Ukrainian Soldiers assigned to 1st Battalion, 80th Airmobile Brigade fire a ZU-23-2 towed antiaircraft weapon before conducting an air assault mission in conjunction with a situational training exercise led by Soldiers from 6th Squadron, 8th Cavalry Regiment, 2nd Infantry Brigade Combat Team, 3rd Infantry Division, Nov. 28, 2016 at the International Peacekeeping and Security Center. This training is part of their 55-day rotation with the Joint Multinational Training Group-Ukraine.

Russia adjusts its information operations to fit the conflict.

From Georgia to Crimea

January 2020, Number 10.01

“Russia has a long history of propaganda and disinformation operations — techniques it now adapts to the online environment. As the information space expands beyond the technologies facilitating its use, Russia uses broad information-based efforts classified by their effects: information-technical and information-psychological. A major milestone for these efforts surfaced in 2008 when pro-Russian cyber attacks occurred concurrently with Russian military operations in Georgia. During that brief conflict, a resilient Georgia overtook Russia in the larger information war, forcing Russia to rethink how it conducted information-based operations. Six years later, Russia adjusted its information confrontation strategy against Ukraine to quickly and bloodlessly reclaim Crimea and keep potentially intervening countries at bay. Clearly, Russia finds value in manipulating the information space, particularly in an age when news can be easily accessed through official and nonofficial outlets. Building on its success in Crimea, Russia is outpacing its adversaries by leveraging the information space to bolster its propaganda, messaging and disinformation capabilities in support of geopolitical objectives...”

Excerpt from Emilio J. Iasiello, “From Georgia to Crimea,” per Concordiam: Journal of European Security Defense Issues 10, No. 1, 2020: 10-15.

Emilio J. Iasiello is a cyber security expert with more than 15 years’ experience in cyber threat intelligence, leading teams in the public and private sectors. He has delivered cyber threat presentations and has published extensively in peer-reviewed journals and cyber security blogs. He has a bachelor’s degree from the College of Holy Cross, a master’s degree from George Mason University, and a master’s degree from the online American Military University.

This article reflects the views of the author and are not necessarily the official policy of the United States, Germany, or any other governments.