DB1000N SOFTWARE AS UKRAINE'S MILITARY UTILITY TO COUNTER RUSSIAN INVASION IN 2022
(1) University of Indonesia (Alumni)
(*) Corresponding Author
Abstract
As Russia launched an invasion in every domain of warfare, including cyberspace, Ukraine employed an Information Technology (IT) army equipped with software called db1000n on March 2022. This article seeks to explain how the use of db1000n helps Ukraine against the 2022 Russian invasion. Using a case study as the research method and Susan Martin's military utility concept as the analytical framework, this article found that db1000n helps to support Ukraine's cyber warfare effort by being Distributed Denial of Service (DDoS) attack software that possesses three types of military utility, namely technical utility, tactical utility, and strategic utility. Nevertheless, db1000n still has some limitations that cannot secure an easy victory in cyber warfare. Â
Full Text:
PDFReferences
Ashraf, Z. (2018). Virtual Private Networks in Theory and Practice. Chisinau: Scholars’ Press.
Baylis, J. (2020). International and Global Security. In J. Baylis, S. Smith, & P. Owens (Eds.), The Globalization of World Politics. New York: Oxford University Press.
Black, O. (2022). Ukita Installer. Retrieved July 11, 2022, from https://github.com/OleksandrBlack/ukita_installer/releases/tag/2.0.0
Bodner, J. (2021). Learning Go: An Idiomatic Approach to Real-World Go Programming. Sebastopol: Sebastopol.
Bondarenko, A. (2022). Dynamic Targets List. Retrieved July 11, 2022, from https://github.com/Arriven/db1000n/issues/85
Brilmayer, L. (1999). Realism Revisited: The Moral Priority of Means and Ends in Anarchy. Global Justice, 41, 192–215.
Buchanan, B. (2020). The Hacker and the State: Cyber Attacks and New Normal of Geopolitics. Cambridge: Harvard University Press.
Cares, J. R. (2017). Malware. In P. J. Springer (Ed.), Encyclopedia of Cyber Warfare. California: ABC-CLIO.
Chapman, G., Elbahtimy, H., & Martin, S. B. (2018). The Future of Chemical Weapons: Implications from the Syrian Civil War. Security Studies, 27(4). https://doi.org/10.1080/09636412.2018.1483640
Chmil, Y. (2022). Always Same Targets. Retrieved July 12, 2022, from https://github.com/Arriven/db1000n/issues/132
Choucri, N. (2012). Cyberpolitics in International Relations. London: The MIT Press.
Cohen, E. A. (2018). Technology and Warfare. In J. Baylis, J. Wirtz, & C. Gray (Eds.), Strategy in the Contemporary World. New York: Oxford University Press. https://doi.org/10.1093/HEPL/9780198807100.001.0001
Dunne, T., & Schmidt, B. (2019). Realism. In J. Baylis, S. Smith, & P. Owens (Eds.), The Globalization of World Politics: An Introduction to International Relations. New York: Oxford University Press.
Echevarria, A. J. (2017). Military Strategy: A Very Short Introduction. In Military Strategy: A Very Short Introduction. New York: Oxford University Press. https://doi.org/10.1093/ACTRADE/9780199340132.001.0001
Fedorov, M. (2022). We are Creating an IT Army. Retrieved July 11, 2022, from Twitter website: https://twitter.com/fedorovmykhailo/status/1497642156076511233
GitHub. (2022). GitHub Docs. Retrieved July 11, 2022, from https://docs.github.com/en
Green, J. A. (2015). Introduction. In Cyber Warfare: A Multidisciplinary Analysis. New York: Routledge.
Gupta, B. B., & Dahiya, A. (2021). Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges, and Countermeasures. Boca Ration: CRC Press.
Hughes, T. P. (1994). Technological Momentum. In M. R. Smith & L. Marx (Eds.), Does Technology Drive History? The Dilemma of Technological Determinism. Cambridge: Massachusetts Institute of Technology Press.
IT Army of Ukraine. (2022a). Good Morning! We Return to Work with the Public Sector. Retrieved July 11, 2022, from Telegram website: https://t.me/s/itarmyofukraine2022
IT Army of Ukraine. (2022b). Death by 1000 Needles. Retrieved July 11, 2022, from Telegram website: https://telegra.ph/Death-by-1000-needles-03-17
IT Army of Ukraine. (2022c). Friends, it’s time to combine all our attacks on the information infrastructure of the “Needle†invader. Retrieved July 11, 2022, from Telegram website: https://t.me/s/db1000n
IT Army of Ukraine. (2022d). For the Second Day in a Row, Our Enemy Has a New Tactic to Counter our Attacks, Namely, Changing IP Addresses. Retrieved July 11, 2022, from Telegram website: https://t.me/s/itarmyofukraine2022
IT Army of Ukraine. (2022e). A Bit of Feedback on The State of Our Affairs. Retrieved July 11, 2022, from Telegram website: https://t.me/s/itarmyofukraine2022
IT Army of Ukraine. (2022f). Good Morning! Attacks on Delivery Services Have a Very Tangible Result. Retrieved July 11, 2022, from Telegram website: https://t.me/s/itarmyofukraine2022
IT Army of Ukraine. (2022g). Good Morning, IT Army! Thanks to Our Coordinated Actions. Retrieved July 11, 2022, from Telegram website: https://t.me/s/itarmyofukraine2022
IT Army of Ukraine. (2022h). Good Morning! It is Becoming Increasingly Difficult to Carry out Attacks. Retrieved July 11, 2022, from Telegram website: https://t.me/s/itarmyofukraine2022
IT Army of Ukraine. (2022i). A Bit of sSatistics. So Far, Only 40% of Our Targets Have Been Sent Out. Retrieved July 11, 2022, from Telegram website: https://t.me/s/itarmyofukraine2022
IT Army of Ukraine. (2022j). Information about Current Targets Status. Retrieved August 11, 2022, from https://itarmy.com.ua/check/?lang=en
IT Army of Ukraine. (2022k). Instructions for Setting up DDOS Attacks. Retrieved August 11, 2022, from https://itarmy.com.ua/instruction/?lang=en
Ivashko, B. (2022a). Death by 1000 Needles. Retrieved July 11, 2022, from https://github.com/Arriven/db1000n/blob/main/README.md
Ivashko, B. (2022b). v0.7.12. Retrieved July 11, 2022, from https://github.com/Arriven/db1000n/releases/tag/v0.7.12
Ivashko, B. (2022c). Contributors: Feb 20, 2022-Feb 26, 2022. Retrieved July 11, 2022, from https://github.com/Arriven/db1000n/graphs/contributors?from=2022-02-20&to=2022-02-26&type=c
Ivashko, B. (2022d). 43 Code Results in Arriven/db1000n. Retrieved July 11, 2022, from https://github.com/Arriven/db1000n/search?l=go
Ivashko, B. (2022e). Closed Issue. Retrieved July 11, 2022, from https://github.com/Arriven/db1000n/issues?q=is%3Aissue+is%3Aclosed
Ivashko, B. (2022f). Contributors: Feb 20, 2022 -Apr 23, 2022. Retrieved July 11, 2022, from https://github.com/Arriven/db1000n/graphs/contributors?from=2022-02-20&to=2022-04-05&type=c
Ivashko, B. (2022g). db1000n v0.8.29. Retrieved August 11, 2022, from https://github.com/arriven/db1000n/releases/tag/v0.9.17
Ivashko, B. (2022h). Issues. Retrieved August 11, 2022, from https://github.com/Arriven/db1000n/issues?q=is%3Aissue
Ivashko, B. (2022i). Open Issue. Retrieved August 11, 2022, from https://github.com/Arriven/db1000n/issues?q=is%3Aopen+is%3Aissue
Kello, L. (2017). The Virtual Weapon and International Order. In The Virtual Weapon and International Order. New Haven: Yale University Press. https://doi.org/10.2307/J.CTT1TRKJD1
Keromytis, A. D. (2017). Distributed Denial of Service (DDoS) Attack. In P. J. Springer (Ed.), Encyclopedia of Cyber Warfare (pp. 91–93). Santa Barbara: ABC-CLIO.
Libicki, M. C. (2021). Cyberspace in Peace and War. Annapolis: Naval Institute Press.
Lucas, G. (2016). Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare. In Ethics and Cyber Warfare. New York: Oxford University Press. https://doi.org/10.1093/ACPROF:OSO/9780190276522.001.0001
Martin, S. B. (2002). The Role of Biological Weapons in International Politics: The Real Military Revolution. Journal of Strategic Studies, 25(1), 63–98. https://doi.org/10.1080/714004040
Martin, Susan B. (2004). Realism and Weapons of Mass Destruction: A Consequentialist Analysis. In S. H. Hashmi & S. P. Lee (Eds.), Ethics and Weapons of Mass Destruction: Religious and Secular Perspectives. New York: Cambridge University Press.
Martin, Susan B. (2013). The Continuing Value of Nuclear Weapons: A Structural Realist Analysis. Contemporary Security Policy, 34(1), 174–194. https://doi.org/10.1080/13523260.2013.771042
Martin, Susan B. (2016). Norms, Military Utility, and the Use/Non-use of Weapons: The Case of Anti-plant and Irritant Agents in the Vietnam War. Journal of Strategic Studies, 39(3), 321–364. https://doi.org/10.1080/01402390.2016.1181058
Maschmeyer, L. (2021). The Subversive Trilemma: Why Cyber Operations. International Security, 46(2), 51–90. https://doi.org/10.1162/ISEC_A_00418
McGrath, M. (2020). Go Programming in Easy Steps: Learn Coding with Google’s Go Language. London: Easy Steps Limited.
Ministry of Economic Development of Russia. (2022, April 23). About. Retrieved July 11, 2022, from https://www.economy.gov.ru/material/structure/
Ministry of Education and Science of Russia. (2022). About. Retrieved July 11, 2022, from https://minobrnauki.gov.ru/about/governance/
Mori, S. (2018). US Defense Innovation and Artificial Intelligence. Asia-Pacific Review, 25(2), 16–44. https://doi.org/10.1080/13439006.2018.1545488
Mori, S. (2019). US Technological Competition with China: The Military, Industrial and Digital Network Dimensions. Asia-PasificReview, 26(1), 77–120. https://doi.org/10.1080/13439006.2019.1622871
Novosti, R. (2022). Ð’ работе ÑервиÑа СДÐК произошел глобальный Ñбой. Retrieved April 17, 2022, from https://ria.ru/20220325/sdek-1780037937.html
Office of the President of Ukraine. (2022). Decree of The President of Ukraine No. 56/2022. Retrieved July 12, 2022, from https://www.president.gov.ua/documents/562022-41377
Pashagolub. (2022). Failed to Fetch Config. Retrieved May 13, 2022, from https://github.com/Arriven/db1000n/issues/217
Pashakhanlou, A. H. (2016). Realism and Fear in International Relations: Morgenthau, Waltz and Mearsheimer Reconsidered. New York: Palgrave MacMillan.
Roland, A. (2016). War and Technology: A Very Short Introduction. New York: Oxford University Press.
Rooney, T., & Dooley, M. (2021). IP Address Management. Hoboken: John Wiley & Sons.
Sambaluk, N. M., & Spafford, E. H. (2020). Myths and Realities of Cyber Warfare: Conflict in the Digital Realm. Santa Barbara: ABC-CLIO.
Schneider, J. (2019). The Capability/Vulnerability Paradox and Military Revolutions: Implications for Computing, Cyber, and The Onset of War. Journal of Strategic Studies, 42(6), 841–863. https://doi.org/10.1080/01402390.2019.1627209
Shandler, R., Gross, M. L., & Canetti, D. (2021). A Fragile Public Preference for Cyber Strikes: Evidence from Survey Experiments in The United States, United Kingdom, and Israel. Journal Contemporary Security Policy, 42(2), 135. https://doi.org/10.1080/13523260.2020.1868836
Shehryar. (2022, August 9). Arriven db1000n. Retrieved August 12, 2022, from https://hanadigital.github.io/grev/?user=Arriven&repo=db1000n
Siroli, G. P. (2018). Considerations on the Cyber Domain as the New Worldwide Battlefield. Journal The International Spectator, 53(2), 111–123. https://doi.org/10.1080/03932729.2018.1453583
Sloan, E. C. (2017). Modern Military Strategy: An Introduction. New York: Routledge.
Thornton, R., & Miron, M. (2020). Towards the ‘Third Revolution in Military Affairs’: The Russian Military’s Use of AI-Enabled Cyber Warfare. The RUSI Journal, 165(3), 12–21. https://doi.org/10.1080/03071847.2020.1765514
Tidy, J. (, February). Russian Vigilante Hacker: “I Want to Help Beat Ukraine from My Computer.†Retrieved May 17, 2022, from https://www.bbc.com/news/technology-60528594
Waltz, K. N. (1979). Theory of International Politics. Philippines: Addison-Wesley Publishing Company.
Yin, R. K. (2017). Case Study Research and Applications: Design and Methods. London: SAGE Publications.
DOI: https://doi.org/10.33172/jp.v8i2.1683
INDEXED BY:
Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia
Email: jurnal.unhan@idu.ac.id
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.