The following report was written by University of Vermont environmental studies major and undergraduate senior Kate Bossert, who is interning with UKR-TAZ as a researcher on Ukraine-related environmental and technology issues.
The pros and cons of new technologies have been debated for as long as such technologies have existed. Information technologies, with Artificial Intelligence or “generative AI” being the latest, are no exception. In the context of Russia’s full-scale invasion of Ukraine, AI-based technologies have emerged as a new frontier for violence, psychological torture, misinformation, and the destruction of human life. This is taking place within what some have called “the twenty-first century’s ‘first cyber world war’.”
As social media have become a key source of news, the ease with which it spreads misinformation – with the “false but interesting” story often trumping the “true but boring” story – has created “serious consequences for what counts as journalism and what gets conflated with the truth.” Determining the real from the fake has become more challenging with AI, as users are able to manipulate audio clips, photos, and videos to create appearances that bear no relationship to reality. As public health experts have warned, “AI-fueled misinformation and disinformation serves to polarize society and create a harmful online environment.” AI generated misinformation has been influencing elections (e.g., see here) and encouraging a rise in climate change denial, with users releasing content designed to outrage and polarize viewers, in addition to making money for their purveyors.
Russian cyber attackers operate on the same principles, with the additional goal of dampening Western governments’ support for Ukraine. Dina Temple-Raston’s Click Here podcast has covered this repeatedly (e.g., here and here), as have Microsoft Threat Intelligence reports on Russian threat actors and Russian influence and cyber operations, among other sources. Russian cyber actors have stolen data from Ukrainian firms that track crop yields, used techniques such as “password spraying” to bypass login into Ukraine accounts, broken into Ukrainian private signal chats, successfully attacked Ukrainian service providers, and obtained access to the location of Ukrainian military units through digital means.
Read the rest of this entry »