on co-opting the voices of foreigners (and foreign leaders) to spread pro-China messaging. The second pillar relies on using international platforms to spread Chinese propaganda in target environments. This includes expanding China’s media footprint, conducting propaganda campaigns, and leveraging Beijing’s influence to gain government support for its initiatives in international forums like the United Nations. 

The logic behind this strategy is that, as China has begun to take a more active role in global affairs, Beijing has seen the need to address the potential for collective mobilization in response to its behavior. China understands that countries like the United States and the United Kingdom are assessing its expansionism and have already moved to counter its influence. By gaining control of the narrative to depict its expanding role in the world as legitimate, rules-based, and win-win, China is seeking to shift the burden of proof onto Western countries and silence potential critics. Xi outlined this strategy in a May 2021 speech to the Central Committee, emphasizing that China must “expand [its] international communication through international friends,” adding that these “foreign friends” will be the country’s “top soldiers of propaganda against the enemy” as China rises.

To this end, one focus of China’s global discourse power push has been to foster buy-in from leaders in the Global South for Chinese-defined norms. This includes its principles of “non-interference” in other countries’ internal affairs and on a concept of “human rights” that actively subordinates personal and civic freedoms in favor of state-centered economic development. It is meant to stand in opposition to a Western human rights framework that China criticizes as having been used for interventionist ends, for example, in Afghanistan and Iraq.

Beijing also sees control over the media environment as critical for enhancing its discourse power so that it can spread a positive “China story” (讲好中国故事). In doing so, it is better able to promote its image as a responsible power and gain support for China’s model of international relations—one that privileges state sovereignty over universal human rights, government control over public discourse, and authoritarianism over democracy. As Chinese scholars Mi Guanghong and Mi Yang put it, “strengthening the dissemination, influence and creativity of external propaganda is [in the fundamental interests of] the country, with profound practical significance.”

China’s discourse power strategy also involves creating multilateral regional organizations to advance its interests. This includes the Forum on China-Africa Cooperation (FOCAC) in Africa, the Forum of China and the Community of Latin American and Caribbean States (China-CELAC Forum) in Latin America, and the China-Arab States Cooperation Forum (CASCF) in the Middle East. China leverages its position in these forums to gain support for its international initiatives, to deepen its economic and political engagement, and to promote state narratives. For example, one concept central to China’s discourse power strategy is its vision to build a “community with a shared future”—language Chinese officials and diplomats often use in Belt and Road Initiative (BRI)-connected engagements with foreign counterparts to signify China’s pursuit of a multilateral approach to international relations as an alternative to the “unilateral” approach taken by the United States. This strategy is what Chinese scholars call the “subcutaneous injection” theory of communications—winning international “friends” who understand their own local contexts and are able to “tell China’s story” to allow for a more “immediate and quick” dissemination of Chinese discourse priorities in the region.

The regions addressed in this report—Sub-Saharan Africa, Latin America, and the Middle East—are located in the Global South, which is at the forefront of China’s discourse power push. This is for a number of reasons: China sees waning US involvement in these regions as an opportunity for it to win “international friends” as great-power competition increases; emerging economies offer fruitful opportunities to expand the scope and depth of the BRI, a massive predominantly infrastructure initiative; and Beijing wants to convince others of its “peaceful rise” in order to assuage growing concerns over its increasingly visible global presence. 

Yet these areas of the world have received less attention in public policy and research spaces than Chinese propaganda efforts in Western countries. In the meantime, the impacts of Chinese discourse power operations in these regions are affecting democratic norms and behaviors by constraining the space for organic civil society discourse and by further entrenching existing autocratic regimes. This report aims to shed light on China’s activities in these regions and to offer an initial assessment of the impacts of its efforts.

The first section of this report will provide an overview of Chinese discourse power operations, including its origins and aims. The second section is comprised of three regional subsections that focus on Sub-Saharan Africa, Latin America, and the Middle East, respectively. Each subsection includes a broad overview of how the region fits into China’s global discourse power strategy and features an associated country case study. The case studies highlight recent Chinese influence campaigns and their effects on domestic political, social, and media environments.

The third and final section of this report synthesizes trends and themes, offering a preliminary assessment of their potential implications and impact.

The post China’s discourse power operations in the Global South appeared first on Atlantic Council.

]]>
Russian War Report: Russia promotes misleading video accusing Ukraine of using mannequins as casualties https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russia-promotes-misleading-video-accusing-ukraine-of-using-mannequins-as-casualties/ Wed, 13 Apr 2022 15:45:23 +0000 https://www.atlanticcouncil.org/?p=512164 Kremlin-controlled TV network Rossiya 24 broadcast a misleading video claiming that mannequins were being used in Ukraine to stage war casualties.

The post Russian War Report: Russia promotes misleading video accusing Ukraine of using mannequins as casualties appeared first on Atlantic Council.

]]>
Tracking narratives

Rossiya 24 broadcasts misleading video accusing Ukraine of using mannequins to stage war casualties

Falsified BBC News video spreads in Pro-Kremlin Telegram channels

Security

Situation intensifies in Mariupol

Media policy

Russian MP suggests 10-year YouTube ban

Kremlin accuses Google of displaying phrase “dead Russians” in translation results

Facing widespread social media restrictions, Kremlin creates new Telegram channel

Rossiya 24 broadcasts misleading video accusing Ukraine of using mannequins to stage war casualties

On April 7, Kremlin-controlled TV channel Rossiya 24 broadcast a video that it claimed was evidence of the Ukrainian military using mannequins to stage war casualties. However, the video was taken in Russia on a set of a TV series. 

In the video, two men, one in a camouflage outfit resembling a military uniform and one in a green jacket, wrap a mannequin in tape. When Rossiya 24 aired the video, the anchor said it had been staged by Ukraine. “This is how preparations are going for the theater, in the truest sense of the word, military operation in Ukraine,” the anchor explained. “It seems everything is quite straightforward, two people in military uniform carefully wrap the mannequin with tape and, obviously, are going to pass it off as a corpse. However, this is not surprising, dozens of fakes with similar mannequins regularly appear in Ukrainian Telegram channels.” 

The Rossiya 24 segment, “Crimes in Ukraine are disguised as ‘atrocities’ of the Russian army,” was reportedly also available on the streaming platform of the state-owned All-Russia State Television and Radio Broadcasting Company. The video disappeared from the platform on April 8. 

The segment includes a watermark for the Russian pro-Kremlin Telegram channel U_G_M, which posted the video on April 6 with the caption, “This is how armed forces of Ukraine prepare their staged videos… these toys will be scattered along the streets of Kyiv or Nikolaev.” In the video, a man can be heard saying, “The dude will fly from the window, poor fellow.” Before Rossiya 24 aired the video, it was reposted in at least two other Telegram channels.

The day that Rossiya 24 aired the footage, it was revealed that the video was not filmed in Ukraine, but came from a TV series filmed in Vsevolozhsk, Russia, near Saint Petersburg. On April 7, Nadezhda Kolobaeva, the assistant director of the series, wrote on Facebook that the video aired by Rossiya 24 was recorded on March 20 as the TV crew prepped mannequins to fall from a window. Kolobaeva also posted behind-the-scenes photos and a video from the film set, referring to the dummy as “the most famous mannequin in the Russian Federation.” 

Video from assistant director Nadezhda Kolobaeva showing a mannequin being dropped from a building while filming a TV series. (Source: Facebook)

On April 8, Russian journalist Roman Super said that he contacted Rossiya 24 requesting details about their report. He received a response stating that the channel director and editorial team did not “know that this was not Ukraine” and the video was “brought” to them. At the time of writing, Rossiya 24 had not publicly acknowledged the error.

Givi Gigitashvili, Research Associate, Warsaw, Poland

Falsified BBC News video spreads in Pro-Kremlin Telegram channels

A graphic video purporting to be a BBC News report is being shared on proKremlin Telegram channels. The BBC confirmed the video is fake. “We are aware of a fake video with BBC News branding suggesting Ukraine was responsible for last week’s missile attack on Kramatorsk train station,” the BBC News Press Team tweeted. “The BBC is taking action to have the video removed.” 

The video in question falsely asserts that a missile’s serial number proves Ukraine shelled the Kramatorsk train station on April 8. The video claims that the “serial number of the Tochka-U missile” is identical to those used by the 13th Missile Brigade of the Ukrainian Armed Forces. Ukrainian fact-checking organization StopFake debunked this narrative on April 10. 

The video claims that Ukrainian forces used missiles with the same serial number in Khartsyzsk, Berdyansk, Melitopol, and Logvynovo. It also falsely states that when the missile’s serial number was publicized on social media, Ukrainian media stopped reporting on the topic. The video cites “military experts” to claim that Ukraine “uses fake news to promote its position.” 

The video includes an animated BBC logo, as well as a prompt at the end of the clip to download the BBC News app. It also features a number of oddities. For example, there are English spelling and grammar errors, such as “Ukraine has often started using fake news.” The BBC logo is placed suspiciously low in the video frame. The video also includes footage from TG LA7, an Italian news channel that was cited in a previously debunked disinformation narrative.  

On Telegram, the DFRLab found at least thirty different channels sharing the video or screenshots of it. Kremlinconnected Telegram channels in Ukraine used the video to claim that the publication of the serial number forced Ukraine to stop discussing the matter. One channel urged a thorough investigation to take place to prevent such behavior from the Ukrainians. 

Other pro-Kremlin channels shared the video as evidence that the BBC had acknowledged Ukrainian soldiers were behind the shelling. Another channel claimed that Ukraine has become toxic to its international partners, and this type of “proof” is the reason why the shelling of Kramatorsk train station was not a major news story in the West, suggesting Western media intentionally curtailed coverage of the incident. The attack received significant coverage for multiple days in Western media outlets.

Roman Osadchuk, Research Associate

Situation intensifies in Mariupol

The situation in Mariupol continues to intensify as the Russian military increases pressure on the city’s remaining defenders. On April 12, a number of Ukrainian marines from the Rear Admiral Belinsky 36th Separate Brigade released a farewell video as they were running out of food and ammo. Reporting from Trukha News on the same day, however, suggested that several hundred marines, including the wounded, managed to break out of the enemy encirclement and connect with the Azov regiment in other parts of Mariupol.

Reporting of successful Ukrainian Marine 36th separate brigade break-out in Mariupol. (Source: @TryxaNews/Archive)

Pro-Kremlin social media accounts also disseminated videos of Ukrainian soldiers surrendering, claiming they depict Ukrainian forces captured in Mariupol. The number of POWs vary from 160 to more than a thousand in these reports. The actual number of POWs remains unknown, however, and Kremlin sources may be exaggerating statistics.

On April 11, meanwhile, the Kyiv Independent and other Ukrainian sources reported that Russia deployed a poisonous substance against Ukrainian soldiers in Mariupol, allegedly distributed by a drone. While the incident is under investigation, no footage or forensic evidence of a chemical attack has emerged. Ukrainian sources also noted that on the same day, RIA Novosti quoted DNR politician Eduard Basurin saying that Russia needed to turn to “the chemical troops” to “lure the moles” in Mariupol.

On April 12, Vladimir Putin called out claims of chemical weapons use as “fake.” That same day, US President Joe Biden said that US would have a “proportional response” if Russia were to use chemical weapons.

Lukas Andriukaitis, Associate Director, Brussels, Belgium

Russian MP suggests 10-year YouTube ban

According to the Kremlin-owned outlet RIA.ru, Russian State Duma member Alexey Chernyak plans to propose a draft law that would ban access to YouTube in Russia for ten years.

This comes after YouTube blocked the Russian parliament channel Duma TV for violating the video platform’s terms of service. Russian communications regulator Roskomnadzor requested YouTube restore access to the channel and explain why they blocked it. 

Chernyak stated that YouTube’s block of Duma TV can be regarded as “censorship and a provocative violation of rights and freedoms, as well as a monopoly on the promotion of information.” Chernyak alleged that outlawing YouTube in Russia would result in “multi-million-dollar damage” for the company. He added that Duma TV will continue to convey information to Russians on domestic platforms. 

Eto Buziashvili, Research Associate, Washington DC

Kremlin accuses Google of displaying phrase “dead Russians” in translation results

On April 11, Roskomnadzor accused Google of “a violation of an extremist nature,” demanding the organization take immediate measures to remove “threats against Russian users.” Russia’s communications regulator claimed that when internet users entered the phrase “dear Russians” into Google Translate, the service offered to replace it with a translation of the phrase “dead Russians” instead. 

According to Roskomnadzor, they “demanded that the American company take comprehensive measures to prevent such situations in relation to Russian users, as well as inform the agency about the reasons for such messages.” Both Reuters and the DFRLab attempted to replicate Roskomnadzor’s claims without success.

—Danielle Dougall, Young Global Professional, Washington DC

Facing widespread social media restrictions, Kremlin creates new Telegram channel

As social media platforms move to restrict access to Russian state-affiliated channels, the Kremlin has announced the creation of a new Telegram channel. The channel, Кремль. Новости (“Kremlin. News”), was created on April 4 but only became active on April 11.

Kremlin media outlets noted that the channel received a blue badge, signifying that Telegram had verified it. The channel primarily reposts information from the official Kremlin website. At the time of writing, the channel had 166,000 subscribers.

Eto Buziashvili, Research Associate, Washington DC

The post Russian War Report: Russia promotes misleading video accusing Ukraine of using mannequins as casualties appeared first on Atlantic Council.

]]>
Russian War Report: Kremlin claims Bucha massacre was staged by Ukraine https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-kremlin-claims-bucha-massacre-was-staged-by-ukraine/ Mon, 04 Apr 2022 18:50:02 +0000 https://www.atlanticcouncil.org/?p=508894 Civilians have been found dead, many with their hands bound and simply left on the street, in Bucha. Despite the evidence, the Kremlin is trying to cover it up through disinformation and confusion.

The post Russian War Report: Kremlin claims Bucha massacre was staged by Ukraine appeared first on Atlantic Council.

]]>
As Russia expands its assault on Ukraine, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is keeping a close eye on Russia’s movements across the military, cyber, and information domains. With more than five years of experience monitoring the situation in Ukraine, as well as Russia’s use of propaganda and disinformation to undermine the US, NATO, and the European Union, DFRLab’s global team presents the latest installment of the Russian War Report.

Tracking narratives

Kremlin claims Bucha massacre was staged by Ukraine

Pro-Kremlin accounts denying Bucha ‘massacre’ dominate VKontakte conversations

Kremlin attempts to reboot pro-war symbols online and offline

Russian soldiers allegedly sent stolen goods from Ukraine to Russia

Security

Russian troops abandon Hostomel Airport, leaving destruction behind

Signs of Russian forces preparing to re-deploy from Belarus

Cyber warfare

Roskomnadzor warns of spearphishing attacks using agency’s identity

Kremlin claims Bucha massacre was staged by Ukraine

Over the weekend of April 2, journalists and Ukrainian authorities reported on dozens of dead civilians found in Bucha, northwest of Kyiv, after Russian troops left the area. Images captured by multiple sources documented how some of the dead had their hands tied. Ukrainian President Volodymyr Zelenskyy accused Russia of committing genocide in Ukraine, while Charles Michel, president of the European Council, used the hashtag #BuchaMassacre when he announced the EU was preparing further sanctions against Russia. 

Despite the overwhelming evidence of mass civilian casualties in Bucha, the Kremlin is trying to cover up the killings through false claims and distortion. On April 3, Russia’s Ministry of Defense shared a post from the pro-Kremlin War on Fakes Telegram channel that called the massacre a “coordinated media campaign.” The post claimed that Russian forces left Bucha on March 30, and footage of the dead only appeared four days later as a result of shelling by Ukraine. The Telegram post also included a graphic video that it claimed was proof that bodies had been placed in the streets to generate public outrage, and that some of the bodies were actually actors pretending to be dead. 

A few hours later, the Ministry of Defense posted an official statement claiming that “not a single local resident has suffered from any violent action” during the Russian occupation of the city. It reiterated the narrative that footage of dead civilians only emerged four days after Russian troops left the city, and asserted that locals had been allowed to leave beforehand. The statement also claimed that the bodies did not show any signs of stiffening or decomposition. It concluded that the scenes in Bucha had been staged by “the Ukrainian regime” for Western media, and that Ukraine had done the same in Mariupol and other cities. 

The Twitter account for the Russian Ministry of Foreign Affairs disseminated a summary of the Defense Ministry statement and called that the Bucha massacre “another hoax by the Kyiv regime for the Western media.” Foreign Ministry spokeswoman Maria Zakharova claimed that Ukraine staged the massacre to scuttle peace negotiations and escalate the conflict. Russia then demanded a meeting of the UN Security Council to be convened on April 4 to discuss the events in Bucha. 

Notably, Kremlin media’s own reporting undermines the narrative that Russian troops had departed Bucha four days before the bodies were documented. On April 1, Zvezda TV reported that Russian Marines were still conducting “clean-up” operations in Bucha and other cities to regain a foothold in the region. That same day, the Kyiv Oblast administration still included Bucha in its list of the most dangerous areas due to Russian forces retreating from there. These reports seemed to align with a Kyiv military administration statement the previous day, which reported that Bucha was still under the control of Russian armed forces. All of this suggests that Russia’s claims of having evacuated the city on March 30 are false.

Additionally, April 3 was not the first day that reports of civilian deaths surfaced, as the Kremlin suggested. On April 1, graphic footage from Bucha appeared on the Irpin Bucha Gostomel Telegram channel (“Ирпень | Буча | Гостомель”) in which a car is seen driving around corpses on the same street featured in the War on Fakes Telegram channel video. One of the corpses seen in the April 1 video matches a body in the April 3 War on Fakes video, despite the fact that the Telegram channel claimed the body in question was moving. On April 2, AFP reported that bodies of at least 20 men in civilian clothes had been found on a single street in Bucha. The Ukrainian fact-checking outlet StopFake also cited a graphic YouTube video filmed on April 2 by Ukrainian journalist Dmitry Komarov documenting civilian deaths in the city. 

As for the War on Fakes Telegram post showing footage it claimed proved the bodies were actually actors, Russian independent outlet Mediazona analyzed the video and concluded that the “movement of a corpse’s hand” alleged in the original post was actually a visual distortion caused by a drop of water or a scratch on the windshield of the car from where video was filmed. Mediazona also debunked the War on Fakes Telegram claim that one of the alleged corpses was attempting to stand up, concluding that the “movement” seen in the footage was due to distortion from capturing the footage through the car’s rear-view mirror.

Givi Gigitashvili, Research Associate, Warsaw, Poland

Pro-Kremlin accounts denying Bucha massacre dominate VKontakte conversations

Pro-Kremlin accounts dominated conversations about the Bucha massacre on the Russian social media platform VKontakte (VK), denying and deflecting any Russian responsibility. Ekaterina Gubareva, a former politician in the self-proclaimed Donetsk People’s Republic and the wife of Donetsk separatist leader Pavel Gubarev, wrote on VK that the Russian soldiers in Bucha treated the local population “with love.” The post received more than 25,000 views. Reuters reported that civilians in Bucha were told by the Russian forces to use white armbands to identify themselves. However, Russian soldiers have also previously worn white armbands. Ukrainian military sources have reported that the Russians are deliberately marking civilians with white armbands to confuse Ukrainian forces. Gubareva suggested that any dead civilians wearing white armbands were killed by the Ukrainian military, who she claimed shot at civilians while liberating the city.

In addition, Denis Tukmakov, a pro-Kremlin columnist, and Igor Levitas, an author at the pro-Kremlin EADaily, stated that the Bucha killings were staged. Tumakov claimed that the bodies were not stiff and that Russian commanders would not leave the bodies behind. In his post, Tumakov listed atrocities that the West has accused Russia of committing and concluded that there would be no more peace talks. “So Russia has no other option but to win,” he wrote. “Otherwise, we will not just lose – we will be turned into Hitler.”

Other VK posts that received less attention expressed shock, but did not condemn Russia. For example, Nikolay Rybakov, a member of the liberal Russian party Yabloko, wrote, “I am shocked by the horrifying photographs of murdered civilians from the city of Bucha, Kiev region.” Similarly, a pro-Alexei Navalny user, Vadim Orlov, posted an image with a crying statue and wrote: “Bucha. F*cked up. I saw it.” 

In contrast, Russian writer Dmitry Glukhovsky re-posted Ukrainian President Volodymyr Zelenskyy’s speech addressing Russians and condemning the Russian military’s atrocities in the Kyiv suburbs. The post received more than 22,000 views.

Nika Aleksejeva, Lead Researcher, Riga, Latvia 

Kremlin attempts to reboot pro-war symbols online and offline

On March 30, Kremlin-owned outlet RT reported on the popularization of pro-war symbols in Russia. According to RT, Russian entrepreneurs became interested in branding their products with the letters V and Z, which are now considered “patriotic symbols” in the country.  The letter Z has become almost ubiquitous among Kremlin media, officials, and supporters rallying support for the war in Ukraine, as well as a tool for spreading propaganda. 

RT reported that since the start of Russia’s “special operation” in Ukraine, the Russian patent and trademark office has received “dozens of applications for the registration of various trademarks using the symbols V and Z.” Russian entrepreneurs are rushing to register their right to use pro-war symbols exclusively on various products, ostensibly because trademark pirates might want to hijack the symbols.

RT also reported on requests to register pro-war hashtags, including #своихнебросаем (“we don’t leave ours [behind]”), #мненестыдно (“I am not ashamed”), and #ярусский (“I am Russian”). The combination of the letter Z and the “I am not ashamed” hashtag has already appeared on t-shirts of pro-war campaigners. 

The DFRLab previously reported on the failed attempts to popularize the “I am not ashamed” hashtag on Twitter and Facebook. Examination of #МнеНеСтыдно showed that engagement with the hashtag on social media was minor and decreased dramatically in the period of February 26 to March 2. 

Further analysis of the hashtag over the last month shows that engagement remains very low. Russia’s attempts to block Western social networks might explain some of the limited engagement. However, a recent report analyzing blocked social media outlets published by the pro-Kremlin online outlet RBC.ru showed that millions of Russians are still using Facebook, Instagram, and Twitter, likely through the use of VPNs.

Eto Buziashvili, Research Associate, Washington DC

Russian soldiers allegedly sent stolen goods from Ukraine to Russia

The Security Service of Ukraine published what it claimed were numerous intercepted phone calls between Russian soldiers and their relatives in Russia in which they boast about looting and theft. Evidence of Russian looting has previously emerged, such as when Ukrainian troops captured a Russian infantry fighting vehicle containing an assortment of items, including a toy car, frying pan, and Ukrainian coupons that had not been in use since the 1990s. Previously, the Main Directorate of Intelligence of the Ukrainian Ministry of Defense reported that Russian soldiers received instructions to establish self-sufficiency until further notice, essentially condoning looting to make up for Russia’s logistical problems.

The most substantial evidence of Russian looting emerged on April 3, when the Belarusian Telegram channel Belaruski Gayun published a three-hour-long CCTV video from the Mozyr branch of CDEK, a Russian delivery company. In the video, Russian troops with the 56th Guards Air Assault Brigade are seen mailing stolen goods to an unconfirmed location. The destination is likely Russia, however, as the receiver’s phone number and last name are briefly seen in the video. Among the stolen goods captured in the CCTV footage are a video card, an e-scooter, liquor, four air conditioners, car batteries, and dry rations from the Russian Army. Some of the goods were wrapped in packaging from the Ukrainian supermarket chain Epicentr.

Roman Osadchuk, Research Associate

Russian troops abandon Hostomel Airport, leaving destruction behind

On March 31, local and government reports first indicated that Russian troops were repositioning from the outskirts of Kyiv. As Ukrainian troops regained control of the area, footage emerged showing the extent of the damage at Hostomel Airport, which Russian troops maintained control of after an intense battle from February 24 to 26. 

On April 1, CNN released photos confirming the Russians’ departure from the airport.  Footage taken by Ukrainians on the ground show the airfield is clear of hostilities.

Comparison of Sentinel Hub imagery from January 2—prior to the Russian invasion—and March 23—showing the extent of the damage and scorched earth around the airport.  (Source: Sentinel Hub EO Browser)

On March 31, Babylon’13, a Ukrainian documentary group, released drone footage of the airport. The footage captured demolished buildings, discarded military vehicles, and numerous planes in ruins, including the An-225 Mriya, the world’s largest aircraft. The video showed no sign of Russian troops. 

By April 1, photos and videos began appearing on Telegram that appeared to be taken by Ukrainians on the ground in Hostomel. One post showed an image of the destroyed An-225 Mriya. 

A screenshot of a Telegram post showing the An-225 Mriya in its current state. (Source: @irpinonline)
A screenshot of a Telegram post showing the An-225 Mriya in its current state. (Source: @irpinonline)

Another video posted on Twitter showed multiple destroyed Russian BMDs located in the airport parking lot, which the DFRLab geolocated to Avtodorozhnia Street, along the edge of the airfield. 

Although more images and videos continue to emerge from around Hostomel, it is still unclear if the Russian military is truly abandoning its war aims in the outskirts of Kyiv, or if this merely an attempt to regroup.

—Ingrid Dickinson, Young Global Professional, Washington DC

Signs of Russian forces preparing to re-deploy from Belarus

New footage surfaced on social media showing growing numbers of Russian troops in Gomel, Belarus. An increasing numbers of social media posts documented large Russian military formation movements in the city, likely moving towards the train station for re-deployment. Some videos show Russian VDV airborne troops rolling through Gomel, which the DFRLab geolocated to Bahdan Chmialnicki Street.

Russian troops rolling through the streets of Gomel, Belarus (top left and top center). The video in question was geolocated near Bahdan Chmialnicki Street, house 91 (top right and bottom).(Source: @YWNReporter/Archive; Google Maps)
Russian troops rolling through the streets of Gomel, Belarus (top left and top center). The video in question was geolocated near Bahdan Chmialnicki Street, house 91 (top right and bottom).(Source: @YWNReporter/Archive; Google Maps)

Additional videos that surfaced on April 4 show military equipment being loaded on trains. These videos were geolocated and verified to be in the southern railway station in Gomel. Other footage showed destroyed Russian equipment already on trains departing in an unknown direction.

Geolocation of Russian troops loading their vehicles onto trains in Gomel, Belarus. The video in question was geolocated to the south train station in Gomel.(Source: GoogleMaps, bottom, right; @MarQs__/Archive, left, center)
Geolocation of Russian troops loading their vehicles onto trains in Gomel, Belarus. The video in question was geolocated to the south train station in Gomel.(Source: GoogleMaps, bottom, right; @MarQs__/Archive, left, center)

These logistical movements are thought to be preparation for increased operations in the Donbas region. On April 4, the head of the Luhansk regional military administration said that Ukrainians are seeing that “Russian accumulation is very, very powerful in the vicinity.” According to the Pentagon, troops from Belarus are likely to be redeployed in the southern front as well. 

Lukas Andriukaitis, Associate Director, Brussels, Belgium

Roskomnadzor warns of spearphishing attacks using agency’s identity

On April 1, Russian censor Roskomnadzor issued an unusual alert about fraudulent emails sent under its name. It warned that such emails could be used for spearphishing attacks. Roskomnadzor did not mention a specific security incident that precipitated the press release, nor have any such incidents been reported in the Russian media. 

Roskomnadzor has risen to international prominence through its frequent condemnations of Western social media companies and increasingly aggressive censorship of Russian civil society. This higher profile has also made the agency a target. On March 10, Distributed Denial of Secrets, a “transparency collective,” released 360,000 hacked files from Roskomnadzor. These files, totaling 526.9 GB, provided significant insight into the agency’s technical and legal processes as well as its administrative structure. The source of the hack claimed to be associated with Anonymous. 

The compromise of Roskomnadzor’s internal data and emails, coupled with its unprecedented enforcement actions and public visibility, have created a perfect storm for spearphishing attacks co-opting the agency’s identity to target Russian individuals and media organizations.

Emerson T. Brooking, Resident Senior Fellow, Washington DC

The post Russian War Report: Kremlin claims Bucha massacre was staged by Ukraine appeared first on Atlantic Council.

]]>
The 5×5—Russia’s cyber statecraft https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-russias-cyber-statecraft/ Mon, 21 Mar 2022 13:17:52 +0000 https://www.atlanticcouncil.org/?p=500933 Five experts share their perspectives on what recent cyber developments related to Russia's war in Ukraine indicate about Russian cyber behavior.

The post The 5×5—Russia’s cyber statecraft appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

On February 25, just a day after Russia launched a massive invasion of Ukraine, the Russia-based Conti ransomware group publicly declared its allegiance to the Kremlin. The cybercriminal organization said in an online post that in response to any potential attack against Russia, the group would use “all possible resources to strike back at the critical infrastructures of an enemy.” Conti almost immediately revised the post to reflect a moderately softer stance, but the group had already tipped its hand to reveal what many experts have long speculated to be true—Russia-based cybercriminal organizations play an important role in the Kremlin’s cyber statecraft.

To better understand what this and other recent cyber developments related to the war in Ukraine indicate about Russian cyber behavior, we brought together five experts to share their perspectives.

#1 What role do non-state actors play in Russian cyber statecraft?

Scott Jaspersenior lecturer, Naval Postgraduate School in Monterey, California; Author of Russian Cyber Operations: Coding the Boundaries of Conflict:

The views presented are his and do not necessarily represent the views of the Department of Defense, the Department of the Navy or the Naval Postgraduate School.

“US Treasury Department sanctions on Evil Corp, a Russia-based cybercriminal organization, revealed that the group’s leader, Maksim Yakubets, worked for the Russian Federal Security Service (FSB), providing further evidence the government enlists cybercriminals. US officials feared ransomware groups could be contracted by the Russian government to interfere with the 2020 US presidential election, especially after seeing TrickBot operators note which infected computers belonged to election officials. The concern was significant enough for US Cyber Command to temporarily take down TrickBot’s command and control infrastructure.”

Rafal Rohozinskiprincipal, The Secdev Group:

“Cybercriminal groups have played an important proxy role for Russia’s projection of its cyber power. Apart from serving as a fertile recruitment ground for cyber talent, criminal groups are shielded from prosecution effectively granting them a license to conduct activities outside of Russia’s borders. Russian business and internal politics have a rich tradition of “black propaganda” and therefore information operations including disinformation and misinformation are a powerful and present element that has been exercised many times within Russia’s sphere of influence and abroad.”

Gabby Ronconetechnical analyst, Cyber Espionage team, Mandiant:

“Non-state actors continue to play pivotal roles in Russian cyber statecraft. Russia has:

1) coopted criminal groups to contribute to espionage collection, such as the criminal group Buhtrap which switched to almost exclusively cyber espionage operations after their tools were leaked in 2016;

2) adopted and/or modified criminal malware for use, such as the BlackEnergy malware originally developed by Cr4sh and then customized and used by Sandworm in the 2015 attacks on the Ukrainian power grid; and

3) sanctioned the cyber activities of Russian criminal actors against certain targets of interest to the Russian state, including groups like Conti, which we have recently learned through the Conti leaks cooperated with the FSB.

Russia extends a long leash to most cybercriminal actors if they refrain from targeting Russian organizations. The disruption and cost to Western organizations from these criminal operations serves Kremlin interests, even when not directed or endorsed by the state. Russian intelligence is afforded distance and plausible deniability from these cyber operations, thus using cyber criminals as proxy or mercenary actors. In addition, Russia can absorb and deploy existing cyber capabilities without expending significant additional resources to support them.”

Roman Y. Sannikovhead of cyberthreat intelligence, TRM Labs:

“It is pretty clear that Russian intelligence agencies have used at the very least, tools developed by cybercriminals to further their political agenda. But it is much more likely that they have actually used the services of the various Russian-speaking threat actors. In some cases, the threat actors knew who they were working for and why. In other cases, it appears that they may have been unwitting accomplices.”

Justin Sherman, fellow, Cyber Statecraft Initiative:

“Russia’s cyber power is not just about the military and security services proper, though the foreign intelligence service (SVR) and military intelligence agency (GRU) have demonstrated that they have sophisticated capabilities. The Kremlin’s cyber power also draws from the large, often opaque, quite complex network of proxies at its disposal, from cybercriminals to patriotic hackers to front companies. There is no single formula for understanding this entire web; for example, some cybercriminal organizations work closely with the Russian security services on a regular basis, while others are recruited by the FSB on an extremely ad hoc basis. The point is, if we are looking at the Kremlin’s cyber and information operations, we cannot just focus on people in the government.”

#2 How should the crossover between Russian state and cybercriminal operations influence US strategy toward Russia?

Jasper: “Headline ransomware attacks diminished after US President Joe Biden gave Russian President Vladimir Putin a list of off-limits critical infrastructure in Geneva in June, and the FSB even raided the REvil group in January 2022 at the request of US authorities. Now that severe sanctions have been levied against Russia for the invasion, there is no reason for Putin to further restrain Russian-based ransomware groups from attacking critical infrastructure in the United States. Putin may even employ them for retaliation or revenue generation.”

Rohozinski: “Prior to the invasion of Ukraine disentangling cybercriminal operations from deliberate state backed operations was complex owing to the challenge of attribution and the likelihood that this would result in deterrence or successful prosecution. At the present time, all cyberattacks originating from the Russia Federation—whether state-backed or criminal—should be treated as a hostile act.”

Roncone: “I think US Cyber Command’s recent strategy of disrupting cybercriminal operations through defending forward and persistent engagement has been quite interesting and has a solid use case against Russian criminal operations that may be state sanctioned or state sponsored. This strategy seems to have played out well during the focus on disrupting ransomware operations in the lead up to the 2018 and 2020 elections. Though it is hard to tell the exact effects of these Cyber Command operations, degrading and denying these operations and making it challenging for actors to successfully operate seemed to be somewhat impactful, despite the fact that the effects did not seem to last long. From the policy side of things, in my opinion, sanctioning the criminal actors operating these cyber operations has little effect. Though it may disincentivize individual Russian criminals from malicious cyber activity, I would argue it has little to no impact on the Russian state’s decision to use cybercriminal operators to further the state’s interest abroad. Most Russian cyber criminals remain in Russia, which de facto negates any effect from these sanctions.”

Sannikov: “For a time, US law enforcement was quite open in its collaboration with Russian law enforcement such as the FSB and MVD, as well as agencies of other post-Soviet countries. Eventually, the US agencies realized that they were helping Russian law enforcement, essentially, identify assets that could be flipped not so much to collaborate against other criminals, as is frequently done in the United States, but to go after political targets both inside and outside Russia. The Yahoo hack is a great example of that. While I believe that the United States will have to continue to work with Russia in some capacity in order to target criminal enterprises, right now, the effectiveness of that will largely depend on the outcome of the war in Ukraine and how that impacts Putin’s regime and inner circle. I still believe that the United States could have strong partners in Russia who are ultimately interested in fighting cybercrime, but it is going to be much harder to find them under the current regime in Russia.”

Sherman: “The US government must recognize that the Russian government sees the Internet in a fundamentally different way. The Kremlin also does not orient its entire doctrine and thinking around the term “cyber” as we do, and its distinctions between data (machine-readable 1s and 0s) and information (human-readable content) are not as firm as they are in the United States. US policymakers dealing with Russian state and cybercriminal operations—whether trying to help businesses defend against them, or trying to get Putin to curtail ransomware attacks launched from within Russia—must spend more time appreciating the nuances of the Russian government’s view on the Internet, its complicated and deliberately overlapping use of state and proxy hackers, and its other motivations to keep cybercrime a large and economically lucrative enterprise in Russia.”

#3 What role do Belarus-linked groups play in support of Russia’s cyber operations?

Jasper: “Ukraine believes a hacking group linked with Belarusian intelligence, working with or at the behest of Russia, defaced seventy central and regional authority websites with threatening messages and installed wiper malware in government agency computers around January 14, 2022. Since the invasion, this group known as UNC1151, is believed behind a spear-phishing campaign targeting European countries aiding Ukrainian refugees, using compromised Ukrainian military accounts.”

Rohozinski: “The term ‘Russian hacker’ is often thought of as referring to hackers from the Russian Federation. But in fact, it more appropriately reflects hackers who speak Russian and come from many countries and regions. In the past week, we have seen polarization within these groups between those supporting Russian actions in Ukraine, and those that are opposed. While Belarus possesses a significant technical community, including hackers, their loyalties, as of now, are unknown.”

Roncone: “We currently do not know if UNC1151 cooperates with or supports Russian cyber espionage efforts. Though Belarusian targeting and collection requirements are likely very similar to those of Russia, we lack visibility into whether UNC1151 is sponsored by, working with, trained and tasked by, or acting in some way as proxy for the Russian security services. That being said, Belarusian and Russian strategic goals in the security space increasingly aligned and the two states have close security cooperation beyond the Collective Security Treaty Organization (CSTO). 

There are two main factors that might influence enhanced cooperation in cyber operations between the countries: Russia’s explicit support of the Lukashenka regime since the 2020 Belarusian elections and the increasing amount of loans given to Belarus by Russia over the last year. These factors likely play into why we are seeing Belarus abdicate their once close-held territorial sovereignty to host Russian troops invading Ukraine. As Lukashenka has lost legitimacy as president of Belarus and been rejected from closer ties with Europe, he is gravitating toward much closer relations with Russia. Given the current situation, I would not be surprised to discover a developed or emerging relationship between Russian and Belarusian cyber operations in the future.”

Sannikov: “While Belarus has always had its share of talented cybercriminals (I am friends with a couple of them), there does not seem to be indication that they are nearly as apt to collaborate with the government either in Belarus or Russia as are Russian based cybercriminals. To date, I do not think actors based in Belarus have played a major pro-Russian or pro-Belarus role. They seem to be much more independent-minded.”

Sherman: “Since Putin launched an illegal war on Ukraine, it has become clear that the Lukashenko regime in Belarus is launching cyber and information operations on behalf of the Kremlin. There are also open questions, as Gavin Wilde and I explored, around Russian-Belarusian entanglement in cyberspace in general, including with respect to Russian and Belarusian internet surveillance systems and the extent to which Russian state hackers materially support or provide knowledge to Belarusian state hackers. The world must watch these kinds of Russian government cyber and information partnerships in the coming years.”

More from the Cyber Statecraft Initiative:

#4 Is there a particular example that typifies the “Russian” model of cyber operations?

Jasper: “The model is named information confrontation, which aims to influence the perceptions of the target audience by informational-technical and -psychological effects.  A particular example is the 2017 NotPetyamock ransomware upon Ukraine, attributed to a military unit in the Russian Main Intelligence Directorate. NotPetya spread through multiple propagation methods at lightning speed to damage critical infrastructure, including banks, automated teller machines and card payment systems in retailers and transport, and inflict pain upon the populace.”

Rohozinski: “Russian cyber power is far more diffuse than that of the United States. The capabilities come for a wide range of actors including criminal gangs, advertising agencies, and private individuals. In the United States, the Department of Defense and Cyber Command source talent from a range of defense contractors. In Russia, this talent pool is wider and more diverse. Russian cyber operations are also typically more entrepreneurial, where groups can align their activities to what they perceive to be cues from the political leadership and, in the case of ransomware, keep the proceeds of their operations. There also seems to be competition between different intelligence and defense agencies, often going after the same target. It is also difficult, sometimes, to ascertain what the ultimate objective of a cyber operation might be, apart from having conducted it. This suggests that impressing the leadership may be more important than achieving a tangible objective.”

Roncone: “In my opinion, there is no straightforward Russian model of cyber operations. I would instead delineate some of the models of cyber operations by each of the intelligence agencies sponsoring them; their varying mission mandates and cultural identities dictate these differences, though there may be overlaps in some cases. Turla, a cyber espionage group sponsored by the FSB (and my personal favorite group) looks very different than Sandworm or APT28, which are sponsored by the GRU, for example. Of course, criminal cyber operations sanctioned by or on behalf of the state look very different as well. I will say that one defining feature of Russian cyber operations is the psychological aspect to many of them—evident in many Sandworm operations in particular, such as their attacks on Georgia in October 2019, as Sandworm operations have contained a destructive element and thus are inherently meant to be seen. Even Turla, though, leaves small easter eggs for researchers during their operations, especially in their malware.”

Sannikov: “I think that there has been so much collaboration on so many different levels that it is hard to find one or two typical examples. As I already mentioned, the Yahoo hack was a good example of Russian law enforcement working with cybercriminals, essentially tasking them, to hack a private company, most likely in order to target domestic opponents who used Yahoo email accounts. But frequently, the collaboration is not clearly tasked. I have spoken with Russian cybercriminals who have mentioned that, if they come across a target that they think would be of interest to Russian intelligence, for example, access to a foreign military system, they will sell or trade that to Russian intelligence for remuneration, or in exchange for “cool tools” to use for their criminal activities.”

Sherman: “There are many instructive examples of Russian cyber operations, but analytically speaking, I generally do not think that we should pick one to be ‘the’ model case study. Even the framing of the question, concerning ‘cyber’ operations as opposed to ‘cyber and information’ operations, reflects somewhat of a Western perspective, where we make harder distinctions than Moscow between, say, hacking into a government system and spreading propaganda about that government. Of course, there is great value in studying individual Russian cyber operations for a number of reasons, including from historical, operational, and tactical perspectives. But from a strategic perspective, it is important to focus on the patterns and motivations that underpin Moscow’s actions here, such as with deniability and obscurity, and to recognize that a single operation cannot be considered a blueprint for everything else or everything to come.”

#5 Has the current war in Ukraine changed your perception of Russia’s cyber behavior? How?

Jasper: “No, on February 15, 2022, a distributed denial of service attack took down websites of the Ministry of Defense, Armed Forces of Ukraine, Ukrainian Radio, and online services of state-owned Oschadbank and PrivatBank, including automated teller machines. The White House claimed technical evidence was linked to Russian Main Intelligence Directorate infrastructure. The assault was meant to cause alarm before the invasion, a mark of information confrontation. Low-level phishing continues in favor of kinetic assaults in a classical form of siege warfare.”

Rohozinski: “What was been missing was any significant cyber component to the initial stages of the Russian invasion of Ukraine. Apart from two cases of destructive malware, the cyber ‘Pearl Harbor’ that everyone expected did not materialize. In part, this may have been a function of Ukraine being much better prepared in 2022 than it was in 2014. It also may signal the degree of acrimony and division within the Russian cyber community, between those supporting Putin’s objectives, and those opposed. It may also speak to the way the Russia’s military establishment views the utility of cyber operations. For the most part, cyber operations are the domain of intelligence. Cyber was certainly not synchronized with the movement of almost 200,000 Russian troops into Ukraine. Heavy metal, rather than bits and bytes, seem to be in the forefront of Russian general planning and leading the campaign. This may change in the days ahead. But for now, cyber is a whimper and not a bang.”

Roncone: “It has. The most impactful cyber operations we have seen from Russia so far have been mainly disruptive or destructive attacks. They seem to be using older, more primitive tactics, techniques, and procedures to achieve this (such as DDoS, defacements, basic wipers), and these attacks appear to have had somewhat limited effects. I think a lot of people, including myself, expected to see more novel techniques leveraged during this time to include a more coordinated strategy aligned with ongoing military and kinetic operations. It is interesting to see the contrast between the new Sandworm tool released by the UK National Cyber Security Centre, Cyclops Blink, which is supposedly Sandworm’s new version of VPNFilter, and the relatively rudimentary wiper operations conducted in this conflict so far. We have to keep in mind, though, that this war is in its early stages and thus perhaps we can guess these cyber operations may be in their early stages as well.”

Sannikov: “While I am a bit surprised at how little damage has been done by Russia’s offensive cyber-operations, overall, I’m not too surprised. While “Russian hackers” are quite good. As we have seen, they are by no means infallible. Russian intelligence is dangerous because it is persistent and malicious. As we’ve seen in numerous examples, like some of the deadly poisonings in the UK, they are by no means superspies. In many ways, more Austin Powers villains than John LaCarre villains.”

Sherman: “I think it is too early to answer that question. For a multitude of reasons, I am very hesitant—and believe that we should all be very hesitant—to draw sweeping conclusions about “the role of cyber in conflict,” about “Russia’s cyber strategy,” and other related issues right now. We are only a few weeks into what is unfortunately poised to be a very long conflict; we are analyzing information in the public source, doing so amid the fog of war, and in a war with tons of disinformation and propaganda circulating. It is easy to jump to conclusions, but it is important to recognize what we do and do not know at this time (for the latter, that is a lot). I also think that we should recognize the biases that can come with studying a particular field: when you study cyber capabilities all day, it is easy to want to imagine that cyber is the most important thing in warfare and entirely ignore, for example, the continually important role of kinetic military capabilities that directly and immediately kill people. And from a preparedness and risk assessment standpoint, we must recognize that Moscow is not taking anything off the table, and just because it has not launched the massive, destructive cyberattacks some imagined would happen yet does not mean it will not engage in more aggressive or damaging cyber behavior in the coming weeks or months.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Scowcroft Center for Strategy and Security. He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Russia’s cyber statecraft appeared first on Atlantic Council.

]]>