Abstract
As the Western democracies are increasingly digitized, awareness of the resulting geopolitical vulnerabilities has lagged behind. There is a need to understand that cyber operations have strategic aims that go beyond mere snooping and spying. They are effective at spreading mistrust, blackmail, and destabilization, and at displaying the perpetrator’s capabilities and serving its deterrence purposes. The harm scales used to evaluate the severity of a cyberattack usually focus on physical or economic damage, overlooking the real significance of politically motivated cyberattacks. For example, the damage caused by rigging an election process goes far beyond some of the physical harm scenarios. Cyber operations are particularly effective in combination with other political pressuring tools. The worrying aspect is that this synergic spectrum can widen and lead to cyber escalation, in which case the level of harm caused by the cyber operations will become higher and more prolonged, especially in the (geo)political sense.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See e.g. Raik et al. (2018).
- 2.
Any organization capable of developing the code and analyzing the captured data, which involves materials in several languages, has to have dozens of workers.
- 3.
Other targets have a law enforcement function, such as Russian dealers of illicit substances.
References
Aaltola, M., Käpylä, J., & Vuorisalo, V. (2016). The Challenge of Global Commons and Flows for US Power: The Perils of Missing the Human Domain. London: Routledge.
Antikainen, J., & Eronen, P. (2015). What’s Worse Than Losing Your Data? Losing Your Trust in It. Overt Action. Available at http://www.overtaction.org/2015/07/whats-worse-than-losing-your-data-losing-your-trust-in-it/. Accessed 20 July 2016.
Apps, P., & Finkle, J. (2014). Suspected Russian Spyware Turla Targets Europe, United States. Technology News, Reuters. Available at http://www.reuters.com/article/us-rus-sia-cyberespionage-insight-idUSBREA260YI20140307. Accessed 24 April 2020.
Ettinger, A. (2017). US National Security Strategies: Patterns of Continuity and Change, 1987–2015. Comparative Strategy, 36(2), 115–128.
Feaver, P. (2017). Five Takeaways from Trump’s National Security Strategy. Foreign Policy. Available at https://foreignpolicy.com/2017/12/18/five-takeaways-from-trumps-national-security-strategy/. Accessed 24 April 2020.
F-Secure Labs. (2014). CosmicDuke: Cosmu with a Twist of MiniDuke. Available at https://www.f-secure.com/weblog/archives/00002723.html. Accessed 24 April 2020.
F-Secure. (2015). CozyDuke. F-Secure Labs Malware Analysis White Paper.
Kaspersky.com. (2014). How Turla and ‘Worst Breach of US Military Computers in History’ Are Connected. Available at http://www.kaspersky.com/about/news/virus/2014/How-Turla-and-worst-breach-of-US-military-computers-in-history-are-connected. Accessed 24 April 2020.
Raik, K., Aaltola, M., Kallio, J., & Pynnöniemi, K. (2018). The Security Strategies of the US, China, Russia and the EU: Living in Different Worlds. Helsinki: Finnish Institute of International Affairs.
White House. (2015). National Security Strategy. Available at https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf. Accessed 21 December 2019.
White House. (2017). National Security Strategy. Available at https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf. Accessed 21 December 2019.
Zetter, K. (2015). Russian Spy Gang Hijacks Satellite Links to Steal Data. Wired.com. Available at https://www.wired.com/2015/09/turla-russian-espionage-gang-hijacks-satellite-connections-to-steal-data/. Accessed 24 April 2020.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2021 The Author(s)
About this chapter
Cite this chapter
Aaltola, M. (2021). Russian Cyber-Enabled Diversions in the West. In: Democratic Vulnerability and Autocratic Meddling. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-54602-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-54602-1_4
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-54601-4
Online ISBN: 978-3-030-54602-1
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)