{"id":5613,"date":"2022-09-29T08:31:06","date_gmt":"2022-09-29T12:31:06","guid":{"rendered":"https:\/\/carleton.ca\/csids\/?p=5613"},"modified":"2022-09-29T08:44:24","modified_gmt":"2022-09-29T12:44:24","slug":"is-ukraine-the-cyberwar-that-wasnt","status":"publish","type":"post","link":"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/","title":{"rendered":"Is Ukraine the Cyberwar That Wasn\u2019t?"},"content":{"rendered":"<h2>Is Ukraine the Cyberwar That Wasn\u2019t?<\/h2>\n<p data-block-key=\"zugii\">Although there has not been a \u201ccyber Pearl Harbor,\u201d there are many disruptive actions consistent with \u201cgrey zone\u201d tactics.<\/p>\n<div class=\"custom-text-list authors\"><a class=\"block-author\" href=\"https:\/\/www.cigionline.org\/people\/stephanie-carvin\/\">Stephanie Carvin<\/a><\/div>\n<div class=\"date\">September 22, 2022<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div id=\"attachment_5614\" class=\"wp-caption alignnone\" style=\"width: 1760px\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-5614 size-full\" src=\"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760.png\" alt=\"Ukrainian IT manager Andrew works at his computer amid the Russian invasion of Ukraine, in Odessa, April 6, 2022. (Ueslei Marcelino\/REUTERS)\" width=\"1760\" height=\"1173\" srcset=\"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760.png 1760w, https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760-240x160.png 240w, https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760-400x267.png 400w, https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760-160x107.png 160w, https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760-768x512.png 768w, https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760-1536x1024.png 1536w, https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h.width-1760-360x240.png 360w\" sizes=\"(max-width: 1760px) 100vw, 1760px\" \/><p class=\"wp-caption-text\">Ukrainian IT manager Andrew works at his computer amid the Russian invasion of Ukraine, in Odessa, April 6, 2022. (Ueslei Marcelino\/REUTERS)<\/p><\/div>\n<p><\/p>\n<p>Is the Russian-Ukraine conflict \u201c<a href=\"https:\/\/www.politico.com\/news\/magazine\/2022\/07\/14\/russia-cyberattacks-ukraine-cybersecurity-00045486\" target=\"_blank\" rel=\"noopener noreferrer\">the first cyber world war<\/a>\u201d? Researchers, scholars and government officials appear divided on the question. Nadiya Kostyuk and Erik Gartzke argue that given the absence of a (known) major or crippling attack, \u201c<a href=\"https:\/\/tnsr.org\/2022\/06\/why-cyber-dogs-have-yet-to-bark-loudly-in-russias-invasion-of-ukraine\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber dogs have yet to bark.<\/a>\u201d Others, such as Thomas Rid, contend that cyber has been and <a href=\"https:\/\/www.nytimes.com\/2022\/03\/18\/opinion\/cyberwar-ukraine-russia.html\" target=\"_blank\" rel=\"noopener noreferrer\">continues to be a major part of the conflict<\/a>, but that covert operations remain cloaked in secrecy, away from public view.<\/p>\n<p>With warnings issued by the <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-011a\" target=\"_blank\" rel=\"noopener noreferrer\">American<\/a>, <a href=\"https:\/\/www.ncsc.gov.uk\/news\/ncsc-us-partners-promote-understanding-mitigation-russian-state-sponsored-cyber-threats\" target=\"_blank\" rel=\"noopener noreferrer\">British<\/a> and <a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/cyber-threat-bulletin-cyber-centre-reminds-canadian-critical-infrastructure-operators\" target=\"_blank\" rel=\"noopener noreferrer\">Canadian<\/a> governments of threats to critical infrastructure (from either a direct cyberattack or spillover from <a href=\"https:\/\/www.cse-cst.gc.ca\/en\/information-and-resources\/news\/cse-statement-notpetya-malware\" target=\"_blank\" rel=\"noopener noreferrer\">Russia\u2019s indiscriminate use of its cyber weapons<\/a>) in the lead-up to the conflict, as well as <a href=\"https:\/\/www.cigionline.org\/articles\/as-putin-threatens-ukraine-cyber-is-the-tip-of-the-spear\/\" target=\"_blank\" rel=\"noopener noreferrer\">Russia\u2019s history of using malicious cyber activity against Ukraine<\/a>, the absence of visible cyber activity raises important questions about what \u201ccyberwar\u201d actually is, and how we can know if one is taking place.<\/p>\n<p>Despite the apparent disagreement over whether there is a cyberwar in Ukraine or not, a deeper dive into recent commentary on the topic reveals that both sides of the debate are actually arguing very similar things.<\/p>\n<p>For example, no one is denying that cyber is playing an important role in the conflict. In April, <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4Vwwd\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft identified<\/a> several different strains of malware being used, and reported that known Russian cyberthreat actors were positioning themselves in Ukraine as early as March 2021. And coinciding with their invasion on February 24 this year, <a href=\"https:\/\/techcrunch.com\/2022\/05\/10\/russia-viasat-cyberattack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Russia targeted Viasat<\/a>, a communications company, disrupting broadband in Ukraine, with spillover effects in other European countries.<\/p>\n<p>However, given that <a href=\"https:\/\/www.rusi.org\/explore-our-research\/publications\/special-resources\/operation-z-death-throes-imperial-delusion\" target=\"_blank\" rel=\"noopener noreferrer\">Russia has not performed well militarily<\/a> in its invasion of Ukraine, it is not surprising that its cyber performance is also underwhelming \u2014 or, at least, lacking in the frequency, intensity and effectiveness that had been predicted. Successful cyber operations are intricate, expensive, and hard to plan and execute. If Russian planning was poor overall, it is likely it extends to cyber elements as well.<\/p>\n<p>Additionally, given its own expectations that it would quickly conquer Ukraine, Russia may not have planned to use cyber in its campaign. As many authors point out, when it comes to capturing and holding territory, <a href=\"https:\/\/warontherocks.com\/2022\/02\/there-is-no-cyber-shock-and-awe-plausible-threats-in-the-ukrainian-conflict\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber is not as effective as bombs<\/a>: only a few military objectives can be achieved with cyber, which is why the conflict in Ukraine is driven more by steel than silicon. It makes sense for militaries to focus on the most efficient and effective weapons.<\/p>\n<blockquote><p>Where there are differences of opinion, they surround the analysis of unknowns, such as the extent to which Russia is attempting to coordinate its military and cyber operations.<\/p><\/blockquote>\n<p>Moreover, although there has not been a \u201ccyber Pearl Harbor,\u201d there are many disruptive <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4093044\" target=\"_blank\" rel=\"noopener noreferrer\">cyber actions consistent with \u201cgrey zone\u201d tactics<\/a> \u2014 especially espionage, information operations and low-level attacks. It is possible, although by no means certain, that for Russia to achieve its aims in these spaces, it needs to maintain Ukraine\u2019s infrastructure rather than take it out.<\/p>\n<p>Interestingly, most arguments <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4093044\" target=\"_blank\" rel=\"noopener noreferrer\">also downplay the role of deterrence<\/a>, as traditionally conceived, when it comes to explaining Russia\u2019s behaviour. Although Russia may be looking to avoid direct confrontation with North Atlantic Treaty Organization (NATO) countries, <a href=\"https:\/\/www.cyberscoop.com\/russia-ukraine-cyberwar-nato-geneva-microsoft\/\" target=\"_blank\" rel=\"noopener noreferrer\">it is not at all clear that cyber would set the threshold<\/a> whereby NATO would actually intervene in the conflict. Many writers acknowledge that Ukraine\u2019s cyber-defensive strengths, especially after almost a decade of Russian cyberattacks on its infrastructure, give it considerable deterrence-by-denial capability. However, given the complexity of cyber defence, it is unlikely that this capability can alone explain a lack of major attacks.<\/p>\n<p>Where there are differences of opinion, they surround the analysis of unknowns, such as the extent to which Russia is attempting to coordinate its military and cyber operations. For example, while some accounts emphasize the use of cyber as a tool <a href=\"https:\/\/tnsr.org\/2022\/06\/why-cyber-dogs-have-yet-to-bark-loudly-in-russias-invasion-of-ukraine\/\" target=\"_blank\" rel=\"noopener noreferrer\">used mostly by states for informational objectives rather than \u201cwar,\u201d<\/a> other reports suggest <a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/cyber-threat-bulletin-cyber-threat-activity-related-russian-invasion-ukraine\" target=\"_blank\" rel=\"noopener noreferrer\">that there is a link between the use of cyber tools and Russia\u2019s kinetic operations<\/a>.<\/p>\n<p>Ultimately, one\u2019s interpretation of the role of cyber in this conflict likely depends on a prior understanding of what a cyberwar might look like. Those expecting debilitating attacks and the destruction of infrastructure as key signifiers will view their absence as a lack of cyberwar. Those who see cyber as a tool, particularly as a covert one, are more likely to argue that cyberwar is indeed taking place.<\/p>\n<p>But perhaps the best takeaway from this discussion is that it is important not to overgeneralize the role of cyber when it comes to armed conflict. While cyber weapons may have played a limited or restrained role in Ukraine, they may make sense for and be employed in future conflicts. As with any military weapon, the use of cyber will depend more on what objectives or outcomes states are trying to achieve rather than be an automatic given. A rationale for using more devastating cyber weapons may emerge, for example, where states may wish to strike from a distance, rather than occupy territory.<\/p>\n<p>In other words, while the use of cyber in Ukraine does not provide a definitive model of cyberwar, it helps to show how the goals, capabilities and interests of states dictate how such tools will be used in future conflicts.<\/p>\n<p>This piece is co-published with <a href=\"https:\/\/www.newsweek.com\/what-do-we-really-know-about-russias-cyberwar-against-ukraine-opinion-1745063\" target=\"_blank\" rel=\"noopener noreferrer\">Newsweek<\/a>.<\/p>\n<p><em>The opinions expressed in this article\/multimedia are those of the author(s) and do not necessarily reflect the views of CIGI or its Board of Directors.<\/em><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>ABOUT THE AUTHOR<\/strong><\/span><\/p>\n<p><em>Stephanie Carvin<\/em><br \/>\n<em>Stephanie Carvin is an associate professor of international relations at the Norman Paterson School of International Affairs, Carleton University. From 2012 to 2015, she was a national security analyst with the Government of Canada.<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Is Ukraine the Cyberwar That Wasn\u2019t? Although there has not been a \u201ccyber Pearl Harbor,\u201d there are many disruptive actions consistent with \u201cgrey zone\u201d tactics. Stephanie Carvin September 22, 2022 Is the Russian-Ukraine conflict \u201cthe first cyber world war\u201d? Researchers, scholars and government officials appear divided on the question. Nadiya Kostyuk and Erik Gartzke argue [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Ukraine the Cyberwar That Wasn\u2019t? - Centre for Security, Intelligence and Defence Studies<\/title>\n<meta name=\"description\" content=\"Is Ukraine the Cyberwar That Wasn\u2019t? Although there has not been a \u201ccyber Pearl Harbor,\u201d there are many disruptive actions consistent with \u201cgrey zone\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"JEFFERYPOISSANT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/\",\"url\":\"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/\",\"name\":\"Is Ukraine the Cyberwar That Wasn\u2019t? - Centre for Security, Intelligence and Defence Studies\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/csids\/#website\"},\"datePublished\":\"2022-09-29T12:31:06+00:00\",\"dateModified\":\"2022-09-29T12:44:24+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/csids\/#\/schema\/person\/5b3aa2c4d7af5a1f3d0ef119730939a0\"},\"description\":\"Is Ukraine the Cyberwar That Wasn\u2019t? Although there has not been a \u201ccyber Pearl Harbor,\u201d there are many disruptive actions consistent with \u201cgrey zone\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/csids\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/carleton.ca\/csids\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is Ukraine the Cyberwar That Wasn\u2019t?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/csids\/#website\",\"url\":\"https:\/\/carleton.ca\/csids\/\",\"name\":\"Centre for Security, Intelligence and Defence Studies\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/csids\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/csids\/#\/schema\/person\/5b3aa2c4d7af5a1f3d0ef119730939a0\",\"name\":\"JEFFERYPOISSANT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/csids\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43555b7561c58ca9e8be643e461f1761?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43555b7561c58ca9e8be643e461f1761?s=96&d=mm&r=g\",\"caption\":\"JEFFERYPOISSANT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Ukraine the Cyberwar That Wasn\u2019t? - Centre for Security, Intelligence and Defence Studies","description":"Is Ukraine the Cyberwar That Wasn\u2019t? Although there has not been a \u201ccyber Pearl Harbor,\u201d there are many disruptive actions consistent with \u201cgrey zone\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/","twitter_misc":{"Written by":"JEFFERYPOISSANT","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/","url":"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/","name":"Is Ukraine the Cyberwar That Wasn\u2019t? - Centre for Security, Intelligence and Defence Studies","isPartOf":{"@id":"https:\/\/carleton.ca\/csids\/#website"},"datePublished":"2022-09-29T12:31:06+00:00","dateModified":"2022-09-29T12:44:24+00:00","author":{"@id":"https:\/\/carleton.ca\/csids\/#\/schema\/person\/5b3aa2c4d7af5a1f3d0ef119730939a0"},"description":"Is Ukraine the Cyberwar That Wasn\u2019t? Although there has not been a \u201ccyber Pearl Harbor,\u201d there are many disruptive actions consistent with \u201cgrey zone\u201d","breadcrumb":{"@id":"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/csids\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/carleton.ca\/csids\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Is Ukraine the Cyberwar That Wasn\u2019t?"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/csids\/#website","url":"https:\/\/carleton.ca\/csids\/","name":"Centre for Security, Intelligence and Defence Studies","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/csids\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/csids\/#\/schema\/person\/5b3aa2c4d7af5a1f3d0ef119730939a0","name":"JEFFERYPOISSANT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/csids\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43555b7561c58ca9e8be643e461f1761?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43555b7561c58ca9e8be643e461f1761?s=96&d=mm&r=g","caption":"JEFFERYPOISSANT"}}]}},"acf":{"Post Thumbnail Icon":"","Post Thumbnail":{"ID":5625,"id":5625,"title":"cyberukraine_s09zx9h_800x600px","filename":"cyberukraine_s09zx9h_800x600px.jpg","filesize":128059,"url":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px.jpg","link":"https:\/\/carleton.ca\/csids\/2022\/is-ukraine-the-cyberwar-that-wasnt\/cyberukraine_s09zx9h_800x600px\/","alt":"","author":"23","description":"","caption":"","name":"cyberukraine_s09zx9h_800x600px","status":"inherit","uploaded_to":5613,"date":"2022-09-29 12:43:39","modified":"2022-09-29 12:43:39","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/carleton.ca\/csids\/wp\/wp-includes\/images\/media\/default.png","width":800,"height":600,"sizes":{"thumbnail":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-160x120.jpg","thumbnail-width":160,"thumbnail-height":120,"medium":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-240x180.jpg","medium-width":240,"medium-height":180,"medium_large":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-768x576.jpg","medium_large-width":768,"medium_large-height":576,"large":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-400x300.jpg","large-width":400,"large-height":300,"gallery-thumb":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-300x230.jpg","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px.jpg","1536x1536-width":800,"1536x1536-height":600,"2048x2048":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px.jpg","2048x2048-width":800,"2048x2048-height":600,"banner":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px.jpg","banner-width":800,"banner-height":600,"people":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-200x200.jpg","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-300x230.jpg","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px.jpg","rotator-image-width":800,"rotator-image-height":600,"video-thumb":"https:\/\/carleton.ca\/csids\/wp-content\/uploads\/cyberukraine_s09zx9h_800x600px-360x270.jpg","video-thumb-width":360,"video-thumb-height":270}}},"_links":{"self":[{"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/posts\/5613"}],"collection":[{"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/comments?post=5613"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/posts\/5613\/revisions"}],"predecessor-version":[{"id":5626,"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/posts\/5613\/revisions\/5626"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/media?parent=5613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/categories?post=5613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/csids\/wp-json\/wp\/v2\/tags?post=5613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}