The Ukraine war thread
-
@Doctor-Phibes said in The Ukraine war thread:
@George-K said in The Ukraine war thread:
The amazing claims goes on to label the unnamed Kremlin insider as “one of the pillars of the regime”.
If Putin finds out, he might become part of one of the pillars of a bridge-building project.
"Vladimir sleeps with Jimmy Hoffa"
-
@Doctor-Phibes said in The Ukraine war thread:
@George-K said in The Ukraine war thread:
The amazing claims goes on to label the unnamed Kremlin insider as “one of the pillars of the regime”.
If Putin finds out, he might become part of one of the pillars of a bridge-building project.
May 10th, 1941. Rudolf Hess.
Didn't work out well... -
@Renauda
Question is: to what extent is this "secret Kremlin official" real? And if so: who's supporting this suicide mission? -
Your guess is as good mine. Few in Russia know what goes on the inner sanctum of the Kremlin. No one in the West knows either.
It can also be disinformation. Until I see actions other than hearsay and innuendo, I will treat it as disinformation.
-
Probably more Russians smoking cigarettes near ammo dumps:
A huge explosion rocked a Russian ammunition depot on the occupied Crimean Peninsula on Tuesday morning, delivering another embarrassing blow to Moscow’s forces a week after blasts at a Russian air base in the same region destroyed several fighter jets.
A senior Ukrainian official, speaking on the condition of anonymity to discuss the operation, said that an elite Ukrainian military unit operating behind enemy lines was responsible for the explosion, which sent up a huge fireball. Russia’s Defense Ministry said in a statement that the explosion was an “act of sabotage,” according to the Russian state news agency RIA Novosti.
The apparent attacks this month, which used covert forces behind enemy lines, underscore the inventiveness of Ukraine’s forces. Since the war began, they have adopted unconventional tactics in the hopes of leveling the playing field while trying to repel attacks from a much larger and better equipped Russian military.
After illegally annexing Crimea in 2014, the Kremlin turned the peninsula into a heavily fortified military zone that Russia’s president, Vladimir V. Putin, often describes as hallowed ground.
Since Mr. Putin ordered the invasion of Ukraine in February, Crimea has served as a key base of operations. Aircraft at Crimean bases have flown sorties over Ukraine, and ships of the Black Sea fleet based there have launched punishing rocket attacks on Ukrainian military positions and civilian neighborhoods.
Until this month, Crimea appeared well protected from Ukrainian attacks. Even Ukraine’s most advanced weapons systems do not have the range to hit Russian military targets there, and its planes are incapable of making it through Russia’s air defenses on the peninsula.
Then, last Tuesday, a series of powerful explosions ripped through the Saki air base in western Crimea, annihilating a good portion of the Black Sea fleet’s 43rd naval aviation regiment. That attack, according to a Ukrainian official, was carried out in part by special forces officers working with local partisan fighters.
-
Another Russian airbase and ammo depots inside Russia hit in the last few hours:
Light ‘em up. Party’s on.
-
-
@Renauda said in The Ukraine war thread:
Another Russian airbase and ammo depots inside Russia hit in the last few hours:
Light ‘em up. Party’s on.
Is it too much to hope for to retake Crimea?
-
Article by Sir Jeremy Fleming, Director of GCHQ, the UK’s Intelligence, Cyber and Security Agency:
It is a fallacy to say that cyber has not been a factor in the war in Ukraine. Both sides are using cyber capabilities to pursue their aims. Both sides understand the potential of integrating cyber and information confrontation with their military effort. And both sides know that they are engaged in a struggle for influence and opinion far beyond the immediate battlefield. It is a very modern digital and cyber war, as much as it is a brutal and destructive physical one.
Six months after Russia’s invasion, it is becoming clear how differing physical and virtual approaches have shaped the conflict. Just as with its land invasion, Russia’s initial online plans appear to have fallen short. The country’s use of offensive cyber tools has been irresponsible and indiscriminate.
Their information operations have proven clumsy and have been challenged by the release of intelligence. And Russian military attempts to destroy the digital infrastructure of Ukraine and to sow discord using cyber capabilities have been met with staunch, professional and effective Ukrainian cyber defence.
As the UK’s intelligence, cyber and security agency, gchq has long tracked the threat that Russia poses. With our allies we have an ever-evolving picture of its intelligence and military objectives in cyberspace. We have consistently called out their activities that go beyond responsible behaviour in cyberspace. We have challenged the ways in which the Russian state has turned a blind eye to the powerful criminal cyber groups operating with impunity in the country. And we have worked with industry and our allies, to operate in support of Ukraine, address disinformation and safeguard critical cyber infrastructure.
Although we knew that Russia was capable of playing by different rules, its actions in Ukraine have now shown this to the world. As a result, we are seeing a reshaping of the cyber landscape. There is now much greater co-operation between big tech companies and governments on security than before the war, a polarisation of positions on the use of cyber in war and a renewed effort to redefine cyber norms.
Looking back, we now know that the first shots of Vladimir Putin’s unprovoked invasion of Ukraine were taken in cyberspace before bullets were fired on February 24th. The month before, Russian Military Intelligence deployed WhisperGate malware to destroy and deface Ukrainian government systems. And less than an hour before Russia invaded Ukraine, it targeted ViaSat satellite networks used by Ukrainian military, government and civilians. The attack spilled over into neighbouring countries causing collateral damage across a range of services, from wind farms to internet access.
Secret intelligence allowed us to spot this activity. The private sector spotted it too, and companies were quick to publicise and patch the problem. This partnership, between government and the private sector, which the National Cyber Security Centre (a part of gchq) plays a leading role in, has become increasingly important as Russian efforts to disrupt Ukrainian government and military systems have intensified.
Online disinformation quickly became a major part of Russia’s campaign, to cause confusion and chaos in Ukraine and beyond. Russia has used this playbook before, including in Syria and the Balkans. It aims to sow mistrust in information sources, to misrepresent Ukrainian actions and to promulgate false narratives about the reasons for Russia’s actions. We have taken action to counter these twisted truths. From providing warnings about the onset of war, to the rapid release of intelligence, and working with Western technology platforms to remove lies, we have shone a spotlight on the Russian state’s approach.
Much of this has been successful. So far, President Putin has comprehensively lost the information war in Ukraine and in the West. Although that is cause for celebration, we should not underestimate how Russian disinformation is playing out elsewhere in the world. Many of the most populous countries did not agree to the un motion censuring Russia for its invasion. Public opinion in those places matters and it is influenced already by the information coming out of Russia. This is a new front to the war in Ukraine and its effects will endure at least as long as the conflict does. We must take action to confront organised state disinformation campaigns and to ensure they do not succeed in blunting international outrage over Russia’s actions.
In all of these areas, we have seen the Russian state try to align and co-ordinate cyber capabilities alongside more traditional facets of military power. To date, this hybrid intent has not succeeded; the impact has been less than we (and they) expected.
In part, this is because Ukraine has proved itself to be an extremely effective cyber defender. Since the annexation of Crimea in 2014, it has painstakingly developed a digital fortress. As we have witnessed heroic defence by Ukraine’s military, online we have arguably seen the most effective defensive cyber activity in history. Operating under sustained pressure against a very capable adversary, this team of industry, intelligence, security agencies and in some cases, citizens, has worked side by side to warn, respond and remediate.
These cyber defences proved stronger than Russia anticipated. Somewhat ironically, we’ve seen its military activity compound its problems. Russian strikes took down the very networks they were trying to infect. They forced the Ukrainians to diversify and use alternative forms of communication that were more secure. That actually enhanced Ukrainian resilience.
Thankfully, all of this cyber activity has not resulted in collateral damage outside Ukraine of the scale of the NotPetya attacks in 2017, which disrupted Ukraine’s banks, airports and more. This may be because Russian cyber actors are carefully calibrating to avoid escalation. Afterall, nato has made it clear that a serious cyber-attack against a member country could trigger Article 5, the alliance’s mutual defence clause. The danger of overspill to nato countries is very real—we’ve seen incompetence and carelessness by Russia before.
An important component of our response to this situation may involve the UK’s National Cyber Force (ncf)—a partnership between gchq and the Ministry of Defence. This builds out from our world class cyber defence and resilience, to deliver offensive cyber capabilities. I won’t go into detail about ncf activity—stealth and ambiguity are key attributes of cyber operations.
This secret and important work is conducted in accordance with international law and domestic legislation. It is authorised by ministers and scrutinised by judicial commissioners. It is this ethical, proportionate and legal approach that sets us apart from our adversaries and from Russia’s use of cyber capabilities in this war.
Learning the lessons of these early stages of President Putin’s war, it is hard to overstate the importance of Ukrainian cyber defence to the fight. The country’s experience has shown that online, the defender gets to choose how vulnerable they are to attack. And that we, as allies, show we are serious about the responsible use of cyber power. These are lessons that we and like-minded partners around the world must heed.
-
Stolen from a list at the RWEC:
And outside Kyiv - a strike on a supply line:
Closer to the front, Kyiv also announced a number of strikes overnight behind Russian lines in southern Kherson province, including at a bridge at the Kakhovska Dam, one of the last routes for Russia to supply thousands of troops on the west bank of the Dnipro River.
"The Ukrainian armed forces treated the Russians to a magical evening," Seriy Khlan, a member of Kherson's regional council disbanded by Russian occupation forces, wrote on Facebook.
Supplies are definitely going to be an issue;
-
To put it inti perspective, I heard yesterday on BBC World Service that the battle front in Ukraine in this war is the equivalent to the distance from Moscow to The Hague - roughly 1,367 miles. Correct me if I am wrong but I don’t think we have seen battle fronts of that size since WWII.