Dr Matthew Ford Profile picture
Apr 28 11 tweets 3 min read
Good summary discussion of Russian battlefield communications and how Ukraine is intercepting calls.

1/

npr.org/2022/04/26/109…
Ukraine cut smartphone roaming to Russian/Belorussian numbers. Russians started using Ukrainian phones. The Ukraine Govt asked civilians to report in the phones that had been stolen.

Hey presto, Ukraine has a backdoor to Russian phone use.

2/
Maybe more significantly, UA is defo making use of US SIGINT planes flying over Poland/Romania.

"I'm sure that they're collecting radio communications & other forms of intelligence that they then pass on to the Ukrainians that is invaluable in their prosecution of this fight"
3/
The question remains:

Why haven't the Russians directly attacked the Ukrainian telecoms networks.

@gregmyre1 suggests it is because the Russians wanted to make use of these networks post-invasion.

4/
But also note the Russians HAVE been attacking Ukraine's comms network.

As Microsoft make clear, attacks have been coordinated with military activity. This implies that hybridity (see #miltwitter eyeroll) is a feature of Russian activity.

5/
blogs.microsoft.com/on-the-issues/…
Microsoft note:

"Starting just before the invasion, we have seen at least six separate Russia-aligned nation-state actors launch more than 237 operations against Ukraine – including destructive attacks that are ongoing and threaten civilian welfare"

6/
"The attacks have not only degraded the systems of institutions in Ukraine but have also sought to disrupt people’s access to reliable information and critical life services on which civilians depend, and have attempted to shake confidence in the country’s leadership"

7/
"The destructive attacks we’ve observed – numbering close to 40, targeting hundreds of systems – have been especially concerning: 32% of destructive attacks directly targeted Ukrainian government organizations at the national, regional and city levels"

8/
"More than 40% of destructive attacks were aimed at organizations in critical infrastructure sectors that could have negative second-order effects on the Ukrainian government, military, economy and civilians"

9/
My own analysis of the information space is (FREE to download) and framed against my book #radicalwar.

The Microsoft report is a fascinating read. Will update this free paper as I take it towards publication.

10/

academia.edu/75845985/The_S…
We might focus on the armoured columns & artillery but the timely collection and fusion of this intelligence may be one of the most important features of the war in Ukraine.

11/

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Dr Matthew Ford

Dr Matthew Ford Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @warmatters

Apr 29
I co-authored this. We've had some great endorsements. About time it got a plug.

'The essential guide to the new war of all against all, where everything is weaponised, & where the lines between peace & conflict are forever blurred'

@peterpomeranzev

hurstpublishers.com/book/radical-w…
'...information has become the overarching domain, with the smartphone, not the rifle, as the granular instrument of combat. A startling rethink of the C21st battlefield that blows away the traditional boundaries between state, society & the military'

@paulmasonnews
'A fascinating assessment of the impact of our ubiquitous access to, and employment of, information & media. Positing a radical vision of war in which perception is reality, this book challenges our norms &, while you might not necessarily like it, you should probably read it!'
Read 8 tweets
Apr 28
So Russian EW capabilities have been summarised by the UA General Staff here:

This is from March 2019 so three years old but still interesting.

Mainly equipment recognition and Table of Equipment & Organisation
1/

brushbeater.org/wp-content/upl… Image
How these systems divide in terms of task and layer.

Also useful equipment recognition as these are the specials that the UA will have wanted to destroy early on in the campaign.

2/ Image
In case you wondered what made up the Leer-3... then here you go.

The RB-341В "Leer-3" electronic warfare system supported by Orlan-10 drones. Task is to intercept satellite navigation signals, 3G, 4G communications and text messages.

The anti-smartphone system!

3/ Image
Read 6 tweets
Apr 28
I'm linking a couple of threads together because they all have connections back to this Microsoft Report on Hybrid (military-cyber) attacks on Ukraine.

#radicalwar

1/
This Russian battlefield communications thread shows what happens when you have to rely on civilian telecoms grids.

2/
Developing the implications of both the cyber attacks AND Russian use of stolen Ukrainian SIM cards is this story.

This is about Russian hacks for personal data.

The goal?

To identify Ukrainians who are pro-Russian from those who need to be isolated.
3/
apnews.com/article/russia…
Read 9 tweets
Apr 28
Human-machine interfaces, user fatigue and operational effectiveness.

Nice provocation from @anderspuck

1/

Modern battlefields are lethal. At the same time days of repetitive effort with little going on leads to user fatigue.

Combined with poor drills and bored personnel the implication is that smart tech needs to be user proof.

2/
Similar stories apply to all sorts of military technology. Ergonomics is easily overlooked as a drag on weapon optimisation.

At the same time, put the magazine catch on the wrong side of the receiver and watch that mag fall onto the floor....

3/
Read 4 tweets
Apr 28
This is an important report from Microsft.

It shows that operations have been hybrid in nature. That military and cyber attacks have been coordinated.

1/
Microsoft show the geographical relationship between cyber and military activity.

2/
The put the cyber/military attacks into chronological order.

3/
Read 8 tweets
Apr 26
So just to be clear, we’re looking at approximately a 2 year replenishment rate for gear that has been given to Ukraine?
And we wonder why NATO powers are having to carefully consider what they donate and how they might stand a chance of standing behind Article 5.

There’s a lot more going on here and the repercussions are going to be HUGE for NATO members.
Ukraine has dropped off the Insta radar but the ramifications of the war in Ukraine will keep rebounding on us.

We need to get used to the new real:

Food insecurity leading to migration
Cost of living crisis leading to recession
Recession leading to reduced defence spending
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(