{"id":10550,"date":"2022-08-01T09:00:26","date_gmt":"2022-08-01T12:00:26","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10550"},"modified":"2022-08-01T09:00:26","modified_gmt":"2022-08-01T12:00:26","slug":"estados-unidos-busca-entender-el-supuesto-fracaso-de-rusia-para-proyectar-poder-cibernetico-en-ucrania","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10550","title":{"rendered":"Estados Unidos busca entender el supuesto fracaso de Rusia para proyectar poder cibern\u00e9tico en Ucrania"},"content":{"rendered":"<p>Si bien Rusia us\u00f3 ataques cibern\u00e9ticos para reforzar su invasi\u00f3n del 24 de febrero y contin\u00faa aprovechando el dominio digital para apoyar sus ofensivas. Al respecto, lo que no se ha visto, y lo que muchos esperaban, son ataques masivos que paralicen las centrales el\u00e9ctricas y otras infraestructuras y que tomen represalias contra aquellos que ayudan a Ucrania. A esta altura, muchos se preguntan el por qu\u00e9 estas expectativas no se cumplieron.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">WASHINGTON \u2014 After some five months of war raging in Eastern Europe, feared Russian ranks of hackers have had an underwhelming impact on Ukrainian networks and critical infrastructure in the U.S. and other nations. The question is: why?<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cWith regard to the Russian use of cyber and our takeaways, there are any number of theories for what we saw and what, frankly, we didn\u2019t see,\u201d Anne Neuberger, deputy national security adviser for cyber and emerging technology, said July 20 at\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=wVtoQ2M8KRw\" target=\"_blank\" rel=\"noopener\">the Aspen Security Forum<\/a>.<\/p>\n<p>\u201cSome argue for the deterrence the U.S. has put in place,\u201d she said, pointing to President Joe Biden\u2019s meeting with Russian President Vladimir Putin following the Colonial Pipeline ransomware attack. \u201cSome argue that it was the result of the extensive cybersecurity preparations Ukraine did, supported by allies and partners. And some argue that we don\u2019t quite know.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">While Russia did use cyberattacks to buttress its Feb. 24 invasion and continues to leverage the digital domain to aid its lurching offensives, what hasn\u2019t been seen \u2014 and what many expected \u2014 are\u00a0<a href=\"https:\/\/www.defensenews.com\/cyber\/2022\/06\/17\/prolonged-war-may-make-russia-more-cyber-aggressive-us-official-says\/\" target=\"_blank\" rel=\"noopener\">massive hacks that cripple power plants<\/a>\u00a0and other infrastructure and retaliate against those assisting Ukraine.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Russia, historically, uses cyber to project power and meddle in foreign affairs. An International Institute for Strategic Studies report in 2021 placed the country in tier two of its cyber powerhouse rankings, alongside China but behind the U.S.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 bPFQNZ a-heading2\"><strong>Why hasn\u2019t Russia dominated with cyberattacks?<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Exactly why the cyber operations\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/04\/29\/feared-russian-cyberattacks-against-us-have-yet-to-materialize\/\" target=\"_blank\" rel=\"noopener\">have fallen short<\/a>\u00a0of expectations thus far is still up for debate, according to Neuberger, who previously served as the National Security Agency\u2019s cybersecurity chief.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Biden in March said evolving intelligence showed Russia was planning stateside cyberattacks and cautioned the magnitude was \u201cfairly consequential.\u201d Neuberger on Wednesday said the potential for future attacks is being monitored very closely.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cIt\u2019s something I talk about with my\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/05\/05\/nsa-cyber-boss-seeks-to-discourage-vigilante-hacking-against-russia\/\" target=\"_blank\" rel=\"noopener\">intelligence and cyber colleagues<\/a>\u00a0around the world regularly,\u201d she said.<\/p>\n<p>U.S. Cyber Command worked with Ukraine to reinforce network defenses and conducted related offensive operations, according to Gen. Paul Nakasone, who leads both the command and the NSA.<\/p>\n<p>CYBERCOM also dispatched specialists to nearby Lithuania for three months to root out malign activity and inform future security efforts. Lithuanian Vice Minister of National Defense Margiris Abukevicius<a href=\"https:\/\/www.airforcetimes.com\/cyber\/2022\/05\/05\/us-cyber-squad-boosts-lithuanian-defenses-amid-russian-threat\/?contentFeatureId=f0fmoahPVC2AbfL-2-1-8&amp;contentQuery=%7B%22section%22%3A%22%2Fhome%22%2C%22exclude%22%3A%22%2Fcyber%22%2C%22from%22%3A5%2C%22size%22%3A10%7D\" target=\"_blank\" rel=\"noopener\">\u00a0<\/a>at the time said the \u201cwar against Ukraine has demonstrated that cyberattacks are an inseparable element of modern military campaigns\u201d and\u00a0<a href=\"https:\/\/www.airforcetimes.com\/cyber\/2022\/05\/05\/us-cyber-squad-boosts-lithuanian-defenses-amid-russian-threat\/?contentFeatureId=f0fmoahPVC2AbfL-2-1-8&amp;contentQuery=%7B%22section%22%3A%22%2Fhome%22%2C%22exclude%22%3A%22%2Fcyber%22%2C%22from%22%3A5%2C%22size%22%3A10%7D\" target=\"_blank\" rel=\"noopener\">preparations must be made<\/a>\u00a0\u201cduring war and peace alike.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Should an attack reach U.S. networks, the country is better prepared to identify the intrusion and ultimately defend itself, Neuberger said, citing the administration\u2019s \u201crelentless focus on improving the security of critical infrastructure\u201d and investment in alliances and information sharing.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">In June, U.S. officials said \u201crobust\u201d resources would be provided to a newly forged NATO program known as the \u201cvirtual rapid response cyber capability.\u201d The cooperative, the\u00a0<a href=\"https:\/\/www.marinecorpstimes.com\/cyber\/2022\/06\/30\/nato-forging-cyber-response-force-amid-growing-russian-chinese-threats\/\" target=\"_blank\" rel=\"noopener\">product of a summit in Madrid<\/a>, will use lessons learned from the Russia-Ukraine war to shape its approach.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/07\/21\/us-seeking-to-understand-russian-failures-to-project-cyber-power-in-ukraine\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si bien Rusia us\u00f3 ataques cibern\u00e9ticos para reforzar su invasi\u00f3n del 24 de febrero y contin\u00faa aprovechando el dominio digital para apoyar sus ofensivas. Al&hellip; <\/p>\n","protected":false},"author":1,"featured_media":10551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10550"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10550"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10550\/revisions"}],"predecessor-version":[{"id":10552,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10550\/revisions\/10552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/10551"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}