Notes:

[1] “Five Reasons Why Russian Forces Are Struggling in Ukraine,” n.d. Defense One, https://www.defenseone.com/threats/2022/03/five-reasons-why-russia-struggling-ukraine/362636/.

[2] Buchanan, Ben, 2020, The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics, Cambridge, Massachusetts: Harvard University Press, 214–239.

[3] Lewis, James, 2022, “Cyber War and Ukraine,” Www.csis.org, June 16, 2022, https://www.csis.org/analysis/cyber-war-and-ukraine.

[4] The World Bank, 2022, “Russian Invasion to Shrink Ukraine Economy by 45 Percent This Year,” World Bank, April 10, 2022, https://www.worldbank.org/en/news/press-release/2022/04/10/russian-invasion-to-shrink-ukraine-economy-by-45-percent-this-year.

[5] Buchanan, Ben, 2020, The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics, Cambridge, Massachusetts: Harvard University Press, 289–305.

[6] “Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case,” 2016, https://media.kasperskycontenthub.com/wp-content/uploads/sites/58/2016/12/21181126/E-ISAC_SANS_Ukraine_DUC_5.pdf.

[7] Greenberg, Andy, 2018, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” WIRED, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.

[8] “NERC | Report Title | Report Date I Modular ICS Malware,” 2017, https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt4f6cc0b6358c6883/607f235a6371c75a11ad9f5a/E-ISAC_SANS_Ukraine_DUC_6.pdf; “Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case,” 2016, https://media.kasperskycontenthub.com/wp-content/uploads/sites/58/2016/12/21181126/E-ISAC_SANS_Ukraine_DUC_5.pdf.

[9] “The Industrial Control System Cyber Kill Chain | sans Institute,” n.d. Www.sans.org. https://www.sans.org/white-papers/36297/.

[10] “NERC | Report Title | Report Date I Modular ICS Malware,” 2017, https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt4f6cc0b6358c6883/607f235a6371c75a11ad9f5a/E-ISAC_SANS_Ukraine_DUC_6.pdf.

[11] Ibid.

[12] Ibid.

[13] Ibid.

[14] Ibid.

[15] Ibid.

[16] Greenburg, Andy, 2018, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” WIRED, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.

[17]

[18] Ibid.

[19] Ibid.

[20] Buchanan, Ben, 2020, The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics, Cambridge, Massachusetts: Harvard University Press, 270–287.

[21] Nieles, Michael, Kelley Dempsey, and Victoria Yan Pillitteri, 2017, “An Introduction to Information Security,” An Introduction to Information Security, June, https://doi.org/10.6028/nist.sp.800-12r1.

[22] Hutchins, Eric, Michael Cloppert, and Rohan Amin, 2011, “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains., https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf.

[23] Ibid.

[24] Greenberg, Andy, 2018, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” WIRED, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.

[25] Ibid.

[26] “An Overview of Russia’s Cyberattack Activity in Ukraine Special Report: Ukraine Digital Security Unit,” 2022, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd.

[27] Heilman, Greg, 2022, “Why Is Russia Interested in Controlling Nuclear Power Plants in Ukraine?” Diario AS, March 7, 2022, https://en.as.com/en/2022/03/07/latest_news/1646686014_463478.html; News, A. B. C. n.d. “Russia Escalates False Chemical Weapons Claims about U.S., Ukraine by Bringing Them to U.N.,” ABC News, https://abcnews.go.com/Politics/russia-escalates-false-chemical-weapons-claims-us-ukraine/story?id=83366504.

[28] Team, Microsoft 365 Defender Threat Intelligence, 2022, “Destructive Malware Targeting Ukrainian Organizations,” Microsoft Security Blog, January 16, 2022, https://www.microsoft.com/en-us/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/.

[29] “Digital Technology and the War in Ukraine,” 2022, Microsoft on the Issues, February 28, 2022, https://blogs.microsoft.com/on-the-issues/2022/02/28/ukraine-russia-digital-war-cyberattacks/; “Industroyer2: Industroyer Reloaded,” 2022. WeLiveSecurity, April 12, 2022, https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/.

[30] Nakashima, Ellen, 2022, “Russian Military behind Hack of Satellite Communication Devices in Ukraine at War’s Outset, U.S. Officials Say,” Washington Post, March 24, 2022, https://www.washingtonpost.com/national-security/2022/03/24/russian-military-behind-hack-satellite-communication-devices-ukraine-wars-outset-us-officials-say/; Brewster, Thomas. n.d. “‘Most Severe’ Cyberattack since Russian Invasion Crashes Ukraine Internet Provider,” Forbes, Accessed March 18, 2023, https://www.forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/?sh=381c15037dc2; “Ukraine Destroys Five Bot Farms That Were Spreading ‘Panic’ among Citizens,” n.d. ZDNET, Accessed March 18, 2023, https://www.zdnet.com/article/ukraine-takes-out-five-bot-farms-spreading-panic-among-citizens/.

[31] “CYBER SECURITY STRATEGY of UKRAINE 1 General Provisions,” n.d. https://ccdcoe.org/uploads/2018/10/NationalCyberSecurityStrategy_Ukraine.pdf.

[32] “Ukraine Universities Hacked as Russian Invasion Started,” 2022, Wordfence. March 1, 2022, https://www.wordfence.com/blog/2022/03/ukraine-universities-hacked-by-brazilian-via-finland-as-russian-invasion-started/.

[33] Srivastava, Mehul, Madhumita Murgia, and Hannah Murphy, 2022, “The Secret US Mission to Bolster Ukraine’s Cyber Defences ahead of Russia’s Invasion,” Financial Times, March 9, 2022, https://www.ft.com/content/1fb2f592-4806-42fd-a6d5-735578651471.

[34] “CYBERCOM Sent a ‘Hunt Forward’ Team to Help Ukraine Harden Systems,” n.d. Www.meritalk.com, Accessed March 18, 2023, https://www.meritalk.com/articles/cybercom-sent-a-hunt-forward-team-to-help-ukraine-harden-systems/.

[35] “The Fall and Rise of Russian Electronic Warfare,” 2022, IEEE Spectrum, July 30, 2022, https://spectrum.ieee.org/the-fall-and-rise-of-russian-electronic-warfare.

[36] “Berdyansk: Life under Russian Occupation,” n.d. Iwpr.net, Accessed March 18, 2023, https://iwpr.net/global-voices/berdyansk-life-under-russian-occupation.

[37] Cancian, Mark, Matthew Cancian, and Eric Heginbotham, 2023, “The First Battle of the next War Wargaming a Chinese Invasion of Taiwan,” https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/230109_Cancian_FirstBattle_NextWar.pdf?VersionId=WdEUwJYWIySMPIr3ivhFolxC_gZQuSOQ.

LEAVE A REPLY

Please enter your comment!
Please enter your name here