Placeholder Image

字幕列表 影片播放

  • There is an invisible layer to the war in Ukraine.

  • You can't see it or touch it, but it's

  • vital to every aspect of decision making in warfare.

  • This invisible layer is the radio noise.

  • And hidden in the radio noise are signals.

  • We're going to look at three aspects of radio

  • in Ukraine, the interception of communications

  • between Russian soldiers--

  • --how broadcasters are using radio

  • to combat censorship online, and the mysterious silence

  • of a number station known as the Russian Lady.

  • Why would a 21st century Russian army

  • send so many unencrypted radio signals

  • on the battlefields of Ukraine?

  • And how can we confirm their legitimacy?

  • This, as far as we can tell, is a recording

  • of a Russian soldier in Ukraine, but the people who captured it

  • were far away and weren't using radio equipment directly.

  • A software-defined radio is a computer with a radio receiver

  • and an antenna attached.

  • It can pick up radio transmissions

  • across a wide range of frequencies at the same time.

  • The cheapest ones are about 30 pounds.

  • So you can watch a waterfall of radio signals

  • from across the spectrum and spot

  • one you're interested in, then choose exactly how you want

  • to decode the signal just with the click of a button,

  • no extra equipment required.

  • Connect it to the internet and, suddenly,

  • 100s of people from around the world

  • can stream any radio signal your antenna can pick up.

  • And many people are very interested in monitoring them.

  • Couple those web servers with a chat room app like Discord,

  • and you can create an open-source intelligence

  • team of volunteers, which is what Boyan Malashev did.

  • My name is Boyan Malashev.

  • Well, Ukrainian Radio Watchers is a really brilliant community

  • that it's made by a lot of people

  • who give a lot of their time and their efforts

  • in trying to listen the Russian communications.

  • When the war could get so intensive,

  • many people actually started to join.

  • We were shared in platforms like Reddit and Twitter,

  • so many people started to understand

  • about us, started to join because most of them

  • wanted to get translations about what is happening.

  • And we had pretty active translators doing this.

  • I think in the server we have 100 translators.

  • Sometimes, I listen, and sometimes I record.

  • But the main thing I do in the server

  • and how I help the server is by developing the Discord server

  • and making the website.

  • The recordings and the main function of the community,

  • it's made by the people who are in it.

  • I do not know anything about radios and communications,

  • but it's important because we are dealing with war crimes;

  • we are dealing with deaths; we are

  • dealing with trying to help people who

  • are actually in war right now.

  • We heard how commanders and officers are arranging

  • airstrikes with locations.

  • We are trying to find the call signs of them.

  • The question of whether we can trust the recordings

  • is a bit of an open one.

  • This is obviously still a conflict, and what we do know

  • is that Ukrainians themselves have been exceptionally good

  • in terms of their information warfare,

  • in terms of their communications about how successful they've

  • been versus the Russians.

  • That said, there, I think, is very little doubt

  • that some of these communications are genuine.

  • Some of the content would be exceptionally hard to fake.

  • And when you put together all of the other material

  • that we've seen, for example, pictures

  • on social media of captured Russian troops,

  • pictures of the radio equipment they were using, all of that

  • together paints a picture that would be very hard to fake.

  • When you hear the conversations, you can feel it first,

  • and then you have-- we have the experts who can check

  • if this could be manipulated or not.

  • And as we're monitoring a whole day of conversations,

  • we can know that what is happening,

  • it's not fake because sometimes something is happening

  • and-- while they're arranging attack.

  • And in the next seconds, attack actually happens.

  • We could see that in the news.

  • We could see that the airstrikes actually happened.

  • So yes, we have some evidence that the conversations

  • we monitored are authenticated.

  • Both sides are fighting quite an aggressive information

  • campaign, so you do have to be wary of that within analysis.

  • Do the things that we're hearing in these transmissions marry up

  • with what we're seeing on the ground?

  • Do they compare well with what other sources are reporting?

  • So if we have seen that there are Russian soldiers carrying

  • unencrypted radios or notionally unencrypted radios, and now

  • we are hearing unencrypted transmissions

  • that have been intercepted, that all points

  • towards that information being something

  • that we can use to form an assessment

  • and begin to construct analysis.

  • The image of this pretty invincible, very tough

  • Russian war machine has taken a huge knock.

  • I mean, even Western intelligence analysts

  • expected Russia to win pretty easily.

  • They thought that Russia had overwhelming military might,

  • far superior technology, and battlefield experience

  • in places like Syria and, before that, in wars in Georgia,

  • and so on.

  • As it turns out, the Russian military effort

  • has been much more chaotic than anybody anticipated.

  • And I think that is a big blow to the image

  • of the Russian military and indeed to the image of Russia

  • that Putin has so carefully sculpted because I think

  • a lot of what Putin is trying to do

  • is to say, take us seriously as a great power.

  • He couldn't really do that on an economic level,

  • but Russia could always point to its enormous military might.

  • And now, even that looks slightly less credible

  • than it did before this conflict.

  • There is another group listening to Russian troops in Ukraine.

  • They call themselves ShadowBreak and were originally

  • a VC-funded security company focused

  • on mapping and other intelligence services.

  • Samuel Cardillo is their founder and head of technology.

  • We're ShadowBreak.

  • It's a company created, like, three years ago, founded by VC.

  • We're mainly a geospatial intelligence company.

  • Intelligence is our core business.

  • The thing here is that everything

  • we're doing concerning Ukraine has being totally free.

  • The company has unlocked $500,000 of personal money

  • to help Ukraine.

  • We started a logistic supply run and all the things

  • to serve people within Ukraine, and we're

  • trying to help because I think it's our duty.

  • In terms of military backgrounds,

  • well, I've been serving in the army for three

  • years in the intelligence--

  • in the Israeli Army.

  • I've been doing intelligence for a very long time.

  • I have a family background in intelligence.

  • There's been a shift in the last few years,

  • certainly since the Syrian civil war,

  • towards a real prominence of open-source intelligence,

  • open-source reporting.

  • And of course, the great example of this

  • is Bellingcat, which began reporting on munitions that

  • were being photographed by Syrians in the very early

  • stages of the Syrian conflict.

  • Ever since then, we've seen this proliferation

  • of open-source intelligence outfits, websites

  • piecing together information about conflicts

  • and making it public sometimes for commercial gain,

  • sometimes simply because it's viewed

  • as a sort of public good.

  • And a lot of these organisations are funded by donations,

  • by charities by government grants that kind of thing.

  • There is an open question about all of this, this new world,

  • this frontier, about where the money does always come from

  • and then whose interests might lie behind some of these

  • organisations.

  • Russia, in particular, has repeatedly and baselessly,

  • I should add, slandered organisations like Bellingcat

  • and accused them of being stooges for Western

  • intelligence agencies.

  • Ultimately, a lot of these organisations you have to judge

  • on the content that they are putting out there and the stuff

  • that they are making available.

  • And I guess that the fundamental factor

  • is that this is publicly available information.

  • It is open-source intelligence.

  • And the better of these organisations make clear what

  • their workings are.

  • They show why they have arrived at certain assumptions,

  • and then, sort of in a kind of Wikipedia format,

  • invite others out there to challenge their conclusions.

  • The fact that we're kind of expanding within the signal

  • intelligence is a little bit weird.

  • We had to kind of understand a lot of new things and recruit

  • translators, and it's completely new for the company.

  • Right now, most of the people are

  • working with us are volunteers.

  • We have few people who are on full-time salary

  • but very few at this moment for this operation.

  • There's a big question about where the aerials

  • and where the SDR systems themselves

  • are located because the nearer they are to the battlefield,

  • the clearer the signals they can intercept.

  • So there is public web SDR which are located outside of Ukraine.

  • And then, we have secured logistical supply

  • at this point.

  • And we're doing things to have web SDR within Ukraine which

  • gives us access to UHF frequencies, which

  • let us listen as well to radio handles,

  • which are shorter waves basically, like nearer troops.

  • Both ShadowBreak and Ukrainian Radio Watchers

  • say that there have been cyber attacks against many

  • of the servers they use for listening.

  • I don't know who is behind that, but we've

  • seen clearly cyber attacks against some web SDR.

  • They get hacked and stuff like that.

  • So we could assume it's like either trolls or people who

  • don't want all the people to listen to those frequencies.

  • So we don't know.

  • But yeah, we made our own, and we're still

  • working on making our own kind of private web SDR

  • things, which is also part of the money we've unlocked.

  • I think many of them are under DDoS attack, which

  • is attacking of hackers so they can stop their services.

  • Maybe some of them were bombed and--

  • for example, the antenna is broken,

  • or the whole equipment is dead.

  • The number of the web SDRs in Russia and Ukraine are going

  • down, which is a big problem for us because without the web SDRs

  • we cannot do anything.

  • Boyan also says he's planning to go into Ukraine in order

  • to set up an SDR.

  • We are thinking to do our own web SDR.

  • I got some connections in my country with people who are

  • actually travelling to Ukraine to bring supplies.

  • So we can-- some day in the next two weeks,

  • we are setting up a web based here in Bulgaria,

  • and we are setting up SDR in Ukraine.

  • Setting up a system like this was risky even

  • before the current invasion.

  • Last year, Stanislav Stetsenko, a resident of Crimea,

  • was arrested by the Russian Federal Security Service

  • under suspicion of being a Ukrainian informant

  • and was facing up to 25 years in prison if found guilty.

  • So we know how people are tuning into these transmissions,

  • but it still leaves the question, if they know

  • they can be intercepted, why are the Russians

  • using unencrypted radios in a war zone?

  • The amount of communications we're hearing in clear

  • seems to indicate that Russian military may

  • have a problem with crypto and key distribution

  • as secure communications require some form of encryption.

  • And how that encryption typically

  • works is a series of keys are provided to anybody

  • on the network, and the traffic can only

  • be encrypted or decrypted using those keys.

  • And that requires a level of management in a military

  • to ensure the keys change daily, for instance--

  • they may change hourly--

  • and that they're distributed to everybody who needs them.

  • And then, everybody who is using those keys

  • has the correct encryption and decryption equipment

  • attached to their radios or embedded

  • in their radios and software.

  • That indicates that the modernization that the Russian

  • ministry of defence has been parading and promoting has

  • potentially been less successful than they were actually making

  • out.

  • It indicates a potential vulnerability in the way

  • that the Russians are actually conducting war.

  • Some of the things that we've identified

  • are the Russians using civilian radios that you can buy on--

  • I mean, you can buy them on eBay.

  • They're not that hard to find.

  • They're not that expensive.

  • These would use sections of the electromagnetic spectrum that

  • are open access to everybody.

  • We've spent a large portion of our professional lives

  • trying to understand what is happening

  • within the Russian military, particularly

  • in light of the reforms that were launch 10 years ago,

  • the "new look" Russian military as it was termed.

  • I think our analysis of the data herein

  • has always been the Russians have kind of got

  • their mojo if you like and after years of malaise

  • had been upgrading their military, taking the steps they

  • need to make this military and an army that

  • is fit for the kind of wars it's going to be fighting

  • in the 21st century.

  • And when suddenly you see that that military is

  • doing something as basic as transmitting

  • clear traffic on HF, I think that brings

  • into a wider question.

  • It's a bit like, well, if they're not

  • doing that correctly, well, what else is going wrong?

  • And this, I think, provides other clues

  • into perhaps the health of the Russian army,

  • writ large, in this conflict so far.

  • Is Putin aware of what's happening on the ground?

  • One suspects that his intelligence is probably

  • pretty limited.

  • He has a very tight circle of advisors,

  • and he is an autocrat.

  • He's a fairly scary guy.

  • And so the extent to which people

  • will want to bring him unwelcome messages

  • that the war is not going that well may be limited

  • because the commanding officers of the armed forces

  • may feel that that reflects badly on him.

  • And that could well be one of Russia's problems

  • as they attempt to adapt to what's going on.

  • In military communications, there's an awful lot of traffic

  • that needs to be carried.

  • If you think of it in terms of your internet at home,

  • your internet is carrying a lot of data, full-motion video.

  • It can carry voice, things like that.

  • And the military needs its radio communications

  • to do all of those things but spread out over a wide area.

  • So typically, they would have--

  • for a certain size formation, they

  • would have what we'd call a trunk

  • network, which is designed to carry most of that information.

  • Think of it as like the trunk of a tree, and then

  • you kind of have the branches going off it

  • into tactical communications and things like that.

  • That's what we would expect to see because that provides

  • the frontline soldier in his or her tank with the ability

  • to reach back to their officers, and their officer's officers,

  • and their officer's officer's officers all the way up

  • to Moscow if needs be.

  • Most of those communications would be encrypted, but instead

  • what we're seeing is mounting evidence

  • that these networks haven't been put in place.

  • They haven't been built.

  • So users on Discord servers like Ukrainian Radio Watchers

  • and ShadowBreak are identifying unusual signals,

  • then they tell other users which frequencies to listen on,

  • work out how the signals should be decoded.

  • They record them.

  • They translate them and timestamp the audio

  • so that they can be published to a wider audience.

  • There's another reason why so many Russian users

  • are using Discord.

  • Some of the Russians also care to get the news.

  • What is the opinion about the other people for them?

  • What is happening about Russia in the other countries' news?

  • Discord isn't blocked in Russia unlike Instagram, Facebook,

  • and the BBC website.

  • To circumvent blocks like these, the BBC

  • has resuscitated an old radio format that, up until recently,

  • it had been rapidly shutting down around the world.

  • Shortwave.

  • It's certainly the case that BBC's shortwave radio, which

  • incidentally is where I started my career during the Cold War,

  • was a big player back in those eras.

  • But that was the pre-internet era.

  • If they're restarting these services now,

  • it could reflect a couple of things.

  • One could be a slight sort of Cold War instinct

  • that this was something that was terribly

  • important in the last great struggle with Moscow.

  • But also, that actually the Russians are really

  • tightening control of some of new media,

  • that, for example, messaging apps, or YouTube,

  • or Facebook, things that had a lot of impact in Russia

  • may now be much more restricted.

  • So you may have to go back to some of the old, tried, tested,

  • and we might have thought rather historic means

  • of communication-- may regain a new relevance.

  • This all links back to this Russian perception

  • of Western information warfare, and the perception

  • that the West is able to control the narrative

  • and influence a population externally.

  • So by the BBC extending its shortwave radio,

  • it's possible that some Russian citizens perhaps

  • will still be able to hear what's going on in the West.

  • You know, everything old is new again.

  • Some of the oldest, most mysterious radio signals

  • date back to World War I, and these kinds of signals

  • are still transmitting now.

  • So number stations are one of the great mysteries

  • of the radio portion of the electromagnetic spectrum.

  • They've been around for a long time.

  • They're very mysterious, almost spooky things to listen to.

  • What you typically get with a numbers station is you get

  • a series of digits that are repeated in an automated voice,

  • not unlike the kind of telephone automation you hear when

  • you're calling a call centre or something like that.

  • And it will be a series of seemingly random numbers,

  • and nobody really knows what they're for.

  • But there's several number stations

  • all over the world transmitting out of all kinds of places.

  • And one theory is that they are a means of communicating

  • covertly with people, perhaps spies for instance, deployed

  • beyond the borders of a particular country.

  • And the theory as to how it would work

  • is that the series of numbers--

  • they're usually in sequences of five different numbers.

  • Each refer to a particular thing.

  • There are, of course, Discord servers dedicated

  • to following number stations.

  • One number station in particular began

  • acting strangely just as the war in Ukraine broke out.

  • SO6s, known as the Russian Lady, usually transmits null messages

  • during the last few days of every month.

  • Usually, it sends out numbers according

  • to a fixed format, short messages of less than 10 groups

  • of five digits at a time.

  • Suddenly, just before it went off air,

  • it sent out a message longer than 192 unpaired groups,

  • which is very unusual.

  • It has been silent ever since.

  • Well, number stations are, in many senses,

  • is a hang up from the Cold War.

  • But then again, arguably this entire conflict is a hang up

  • from the Cold War, so it's not necessarily

  • so easy to write them off as totally insignificant.

  • But ultimately, there are various ways

  • that intelligence agencies communicate with many

  • of their deep cover operatives.

  • Number stations historically were a method

  • used by the KGB in the Cold War and, of course,

  • by other powers.

  • And on some level, they continue to presumably

  • have utility probably as a backup means of communication.

  • Is this a hang up from the Cold War?

  • Look, there are elements of it in the sense

  • that I think Putin is attempting to reverse some of the losses

  • that he felt that the Soviet Union, now Russia,

  • experienced after the end of the cold war,

  • in particular, territorial losses and losses

  • of a sphere of influence.

  • So I suppose you could see it as a kind of effort

  • to reverse some of the losses that Moscow

  • felt it experienced after 1989.

  • And Putin, after all, has referred

  • to the collapse of the Soviet Union

  • as one of the greatest geopolitical catastrophes

  • of the 20th century.

  • And I feel he feels that he's trying to correct

  • some of those wrongs.

  • There's a famous quote by Field Marshal Montgomery

  • made during the second World War about air power--

  • "If we lose the war in the air, we lose the war,

  • and lose it quickly."

  • Does this now apply to air waves, radio signals as well?

  • I think that's still the case for the air power,

  • but I think it's now also the case

  • for the electromagnetic spectrum.

  • I think we're dealing with a domain we cannot see.

  • We cannot sense the electromagnetic spectrum

  • as humans.

  • We have no means of being able to do that.

  • But just because we can't sense it,

  • it doesn't diminish its importance.

  • Control of the electromagnetic spectrum

  • may not lead to victory or defeat in its own right,

  • but it will certainly be a significant contribution

  • to whichever side prevails in this conflict.

There is an invisible layer to the war in Ukraine.

字幕與單字

單字即點即查 點擊單字可以查詢單字解釋

B1 中級 英國腔

烏克蘭的電波之戰(Ukraine's battle of the airwaves | FT)

  • 8 1
    s1byl 發佈於 2022 年 04 月 09 日
影片單字