{"id":4969,"date":"2022-03-07T14:37:44","date_gmt":"2022-03-07T13:37:44","guid":{"rendered":"http:\/\/costops.com\/index.php\/2022\/03\/07\/how-the-tech-community-has-rallied-to-ukraines-cyber-defence-joyce-hakmeh-and-esther-naylor\/"},"modified":"2022-03-07T14:37:44","modified_gmt":"2022-03-07T13:37:44","slug":"how-the-tech-community-has-rallied-to-ukraines-cyber-defence-joyce-hakmeh-and-esther-naylor","status":"publish","type":"post","link":"http:\/\/costops.com\/index.php\/2022\/03\/07\/how-the-tech-community-has-rallied-to-ukraines-cyber-defence-joyce-hakmeh-and-esther-naylor\/","title":{"rendered":"How the tech community has rallied to Ukraine\u2019s cyber-defence | Joyce Hakmeh and Esther Naylor"},"content":{"rendered":"<p>From an army of volunteers to EU and Nato teams, the variety of online actors working for the cause is unprecedented<\/p>\n<p>As the conflict in Ukraine escalates, expert cyber-watchers have been speculating about the kind of cyber-attacks that Russia might conduct. Will the Kremlin turn off <a href=\"https:\/\/www.reuters.com\/business\/energy\/europe-ukraines-plan-link-power-grids-2022-03-01\/\">Ukraine\u2019s power grid<\/a>, dismantle Ukraine\u2019s transport system, cut off the water supply or target the health system? Or would cybercriminals operating from Russia, who could act as proxies for the Russian regime, conduct these activities? <\/p>\n<p>Over the past decade, Ukraine has experienced many major cyber-attacks, most of which have been attributed to Russia. From <a href=\"https:\/\/linkprotect.cudasvc.com\/url?a=https%3A%2F%2Fcyberlaw.ccdcoe.org%2Fwiki%2FUkrainian_parliamentary_election_interference_%282014%29&amp;c=E,1,StFwZXhMSXzdK2NgHCrbogdwEYXd6dIdKN5BH-f3wuA7mffVqIDMPfbPWbTJbhEacHM5SReQdAN3zF-pjszSXGWoQgM4t_Bxxc9XRtU9&amp;typo=1\">election interference<\/a> in 2014, which compromised the central electoral system and jeopardised the integrity of the democratic process; to a hack and blackout attack in a <a href=\"https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/\">first-of-its-kind<\/a> fully remote cyber-attack on a power grid in 2015, resulting in countrywide power outages; to one of the costliest malicious software attacks, <a href=\"https:\/\/linkprotect.cudasvc.com\/url?a=https%3A%2F%2Fwww.ncsc.gov.uk%2Fnews%2Frussian-military-almost-certainly-responsible-destructive-2017-cyber-attack&amp;c=E,1,gQLKhCcnObHis4f6gqLD00huETA5SLHSA6vM57B2i0hlo_CzpXPoOOnDzw3C1ARe_RcNzqmDaELiubRPns7WMfAOVBY3hWo30W0RSqTXbF0TlSLy5Q,,&amp;typo=1\">NotPetya<\/a>, in 2017, which significantly disrupted access to banking and government services in Ukraine and, subsequently, spilled over to France, Germany, Italy, Poland, Russia, the UK, the US and Australia.<\/p>\n<p>Joyce Hakmeh is a senior research fellow for the International Security Programme at Chatham House. Esther Naylor is a research analyst at the International Security Programme <\/p>\n<p> <a href=\"https:\/\/www.theguardian.com\/commentisfree\/2022\/mar\/07\/tech-community-rallied-ukraine-cyber-defence-eu-nato\">Continue reading&#8230;<\/a><br \/>\n<img src=\"https:\/\/i.guim.co.uk\/img\/media\/fb1b34b51cf6c1676ba39d37ac0a328cd16736c0\/0_229_3840_2303\/master\/3840.jpg?width=140&amp;quality=85&amp;auto=format&amp;fit=max&amp;s=11b62f003e98b25d8241c7dbdc0297f8\" title=\"How the tech community has rallied to Ukraine\u2019s cyber-defence | Joyce Hakmeh and Esther Naylor\" \/>From an army of volunteers to EU and Nato teams, the variety of online actors working for the cause is unprecedented<br \/>\nAs the conflict in Ukraine escalates, expert cyber-watchers have been speculating about the kind of cyber-attacks that Russia might conduct. Will the Kremlin turn off Ukraine\u2019s power grid, dismantle Ukraine\u2019s transport system, cut off the water supply or target the health system? Or would cybercriminals operating from Russia, who could act as proxies for the Russian regime, conduct these activities?<br \/>\nOver the past decade, Ukraine has experienced many major cyber-attacks, most of which have been attributed to Russia. From election interference in 2014, which compromised the central electoral system and jeopardised the integrity of the democratic process; to a hack and blackout attack in a first-of-its-kind fully remote cyber-attack on a power grid in 2015, resulting in countrywide power outages; to one of the costliest malicious software attacks, NotPetya, in 2017, which significantly disrupted access to banking and government services in Ukraine and, subsequently, spilled over to France, Germany, Italy, Poland, Russia, the UK, the US and Australia.<br \/>\nJoyce Hakmeh is a senior research fellow for the International Security Programme at Chatham House. Esther Naylor is a research analyst at the International Security Programme  Continue reading&#8230;Technology | The Guardian<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From an army of volunteers to EU and Nato teams, the variety of online actors working for the cause is unprecedented As the conflict in Ukraine escalates, expert cyber-watchers have been speculating about the kind of cyber-attacks that Russia might conduct. Will the Kremlin turn off Ukraine\u2019s power grid, dismantle Ukraine\u2019s transport system, cut off &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"http:\/\/costops.com\/index.php\/2022\/03\/07\/how-the-tech-community-has-rallied-to-ukraines-cyber-defence-joyce-hakmeh-and-esther-naylor\/\"> <span class=\"screen-reader-text\">How the tech community has rallied to Ukraine\u2019s cyber-defence | Joyce Hakmeh and Esther Naylor<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":0,"featured_media":4970,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts\/4969"}],"collection":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/comments?post=4969"}],"version-history":[{"count":0,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts\/4969\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/media\/4970"}],"wp:attachment":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/media?parent=4969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/categories?post=4969"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/tags?post=4969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}