Late last year, the United States and Britain sent experts to Ukraine to help its government prepare for the spectacular cyberattack that some believed would be Vladimir Putin's opening salvo during an invasion. Ukraine's electricity grid was said to be a particularly attractive target for Russian hackers, who managed to shut it down for brief periods twice before.
The next attack, many worried, could be altogether more devastating. Under Putin, Russia has adopted a form of fighting that marries conventional military force with unconventional, often digital operations, like online political propaganda and cyberattacks on infrastructure. For years, security officials in the West have worried about Russia's hacking capabilities; Western military planners routinely hold elaborate war games to prepare for a damaging surprise attack by Russia (or, other times, China) — what the former defense secretary Leon Panetta once called a coming "cyber-Pearl Harbor."
"I don't think there's a slightest doubt that if there is an invasion or other kind of incursion into Ukraine, it will start with cyber," Angus King, the independent senator from Maine, told the New York Times in December.
But something cyberunexpected happened on the way to cyberarmageddon: Russia invaded Ukraine the old-fashioned way, with tanks and guns and missiles and airplanes, and there was little evidence that it accomplished anything meaningful with weapons of code. There were reports of an uptick in attacks on Ukrainian websites in the months leading up to war, but their impact has been minimal. Two weeks into the fighting, Ukraine's electricity grid, its communications systems and other infrastructure are still largely up. Its president is streaming from his government office.
"Despite being one of the world's foremost offensive cyberpowers, the Russian invasion of Ukraine has, thus far, been utterly conventional in its brutality," Ciaran Martin, a former cybersecurity official for the British government, wrote last week in Lawfare.
What accounts for Russia's apparent cyberrestraint? Nobody quite knows. Russia could be holding back its best cyberweapons for a more critical time in the war. It could also just be incompetent. Maybe its hackers were no match for Ukraine's cyberdefenses, which the country has been beefing up for years.
But the relative quiet on the Ukrainian cyberfront has some cyberexperts suggesting something unusual: That perhaps the national security establishment's picture of digital attacks as a unique and revolutionary new front in warfare has been off the mark. That's not to say that cyberattacks aren't a serious threat; they are costly and could conceivably cause great chaos and even bodily harm. As offensive weapons of war, though, they may have been oversold. Cyberweapons face severe limitations, and there is a growing body of research suggesting that they frequently fail to achieve battlefield goals.
"It's not magic," Brandon Valeriano, a senior fellow at the Cato Institute who studies cyberweaponry, told me. "It's not transformational. It's not going to change the character of war."