<<

The Dark Mirror: Gerasimov’s Hybrid War in

The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters

Citation Newton, Caleb. 2018. The Dark Mirror: Gerasimov’s Hybrid War in Ukraine. Master's thesis, Harvard Extension School.

Citable link https://nrs.harvard.edu/URN-3:HUL.INSTREPOS:37365418

Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Dark Mirror:

Gerasimov’s Hybrid War in Ukraine

Caleb Newton

A Thesis in the Field of International Relations for the Degree of Master of Liberal Arts in Extension Studies

Harvard University

November 2018 Copyright 2018 Caleb Newton Abstract

This thesis investigates to what extent General Valery Gerasimov’s “hybrid” warfare approach is being used in ’s military intervention in Ukraine. Much debate over exactly what is Russia’s strategy in Ukraine is ongoing and Gerasimov’s exact influence on it. This thesis discusses the approach Gerasimov advocates in terms of

Russian cyberwarfare, influence campaigns and broader dynamics, such as the competition between civilian and military intelligence in Russia. General Gerasimov’s position as Chief of the General Staff of the Armed Forces of the Russian Federation and

First Deputy Minister of Defense of the Russian Federation, his closeness to the highly influential Defense Minister Sergei Shoigu and his willingness to argue for the modernization of the Russian military in a way that uses advanced low cost and high impact hybrid war techniques make it likely that he is and will continue to highly influence Russian military approaches in Ukraine and elsewhere. As a method to counter

Gerasimov’s hybrid war techniques, this thesis proposes a de-escalation strategy that interferes with Russian information manipulation and also reduce violence that could escalate to a minimum.

Table of Contents

List of Figures ...... v

Chapter I. Introduction to the Research ...... 1

Research Problem ...... 6

Research Proposition ...... 7

Chapter II. Gerasimov’s Information War ...... 8

Chapter III. Russian Cyberwarfare and Gerasimov ...... 41

Chapter IV. Gerasimov’s Importance ...... 61

Chapter V. Countering Gerasimov through De-Escalation ...... 76

Chapter VI. Conclusions ...... 84

References …………………………………………………………………………….....87

List of Figures

Figure 1. Value of the Russian Ruble through 2015……………………………………..14

Figure 2. A Graphical Representation of Gerasimov’s Proposed Approach to Hybrid

Warfare Based on Western Color ……………………………………….. 34-5

Figure 3. Gerasimov Presentation to the 2017 Conference on International

Security…………………………………………………………………………………..42

Figure 4. Cholera Epidemic and Violence in Chicago (Slutkin, 2013) Compared with an

OSCE Map of Civilian Casualties in (OSCE, 2017) ………………….82

Chapter I.

Introduction to the Research

Ironically, it would be in a hotel named after a famous North American frontiersman Pierre-Espirit Radisson—the Radisson Hotel in Moscow—in a security conference shortly after the in Ukraine that General Valery

Gerasimov would outline his strategy to strike back at the West’s continued interference in international affairs—especially in the states that it felt were in the Russian sphere of influence (Cordesman, 2017). The Chief of the General Staff of the Armed Forces and

First Deputy Minister of Defense of the Russian Federation had published his now famous speech from the conference the year before in the article The Value of Science is in the Foresight in 2013 roughly a year before the fell, where he clearly argued Russia should turn the color revolution (which he saw as a method of war) into a Russian method of war; in other words, Russia should wage wars in the same

“hybrid” fashion he saw the west fighting their “wars”—e.g. color revolution coups

(Gerasimov, 2016b; Bartles, 2016). Gerasimov’s articulation of this principle in this article eventually led to this approach being called the “Gerasimov Doctrine” by

(Galeotti, 2018).

In that hotel conference, Gerasimov argued for a multipolar world with spheres of influence and that Russia itself use color revolutions as a guide for waging low cost, destabilizing wars around the world (Cordesman, 2017, p. 12-13). It appears Russia has followed the advice of the Chechen war hardened general. President Trump’s former

National Security Adviser General H.R. McMaster noted that democracies around the

world are under attack: “We’ve seen that this is really a sophisticated effort to polarize democratic societies and pit communities within those societies against each other”

(Garcia &Torres, 2018). Although some claim this is simply a revival of poltical warfare, this view ignores Russian military thinkers like Gerasimov and wishes to understand post-Soviet Russian information warfare as merely an antiquarian rebirth of the Soviet propaganda and information manipulation that preceded it. Modern Russian information warfare is a combination of the parallel and entertwined developments of the

Russian economic and political system. Gerasimov’s approach is the logical extension of these developments and Russian military approaches and theories—such as the deep operation theory advanced by Georgy Isserson who he quotes in The Value of Science is in the Foresight (Gerasimov, 2016b).

The Russian economy—much like Gerasimov’s vision of the future of Russian warfare—is a dark reflection of Western systems they tried to implement there. After the collapse of the , Russia embraced the market in a chaotic and haphazard manner that turned the tightly controlled Soviet economic space into a free-for-all; determined to ensure Russia could never return to , free marker reformers subjected the Russian economy to “shock therapy”—a process that led to massive inflation and the concentration of formerly state owned resources into the hands of a few—the infamous Oligarchs of Russia (Gustafson, 2012). The lawless form of

”—a label economist Robert Reich rejected as inappropriate for the Russian system—proved better at fostering criminality than liberalism (Reich, 2001). A whole spam industry designed to troll, spam and promote through comments and fake review arose in Russia (Sanovich, 2017). For a relatively low cost, you could enlist Russians to manipulate the web. Organized crime through very professional sounding entities like the

2

“Russian Business Network (RBN)” facilitated the “use and lease [of] botnets for various purposes” (Shakarian, 2011). In 2008, the Russians would be one of the first armies in the world to use a Distributed Denial of Service Attack as a weapon of war in their brief war with (Shakarian, 2011). Physical armies would fight the Georgians in person while armies of bots hosted on infected computers would overload strategic internet resources of the Georgian government. Hackers—directed by the Russian state—sought to ensure Georgia was defeated both with through force and technologicallly.

At the same time of the growth of this nascent spam industry, a flourishing legitimate online media and tech industry developed in Russia in the 1990s and 2000s, and Russia’s Search Engine Optimization industry became mature and skilled (Sanovich,

2017, p. 9). These two sectors—both harnessing the immense technical prowess and potential of young Russian computer scientists and engineers—would soon meet in service to the Russian state—or at least those who wielded its power. President

Medvedev—who both launched the Russian invasion of Georgia and with whom Obama believed he could “reset” relations—desperately wanted to be popular. A insurgent free press on the social media platform LiveJournal—a based social media—was savaging the the Kremlin and providing a venue for political discussions and information

(Sanovich, 2017). President Medvedev became known as “blogger-in-chief” and used

Facebook, , Youtube and LiveJournal to wage a charm offensive aimed at influencing the Russian public. He failed. Realizing their failure to control social media through charisma, it was under Medvedev that the Kremlin began employing large scale sophisticated marketing techniques and social media bots (Kelly et al., 2012; Sanovich,

2017). If they could not dominate social media with a populist message and a dynamic spokesman—President Medvedev—then they would spam it with the narratives they

3

wanted the Russian public to see. While walled off their internet, Russia saw an opportunity to instead manipulate a new space.

As the Kremlin consolidated its power, it could not shake its biggest fear—a color revolution. Color revolutions preoccupied the mind of the Russian military as these revolutions overthrew corrupt regimes throughout the former Soviet Union and Middle

East. It was Ukraine’s that led to the creation of a new vanguard of youth movements that trolled the opposition and pioneered the kind of social media manipulation Russia would become infamous for (Parfitt, 2005; Osborn, 2005; Sanovich,

2017; Walderman, 2007). It was in this context that Russia’s General Gerasimov—a general somewhat unknown to those outside of the Russian military and faced the prospect of more color revolutions—penned the now famous article The Value of Science is in the Foresight where he argues that Russia can transform its warfighting using a

Russian version of a color revolution (Gerasimov, 2016b). Russia could turn its

“science”—here both its cyberwarfare capability and the technology based political manipulation it uses within Russia to manipulate the public through the fractures within the society that lead to polarization, antipathy and, if exacerbated, chaos. Gerasimov sees the genius of color revolution—engineered social upheavals that provide an opportunity for new leadership that may openly court becoming a client state of the revolution’s sponsor.

Although General Gerasimov consistently claims that is a western invention and something that Russia should learn from, his work and name have become synonymous with it:

Such definitions almost invariably draw on parts of Gerasimov’s article, in

4

which he does indeed state that the “role of non-military means has grown

and in many cases exceeded the power of force of weapons in their

effectiveness.” He also points to the important roles of special operations

forces and “internal opposition to create a permanently operational front

through the entire territory of the enemy state,”and the blurring of the lines

between war and peace….Gerasimov’s article is an important source for

understanding Russian thinking, particularly the efforts of the Russian

leadership to adapt to warfare in the ... (Monaghan, 2016, p.

67)

This thesis recognizes that hybrid warfare is a word that carries with its own ambiguity— much like the warfare it is associated with. Indeed, the term itself has certainly evolved since its original creation in the West (Monaghan, 2016) Nonetheless, there is a growing body of literature around the term and this thesis will use it, because Gerasimov’s approach is so closely associated with it. When this thesis refers to hybrid warfare it is referring to a blend of conventional kinetic operations combined with other non- conventional tactics, such as political meddling, economic shocks and psychological, behavioral and social meddling.

Further, this thesis generally refers to Gerasimov’s “approach” rather than the

“Gerasimov Doctrine” because there is no evidence this is a “doctrine” of the Russian military—especially in terms of some sort of dogmatic and complete approach to war

(Galeotti, 2018; Galeotti, 2014). Gerasimov’s ideals appear to be evolving based on his experience in the war in Eastern Ukraine, and various operations around the world.

Although The Value of Science is in the Foresight is one of the best articulations of

Gerasimov’s approach (especially the idea of exploiting social fractures), Gerasimov

5

tends to refine and update his thoughts in a yearly speech he gives at the Moscow

Conference on International Security. Portraying his approach as anything less than adaptive, malleable and continually being refined would be wrong.

Further, Gerasimov’s articles and speeches are part of a larger debate within the

Russian government and military as it modernizes from Soviet era technology and approaches. As this thesis will discuss later, Gerasimov’s position and connections inside the government means he is a key participant in this debate. The Russian military has undergone a significant, expensive and large-scale modernization effort, and it is without doubt the tank commander of the brutal Chechen conflict who now serves at the highest echelons of Russian military is trying to convince the military to adapt and improve western approaches to allow Russian to compete as a global hegemon—not a marginalized backbencher. Gerasimov wants to beat the West, not merely match it: “We must not copy foreign experience and chase after leading countries, but we must outstrip them and occupy leading positions ourselves. This is where military science takes on a crucial role (Gerasimov, 2016).” Gerasimov, though, is likely both portraying his own thinking and that of others within the Russian military and government. With every speech by General Gerasimov, we see someone committed to turning what he sees as the

Western military color revolution approach back against the West and its allies— including Ukraine—to create a stronger, modern and more effective Russian military.

Research Problem

This thesis’s central research question is: “To what extent is Gerasimov’s ‘hybrid’ warfare approach being used in Russia’s military intervention in Ukraine?” Debate over

6

exactly what is Russia’s strategy in Ukraine is ongoing, and as the war continues, the debate demands more analysis and scholarship.

Research Proposition

I hypothesize that, in large part, Gerasimov’s hybrid warfare approach is essentially how the war in Ukraine is being conducted—with the annexation of being an almost flawless execution of it and Eastern Ukraine being a much less successful implementation that has largely failed—for the time being. The Russian military has thus resorted to sending thousands of conventional and special operations forces to fight the Ukrainian Military instead of a robust local separatist movement. This thesis also posits that General Gerasimov’s approach is firmly embedded within the evolutionary track of the Russian military where information and cyberwarfare campaign are being used in concert with conventional and Special Operations forces.

7

Chapter II.

Gerasimov’s Information War

This section argues that Russian concerns over a domestic color revolution combined with an unscrupulous private sector, incomplete and an ambitious Russian military sector led to the creation of the modern misinformation machine that is being aimed at Ukraine. Gerasimov’s approach relies heavily on the effectiveness of the technology behind its social manipulation, and it is incorrect to simply dismiss it as a reformulation of past Soviet and deception methods.

As the 1980s were coming to a close, a new reality seemed to be emerging. Oil prices, which had long acted as an international subsidy for communist and socialist regimes around the world, fell from their heights in the 1970s (Holodny, 2016; Ermolaev,

2017). Gorbachev was trying to transform the Soviet Union—which had slaughtered millions through wars, starvation and purges—into something new and western sounding— and , which roughly mean restructuring and transparency.

Chinese nationalists sent shockwaves around the world as the occupied Tiananmen

Square—a symbol of the Chinese nation—and demanded greater political freedom. It seemed the long march for the freedoms and ideas first dreamed of in the Enlightenment and fought for in countless battles and proclaimed in a thousand marches were finally winning in the world. Freedom was winning.

By December 25, 1991, a weary Gorbachev—who had spent the night before weeping at his failure—called George H.W. Bush to wish him a Merry Christmas

(O'Clery, 2016). Borrowing a pen from the President of CNN, he signed the Soviet Union out of existence (Oberdorfer, 1992; O'Clery, 2016). From an office arranged for the

8

occasion, he delivered a final address as Yeltsin’s men moved his belongings out of the official residence where he had lived as the leader of one of the most powerful and feared empires in world history:

The process of renovating the country and radical changes in the world

turned out to be far more complicated than could be expected. However,

what has been done ought to be given its due. This society acquired

freedom, liberated itself politically and spiritually, and this is the foremost

achievement which we have not yet understood completely, because we

have not learned to use freedom. (Gorbachev, 1999)

The news conference had been attended mostly by American journalists—the Russian media had lost interest (O'Clery, 2016). And so, the last Premier of the Soviet Union became a mere citizen of the new Russian Federation. The Nobel peace prize winning

USSR leader Gorbachev who had dominated the world for half a decade became nothing in an instant as Lenin and Marx’s cruel experiment ended in . The

President of CNN asked for his pen back (O'Clery, 2016).

A new experiment was beginning, though. Could the principles of democracy that had worked so well in Westernized countries and Japan since World War II transform the former Soviet Union into prosperous and free countries as well? Or would it return to ?

Although the majority of nations around the world were a democracy or moving in that direction by granting political freedom, it is the ancient Greeks that could have best answered this question for the new Russia rising from the ashes of communism and authoritarianism. Athens is often pointed to as the father of all democracies, but it was the

9

tortured parent of modernity. It succumbed to coups by the oligarchic class—including a puppet regime controlled by Sparta that conducted brutal political pogroms that left over a thousand Athenians dead, and when democracy was finally restored, a jury of several hundred voters delivered a guilty verdict against their greatest citizen—Socrates—and sentenced him to death (Crain, 2016; Martin, 2000). In the Republic Plato (1992) would suggest philosopher kings as a solution to Athen’s failed democracy because they could exercise a strict control over those who stir up the passions and praise the unvirtuos and tyranny.

Russia had no virtuos philosopher kings. It had Yeltsin. Yeltsin likened himself to

Russia’s George Washington—a hero of his (Ostrow et al., 2013). The rose-faced drunkard was no George Washington. Yeltsin and his allies sold off Russian state assets for a pittance—finishing a process of economic consolidation by oligarchs that began under Gorbachev’s economic reforms and efforts at a partially free market (Reddaway &

Glinski, 2001). A similar process began under Ukraine’s first President who helped elevate the oligarch to be (a russophile whose later daughter would have Putin as a godfather) to prominence and facilitated the corrupt privatization of the former Soviet assets (Wilson, 2015, p. 270; Bazaluk, 2016). Kuchma relied on eastern Ukraine-based oligarchs—such as the Dnipropetrovsk based oligarchs

(Matuszak, 2012). This included one of the eventual leaders of the Orange Revolution—

Yulia Tymoshenko. Indeed, virtually every party in Ukraine since the fall of the Soviet

Union has been backed by one of a handful of Oligarchs—although in the last

Presidential election it was an oligarch himself () who was the candidate and victor (Åslund, 2015).

10

These part criminal, part businessmen oligarchs had just as much influence in

Russia. Yeltsin’s seven bankers—the oligarchs whom he allied himself with and enriched him—funded the controversial President’s campaign and enriched themselves through their connection to him (Johnson, 2000). Much like Ukraine, the favored Oligarchs changed with each new president. For Yeltsin, the that had helped him retain his grip on power and enrich himself and his family would be the death nail for his presidency. A Swiss firm was reported to have bribed Yeltsin and other members of the

Russian government with millions of dollars in kickbacks for lucrative renovation contracts to restore the Kremlin (LaFraniere, 1999). Although the head of the Federal

Security Service of the Russian Federation (FSB)—a Yeltsin loyalist—was able to force the resignation of Russia’s chief investigative prosecutor by filming him having sex with several prostitutes in a honeypot scheme, the pressure on Russia’s embattled and iconic demagogue was too much. Renewed terrorist attacks by Chechen Rebels after the humiliating defeats of the Russian military during the and the controversial Khasav-Yurt Accord that gave de-facto autonomy were cutting deeply into his public image (Schaefer, 2010). Further, impeachment proceedings against the president instigated by the communists and, more generally, the Duma’s many attempts to undermine him were pushing the president’s approval into single digits

(Nelson & Kuzes, 1994). The corruption scandal made the president realize he needed a successor who was not his political opponent and would pardon him of all his crimes. His choice was who had already helped get the government’s chief prosecutor fired through the honeypot scheme mentioned above; through this Yeltsin avoided prosecution for his own corruption in office and his family and those around him (Ioffe,

2017a).

11

The man who had studied George Washington and often proved to be his own worst enemy did not allow his own resignation to follow the same chaotic pattern as that of Gorbachev. Instead, he delivered a powerful, introspective and paternalistic televised speech that echoed the fears of Gorbachev and was remorseful at his own inability to move Russia to the successful democracy it had expected:

I want to ask you for forgiveness, because many of our hopes have not

come true, because what we thought would be easy turned out to be

painfully difficult.

I ask [you] to forgive me for not fulfilling some hopes of those people who

believed that we would be able to jump from the grey, stagnating,

totalitarian past into a bright, rich and civilized future in one go.

I myself believed in this. But it could not be done in one fell swoop. In

some respects I was too naive. Some of the problems were too complex.

We struggled on through mistakes and failures. At this complex time

many people experienced upheavals in their lives. But I want you to know

that I never said this would be easy....

I am leaving. I have done everything I could. (Yeltsin, 1999)

He had given Russia the only gift he could still give—a peaceful and stable transition from his failing presidency. Later that day Putin gave him a full pardon and a lifetime pension (Bohlen, 2000). Democracy and liberalism were harder to engender in Russia than Yeltsin and his western partners had believed. In fact, they were harder for Yeltsin himself to embrace fully in his presidency than he had believed.

12

Putin would lay out the central thesis of his Presidency the day following

Yeltsin’s dramatic surrender of power—stability. He promised the Russian people:

I am drawing your attention to the fact that there will be no power

vacuum, even for a moment…[t]here has been no vacuum, nor will there

be one. I want to warn that any attempt to exceed the limits of the law, and

Russia's Constitution, will be decisively crushed. (Bohlen, 2000)

There would be no resurgence of communism. There would be no coup. No chart illustrates Putin’s steady hand promise fulfilled than the steady value of the Ruble following his ascendancy to the presidency until the war in Ukraine (Fig. 1). Currency within the post-Soviet republics periodically engaged in financial market whiplash, but

Putin, whether through skill or by presiding over a relatively long period of high oil prices with a petro backed ruble, has presided over a remarkably stable Ruble for most of his reign.

13

Figure 1. Value of the Russian Ruble through 2015.

From Grannis, 2014.

Putin was able to use his relative success compared to Yeltsin to consolidate his control over the country, rollback democratic institutions and continue the process

Yeltsin had begun in terms of solidifying oligarchic control over the economy and politics—although he would make himself the oligarch of oligarchs and the state would serve his political and economic interests (Goldman, 2004). Although Putin found himself catapulted into the presidency by Yeltsin, he later—when firmly in power— would make clear that he did not agree with Yeltsin’s role in the breakup of the Soviet

Union:

First and foremost it is worth acknowledging that the demise of the Soviet

Union was the greatest geopolitical catastrophe of the century…[a]s for

the Russian people, it became a genuine tragedy. Tens of millions of our

14

fellow citizens and countrymen found themselves beyond the fringes of

Russian territory. The epidemic of collapse has spilled over to Russia

itself. (Associated Press, 2005)

Indeed, Putin would echo two of the charges leveled against Yeltsin by the communist party during the botched impeachment trial that helped Putin rise to power. They charged, “Yeltsin had illegally broken up the Soviet Union in December” and “had carried out acts leading to the genocide of the Russian people” (Satter, 2003, p. 57-58).

This mentality—remiss for the former power and prestige of the Soviets—wedded to hunger for gaining and retaining power in an oligarchy would prove a crucial catalyst for the development of the information weapons that Russia would use in its war in Ukraine.

The war in Ukraine shares similarities to many of the conflicts in the post-Soviet space; the USSR and Russian Empires infused structural tensions into the regions it governed—often inflaming tensions through internal propaganda that set one group against another. Indeed, before the USSR had formally ended and Gorbachev had resigned, the restive republics were already experiencing turmoil. In the eastern and most industrial part of Moldova, rebels were already trying to declare independence before the small Soviet republic declared independence itself (Czerewacz-Filipowicz and

Konopelko, 2017, p. 279). This was not eastern Ukraine circa 2014—which had never had serious attempts at secession before Russian interference after the Euromaidan revolution. This was the highly industrialized region of Transnistria, which accounted for much of the GDP of Moldova at the time of the collapse of the USSR and still generates significant output based on those aging Soviet factories (Całus, 2013). The region holds a large strategic stockpile of Soviet weapons—still the largest in Europe—and a large population of eastern Slavs (primarily Russians and ) who were the majority

15

and had ruled the area. During a short and brutal , Transnistrian rebels, with the support of the former Soviet (now Russian) military stationed there, were able to defeat the Moldovan government’s efforts to regain the territory within its internationally recognized borders. The Russian government—although unwilling to recognize

Transnistria as an independent country or annex it outright—remains the lifeline for this breakaway republic of Soviet émigrés and continues to keep its military on its territory.

Although many Moldovans avoid this area and it has gone from the most productive area of the country to a decaying backwater that many travelers avoid and the government isolates, its legacy haunts Europe (Bugajski, 2004). Its weapon stockpiles were used during the civil wars and genocides as Yugoslavia collapsed, and it continues to retard the development of Moldova—a country that looks to Romania and the EU for its future economic development. More importantly Transnistria would set a familiar script that virtually every post-Soviet Russian supported separatist conflict has had: (1) a

“persecuted” minority (generally ethnic Russians) who identify with the Soviet Union and Russia, (2) a contingent of Russian “volunteers” with Russian military support— especially Russian “Cossacks,” and, (3) propaganda that exploits “fractures” created by

Soviet colonization, propaganda and deportation.

Although the Transnistrian civil war was before the reemergence of a strong

Russian propaganda media presence through outlets such as RT or Sputnik or the state sponsored spam of recent vintage, the conflict relied heavily on a field made fertile by years of Romanian-phobia engender by the Soviets to counter the fascist Romanian government of World War II (Nantoi, 2013). Indeed, the Soviets continued to fight World

War II long after the last bullets were fired by labeling those who opposed them as fascist vestiges—something aided by the fact that fascist Romania and some Ukrainian

16

nationalists participated willingly in the holocaust and the brutal German rule that called for it (Zabarko, 2005; Ancel, 2017). A decade and a half after the end of the civil war, the

Economist found evidence that Russia was using propaganda to try and promote

Transnistrian independence through fake think tanks and obscure media outlets (The

Economist, 2006). They also noted that the source appeared to be the same one that had earlier tried to discredit Georgian President Mikhail Saakashvili. Indeed, Russia at the same time was training its weapons of information warfare on Georgia to keep it within its orbit and promote the Russophile separatism within it (Ostrovsky, 2017).

Georgia—much like Moldova—has two breakaway regions with Russophile ethnicities—the Abkhazians and Ossetians (George, 2009). These Iranian and Turkic influenced ethnicities were suppressed and Russified during the Russian and Soviet empires and yet retained a disdain for the Georgian majority that they lived among

(Human Rights Watch, 2009). During their separatist wars at the breakup of the Soviet

Union, they engaged in a systematic and thorough ethnic cleansing of Georgians. The defeat and expulsion of ethnic Georgians from their homes was a bitter pill and humiliation for the new Georgian government. With the election of President Mikhail

Saakashvili, a reformist wave pushed Georgia away from the east and Russia and towards the EU and NATO (Stefes, 2006). To gain membership in both, though, the country needed to settle its frozen conflicts. Unfortunately, to end the bloody conflict with the separatist regions, earlier Georgian governments had made a Faustian bargain in a series of agreements made in Sochi that allowed Russian peacekeepers to stay in the Georgian breakaway regions in exchange for peace (Library of Congress, 2015). Georgia—in exchange for peace—had unwittingly surrendered huge amounts of sovereignty for the foreseeable future. Thus, when Saakashvili tried to regain these separatist regions, he

17

found himself fighting the Russian peacekeepers and, more importantly, the Russian military elements that had illegally entered the territory. Georgia was defeated in less than a week, and Russia recognized the territories as sovereign countries (McNamara,

2008).

Although the Russian military’s involvement was more open, they were able to use the artifice of peacekeeping—given their already legitimized presence in Georgia through the peace deal they brokered. Further, they were able to claim—although the

Russian military outnumbered the separatist fighters themselves—that they were supporting their fight and that many who fought in the conflict were volunteers—often

North Ossetians in Russia (Human Rights Watch, 2009). Although Soviet propaganda had not provided a solid base for the separatism like in Transnistria, Russian propaganda was carefully crafted from the moment the Russian soldiers began their invasion. Russian journalists—embedded with the military—were able to see carefully scripted

“liberations” of ethnic Russians (Lowe, 2008). President Medvedev would accuse the

Georgians of committing genocide through actions where “civilians were torched, sawed to pieces and rolled over by tanks” (Radyuhin, 2016). Putin would claim that Americans were aiding Georgian military attacks on the separatist regions—something Russian propaganda would echo through pseudo experts and conspiracy theorists. At the same time, the Russian government tried to actively suppress anything that contradicted their narrative of liberator and defender of the persecuted minorities—including firing an RT reporter who wanted to report on Russian bombing inside Georgia outside the separatist regions (Kirchick, 2014).

More classic techniques—such as delivering realistic fake documents to Western media looking for a scoop—were used to manipulate publications like Der Spiegel, but

18

Russia had yet to see the benefit in utilizing social media to spread propaganda (Herpen,

2014). In fact, as the Russian government continued its information war against Georgia long after the guns were silenced, its first efforts to counter social media narratives were to shut them down. Their most famous attempt was to silence blogger Georgy Jakhaia—a survivor of the Sukhumi massacre by military units supporting the Abkhaz separatists

(, 2009). No doubt driven by the hellish memory of children being executed and people being disemboweled while alive in his home town with the support of the Russian government, the Georgian professor critiqued the Russian invasion of 2008 to his large social media audience. In order to silence him, Russian linked hackers launched denial of services attack against LiveJournal, Twitter and —briefly taking down the young platforms (Reuters, 2009). This clumsy attempt at silencing their critic backfired and grew Jakhaia’s following and influence online, but this was the modus operandi for the Russian’s approach to cyberwarfare at the time—having earlier launched denial of service attacks during their invasion of Georgia and in Estonia in retaliation for moving the Soviet Soldier memorial (Harvey, 2009).

By 2010, the Russian government control of traditional media was nearly complete—with the Putin regime controlling directly or through its proxies nearly every newspaper or television station except for a small contingent of marginalized independent media, but the social media sphere—or at least the social media and blogging platform most popular at the time—were thought to be relatively free of government interference

(Etling et al., 2010). Internet usage was relatively low at that point compared to now— only 37% of the Russian population—and dominated by urban and more educated users.

Rather than use Twitter or Facebook, Russians who used social media—especially for news consumption and political discourse—primarily used a blogging based social media

19

application known as LiveJournal (Sanovich, 2017). This platform proved a fertile ground for somewhat subversive discussions and campaigns to discuss politics and corruption in Russia. Rather than try to suppress it de jure—as China has done with its national control of the internet through monitoring and blocking—the Russian government tried to compete in it initially (Sanovich, 2017). President Medvedev—the

Russian President who Obama believed he could reset Russian relations with—attempted to become a social media icon like his US counterpart. Although Medvedev would become known as “blogger-in-chief” for efforts at engaging on Facebook, Twitter,

Youtube and LiveJournal, his efforts at projecting influence through personal charisma largely failed and were not followed by Putin when he returned to office for a third term

(Sanovich, 2017). Instead, Putin would follow Medvedev’s example in other ways by leveraging Russia’s seedier internet underground of spam, trolling and algorithm manipulation in the private sector.

It is more than a little ironic that Russia’s embrace of capitalism at the urging of the West—albeit a much more oligarchic and extractive form of it—would lead to the development of information manipulation technology that would threaten the very foundations of the West. Within the business world, information manipulation is not uncommon to gain advantage. Amazon has recently fallen under the spotlight for the aggressive trolling by competitors in their marketplace who post false negative reviews for competing products or accuse the competitors of violating intellectual property laws to force Amazon to take down the listing while the claim is investigated (Woollacott,

2017). Similar dynamics are even more prevalent in Ukraine and Russia where seedy companies are paid to troll competitors and promote the company’s own product

(Sanovich, 2017). Working often for a pittance, paid trolls and commenters will work

20

hard to make their target product well respected and the competing products worse. This whole domestic Russian spam industry—helped by the lack of clear Rule of Law—often relies on lies and misinformation to market and trick their targets into using the products or providing them money (Sanovich, 2017). Indeed, selling political lies is not much different morally and technically than trying to sell mysterious and unprovable herbal supplements or falsely reviewing a competitor. The Russians had deep wells of human trolls for their weaponized spam, but they soon realized that if they were going to engage and effectively suppress audience, they would need automated multipliers for their messages:

However, using human trolls for retweeting and reposting is inefficient

given that these tasks could easily be automated. Fortunately, by the mid-

2000s Russia had a well- established and innovative industry of spam and

search optimization. [footnote omitted] Thus originally commercial

technology—another child of the flourishing online media and tech

industry that developed in Russia without much government interference in

the 1990s and 2000s—became a key advantage that the Russian

government was able to leverage in its nascent online propaganda strategy.

(Sanovich, 2017, p. 9)

Early Twitter bots were much more benign and tasked with generating trivial tweets such as creating poetry in iambic pentameter or sending tweets at certain timed intervals or in response to events (Anderson, 2012).

Before social networking, individuals often envisioned the social robot as something that could engage in human like behavior and trick humans into believing they

21

were real—perhaps passing the so-called Turing test. In reality, the social robots—as pioneered by marketers and used by the Russian political establishment and government—do something much more profound and powerful en mass: they mimic human social networks that transmit and vet information and have existed in some form back to prehistoric times. This means that they fool both the computer algorithms that are designed to aid these networks to transmit and amplify information—such as in Facebook or Twitter—and the humans who rightfully rely on social cues and collective information processing to understand what is true and false. In this sense, modern times are far worse than science fiction, because they imbue even basic social signals—such as whether there is an emergency—with ambiguity and incredulity.

As social media technology developed and the post-Soviet world became even more restive after all the failed promises of its leaders, the Russian government faced a challenge: how do we control civil society and prevent the kind of revolution that brought us into power? Reborn in the chaos of the failure of communism and noisy and disruptive —they knew the power of a revolution and feared one would happen again. By the mid 2000s, Russia knew it could face domestic instability in the guise of a so-called color revolution like the Orange Revolution in their culturally similar neighbor Ukraine that shared many of the same challenges of corruption and mismanagement following the fall of the Soviet Union (Umland, 2012). Indeed, before the 2004-2005 Orange

Revolution Kuchma’s mismanagement of the seemed to follow the

“managed democracy” approach of Putin early in his tenure as president (p. 20-21).

When the Ukrainian government seemed to break with this distorted version of democracy advocated by Putin and begin to align with western powers while moving away from Russia, Putin moved down a new “special path” of suppressing of democracy,

22

engendering anti-Western feelings and, most importantly, ensuring that a color revolution would have great difficulty occurring inside Russia (po. 21-22, 30).

It was in this moment—as the Russian elite knew their political hegemony’s days may be numbered—that the social bot birthed the political bot (Woolley, 2016). Before roughly 2010, the social bot was largely the province of the spammer and socially savvy business owner. It was a team at Harvard’s Berkman Center for Internet & Society that discovered some of the first evidence of Russian use of political bots to amplify propaganda coming from Kremlin Twitter feeds and create more effective state sponsored spam (Kelly et al., 2012; Sanovich, 2017). As Sanovich (2017) notes:

The first known large-scale deployment of pro-government bots

and trolls in Russia was carried out in support of this engagement

strategy of President Medvedev (Barash & Kelly, 2012; Kelly et

al., 2012). The troll contingent was, for the most part, recruited by

repurposing pro-Kremlin youth movements, which had been

created to combat on Moscow’s streets and

squares (Hale, 2006). Their job primarily focused on...posting

diversionary comments in the high-profile opposition

(Ananyev & Sobolev, 2017), plus retweeting and reposting pro-

government messages. (p. 9)

As Sanovich alludes to, these youth movements are believed to have been started primarily as reactions to Ukraine’s color revolution—especially by international observers at the time (Parfitt, 2005; Osborn, 2005). The group became notorious early on for creating misinformation to discredit the Russian opposition—such as by staging

23

photos (Waldermann, 2007). In fact, it was Putin strategist and former marketer

Vladislav Surkov who created the so-called “nashist” youth movement to counter elements in Russia that could cause a color revolution. Sanovitch believes this internal political demand—to suppress political dissent and thereby guard against a Russian analog to the orange revolution—spurred the “market competition in the Russian tech sector...to efficiently meet this demand and create tools that were later deployed in foreign operation” (Sanovich, 2017, p. 5). Indeed, it is undeniable that these first deployments of computational propaganda were spurred by the internal demands of

Russian politics. That being said, Sanovitch’s thesis is incomplete without one key and emphatic proviso: this demand was spurred by an external event, namely the color revolution within Ukraine and the feeling within Russia that it was under siege as the next likely victim of a revolution demanding liberal democracy.

This fear became the preoccupation of the Russian military (especially the

General Staff that Gerasimov is Chief of) and General Gerasimov who saw this tool—the ability to spread propaganda throughout social media—as a weapon to be wielded in counter-revolutions against color revolution coups engineered by the West. Gerasimov’s article The Value of Science is in the Foresight (2016) is a culmination of this fear and it argues for the use of these sophisticated domestic approaches to be leveraged abroad in future wars where color revolutions are occurring or have occurred. Despite the fact

Sanovich and others dismiss Gerasimov’s importance, Gerasimov’s importance is undeniable—as I explain later in a section devoted to this question. Factors such as the

General’s formal positions, relationship with Sergei Shoigu, and open and clear advocacy for these hybrid techniques ensure his role in the articulation of Russian military strategy, theory and tactics.

24

Although Gerasimov published his famous article The Value of Science Is in the

Foresight in 2013 roughly a year before Euromaidan ended and the government of

Ukraine fell, he clearly explained the approach he advocated again at a Security conference at a Radisson hotel in Moscow shortly after Kiev’s 2014 revolution. There

General Valery Gerasimov, now Chief of the General Staff of the Armed Forces of the

Russian Federation and First Deputy Minister of Defense of the Russian Federation, explained that he wanted to restore geopolitics to a multipolar world with spheres of influence again (Cordesman, 2017). Color revolutions are an “adaptive approach” to war—he mused—where one could fight low cost, destabilizing wars across the world

(pp. 12-13). , Russian Minister of Foreign Affairs, was also at the conference in a speech that was paired with Gerasimov’s. He argued the was “using the ‘Color Revolution’ to serve their own interests, impose their own values, and end in creating new global tensions” and had isolated itself from Russia (pp. 9-10).

The West was trying impose values on other nations that they did not want to adopt.

For Gerasimov, his strategy for hybrid warfare—as it has come to be known— was not particularly innovative. He was simply turning the color revolution method of war into a Russian technique; Russia should wage wars in the same hybrid fashion he saw the west fighting its “wars”—e.g. color revolution coups (Gerasimov, 2016).

Gerasimov’s articulation of this principle in this article and eventual implementation in the field led this approach being called the “Gerasimov Doctrine.” In his written work,

Gerasimov argues many points in his lecture and writings, but his hybrid war (a word and concept not of Russian origin by later embraced by Russian and Ukrainian military thinkers) has three essential elements. First, Russia should find and leverage

“differences” in a society—such as ethnic and cultural tensions—and transform them into

25

social contradictions and fractures that undermine the social stability (p. 28). From a systems theory standpoint, these are the points of leverage within the system through which you can shape it. Second, protection of human rights and the need to keep the peace will be used as a pretext to intervene militarily after the situation has been deliberately exacerbated. Third, if the West complains about Russia’s action, the country can rebuff them by noting the numerous invasions such as in the , Middle East and under the pretext of protecting human rights (such as in Libya) and protection against (e.g. Iraq and Afghanistan). For Russians—especially the political elite—the US and more broadly the West has relegated Russia to second-tier power status—imposing double standards on Russia that they do abide by themselves.

The US and its allies can bomb sovereign nations to protect the rights of a minority— such as the Muslims in the Balkans—but the same nations chafe at Russia protecting the

Russian and Russophile minority sprinkled throughout the former USSR territory

(Walker, 2014). This argument resonates both at home and abroad—something that can be brought out again and again when the US critiques Russian foreign meddling.

Many papers argue Gerasimov’s influence is overblown—as seen by Sanovitch’s dismissal of his importance. Many claim disinformation, maskirovka and other methods of information warfare have long been used as a tool of subversion by the Soviets and

Russians—pointing to Soviet claims that the US had invented AIDS or the many times by which the used deception to help defeat the Nazis (Grimes, 2017; Taylor,

2016). In many ways, this is an argument that does not understand that Gerasimov’s approach inherently relies on advanced technology to disrupt and destabilize social structures—technologies like Facebook and Twitter that did not exist during the days of the USSR. Indeed, Gerasimov is advocating using cutting edge science and technology as

26

a method of exploiting these fractures. The fractures themselves, though, are generally of

Soviet vintage and not the result of more modern events. In many ways, conflicts in the post-Soviet space are the perfect opportunity to apply the Gerasimov doctrine, because

Russia can exploit the fractures it helped create in its empires of the past.

The iron grip of the USSR kept ethnic and cultural rivalries in check—much as it did in Ba’athist Iraq and Tito’s Yugoslavia. Whether it is the Bosniacs, Croats and Serbs of Yugoslavia or the Sunni, Shiites and Kurds of Iraq, internal contradictions can be kept at bay with the chains a strongman or an autocratic oligarchy places on society. The countries within the former Soviet Union are no different, and the tensions that have remerged as the national interests of the ethnicities within these countries collide—often fostered by the Russia Federation as it seeks to regain status as a regional hegemon.

Indeed, for Russia, it is easy to exploit the internal contradictions within former countries of the Soviet Union, because they are often due to ethnic Russians living within these countries and the colonial policies of Russia and the USSR that put them there. Indeed,

Ukraine—despite the fact a large number of Ukrainians still live within Russia and/or are married to or are related to ethnic Russians—has long struggled with the internal contradictions of large populations of ethnic Russians within Ukraine, having a common cultural ancestor in the Kievan Rus and yet being a separate ethnicity and culture with its own language (Yekelchyk, 2007). Indeed, Ukraine’s longstanding quest for independence has always been at odds with its close relationship with the Russian nation and culture.

Whether it is Bandera’s Faustian bargain with the Germans during World War II to free

Ukrainians from the Soviets or the Ukrainian communists who ensured Ukraine remained a separate union Republic within the Soviet Union and not merely part of the Russian

Soviet Federative Socialist Republic, Ukraine has sometimes awkwardly tried to create

27

clear lines in the ambiguous landscape of Russian and Ukrainian culture (Solchanyk,

2000; Garrett, 1997).

For Gerasimov, though, this ambiguity and the inherent tensions and contradictions within Ukraine provided easy points of fractures through which to shatter the nation of Ukraine—much as he theorized in 2013. Even though Ukraine (including

Crimea) had overwhelmingly voted for independence from the USSR, Crimea remained dominated by its ethnic Russian majority—many of whom were connected to the Russian military that remained on the peninsula (Yekelchyk, 2007). Likewise, in Eastern Ukraine, a substantial minority of ethnic Russians (as well as the Ukrainian majority have lived for generations under the yoke of the Russian Empire) continually thwart the more nationalistic Ukrainians in western Ukraine from rolling back the russification that occurred in the country while western Ukraine was being dominated by western conquerors, such as Poland and the Austro-Hungarian empire (Wilson, 2015; Solchanyk,

2000). Orientalist historians argue (much as they do with respect to the Balkans) that this led Ukraine to develop two parallel Ukrainian civilizations—one that embraced the values and culture of the Renaissance and one which remained locked in the medieval know-nothing mentality of the peasantry and oligarchs (Yekelchyk, 2007; Wilson, 2015).

For Gerasimov, , Dnipro and Yanukovich’s hometown of are culturally closer to Russia than Ukraine despite being within Ukraine—easily acquired from a shattered Ukrainian state. Gerasimov, though, quickly found that eastern Ukraine and

Crimea were very different regions—as were the somewhat Russophile regions like

Odessa.

Although there is evidence Russia has sought to destabilize the Odessa region, the efforts appear to have largely failed (Korewa, 2016). Russian efforts have instead

28

concentrated on Crimea and eastern Ukraine as centers of the hybrid war against Ukraine.

As noted above, Crimea is the only region of Ukraine with a majority of ethnic

Russians—many of whom are Russian nationals who simply live in Crimea as a consequence of Russia’s military presence there (Goble, 2015). The peninsula has a heavy ethnic Russian presence along the coast while much of the interior remains a mix of Tartars and Ukrainians. The peninsula, unlike the , received an autonomous status within Ukraine upon the country’s independence and has had separatist agitation from a minority of the Russian majority since the creation of the Ukrainian state— although right before the annexation separatism was relatively unpopular (Menon &

Rumer, 2015). Many of these separatists point to Kruschev’s “gift” of Crimea to the

USSR Ukrainian proto-state as a foolish move—given that the penisula’s connection with

Russia since the late 18th century and its large ethnically Russian population (Keating,

2014). A counter argument is that an ethnic Russian majority only occurred after World

War II and the deportation of the Crimean Tartars by Stalin (Kramer, 2014).

Eastern Ukraine, on the other hand, was never a “gift” to the proto-Ukrainian state. It contains cities such as Kharkiv and Dnipro that are core to the Ukrainian culture and national identity—although the region was depopulated by war and starvation engineered by the Soviets and Nazis (Yekelchyk, 2007). These slaughtered Ukrainians were often replaced with ethnic Russians who came to the region to participate in its rising Soviet industrial machine (Nalyvayko & Bulanenko, 2016). Russian propaganda argues that the area is simply the Russian empire’s almost mythical Novorussiya—a colonization effort by the German born Russian Czar Catherine the Great, but despite the fact area has a Russian-speaking Ukrainian majority and a relatively large ethnic Russian population, large populations of Ukrainians also live beyond the Ukrainian border within

29

the borders of Russia—land not claimed by Ukraine but traditionally inhabited by ethnic

Ukrainians (Kulchytsky, 1945). Indeed, the Ukrainian borders have never been a strained view of the outlines of the regions in which ethnic Ukrainians live—they are a very conservative version. The fact that Russians attempt to expropriate the Ukrainian cultural heritage, such as the Cossacks or even the Kievan Rus from which Russian gets its name, does not transform Ukrainian culture into a Russian sub-genre—it is Russian culture that is the true derivative.

Thus, in Eastern Ukraine, the Russians did not run into a Ukrainian periphery— territory that could easily be placed inside Russia’s own borders—he was planning for an invasion of the core of Ukraine. Despite the east’s poor judgment in elections and affinity for Russia, it was there, near cities such as Dnipro, that the ancient Cossacks hosts lived and Ukrainians forged some of the early outlines of the modern Ukrainian state (Wilson,

2015). Thus, the differences within the inhabitants of eastern Ukraine between—which range from those who are firebrand Ukrainian nationalists to those who yearn for closer ties with the Russian state—are fundamentally different from Crimea where many are simply Russians (many times with Russian citizenship) who have chosen to stay in

Crimea and want their home country to control it (Toal, 2017). Historians in the orientalist tradition tend opine on the fundamental difference between the regions of

Ukraine that were under Russian subjugation for centuries and those subjugated by powers to the west of Ukraine—much as they do when speaking about the Balkans. As noted above, though, in practice this simply meant parallel developments of the

Ukrainian identity in both eastern and western—and the diaspora (Kappeler et al., 2003;

Wilson, 2015). This division did not make them any less Ukrainian—much as the Kurds of Turkey, Iraq, Iran and Syria remain Kurdish. Indeed, Ukrainians may be of different

30

political and ideological colors but they remain part of the same fabric of Ukrainian identity—something the Russian government did not properly envision. Ukrainians— despite their homeland being divided among nations and many living abroad—have stubbornly clung to their ethnic identity even in the face of and disparagement (Kappeler et al., 2003; Yekelchyk, 2007).

Polls both before and after the invasion confirm that Eastern Ukrainians—despite their differences with Western Ukrainians—remained committed to remaining in

Ukraine—although most Eastern Ukrainians disagree with the use of violence to settle the conflict (Swab, 2014; Popeski, 2014; Poushter, 2015). This is a sign that the information warfare Gerasimov argues for has failed in many respects. The main difference remains the degree to which the two regions believe Ukraine should align with

Moscow—although the aggression against Ukraine has driven many Ukrainians from wanting to be closer to Russia to serving in volunteer battalions fighting against it

(Popeski, 2014; Cohen & Green, 2016). In fact, it was volunteer battalions financed by oligarch that helped prevent the expansion of the separatist movement into Dnipropetrovsk (Pinkham, 2015; Cohen & Green, 2016). Ironically, the Ukrainian state has actually been strengthened in some ways by the war in the east and the Crimean annexation—as seen by a poll demonstrating greater support for an independent Ukraine a year into the conflict (Synovitz, 2015). Controversially, some scholars and Ukrainian elites argue Ukraine is actually better off without the Russophile east—a region that has caused one headache after another for the Ukrainian state from spawning hyperinflation to pay miners to voting in corrupt and incompetent Russophile officials into office—like

Yanukovych (Motyl, 2016). Regardless of the position of the Ukrainian public and elites, the longer the east remains occupied and estranged from Kiev the more reliant it becomes

31

on Moscow. Although reintegrating Eastern Ukraine into Ukraine may reintroduce some of the same poison that has inhibited the Ukrainian state before the war, surrending it to

Russia would only grant Russia a surprising victory and embolden the Russian military into spreading Gerasimov’s hybrid warfare deeper into Ukraine—including Kharkiv or

Kiev where plentiful russophile Ukrainians and ethnic Russians represent a base for a coup attempt (although Kharkiv has a much stronger russophile base) (MacKinnon,

2014).

In many ways, Crimea was the lowest hanging fruit because of the large number of Russian nationals who lived there, and Crimea’s differences were exacerbated by the

Euromaidan revolution’s patriotic fervor. These Russians needed very little encouragement to support Crimea’s annexation. Many Russian nationals had only begrudgingly sought Ukrainian citizenship upon the fall of the USSR—making many

Crimeans simply Russians who lived in Ukrainian territory (Knott, 2015). Angry at the ouster of a president they had overwhelmingly voted for and the Western direction of the new Ukrainian government, the possibility to exploit the growing contradictions and fissures between Russian Crimeans and the Ukrainian state proved to be a perfect opportunity for the Russian to apply the hybrid warfare technique Gerasimov describes; indeed, Yanukovych had escaped by way of Crimea through the efforts of sympathetic Crimeans and the Russian military (Kravchenko, 2014). As Euromaidan spread across the country and toppled one corrupt local government after another, Crimea had remained firmly in the hands of the corrupt establishment. Although there was a fringe party that argued for annexation by Russia in the election preceding Euromaidan, they were soundly beaten by Yanukovych’s (Carbonnel, 2014; Menon and Rumer, 2015). Either because of indifference, cynicism or apathy, the population of

32

Crimea had long since accepted being a part of Ukraine, and yearly embraced the throngs of tourists from other parts of Ukraine who came there. Even if the Crimean residents had been intent on independence from Ukraine, they had neither the resources nor the power to overcome the Ukrainian government forces there. Under Gerasimov’s approach, though, this was not an issue. Russia—as Gerasimov outlined in his 2013 paper and speech a year earlier—believed it could tip the balance in Crimea in their favor through an adept use of clandestine special forces paired with political and information warfare that would exacerbate social fissures to become breaks.

The tactics to accomplish this follow Figure 2—although Crimea was won too quickly to really follow closely the scheme Gerasimov envisioned Western powers as using. The main tactics were several. First, Moscow already had the coalitions within Crimea it needed by virtue of its large military presence and the many Russian nationals and these provided the patina of a local moment (Markov et al., 2016). In fact, the political opposition in Crimea to the Euromaidan movement was Russophile by its nature since it was composed primarily of the ethnic Russians and Russian nationals who dominated

Crimea. Second, Russia and Ukraine were heavily dependent on each other in economic terms at the time, and Russia could exert heavy political and diplomatic pressure that

Ukraine could not match. A well-placed threat to cut off the gas during winter or the placing of a ban on certain Ukrainian goods could strike a heavy blow to the Ukrainian economy and people—especially right after the revolution toppled Yanukovych. Because

Euromaidan occurred in the dead of winter, Russia’s perennial gas blackmail was one of the most obvious tools for the Russian government at the time. Third, although this early

Gerasimov chart is unclear as to when an influence and propaganda campaign should start, Russia had been engaging in an information war against Euromaidan before the

33

Crimean operation began or Yanukovych fled to Russia (Darczewska, 2014). Whether it was linking the movement to , claiming it was simply a lawless riot or calling it a

“coup” upon its success, Russian propaganda was a nonstop “firehose of falsehood” attack on the new Ukrainian government and the movement that created it (Paul &

Matthews, 2016).

34

Figure 2. A Graphical Representation of Gerasimov’s Proposed Approach to Hybrid

Warfare Based on Western Color Revolutions.

From Gerasimov, The Value of Science is in the Foresight, 2016

Fourth, Gerasimov understood that the threat of military action was a weapon in and of itself. Russia openly shuffled and massed its troops all along the Ukrainian border as though ready to engage in a large a full-scale invasion as the Moscow backed regime fell and afterward—especially in the run up to the Crimean referendum (Myers & Smale,

2014). Further, it conducted military exercises to intimidate the Ukrainian government and show military capability—something it regularly does now on the Crimean Peninsula

(Alpert & Solomon, 2014). By and large—even after the invasion of the east—these border massed forces have generally been spectators and a show of force—not the special operations forces (SOF) vanguard that has been conducting many of the military operations in Ukraine (Bukkvoll, 2016).

Gerasimov’s fifth tool is the use of SOF and mercenaries—or private military companies as Gerasimov refers to them. In many ways, this is the heart of Gerasimov’s approach. Although SOF units often embed themselves within foreign fighting units,

Russia took this to another level by tearing off any insignia that linked Russian SOF to

Russia and then pretending they were locals—an easy task given the heavy Russian national presence (MacAskill, 2014). Even so, the fact that they were Russians was barely concealed. Indeed, perhaps at no other time in history was the invasion of another country so covertly brazen as during the attack of the “little green men” of Crimea

(Stallard, 2015).

35

The effectiveness of Gerasimov’s approach is clearly shown through its extremely effective implementation in Crimea. The invasion of Crimea proved to be both an agonizingly slow and terrifyingly fast humiliation of the young Ukrainian nation as the

Russians pantomimed local opposition and slowly took over one Ukrainian military base and government facility after another with tense stand-offs but little violence

(Herszenhorn & MacFarquhar, 2014). Many Crimeans who served in the Ukrainian military defected (Withnall, 2014). Local Crimeans were faced with the difficult decision to support a government led by people they neither voted for nor respected or allow

Russian special forces and their mercenaries to essentially shove the Ukrainian authorities out as Kiev’s democrats reeled. The government from Euromaidan—less than a month old—held only a tenuous grip on power without a new election to provide them legitimacy, and they understood direct war with Russia could shatter the country into the pieces Gerasimov and the Russian government wanted so desperately it to break into.

Sadly, the previous governments of Ukraine and Crimea governed with extreme corruption and mismanagement that had left the region discontented with Ukrainian rule

(Greene & Migaki, 2014). While most Crimeans passively stood and accepted Russia’s invasion—whether they supported it or not—the Tatars who had remained after the mass deportations from the Stalin era opposed it (Vasilyeva, 2016). Many Crimean leaders— upon leaving to lobby the international community to stop Russia—were barred from their homeland while others simply disappeared much like they would have in the Soviet days (Cole, 2017; Blair, 2016). Gerasimov’s war in Crimea was complete.

The deportations of Stalin and the colonization of Crimea during the Russian empire and the USSR laid the preconditions of a population more connected to Russia than Ukraine—the country with which Crimea is geographically connected. Indeed, you

36

could argue that many of these colonial Crimeans are more connected to Russia than even

Crimea—looking to Moscow more than , or Ukraine’s capital

Kiev (Rosenberg, 2017). It was this fissure that Gerasimov exploited with breathless ease as he waged his virtually bloodless counterrevolution in Crimea. He exploited the

“differences” between the Russian nationals, ethnic Russians and ethic Ukrainian and then transformed them into contradictions and fractures that ultimately lead to the annexation of Crimea and the peeling away of the peninsula from the Ukrainian State for the foreseeable future.

As noted above, allegations of human rights abuses are a key propaganda tool in

Russia’s information warfare toolkit. Russia has unleashed a firehose of propaganda claiming mass human rights abuses by the Kiev government as well as through its foreign ministry’s so-called “white book”—a fictionalized narrative of supposed human rights abuses by the Ukrainian government that attempts to use Western human rights language and norms as weapons to discredit Ukraine (RT, 2015b; Denber, 2014). Needless to say, this effort to paint Ukraine as a savage human rights violator of ethnic Russians while

Russia backs rebels who cite Stalin while executing citizens for alleged theft has failed;

Russia has not helped this perception by supporting a regime in the middle east that uses chemical weapons on children and civilians—going so far as to blocking UN condemnation of these attacks (Office of the United Nations High Commissioner for

Human Rights, 2014; Roth, 2017). Because of this failure, Russia has never been able to admit to its military presence in Ukraine and then justify it as a measure to prevent human rights abuses of ethnic Russians. Unlike the Balkans where war is common among the competing ethnicities, most Ukrainians would have laughed off even the idea of a war with ethnic Russians as absurd before Russia created the conflict in the east. The Russian

37

government may, though, be playing a long game—knowing that virtually every military has moments of rogue soldiers and poor decisions where soldiers violate human rights. At that point, the Russian military presence in Ukraine may be then acknowledged as the soldiers transform and drop their performance as local rebels and become

“peacekeepers.” At this point, Russia has been unable produce a narrative that would support a Russian “peacekeeping” operation—considering it is virtually undisputed internationally among world leaders that Russia is the instigator of the war within

Ukraine. Despite the fact that Gerasimov’s vision for hybrid warfare is unfulfilled in

Eastern Ukraine, in Crimea the operation was so successful the military did not even have to pose as peacekeepers—it was to able grab the territory posing as locals with only minor skirmishes.

If Gerasimov’s articulated vision is fulfilled in Eastern Ukraine and Russia deploys as guardians of human rights and peacekeepers, the Russian state will defensively engage in an information warfare attack that lambastes the West for its hypocrisy due to its many interventions to justify it. One of Russia’s favorite examples of the US invading based on a pretext—and an example General Gerasimov uses—is its intervention in the war in Yugoslavia—something that led in the end to the recognition of

Kosovo as an independent and sovereign state (Cordesman, 2017). Many Russian elites believe Russia is a Slavic hegemon with a duty to intervene, protect and (as far as possible) rule the Slavic world—including the Serbians (Gvosdev & Marsh, 2014). For

Russia’s elite when the West fought against the Serbs, it was unforgivable. When the

West attempted to integrate it’s most important former province (Ukraine) through what they view as a western engineered color revolution, that was even more unacceptable. To the Russian establishment the disembowlment of the Ukrainian state project through the

38

pretext of the protection of the ethnic Russians who choose to live there is no stretch—it is a contorted version of the logic the West used when protecting the Albanians of

Kosovo against the Serbs who sought to drive the Albanians out of what they viewed as

Serbian ancestral lands. Ukrainian nationalists trying to restore the primacy of the

Ukrainian language and culture in the Russophile areas of Ukraine is the same to the

Russian leadership; if the West can stop the Serbs from driving Muslims from an ancestral homeland stolen by the Ottomens, why can the Russians not repel Ukrainians trying to drive out Russian Soviet colonists? The difficulty is that there is no evidence that ethnic Russians within the east would have founght the Ukrainians without Russian support.

Even if this argument does not hold up, Gerasimov can argue using the US interventions in the Middle East and that it is completely justified in its intervention in Ukraine on the grounds its security is in danger (Cordesman, 2017;

Gerasimov, 2016). Indeed, the US invaded Iraq and Afghanistan under the guise of protecting its own security. In Iraq, those arguments proved to be based on incorrect intelligence. In this case, Ukraine is actively trying to join an organization that was created to oppose Russia when it was part of the Soviet Union (and ironically Ukraine was as well). Of course the cold war is over, so the security threat is more imagined than actual. Even so, this cold war thinking still exists in many Russians—even if leaders such as Putin are more afraid of losing power to a than of an invasion.

In sum, the political developments in Russia led to a weak and underdeveloped democracy where information manipulation was key. Although the Russian government initially failed in its efforts to engage with or suppress social media, its use of sophiticated state sponsored weaponized spam has made it a formidable actor in the

39

information domain. Its development of aggressive social media propaganda techniques appear to be a direct response to the Orange Revolution and the creation of counterrevolution movements. Gerasimov’s approach does not merely envision information warfare as the sole use of the cyber domain—it envision using full scale cyber attacks that weaponize viruses and malware. Fortunately for Gerasimov, Russian capability in this area is already extremely high and already play an important role in

Russian military engagements.

40

Chapter III.

Russian Cyberwarfare and Gerasimov

With the advent of every new age, warfare advances and increases its deadly force. Iron defeats bronze. Steel defeats iron. Bayonets become mere symbols against the power of the machine gun. Today, we are in the era of war via computers. With this comes a whole host of new questions. What is an act of war? Indeed, what is war? The

Pentagon has announced that cyber attacks can be considered acts of war (Gorman &

Barnes, 2011). Gerasimov appears to view cyberwarfare as one of the domains of war himself and part of what an increasingly aggressive NATO will use as a pretext for war— despite the fact tracing sophisticated attacks can be quite difficult (Fig. 3; Gerasimov,

2016a). In fact, the Pentagon released its “cyber strategy” for the first time in 2011 to herald in this new age (Epatko, 2011). If you bring a country to its knees by disabling its infrastructure, would a lethal counterstrike be justified? Cyber weapons such as Stuxnet and Flame have astounded computer scientists and engineers in their complexity and effectiveness (Nachenberg, 2012). Russian cyberwarfare is at the cutting edge and represents a key part of Gerasimov’s vision of a Russian military that wages these lightweight, hybrid conflicts in the mold of the color revolutions.

41

Figure 3. Gerasimov Presentation to the 2017 Moscow Conference on International

Security.

From Gorenburg, 2017.

Cyberwarfare and hacking are relatively young because computers have increased in sophisticated exponentially. Roughly four years after the end of World War II, the computer virus was born in the mind of John von Neumann—a Jewish Hungarian immigrant who worked on the Manhattan project (MacRae, 1992, pp. 37-38, 67-68; Szor,

2005, Chapter 1, Section 1.1). Von Neuman was also one of the chief architects of the modern computer by introducing the concept of memory for information storage and binary operations (Szor, 2005, Chapter 1, Section 1.1). It was during World War II that computers began to show their incredible power for good and evil. On the one hand,

IBM’s punch card run computers (often housed within the concentration camps) helped to catalog the millions of Jews marked for extermination (Black, 2011, pp. 20-21). On the other hand, the brilliant Alan Turing (the creator of the eponymous Turing Machine) would create an electromechanical computer “bombe” that would crack the enigma

42

cipher of the Nazis by emulating its structure and reversing the cipher process in a way no single human could (Page, 2009, p. 145). The ability to perform repetitive and complex calculations has been sought after by humans for thousands of years. Some claim the first computer was built two-thousand years ago by the Greeks, who created a device to calculate planetary motion and the timing of the Olympics (Sorrel, 2008). It was

Charles Babbage, though, who in the nineteenth century was inspired by the punch cards of the loom machine to create an “analytical engine” that could perform highly complex mathematical operations, such as multiplication, by taking in cards with information

(Babbage, 2002, pp. 88-89; Rao, 1994, pp. 2-3). Even though he would die before he was able to create the machine, his ideas fundamentally shaped computer architecture and led to the creation of the modern computer (Randell, 1982, pp. 337-41). Indeed, Babbage reenvisioned computation in a way that that the pioneering adding and subtracting devices by inventors such as Blaise Pascal had not in the seventeenth century (Alisha,

2002, pp. 3-4). Von Neuman also saw computers in a different way; to him they were analogs to nature, and the idea of the “syntheses of automata” to “produce other automata” was a natural step in the evolution of computing (Neumann, 1966, p. 80).

Although it would be over thirty years before these programs were described by Len

Adleman as a “virus,” by the 1950s scientists at Bell labs were engaging in “core wars”

(Young, 2006, p. 108; Dewdney, 1984, pp. 14-22; Cohen, 1987, p. 31). The goal of these viruses were to battle and overwrite each other in the “core” processor memory until only one victor remained (Cohen, 1987, pp. 22-23). In these early efforts, programmers saw themselves, as envisioned by Von Neumann, as creating analogs to life and this game was merely an extension of the Darwinian struggle of life; hence, one of these early “core war” viruses was named “Darwin” (McIlroy et al., 1971). Indeed, Adleman’s mentee,

43

Fred Cohen, begins his seminal tome on computer viruses by analogizing computer viruses to viruses in nature—even in their very components (Cohen, 1986, p. 5). For early computer designers and programers, this was more than metaphorical license—they envisaged computers operating in naturalistic ways.

The military soon took interests in these efforts to create autonomous programs that could wreak havok on a computer. By 1967, the government had commissioned a study by the RAND corporation on computer security, which included “infiltration attempts through the software system” (Peterson & Turn, 1967, p. 297; Young, 2006, p.

108). By 1969, the Defense Department’s Advanced Research Projects Agency (ARPA) had created ARPANET, the predessor of the modern internet, to fascilitate the communication and interaction of computers and users over distances (Morley & Parker,

2009, p. 322). Although the virus would fundamentally remain the same, this leap forward in technology would radically change the ways by which they could be delivered. A year later, ARPA would publish a groundbreaking report on the security vulnerabilities in networked computers that contained classified documents (Ware et al.,

1979). The report discusses for the first time “trap-doors” created by programmers to bypass safeguards and easily insert files (Ware et al., 1979). Exploiting these known and other unknown vulnerabilities are known as “zero day” attacks, since they are before the first day when the security flaw has been fixed (Nahari & Krutz, 2011, Chapter 8).

The first computer virus to spread across ARPANET was the Creeper virus, which was written and released in 1971 (Staedter, 2011). Continuing the benign tradition of earlier viruses, the virus would post “I’m the Creeper. Catch me if you can!” and then copy itself to another computer (Staedter, 2011). Many would classify this program as a

“worm” rather than a virus, since it does not attach itself to another program and relies on

44

a network for transmission (Chen & Robert, 2004, p. 2). The term worm comes from the fictional work Shockwave Rider by John Brunner where a character releases a ubiquitous, self-perpetuating virus that will keep going even if parts of it are destroyed, like a tapeword (Shoch & Hupp, 1982, p. 1). Despite this lexiconical distinction, a worm would best be called a worm virus, in the sense that it still fufills the Von Neuman vision of a self replicating program, despite its increased functionality.

It was in 1988, though, that the world received its first shocking introduction to the power of viruses. A Cornell student named Robert Morris infected computers at MIT with a worm he created; the eponymous Morris Virus then spread like a wildfire on the

ARPANET and forced institutions to shut down the electronic mail to slow its spread

(Filiol, 2005, pp. 259-66). Institutions were infuriated by the downtime and damage the virus caused, Morris became the first person to be convicted under the Computer Fraud and Abuse Act of 1986 (Denning et al., 1994, pp. 73-74; United States v. Morris, 1991).

Even if Morris’ intent was as benign as he claimed (a mere computer security test that went wrong), he had demonstrated the awesome power that these self-replicating programs could have, and the world would never be the same (Denning et al., 1994, p.

74).

Three years later, the consequences of an increasingly computerized infrastructure became all too clear. In April 1991, five hackers from the Netherlands managed to penetrate US Department of Defense computer systems prior to the first gulf war and attempted to sell the information they gathered to Sadam Hussein (Delibasis, 2007, pp.

30-31). Even though Hussein declined to purchase the information, the power of this new form of warfare became undeniable (Delibasis, 2007, pp. 30-31). US forces themselves contemplated using cyberwarfare methods to disable the air defenses of the Iraqis, but

45

General Norman Schwarzkopf found the idea of sending in a team of hackers to a seized radar station to be too risky (Clarke & Knake, 2010, p. 9). Although unconfirmed, some have claimed that an attempt to disable the Iraqi air defenses did occur through an infected printer bought from France (Delibasis, 2007, p. 32). In the second , a much more sophisticated approach was used. An email was sent out through the system informing Iraqi officers to surrender and abandon their equipment or face the overwhelming force of the United States; this psychological ploy proved a canny and successful move with many of the officers following the instructions and neatly parking their vehicles in formation before abandoning them (Clarke & Knake, 2010, pp. 9-10).

This change reflects not only a change in US attitudes towards Cyberwarfare but also an increase in the ability and sophistication of its systems and personel to wage such a war.

From Morris’ purportedly well intentioned worm to the “cyber shots” fired in the first Gulf war, the international stage was set for a new kind of war. Computer attacks would go where no bomb could. A new age of clandestine and open warfare would commence. As the internet globalized and expanded from Western countries and scientific communities to become a truly global phenomenon, Russia would become one of the key players in the struggle for cyber warfare capability and dominance. During the

Soviet Union, progress in the fields of computers was hindered not only by shortages in materials but also by an ideological distrust of computers (Troggemann et al., 2001, pp.

16-17). Stalin himself declared Computer Science to be bourgeois science (Kittler, 2006, p. 182). With the Soviet nineteenth century preoccupation with the Marxist view of the perfected laborer, the computer was an unnecessary addition to this ultra-efficient socialist worker (Troggemann et al., 2001, p. 17). Even so, the Russians did find they needed computers for their military and space programs, so they either reverse

46

engineered American computers or engaged their Eastern European states in producing custom models (Ceruzzi, 2003, pp. 11-12). The Soviets would lag behind their American counterparts so much so that the first onboard computer guided manned space flight did not occur until June 1980 (Gerovitch, 2003). Despite this lag, Russian programmers quickly emerged after the Soviet Union’s collapse to be some of the best in the world. By the twenty-first century, Russian schools could beat prestigious US Universities such as

MIT in programming contests (Lombardi, 2006). Further, Russians account for about

35% ($2.5-$3.7 billion) of global cybercrime revenue, yet only accounted for 1% of the global information technology market (Galeotti, 2011). Dr. Mark Galeotti attributes this to large cohorts of Russians with world-class mathematical and computer skills without the jobs to match them—a job market Russia’s mere 1% of the global information technology market implies (Galeotti, 2011).

One of the first major Internet attacks originated from Russia was by Vladimir

Levin in 1994 (Corrin, 2009; Gup, 2003, p. 144). Levin was able to use security vulnerabilities in Citibank’s money transfer system to steal millions (Gup, 2003, p. 144).

Despite being convicted, his successful hack served as an exemplar for the vast amounts of money that could be made through illicit activity online. During this same time, Russia was launching its first war against rebels in Chechnya (Menon, 2000, p. 32). President

Boris Yeltsin believed the conflict would be over by early May, but by employing guerilla tactics, the rebels were able to humiliate the army of the former superpower

(Seierstad, 2008, pp. 42-43; The New York Times, 1999). By 1999, Yeltsin enjoyed only a six percent approval rating and would be the first president of the post-Soviet Russia to resign (Seierstad, 2008, p. 61; Treisman, 2008, p. 1). Before he had left office, though,

Yeltsin had started the second war in Chechnya, and his successor, Vladimir Putin, would

47

be charged with deciding whether to accept the ’ demands or continue the fight

(Seierstad, 2008, p. 61; Menon & Fuller, 2000, p. 32).

One of the reasons that the rebels, apart from their military effectiveness, had affected Yelsin’s popularity so much was their sophisticated use of the internet to both promote their cause and demorralize the Russian public (Billo & Chang, 2004, pp. 113-

14). Chechens would post news about the conflict as well as videos and pictures of attacks (Billo & Chang, 2004, pp. 113-14). Indeed, the Chechen use of the media prefigured many of the techniques that would later be used during the second US Iraq war (German, 2007, p. 132). Although the first war was seen as an attempt by the weak

Russian state to keep its fragile regions together, the second war was potrayed as an internal security matter and a fight against terrorism—with Putin even informing

President Clinton that al-Qaeda was operating inside Chechnya (Smith, 2012, pp. 50-51).

Unlike the first war, the Kremlin wanted to control the information flow this time and engaged in its first known cyberwarfare against the rebels by attacking linked websites

(Billo & Chang, 2004, pp. 113-14). The rebels responded by creating mirrors and allowing materials to be downloaded and posted elsewhere (Billo & Chang, 2004, p.

114). This electronic war finally came to the surface in a very public way when individuals linked to the Russian government allegedly launched a denial of service attack on one Chechen site while hacking into and deleting another one during the

Russian storming of a Moscow theater where Chechen forces were holding hostages.

After the Chechens moved the information to new sites, the Russians once again attacked the new locations (Billo & Chang, 2004, p. 114).

Russia’s intent to train legions of cyberwarriors is clear, as shown by their creation of the Voronezh hacking school which is by some estimates one of the biggest in

48

the world (Clarke & Knake, 2010, pp. 63-64; Galeotti, 2011). Russia also trains hackers through its excellent technical universities, such as the Siberian Tomsk University

(Rainsford, 2010). Although hacking is not officially taught, a campus culture exists where students battle each other searching for security vulnerabilities in their systems

(Rainsford, 2010). Yevgeny Kaspersky, one of the world’s leading computer security experts, notes that although the majority of cyber attacks are from Asia and Latin

America: “Russian attacks look more professional. The malware and design is more complicated and more technical...I think it's thanks to Russia's technical education. Its graduates are probably the best [hackers]” (Rainsford, 2010). Indeed, the Russian hacking capability is undeniable. Russia in many ways uses this power to intimidate its neighbors.

Countries that were once part of the Soviet Union, such as Estonia, are the most frequent targets of these harassments. Estonia, like many of these countries, has many citizens who are ethnically Russian, but Estonia’s share is particularly high at over one- quarter of the whole population (Estonian government, 2010). Many Russian Estonians do not even have Estonian citizenship (BBC, 2007b). Further, Ethnic Estonians still feel resentment for the Soviet Union’s attempt to “russify” Estonia by promoting migration by

Russians to their country and making school instruction in Russian (Estonian government, 2010; Brown, 2012, p. 202; BBC, 2007b). In 2007, these tensions all came to a head when a monument commemorating the Russian dead of World War II in the center of Talinn was slated to be moved (BBC, 2007b). The decision sparked the first major riots in Estonia in 30 years and led the ethnic Russians to clash with the police and other demonstrators—leaving many injured and one person dead (Ehala, 2009, pp. 139,

142-43; BBC, 2007b). A war of words erupted between the Russian and Estonian governments with Russian Foreign Minister Sergei Lavrov saying the move resulted from

49

a “blasphemous attitude towards the memory of those who struggled against fascism” while Putin called the German Chancellor to express his “serious concern” (Blomfield,

2007; BBC, 2007b).

Beginning on April 27, 2007, one day after the Estonian government moved the

Talin war monument, the government websites of Estonia as well as its internet infrastructure endured three weeks of cyber attacks (Geers, 2008). Estonian officials immediately pointed to the Kremlin as being the originators of the attack (BBC, 2007a).

Even though the attacks were linked to at least one Russian government IP address, the link is difficult to prove, since infected computers of innocent users can attack without their knowledge (Anderson, 2007). The attacks, though, were effective at crippling some

Estonian infrastructure. For instance, most Estonians do their banking online and the attacks caused this basic financial infrastructure to be disrupted (Geers, 2008). Following the end of the conflict, The Economist offered a sobering assessment (emphasis added):

At full tilt, the onslaught on Estonia was also of a sophistication not seen

before, with tactics shifting as weaknesses emerged. “Particular 'ports' of

particular mission-critical computers in, for example, the telephone

exchanges were targeted. Packet 'bombs' of hundreds of megabytes in size

would be sent first to one address, then another,” says Linnar Viik,

Estonia's top internet guru. Such efforts exceed the skills of individual

activists or even organised crime; they require the co-operation of a state

and a large telecoms firm, he says. The effects could have been life-

threatening. The emergency number used to call ambulances and the fire

service was out of action for more than an hour. (The Economist, 2007)

50

Indeed, the massive scale of the attack was unprecedented and deeply alarmed NATO and EU leaders, since a member of both had been so brazenly attacked (Traynor, 2007).

Even so, NATO leaders were reluctant to view “cyber-attacks as a clear military action” that would invoke an Article V collective defense response (Traynor, 2007; Geers, 2008).

Ostensibly as a sign of their solidarity with Estonia and concern, NATO opened up a

Cooperative Cyber Defence Centre of Excellence in Estonia the following year (NATO,

2008; A. Mitchell, 2008). Russia’s mysterious ability to conjure up armies of hackers at precisely the moment they help its policy objectives again arose as it attacked a small former member of the Soviet Union to its South.

Much like Estonia, Georgia also has a large contigent of ethnic Russians living within its borders (Minorities At Risk Project, 2006). Unfortunately, it also has two so- called frozen conflict zones in Abkhazia and South Ossetia within its borders (Beehner,

2006). In what can only be described as ill-advised, the Georgian government sought to reunify the ethnically Russian dominated South Ossetia with the rest of the country and invaded it on August 7, 2008 (The Economist, 2008). In doing so, it it killed Russian peacekeepers and managed to bring the full might of Moscow down on it (Reuters, 2008;

The Economist, 2008). Five days later, in an EU brokered peace agreement, the crushed

Georgian military would retreat back to its undisputed territories (Cohen & Hamilton,

2011, p. iii). This short war, though, would stand as a remarkable turning point in Russian military history. This war was the first time the Russian military used cyberwarfare to support its conventional war operations (Cohen & Hamilton, 2011, p. 40). Although its operations in nearby Chechnya were certainly done to suppress the information flow by and propaganda of the Chechen rebels, the Georgian campaign was the first time the

Russian military operated a conventional campaign in tandem with an electronic

51

campaign targeted at government websites, local media and internet infrastructure

(Cohen & Hamilton, 2011, p. 44).

The cyber attacks began on August 8 within 30 minutes of each other and ended

August 11 when Russia announced a ceasefire (Cohen & Hamilton, 2011, p. 44.).

Although the Estonian attack was quite sophisticated, this attack proved to be even more sophisticated with two distinct prongs. First, the hackers attacked government and media sites in Georgia (Government of Georgia, 2008, pp. 3-4). The Georgian president’s page was changed to include a slideshow comparing him to Hitler (Government of Georgia,

2008, p. 4). Likewise, official email servers went down (Cohen & Hamilton, 2011, p. 46).

Further, websites of local media, such as the Georgian News Agency, went down

(Government of Georgia, 2008, pp. 4-5). The Georgian government responded by shifting its websites to US hosts and using personal email addresses, like they had done until recently before the official email system had been created (Cohen & Hamilton,

2011, p. 46). Indeed, the cyber attack proved somewhat rebuffed on this front due to the screwd actions of Georgian officials. The second and far more sophisticated prong was the a “cyber blockade” (Government of Georgia, 2008, p. 5). Rather than simply launch denial of service attacks, sources claim the Russians took over the internet infrastructure and routed Georgian internet activity through Russia and blocked key internet activity coming out of it (Tikk et al., 2008, p. 11; Government of Georgia, 2008, p. 5). Indeed, this wholesale takeover of Georgia’s networks completely cut its financial system off from the world and crippled its internet infrastructure (Thibodeau, 2009). Unlike its convential forces, which Russia proudly touts, the Russian government remains guarded about its cyberwarfare attacks and implies these attacks are by patriotic third parties

(Markoff, 2008). Most experts agree this “shadowy” force behind the attack is the

52

Russian Business Network—a group that peddles everything from child pornography to spam with its services going to the highest bidder (Krebs, 2007; Government of Georgia,

2008, p. 5; Markoff, 2008; Cohen & Hamilton, 2011, p. 45). Indeed, costing roughly four cents a machine, these cyber mercenaries are far cheaper than covential forces, but they can cripple enemy states economically more effectively than bombs often can (Markoff,

2008). It is unclear how far the increasingly opaque and nationalistic government of Putin is willing to go when asserting its dominance over its neighbors—even if that means collaborating with criminals.

Within Russia we see a clear excalation in the sophistication of its cyberwarfare.

This is a consequence of the increasingly sophisticated attackers within Russia, whom the government uses and often trains. Russiais in a race to keep up with sophisticated cyberwarfare operations—like those in US ally Israel. This is especially true now that it has so closely allied itself with traditional Israeli enemy Syria. Unlike Russia, Israel embraced computing early on by building the Weizmann Automatic Computer

(WEIZAC) in 1954-55—one of the first John Neumann IAS (Institute for Advanced

Studies) Computers in the world built outside the US (Estrin, 1991, p. 318; Mirowski,

2002, p. 491). The cutting edge Von Neumann architecture used in this computer would also be the basis for modern computer architecture (Godse & Godse, 2010; Eigenmann &

Lilja, 1998, pp. 1-2). By the 1960s, this small country ranked with the United States and

Japan as a “world leader in software design and production” due to intensive government investment—particularly by the defense sector (Mirowski 2002, 491). By the 1990s,

Israel’s computer industry was known as “Silicon Wadi” (Mirowski 2002, 491).

Although Israel does not have a hacking school as large as Russia’s, the Israeli government is determined to train hackers to defend against and attack other countries

53

targeting it, such as Iran (World Tribune, 2012). Unlike other nations, though, Israel has been engaging in an informal cyberwar with its enemies for over a decade, beginning with the in the so-called “cyber intifada” (Denning, 2007, pp. 129-30).

During the second Intifada, a group of pro-Israeli hackers attacked Hezbollah’s website after several Israeli soldiers had been kidnapped; in retaliation, hackers, some linked to

Hezbollah, attacked Israeli government, banking and commerce sites as well as internet infrastructure and then released the credit card information of supporters of Israel

(Middle East Intelligence Bulletin, 2000; Denning, 2007, pp. 129-30). Back and forth attacks would continue with hackers attempting to crimple to the Israeli nformaition technology sector (Middle East Intelligence Bulletin, 2000). In 2003, an internet forum linked to Hamas called for more cyber attacks on Israel by luring Israelis to virus filled pages; a year later a website called Internet Haganah, dedictated to fighting internet terrorism, was attacked to prevent its operation (Denning, 2007, p. 30). The Israeli hacker community has resorted to creative measures in fighting this back and forth war. One group of Israeli students created a program called “Patriot” which anyone can download so that their computer can be used to overwhelm websites, such as those of Hamas

(Shachtman, 2009; Carr, 2012, p. 28). Anti-Israeli hackers had developed a similar tool earlier, but it did not received wide acceptance (Racicot, 2009).

The Palestinians and Lebanese are not alone their cyber warfare against Israel. On this virtual battlefield, Israel is being attacked by hackers from around the world—many of whom are supported by their government. Recently, a hacker linked to a Saudi Arabian hacking group engaged in a series of hacks where he released thousands of credit card numbers and eventually went after the webpages of Israeli stock exchanges (Fisher-Ilan,

2012; Messieh, 2012). Israeli hackers retaliated by releasing credit card and other

54

confidential information about Arabs—eventually attacking Saudi Arabian and United

Arab Emirates stock exchanges (Messieh, 2012). Egyptian hackers likewise have engaged in this cyber battlefield with Israel—recently defacing Prime Minister Benjamin

Netanyahu’s website (The Hacker News, 2011). Indeed, in 2008 the Egyptian Muslim

Brotherhood published a Fatwa sanctioning electronic jihad (Spencer, 2008). Even

Pakistanis, who normally attack Indian sites, have attacked Israeli related sites in this continuous battle against this electronically besieged state (Jamshed, 2008). Israel’s most fierce cyber rival is Iran. Iranian hackers have targeted Israeli infrastructure, such as their banks (Mezzofiore, 2012). Iran’s Republican Guard set up a division devoted to cyberwarfare in 2010 with a budget of $76 million and claims to have a million members in its “cyber militia;” it now even claims to be increasing its budget for cyberwarfare to

$1 billion (Danchev, 2012; Waterman, 2012). Israeli hackers have attacked Iranian websites to replace them with pictures of Israeli flags and even brought the state television channels down (Lappin, 2012). Indeed, the US and Israel virtually declared cyberwar on Iran to stop its nuclear program before the Obama’s nuclear agreement

(Sanger, 2012b). In fact, Israel’s most effective and intense cyberwarfare efforts have been to stop its neighbors from getting nuclear weapons.

Syria has historically had a very tense relationship with Israel and been allied with the Soviets and Russia. Believing that the Israelis might attack it to overthrow its regime due to Soviet misinformation, Syria was one of the major instigators of the Six Day War

(Ro'i, 2008, pp. 5-6). During the final hours of the conflict, Israel was determined to seize as much territory as they could—particularly the Golem Heights from which Syria could reign down weapons (Broyles, 2004, pp. 50-53). The area is still disputed, and the border of the territory with Syria is supervised by UN peacekeepers (Wiegand, 2011, p. 29;

55

United Nations, 2011). After ominous signs of Syria’s attempts to build a nuclear program with the help of the North Koreans and Iranians since at least 2003, Israel decided that it was time to stop its enemy to the north from becoming another nuclear power (Wright & Warrick, 2008; Niksch, 2010, pp. 20-21). In fact, the US government would later state that the reactor was nearly operational when the Israelis bombed it and that it believed that the Syrians were indeed attempting to build a non-peaceful nuclear program—much like the North Koreans have (Rosenkrantz, 2008; Niksch, 2010, p. 21).

On September 5, 2007, a squadron of Israeli airplanes would leave Ramat David

Air Base and enter cyberwarfare legend as part of “Operation Orchard” (Cha, 2012,

Chapter 7). These were not stealth planes; in fact, they were bulky and easy to detect

(Clarke & Knake, 2010, pp. 4-5). Even so, the Israelis pierced the several billion dollar

Russian air defense system without losing a single plane (Clarke & Knake, 2010, p. 5).

Although invisible to the majority of the air defense system, they still had to evade a few missiles and destroy a radar station at Tall al-Buad (Cha, 2012, Chapter 7). Soon the al-

Kibar facility was in ruins, and the Israelis had made it very clear to the Syrians and their neighbor, the Iranians, that nuclear weapon development would not be tolerated (Cha,

2012, Chapter 7). According to Richard Clarke, a former high level official in the

Washington security establishment, there are three possible ways that the Israelis pulled off this cyberwarfare feat: a drone that sent a digital signal to the radars which caused them to malfunction, Israeli agents had planted or knew of a “trapdoor” within the code operating the defense systems or the Israelis physically spliced into the fiber lines that controlled the defense system and used that to infiltrate the network (Clarke & Knake,

2010, pp. 6-8). Whatever the method, the Israelis had successfully intergrated conventional and cyberwarfare operations with unprecedented skill and sophistication.

56

Many believed this attack on Syria was as much or more a warning to Iran to cease its attempts to create a nuclear bomb (Clarke & Knake, 2010, p. 3). This nimble and successful use of cyberwarfare no doubt both inspirational and disconcerting to the

Russians—given that the Israeli had defeated the defense system.

Back even in 2009, experts believed that Israel would try to wage cyberwarfare on

Iran’s nuclear facilities before attempting to bomb the buildings deep within Iranian territory (Williams, 2009). In late 2010, it emerged that Iran was having serious issues with its centrifuges and that it was having to replace many of them as they malfunctioned

(Jahn, 2010). Although the Stuxnet virus had been discovered by then and thought to be the cause, its sibling, the Flame malware, had not yet been identified (Zetter, 2012b;

Jahn, 2010). To call either of these cyberwarfare weapons groundbreaking is an understatement. They were revolutionary. Although discovered later, Flame is likely how the developers in the United States and Israel gathered much of the intelligence to know exactly how to target the Iranian systems (Zetter, 2012a). Another component called a

“beacon” was likely used also to map the Iranian centrifuge plant and discover the exact hardware and methods the Iranians used to control the plant (The New York Times,

2012). The remarkable agility with which these components were placed into the Iranian systems and then exploited has brought cyberwarfare to a whole new level.

Flame is rightfully called “one of the most complex cyber weapons yet,” “the world’s most dangerous malware” and a “super cyber-weapon” and demonstrated to

Russia the power cyberwarfare could yield without a single shot being fired—weapons arguable more powerful than mere bullets and bombs (Greenwood, 2012; Aleem, 2012;

Goessl, 2012). Flame is related to Stuxnet in several of its components and how it

57

operates (Bitdefender Labs, 2012b). When experts discovered Stuxnet, they were likewise stunned at its sophistication (Dang, 2011; Nachenberg, 2012). As a professor at

Stanford and leading engineer in the industry said, “Stuxnet bypassed everything we had”

(Nachenberg, 2012). Stuxnet is indeed remarkable. It acts like a virus by parasitically attaching itself to programs (Nachenberg, 2012). It is a worm because of how it spreads itself across the network (The New York Times, 2012; Nachenberg, 2012). It is a Trojan

Horse because it masquerades as something it is not by using the digital signatures of leading companies, like Realtek; this is an unprecedented level of sophistication for a

Trojan Horse due to the fact the encryption keys to create these signatures are closely guarded (Weiss, 2010; Nachenberg, 2012). Indeed, Stuxnet is so sophisticated that it is 50 times the size of a normal piece of software that would perform similar objectives; it has seven ways it can spread itself (Nachenberg, 2012). Among these methods are: using openly shared files between computers, using a vulnerabilities in the way Windows computers can speak to each other, attacking Siemens Programmable Logic Controllers

(PLCs), changing data files to infect the computer on opening and usb drives

(Nachenberg, 2012). Further, it can update itself through peer to peer sharing over a network; this effectively means only one program needs to be on a computer accessible to the internet for the virus to update (Nachenberg, 2012). To exploit many of the flaws in

Windows that Stuxnet exploits, you would need to look at the Windows source code or else reverse engineer it, which would take years.

The actual functioning of Stuxnet is also extremely sophisticated. First, it operates across two operating systems and programming languages to infect the Siemens PLCs; this means it can spread through Windows and infect the PLCs connected to those

Windows PCs (Nachenberg, 2012). Second, it inhibits different behavior when

58

confronted with with different anti-virus software (Nachenberg, 2012). This is so it can evade detection for as long as possible. Third, it attacks the centrifuges in such a way as to avoid detection and still damage them (Nachenberg, 2012). It does this by measuring the operating spead of the frequency converters for 13 days and makes sure it is spinning at the right rate and is indeed a nuclear centrifuge, which spins at a specific very high rate

(Nachenberg, 2012). It then raises the spinning rate to 14,100 Hz for 15 minutes and goes dormant for 17 days (Nachenberg, 2012). It then slows the spining to 2 Hz for 50 minutes, but during these changed speeds it won’t allow it to be shut down (Nachenberg,

2012). It also sends back fake recorded data so that it is difficult to understand what the problem is (Nachenberg, 2012). The precision and ingenuity of Stuxnet is remarkable.

Variants of Stuxnet that are aimed at different problems, but the proof concept had wide ramifications—if you can attack centrefuge industrial controllers than you can attack modern industrial controller for power plants and other basic infrastructure—like waste water treatement (Bencsáth, 2011). Russian hackers—any hackers with enough sophistication—could cripple a country—at least temporarily.

Israel and the US became so dominant in the Cyber domain that attacks on Iran became almost abnoxious. During a recent attack, infected computers would allegedly begin randomly playing the AC/DC song “Thunderstruck” (Matyszczyk, 2012).

According to one source, a frustrated Iranian scientist wrote, “There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out. I believe it was playing ‘Thunderstruck’ by AC/DC” (Faircloth,

2012). Despite the humorous aspects of this, it demonstrates the incredible domination that nation states like Israel and the United States can yield with sophisticated cyber weapons.

59

Russia has gained extremely high competence in the cyberwarfare sphere in part as a consequence of its competition with the US and its allies—like Israel—and in part due to its indigenous high degree of technical knowledge and expertise. While the

Georgian war showed weaknesses in the Russian military in some respects, it also showcased their emergent cyberwarfare capability. Indeed, General Gerasimov recognized the learning that occurred after the Georgian war in terms of force projections outside of Russia and likely used the force modernizations afterwards as an opportunity to advance his own vision for a stronger, modern Russian fighting force that use dominates its enemies in cyberspace and information spheres both before, concurrent with and even in lieu of the deployment of kinetic operations (Bartles, 2016).

Faced with a low birthrate to provide conscripts and recruits, an obstinately corrupt armed forces and the task of protecting a country that spans 11 time zones from central Europe to northeastern Asia, Gerasimov’s approach provides for leveraging small and well funded special operation and military intelligence units to project force in cyberspace at a relatively low cost and low manpower requirement make sense for

Russia. Gerasimov is arguing for a light footprint and technologically sophisticated military of the future pared with the threat and ability to provide overwhelming conventional and nuclear forces—if needed (Gerasimov & Bērziņš 2017).

60

Chapter IV.

Gerasimov’s Importance

Much of the analysis of Gerasimov seems to at one point or another fall into the inevitable debate over whether or not he is the new “great man” of the Russian military of our times. Western historical narratives too often pivot from one great man—sometimes woman—to another regardless of the known weakness of this approach. One recent article in FP wondered aloud if Donald Trump was a “great man” and mused if historians should admit the potential validity of this approach:

The imminent ascension to the U.S. presidency of Donald Trump, a man

whose supporters and detractors both agree is exceptional in the context of

American history, raises a question which historians and social scientists

generally prefer to shy away from: To what extent does historical change

depend on the actions of a handful of unusual individuals — history’s

archetypal Great Men and Women — as opposed to large-scale, long-

term, impersonal forces? (Bell, 2017)

While historians may cringe at the thought of returning to such historical reductionism, in the case of Russian military evolution following the fall of the Soviet Union the idea that

Gerasimov is the single author of Russia’s military strategy in Ukraine is absurd. It is enough that the approach he describes—sometimes called the Gerasimov Doctrine—is largely descriptive of the Russian military’s approach in Ukraine. We can view

Gerasimov as providing one of the clearest articulations of a hybrid warfare style operations modeled on Western Color revolutions and the many benefits this style of war fighting. Whether Gerasimov is a great military theorist himself is of little consequence—

61

he has risen to the highest echelons of the Russian government and partakes in the in debates he ruminates on.

For maximum understanding, Gerasimov’s writings and speeches need to be contextualized in several key ways. First and foremost, Gerasimov is said to be Defense

Minister Sergei Shoigu’s chief military advisor—in essence, a formal and informal talisman for the long time former emergency manager turned military chief. As the FT notes in one of the rare profiles of the enigmatic Gerasimov:

A man of few words who appears in public infrequently, Mr Gerasimov is

a general’s general, described by Sergei Shoigu, Russian defence minister,

as “a military man to the roots of [his] hair”.

Mr Shoigu, a politician-turned-general, is said to lean on the former tank

commander for military advice. “If Shoigu is an excellent air guitarist,

then it’s Gerasimov playing in the background,” according to one

anecdote. (Foy, 2017)

Gerasimov’s public speeches and writings are few and far between for such a sharp mind who holds such a high post in one of the largest militaries in human history. These writings no doubt reflect his own views on military matters and the advice he gives

Shoigu.

Originally appointed by Yeltsin, General Shoigu is a survivor and confident of

President Putin and has served in the Russian government from its beginning as a post-

Soviet state:

But Mr Shoigu is much more than Russia’s latest defence minister. At 60,

three years younger than Mr Putin, he is the longest-serving member of

62

the Russian government; his tenure stretches back to 1990, before the

collapse of the Soviet Union, when Mr Putin was still toiling in obscurity

in the St Petersburg mayor’s office. He made his name at the Ministry of

Emergency Situations (MChS), a semi-militarised rescue service with a

wide remit that he built himself and led for nearly 22 years. By skilfully

navigating Russia’s Byzantine bureaucracy, he has accrued power and

popularity without making any notable enemies. “There’s no one else like

him in the ruling class,” says Evgeny Minchenko, an analyst who studies

the Russian elite. “It’s an absolutely unprecedented story.” (Economist,

2015)

A potential successor to Putin and confidant, Shoigu is Putin’s most trusted advisor apart from his chief of staff—virtually ensuring that Shoigu’s advise was instrumental in invading Ukraine:

Although Mr Shoigu does not belong to Mr Putin’s coterie of ex-KGB

men from St Petersburg, he is a trusted insider. Mr Minchenko, who

releases a widely circulated yearly report called “Politburo 2.0”, puts Mr

Shoigu second in influence among Mr Putin’s associates, trailing only his

[now former] chief of staff, Sergei Ivanov. When big decisions like the

operations in Ukraine or Syria are made, Mr Shoigu is indispensable. His

combination of loyalty, competence and popularity also makes him one of

a handful of potential successors to Mr Putin. (The Economist, 2015)

It is inconceivable therefore that Gerasimov himself did not both directly and indirectly influence the Russian decisions and methods by which to wage war against Ukraine.

63

Second, Gerasimov is Chief of the General Staff of the Armed Forces of the

Russian Federation and First Deputy Minister of Defense of the Russian Federation. He literally is one of the chief planners of the Russian military strategy he is discussing in his famous article The Value of Science Is in the Foresight: New Challenges Demand

Rethinking the Forms and Methods of Carrying Out Combat Operations. As one scholar discusses his role (footnotes omitted, emphasis added):

Although the Russian Security Council is the chief proponent of Russian

strategy, the Chief of the Russian General Staff does sit on council,

bridging operational art to the national security strategy. The General Staff

does far more than just plan operations. It also has responsibility for the

use of “foresight” to develop the theory and practice of future war. In

Russian military thought foresight is directly linked to military science,

with military science being the science of future war. The General Staff’s

responsibility to predict the nature of future war makes it the logical place

(in the Soviet/Russian system) for doctrine and capability development for

the entire Ministry of Defense.

Just as important as what the General Staff does is what the General Staff

does not do. It

does not have operational control of the force. Although there were

Goldwater-Nichols-like reforms that removed operational control from the

branch chiefs (Ground Forces, Air Force, etc.) and placed the operational

control of most forces with regional commands, little has changed with the

64

General Staff’s role as operational planners and capability and doctrine

developers since Soviet times. (Grau & Bartles, 2016, p. 11)

Gerasimov is a participant, influencer, and articulator of a debate within the post-Soviet military as it moves beyond antiquated Soviet warfighting methods and equipment to compete with the highly advanced methods and equipment of the West. Gerasimov’s The

Value of Science Is in the Foresight: New Challenges Demand Rethinking the Forms and

Methods of Carrying Out Combat Operations is based on a speech made a mere 3 months after Gerasimov’s 2012 appointment as Chief of the General Staff and First Deputy

Minister of Defense (Foy, 2017). It represents the General’s first foray into this debate from this senior post—no doubt an influential articulation representing the thinking he expressed himself in internal discussions.

Despite the obvious importance of Gerasimov’s writings and approach, he is often dismissed as merely repackaging the approaches used in KGB and suggested by others as well in debate over what future Russian warfighting should be.

Gerasimov’s article is well within the sphere of the ongoing debate within the Russian military over different conceptions of Russia’s new fighting approach, whether it is

General-Lieutenant A. V. Kartapolov “new-type war” (NTW) or General-Lieutenant S.

A. Bogdanov and Reserve Colonel S. G. Chekinov’s “new-generation warfare”

(NGW)—a term that has fallen now out of favor (Thomas, 2016, pp. 554-56). Indeed, the roots of this debate stretch into the 1990s as the Russian military transition from the

Soviet one that preceded it:

Bogdanov and Chekinov appeared to be restating many of the thoughts of

retired (now deceased) General-Lieutenant Vladimir Slipchenko, who was

65

a driving force for new thinking in Russia in the 1990s and the early part

of the next century. He wrote often on what he referred to as ‘sixth

generation warfare’, or noncontact warfare, which would be based on

high-technology weaponry and systems able to maneuver in small groups.

Slipchenko’s work may be considered

as a (or the!) most important source behind much of the new-generation

warfare thinking and postulating of Bogandov and Chekinov. In fact, in

2013, a Slipchenko-authored article appeared posthumously in the Russian

military publication Army Journal. It discussed Slipchenko’s description

of planetary warfare and several other new-generation warfare concepts.

(p. 555-56)

These vague conceptions of modern warfare are constantly in flux, though. Representing more a direction of military thought than a hardened school of military theory. The use of special operations, advanced weapons, information warfare and cyber attacks are all elements of the various positions advanced within the Russian general staff—some more heavy on conventional and kinetic operations while a method like Gerasimov’s relies primarily on the power of non-conventional weapons like information and political pressure (Thomas, 2016).

Western academics, journalists and scholars seem to be falling victim to a bizarre idiosyncrasy of the Russian Military that is a carryover from Soviet Times to provide international cover for controversial approaches—claim these tactics and strategies are really Western tactics:

66

Russian military officers (to include Gerasimov) refute the use of hybrid

methods by the Russian military, stating clearly that this is a Western

method of conducting modern war. Other officers make the same claims

about NGW and NTW, initially stating that these are Western concepts (an

argument Westerners have not made!). Clearly Russia has studied all three

and learned from an examination of the concepts, eventually describing

their components and how to counter them. This appears to be the use of

an old Soviet method, that being to describe how another country conducts

war when actually the description is of Russian methods. (Thomas, 2016,

p. 555)

Any critique of the methods by other countries is spun as hypocrisy. In a sense these

Russian methods are a dark reflection of Western ideas, because they are an attempt by

Gerasimov and the Russian military at large to use what they see as Western military methods against the West and its allies. Even so, Gerasimov’s cynical and distorted articulation has made this “hybrid war” method a distinctly Russian articulation.

One Russian propaganda outlet advanced the theory hybrid warfare in Russia was simply an invention of exiled fascists—deriding the West’s portrait of Gerasimov as the arch villain of the Russian military’s forays:

[T]he idea of 'hybrid warfare' is anything but new. "In Russia, the idea of

the 'part-war' was something on which thinking began a very long time

ago." An important theoretician on this type of war was ex-soldier and

academic Evgeni Messner (1891-1974), "one of the most important

representatives of military thought among the Russian diaspora."

67

An officer in the Imperial Russian Army, Messner fled Russia after

the victory of the Bolsheviks, settling in Yugoslavia, and collaborating

with the Nazis during the Second World War against the Red Army. His

best-known publication 'Mutiny, or in the Name of the Third World War,'

predicted that the wars of the future would be fought by terrorists and

special forces, with states using subversion and organizing revolutions,

rather than traditional warfare, to gain power and influence.

Messner wrote: "Future wars will not be fought on front lines, but

throughout the entire territories of both opponents, because behind the

front lines political, social, and economic fronts will appear; they will

fight not on a two-dimensional plane, as in olden days, not in a three

dimensional space, as has been the case since the birth of military aviation,

but in a four-dimensional space, where the psyche of the combatant

nations will serve as the fourth dimension." (Plekhanov, 2017)

Military blogger Mark Galeotti’s “apology” for evidently coining the term “Gerasimov

Doctrine” gave Russian propaganda yet another chance to mock the West for believing

Gerasimov’s own words:

Even as he backtracked from the ‘Gerasimov Doctrine,’ Galeotti

maintained that Russia was still practicing the policies described in the

speech, subverting Western democracy and institutions as the only way to

compete “with a larger, richer coalition of democracies” represented by

NATO. President Vladimir Putin, he claimed in the Foreign Policy essay,

68

was “largely wrong, but not entirely so” about the threat to Russia from

the West, to which US actions have “inadvertently contributed.”

It seems this was Galeotti’s way of saying he only got a little hyperbolic

with the title, but the rest of his “expertise” on Russia still stood. While it

is not hard to sound reasonable about Russia in comparison to, say, the

corner of Twitter that has gathered around Louise Mensch, Galeotti still

has miles to go. (RT, 2018)

Galeotti’s attempt to maintain relevance in the debate over Russian military approaches in the war did little more than distract Western militaries from Gerasimov’s importance as a military thinker and leader.

Third, Gerasimov’s approach aligns with rivalry between Russia’s military and civilian intelligence apparatuses with military intelligence seeking more funding and a larger role. This rivalry grew so intense in the 2016 election that civilian FSB intelligence agents informed US intelligence about military GRU operations:

Reiter delved into the mystery of why the men were charged with, of all

things, passing information to the CIA about the Russian cyber-attack.

According to Reiter, they had been set up by a rival faction in Russian

military intelligence, the GRU. The rivalry, which Soldatov and Borogan

had also reported on, centered on securing both the prestige and budgetary

funds that came with penetrating U.S. government cyber-defenses. This

had previously been the exclusive domain of the FSB—once run by

Putin—and the GRU was trying to muscle in on the FSB’s territory and

69

money. A side effect of this internal rivalry, Reiter concluded, was how

the Americans discovered the hack. (Ioffe, 2017c)

This rivalry is why Gerasimov’s use active measures to exploit social fractures sounds so much like the civilian intelligence operations of times past—such as the KGB’s efforts during the civil rights movement (Ioffe, 2017b). Indeed, if the military can control the large-scale information campaigns and receive the funding to do so, it can integrate them into broader military strategies. It appears during the 2016 election, it was Russia’s military intelligence did far more damage—as a July 2018 indictment of military officials involved in the Guccifer 2.0 campaign shows:

In or around 2016, the Russian Federation (“Russia”) operated a military

intelligence agency called the Main Intelligence Directorate of the General

Staff (“GRU”). The GRU had multiple units, including Units 26165 and

74455, engaged in cyber operations that involved the staged releases of

documents stolen through computer intrusions. These units conducted

largescale cyber operations to interfere with the 2016 U.S. presidential

election. (Department of Justice, 2018)

Their Hillary Clinton email hack and release of emails is thought by many to have changed the course of the election while the FSB efforts through the Internet Research

Agency likely had minimal effect other than perhaps polarize more those who were successfully influenced by them (Silver, 2017). Russian military intelligence inflicted a wound that Clinton never recovered from and which was likely made fatal by the infamous Comey letter (Silver, 2017). For Gerasimov, these measures—once mostly the province of civilian intelligence agencies—are (in fact) the most powerful than the

70

traditional kinetic weapons militaries fight with: “The very ‘rules of war’ have changed.

The role of nonmilitary means of achieving political and strategic goals has grown, and, in many cases, they have exceeded the power of force of weapons in their effectiveness”

(Gerasimov, 2016b, p. 24). Gerasimov is here to harness these techniques and use them militarily, so it is inane to argue whether or not he invented them. Gerasimov and his colleagues are trying to convince Putin—infamously a KGB spy—the military should be at the vanguard of efforts to counter color revolutions and destabilize the governments of

Russia’s enemies.

Finally, if one were to ask in a deep and historical sense the origin of the broadest outlines of Gerasimov’s approach, the answer might surprise many. In many ways,

Gerasimov’s deepest theoretical underpinnings can be found in the trenches of World

War I. It was there in that bloody conflagration of horror and death that European nations realized that the linear warfare methods of the past were outdated and new tactics had to be developed to break enemy lines and prevent the entrenched and devastating battles of that war (Harrison, 2010). For the Germans, this meant the use of approaches like

Blitzkrieg—an attack so fast and powerful by an armored division that the enemy could not mount effective defensives quickly—and for the Soviets this meant the deep operation—attacking the enemy at every point of the battlefield and its ability to support and maintain engagement at the line of contact (Habeck, 2003; Harrison, 2010). It was these methods and approaches developed during this period that would eventually help the Soviet’s win World War II along with the allied troops—in spite of the fact many of these geniuses were murdered or exiled by Stalin’s fanatical regime. Gerasimov himself notes his admiration for these persecuted military geniuses and views those who are pushing back against the modernization he is suggesting as anachronistic:

71

The state of Russian military science today cannot be compared with the

flowering of military-theoretical thought in our country on the eve of

World War II.

Of course, there are objective and subjective reasons for this, and it

is not possible to blame anyone in particular for it…. [These military

theorists] were extraordinary personalities with brilliant ideas. I would call

them fanatics in the best sense of the word. Maybe we just do not have

enough people like that today. People like, for instance, Georgy Isserson,

who, despite the views he formed in the prewar years, published the book

New Forms of Combat. In it, this Soviet military theoretician predicted,

“War in general is not declared. It simply begins with already developed

military forces. Mobilization and concentration are not part of the period

after the onset of the state of war as was the case in 1914 but rather,

unnoticed, proceed long before that.” The fate of this “prophet of the

Fatherland” unfolded tragically. Our country paid in great quantities of

blood for not listening to the conclusions of this professor of the General

Staff Academy.

What can we conclude from this? A scornful attitude toward new

ideas, to nonstandard approaches, to other points of view is unacceptable

in military science. And it is even more unacceptable for practitioners to

have this attitude toward science. (Gerasimov, 2016, pp. 28-29)

Gerasimov makes clear he is casting his lot with the “fanatics” who helped the Soviets win World War II and is urging the Russian military to turn the lessons of the color

72

revolutions into a modern approach that can defeat Western militaries at their own game—deep operations that reach far beyond and in some ways usurp the traditional points of contact:

Frontal engagements of large formations of forces at the strategic and

operational level are gradually becoming a thing of the past. Long-

distance, contactless actions against the enemy are becoming the main

means of achieving combat and operational goals. The defeat of the

enemy’s objects [objectives] is conducted throughout the entire depth of

his territory. The differences between strategic, operational, and tactical

levels, as well as between offensive and defensive operations, are being

erased. (Gerasimov, 2016b, p. 24)

For Gerasimov—as his opening line suggests in its echo of Isserson—wars are not declared with clear beginnings. The battlefield is not limited by time and space with the opening salvos likely happening in the information sphere long before any military points of contact: “In the twenty-first century we have seen a tendency toward blurring the lines between the states of war and peace. Wars are no longer declared and, having begun, proceed according to an unfamiliar template” (Gerasimov, 2016b, p. 24). Indeed, modern technology enables the military to extend the deep operation in ways that even the ingenious “fanatics” like Isserson could not imagine.

Given the US’s technological superiority, much higher military spending, and an economy more than 10 times the size of Russia’s, asymmetrical, non-linear engagement especially in the information sphere allows a country like Russia to dominate the US and leave it reeling:

73

The information space opens wide asymmetrical possibilities for reducing

the fighting potential of the enemy. In North Africa, we witnessed the use

of technologies for influencing state structures and the population with the

help of information networks. It is necessary to perfect activities in the

information space, including the defense of our own objects [objectives].

(Gerasimov, 2016b, p. 27)

Deep operations—like those regarding the Clinton emails—have allowed Russia to wage war on the United States with only weak pushback while gained a president who feels even acknowledging these efforts happened will delegitimize his presidency and help his foes. This can be seen no better than Trump’s response to questions about Russia’s actions during the election that brought him to power:

My people came to me, Dan Coats, came to me and some others,

they said they think it’s Russia. I have President Putin. He just said it’s not

Russia.

I will say this: I don’t see any reason why it would be. But I really

do want to see the server but I have confidence in both parties.

I really believe that this will probably go on for a while, but I don’t

think it can go on without finding out what happened to the server. What

happened to the servers of the Pakistani gentleman that worked on the

DNC? (Irish Times, 2018)

During the press conference, Trump practically made the arguments for Putin that Russia had not interfered. Having a US President feel obligated to support a bald-face lie— against both the opinion of the Justice Department who just indicted 12 military

74

intelligence figures and an intelligence community that warned the prior administration as well—will likely go down in history as one of the great information warfare victories in modern times—despite the fact Trump has somewhat backtracked on his comments

(Wagner & Sonmez, 2018). Russia has beaten the nation who both invented the internet and social networks by using these technologies far better than the US ever has in a military sense—despite Gerasimov and much of the broader Russian military’s belief that social media based civil society efforts (especially in color revolutions) are simply US intelligence operations (Cordesman, 2017; Gerasimov, 2016b; Bouchet, 2016). Ironically,

Russia is beating the US at a game they believe the US invented when—in fact—it is

Russian who are the true innovators in this realm.

75

Chapter V.

Countering Gerasimov through De-Escalation

Much of Ukraine’s efforts are devoted to increasing its conventional forces as well as launching efforts to counter the cyber and information wars. It should be remembered, though, the approach Gerasimov first articulated in The Value of Science is in the Foresight anticipates an escalation of violence that the manipulating government can use as a pretext for in intervention. If Ukraine were to launch a massive effort to expel the Russian backed separatists and the Russian military supporting them in

Ukraine, Gerasimov would respond in kind—launching a huge military campaign in a

“peacekeeping” operation that would lead to a unending frozen conflict, independence of the captured territory or outright annexation. Each of the these options would be dark reflections of what Russia sees as the damaging and hypocritical campaigns of Western powers and the US in the Balkans, Middle East and around the globe. One option for countering Gerasimov’s approach is descalation—realizing the cost of escalation in the war and fragility of Russia itself. One potential solution has been applied to gun violence in Chicago.

Gun violence in Chicago is famously horrific and ubiquitous in the poorer parts of the City—often bleeding into the wealthier parts due to its sheer scale. A beautiful and dynamic city, gun violence has nonetheless earned its names like “Chiraq”—referring to the fact that gun violence has rendered parts of the city as dangerous as Iraq to the eyes of some (McKissack, 2017). Many metaphors exist for violence and ways to address it, but violence as a disease spreading has proved one of the more valuable ones on the streets of

Chicago—spurring one of several interventions that helped bring Chicago’s murder rates

76

down by 16% in 2017 (Park, 2018). This section will argue that this approach of treating violence as a disease—would be an effective intervention in the war in Eastern Ukraine and help bring down the civilian deaths there.

In the war in Eastern Ukraine, the combatants and primary parties are Ukraine,

Russian-backed separatists and Russia itself—given that its military (especially Military intelligence and Special Operations) is and has been in direct combat with the Ukrainian military (Peterson, 2017). The Russians appeared to believe that an of ethnic

Russians only lightly supported by Russian Military Intelligence and Special Operations could overcome any Ukrainian resistance to an autonomous status and eventual annexation of large swaths of Eastern and Southern Ukraine, but with the violent and fierce battle in , the Ukrainians made clear that Ukraine had made its nonviolent stand in Crimea and from now on would fight over every meter of its territory Russia was trying to claw back through its proxies and military parading as proxies—regardless of whether it would have to fight rebelling Ukrainians as well (The Economist, 2014b).

Within a year, the tide had turned in favor of the Russian back separatists—now supplied with anti-aircraft weapons capable of shooting down even airliners, large contingents of

Russian soldiers and heavy weapons—and they dealt the Ukrainian military as stinging defeat in the Battle of Debalteve as they tried to gain as much territory as possible before another shaky ceasefire—known as II—was implemented under pressure from key secondary and third parties—including France, Germany and the United States. Under the agreement, the Organization for Security and Co-operation in Europe (OSCE) monitors the ceasefire line and reports violations—a now daily occurrence (Shalal, 2018).

Given the fact that Ukraine—for now—is politically committed to use the full force of its military to oppose to retain its sovereignty over its territory as it stood after

77

the forced occupation of Crimea and the fact that the Russian separatists would be unlikely to be able to withstand the full force of the Ukrainian military alone, the future of the conflict depends largely on Russia’s political will to continue it—since the

Ukrainians cannot defeat Russia’s conventional forces and Russian military doctrine explicitly allows threat and use of nuclear weapons as their own “de-escalation” measure under the so-called “Ivanov Doctrine” (Schneider, 2017). Thus, even if the Ukrainian military undergoes a massive transformation and begins to force the separatists and the

Russian military out of their country, Russia could potentially threaten or actually use nuclear weapons to force Ukraine’s military to stop. To understand the future of the

Ukrainian conflict, one must understand what Russia views in its national interest—no easy task. As Winston Churchill noted in a speech a month after a German invasion of

Poland that was facilitated by the Molotov–Ribbentrop Pact:

I cannot forecast to you the action of Russia. It is a riddle wrapped in a

mystery inside an enigma; but perhaps there is a key. That key is Russian

national interest. It cannot be in accordance with the interest of the safety

of Russia that Germany should plant itself upon the shores of the Black

Sea, or that it should overrun the Balkan States and subjugate the Slavonic

peoples of south eastern Europe, That [sic] would be contrary to the

historic life-interests of Russia. (Churchill, 1939)

Despite his confusion over why Russia would cooperate with fascists that hated it and against who they had once railed, Churchill hill posited that Russia would eventually oppose the Nazis if they invaded the Balkans or the Slavic areas adjoining the Black Sea—the area Ukraine inhabits. Indeed, key parts of Ukraine, such as Kiev, have been ruled by the Russians since the 17th century—a time

78

when the territory now known as the United States of America was still mostly wilderness and largely the domain of Native Americans (Nygren, 2008). Indeed, the “historic life-interests of Russia” could have easily predicted reprisals from

Russia for the Euromaidan Revolution that overthrew the Russian supported

Yanukovych government and the highly unpopular (in Russia, that is) US and

Western European interventions in the Balkans—interventions the Russian officials such as General Valeri Gerasimov who now lead the efforts against

Ukraine have criticized (Gerasimov, 2016b; Cordesman, 2017).

As discussed above, many controversial Russian actions can be viewed as Russia pushing back against what it sees as efforts by the United States and its European allies to foment revolution across the world. Ukraine—having fought Russian forces to a stalemate—is a country now largely on the defensive against the hybrid war being fought against it, and it will remain on the defensive as long as Russia views it in its interests to attack it and support the war in eastern Ukraine. Russia is much more powerful on every level, and its seat on the UN security council means that it can and will veto any attempts to use the UN against its aggressive actions. Russia also supplies gas and oil to Europe through pipelines built during the Soviet Union and newer projects like North Stream I and II—the second pipeline being built despite European sanctions (Klikushin, 2018).

Indeed, with a popular former German prime minister (Gerhard Schröder) lobbying on behalf of the Russian energy industry and sitting on its boards, it is unlikely that sanctions against Russia will ever be strong enough to economically dissuade it from aggression in

Ukraine (Noack, 2017).In fact, Germany already receives 75% of its gas from Russia and faces internal opposition to efforts to confront Russia’s brazen misbehavior—whether invading Ukraine or using chemical weapon to assassinate a former spy as a warning to

79

other potential defectors (Chambers 2018; Keating 2018). Indeed, countries like Italy openly question whether sanction should exist at all—no doubt influenced by the continuing political influence of populist Silvio Berlusconi (Emmott & Baczynska,

2016).

Ukraine on the other hand is one of the poorest countries in Europe and, despite one of the largest militaries in Europe, is ill-equipped. Although secondary parties like the US, Poland and the have supported Ukraine with training and equipment, the military gap between Russia and Ukraine remains large and likely insurmountable—Russia will always have nuclear weapons and Ukraine will likely never have them in it again. Given this power asymmetry and the prospect of a war without end—what can Ukraine do? One intervention—in concert with other interventions—is to reduce the violence on the line of control in eastern Ukraine. As the OSCE recently noted, the violence there has the potential to spin out of control into a high intensity war where Russia abandons all pretext of not being a direct combatant with Ukraine (Shalal,

2018). At the very least, Ukraine can reduce civilian casualties—something that risks only further dividing Ukrainian society. For this, this section argues using Dr. Gary

Slutkin’s approach of treating violence as a contagious disease. Infectious diseases have three major characteristics: clustering, spread, and transmission (Slutkin, 2013).

Clustering is fairly self-explanatory—violence is often close in time and distance to other violence. Spread means that violence propagates in a non-linear fashion meaning that strict causation is hard to determine and its onset is due to multiple factors. It can occur in waves—like the plague and then die out. Finally, it is transmitted from person to person.

Other researchers, such as Yale’s Dr. Andrew Papachristos, have shown how violence and criminality is embedded within social networks and therefore can be both predicted

80

and possibly prevented—such as through the Chicago Police Department program known jokingly as “hug-a-thug” in the department (Christensen, 2014).

Although other application areas—such as Chicago gang violence—are quite different from a ceasefire line, an OSCE map shows that civilian deaths are quite similar to the patterns of disease outbreaks and Chicago gun violence (Fig. 4). Indeed, OSCE

(2017) has found the kind of correlations one would expect with the clustering, spreading, and transmission of a disease-like violence dynamic: “there is a correlation between ceasefire violations and corroborated cases of civilian casualties caused by shelling and SALW and that increased intensity of fighting contributes to an increase in the number of civilian casualties” (p. 10). Cure violence—the NGO Slutkin uses to implement his model—recommends seven steps, which can be modified and applied to eastern Ukraine and should be implemented on both side sides as much as possible:

1. Assess the violence problem along the line of control/ceasefire line

2. Engage leaders of communities

3. Identify appropriate community partners

4. Identify appropriate hospital response partners

5. Re-examine the data

6. Hire and train credible workers

7. Implement program with technical assistance (Cure Violence, 2018)

81

8.

Figure 4. Cholera Epidemic and Violence in Chicago (Slutkin, 2013) Compared with an

OSCE Map of Civilian Casualties in Eastern Ukraine (OSCE, 2017).

Although separatists who live in the community can be reached through community leaders, those in the Ukrainian and Russian military may be harder to intervene with, because they must act on orders or face discipline. Indeed, most of those engaging in the

82

violence in this situation are under some sort of chain of command. Thus, commanders with discretion to retaliate or not to ceasefire violations may be a key target in this intervention. There is evidence this may work—President Poroshenko has repeatedly ordered Ukrainian Soldiers to only fire when attacked—something that has helped decrease ceasefire violations from thousand to tens per day (Unian, 2015). In addition, a

PeaceTXT-like intervention where messages are delivered to residents in the communities along the line of control that warn of active combat and shame combatants on both sides for killing civilians with their barrages. Messages like: “You just killed

Svetlana, a four year old child,” “stop firing, you are hitting civilians” or “violence is killing the people you claim to protect.” PeaceTXT uses the idea that these messages and interventions can act as violence interrupters and are used in many different contexts— from Kenya to prevent election violence to Chicago to prevent gang violence (Ushahidi,

2011). Other methods that mobile texts, like WhatsApp, Viber, Telegram and Facebook messenger could all facilitate this messaging and each of these is widely used in Ukraine.

Using the seven steps advocated by Cure Violence and the PeaceTXT messaging model, violence along the Line of Control in eastern Ukraine could likely be lowered.

Ukraine cannot defeat Russia militarily, and Russia is unlikely to view a withdrawal from

Ukraine in its national interest in the near future. Further, Russia is likely to continue to assault Ukraine using Information and Political Warfare in line with the Gerasimov’s approach, and although interventions should be made to combat this, interventions can also be made to reduce civilian deaths to close to zero as possible if a ceasefire cannot be fully implemented. Thus, even if Minsk II remains a failure, interventions using Dr.

Slutkin and Cure Violence’s methods can help reduce the violence along the line of country.

83

Chapter VI.

Conclusions

Gerasimov’s approach to hybrid war is a key insight into how Russia has and will conduct the war in Ukraine—although it is not the only the influence and is part of larger of evolution of Russian approaches to the cyber and information domains. Due to General

Gerasimov’s position as Chief of the General Staff of the Armed Forces of the Russian

Federation and First Deputy Minister of Defense of the Russian Federation, his closeness to the highly influential Defense Minister Sergei Shoigu and his willingness to argue for the modernization of the Russian military in a way that uses advanced low cost and high impact hybrid war techniques, it is likely that the general’s influence will only increase.

Despite setbacks in the war in Eastern Ukraine, the unequivocal success of the operation in Crimea (in terms of a military operation, at least), the highly successful Guccifer 2.0

Clinton email operation, and evidence of other Russian international information warfare efforts to “polarize democratic societies and pit communities within those societies against each other” indicate Russia will only continue to rely on both on Gerasimov directed and influenced operations as well as those efforts of a similar character— whether of a civilian or military intelligence character (Garcia & Torres, 2018).

Even if Gerasimnov’s approach to hybrid warfare is not his own invention, the result of the collective reflection of many in the Russian military or simply him parroting

Russian military policy, he remains one of the clearest and concise articulation of the hybrid methods of war being employed in Ukraine and across the world. The evidence from the language of his articles and speeches, though, indicates someone who actively advocating for the Russian military to adopt approaches that compete with and in many

84

way mirror the low cost, high impact color revolution style military campaigns he imagines the West—particularly the US—uses to great effect. The Putin guided Russian vision for a multipolar world with spheres of influence where Russia is an important international player is facilitated through these color revolution-like campaigns and are a way to keep its former colonial possessions—like

Ukraine in check and under its influence. Modern Russian information warfare combines the parallel and entertwined developments of the Russian economic and political system.

Likewise, Russian Cyberwarfare leverages these developments as well. Gerasimov’s approach is the logical extension of these developments—utilizing the assets Russia has developed to gain a military advantage. Both Gerasimov’s vision of modern warfare and the information and cyber warfare capabilities that grew from chaotic and dark economic transition from communism to a market economy are a dark mirror of Western institutions and the attempt to spread liberal democracy and capitalism across the globe.

Ukraine’s best hope in the war in Eastern Ukraine is to descalate it as much as possible to ensure the conflict does not excalate and serve as a pretext for a the final stages of Gerasimov’s 2013 vision of hybrid war a peacekeeping occupation or simple full scale invasion by using the overwhelming force of the Russian military. While waiting, Ukraine can do everything possible to save the lives non-combatants and its own soldiers while it upgrades its military with the support of the US and Western European allies. Ukraine will never have the capability to counter Russia’s nuclear superiority and purported willingness to use them without having the unequivocal protection of the US’s nuclear arsenal through NATO. Instability in Russia, a souring of public opinion on the war, conflict with another powerful neighbor, a drastic change in political leadership or even simply the death of Putin could all change Russia’s calculus and open the door for

85

peace. Ukraine has much work to be done internally and can use this opportunity to reform the country and decrease its reliance on Russia and thus its ability to force it to act in one way or another.

This area remains full of opportunities for future research. For instance, there is a clear link of Russian hybrid warfare to modern civilian social media marketing, but this disciplinary lens is rarely applied indepth due to its focus on business and economic dynamics. Likewise, a biographical sketch of General Gerasimov from those who worked with him and in his own words would help many understand this general who is a key part of the powerful resurgence of the Russian military on the international stage.

86

References

Åslund, A. (2015). Ukraine: What Went Wrong and How to Fix It. Peterson Institute for

International Economics.

Aleem, M. R. (2012, May 31). Flame Malware: Everything You Need To Know About The World’s

Most Dangerous Malware. Retrieved July 24, 2012, from theTechnoFreaks:

http://thetechnofreaks.com/2012/05/31/flame-malware-everything-you-need-to-know-

about-the-worlds-most-dangerous-malware/

Alford, L. D. (2010, April 28). Cyber Warfare: The Threat to Weapons Systems. The WSTIAC

Quarterly, 9(4), 3-6.

Alisha, A. (2002). Computer Science With C++. Allied Publishers.

Alpert, L I and J Solomon. (2014, February 26). Russia Orders Military Drill, Stoking Tensions.

Retrieved from

https://www.wsj.com/articles/SB10001424052702304709904579406310892324006

Anderson, N. (2007, May 14). Massive DDoS attacks target Estonia; Russia accused. Retrieved

July 23, 2012, from Arstechnica: http://arstechnica.com/security/2007/05/massive-ddos-

attacks-target-estonia-russia-accused/

Anderson, P. (2012). Web 2.0 and Beyond: Principles and Technologies. Taylor & Francis.

Associated Press. (2005, April 25). Putin: Soviet collapse a 'genuine tragedy'. Retrieved November

14, 2017, from http://www.nbcnews.com/id/7632057/ns/world_news/t/putin-soviet-

collapse-genuine-tragedy/#.Wgs2IyKprwc

87

Associated Press. (2012, June 1). Cybersleuths See Link Between Flame, Stuxnet Virus. Retrieved

July 4, 2012, from NPR: http://www.npr.org/templates/story/story.php?storyId=154767369

Associated Press. (2013, December 26). Ukraine leader warns defiant regions amid protests.

Retrieved January 15, 2014, from http://www.utsandiego.com/news/2013/dec/26/ukraine-

leader-warns-defiant-regions-amid-protests/

Auyezov, O. (2011, October 11). Ukraine-Russia gas deal: Tymoshenko's biggest bet. Retrieved

January 4, 2014, from http://www.reuters.com/article/2011/10/11/us-ukraine-tymoshenko-

gas-idUSTRE79A4AV20111011

Bērziņš, J. (2014, April). National Defence Academy of Latvia. Retrieved October 12, 2016, from

Russian New Generation Warfare:

http://www.naa.mil.lv/~/media/NAA/AZPC/Publikacijas/PP%2002-2014.ashx

Babbage, C. (2002). Of the Analytical Engine. Resonance, 7(6), 88-93.

Baczynska et al. (2013, December 17). Timeline: Protests and political crisis in Ukraine. Retrieved

January 14, 2014, from http://www.reuters.com/article/2013/12/17/us-ukraine-timeline-

idUSBRE9BG10N20131217

Bandow, D. (2014, January 13). Orange Revolution Redux In the Ukraine? The US Should Stay

Out Of This Fight. Retrieved January 15, 2014, from

http://www.forbes.com/sites/dougbandow/2014/01/13/orange-revolution-redux-in-the-

ukraine-the-u-s-should-stay-out-of-this-fight/

Bartles, C. K. (2016, January-February). Getting Gerasimov Right. Military Review, pp. 30-38.

Bazaluk, O. (2016). Corruption in Ukraine: Rulers’ Mentality and the Destiny of the Nation,

Geophilosophy of Ukraine. Cambridge Scholars Publishing.

88

BBC. (2014, October 24). Putin: Russia helped Yanukovych to flee Ukraine. Retrieved April 9,

2017, from http://www.bbc.com/news/world-europe-29761799

BBC. (2007a, May 2). Russia accused of 'attack on EU' . Retrieved July 23, 2012, from BBC:

http://news.bbc.co.uk/2/hi/europe/6614273.stm

BBC. (2007b, April 28). Tallinn tense after deadly riots. Retrieved July 23, 2012, from BBC:

http://news.bbc.co.uk/2/hi/europe/6602171.stm

Beehner, L. (2006, September 6). Russia and the Frozen Wars. Retrieved July 23, 2012, from

Council on Foreign Relations: http://www.cfr.org/caucasus/russia-frozen-wars/p11361

Bencsáth. (2011, October 14). Duqu: A Stuxnet-like malware found in the wild. Retrieved July 25,

2012, from CrySyS: http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf

Bell, D. A. (2017, January 12). Donald Trump Is Making the Great Man Theory of History Great

Again. Retrieved from https://foreignpolicy.com/2017/01/12/donald-trump-is-making-the-

great-man-theory-of-history-great-again/

Bernal, R. (2017, January 11). Trump taking bite out of Mexico’s economy. Retrieved March 10,

2018, from http://thehill.com/latino/313662-trump-taking-bite-out-of-mexicos-economy

Bidder, B. (2012, May 16). Profiting from Power? The Dubious Business of the Yanukovych Clan.

Retrieved January 4, 2014, from http://www.spiegel.de/international/world/the-dubious-

businees-of-ukraine-president-yanukovych-and-his-clan-a-833127.html

Billo, C. G. and Chang, W. (2004, December). Cyber Warfare an Analysis of the Means and

Motivations of Selected Nation States. Retrieved July 5, 2012, from

http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf

89

Bitdefender Labs. (2012a, May 29). 3rd UPDATE: Cyber Espionage Reaches New Levels with

Flamer. Retrieved July 24, 2012, from http://labs.bitdefender.com/2012/05/cyber-

espionage-reaches-new-levels-with-flamer/

Bitdefender Labs. (2012b, June 11). Stuxnet's Oldest Component Solves the Flamer Puzzle.

Retrieved July 25, 2012, from http://labs.bitdefender.com/2012/06/stuxnets-oldest-

component-solves-the-flamer-puzzle/

Black, E. (2011). IBM and the Holocaust: The Strategic Alliance Between and

America's Most Powerful Corporation (Expanded Edition) (3rd ed.). Dialog Press.

Blair, D. (2016, July 7). Special Report: Crimea Tatars endure second tragedy under Russian rule.

Retrieved from http://www.telegraph.co.uk/news/2016/07/07/special-report-crimea-tatars-

endure-second-tragedy-under-russian/

Blank, S. (2014, February 13). Signs of New Russian Thinking About the Military and War. Eurasia

Daily Monitor, 11(28). Retrieved from https://jamestown.org/program/signs-of-new-

russian-thinking-about-the-military-and-war/

Blomfield, A. (2007, February 5). War of words over bronze soldier. Retrieved July 23, 2012, from

The Telegraph: http://www.telegraph.co.uk/news/worldnews/1541641/War-of-words-over-

bronze-soldier.html

Boghardt, T. (2012). The Zimmermann Telegram: Intelligence, Diplomacy, and America's Entry

into World War I. Naval Institute Press.

Bohlen, C. (2000, January 1). YELTSIN RESIGNS: THE OVERVIEW; Yeltsin Resigns, Naming

Putin as Acting President To Run in March Election. Retrieved November 27, 2017, from

90

http://www.nytimes.com/2000/01/01/world/yeltsin-resigns-overview-yeltsin-resigns-

naming-putin-acting-president-run-march.html

Bosker, B. (2012, July 2). Twitter Transparency Report Show Government Requests For User Data.

Now It's Facebook's Turn. Retrieved July 4, 2012, from Huffington Post:

http://www.huffingtonpost.com/2012/07/02/twitter-transparency-

report_n_1644596.html?utm_hp_ref=technology&utm_hp_ref=technology

Bouchet, N. (2016, January). Russia’s “militarization” of colour revolutions. Policy Perspectives,

4(2).

Brown, K. D. (2012). The State, Official-Language Education and Minorities: Estonian-Language

Instruction for Russian-Speakers and the Võro. In Z. a. Bekerman (Ed.), International

Handbook of Migration, Minorities and Education: Understanding Cultural and Social

Differences in Processes of Learning. Springer.

Brown, K. (2014, January 14). Two decades later, ex–Soviet republics reject absolute independence.

Retrieved January 15, 2014, from http://america.aljazeera.com/opinions/2014/1/two-

decades-laterexasovietrepublicsrejectabsoluteindependence.html

Broyles, M. (2004). The Six-Day War. New York: Rosen Publishing Group.

Brzezinski, Z. (2014, January 14). Zbigniew Brzezinski salutes EuroMaidan. Retrieved January 15,

2014, from http://www.youtube.com/watch?v=CbELpDfPmz0

Brzezinski, Z. (2011, July 7). Zbigniew Brzezinski: Ukraine's Future. Retrieved January 15, 20154,

from https://archive.org/details/ZbigniewBrzezinskiUkrainesFuture

91

Buck, T. (2017, October 3). Spain’s king censures Catalonia in rare political intervention. Retrieved

February 15, 2017, from https://www.ft.com/content/4c45a73e-a815-11e7-ab55-

27219df83c97

Bugajski, J. (2004). Cold Peace: Russia's New . Greenwood.

Bukkvoll, T. (2016). Russian Special Operations Forces in Crimea and Donbas. Retrieved April

12, 2017, from

http://ssi.armywarcollege.edu/pubs/parameters/issues/Summer_2016/5_Bukkvoll.pdf

Całus, K. (2013, May 14). An aided economy The characteristics of the Transnistrian economic

model. Retrieved November 27, 2017, from

https://www.osw.waw.pl/sites/default/files/commentary_108.pdf

Carbonnel, A. d. (2014, March 12). How the separatists delivered Crimea to Moscow. Retrieved

November 16, 2016, from http://www.reuters.com/article/us-ukraine-crisis-russia-

aksyonov-insigh-idUSBREA2B13M20140312

Carr, J. (2012). Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly Media.

CBS News. (2012, July 1). Stuxnet: Computer worm opens new era of warfare. Retrieved July 4,

2012, from 60 minutes: http://www.cbsnews.com/8301-18560_162-57460009/stuxnet-

computer-worm-opens-new-era-of-warfare/?tag=contentMain;cbsCarousel

Centre for Political and Legal Reforms. (2014, January 25). Judiciary and justice reform in Ukraine.

Retrieved January 25, 2014, from http://www.en.pravo.org.ua/index.php/judiciary

Center of Social Expertise and Prognosis of the Institute of Sociology of National Ukrainian

Academy of Sciences, The. (2011, May 17). Assessing the social impacts of the economic

crisis in Ukraine. Retrieved January 15, 2014, from

92

https://openknowledge.worldbank.org/bitstream/handle/10986/12978/696830ESW0P1180

raine00Final0Report.pdf?sequence=1

Ceruzzi, P. E. (2003). A History of Modern Computing. MIT Press.

Cha, V. (2012). The Impossible State: North Korea, Past and Future. HarperCollins.

Chambers, M. (2018, March 27). Splits on Russia in German left risk undermining Merkel.

Retrieved April 1, 2018, from https://uk.reuters.com/article/uk-britain-russia-

germany/splits-on-russia-in-german-left-risk-undermining-merkel-

idUKKBN1H40B9?il=0

Chen, T.M. and Robert, J. (2004, May 24). The Evolution of Viruses and Worms. Retrieved July 21,

2012, from Southern Methodist University:

http://lyle.smu.edu/~tchen/papers/statmethods2004.pdf

Christensen, J. (2014, March 14). Tackling Chicago's 'crime gap'. Retrieved March 20, 2018, from

https://www.cnn.com/2014/03/13/us/chicago-crime-gap/index.html

Churchill, W. (1939, October 1). The Russian Enigma. Retrieved March 18, 2018, from

http://www.churchill-society-london.org.uk/RusnEnig.html

Clarke, R. A. and Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What

to Do About It. HarperCollins.

Cohen, A. and Hamilton, R. E. (2011, June 9). The Russian Military and the Georgia War: Lessons

and Implications. Retrieved July 23, 2012, from Strategic Studies Institute:

http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1069

Cohen, F. (1986, January). Computer Viruses. Retrieved July 21, 2012, from

http://all.net/books/Dissertation.pdf

93

Cohen, F. (1987). Computer viruses: Theory and Experiments. Computers & Security, 6(1), 22-35.

Cohen, M. and M. Green. (2016, April). Ukraine’s Volunteer Battalions. Retrieved April 12, 2017,

from http://www.benning.army.mil/infantry/magazine/issues/2016/APR-

JUL/pdf/16)%20Cohen_UkraineVolunteers.pdf

Cole, B. (2017, March 21). 'Protect us from Russian persecution' pleads Crimean Tatar politician.

Retrieved from http://www.ibtimes.co.uk/protect-us-russian-persecution-pleads-crimean-

tatar-politician-1612706

Cordesman, A. H. (2017, March 17). Russia and the “Color Revolution” (Full Report). Retrieved

April 12, 2017, from https://csis-prod.s3.amazonaws.com/s3fs-

public/legacy_files/files/publication/140529_Russia_Color_Revolution_Full.pdf

Corrin, A. (2009, October 15). Some key events in the history of cyber warfare. Retrieved July 22,

2012, from Federal Computer Week: http://fcw.com/articles/2009/10/19/feat-dod-cyber-

timeline.aspx

Crain, C. (2016, November 7). The Case Against Democracy. Retrieved November 27, 2017, from

https://www.newyorker.com/magazine/2016/11/07/the-case-against-democracy

Cure Violence. (2018, March 20). Implementing the Cure Violence Health Model. Retrieved March

20, 2018, from http://cureviolence.org/the-model/implementation/

Czerewacz-Filipowicz, K and A. Konopelko. (2017). Regional Integration Processes in the

Commonwealth of Independent States: Economic and Political Factors . Springer.

D. A. Garcia and N. Torres. (2018, January 7). Russia meddling in Mexican election: White House

aide McMaster. Retrieved from https://www.reuters.com/article/us-mexico-russia-

94

usa/russia-meddling-in-mexican-election-white-house-aide-mcmaster-

idUSKBN1EW0UD

Danchev, D. (2012, May 11). Q and ampa of the week: 'The current state of the cyber warfare

threat' featuring Jeffrey Carr. Retrieved July 24, 2012, from ZDNet:

http://www.zdnet.com/blog/security/q-and-ampa-of-the-week-the-current-state-of-the-

cyber-warfare-threat-featuring-jeffrey-carr/12066

D'Anieri, P. J. (2007). Understanding Ukrainian Politics: Power, Politics, and Institutional Design.

M.E. Sharp.

Dang, B. (2011, November 30). Adventures in analyzing Stuxnet [27C3]. Retrieved July 3, 2012,

from Youtube: http://www.youtube.com/watch?v=fVNHX1Hrr6w&feature=related

Darczewska, J. (2014, May). The anatomy of Russian Information Warfare. The Crimean

Operation, a Case Study. Retrieved October 12, 2016, from Ośrodek Studiów

Wschodnich:

https://www.osw.waw.pl/sites/default/files/the_anatomy_of_russian_information_warfare.p

df

Delibasis, D. (2007). The Right to National Self-Defense: In Information Warfare Operations.

Arena Book.

Denber, R. (2014, May 13). Dispatches: Russia’s Take on Ukraine Abuses. Retrieved April 12,

2017, from https://www.hrw.org/news/2014/05/13/dispatches-russias-take-ukraine-abuses

Denning et al. (1994). Rights and responsibilities of participants in networked communities. (D. E.

Denning, Ed.) Washington: National Academy Press.

95

Denning, D. (2007). A View of Cyberterrorism Five Years Later. In K. E. Himma (Ed.), Internet

Security: Hacking, Counterhacking, And Society (pp. 123-40). Jones and Barlett

Publishers.

Department of Defense. (2012, July 5). United States Cyber Command. Retrieved July 5, 2012,

from U.S. Department of Defense:

http://www.defense.gov/home/features/2010/0410_cybersec/

Department of Justice. (2018, July 13). Case 1:18-cr-00215-ABJ. Retrieved from

https://www.justice.gov/file/1080281/download

Dewdney, A. K. (1984, May). Computer Recreations: In a game called core war hostile programs

engage in a battle of bits. Scientific American, 250(5), pp. 14-22.

DiBernado, S. (2008). Critias. In P. O'Grady (Ed.), The Sophists: An Introduction. Bloomsbury.

Eckstein, A. M. (2012, January 25). Rome Enters the Greek East: From Anarchy to Hierarchy in

the Hellenistic Mediterranean, 230-170 BC. Wiley-Blackwell. Retrieved November 12,

2017.

The Economist. (2007, May 24). Cyberwarfare: Newly nasty. Retrieved July 23, 2012, from The

Economist: http://www.economist.com/node/9228757?story_id=E1_JNNRSVS

The Economist. (2006, August 3). Disinformation. Retrieved November 22, 2017, from

http://www.economist.com/node/7252974

The Economist. (2015, November 7). Russia’s Sergei Shoigu: Master of emergencies. Retrieved

from https://www.economist.com/europe/2015/11/07/master-of-emergencies

The Economist. (2014a, January 6). Stalemate. Retrieved January 15, 2014, from

http://www.economist.com/blogs/easternapproaches/2014/01/ukraine

96

The Economist. (2008, August 14). The war in Georgia: Russia resurgent. Retrieved July 23, 2012,

from The Economist: http://www.economist.com/node/11920701#footnote1

The Economist. (2014b, July 12). The turn of the tide. Retrieved March 20, 2018, from

https://www.economist.com/news/europe/21606863-ukrainian-forces-regain-some-rebel-

held-towns-face-tougher-fight-over-donetsk-biggest

The Economist. (2014c, January 14). Will Maidan live on? Retrieved January 15, 2014, from

http://www.economist.com/blogs/easternapproaches/2014/01/ukraine-0

Ehala, M. (2009). The Bronze Soldier: Identity Threat and Maintenance in Estonia. Journal of

Baltic Studies, 40(1), 139-58.

Eigenmann, R. and Lilja, D. J. (1998, January 30). Von Neumann Computers. Retrieved July 24,

2012, from Penn State University:

http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0CF4QFj

AD&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D

10.1.1.78.4336%26rep%3Drep1%26type%3Dpdf&ei=Uh8OUOveE4OQ8wTo0YDwBQ

&usg=AFQjCNF_kfrJDtLiKumZmQT_NHMvd7t8SA

Emmott, R. and G. Baczynska. (2016, March 14). Italy, Hungary say no automatic renewal of

Russia sanctions. Retrieved March 20, 2018, from https://www.reuters.com/article/us-

ukraine-crisis-eu/italy-hungary-say-no-automatic-renewal-of-russia-sanctions-

idUSKCN0WG1AU

Epatko, L. (2011, July 14). Quick Take: The Pentagon's Cybersecurity Plan. Retrieved July 5, 2012,

from PBS Newshour: http://www.pbs.org/newshour/rundown/2011/07/cybersecurity-

plan.html

97

Eristavi, M. (2014, January 12). "Fake the Gay Away" in Kyiv. Retrieved January 13, 2014, from

http://storify.com/MaximEristavi/fakethegayaway

Ermolaev, S. (2017, March 29). The Formation and Evolution of the Soviet Union’s Oil and Gas

Dependence. Retrieved November 11, 2017, from

http://carnegieendowment.org/2017/03/29/formation-and-evolution-of-soviet-union-s-oil-

and-gas-dependence-pub-68443

Estonian government. (2010, January 1). Population by Nationality. Retrieved July 23, 2012, from

estonia.eu: http://estonia.eu/about-estonia/country/population-by-nationality?format=pdf

Estrin, G. (1991). The WEIZAC Years (1954-1963) . Annals of the History of Computing, 13(4),

317-39.

Etling et al. (2010, October). Public Discourse in the Russian Blogosphere: Mapping RuNet

Politics and Mobilization. Retrieved November 25, 2017, from

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1698344

Euromaidan Press. (2014, June 28). Top 13 Terrorists in Eastern Ukraine: a gravedigger, a

criminal, a drug dealer, Santa Claus, and a fertiliser salesman. Retrieved November 16,

2016, from http://euromaidanpress.com/2014/06/28/13-head-terrorists-of-the-east-of-

ukraine-a-gravedigger-a-criminal-a-marijuana-dealer-father-frost-and-a-fertiliser-seller/

Euronews. (2014, January 23). Ukraine opposition continues as crisis talks end without firm

results. Retrieved January 25, 2014, from http://www.euronews.com/2014/01/23/ukraine-

opposition-protest-continues-as-crisis-talks-end-without-firm-results/

98

Euronews. (2014, January 1). Ukraine: 2014 ushered in by President – and protesters. Retrieved

January 6, 2014, from http://www.euronews.com/2014/01/01/ukraine-2014-ushered-in-by-

president-and-protesters/

Faircloth, K. (2012, July 23). Iranian Atomic Scientists Reportedly Being Assaulted With AC/DC.

Retrieved July 24, 2012, from Betabeat: http://betabeat.com/2012/07/report-suggests-

iranian-atomic-scientists-being-assaulted-with-acdc/

Farchy, J. (2016, April 19). Russia senses opportunity in Nagorno-Karabakh conflict. Retrieved

October 12, 2016, from https://www.ft.com/content/3d485610-0572-11e6-9b51-

0fb5e65703ce

Filiol, É. (2005). Computer Viruses: From Theory to Applications. Birkhäuser.

Foley, Martin and Martin Nunn. (2014, January 8). Martin Foley and Martin Nunn: Making

Ukrainian democracy work. Retrieved January 13, 2014, from

http://www.kyivpost.com/opinion/op-ed/making-ukrainian-democracy-work-334744.html

Fortune, P. (2003, November). Investment Climate Reform in Ukraine. Retrieved January 15, 2014,

from

https://openknowledge.worldbank.org/bitstream/handle/10986/9147/WDR2005_0042.pdf?

sequence=1

Foy, H. (2017, September 15). Valery Gerasimov, the general with a doctrine for Russia. Retrieved

from https://www.ft.com/content/7e14a438-989b-11e7-a652-cde3f882dd7b

Fisher-Ilan, A. (2012, January 6). Israel Hack Claimed By 'OxOmar' From Saudi Arabian Hacking

Group. Retrieved July 24, 2012, from Huffington Post (Reuters):

99

http://www.huffingtonpost.com/2012/01/06/israel-hack-saudi-arabia-

oxomar_n_1188979.html

Fraser, D. (2011, October 12). What was really in Tymoshenko’s 2009 gas agreement with Russia?

Retrieved January 25, 2014, from https://www.kyivpost.com/opinion/op-ed/what-was-

really-in-tymoshenkos-2009-gas-agreement--114603.html

Frontline. (2003, April 24). Cyberwar! Retrieved July 4, 2012, from Frontline:

http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/warnings/

Garrett, S. W. (1997). Keystone in the Arch: Ukraine in the Emerging Security Environment of

Central and Eastern Europe. Carnegie Endowment for International Peace.

Galeotti, M. (2011, November 21). Why are Russians excellent cybercriminals? Retrieved July 22,

2012, from The Moscow News:

http://themoscownews.com/siloviks_scoundrels/20111121/189221309.html

Galeotti, M. (2014, July 6). The ‘Gerasimov Doctrine’ and Russian Non-Linear War. Retrieved

April 1, 2018, from https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-

doctrine-and-russian-non-linear-war/

Galeotti, M. (2018, March 5). I’m Sorry for Creating the ‘Gerasimov Doctrine’. Retrieved April 1,

2018, from http://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-

doctrine/

García, A. I. (2017, January 23). Oligarchic Politics in Latin America. Retrieved from

https://voxukraine.org/en/oligarchic-politics-en/

100

Geers, K. (2008, September 22). Cyberspace and the Changing Nature of Warfare. Retrieved July

23, 2012, from http://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Geers/BlackHat-

Japan-08-Geers-Cyber-Warfare-Whitepaper.pdf

George, J. A. (2009). The Politics of Ethnic Separatism in Russia and Georgia. Springer.

Gerasimov, V. (2013, February 27). Ценность науки в предвидении. Retrieved from http://vpk-

news.ru/articles/14632

Gerasimov, V. (2016a). Statement by Chief of the General Staff of the RF Armed Forces General of

the Army Valery Gerasimov at the conference MCIS-2016. Retrieved March 31, 2018, from

http://mil.ru/mcis/news/more.htm?id=12120704@cmsArticle

Gerasimov, V. (2016b, January-February). The Value of Science is in the Foresight. Military Review,

23-29.

Gerasimov, V. and J. Bērziņš. (2017, April 20). Gerasimov: A World on the Brink of War. Retrieved

March 31, 2018, from http://blog.berzins.eu/gerasimov_brink_war/

German, T. (2007). Terrorism in the Caucasus: A Western Perspective. In The Media: The

Terrorists' Battlefield. IOS Press.

Gerovitch, S. (2003, April 30). Computing in the Soviet Space Program: An Introduction. Retrieved

July 22, 2012, from Computing in the Soviet Space Program:

http://web.mit.edu/slava/space/introduction.htm

Gilbert, D. (2017). The Oligarchy and the Old Regime in Latin America, 1880-1970. Rowan &

Littlefield.

Giles, K. (2016, March). Russia’s ‘New’ Tools for Confronting the West Continuity and Innovation

in Moscow’s Exercise of Power. Retrieved October 12, 2016, from Chatham House:

101

https://www.chathamhouse.org/sites/files/chathamhouse/publications/research/2016-03-21-

-new-tools-giles.pdf

Glazyev, S. (2013, December 30). The Mania of Ukraine’s Euromaidan. Retrieved January 15,

2014, from http://nationalinterest.org/commentary/the-mania-ukraine%E2%80%99s-

euromaidan-9636

Goble, P. A. (2015, April 16). Russia ‘de-Ukrainizing’ population of Crimea, occupation census

shows. Retrieved November 16, 2016, from

http://euromaidanpress.com/2015/04/16/russia-de-ukrainizing-population-of-crimea-

occupation-census-shows/

Godse, A. P. and Godse, D. A. (2010). Computer Organization And Architecture. Pune, India:

Technical Publications Pune.

Goessl, L. (2012, May 29). Flame virus discovered, described as new 'super cyber-weapon' .

Retrieved July 25, 2012, from http://digitaljournal.com/article/325667

Goldman, M. I. (2004, November/December). Putin and the Oligarchs. Retrieved November 27,

2017, from https://www.foreignaffairs.com/articles/russia-fsu/2004-11-01/putin-and-

oligarchs

Goodin, D. (2012, June 8). Flame espionage malware issues self-destruct command. Retrieved July

25, 2012, from Arstechnica: http://arstechnica.com/security/2012/06/flame-espionage-

malware-issues-self-destruct-command/

Goodreads. (2015, September 17). El mito de la transición democrática. Retrieved March 10, 2018,

from https://www.goodreads.com/book/show/26877390-el-mito-de-la-transici-n-democr-

tica

102

Gorbachev, M. S. (1999, December). Gorbachev Speech Dissolving the Soviet Union (USSR):

Christmas 1991. Retrieved November 11, 2017, from http://www.publicpurpose.com/lib-

gorb911225.htm

Gorenburg, D. (2017, May 3). MCIS 2017 Gerasimov slides. Retrieved March 31, 2018, from

https://russiamil.wordpress.com/tag/valery-gerasimov/

Gorman, S. and Barnes, J.E. (2011, May 30). Cyber Combat: Act of War. Retrieved July 5, 2012,

from

http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html

Gostev, A. (2012, May 29). Flame: Bunny, Frog, Munch and BeetleJuice…. Retrieved July 24,

2012, from http://www.securelist.com/en/blog/208193538

Government of Georgia. (2008, November 10). Russian Invasion of Georgia: Russian Cyberwar

on Georgia. Retrieved July 23, 2012, from Georgia Update:

http://georgiaupdate.gov.ge/doc/10006922/CYBERWAR-%20fd_2_.pdf

Grannis, S. (2014, December 16). Russia gets crushed again. Retrieved November 13, 2017, from

http://scottgrannis.blogspot.com/2014/12/russia-gets-crushed-again.html

Grant, W. (2012, July 7). Pena Nieto wins Mexico presidential vote. Retrieved March 10, 2018,

from http://www.bbc.com/news/av/world-latin-america-18750660/pena-nieto-wins-

mexico-presidential-vote

Grau, L. W. and C. K. Bartles. (2016). The Russian Way of War Force Structure, Tactics, and

Modernization of the . Retrieved from

https://www.armyupress.army.mil/Portals/7/Hot%20Spots/Documents/Russia/2017-07-

The-Russian-Way-of-War-Grau-Bartles.pdf

103

Greene, D and L. Migaki. (2014, October 27). In Crimea, Many Signs Of Russia, Few Of

Resistance. Retrieved November 16, 2016, from

http://www.npr.org/sections/parallels/2014/10/27/358564273/in-crimea-many-signs-of-

russia-few-of-resistance

Greenwood, V. (2012, May 29). New “Flame” Malware is One of the Most Complex Cyber

Weapons Yet. Retrieved July 24, 2012, from Discover Magazine:

http://blogs.discovermagazine.com/80beats/2012/05/29/new-

%E2%80%9Cflame%E2%80%9D-malware-is-one-of-the-most-complex-cyber-weapons-

yet/

Grimes, D. R. (2017, June 14). Russian fake news is not new: Soviet Aids propaganda cost

countless lives. Retrieved November 26, 2017, from

https://www.theguardian.com/science/blog/2017/jun/14/russian-fake-news-is-not-new-

soviet-aids-propaganda-cost-countless-lives

Grytsenko, O. (2014, January 15). Akhmetov talks to protesters in Donetsk (PHOTO, VIDEO).

Retrieved January 15, 2014, from http://www.kyivpost.com/content/ukraine/akhmetov-

talks-to-protesters-in-donetsk-photo-video-334504.html

Grytsenko, O. (2014, January 14). Opposition accuses Yanukovych of planning to reimpose visas

for Westerners; officials deny charge. Retrieved January 15, 2014, from

http://www.kyivpost.com/content/politics/opposition-accuses-yanukovych-of-planning-to-

reimpose-visas-for-westerners-officials-deny-charge-334964.html

Grytsenko, O. (2014, January 11). Smashed windows, tear gas accompany EuroMaidan forum in

Kharkiv. Retrieved January 15, 2014, from

104

http://www.kyivpost.com/content/ukraine/smashed-windows-tear-gas-accompany-

euromaidan-forum-in-kharkiv-334870.html

Grytsenko, O. (2014, January 11). Vox Populi with Oksana Grytsenko: How will the latest clashes

between police and protesters affect the EuroMaidan demonstrations? Retrieved January

13, 2014, from http://www.kyivpost.com/opinion/vox-populi/vox-populi-with-oksana-

grytsenko-how-will-the-latest-clashes-between-police-and-protesters-affect-the-

euromaidan-demonstrations-334862.html

Gumuchian, M. and V. Butenk. (2013, December 9). Ukraine opposition office raided as President

Viktor Yanukovych backs talks. Retrieved January 25, 2013, from

http://edition.cnn.com/2013/12/09/world/europe/ukraine-protests/

Gup, B. E. (2003). The Future of Banking. Quorum Books.

Gustafson, T. (2012). Wheel of Fortune: The Battle for Oil and Power in Russia. Harvard

University Press.

Gvosdev, N.K. and C. Marsh. (2014). Russian Foreign Policy: Interests, Vectors, and Sectors. CQ

Press.

Gzirian, R. (2015, August 10). Why Eastern Ukraine Matters to . Retrieved

November 16, 2016, from http://www.atlanticcouncil.org/blogs/new-atlanticist/25615-

why-eastern-ukraine-matters-to-ramzan-kadyrov

Habeck, M. R. (2003). Storm of Steel: The Development of Armor Doctrine in Germany and the

Soviet Union, 1919-1939. Cornell University Press.

105

The Hacker News. (2011, August 11). Israeli Prime Minister Netanyahu’s Website Defaced by

Egyptian Hacker. Retrieved July 24, 2012, from http://thehackernews.com/2011/08/israeli-

prime-minister-netanyahus.html

Harding, L. (2010, February 8). Yanukovych set to become president as observers say Ukraine

election was fair. Retrieved January 3, 2014, from

http://www.theguardian.com/world/2010/feb/08/viktor-yanukovych-ukraine-president-

election

Harrison, R. W. (2010). Architect of Soviet Victory in World War II. MacFarland & Company.

Harvey, M (2009, August 12). Georgia blogger Cyxymu demands action from Kremlin after DOS

attack. Retrieved from https://www.thetimes.co.uk/article/georgia-blogger-cyxymu-

demands-action-from-kremlin-after-dos-attack-9csmmc2bcld

Herpen, M. H. (2014). Putin's Wars: The Rise of Russia's New Imperialism. Rowman & Littlefield.

Herszenhorn, D. M. and S. Erlanger. (2013, December 5). American Official Tells Ukraine’s Protest

Leaders to Find Peaceful End to Crisis. Retrieved January 14, 2014, from

http://www.nytimes.com/2013/12/06/world/europe/ukraine-protests.html?_r=2&

Herszenhorn, D M and N MacFarquhar. (2014, March 23). Russian forces take over Crimea base.

Retrieved from https://www.bostonglobe.com/news/world/2014/03/23/russian-forces-take-

over-crimea-base/hTkQNhJSEgvzii9EV5bF4O/story.html

Hill, F. (2015, February 26). Hybrid war: The real reason fighting stopped in Ukraine – for now.

Retrieved September 7, 2015, from http://blogs.reuters.com/great-

debate/2015/02/26/hybrid-war-the-real-reason-fighting-stopped-in-ukraine-for-now/

106

Hiriart, P. (2017, March 29). El asesor de López ensalza a Venezuela. Retrieved March 10, 2018,

from http://www.elfinanciero.com.mx/opinion/pablo-hiriart/el-asesor-de-lopez-ensalza-a-

venezuela

Hoagland, J. (2013, December 21). A struggle for moral authority in Ukraine. Retrieved January 5,

2014, from http://www.washingtonpost.com/opinions/jim-hoagland-in-ukraine-a-struggle-

for-moral-authority/2013/12/20/638e3196-6817-11e3-ae56-22de072140a2_story.html

Holodny, E. (2016, December 20). TIMELINE: The tumultuous 155-year history of oil prices.

Retrieved November 11, 2017, from http://www.businessinsider.com/timeline-155-year-

history-of-oil-prices-2016-12

Horrocks, G. (2010). Greek: A History of the Language and its Speakers (2nd ed.). Wiley-

Blackwell.

Human Rights Watch. (2009). Up in Flames: Humanitarian Law Violations and Civilian Victims in

the Conflict Over South Ossetia. Human Rights Watch.

Interfax-Ukraine. (2013, December 30). President makes seizure of buildings a crime. Retrieved

January 5, 2014, from http://www.kyivpost.com/content/ukraine/president-makes-seizure-

of-buildings-a-crime-334462.html

Interfax-Ukraine. (2014, January 7). Police: Student beaten on Euromaidan in Kyiv. Retrieved

January 14, 2014, from http://www.kyivpost.com/content/ukraine/police-student-beaten-

on-euromaidan-in-kyiv-334731.html

Interfax-Ukraine. (2014, January 25). Regional governor accuses Ukraine protesters of trying to

seize power. Retrieved January 25, 2014, from

107

http://www.kyivpost.com/content/ukraine/regional-governor-accuses-ukraine-protesters-of-

trying-to-seize-power-335581.html

Interfax-Ukraine and . (2014, January 1). Citizens complain about EuroMaidan

protesters' actions in New Year night. Retrieved January 15, 2014, from

http://www.kyivpost.com/content/ukraine/citizens-complain-about-euromaidan-protesters-

actions-in-new-year-night-334560.html

Interfax-Ukraine and Kyiv Post. (2014, January 15). Interior Ministry denies persistent rumors of

EuroMaidan crackdown overnight. Retrieved January 15, 2014, from

http://www.kyivpost.com/content/kyiv/interior-ministry-denies-persistent-rumors-of-

euromaidan-crackdown-tonight-335016.html

Interfax-Ukraine. (2013, December 27). Court orders two suspects in Chornovol beating to be held

for two months. Retrieved January 5, 2014, from

http://www.kyivpost.com/content/ukraine/court-orders-two-suspects-in-chornovol-beating-

to-be-held-for-two-months-334354.html

Interfax-Ukraine. (2013, December 17). Euromaidan returns Christmas tree to children. Retrieved

January 14, 2014, from http://en.interfax.com.ua/news/press-release/182502.html

Interfax-Ukraine. (2013, December 20). Klitschko says prosecutor's office not planning to punish

those responsible for beating of peaceful protesters. Retrieved January 6, 2014, from

http://www.kyivpost.com/content/politics/klitschko-says-prosecutors-office-not-planning-

to-punish-those-responsible-for-beating-of-peaceful-protesters-334044.html

Interfax-Ukraine. (2013, December 23). Naftogaz cuts imports of Russian gas to minimum after

signing new price deal. Retrieved January 5, 2014, from

108

http://www.kyivpost.com/content/ukraine/naftogaz-cuts-imports-of-russian-gas-to-

minimum-after-signing-new-price-deal-334159.html

Interfax-Ukraine. (2013, December 30). Poll: One in four Ukrainians ready to vote for Yanukovych

in presidential elections. Retrieved January 15, 2014, from

http://www.kyivpost.com/content/ukraine/poll-one-in-four-ukrainians-ready-to-vote-for-

yanukovych-in-presidential-elections-334463.html

Interfax-Ukraine. (2013, December 27). TV: Foreign ambassadors visit journalist Chornovol in

hospital. Retrieved December 28, 2013, from http://www.kyivpost.com/content/ukraine/tv-

foreign-ambassadors-visit-journalist-chornovol-in-hospital-334353.html

Interfax-Ukraine. (2013, December 23). Yanukovych sacks head of State Agency for Energy

Efficiency and Energy Saving. Retrieved January 5, 2014, from

http://www.kyivpost.com/content/ukraine/yanukovych-sacks-head-of-state-agency-for-

energy-efficiency-and-energy-saving-334157.html

Interfax-Ukraine. (2013, December 24). Yatseniuk fears arrests of opposition leaders over

accusations of coup attempt. Retrieved January 14, 2014, from

http://www.kyivpost.com/content/ukraine/yatseniuk-not-ruling-out-arrests-of-opposition-

leaders-due-to-coup-attempt-334201.html

Interfax-Ukraine. (2014, January 14). Doctors find alcohol in Lutsenko's blood; his wife denies this.

Retrieved January 14, 2014, from http://www.kyivpost.com/content/politics/doctors-find-

alcohol-in-lutsenkos-blood-his-wife-denies-this-334931.html

Interfax-Ukraine. (2014, January 9). Government continues political speculation about choice of

Ukraine's integration vector. Retrieved January 13, 2014, from

109

http://www.kyivpost.com/content/politics/government-continues-political-speculation-

about-choice-of-ukraines-integration-vector-334799.html

Interfax-Ukraine. (2014, January 14). Interior Ministry shows foreign diplomats video of

Sviatoshynsky clashes. Retrieved January 14, 2014, from

http://www.kyivpost.com/content/ukraine/interior-ministry-shows-foreign-diplomats-

video-of-sviatoshynsky-clashes-334933.html

Interfax-Ukraine. (2014, January 13). Lutsenko given victim status after two-hour interrogation by

investigator, says wife. Retrieved January 14, 2014, from

http://www.kyivpost.com/content/ukraine/lutsenko-given-victim-status-after-two-hour-

interrogation-by-investigator-says-wife-334918.html

Interfax-Ukraine. (2014, January 3). MP: Euromaidan exposed to neo-Nazi trends. Retrieved

January 4, 2014, from http://www.kyivpost.com/content/ukraine/mp-euromaidan-exposed-

to-neo-nazi-trends-334612.html

Interfax-Ukraine. (2014, January 3). Opposition leaders want case closed against Vlasenko.

Retrieved January 4, 2014, from http://www.kyivpost.com/content/politics/opposition-

leaders-demand-to-close-vlasenko-case-334634.html

Ioffe, J. (2017a, January 11). How State-Sponsored Blackmail Works in Russia. Retrieved

November 27, 2017, from

https://www.theatlantic.com/international/archive/2017/01/kompromat-trump-

dossier/512891/

Ioffe, J. (2017b, October 21). The History of Russian Involvement in America's Race Wars.

Retrieved from https://www.theatlantic.com/international/archive/2017/10/russia-facebook-

race/542796/

110

Ioffe, J. (2017c, December 30). What Russian Journalists Uncovered About Russian Election

Meddling. Retrieved from

https://www.theatlantic.com/international/archive/2017/12/russia-hackers-journalism-press-

freedom-troll-factory/549422/

Irish Times. (2018, July 16). Trump-Putin meeting: Edited transcript of Helsinki press conference.

Retrieved from https://www.irishtimes.com/news/world/europe/trump-putin-meeting-

edited-transcript-of-helsinki-press-conference-1.3567158

Jahn, G. (2010, November 22). AP Exclusive: Troubles stop Iran nuke enrichment. Retrieved July

24, 2012, from The San Diego Union-Tribune:

http://www.utsandiego.com/news/2010/nov/22/ap-exclusive-troubles-stop-iran-nuke-

enrichment/

Jamshed, A. (2008, March 28). Cyber Wars Between and India. Retrieved July 24, 2012,

from Articlesbase: http://www.articlesbase.com/internet-articles/cyber-wars-between-

pakistan-and-india-373872.html

Janczewski, L.J. and Colarik, A.M. (2008). Cyber Warfare and Cyber Terrorism. Hershey, PA:

Information Science Reference.

Johnson, J. (2000). A Fistful of Rubles: The Rise and Fall of the Russian Banking System. Cornell

Univeristy.

Judah, T. (2014, January 9). Fighting for the Soul of Ukraine. Retrieved January 15, 2014, from

http://www.nybooks.com/articles/archives/2014/jan/09/fighting-soul-

ukraine/?pagination=false

111

Kaminski, M. (2013, December 24). Between Kiev’s Hope and Cairo’s Chaos. Retrieved January

13, 2014, from http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-412761/

Kappeler et al. (2003). Culture, Nation, and Identity: The Ukrainian-Russian Encounter, 1600-

1945. Canadian Institute of Ukrainian Studies Press.

Kasapoglu, C. (2015, November). Russia’s Renewed Military Thinking: Non—Linear Warfare and

Reflexive Control. Research Paper: NATO Defense College Rome(121).

Katchanovski, I. (2014, January 15). Ivan Katchanovski: The EuroMaidan, the

and the future of Ukraine. Retrieved January 15, 2014, from

http://www.kyivpost.com/opinion/op-ed/ivan-katchanovski-the-euromaidan-the-european-

union-and-the-future-of-ukraine-334981.html

Keating, J. (2014, February 25). Khrushchev’s Gift. Retrieved April 12, 2017, from

http://www.slate.com/blogs/the_world_/2014/02/25/separatism_in_ukraine_blame_nikita_

khrushchev_for_ukraine_s_newest_crisis.html

Keating, J. (2014, April 7). Prelude to the Invasion? Retrieved April 9, 2017, from

http://www.slate.com/blogs/the_world_/2014/04/07/protesters_seize_government_building

s_in_eastern_ukraine_is_this_a_prelude.html

Keating, D. (2018, March 29). While Expelling Diplomats, Germany Quietly Increases

Dependence On Russian Gas. Retrieved April 1, 2018, from

https://www.forbes.com/sites/davekeating/2018/03/29/while-expelling-diplomats-

germany-quietly-increases-dependence-on-russian-gas/#3fd0ecf25b1c

112

Kelly et al. (2012, March 20). Mapping Russian Twitter. Retrieved November 25, 2017, from

https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_Russian_Twitter_2012

.pdf

Kharkiv, A. (2014, January 11). Гімн України в Харківському метро. Retrieved January 13, 2014,

from http://www.youtube.com/watch?v=0ZEmC4qPxD8

Kirchick, J. (2014, March 4). RT ANCHOR’S RIFF NOT AS ‘ROGUE’ AS IT SEEMS. Retrieved

March 30, 2017, from http://www.tabletmag.com/scroll/165008/rt-anchors-riff-not-as-

rogue-as-it-seems

Kittler, F. (2006). Cold War Networks or Kaiserstr. 2, Neubabelsberg. In W. a. Chun (Ed.), New

Media, Old Media: A History and Theory Reader (pp. 181-87). Taylor & Francis Group.

Klesner, J. L. (2018, March 10). The End of Mexico's One-Party Regime. Retrieved March 10,

2018, from http://www2.kenyon.edu/Depts/PSci/Fac/klesner/apsa97_Table1.htm

Klikushin, M. (2018, February 22). Russia Declares Victory in War Over Natural Gas Pipeline to

Germany. Retrieved March 20, 2018, from http://observer.com/2018/02/russia-declares-

victory-in-war-over-natural-gas-pipeline-nord-stream-2-construction/

Klitschko, V. (2014, January 11). Кличко: Європа повинна запровадити санкції проти

українських високопосадовців . Retrieved January 13, 2014, from

http://www.youtube.com/watch?v=vl6LdFPZrfc

Knott, E. (2015, December 3). Do Crimeans see themselves as Russian or Ukrainian? It’s

complicated. Retrieved April 12, 2017, from

https://www.washingtonpost.com/news/monkey-cage/wp/2015/12/03/do-crimeans-see-

themselves-as-russian-or-ukrainian-its-complicated/?utm_term=.8e3286f6ec7d

113

Kochetova, J. (2013, December 16). Protests continue in Ukraine. Retrieved December 24, 2013,

from http://www.demotix.com/news/3520876/protests-continue-ukraine#media-3520437

Kofman, M. and M. Rojansky. (2015, April). A Closer look at Russia’s “Hybrid War.” Kennan

Cable, 7.

Korewa, A. (2016, January 9). PUTIN INVADES UKRAINIAN GAS RIGS, SET SIGHTS ON

ODESSA. Retrieved from http://www.newsweek.com/putin-ukraine-odessa-gas-rigs-

413274

Kovzhun, D. (2013, December 23). EuroMaidan: a Facebook revolution in the streets of Kiev.

Retrieved January 13, 2014, from http://boingboing.net/2013/12/23/euromaidan-a-

facebook-revolut.html

Kozina, A. (2010, February 20). Why is Russia not a democracy? The Putin era. Retrieved

December 30, 2013, from

http://www.spr.tcdlife.ie/seperatearticles/xxarticles/ireeuroperussia.pdf

Kramer, M. (2014, March 14). Why Did Russia Give Away Crimea Sixty Years Ago? Retrieved

April 12, 2017, from https://www.wilsoncenter.org/publication/why-did-russia-give-away-

crimea-sixty-years-ago

Krause, E. (2018, March 7). The End of Mexican Democracy? Retrieved from

https://www.nytimes.com/2018/03/07/opinion/mexico-election-lopez-obrador.html

Kravchenko, S. (2014, October 24). Putin Says Russia Helped Yanukovych to Escape Ukraine.

Retrieved November 16, 2016, from http://www.bloomberg.com/news/articles/2014-10-

24/putin-says-russia-helped-yanukovych-to-escape-ukraine

114

Krebs, B. (2007, October 2007). Shadowy Russian Firm Seen as Conduit for Cybercrime.

Retrieved July 23, 2012, from Washington Post: http://www.washingtonpost.com/wp-

dyn/content/article/2007/10/12/AR2007101202461.html

Krekel, B. et al. (2009, October 9). Capability of the People’s Republic of China to Conduct Cyber

Warfare and Computer Network Exploitation. Retrieved July 4, 2012, from

http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA509000

Kulchytsky, K. a. (1945). Encyclopaedia of Ukraine. Retrieved November 16, 2016, from

https://en.wikipedia.org/wiki/Ukrainians_in_Russia#/media/File:Ethnic-Ukrainians.jpg

Kyiv Post. (2011, August 19). How Maidan changed through the years. Retrieved December 24,

2013, from http://www.kyivpost.com/content/lifestyle/how-maidan-changed-through-the-

years-111169.html

Kyiv Post. (2013, November 30). Police violently break up Independence Square protests at 4 a.m.

today; many injuries reported (VIDEOS AND UPDATES). Retrieved December 24, 2013,

from http://www.kyivpost.com/content/ukraine/reports-police-forcefully-break-up-protest-

site-on-maidan-nezalezhnosti-this-morning-332674.html

Kyiv Post. (2013, December 19). Time to regroup. Retrieved January 14, 2014, from

http://www.kyivpost.com/opinion/editorial/time-to-regroup-334024.html

Kyiv Post. (2014, January 12). More than 10,000 come to EuroMaidan rally on Jan. 12 (live

updates). Retrieved January 13, 2014, from

http://www.kyivpost.com/content/ukraine/10000-come-to-euromaidan-rally-on-jan-12-

live-updates-334878.html

115

Kyiv Post. (2014, January 12). LifeNews: Ukrainian claims to plan terroristic attack in Moscow.

Retrieved January 13, 2014, from http://www.kyivpost.com/content/ukraine-

abroad/lifenews-ukrainian-claims-to-plan-terroristic-attack-in-moscow-334882.html

Kyiv Post. (2014, January 7). Maidan participants want single candidate from opposition in 2015

elections. Retrieved January 14, 2014, from

http://www.kyivpost.com/content/politics/maidan-participants-want-single-candidate-from-

opposition-in-2015-elections-334727.html

Kyiv Post. (2014, January 7). Maidan participants want single candidate from opposition in 2015

elections. Retrieved January 15, 2014, from

http://www.kyivpost.com/content/politics/maidan-participants-want-single-candidate-from-

opposition-in-2015-elections-334727.html

LaFraniere, S. (1999, September 8). Yeltsin Linked to Bribe Scheme. Retrieved November 13, 2017,

from http://www.washingtonpost.com/wp-srv/inatl/daily/sept99/yeltsin8.htm

Lanoszka, A. (2016). Russian hybrid warfare and extended deterrence in eastern Europe.

International Affairs, 92(1), 175-95.

Lappin, Y. (2012, January 26). Israeli hacker team brings down Iranian websites. Retrieved July 24,

2012, from The Jerusalem Post: http://www.jpost.com/MiddleEast/Article.aspx?id=255300

Lavrov, V. (2014, January 5). EuroMaidan activists call for of Inter TV channel. Retrieved

January 6, 2014, from http://www.kyivpost.com/content/ukraine/euromaidan-activists-call-

for-boycott-of-inter-tv-channel-334683.html

116

Lawler, D. (2018, Feb). Left-wing populist López Obrador leading Mexican polls. Retrieved March

10, 2018, from https://www.axios.com/mexican-elections-lopez-obrador-trump-705e0cfd-

dafa-4050-99e5-b7b9df1b937d.html

The Daily Star. (2013, December 22). Ukraine pro-EU protest loses momentum.

Retrieved December 24, 2013, from

http://www.dailystar.com.lb/News/International/2013/Dec-22/241991-kiev-anti-

government-protest-draws-100000.ashx#axzz2oQHIEfwJ

Lendman, S. (2013, December 6). Ukraine: Orange Revolution 2.0? Retrieved January 15, 2014,

from http://www.globalresearch.ca/ukraine-orange-revolution-2-0/5360517

Leshchenko, S. (2013, December 31). Ukraine’s leaders are silencing the independent media.

Retrieved January 5, 2014, from http://www.washingtonpost.com/opinions/ukraines-

leaders-are-silencing-the-independent-media/2013/12/30/6cb58120-6f2e-11e3-a523-

fe73f0ff6b8d_story.html

Libicki, M. C. (2009). Cyberdeterence and Cyberwar. Retrieved July 4, 2012, from

http://www.rand.org/pubs/monographs/2009/RAND_MG877.pdf

Libicki, M. C. (2011, January 27). Chinese Use of Cyberwar as an Anti-Access Strategy. Retrieved

July 4, 2012, from

http://www.rand.org/content/dam/rand/pubs/testimonies/2011/RAND_CT355.pdf

Library of Congress. (2015, June 9). Russian Federation: Legal Aspects of War in Georgia.

Retrieved November 30, 2017, from https://www.loc.gov/law/help/russian-georgia-war.php

117

Lidster, A. (2014, January 8). 'Ukraine must change or be destroyed'. Retrieved January 15, 2014,

from http://www.aljazeera.com/sport/boxing/2014/01/must-change-be-destroyed-

2014181622198680.html

Loiko, S. L. (2011, October 12). Ukraine ex-prime minister convicted of abuse of power. Retrieved

January 25, 2014, from http://articles.latimes.com/2011/oct/12/world/la-fg-ukraine-

conviction-20111012

Lombardi, C. (2006, April 14). Russia dominates computer-programming contest. Retrieved July

22, 2012, from http://news.cnet.com/Russia-dominates-computer-programming-

contest/2100-1007_3-6061381.html

Lowe, C. (2008, August 20). Georgia war shows Russian army strong but flawed. Retrieved

November 30, 2017, from https://www.reuters.com/article/us-georgia-ossetia-

military/georgia-war-shows-russian-army-strong-but-flawed-idUSLK23804020080820

Luhn, A. (2014, July 5). Ukrainian troops retake key city of Slavyansk from rebels in east. Retrieved

November 16, 2016, from https://www.theguardian.com/world/2014/jul/05/ukraine-

slavyansk-army-rebels-east

Lutsenko, Y. (2012, July 16). Камерна робота. Retrieved January 13, 2014, from

http://blogs.pravda.com.ua/authors/lucenko/5003d80c9a598/

Lutsenko, Y. (2014, January 14). Profile: Ukraine's firebrand ex-minister Lutsenko. Retrieved

January 12, 2014, from http://www.bbc.co.uk/news/world-europe-25695982

MacAskill, E. (2014, March 6). Russian troops removing ID markings 'gross violation'. Retrieved

from https://www.theguardian.com/news/defence-and-security-blog/2014/mar/06/ukraine-

gross-violation-russian-troops

118

MacKinnon, M. (2014, February 14). Globe in Ukraine: In Kharkiv, revolution meets a Russophile

resistance. Retrieved April 12, 2017, from

http://www.theglobeandmail.com/news/world/globe-in-kharkiv-where-russia-is-close-to-

the-heart/article17076303/

MacRae, N. (1992). John Von Neumann: The Scientific Genius Who Pioneered the Modern

Computer, Game Theory, Nuclear Deterrence, and Much More (2nd ed.). American

Mathematical Society.

Mahashwari, V. (2014, January 5). Why Did Ukraine’s Eurolution Fail? Retrieved January 5, 2014,

from http://www.thedailybeast.com/articles/2014/01/05/why-did-ukraine-s-eurolution-

fail.html

Maidaner, E. (2014, January 17). Australians condemn new laws in Ukraine. Retrieved

January 25, 2014, from http://world.maidanua.org/2014/australians-condemn-new-

dictatorship-laws-in-ukraine

Mannteufel, I. (2018, March 18). Opinion: Vladimir Putin's great deceit. Retrieved March 20,

2018, from http://www.dw.com/en/opinion-vladimir-putins-great-deceit/a-43032943

Markoff, J. (2008, August 12). Before the Gunfire, Cyberattacks. Retrieved July 23, 2012, from

New York Times: http://www.nytimes.com/2008/08/13/technology/13cyber.html

Markov et al. (2016, June 5). Has Russia been planning this annexation of Crimea for years now

along with an annexation of heavily pro Russian areas in Eastern Ukraine? Retrieved from

https://www.quora.com/Has-Russia-been-planning-this-annexation-of-Crimea-for-years-

now-along-with-an-annexation-of-heavily-pro-Russian-areas-in-Eastern-Ukraine

119

Marson, J. (2013, December 26). Ukraine President Eyes Own Future as He Pivots. Retrieved

December 29, 2013, from

http://online.wsj.com/news/articles/SB10001424052702304483804579282283152893184

Martin, T. R. (2000). An Overview of Classical Greek History from Mycenae to Alexander. Yale

University.

Matuszak, S. and A. Sarna. (2014, January 4). From Stabilisation to Stagnation: Victor

Yanukovych's Reforms. Retrieved March 2013, from

http://www.osw.waw.pl/sites/default/files/pw_32_ang_net.pdf

Matuszak, S. (2012, September). THE OLIGARCHIC DEMOCRACY THE INFLUENCE OF

BUSINESS GROUPS ON UKRAINIAN POLITICS. Retrieved November 12, 2017, from

https://www.osw.waw.pl/sites/default/files/prace_42_en.pdf

Matyszczyk, C. (2012, July 24). Thunderstruck! A tale of malware, AC/DC, and Iran's nukes.

Retrieved July 24, 2012, from CNET: http://news.cnet.com/8301-17852_3-57478515-

71/thunderstruck-a-tale-of-malware-ac-dc-and-irans-nukes/

McDermott, R. (2016, March 8). Gerasimov Calls for New Strategy to Counter Color Revolution.

Retrieved November 15, 2016, from https://jamestown.org/program/gerasimov-calls-for-

new-strategy-to-counter-color-revolution/

McDermott, R. N. (2016). Does Russia Have a Gerasimov Doctrine? Parameters, 46(1), 97-105.

McIlroy et al. (1971, June 29). Darwin, a Game of Survival of the Fittest among Programs.

Retrieved July 21, 2012, from http://www.cs.dartmouth.edu/~doug/darwin.pdf

Mckew, M. K. (2017, September 10). The Gerasimov Doctrine. Retrieved March 31, 2018, from

https://www.politico.eu/article/new-battles-cyberwarfare-russia/

120

McKissack, F. (2017, January 29). There’s a Reason Black Youth Call Chicago ‘Chiraq’ and It’s Not

Just Criminals Doing the Shooting. Retrieved March 20, 2018, from

https://www.huffingtonpost.com/center-for-community-change-action/theres-a-reason-

black-youth-call-chicago-chiraq_b_9110960.html

McLaughlin, D. (2014, January 3). Ukraine right revives wartime symbols amid 'revolution'.

Retrieved January 4, 2014, from http://www.irishtimes.com/news/world/europe/ukraine-

right-revives-wartime-symbols-amid-revolution-1.1642760

McNamara, S. (2008, August 28). Russia's Recognition of Independence for South Ossetia and

AbkhaziaIs Illegitimate: They Are Not Kosovo. Retrieved November 30, 2017, from

http://www.heritage.org/europe/report/russias-recognition-independence-south-ossetia-and-

abkhaziais-illegitimate-they-are

Memorial. (1992, September 11). Large-scale and gross violations of human rights and the

situation in the zone of armed conflict in and around the city of Bendery (June-July, 1992).

Retrieved April 12, 2017, from http://old.memo.ru/hr/hotpoints/moldavia/benderye.htm

Memorial Human Rights Center. (2014, October 1). Бюллетень ПЦ «Мемориал» о ситуации на

Северном Кавказе летом 2014 года. Retrieved September 7, 2016, from

http://memohrc.org/news/byulleten-pc-memorial-o-situacii-na-severnom-kavkaze-letom-

2014-goda

Menon, R. (2010, January). Combating Ukraine’s Health Crisis: Lessons from Europe. Retrieved

January 15, 2015, from

https://openknowledge.worldbank.org/bitstream/handle/10986/10215/530360BRI0KB1V1

0Box345594B01PUBLIC1.pdf?sequence=1

121

Menon, R. and Fuller, G. E. (2000, March/April). Russia’s Ruinous Chechen War. Foreign Affaird,

79(2), 32-44.

Messieh, N. (2012, January 12). Everything you need to know about the ongoing Israeli-Saudi

hacker struggle. Retrieved July 24, 2012, from

http://thenextweb.com/me/2012/01/18/everything-you-need-to-know-about-the-ongoing-

israeli-saudi-hacker-struggle/

Mezzofiore, G. (2012, February 17). Iranian Hackers Target Israel's Largest Bank. Retrieved July

24, 2012, from International Business Times:

http://www.ibtimes.co.uk/articles/300453/20120217/israel-palestine-bank-iran.htm

Middle East Intelligence Bulletin. (2000, November 15). Who's Winning the Arab-Israeli Cyber

War? Retrieved July 24, 2012, from Digital Reason:

http://search.digitalreasoning.com/WBIL/02/WBIL2005_36736.txt

Miller, C. J. (2014, January 25). EuroMaidan rallies in Ukraine (Jan. 24-25 live updates). Retrieved

January 25, 2014, from http://www.kyivpost.com/content/kyiv/euromaidan-rallies-in-

ukraine-jan-24-live-updates-335518.html

Miller, C. J. (2013, December 25). Unknown assailants beat and stab Kharkiv EuroMaidan

organizer (VIDEO) (UPDATED). Retrieved January 14, 2014, from

http://www.kyivpost.com/content/ukraine/kharkiv-euromaidan-organizer-attacked-stabbed-

video-334218.html

Miller, C. J. (2014, January 17). Yanukovych signs controversial bills into law (UPDATE).

Retrieved January 18, 2014, from http://www.kyivpost.com/content/politics/yanukovych-

swiftly-signs-controversial-bills-into-law-335096.html

122

Minorities At Risk Project. (2006, December 31). Assessment for Russians in Georgia. Retrieved

July 23, 2012, from University of Maryland:

http://www.cidcm.umd.edu/mar/assessment.asp?groupId=37204

Mirowski, P. (2002). Machine Dreams: Economics Becomes a Cyborg Science. Cambridge

University Press.

Mitchell, A. P. (2008, November 21). NATO to Create Cyber Defense Force to Battle Cyber

Attacks. Retrieved July 23, 2012, from http://www.theinternetpatrol.com/nato-to-create-

cyber-defense-force-to-battle-cyber-attacks/

Mitchell, S. (2011, June 15). Stuxnet: Anatomy of a Computer Virus. Retrieved July 3, 2012, from

Vimeo: http://vimeo.com/25118844

Monaghan, A. (2016). Putin’s Way of War: The ‘War’ in Russia’s ‘Hybrid Warfare’. Parameters,

45(4), 65-74.

Morley, D. and Parker, C. S. (2009). Understanding Computers: Today and Tomorrow (12 ed.).

Boston: Cengage Learning.

The Moscow Times. (2014, January 3). Police Detain At Least 700 in Volgograd Anti-Terror Raid.

Retrieved January 4, 2014, from http://www.themoscowtimes.com/news/article/police-

detain-at-least-700-in-volgograd-anti-terror-raid/492382.html#ixzz2pRRfUmY2

Moshes, A. (2014, January 10). Lukashenka as Machiavelli. Retrieved January 15, 2014, from

http://russialist.org/lukashenka-as-machiavelli/

Motyl, A. J. (2014, January 10). A Free Donetsk? Retrieved January 13, 2014, from

http://www.worldaffairsjournal.org/blog/alexander-j-motyl/free-donetsk

123

Motyl, A. J. (2016, August 12). Let it Go. Retrieved April 12, 2017, from

http://foreignpolicy.com/2016/08/12/let-it-go-ukraine-russia-donbass/

Murphy, C. (2013, December 19). Blog Post: Behind the Scenes - 24 Hours in Kyiv. Retrieved

January 4, 2014, from http://www.chrismurphy.com/news/entry/blog-post-behind-the-

scenes-24-hours-in-kyiv/

Myers, S L and A. Smale. (2014, March 13). Russian Troops Mass at Border With Ukraine.

Retrieved from https://www.nytimes.com/2014/03/14/world/europe/ukraine.html

Nachenberg, C. (2012, May 8). Dissecting Stuxnet. Retrieved July 3, 2012, from youtube.com:

http://www.youtube.com/watch?v=DDH4m6M-ZIU

Nahari, H and Krutz, R. L. (2011). Web Commerce Security: Design and Development. John Wiley

& Sons.

Nalyvayko, S and I Bulanenko. (2016, November 27). Historian Martyniuk: Ukrainian homes

were massively occupied by Russian settlers. Retrieved April 12, 2017, from

http://euromaidanpress.com/2016/11/27/historian-martyniuk-ukrainian-homes-were-

massively-occupied-by-russian-settlers/#arvlbdata

Nantoi, O. (2013). NESTED IDENTITIES: FROM HISTORY BOOKS TO THE EMERGENCE

OF A POST-CONFLICT GENERATION IN MOLDOVA. In M. Akgün (Ed.), Managing

Intractable Conflicts: Lessons from Moldova and Cyprus (pp. 15-24). Istanbul Kultur

University.

NATO. (2008, May 20). NATO opens new centre of excellence on cyber defence. Retrieved July 23,

2012, from NATO: http://www.nato.int/docu/update/2008/05-may/e0514a.html

124

Nayyem, M. (2014, January 14). Beating victim Tetyana Chornovol say she can link suspects to

authorities. Retrieved January 15, 2014, from http://www.kyivpost.com/opinion/op-

ed/beating-victim-tetyana-chornovol-say-she-can-link-suspects-to-authorities-334969.html

Nemtsova, A. (2013, November 12). Meet Lyzhychko, the Soul of Ukraine’s Revolution.

Retrieved January 4, 2014, from http://www.thedailybeast.com/articles/2013/12/11/meet-

ruslana-lyzhychko-the-soulvoickraine-s-revolution.html

Nelson, L. D. and I. Y. Kuzes. (1994). Property to the People: The Struggle for Radical Economic

Reform in Russia. M.E. Sharpe.

Neumann, J. V. (1966). Theory of Self-Reproducing Automata. (A. W. Burks, Ed.) Urbana, IL:

University of Illinois.

The New York Times. (1999, October 1). Russian Sends Ground Troops Into Chechnya, Raising

Fears. Retrieved July 22, 2012, from The New York Times:

http://www.nytimes.com/1999/10/01/world/russian-sends-ground-troops-into-chechnya-

raising-fears.html

The New York Times. (2012, June 1). Cyberattacks on Iran — Stuxnet and Flame. Retrieved July

24, 2012, from

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/i

ndex.html

Nichols, J. (2009, March 3). Russia-Georgia Conflict in August 2008: Context and Implications for

U.S. Interests. Retrieved April 12, 2017, from https://fas.org/sgp/crs/row/RL34618.pdf

Niksch, L. A. (2010). North Korea's Nuclear Weapons Development and Diplomacy.

Congressional Research Service.

125

Nimmo, B. (2016, March 17). Yes, Putin Really Believes His Own Propaganda. Retrieved

November 16, 2016, from http://www.atlanticcouncil.org/blogs/new-atlanticist/yes-putin-

really-believes-his-own-propaganda

Noack, R. (2017, August 12). He used to rule Germany. Now, he oversees Russian energy

companies and lashes out at the U.S. Retrieved March 20, 2018, from

https://www.washingtonpost.com/news/worldviews/wp/2017/08/08/he-used-to-rule-

germany-now-he-oversees-russian-energy-companies-and-lashes-out-at-the-u-

s/?utm_term=.f0c5e83a65dd

Null, L and Lobur, J. (2012). The Essentials of Computer Organization and Architecture (3rd ed.).

Jones & Barlett Learning.

Nygren, B. (2008). The Rebuilding of Greater Russia: Putin's Foreign Policy Towards the CIS

Countries. Routledge.

Oberdorfer, D. (1992, January 3). WINNING AND LOSING BY CNN. Retrieved November 12,

2017, from https://www.washingtonpost.com/archive/opinions/1992/01/03/winning-and-

losing-by-cnn/0a9c49ee-63a1-4c9e-a26b-9277728521c3/?utm_term=.28aede222648

O'Clery, C. (2016, December 24). Conor O’Clery: Remembering the last day of the Soviet Union.

Retrieved November 12, 2017, from

https://www.irishtimes.com/news/world/europe/conor-o-clery-remembering-the-last-day-

of-the-soviet-union-1.2916499

Office of the United Nations High Commissioner for Human Rights. (2014, June 15). Report on the

human rights situation in Ukraine. Retrieved April 12, 2017, from

http://www.ohchr.org/Documents/Countries/UA/HRMMUReport15June2014.pdf

126

Olearchyk, R. (2013, December 22). Businessmen and academics denied entry to Ukraine.

Retrieved January 5, 2014, from http://www.ft.com/intl/cms/s/0/5e393938-6af2-11e3-

8e33-00144feabdc0.html?siteedition=intl#axzz2oDWfTUbA

Olearchyk, R. (2014, January 15). Ukraine gas imports: calling Slovakia. Retrieved January 15,

2014, from http://blogs.ft.com/beyond-brics/2014/01/15/ukraine-gas-imports-calling-

slovakia/#axzz2qTMfE8GE

Onuch, O. (2014, January 2). Social networks and social media in Ukrainian “Euromaidan”

protests. Retrieved January 6, 2014, from http://www.washingtonpost.com/blogs/monkey-

cage/wp/2014/01/02/social-networks-and-social-media-in-ukrainian-euromaidan-protests-

2/

Onyshkiv, Y. (2013, December 23). James Sherr: Ukraine ‘is in a dangerous situation’. Retrieved

January 5, 2013, from http://www.kyivpost.com/content/politics/james-sherr-ukraine-is-in-

a-dangerous-situation-334161.html

Osborn, A. (2005, March 1). Putin sets up youth group to stop 'orange revolution'. Retrieved March

25, 2017, from http://www.independent.co.uk/news/world/europe/putin-sets-up-youth-

group-to-stop-orange-revolution-485291.html

OSCE. (2017, September). Civilian casualties in eastern Ukraine 2016. Retrieved March 20, 2018,

from https://www.osce.org/special-monitoring-mission-to-ukraine/342121?download=true

Ostrovsky, A. (2017). The Invention of Russia: From Gorbachev's Freedom to Putin's War.

Penguin.

Ostrow et al. (2013). Crucial Junctures and the Demise of Democracy in Russia. In J. M. Ostrow

(Ed.), Politics in Russia (pp. 163-80). CQ Press.

127

Pachal, P. (2012, June 1). U.S. Launched Its Biggest Cyberattack From a Thumb Drive. Retrieved

July 24, 2012, from http://mashable.com/2012/06/01/stuxnet-thumb-drive/

Page, D. (2009). A Practical Introduction to Computer Architecture. Springer.

Panko, R. (2016, February 28). The US Is Planning a 'Color Revolution' in Russia -- But Putin Is

Ready. Retrieved November 15, 2016, from http://russia-insider.com/en/politics/us-

planning-color-revolution-russia-putin-ready/ri13090

Parfitt, T. (2005, March 20). Embattled Kremlin mobilises the young. Retrieved November 25,

2017, from https://www.theguardian.com/world/2005/mar/20/russia.tomparfitt

Park, M. (2018, January 1). Chicago police count fewer murders in 2017, but still 650 people were

killed. Retrieved March 20, 2018, from https://www.cnn.com/2018/01/01/us/chicago-

murders-2017-statistics/index.html

Paul, C. and M. Matthews. (2016). The Russian “Firehose of Falsehood” Propaganda Model:

Why It Might Work and Options to Counter It. Retrieved April 12, 2017, from

http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE198/RAND_PE198.pd

f

Peerenboom, R. (2013, May 14). Human Rights and Rule of Law: What's the Relationship?

Retrieved January 4, 2014, from

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=816024&download=yes

Peisakhin, L. (2013, December 19). Why are people protesting in Ukraine? Providing historical

context. Retrieved January 6, 2014, from http://www.washingtonpost.com/blogs/monkey-

cage/wp/2013/12/19/why-are-people-protesting-in-ukraine-providing-historical-

context/?wprss=rss_national

128

Peterson, H.E. and Turn, R. (1967, April). System implications of information privacy. AFIPS '67

(Spring) Proceedings of the April 18-20, 1967, spring joint computer conference, 291-300 .

Peterson, N. (2017, February 12). NOLAN PETERSON: RUSSIAN TROOPS MAN UKRAINE

REBELS' FRONT LINE. Retrieved March 20, 2018, from

http://www.newsweek.com/nolan-peterson-russian-troops-man-ukraine-rebels-front-line-

555141

Petrov et al. (2010, February). Overmanaged Democracy in Russia: Governance Implications of

Hybrid Regimes . Retrieved December 30, 2013, from

http://carnegieendowment.org/files/overmanaged_democracy_2.pdf

Pew Research Center. (2014, June 12). Political Polarization in the American Public. Retrieved

from http://www.people-press.org/2014/06/12/political-polarization-in-the-american-

public/

Phillip, A. D. (2013, December 19). John McCain Blames Obama for Emboldening Russian

‘Bullying’ in Ukraine. Retrieved January 14, 2014, from

http://abcnews.go.com/blogs/politics/2013/12/john-mccain-blames-obama-for-

emboldening-russian-bullying-in-ukraine/

Pinkham, S. (2015, April 2). Watching the . Retrieved April 17, 2017, from

http://www.newyorker.com/news/news-desk/watching-the-ukrainian-oligarchs

Plato. (1992). Republic. (G. M. Grube, Trans.) Hackett Publishing.

Plekhanov, I. (2017, January 7). Gerasimov Doctrine, or How a Russian General Became the

West's Biggest Boogieman. Retrieved from

https://sputniknews.com/military/201707011055151104-gerasimov-doctrine-analysis/

129

Podrabinek, A. (2014, January 8). The Peculiarities of Terrorism in Russia. Retrieved January 15,

2014, from http://russialist.org/the-peculiarities-of-terrorism-in-russia/

Popeski, R. (2014, March 14). Poll shows limited differences between east, west Ukraine. Retrieved

April 12, 2017, from http://www.reuters.com/article/us-ukraine-crisis-poll-

idUSBREA2D00E20140314

Post, K. (2013, December 25). Two arrests reported in Chornovol beating (VIDEOS) (UPDATED).

Retrieved December 30, 2013, from http://www.kyivpost.com/content/ukraine/journalist-

and-protest-activist-chornovol-beaten-near-kyiv-334224.html

Poushter, J. (2015, June 10). Key findings from our poll on the Russia-Ukraine conflict. Retrieved

April 12, 2017, from http://www.pewresearch.org/fact-tank/2015/06/10/key-findings-from-

our-poll-on-the-russia-ukraine-conflict/

Pravda. (2013, December 27). Азаров визнав, що перший транш російських грошей відправив

на "проїдання". Retrieved January 5, 2014, from

http://www.pravda.com.ua/news/2013/12/27/7008662/?attempt=1

Pravda. (2014, January 13). Депутати "Батьківщини" бойкотують Гриценка. Retrieved

January 15, 2015, from http://www.pravda.com.ua/news/2014/01/13/7009468/

Pravda, U. (2014, January 3). Svoboda Party says member of parliament, lawyer attacked in Kyiv.

Retrieved January 4, 2014, from http://www.kyivpost.com/content/kyiv/svoboda-party-

says-member-of-parliament-lawyer-attacked-in-kyiv-334641.html

Priess, F. (2006, August 30). A Divided Mexico Chooses Continuity: Felipe Calderón Wins by a

Close Vote . Retrieved March 10, 2018, from http://www.kas.de/wf/doc/kas_9017-544-2-

30.pdf?060831115723

130

Rachkevych, M. (2013, December 29). Car of Kharkiv EuroMaidan organizer burnt, fifth incident

there in month. Retrieved January 15, 2014, from

http://www.kyivpost.com/content/ukraine/car-of-kharkiv-euromaidan-organizer-burnt-fifth-

incident-there-in-month-334404.html

Rachkevych, M. (2013, December 22). Latest attack on police watchdog seen as attempt to

exterminate group. Retrieved December 31, 2013, from

http://www.kyivpost.com/content/kyiv/latest-attack-on-police-watchdog-seen-as-attempt-

to-exterminate-group-334125.html

Rachkevych, M. (2013, December 26). US prosecutors expose Ukraine's corruption in VAT-refund

payments. Retrieved January 15, 2014, from http://www.kyivpost.com/content/business/us-

prosecutors-expose-ukraines-corruption-in-vat-refund-payments-2-334308.html

Rachkevych, M. and V. Lavrov. (2013, December 27). Police implicate, link Klitschko brothers,

other opposition members to Chornovol beating suspects (UPDATE). Retrieved December

28, 2013, from http://www.kyivpost.com/content/ukraine/police-implicate-link-klitschko-

brothers-other-opposition-members-to-chornovol-beating-suspects-334343.html

Racicot, J. (2009, January 10). The Palestine-Israeli Conflict on the Web. Retrieved from

Cyberwarfare Magazine: http://cyberwarfaremag.wordpress.com/2009/01/10/the-palestine-

israeli-conflict-on-the-web/

Radyuhin, V. (2016, October 9). Medvedev, Putin accuse Georgia of genocide. Retrieved

November 30, 2017, from http://www.thehindu.com/todays-paper/tp-

international/Medvedev-Putin-accuse-Georgia-of-genocide/article15279050.ece

Ragsdale, B. A. (2005, October 28). The Sedition Act Trials. Retrieved January 4, 2014, from

http://www.fjc.gov/history/docs/seditionacts.pdf

131

Rainsford, S. (2010, March 11). Inside the mind of a Russian hacker. Retrieved July 22, 2012, from

BBC: http://news.bbc.co.uk/2/hi/8561910.stm

Rajan Menon and Eugene Rumer. (2015). Conflict in Ukraine. MIT Press.

Randell, B. (1982, October). From Analytical Engine to Electronic Digital Computer: The

Contributions of Ludgate, Torres, and Bush. Annals of the History of Computing, 4(4), 327-

42.

Rao, P. V. S. (1994). Perspectives in Computer Architecture (3rd ed.). Prentice-Hall.

Read, J. H. (2008). Madison's Response to Nullfication. In V. e. al (Ed.), James Madison:

Philosopher, Founder, and Statesman (pp. 269-283). Ohio University Press.

Reddaway, P and D. Glinski. (2001). The Tragedy of Russia's Reforms: Market Bolshevism Against

Democracy. US Institute of Peace Press.

Reich, R. (2001, December 19). Russian Capitalism. Retrieved from

http://prospect.org/article/russian-capitalism

Reich, R. (2015). Saving Capitalism: For the Many, Not the Few. Penguin Random House.

Renz, B. and H. Smith. (2016, January). RUSSIA AND HYBRID WARFARE – GOING BEYOND

THE LABEL. Retrieved October 12, 2016, from Aleksanteri Papers, Aleksanteri Institute,

University of Helsinki, Finland:

http://www.helsinki.fi/aleksanteri/english/publications/presentations/papers/ap_1_2016.pdf

Reuters. (2008, August 8). Over 10 Russian peacekeepers killed in S.Ossetia-agencies. Retrieved

July 23, 2012, from Reuters: http://www.reuters.com/article/2008/08/08/idUSL8187260

132

Reuters. (2009, August 12). Georgian blogger says will not be silenced. Retrieved November 24,

2017, from https://www.reuters.com/article/us-georgia-blogger/georgian-blogger-says-will-

not-be-silenced-idUSTRE57B32N20090812

Reuters. (2013, December 28). Ukrainian journalist’s attackers have ties to opposition – police.

Retrieved January 5, 2014, from http://rt.com/news/ukraine-opposition-reporter-beating-

897/

Reuters. (2014, January 15). Ukraine court bans protests in central part of capital Kiev. Retrieved

January 15, 2014, from http://www.thestar.com.my/News/World/2014/01/16/Ukraine-

court-bans-protests-in-central-part-of-capital-Kiev/

Reynolds, M. (2000, September 17). WAR HAS NO RULES FOR RUSSIAN FORCES BATTLING

CHECHEN REBELS. Retrieved November 16, 2016, from

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0ahUKE

wjLsLWfwazQAhWi8YMKHaAKAZcQFggiMAE&url=http%3A%2F%2Fwww.christu

srex.org%2Fwww1%2Ficons%2Fruss-atrocities.html&usg=AFQjCNGL5Dq6q-

UZk1XEkIZA4kf32XnbmQ

RIA Novosti. (2013, November 30). Ukrainian Police Break Up Pro-EU Rally. Retrieved January

2, 2014, from http://en.ria.ru/world/20131130/185163049/Ukrainian-Police-Break-Up-Pro-

EU-Rally.html

RIA Novosti. (2013, December 28). World Ukrainian Opposition Politicians Daubed With Green

Dye. Retrieved January 13, 2014, from en.ria.ru/world/20131228/186033659/Ukrainian-

Opposition-Politicians-Daubed-With-Green-Dye.html

133

RIA Novosti. (2014, January 8). RIA Novosti: U.S. Senate Backs Sanctions Over Ukraine Violence.

Retrieved January 15, 2014, from http://russialist.org/ria-novosti-u-s-senate-backs-

sanctions-over-ukraine-violence/

RIA Novosti. (2014, January 1). Ukraine Police Say Protesters Harassing Kiev Residents.

Retrieved January 5, 2014, from http://en.ria.ru/crime/20140101/186151152/Ukraine-

Police-Say-Protesters-Harassing-Kiev-Residents.html

Ro'i, Y. (2008). Soviet Policy toward the Six Day War through the Prism of Moscow's Relationship

with Egypt and Syria. In Y. a. Ro'i (Ed.), The Soviet Union and the June 1967 Six Day War

(pp. 1-42). Stanford University Press.

Roland Oliphant and Matt Tempest. (2013, December 22). Mikhail Khodorkovsky urges West to

help him free other Russian dissidents. Retrieved December 25, 2013, from

http://www.telegraph.co.uk/news/worldnews/vladimir-putin/10533848/Mikhail-

Khodorkovsky-urges-West-to-help-him-free-other-Russian-dissidents.html

Roudik, P. (2010, October 8). Ukraine: The 1996 Constitution Is Reinstated. Retrieved January 25,

2014, from http://www.loc.gov/lawweb/servlet/lloc_news?disp3_l205402303_text

Rosenberg, S. (2017, March 21). Crimea: The place that's rather difficult to get into. Retrieved

from http://www.bbc.com/news/world-europe-39329284

Rosenkrantz, H. (2008, April 24). North Korea Aided Covert Syrian Nuclear Program, Perino

Says. Retrieved July 24, 2012, from Bloomberg:

http://www.bloomberg.com/apps/news?pid=newsarchive&sid=ajnxZcb351qM&refer=jap

an

134

Roth, R. (2017, April 12). Russia vetoes UN resolution on Syria. Retrieved April 12, 2017, from

http://www.cnn.com/2017/04/12/politics/assad-syria-sarin-gas/

RT. (2018, March 6). ‘Gerasimov doctrine’ finally put to rest? Russia ‘expert’ apologizes for coining

snappy term. Retrieved from https://www.rt.com/news/420555-gerasimov-doctrine-

galeotti-apology/

RT. (2011, April 11). South Ossetia accuses Georgia of Human Rights violations. Retrieved April

12, 2017, from https://www.rt.com/politics/ossetia-accuses-human-rights/

RT. (2015a, June 19). Russian military to order major research to counter ‘color revolutions’.

Retrieved November 15, 2016, from https://www.rt.com/politics/268378-russian-military-

color-revolutions/

RT. (2015b, July 10). Thousands of Ukrainian citizens to sue Kiev regime over human rights

violations – Russian activists. Retrieved April 12, 2017, from

https://www.rt.com/politics/272872-russia-ukraine-rights-lawsuit/

Rucker et al. (2018, February 24). After testy call with Trump over border wall, Mexican president

shelves plan to visit White House. Retrieved March 10, 2018, from

https://www.washingtonpost.com/politics/after-testy-call-with-trump-over-border-wall-

mexicos-president-shelves-plan-to-visit-white-house/2018/02/24/c7ffe9e8-199e-11e8-

8b08-027a6ccb38eb_story.html?utm_term=.5bcd2643de7b

Sanchez, R. (2013, December 31). How John Terry helped spark Ukraine's political crisis.

Retrieved January 1, 2014, from

http://www.telegraph.co.uk/news/worldnews/europe/ukraine/10544570/How-John-Terry-

helped-spark-Ukraines-political-crisis.html

135

Sanger, D. E. (2012a). Confront and Conceal: Obama's Secret Wars and Surprising Use of

American Power. Crown Publishers.

Sanger, D. E. (2012b, June 1). Obama Order Sped Up Wave of Cyberattacks Against Iran.

Retrieved July 24, 2012, from New York Times:

http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-

cyberattacks-against-iran.html?pagewanted=all

Sanovich, S. (2017, June 19). Computational Propaganda in Russia: The Origins of Digital

Misinformation. Retrieved November 25, 2017, from

https://www.oii.ox.ac.uk/blog/computational-propaganda-in-russia-the-origins-of-digital-

misinformation/

Satter, D. (2003). Darkness at Dawn: The Rise of the Russian Criminal State. Yale University Press.

Saul, H. (2014, January 11). Ukraine opposition leader Yuri Lutsenko injured in police clash .

Retrieved January 13, 2014, from

http://www.independent.co.uk/news/world/europe/ukraine-opposition-leader-yuri-lutsenko-

injured-in-police-clash-9053248.html

Schaefer, R. W. (2010). The Insurgency in Chechnya and the : From Gazavat to

Jihad. ABC-CLIO.

Schneider, M. B. (2017, April 28). Russian Nuclear Weapons Policy. Retrieved March 20, 2018,

from

https://www.realcleardefense.com/articles/2017/04/28/russian_nuclear_weapons_policy_1

11261.html

Scott, B. R. (2011). Capitalism: Its Origins and Evolution as a System of Governance. Springer.

136

Seierstad, Å. (2008). The Angel of : Orphans of a Forgotten War. Basic Books.

Sengupta, K. (2010, February 6). Terrorists 'gaining upper hand in cyber war'. Retrieved July 5,

2011, from The Independent: http://www.independent.co.uk/news/uk/home-

news/terrorists-gaining-upper-hand-in-cyber-war-1890913.html

Shachtman, N. (2009, January 8). Wage Cyberwar Against Hamas, Surrender Your PC. Retrieved

from Wired: http://www.wired.com/dangerroom/2009/01/israel-dns-hack/

Shakarian, P. (2011, November-December). The 2008 Russian Cyber Campaign Against Georgia.

Military Review, 63-68. Retrieved from

http://www.armyupress.army.mil/Portals/7/military-

review/Archives/English/MilitaryReview_20111231_art013.pdf

Shamota, M. (2013, December 19). EuroMaidan needs businesspeople to keep it operating.

Retrieved January 14, 2014, from http://www.kyivpost.com/content/business/euromaidan-

needs-businesspeople-to-keep-it-operating-334027.html

Shalal, A. (2018, February 16). OSCE calls for effort to jumpstart Ukraine peace process. Retrieved

March 20, 2018, from https://www.reuters.com/article/us-germany-security-osce-ukraine-

crisis/osce-calls-for-effort-to-jumpstart-ukraine-peace-process-idUSKCN1G01ZO

Shirk, D. A. (2011, January). JUSTICE REFORM IN MEXICO: CHANGE & CHALLENGES IN

THE JUDICIAL SECTOR. Retrieved March 10, 2018, from

https://www.wilsoncenter.org/sites/default/files/Chapter%207-

%20Justice%20Reform%20in%20Mexico,%20Change%20and%20Challenges%20in%2

0the%20Judicial%20Sector.pdf

137

Shoch, J. F. and Hupp, J. A. (1982, March). The "Worm" Programs Early Experience with a

Distributed Computation . Communications of the ACM, 25(3).

Shevchenko, D. (2014, January 10). EuroMaidan activists leave fledgling Maidan Civic Council.

Retrieved January 13, 2014, from http://www.kyivpost.com/content/politics/euromaidan-

activists-leave-fledgling-maidan-civic-council-334837.html

Shevchenko, D. and O. Goncharova. (2013, December 20). Chief prosecutor Pshonka gives his

version of Nov. 30-Dec. 1 EuroMaidan violence. Retrieved January 14, 2014, from

http://www.kyivpost.com/content/ukraine/chief-prosecutor-pshonka-gives-his-version-of-

nov-30-dec-1-euromaidan-violence-334043.html

Silver, N. (2017, May 3). The Comey Letter Probably Cost Clinton The Election. Retrieved from

https://fivethirtyeight.com/features/the-comey-letter-probably-cost-clinton-the-election/

Sinovets, P. (2015, December). The Nuclear Element in Russia’s Asymmetric Warfare Strategies:

PONARS Eurasia Policy Memo No. 404. Retrieved September 7, 2016, from

http://www.ponarseurasia.org/sites/default/files/policy-memos-

pdf/Pepm404_Sinovets_Dec2015_0.pdf

Slutkin, G. (2013). II.9 VIOLENCE IS A CONTAGIOUS DISEASE. Retrieved March 20, 2018,

from https://www.ncbi.nlm.nih.gov/books/NBK207245/

Smale, A. (2013, December 19). Buoyed by a Deal With Russia, Ukraine’s Leader Tries to Reassert

His Authority. Retrieved January 4, 2014, from

http://www.nytimes.com/2013/12/20/world/europe/ukraine-russia-agreement.html?_r=3&

Smith, James and Freddy Mutanguha. (2014, January 2). Heed the warnings: Genocide and

Rwanda's lessons for South Sudan. Retrieved January 5, 2014, from

138

http://edition.cnn.com/2014/01/02/world/africa/south-sudan-rwandas-

lessons/index.html?iid=article_sidebar

Smith, M. (2014, January 14). American journalist David Satter kicked out of Russia. Retrieved

January 14, 2014, from http://edition.cnn.com/2014/01/13/world/europe/russia-journalist-

expelled/index.html?hpt=hp_t1

Smith, H. (2012). Domestic Influences on Russian Foreign Policy: Status, Interests and

Ressentiment. In M. R. Freire (Ed.), Russia and its Near Neighbours (pp. 39-62). Palgrave

MacMillan.

Snyder, T. (2010, February 24). A Fascist Hero in Democratic Kiev. Retrieved January 4, 2014,

from http://www.nybooks.com/blogs/nyrblog/2010/feb/24/a-fascist-hero-in-democratic-

kiev/

Solchanyk, R. (2000). Ukraine and Russia The Post-Soviet Transition. Rowman & Littlefield

Publishers.

Sorrel, C. (2008, ecember 16). World’s First Computer Rebuilt, Rebooted After 2,000 Years.

Retrieved July 20, 2012, from Wired: http://www.wired.com/gadgetlab/2008/12/2000-year-

old-a/

Spencer, R. (2008, October 16). Top Sunni scholars sanction hacking and sabotage of American

and Israeli websites. Retrieved July 24, 2012, from Jihad Watch:

http://www.jihadwatch.org/2008/10/top-sunni-scholars-sanction-hacking-and-sabotage-of-

american-and-israeli-websites.html

Staedter, T. (2011, March 16). FIRST COMPUTER VIRUS, CREEPER, WAS NO BUG. Retrieved

from http://news.discovery.com/tech/first-computer-virus-creeper-was-no-bug-110316.html

139

Stallard, K. (2015, March 10). Putin Comes Clean On Crimea's Little Green Men. Retrieved from

http://news.sky.com/story/putin-comes-clean-on-crimeas-little-green-men-10368423

Stefes, C. H. (2006). Understanding Post-Soviet Transitions: Corruption, Collusion and

Clientelism. Palgrave Macmillan.

Swab, A. (2014, April 29). New Poll finds only 15 percent in Eastern Ukraine want to join with

Russia. Retrieved April 12, 2017, from http://www.pbs.org/newshour/rundown/new-poll-

finds-15-eastern-ukraine-want-join-russia/

Swift, J. (2007). The Cuban Missile Crisis . Retrieved from

http://www.artsrn.ualberta.ca/amcdouga/Hist112/add_rdgs/The%20Cuban%20Missile%20

Crisis.pdf

Synovitz, R. (2015, August 24). Ukraine Poll Shows Support For Independence Rose In Year Of

Conflict. Retrieved April 12, 2017, from http://www.rferl.org/a/ukraine-poll-shows-support-

for-independence-rose/27206246.html

Szor, P. (2005). The Art of Computer Virus Research and Defense. Addison-Wesley Professional.

Tamkin, E. (2017, March 23). ‘Last Dictator of Europe’ Earns His Title, Cracks Down on Protests.

Retrieved April 9, 2017, from http://foreignpolicy.com/2017/03/23/last-dictator-of-europe-

earns-his-title-cracks-down-on-protests/

Taylor, P. (2013, December 20). EU says door open to Ukraine, not necessarily to Yanukovich.

Retrieved January 5, 2014, from http://www.reuters.com/article/2013/12/20/us-eu-ukraine-

idUSBRE9BJ0IL20131220

Taylor, A. (2016, November 26). Before ‘fake news,’ there was Soviet ‘disinformation’. Retrieved

November 26, 2017, from

140

https://www.washingtonpost.com/news/worldviews/wp/2016/11/26/before-fake-news-

there-was-soviet-disinformation/?utm_term=.f58f2d860950

Thibodeau, P. (2009, April 27). Russia's cyber blockade of Georgia worked. Could it happen here?

Retrieved July 23, 2012, from Computerworld:

http://www.computerworld.com/s/article/9131270/Russia_s_cyber_blockade_of_Georgia_

worked._Could_it_happen_here_

Thomas, T. (2014). Russia’s Information Warfare Strategy: Can the Nation Cope in Future

Conflicts? The Journal of Slavic Military Studies, 27(1), 101-130.

Thomas, T. (2015). Russia’s Military Strategy and Ukraine: Indirect, Asymmetric—and Putin-Led.

Journal of Slavic Military Studies, 28, pp. 445-461.

Thomas, T. L. (2004). Russia’s Reflexive Control Theory and the Military. Journal of Slavic Military

Studies, 17, 237–256.

Thomas, T. (2016). The Evolution of Russian Military Thought: Integrating Hybrid, New-

Generation, and New Type Thinking. Journal of Slavic Military Studies, 29(4), 545-75.

Thornton, C. (2017, July 27). Mexico’s ruling party is in free fall. Retrieved March 10, 2018, from

https://www.washingtonpost.com/news/global-opinions/wp/2017/07/27/mexicos-ruling-

party-is-in-free-fall/?utm_term=.40739ff491eb

Tikk et al. (2008, November). Cyber Attacks Against Georgia: Legal Lessons Identified. Retrieved

July 23, 2012, from US Army War College:

http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf

Toal, G. (2017). Near Abroad: Putin, the West and the Contest Over Ukraine and the Caucasus.

Oxford University Press.

141

Trach, N. (2014, January 12). Lutsenko hospitalized as authorities face political fallout (VIDEO,

UPDATE). Retrieved January 13, 2014, from

http://www.kyivpost.com/content/ukraine/lutsenko-hospitalized-as-authorities-face-

political-repercussions-334869.html

Traynor, I. (2007, May 16). Russia accused of unleashing cyberwar to disable Estonia. Retrieved

July 23, 2012, from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia

Treisman, D. (2008, February 1). The Popularity of Russian Presidents . Retrieved July 22, 2012,

from UCLA: http://web.international.ucla.edu/media/files/Treisman.pdf

Trifunov, D. (2014, January 15). Ukraine's Greek Catholic Church stares down government, and

wins. Retrieved January 15, 2014, from

http://www.globalpost.com/dispatch/news/regions/europe/140115/ukraines-greek-catholic-

church-stares-down-government-and-wins

Troggemann et al. (2001). History of Computer Devices in Russia. BertelsmannSpringer.

Tsvetkova, M. (2014, July 5). Ukraine government forces recapture separatist stronghold.

Retrieved November 16, 2016, from http://www.reuters.com/article/us-ukraine-crisis-

slaviansk-idUSKBN0FA06R20140705

Tucker, J. (2013, December 19). Three reasons why protests in Ukraine could end up helping

Yanukovych. Retrieved January 6, 2014, from

http://www.washingtonpost.com/blogs/monkey-cage/wp/2013/12/19/three-reasons-why-

protests-in-ukraine-could-end-up-helping-yanukovych/?wprss=rss_national

Tucker, M. and Y. Samus . (2014, January 5). Ukraine protest leaders assaulted outside Kiev police

station. Retrieved January 13, 2014, from

142

http://www.independent.co.uk/news/world/europe/ukraine-protest-leaders-assaulted-

outside-kiev-police-station-9039187.html?origin=internalSearch

Twitter. (2012, July 2). Twitter Transparency Report. Retrieved July 2, 2012, from Twitter:

http://blog.twitter.com/2012/07/twitter-transparency-report.html

Tymoshenko, Y. (2014, January 15). : 'Act, otherwise they will act!'. Retrieved

January 15, 2015, from http://www.kyivpost.com/opinion/op-ed/yulia-tymoshenko-act-

otherwise-they-will-act-334985.html

Ukraine Today. (2016, August 2). Chechen Soldiers and USSR Flags: Russian-backed forces

reinforce positions in . Retrieved November 16, 2016, from

http://uatoday.tv/politics/chechen-soldiers-and-ussr-flags-russian-backed-forces-reinforce-

positions-in-horlivka-708661.html

Ukrainian Democratic Alliance for Reform. (2014, January 14). UDAR says Supreme

Administrative Court decision paves the way for ECHR appeal. Retrieved January 15,

2014, from http://klichko.org/en/news/news/udar-rishennya-vasu-vidkrivaye-shlyah-dlya-

oskarzhennya-diy-vladi-v-yevropeyskomu-sudi

Ukrainska Pravda. (2014, January 5). Euromaidan activists face pornography charges. Retrieved

January 6, 2014, from http://www.kyivpost.com/content/ukraine/euromaidan-activists-face-

trumped-up-morals-charges-334676.html

Ukrainska Pravda. (2014, January 4). Kyiv traffic police promise to stop pressuring Maidan.

Retrieved January 14, 2014, from http://www.kyivpost.com/content/ukraine/kyiv-traffic-

police-promised-to-stop-pressuring-maidan-334652.html

143

Ukrainska Pravda. (2014, January 14). Mazan says the police had every right to take action against

activsits. Retrieved January 14, 2014, from

http://www.kyivpost.com/content/politics/mazan-says-the-police-had-every-right-to-take-

action-against-activsits-334934.html

Ukranian Foto. (2013, December 27). Тягнибок рекомендует митингующим против власти

ночью не выходить в одиночку за пределы Евромайдана в Киеве. Retrieved January 6,

2014, from http://ukrafoto.com/reportages.php?id=19487

Umland, A. (2012). Russia's New "Special Path" After the Orange Revolution. 50(6), 19-40.

Unian. (2015, November 15). Poroshenko says Ukrainian troops allowed to return fire if attacked

Read more on UNIAN: https://www.unian.info/politics/1180976-poroshenko-says-

ukrainian-troops-allowed-to-return-fire-if-attacked.html. Retrieved November 20, 2018,

from https://www.unian.info/politics/1180976-poroshenko-says-ukrainian-troops-allowed-

to-return-fire-if-attacked.html

United Nations. (2011, August 26). Supervising ceasefire and disengagement agreement. Retrieved

July 24, 2012, from United Nations: http://www.un.org/en/peacekeeping/missions/undof/

United States Senate. (2014, January 7). EXPRESSING SUPPORT FOR THE UKRAINIAN

PEOPLE -- (Senate - January 07, 2014). Retrieved from http://thomas.loc.gov/cgi-

bin/query/D?r113:32:./temp/~r113OEC5ol::

Ushahidi. (2011, December 11). SMS for Violence Prevention: PeaceTXT International Launches

in Kenya. Retrieved March 20, 2018, from

https://www.ushahidi.com/blog/2011/12/12/sms-for-violence-prevention-peacetxt-

international-launches-in-kenya

144

Vaczi, N. (2016, October 6). HYBRID WARFARE: HOW TO SHAPE SPECIAL OPERATIONS

FORCES. Retrieved November 15, 2016, from https://www.hsdl.org/?view&did=795245

Varfolomeyev, O. (2014, January 9). Controversial Year for Ukraine: President Yanukovych Makes

U-turn to Avoid Default. Retrieved January 15, 2014, from

http://russialist.org/controversial-year-for-ukraine-president-yanukovych-makes-u-turn-to-

avoid-default/

Vasilyeva, N. (2016, February 17). In Crimea, Tatars step up resistance to Russian rule . Retrieved

November 16, 2016, from http://www.smh.com.au/world/in-crimea-tatars-step-up-

resistance-to-russian-rule-20160215-gmuva3.html

Vice, M. and H. Chwe. (2017, September 14). Mexican Views of the U.S. Turn Sharply Negative.

Retrieved March 10, 2018, from http://www.pewglobal.org/2017/09/14/mexican-views-of-

the-u-s-turn-sharply-negative/

VOA News. (2016, October 19). Agreement to Send Armed European Police Force to Eastern

Ukraine. Retrieved November 16, 2016, from http://www.voanews.com/a/germany-hosts-

meeting-to-review-minsk-agreements-on-ukraine/3557662.html

Voice of Russia. (2014, January 13). Ukraine’s court upholds law that may ban Klitschko from

running for president. Retrieved January 14, 2014, from

http://voiceofrussia.com/news/2014_01_13/Ukraine-s-court-upholds-law-that-may-ban-

Klitschko-from-running-for-president-1721

The Voices of Ukraine. (2013, December 26). Ukrainian Justice As It Is. Retrieved December 28,

2013, from http://maidantranslations.wordpress.com/2013/12/26/ukrainian-justice-as-it-is/

145

Wagner, J. and F. Sonmez. (2018, July 17). Trump says he accepts U.S. intelligence on Russian

interference in 2016 election but denies collusion. Retrieved from

https://www.washingtonpost.com/politics/growing-number-in-gop-call-for-trump-to-fix-

the-damage-from-helsinki-news-conference/2018/07/17/7ea15178-8902-11e8-8aea-

86e88ae760d8_story.html?hpid=hp_hp-top-table-main_goptrump-

940am%3Ahomepage%2Fstory

Waldermann, A. (2007, November 2). Russian Youth and the Putin Cult. Retrieved November 25,

2017, from http://www.spiegel.de/international/world/the--movement-russian-youth-

and-the-putin-cult-a-514891.html

Walker, S. (2014, March 18). Putin condemns western hypocrisy as he confirms annexation of

Crimea. Retrieved November 26, 2017, from

https://www.theguardian.com/world/2014/mar/18/crimea-putin-condemns-western-

hypocrisy-annexation

Walker, S. (2013, December 11). Ukraine protests: outrage as police attack Kiev barricades.

Retrieved December 20, 2013, from http://www.theguardian.com/world/2013/dec/11/kiev-

protests-police-barricades-chainsaws

Walker, Shaun and Oksana Grytsenko. (2013, December 11). Ukrainian riot police surround Kiev

protesters. Retrieved January 4, 2014, from

http://www.theguardian.com/world/2013/dec/11/ukrainian-riot-police-surround-kiev-

protesters

Waller, N. (2015, April 1). A Chechen War by Proxy. Retrieved September 7, 2016, from

https://www.foreignaffairs.com/articles/eastern-europe-caucasus/2015-04-01/chechen-war-

proxy

146

Wang, H and Wang, S. (2004, October). Cyber Warfare: Steganography vs. Steganalysis.

Communications of the ACM, 47(10), 76-82.

Wanner, C. (1998). Burden of Dreams: History and Identity in Post-Soviet Ukraine. The

Pennsylvania State University Press.

Ware et al. (1979, October). Security Controls for Computer Systems: Report of Defense Science

Board Task Force on Computer Security - RAND Report R-609-1. Retrieved July 21, 2012,

from RAND Corporation: http://www.rand.org/pubs/reports/R609-1/index2.html

Washington Post Editorial Board. (2013, December 19). Ukraine’s move toward Russia will only

hurt the country. Retrieved January 6, 2014, from

http://www.washingtonpost.com/opinions/ukraines-move-toward-moscow-will-only-hurt-

the-country/2013/12/18/70c5353a-6808-11e3-8b5b-

a77187b716a3_story.html?wprss=rss_opinions

Washington Post Editorial Board. (2013, December 3). Ukraine doesn’t need another revolution.

Retrieved January 14, 2014, from http://www.washingtonpost.com/opinions/ukraine-

doesnt-need-another-revolution/2013/12/02/a3aa5274-5b78-11e3-a49b-

90a0e156254b_story.html

Waterman, S. (2012, April 25). U.S. seen as Iran ‘cyberarmy’ target. Retrieved July 24, 2012, from

The Washington Times: http://www.washingtontimes.com/news/2012/apr/25/us-seen-as-

iran-cyberarmy-target/?page=all

Way, L. (2013, December 17). Six reasons to be cautious about likelihood of opposition success in

Ukraine. Retrieved January 6, 2014, from http://www.washingtonpost.com/blogs/monkey-

cage/wp/2013/12/17/six-reasons-to-be-cautious-about-likelihood-of-opposition-success-in-

ukraine/

147

Weiss, A. S. (2013, December 30). Russia’s Oligarchy, Alive and Well. Retrieved January 5, 2014,

from http://www.nytimes.com/2013/12/31/opinion/russias-oligarchy-alive-and-

well.html?hp&rref=opinion/international&_r=0

Weiss, J. (2010, November). Stuxnet: Cybersecurity Trojan horse. Retrieved July 25, 2012, from

http://www.isa.org/InTechTemplate.cfm?template=/ContentManagement/ContentDisplay.c

fm&ContentID=84318

Welt, C. (2013, December 23). Ukraine’s Euromaidan: Now Comes the Hard Part. Retrieved

January 13, 2014, from

http://www.americanprogress.org/issues/security/news/2013/12/23/81532/ukraines-

euromaidan-now-comes-the-hard-part/

Wiegand, K. E. (2011). Enduring Territorial Disputes: Strategies of Bargaining, Coercive

Diplomacy, and Settlement. Athens, Georgia: University of Georgia Press.

Williams, D. (2009, July 7). ANALYSIS-Wary of naked force, Israelis eye cyberwar on Iran.

Retrieved July 24, 2012, from http://www.reuters.com/article/2009/07/07/idUSLV83872

Wilson, A. (2002). The Ukrainians: Unexpected Nation. Yale University Press.

Wilson, A. (2005). Virtual Politics: Faking Democracy in the Post-Soviet World. Yale University

Press.

Withnall, A. (2014, March 2). Ukraine crisis: New navy chief 'defects' and surrenders Crimean HQ

as Putin claims ultranationalists forced intervention. Retrieved April 12, 2017, from

http://www.independent.co.uk/news/world/europe/ukraine-crisis-new-navy-chief-defects-

and-surrenders-crimean-hq-as-putin-claims-ultranationalists-9163407.html

148

Woollacott, E. (2017, September 9). Amazon's Fake Review Problem Is Now Worse Than Ever,

Study Suggests. Retrieved November 30, 2017, from

https://www.forbes.com/sites/emmawoollacott/2017/09/09/exclusive-amazons-fake-

review-problem-is-now-worse-than-ever/

Woolley, S. C. (2016, April 4). Automating power: Social bot interference in global politics. First

Monday, 21(4).

World Bank. (2006, October). Corporate Governance Country Assessment. Retrieved January 15,

2014, from

https://openknowledge.worldbank.org/bitstream/handle/10986/8176/465440ESW0P0961B

LIC10UA0rosc1cg1ukr.pdf?sequence=1

World Bank. (2001, November). COUNTRY PROCUREMENT ASSESSMENT REPORT (CPAR).

Retrieved January 15, 2014, from

https://openknowledge.worldbank.org/bitstream/handle/10986/14332/288460UA.pdf?sequ

ence=1

World Bank. (2001, October 15). Ukraine: Country Financial Accountability Assessment.

Retrieved January 15, 2014, from

https://openknowledge.worldbank.org/bitstream/handle/10986/15365/multi0page.pdf?sequ

ence=1

World Bank. (2002, August 15). REPORT ON THE OBSERVANCE OF STANDARDS AND

CODES (ROSC) . Retrieved January 15, 2014, from

https://openknowledge.worldbank.org/bitstream/handle/10986/14471/351900UA0REV0A

ccounting0rosc1ukr.pdf?sequence=1

149

World Bank. (2003). Ukraine: Education Reform Policy Note. Retrieved January 15, 2014, from

https://openknowledge.worldbank.org/bitstream/handle/10986/14968/470310ESW0whit1o

te0Feb200301PUBLIC1.pdf?sequence=1

World Bank. (2006, February 6). Ukraine - BEEPS-at-a-glance. Retrieved January 15, 2014, from

https://openknowledge.worldbank.org/bitstream/handle/10986/9634/693430BRI0P091071

B00PUBLIC00Ukraine.pdf?sequence=1

World Bank. (2014, January 15). Opportunities and challenges to private sector development in

Ukraine (English). Retrieved January 14, 2014, from

http://documents.worldbank.org/curated/en/2014/01/18793736/opportunities-challenges-

private-sector-development-ukraine

The World Justice Project. (2014, January 5). What is the Rule of Law? Retrieved January 5, 2014,

from http://worldjusticeproject.org/what-rule-la

World Tribune. (2012, April 27). Israel trains cyber warfare team to counter new Iran threat.

Retrieved July 24, 2012, from World Tribune:

http://www.worldnewstribune.com/2012/04/27/israel-trains-cyber-warfare-team-to-

counter-new-iran-threat/

Wright, R. and Warrick, J. (2008, May 11). Purchases Linked N. Korean to Syria. Retrieved July

24, 2012, from http://www.washingtonpost.com/wp-

dyn/content/article/2008/05/10/AR2008051002810.html

Yanukovych, V. (2014, January 1). President’s address on occasion of New Year. Retrieved January

6, 2014, from http://president.gov.ua/en/news/29891.html

Yekelchyk, S. (2007). Ukraine: Birth of a Modern Nation. Oxford University Press.

150

Yeltsin, B. (1999, December 31). Yeltsin's resignation speech. Retrieved November 13, 2017, from

http://news.bbc.co.uk/2/hi/world/monitoring/584845.stm

Young, A. L. (2006). Trojan Horse Programs. In H. Bidgoli (Ed.), Handbook of Information

Security, Threats, Vulnerabilities, Prevention, Detection, and Management (Vol. 3, pp. 107-

18). John Wiley & Sons.

Zabarko, B. M. (2005). Holocaust in the Ukraine. University of Michigan.

Zetter, K. (2012a, June 8). How 'Flame' Malware Hijacks a Computer. Retrieved July 3, 2012,

from Science Friday7: http://sciencefriday.com/segment/06/08/2012/how-flame-malware-

hijacks-a-computer.html

Zetter, K. (2012b, May 28). Meet ‘Flame,’ The Massive Spy Malware Infiltrating Iranian

Computers. Retrieved July 24, 2012, from Wired:

http://www.wired.com/threatlevel/2012/05/flame/all/1?utm_source=Contextly&utm_medi

um=RelatedLinks&utm_campaign=Previous

Zik. (2013, December 22). Goons shot at NGO activist, burn his car. Retrieved January 25, 2013,

from http://zik.ua/en/news/2013/12/22/goons_shot_at_ngo_activist_burn_his_car_449019

151