Cyber Operations at the Operational Level of Warfare: Lessons from the Russia-Ukraine Conflict
Operaciones cibernéticas en el nivel operacional de la guerra: lecciones del conflicto entre Rusia y Ucrania
dc.creator | Moreno Rodríguez, Pablo Andrés | |
dc.date | 2025-06-30 | |
dc.date.accessioned | 2025-09-24T21:22:41Z | |
dc.date.available | 2025-09-24T21:22:41Z | |
dc.identifier | https://esdegrevistas.edu.co/index.php/rcit/article/view/4942 | |
dc.identifier | 10.25062/2955-0270.4942 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14205/11629 | |
dc.description | The cyber aspects of the war between Russia and Ukraine present a multitude of lessons applicable to the war. Considering that the relevant literature has focused on analyzing the technical and tactical levels of it, this article focuses on the operational level of war. A nuanced analysis allows for applicable lessons to serve as a guide for operational commanders. Modern warfare requires commanders to internalize these lessons and apply them in the planning and conduct of their operations if they want to accomplish their mission. | en-US |
dc.description | Los aspectos cibernéticos de la guerra entre Rusia y Ucrania presentan una multitud de lecciones aplicables a la guerra. Considerando que la literatura relevante se ha enfocado en analizar los niveles técnicos y tácticos de ella, este artículo se enfoca en el nivel operacional de la guerra. Un análisis matizado permite obtener lecciones aplicables las cuales sirven como guía para los comandantes operacionales. La guerra moderna exige de los comandantes interiorizar estas lecciones y aplicarlas en el planeamiento y conducción de sus operaciones si quieren lograr cumplir su misión. | es-ES |
dc.format | application/pdf | |
dc.language | spa | |
dc.publisher | Sello Editorial ESDEG | es-ES |
dc.relation | https://esdegrevistas.edu.co/index.php/rcit/article/view/4942/5417 | |
dc.relation | /*ref*/Antoniuk, D. (2023, 21 de agosto). Ukrainian hackers claim to leak emails of Russian parliament deputy chief. The Record. https://therecord.media/ukrainian-hackers-claim-to-leak-emails-of-russia-duma-deputy | |
dc.relation | /*ref*/Bartholomees, J. B. (2008). Theory of Victory. Parameters, 38(2), 25-36. https://press.armywarcollege.edu/parameters/vol38/iss2/7/ | |
dc.relation | /*ref*/Barthosh, A. (2021, 12 de agosto). Hybrid, secretive, unpredictable: From Goebbels and Münzenberg to modern information battles. Independent Newspaper - Military Review. https://nvo.ng.ru/gpolit/2021-08-12/1_10_11_1153_hybrid.html | |
dc.relation | /*ref*/Belfer Center. (2022). National Cyber Power Index. https://www.belfercenter.org/publication/national-cyber-power-index-2022 | |
dc.relation | /*ref*/Bowen, G. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27-40. | |
dc.relation | /*ref*/Brantly, A. (2022). Battling the bear: Ukraine's approach to national cyber and information security. En M. D. Cavelty y A. Wenger (Eds.), Cyber security politics: Socio-technological transformations and political fragmentation. Routledge. | |
dc.relation | /*ref*/Bronk, C., Collins, G., y Wallach, D. (2023). The Ukrainian information and cyber war. The Cyber Defense Review, 8(3), 33-49. https://n9.cl/k0l72i | |
dc.relation | /*ref*/Centro de Doctrina Conjunta del Ejército Nacional de Colombia [CEDCO]. (2018). Manual Fundamental Conjunto MFC 1.0 Doctrina Conjunta. Comando General de las Fuerzas Militares. | |
dc.relation | /*ref*/Centro de Doctrina Conjunta del Ejército Nacional de Colombia [CEDCO]. (2024). Manual Fundamental Conjunto MFC 5-0 Planeamiento Conjunto. Comando General de las Fuerzas Militares. | |
dc.relation | /*ref*/Cohen, E. (2022, 7 de marzo). The strategy that can defeat Putin. The Atlantic. https://n9.cl/gdmq3 | |
dc.relation | /*ref*/Council on Foreign Relations [CFR]. (2024, 2 de agosto). Cyber Operations Tracker. CFR Digital and Cyberspace Policy Program. https://www.cfr.org/cyber-operations/ | |
dc.relation | /*ref*/Center for Strategic and International Studies [CSIS]. (2024, 6 de agosto). Significant Cyber Incidents. Strategic Technologies Program. https://n9.cl/ko6oa | |
dc.relation | /*ref*/De Landmeter, E. (2018). What constitutes victory in modern war? Militaire Spectator, 187(3), 136-149. https://militairespectator.nl/artikelen/what-constitutes-victory-modern-war | |
dc.relation | /*ref*/Delerue, F. (2020). Internationally wrongful cyber acts: Cyber operations breaching norms of international law. En F. Delerue, Cyber operations and international law (pp. 193-272). Cambridge University Press. | |
dc.relation | /*ref*/Delerue, F. (2023). Is international law fading away in state practice on cyber operations? En F. Cristiano y B. Van den Berg (Eds.), Hybridity, conflict and the global politics of cybersecurity (pp. 31-52). Rowman and Littlefield. | |
dc.relation | /*ref*/Dewar, R. (2014). The “Triptych of Cyber Security”: A classification of active cyber defence. En P. Brangetto, M. Maybaum, y J. Stinissen (Eds.), 6th International Conference on Cyber Conflict. NATO CCD COE Publications. https://www.ccdcoe.org/uploads/2018/10/d1r1s9_dewar.pdf | |
dc.relation | /*ref*/Echevarría, A. (2014). Reconsidering the American way of war: US military practice from the Revolution to Afghanistan. Georgetown University Press. | |
dc.relation | /*ref*/Echevarría, A. (2017). Military strategy: A very short introduction. Oxford University Press. | |
dc.relation | /*ref*/Efrony, D., y Shany, Y. (2018). A rule book on the shelf? Tallinn Manual 2.0 on cyberoperations and subsequent state practice. The American Journal of International Law, 112(4), 583-657. https://doi.org/10.1017/ajil.2018.86 | |
dc.relation | /*ref*/Fox, A. (2023). Comparative proxy strategies in the Russo-Ukrainian War. Comparative Strategy, 42(5), 605-620. https://doi.org/10.1080/01495933.2023.2236488 | |
dc.relation | /*ref*/Fox, A. (2023a, 8 de marzo). Conflict realism: A new school of thought for examining the future of armed conflict. The Strategy Bridge. https://n9.cl/r84qh | |
dc.relation | /*ref*/Fox, A. (2024). Conflict realism: Understanding the causal logic of modern war and warfare. Howgate Publishing Limited. | |
dc.relation | /*ref*/Freedman, L. (2019). La guerra futura. Crítica. | |
dc.relation | /*ref*/Fridman, O. (2017, 1 de marzo). The Russian perspective on information warfare: Conceptual roots and politisation in Russian academic, political, and public discourse. NATO Strategic Communications Centre for Excellence. https://n9.cl/qexh3 | |
dc.relation | /*ref*/Galeotti, M. (2022). The weaponisation of everything: A field guide to the new way of war. Yale University Press. | |
dc.relation | /*ref*/Galula, D. (1964). Counterinsurgency warfare: Theory and practice. Praeger Security International. | |
dc.relation | /*ref*/Giles, K. (2021, 21 de diciembre). Putin does not need to invade Ukraine to get his way. Chatham House. https://n9.cl/p3ueun | |
dc.relation | /*ref*/Gray, C. (1999). Modern strategy. Oxford University Press. | |
dc.relation | /*ref*/Gray, C. (2010). The strategy bridge: Theory for practice. Oxford University Press. | |
dc.relation | /*ref*/Greenberg, A. (2018, 22 de agosto). The untold story of NotPetya, the most devastating cyberattack in history. Wired. https://n9.cl/pbep19 | |
dc.relation | /*ref*/Greenberg, A. (2023, 22 de febrero). Ukraine suffered more data-wiping malware last year than anywhere, ever. Wired. https://www.wired.com/story/ukraine-russia-wiper-malware/ | |
dc.relation | /*ref*/Heim, J., Burdette, Z., y Beauchamp-Mustafaga, N. (2024, 11 de junio). Denial is the worst except for all the others: Getting the US theory of victory right for war against China. War on the Rocks. https://n9.cl/pn60d | |
dc.relation | /*ref*/Hird, K., Lawlor, K., Mappes, G., Barros, G., y Kagan, F. (2022, 14 de octubre). Russian offensive campaign assessment, October 14. Institute for the Study of War. https://n9.cl/hlcqs | |
dc.relation | /*ref*/HM Government. (1963). Conduct of anti-terrorist operations in Malaya. HM Stationery Office. | |
dc.relation | /*ref*/Hogeveen, B. (2022). The UN cyber norms: How do they guide the responsible development and use of offensive cyber capabilities? The Cyber Defense Review, 7(4), 123-142. | |
dc.relation | /*ref*/Hüsch, P., y Jarnecki, J. (2023, 1 de junio). All quiet on the cyber front? Explaining Russia’s limited cyber effects. Royal United Services Institute. https://n9.cl/1argu | |
dc.relation | /*ref*/Ikenberry, G. J. (2011). Liberal leviathan: The origins, crisis, and transformation of the American world order. Princeton University Press. | |
dc.relation | /*ref*/InformNapalm. (2023, 10 de abril). Hacked: Russian GRU officer wanted by the FBI, leader of the hacker group APT 28. https://informnapalm.org/en/hacked-russian-gru-officer/?ref=cyberthreat.report | |
dc.relation | /*ref*/International Institute for Strategic Studies [IISS]. (2023, septiembre). Cyber capabilities and national power. https://www.iiss.org/research-paper/2023/09/cyber-capabilities-national-power-volume-2/ | |
dc.relation | /*ref*/Jensen, E. T. (2017). The Tallinn Manual 2.0: Highlights and insights. Georgetown Journal of International Law, 48, 735-778. | |
dc.relation | /*ref*/Kallberg, J. (2016). Strategic cyberwar theory - A foundation for designing decisive strategic cyber operations. The Cyber Defense Review, 1(1), 113-128. | |
dc.relation | /*ref*/Kenny, A., Locatelli, O., y Zarza, L. (2015). Arte y diseño operacional: Una forma de pensar operaciones militares. Visión Conjunta. | |
dc.relation | /*ref*/Koh, D. (2020, 9 de diciembre). The geopolitics of cybersecurity. The Diplomat. https://thediplomat.com/2020/12/the-geopolitics-of-cybersecurity/ | |
dc.relation | /*ref*/Lawrence, T. E. (1926). Seven pillars of wisdom. Jonathan Cape. | |
dc.relation | /*ref*/Leali, G. (2024, 2 de marzo). Leaked audio shows Germany discussed possible Taurus missiles delivery to Ukraine: Reports. Politico. https://www.politico.eu/article/germany-taurus-missiles-ukraine-war-russia-leaked-audio/ | |
dc.relation | /*ref*/Lewis, J. (2016). Cyberspace and armed forces: The rationale for offensive cyber capabilities. Australian Strategic Policy Institute. | |
dc.relation | /*ref*/Libicki, M. (2009). Cyberdeterrence and cyberwar. The RAND Corporation. | |
dc.relation | /*ref*/Libicki, M. (2016). Cyberspace in peace and war. Naval Institute Press. | |
dc.relation | /*ref*/Mankoff, J. (2022, 22 de abril). Russia’s war in Ukraine: Identity, history, and conflict. Center for Strategic and International Studies. https://www.csis.org/analysis/russias-war-ukraine-identity-history-and-conflict | |
dc.relation | /*ref*/Marsh, S., y Rinke, A. (2024, 5 de marzo). Why a leaked German military recording on Ukraine aid is causing an outcry. Reuters. https://www.reuters.com/world/europe/why-leaked-german-military-recording-is-causing-outcry-2024-03-04/ | |
dc.relation | /*ref*/Maschmeyer, L. (2021, 17 de noviembre). Why cyber war is subversive, and how that limits its strategic value. War on the Rocks. https://warontherocks.com/2021/11/why-cyber-war-is-subversive-and-how-that-limits-its-strategic-value/ | |
dc.relation | /*ref*/McFate, S. (2019). The new rules of war: How America can win against Russia, China and other threats. Harper Collins. | |
dc.relation | /*ref*/McMaster, H. R. (1997). Dereliction of duty: Johnson, McNamara, the Joint Chiefs of Staff, and the lies that led to Vietnam. Harper Perennial. | |
dc.relation | /*ref*/Mearsheimer, J. J. (2018). The great delusion: Liberal dreams and international realities. Yale University Press. | |
dc.relation | /*ref*/Mhalla, A. (2023, 17 de enero). Splinternet: How geopolitics is fracturing cyberspace. Polytechnic Insights. https://n9.cl/gmh70 | |
dc.relation | /*ref*/Miller, M. (2022, 28 de enero). Russian invasion of Ukraine could redefine cyber warfare. Politico. https://www.politico.com/news/2022/01/28/russia-cyber-army-ukraine-00003051 | |
dc.relation | /*ref*/Ministerie van Binnenlandse Zaken en Koninkrijksrelaties & Ministerie van Defensie [AIVD-MIVD]. (2023). De Russische aanval op Oekraïne: een keerpunt in de geschiedenis. https://n9.cl/xyxqy | |
dc.relation | /*ref*/Mirón, M., y Thornton, R. (2024). The use of cyber tools by the Russian military: Lessons from the war against Ukraine and a warning for NATO? Applied Cybersecurity & Internet Governance, 3(1), 147-169. | |
dc.relation | /*ref*/Missiroli, A. (2021). Geopolitics and strategies in cyberspace: Actors, actions, structures and responses (Hybrid CoE Paper 7). The European Centre of Excellence for Countering Hybrid Threats. https://www.hybridcoe.fi/publications/hybrid-coe-paper-7-geopolitics-and-strategies-in-cyberspace-actors-actions-structures-and-responses/ | |
dc.relation | /*ref*/Moore, D. (2022). Offensive cyber operations: Understanding intangible war. Oxford University Press. https://doi.org/10.1093/oso/9780197657553.001.0001 | |
dc.relation | /*ref*/Mueller, G., Jensen, B., Valeriano, B., Maness, R., y Macias, J. (2023, 23 de julio). Cyber operations during the Russo-Ukrainian War: From strange patterns to alternative futures. Center for Strategic and International Studies. https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war | |
dc.relation | /*ref*/Muller, L. P. (2019). Military offensive cyber-capabilities: Small-state perspectives. Norwegian Institute for International Affairs. | |
dc.relation | /*ref*/Organización de las Naciones Unidas [ONU]. (2015, 23 de diciembre). Developments in the field of information and telecommunications in the context of international security (A/RES/70/237). https://digitallibrary.un.org/record/815989?v=pdf | |
dc.relation | /*ref*/Organización del Tratado del Atlántico Norte [OTAN]. (2016, junio). Ukraine Cyber Defense NATO Trust Fund. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_07/20160712_1606-trust-fund-ukr-cyberdef.pdf | |
dc.relation | /*ref*/Organización del Tratado del Atlántico Norte [OTAN]. (2020). AJP 3-20 Allied joint doctrine for cyberspace operations. NATO Standardization Office. | |
dc.relation | /*ref*/Organización del Tratado del Atlántico Norte [OTAN]. (2023). AJP 10-1 Allied joint doctrine for information operations. NATO Standardization Office. | |
dc.relation | /*ref*/Ormrod, A., Ormrod, D., y Slay, J. (2023). Cyber offensive operations in hybrid warfare: Observations from the Russo-Ukrainian conflict. Journal of Information Warfare, 22(1), 76-88. | |
dc.relation | /*ref*/Panarin, I. (2006). Informatsionnaya voyna i geopolitika. Pokolonie. | |
dc.relation | /*ref*/Panarin, I. (2010). Pervaya mirovaya informatsionnaya voyna: Razval SSSR. Piter. | |
dc.relation | /*ref*/Patrick, C. (2019). Debugging the Tallinn Manual 2.0's application of the due diligence principle to cyber operations. Washington International Law Journal, 28(2), 581-604. https://digitalcommons.law.uw.edu/wilj/vol28/iss2/11/ | |
dc.relation | /*ref*/Piernas, J. (2024). El principio de diligencia debida en Derecho internacional y su aplicación al contexto cibernético. Anales de Derecho, 41. https://dialnet.unirioja.es/servlet/articulo?codigo=9296450 | |
dc.relation | /*ref*/Pincus, W. (2023, 26 de septiembre). The future of cyberwar is being shaped in Ukraine. The Cypher Brief. https://www.thecipherbrief.com/column/fine-print/the-future-of-cyberwar-is-being-shaped-in-ukraine | |
dc.relation | /*ref*/Prince, C. [Royal United Services Institute]. (2022, 28 de octubre). The cyber operations series: Understanding offensive cyber operations [Video]. YouTube. https://www.youtube.com/watch?v=dQw4w9WgXcQ | |
dc.relation | /*ref*/Prince, C. [Royal United Services Institute]. (2023, 25 de abril). Cyber operations in Ukraine: A conversation with Victor Zhora | RUSI webinar [Video]. YouTube. https://www.youtube.com/watch?v=3JZ_D3p6MAA | |
dc.relation | /*ref*/Proska, K., Wolfram, J., Wilson, J., Black, D., y Lunden, K. (2023, 9 de noviembre). Sandworm disrupts power in Ukraine using a novel attack against operational technology. Mandiant. https://www.mandiant.com/resources/blogs/sandworm-disrupts-power-ukraine-operational-technology | |
dc.relation | /*ref*/Rastorguev, S. (2006). Informatsionnaya voyna: Problemy i modeli. Radio i syvaz. | |
dc.relation | /*ref*/Render-Katolic, A. (2023, 15 de agosto). The IT Army of Ukraine. Center for Strategic and International Studies. https://www.csis.org/blogs/strategic-technologies-blog/it-army-ukraine | |
dc.relation | /*ref*/Rid, T. (2017). Cyberwar will not take place. Hurst & Co Publishers Ltd. | |
dc.relation | /*ref*/Sakellariadis, J., y Miller, M. (2023, 25 de febrero). Ukraine gears up for new phase of cyber war with Russia. Politico. https://www.politico.com/news/2023/02/25/ukraine-russian-cyberattacks-00084429 | |
dc.relation | /*ref*/Sanger, D. E. (2018). The perfect weapon: War, sabotage, and fear in the cyber age. Crown. | |
dc.relation | /*ref*/Satter, R. (2023, 11 de abril). Ukrainian hackers say they have compromised Russian spy who hacked Democrats in 2016. Reuters. https://www.reuters.com/world/ukrainian-hackers-say-they-have-compromised-russian-spy-who-hacked-democrats-2023-04-11/ | |
dc.relation | /*ref*/Shapiro, S. (2023). Fancy Bear goes phishing: The dark history of the information age, in five extraordinary hacks. Farrar, Straus and Giroux. | |
dc.relation | /*ref*/Sherman, J. (2022, 18 de noviembre). GRU 26165: The Russian cyber unit that hacks targets on-site. Atlantic Council. https://www.atlanticcouncil.org/content-series/tech-at-the-leading-edge/the-russian-cyber-unit-that-hacks-targets-on-site/ | |
dc.relation | /*ref*/Smeets, M. (2018). The strategic promise of offensive cyber operations. Strategic Studies Quarterly, 12(3), 90-113. | |
dc.relation | /*ref*/Smeets, M. (2022). No shortcuts: Why states struggle to develop a military cyber-force. Oxford University Press. https://doi.org/10.1093/oso/9780197661628.001.0001 | |
dc.relation | /*ref*/Spînu, N. (2021, 21 de octubre). Ukraine cybersecurity governance assessment. DCAF - Geneva Centre for Security Sector Governance. https://www.dcaf.ch/index.php/ukraine-cybersecurity-governance-assessment | |
dc.relation | /*ref*/Stepanenko, K., Barros, G., Bailey, R., Howard, A., y Kagan, F. (2022, 10 de octubre). Russian offensive campaign assessment, October 10. Institute for the Study of War. https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-october-10 | |
dc.relation | /*ref*/Stepanenko, K., Hird, K., Harward, C., Mappes, G., Evans, A., y Kagan, F. (2024, 2 de enero). Russian offensive campaign assessment, January 2, 2024. Institute for the Study of War. https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-january-2-2024 | |
dc.relation | /*ref*/Svantesson, D. J. (2023). Regulating a cyber-militia - Some lessons from Ukraine, and thoughts about the future. Scandinavian Journal of Military Studies, 6(1), 86-101. https://doi.org/10.31374/sjms.195 | |
dc.relation | /*ref*/Svintsytskyi, A. (2022). The system of cybersecurity bodies in Ukraine. Revista Científica General José María Córdova, 20(38), 287-305. | |
dc.relation | /*ref*/The Economist. (2024, 12 de marzo). Why Germany is reluctant to send Taurus missiles to Ukraine. The Economist. https://www.economist.com/the-economist-explains/2024/03/12/why-germany-is-reluctant-to-send-taurus-missiles-to-ukraine | |
dc.relation | /*ref*/Thornton, R., y Mirón, M. (2022). Winning future wars: Russian offensive cyber and its vital importance. The Cyber Defense Review, 7(3), 117-135. | |
dc.relation | /*ref*/Tsagourias, N. (2012). The Tallinn Manual on the International Law Applicable to Cyber Warfare: A commentary on chapter II - The use of force. Yearbook of International Humanitarian Law, 15, 19-43. https://doi.org/10.1007/978-90-6704-924-5_2 | |
dc.relation | /*ref*/Unión Europea. (2023). EU Cyber Direct (cyber diplomacy) project. https://eucyberdirect.eu/research | |
dc.relation | /*ref*/United Nations, Open-ended working group on developments in the field of information and telecommunications in the context of international security [OEWG]. (2021, 10 de marzo). Final substantive report (A/AC.290/2021/CRP.2). https://front.un-arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdf | |
dc.relation | /*ref*/Valeriano, B., Jensen, B., y Maness, R. (2018). Cyber strategy: The evolving character of power and coercion. Oxford University Press. https://doi.org/https://doi.org/10.1093/oso/9780190618094.001.0001 | |
dc.relation | /*ref*/Väljataga, A. (2022, marzo). Cyber vigilantism in support of Ukraine: A legal analysis. NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/library/publications/cyber-vigilantism-in-support-of-ukraine-a-legal-analysis/ | |
dc.relation | /*ref*/Vargas, M. (2023). Competitive advantage in the Russo-Ukrainian War: Ukraine's technological potential against a Kremlin goliath. The Cyber Defense Review, 8(3), 121-133. | |
dc.relation | /*ref*/Vego, M. (2009). Operational warfare at sea: Theory and practice. Routledge. | |
dc.relation | /*ref*/Yin, R. K. (2017). Case study research and applications: Design and methods. Sage Publications. | |
dc.relation | /*ref*/Zenko, M. (2015, 5 de noviembre). Millennium Challenge: The real story of a corrupted military exercise and its legacy. War on the Rocks. https://warontherocks.com/2015/11/millennium-challenge-the-real-story-of-a-corrupted-military-exercise-and-its-legacy/ | |
dc.relation | /*ref*/Antoniuk, D. (2023, 21 de agosto). Ukrainian hackers claim to leak emails of Russian parliament deputy chief. The Record. https://therecord.media/ukrainian-hackers-claim-to-leak-emails-of-russia-duma-deputy | |
dc.relation | /*ref*/Bartholomees, J. B. (2008). Theory of Victory. Parameters, 38(2), 25-36. https://press.armywarcollege.edu/parameters/vol38/iss2/7/ | |
dc.relation | /*ref*/Barthosh, A. (2021, 12 de agosto). Hybrid, secretive, unpredictable: From Goebbels and Münzenberg to modern information battles. Independent Newspaper - Military Review. https://nvo.ng.ru/gpolit/2021-08-12/1_10_11_1153_hybrid.html | |
dc.relation | /*ref*/Belfer Center. (2022). National Cyber Power Index. https://www.belfercenter.org/publication/national-cyber-power-index-2022 | |
dc.relation | /*ref*/Bowen, G. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27-40. | |
dc.relation | /*ref*/Brantly, A. (2022). Battling the bear: Ukraine's approach to national cyber and information security. En M. D. Cavelty y A. Wenger (Eds.), Cyber security politics: Socio-technological transformations and political fragmentation. Routledge. | |
dc.relation | /*ref*/Bronk, C., Collins, G., y Wallach, D. (2023). The Ukrainian information and cyber war. The Cyber Defense Review, 8(3), 33-49. https://n9.cl/k0l72i | |
dc.relation | /*ref*/Centro de Doctrina Conjunta del Ejército Nacional de Colombia [CEDCO]. (2018). Manual Fundamental Conjunto MFC 1.0 Doctrina Conjunta. Comando General de las Fuerzas Militares. | |
dc.relation | /*ref*/Centro de Doctrina Conjunta del Ejército Nacional de Colombia [CEDCO]. (2024). Manual Fundamental Conjunto MFC 5-0 Planeamiento Conjunto. Comando General de las Fuerzas Militares. | |
dc.relation | /*ref*/Cohen, E. (2022, 7 de marzo). The strategy that can defeat Putin. The Atlantic. https://n9.cl/gdmq3 | |
dc.relation | /*ref*/Council on Foreign Relations [CFR]. (2024, 2 de agosto). Cyber Operations Tracker. CFR Digital and Cyberspace Policy Program. https://www.cfr.org/cyber-operations/ | |
dc.relation | /*ref*/Center for Strategic and International Studies [CSIS]. (2024, 6 de agosto). Significant Cyber Incidents. Strategic Technologies Program. https://n9.cl/ko6oa | |
dc.relation | /*ref*/De Landmeter, E. (2018). What constitutes victory in modern war? Militaire Spectator, 187(3), 136-149. https://militairespectator.nl/artikelen/what-constitutes-victory-modern-war | |
dc.relation | /*ref*/Delerue, F. (2020). Internationally wrongful cyber acts: Cyber operations breaching norms of international law. En F. Delerue, Cyber operations and international law (pp. 193-272). Cambridge University Press. | |
dc.relation | /*ref*/Delerue, F. (2023). Is international law fading away in state practice on cyber operations? En F. Cristiano y B. Van den Berg (Eds.), Hybridity, conflict and the global politics of cybersecurity (pp. 31-52). Rowman and Littlefield. | |
dc.relation | /*ref*/Dewar, R. (2014). The “Triptych of Cyber Security”: A classification of active cyber defence. En P. Brangetto, M. Maybaum, y J. Stinissen (Eds.), 6th International Conference on Cyber Conflict. NATO CCD COE Publications. https://www.ccdcoe.org/uploads/2018/10/d1r1s9_dewar.pdf | |
dc.relation | /*ref*/Echevarría, A. (2014). Reconsidering the American way of war: US military practice from the Revolution to Afghanistan. Georgetown University Press. | |
dc.relation | /*ref*/Echevarría, A. (2017). Military strategy: A very short introduction. Oxford University Press. | |
dc.relation | /*ref*/Efrony, D., y Shany, Y. (2018). A rule book on the shelf? Tallinn Manual 2.0 on cyberoperations and subsequent state practice. The American Journal of International Law, 112(4), 583-657. https://doi.org/10.1017/ajil.2018.86 | |
dc.relation | /*ref*/Fox, A. (2023). Comparative proxy strategies in the Russo-Ukrainian War. Comparative Strategy, 42(5), 605-620. https://doi.org/10.1080/01495933.2023.2236488 | |
dc.relation | /*ref*/Fox, A. (2023a, 8 de marzo). Conflict realism: A new school of thought for examining the future of armed conflict. The Strategy Bridge. https://n9.cl/r84qh | |
dc.relation | /*ref*/Fox, A. (2024). Conflict realism: Understanding the causal logic of modern war and warfare. Howgate Publishing Limited. | |
dc.relation | /*ref*/Freedman, L. (2019). La guerra futura. Crítica. | |
dc.relation | /*ref*/Fridman, O. (2017, 1 de marzo). The Russian perspective on information warfare: Conceptual roots and politisation in Russian academic, political, and public discourse. NATO Strategic Communications Centre for Excellence. https://n9.cl/qexh3 | |
dc.relation | /*ref*/Galeotti, M. (2022). The weaponisation of everything: A field guide to the new way of war. Yale University Press. | |
dc.relation | /*ref*/Galula, D. (1964). Counterinsurgency warfare: Theory and practice. Praeger Security International. | |
dc.relation | /*ref*/Giles, K. (2021, 21 de diciembre). Putin does not need to invade Ukraine to get his way. Chatham House. https://n9.cl/p3ueun | |
dc.relation | /*ref*/Gray, C. (1999). Modern strategy. Oxford University Press. | |
dc.relation | /*ref*/Gray, C. (2010). The strategy bridge: Theory for practice. Oxford University Press. | |
dc.relation | /*ref*/Greenberg, A. (2018, 22 de agosto). The untold story of NotPetya, the most devastating cyberattack in history. Wired. https://n9.cl/pbep19 | |
dc.relation | /*ref*/Greenberg, A. (2023, 22 de febrero). Ukraine suffered more data-wiping malware last year than anywhere, ever. Wired. https://www.wired.com/story/ukraine-russia-wiper-malware/ | |
dc.relation | /*ref*/Heim, J., Burdette, Z., y Beauchamp-Mustafaga, N. (2024, 11 de junio). Denial is the worst except for all the others: Getting the US theory of victory right for war against China. War on the Rocks. https://n9.cl/pn60d | |
dc.relation | /*ref*/Hird, K., Lawlor, K., Mappes, G., Barros, G., y Kagan, F. (2022, 14 de octubre). Russian offensive campaign assessment, October 14. Institute for the Study of War. https://n9.cl/hlcqs | |
dc.relation | /*ref*/HM Government. (1963). Conduct of anti-terrorist operations in Malaya. HM Stationery Office. | |
dc.relation | /*ref*/Hogeveen, B. (2022). The UN cyber norms: How do they guide the responsible development and use of offensive cyber capabilities? The Cyber Defense Review, 7(4), 123-142. | |
dc.relation | /*ref*/Hüsch, P., y Jarnecki, J. (2023, 1 de junio). All quiet on the cyber front? Explaining Russia’s limited cyber effects. Royal United Services Institute. https://n9.cl/1argu | |
dc.relation | /*ref*/Ikenberry, G. J. (2011). Liberal leviathan: The origins, crisis, and transformation of the American world order. Princeton University Press. | |
dc.relation | /*ref*/InformNapalm. (2023, 10 de abril). Hacked: Russian GRU officer wanted by the FBI, leader of the hacker group APT 28. https://informnapalm.org/en/hacked-russian-gru-officer/?ref=cyberthreat.report | |
dc.relation | /*ref*/International Institute for Strategic Studies [IISS]. (2023, septiembre). Cyber capabilities and national power. https://www.iiss.org/research-paper/2023/09/cyber-capabilities-national-power-volume-2/ | |
dc.relation | /*ref*/Jensen, E. T. (2017). The Tallinn Manual 2.0: Highlights and insights. Georgetown Journal of International Law, 48, 735-778. | |
dc.relation | /*ref*/Kallberg, J. (2016). Strategic cyberwar theory - A foundation for designing decisive strategic cyber operations. The Cyber Defense Review, 1(1), 113-128. | |
dc.relation | /*ref*/Kenny, A., Locatelli, O., y Zarza, L. (2015). Arte y diseño operacional: Una forma de pensar operaciones militares. Visión Conjunta. | |
dc.relation | /*ref*/Koh, D. (2020, 9 de diciembre). The geopolitics of cybersecurity. The Diplomat. https://thediplomat.com/2020/12/the-geopolitics-of-cybersecurity/ | |
dc.relation | /*ref*/Lawrence, T. E. (1926). Seven pillars of wisdom. Jonathan Cape. | |
dc.relation | /*ref*/Leali, G. (2024, 2 de marzo). Leaked audio shows Germany discussed possible Taurus missiles delivery to Ukraine: Reports. Politico. https://www.politico.eu/article/germany-taurus-missiles-ukraine-war-russia-leaked-audio/ | |
dc.relation | /*ref*/Lewis, J. (2016). Cyberspace and armed forces: The rationale for offensive cyber capabilities. Australian Strategic Policy Institute. | |
dc.relation | /*ref*/Libicki, M. (2009). Cyberdeterrence and cyberwar. The RAND Corporation. | |
dc.relation | /*ref*/Libicki, M. (2016). Cyberspace in peace and war. Naval Institute Press. | |
dc.relation | /*ref*/Mankoff, J. (2022, 22 de abril). Russia’s war in Ukraine: Identity, history, and conflict. Center for Strategic and International Studies. https://www.csis.org/analysis/russias-war-ukraine-identity-history-and-conflict | |
dc.relation | /*ref*/Marsh, S., y Rinke, A. (2024, 5 de marzo). Why a leaked German military recording on Ukraine aid is causing an outcry. Reuters. https://www.reuters.com/world/europe/why-leaked-german-military-recording-is-causing-outcry-2024-03-04/ | |
dc.relation | /*ref*/Maschmeyer, L. (2021, 17 de noviembre). Why cyber war is subversive, and how that limits its strategic value. War on the Rocks. https://warontherocks.com/2021/11/why-cyber-war-is-subversive-and-how-that-limits-its-strategic-value/ | |
dc.relation | /*ref*/McFate, S. (2019). The new rules of war: How America can win against Russia, China and other threats. Harper Collins. | |
dc.relation | /*ref*/McMaster, H. R. (1997). Dereliction of duty: Johnson, McNamara, the Joint Chiefs of Staff, and the lies that led to Vietnam. Harper Perennial. | |
dc.relation | /*ref*/Mearsheimer, J. J. (2018). The great delusion: Liberal dreams and international realities. Yale University Press. | |
dc.relation | /*ref*/Mhalla, A. (2023, 17 de enero). Splinternet: How geopolitics is fracturing cyberspace. Polytechnic Insights. https://n9.cl/gmh70 | |
dc.relation | /*ref*/Miller, M. (2022, 28 de enero). Russian invasion of Ukraine could redefine cyber warfare. Politico. https://www.politico.com/news/2022/01/28/russia-cyber-army-ukraine-00003051 | |
dc.relation | /*ref*/Ministerie van Binnenlandse Zaken en Koninkrijksrelaties & Ministerie van Defensie [AIVD-MIVD]. (2023). De Russische aanval op Oekraïne: een keerpunt in de geschiedenis. https://n9.cl/xyxqy | |
dc.relation | /*ref*/Mirón, M., y Thornton, R. (2024). The use of cyber tools by the Russian military: Lessons from the war against Ukraine and a warning for NATO? Applied Cybersecurity & Internet Governance, 3(1), 147-169. | |
dc.relation | /*ref*/Missiroli, A. (2021). Geopolitics and strategies in cyberspace: Actors, actions, structures and responses (Hybrid CoE Paper 7). The European Centre of Excellence for Countering Hybrid Threats. https://www.hybridcoe.fi/publications/hybrid-coe-paper-7-geopolitics-and-strategies-in-cyberspace-actors-actions-structures-and-responses/ | |
dc.relation | /*ref*/Moore, D. (2022). Offensive cyber operations: Understanding intangible war. Oxford University Press. https://doi.org/10.1093/oso/9780197657553.001.0001 | |
dc.relation | /*ref*/Mueller, G., Jensen, B., Valeriano, B., Maness, R., y Macias, J. (2023, 23 de julio). Cyber operations during the Russo-Ukrainian War: From strange patterns to alternative futures. Center for Strategic and International Studies. https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war | |
dc.relation | /*ref*/Muller, L. P. (2019). Military offensive cyber-capabilities: Small-state perspectives. Norwegian Institute for International Affairs. | |
dc.relation | /*ref*/Organización de las Naciones Unidas [ONU]. (2015, 23 de diciembre). Developments in the field of information and telecommunications in the context of international security (A/RES/70/237). https://digitallibrary.un.org/record/815989?v=pdf | |
dc.relation | /*ref*/Organización del Tratado del Atlántico Norte [OTAN]. (2016, junio). Ukraine Cyber Defense NATO Trust Fund. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_07/20160712_1606-trust-fund-ukr-cyberdef.pdf | |
dc.relation | /*ref*/Organización del Tratado del Atlántico Norte [OTAN]. (2020). AJP 3-20 Allied joint doctrine for cyberspace operations. NATO Standardization Office. | |
dc.relation | /*ref*/Organización del Tratado del Atlántico Norte [OTAN]. (2023). AJP 10-1 Allied joint doctrine for information operations. NATO Standardization Office. | |
dc.relation | /*ref*/Ormrod, A., Ormrod, D., y Slay, J. (2023). Cyber offensive operations in hybrid warfare: Observations from the Russo-Ukrainian conflict. Journal of Information Warfare, 22(1), 76-88. | |
dc.relation | /*ref*/Panarin, I. (2006). Informatsionnaya voyna i geopolitika. Pokolonie. | |
dc.relation | /*ref*/Panarin, I. (2010). Pervaya mirovaya informatsionnaya voyna: Razval SSSR. Piter. | |
dc.relation | /*ref*/Patrick, C. (2019). Debugging the Tallinn Manual 2.0's application of the due diligence principle to cyber operations. Washington International Law Journal, 28(2), 581-604. https://digitalcommons.law.uw.edu/wilj/vol28/iss2/11/ | |
dc.relation | /*ref*/Piernas, J. (2024). El principio de diligencia debida en Derecho internacional y su aplicación al contexto cibernético. Anales de Derecho, 41. https://dialnet.unirioja.es/servlet/articulo?codigo=9296450 | |
dc.relation | /*ref*/Pincus, W. (2023, 26 de septiembre). The future of cyberwar is being shaped in Ukraine. The Cypher Brief. https://www.thecipherbrief.com/column/fine-print/the-future-of-cyberwar-is-being-shaped-in-ukraine | |
dc.relation | /*ref*/Prince, C. [Royal United Services Institute]. (2022, 28 de octubre). The cyber operations series: Understanding offensive cyber operations [Video]. YouTube. https://www.youtube.com/watch?v=dQw4w9WgXcQ | |
dc.relation | /*ref*/Prince, C. [Royal United Services Institute]. (2023, 25 de abril). Cyber operations in Ukraine: A conversation with Victor Zhora | RUSI webinar [Video]. YouTube. https://www.youtube.com/watch?v=3JZ_D3p6MAA | |
dc.relation | /*ref*/Proska, K., Wolfram, J., Wilson, J., Black, D., y Lunden, K. (2023, 9 de noviembre). Sandworm disrupts power in Ukraine using a novel attack against operational technology. Mandiant. https://www.mandiant.com/resources/blogs/sandworm-disrupts-power-ukraine-operational-technology | |
dc.relation | /*ref*/Rastorguev, S. (2006). Informatsionnaya voyna: Problemy i modeli. Radio i syvaz. | |
dc.relation | /*ref*/Render-Katolic, A. (2023, 15 de agosto). The IT Army of Ukraine. Center for Strategic and International Studies. https://www.csis.org/blogs/strategic-technologies-blog/it-army-ukraine | |
dc.relation | /*ref*/Rid, T. (2017). Cyberwar will not take place. Hurst & Co Publishers Ltd. | |
dc.relation | /*ref*/Sakellariadis, J., y Miller, M. (2023, 25 de febrero). Ukraine gears up for new phase of cyber war with Russia. Politico. https://www.politico.com/news/2023/02/25/ukraine-russian-cyberattacks-00084429 | |
dc.relation | /*ref*/Sanger, D. E. (2018). The perfect weapon: War, sabotage, and fear in the cyber age. Crown. | |
dc.relation | /*ref*/Satter, R. (2023, 11 de abril). Ukrainian hackers say they have compromised Russian spy who hacked Democrats in 2016. Reuters. https://www.reuters.com/world/ukrainian-hackers-say-they-have-compromised-russian-spy-who-hacked-democrats-2023-04-11/ | |
dc.relation | /*ref*/Shapiro, S. (2023). Fancy Bear goes phishing: The dark history of the information age, in five extraordinary hacks. Farrar, Straus and Giroux. | |
dc.relation | /*ref*/Sherman, J. (2022, 18 de noviembre). GRU 26165: The Russian cyber unit that hacks targets on-site. Atlantic Council. https://www.atlanticcouncil.org/content-series/tech-at-the-leading-edge/the-russian-cyber-unit-that-hacks-targets-on-site/ | |
dc.relation | /*ref*/Smeets, M. (2018). The strategic promise of offensive cyber operations. Strategic Studies Quarterly, 12(3), 90-113. | |
dc.relation | /*ref*/Smeets, M. (2022). No shortcuts: Why states struggle to develop a military cyber-force. Oxford University Press. https://doi.org/10.1093/oso/9780197661628.001.0001 | |
dc.relation | /*ref*/Spînu, N. (2021, 21 de octubre). Ukraine cybersecurity governance assessment. DCAF - Geneva Centre for Security Sector Governance. https://www.dcaf.ch/index.php/ukraine-cybersecurity-governance-assessment | |
dc.relation | /*ref*/Stepanenko, K., Barros, G., Bailey, R., Howard, A., y Kagan, F. (2022, 10 de octubre). Russian offensive campaign assessment, October 10. Institute for the Study of War. https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-october-10 | |
dc.relation | /*ref*/Stepanenko, K., Hird, K., Harward, C., Mappes, G., Evans, A., y Kagan, F. (2024, 2 de enero). Russian offensive campaign assessment, January 2, 2024. Institute for the Study of War. https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-january-2-2024 | |
dc.relation | /*ref*/Svantesson, D. J. (2023). Regulating a cyber-militia - Some lessons from Ukraine, and thoughts about the future. Scandinavian Journal of Military Studies, 6(1), 86-101. https://doi.org/10.31374/sjms.195 | |
dc.relation | /*ref*/Svintsytskyi, A. (2022). The system of cybersecurity bodies in Ukraine. Revista Científica General José María Córdova, 20(38), 287-305. | |
dc.relation | /*ref*/The Economist. (2024, 12 de marzo). Why Germany is reluctant to send Taurus missiles to Ukraine. The Economist. https://www.economist.com/the-economist-explains/2024/03/12/why-germany-is-reluctant-to-send-taurus-missiles-to-ukraine | |
dc.relation | /*ref*/Thornton, R., y Mirón, M. (2022). Winning future wars: Russian offensive cyber and its vital importance. The Cyber Defense Review, 7(3), 117-135. | |
dc.relation | /*ref*/Tsagourias, N. (2012). The Tallinn Manual on the International Law Applicable to Cyber Warfare: A commentary on chapter II - The use of force. Yearbook of International Humanitarian Law, 15, 19-43. https://doi.org/10.1007/978-90-6704-924-5_2 | |
dc.relation | /*ref*/Unión Europea. (2023). EU Cyber Direct (cyber diplomacy) project. https://eucyberdirect.eu/research | |
dc.relation | /*ref*/United Nations, Open-ended working group on developments in the field of information and telecommunications in the context of international security [OEWG]. (2021, 10 de marzo). Final substantive report (A/AC.290/2021/CRP.2). https://front.un-arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdf | |
dc.relation | /*ref*/Valeriano, B., Jensen, B., y Maness, R. (2018). Cyber strategy: The evolving character of power and coercion. Oxford University Press. https://doi.org/https://doi.org/10.1093/oso/9780190618094.001.0001 | |
dc.relation | /*ref*/Väljataga, A. (2022, marzo). Cyber vigilantism in support of Ukraine: A legal analysis. NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/library/publications/cyber-vigilantism-in-support-of-ukraine-a-legal-analysis/ | |
dc.relation | /*ref*/Vargas, M. (2023). Competitive advantage in the Russo-Ukrainian War: Ukraine's technological potential against a Kremlin goliath. The Cyber Defense Review, 8(3), 121-133. | |
dc.relation | /*ref*/Vego, M. (2009). Operational warfare at sea: Theory and practice. Routledge. | |
dc.relation | /*ref*/Yin, R. K. (2017). Case study research and applications: Design and methods. Sage Publications. | |
dc.relation | /*ref*/Zenko, M. (2015, 5 de noviembre). Millennium Challenge: The real story of a corrupted military exercise and its legacy. War on the Rocks. https://warontherocks.com/2015/11/millennium-challenge-the-real-story-of-a-corrupted-military-exercise-and-its-legacy/ | |
dc.rights | Derechos de autor 2025 Revista Ciberespacio, Tecnologia e Innovación | es-ES |
dc.rights | https://creativecommons.org/licenses/by-nc-nd/4.0 | es-ES |
dc.source | Revista Ciberespacio, Tecnología e Innovación; Vol. 4 Núm. 7 (2025): Sociedad digital y tecnología disruptivas; 15-40 | es-ES |
dc.source | 3028-3310 | |
dc.source | 2955-0270 | |
dc.subject | ciberdefensa | es-ES |
dc.subject | ciberguerra | es-ES |
dc.subject | dominio cibernético | es-ES |
dc.subject | nivel operacional | es-ES |
dc.subject | operaciones cibernéticas | es-ES |
dc.subject | cyber defense | en-US |
dc.subject | ; cyberwar | en-US |
dc.subject | cyber domain | en-US |
dc.subject | operational level | en-US |
dc.subject | cyber operations | en-US |
dc.title | Cyber Operations at the Operational Level of Warfare: Lessons from the Russia-Ukraine Conflict | en-US |
dc.title | Operaciones cibernéticas en el nivel operacional de la guerra: lecciones del conflicto entre Rusia y Ucrania | es-ES |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |