{"id":10487,"date":"2025-02-13T14:28:14","date_gmt":"2025-02-13T12:28:14","guid":{"rendered":"https:\/\/trialoog.taltech.ee\/?p=10487"},"modified":"2025-02-13T14:28:14","modified_gmt":"2025-02-13T12:28:14","slug":"hybrid-warfare-the-invisible-threat-to-estonia-and-beyond","status":"publish","type":"post","link":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/","title":{"rendered":"Hybrid warfare: the invisible threat to Estonia and beyond"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Incidents such as the recent DHL aircraft crash in Lithuania, initially suspected to involve Russian GPS interference, sparked widespread concern about hybrid warfare tactics. While investigations suggest that this incident may not have been a cyberattack or part of Russia&#8217;s hybrid arsenal, it serves as a stark reminder of the constant threats posed by hybrid warfare and cyberattacks. To explore how nations like Estonia can navigate these challenges, Adrian Venables, senior lecturer at TalTech\u2019s Center for Digital Forensics and Cyber Security, shared his expert insights.<\/p>\n","protected":false},"author":8,"featured_media":8817,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[252],"tags":[391,389,392,390],"class_list":["post-10487","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-society","tag-artificial-intelligence","tag-cybersecurity","tag-digital-future","tag-hybrid-warfare"],"acf":{"postbuilder":[{"acf_fc_layout":"text","type":"text","text":"Hybrid warfare operates in the shadows, blending cyberattacks, disinformation, and sabotage with traditional tactics to destabilize nations while avoiding direct military confrontation. Russia has honed this strategy, employing it to advance geopolitical goals without triggering formal responses, such as NATO\u2019s Article 5.\r\n\r\n\u201cRussia will continue to push on all fronts to achieve its goals, including more hybrid warfare tactics,\u201d explained <a href=\"https:\/\/www.etis.ee\/CV\/Adrian_Venables001\/\" target=\"_blank\" rel=\"noopener\">Venables<\/a>. These actions will fall below the threshold of armed conflict, complicating international responses and providing plausible deniability.","image":null,"align":""},{"acf_fc_layout":"text","type":"text","text":"<h4>The ambiguity of hybrid warfare<\/h4>\r\n\u201cThere\u2019s no single definition of hybrid warfare, and that ambiguity is its strength,\u201d Venables noted. Hybrid tactics deliberately operate below the threshold of international legal definitions of war, sidestepping the triggers that would invoke NATO\u2019s Article 5 collective defence clause.\r\n\r\nRussia has been a key player in refining this strategy. From the 2014 annexation of Crimea \u2013 featuring the now-infamous \"little green men\" in unmarked uniforms \u2013 to the recent suspected targeting of undersea cables and constant cyberattacks, its methods blur the lines between state and non-state actions, complicating accountability and response.\r\n\r\nHybrid warfare extends beyond physical and cyber threats into the psychological domain. Disinformation campaigns \u2013 such as those targeting the 2016 US presidential election \u2013 undermine public trust and influence political outcomes.\r\n\r\nVenables warned that sensationalist narratives, such as \u201cCyber Armageddon,\u201d amplify fear and play directly into adversaries\u2019 hands.\u201cRussia wants us to be less supportive of NATO, the EU, and Ukraine,\u201d he said. \u201cSpreading fear serves their agenda. Instead, we need a measured, informed understanding of the threat.\u201d\r\n\r\nChina\u2019s hybrid strategies further illustrate the global nature of the challenge. Its \u201cthree warfares\u201d doctrine \u2013 psychological operations, media manipulation, and legal warfare \u2013 shows how hybrid tactics can exploit ambiguity to achieve geopolitical dominance. Actions like deploying unmarked naval personnel to harass foreign vessels in the South China Sea demonstrate this strategy\u2019s effectiveness.\r\n\r\nHistorically, Article 5 has only been invoked once, following the 9\/11 terrorist attacks in the United States. That incident was a clear, conventional act of aggression. Hybrid tactics, however, intentionally blur these lines, complicating the decision-making process for NATO allies.","image":null,"align":""},{"acf_fc_layout":"image","image":8786},{"acf_fc_layout":"text","type":"text","text":"<h4>Undersea cables: a critical and vulnerable asset<\/h4>\r\nEstonia\u2019s experience with countering hybrid warfare has made it a leader in preparedness. \u201cWe\u2019re under constant attack. But the fact that life continues relatively undisturbed is a testament to the hard work of those protecting us,\u201c Venables noted.\r\n\r\nEstonia, a pioneer in digital resilience, learned hard lessons during the <a href=\"https:\/\/estonianworld.com\/security\/turning-around-2007-cyber-attack-lessons-estonia\/\" target=\"_blank\" rel=\"noopener\">2007 cyberattacks<\/a> attributed to Russian actors. These massive denial-of-service attacks disrupted critical systems and highlighted the vulnerabilities of a digitally dependent society. Since then, Estonia has invested heavily in cybersecurity, becoming a model for resilience.\r\n<blockquote>\r\n<p style=\"text-align: center;\">\"We\u2019re under constant attack. But the fact that life continues relatively undisturbed is a testament to the hard work of those protecting us.\"<\/p>\r\n<\/blockquote>\r\nYet, vulnerabilities persist. Venables highlighted undersea communication cables as a particular concern. \u201cMost of our internet traffic passes through these cables,\u201d he explained. Their disruption would not only destabilize Estonian society but could trigger a NATO-level crisis if attributed to Russia. Would cutting undersea cables be seen as an act of war? Could it justify collective military action? These questions remain largely theoretical but highlight the complexities hybrid warfare introduces to traditional security frameworks. Because of that, securing these critical infrastructures must remain a national and regional priority.\r\n\r\nVenables noted the 2022 sabotage of the Nord Stream gas pipelines as a wake-up call. Such incidents demonstrate how critical infrastructure can be targeted under ambiguous circumstances, leaving nations and alliances struggling to respond decisively.","image":null,"align":""},{"acf_fc_layout":"image","image":8804},{"acf_fc_layout":"text","type":"text","text":"<h4>Current hybrid threats to Estonia<\/h4>\r\nHybrid warfare operates in ways that are often invisible to the average citizen. Venables identified three key threats facing Estonia:\r\n<ol>\r\n \t<li>Disinformation: Russian-language media and social channels often target the country\u2019s Russian-speaking population with pro-Kremlin narratives.<\/li>\r\n \t<li>Cyberattacks: while Estonia\u2019s defenses have been effective, the constant barrage of attacks requires ongoing vigilance and resources.<\/li>\r\n \t<li>Economic dependence: relying on foreign technologies, particularly from adversarial nations like China, poses long-term risks. Self-sufficiency in critical sectors such as energy and food supplies is essential for resilience.<\/li>\r\n<\/ol>","image":null,"align":""},{"acf_fc_layout":"text","type":"text","text":"<h4>The role of AI in future conflicts<\/h4>\r\nArtificial intelligence (AI) is poised to reshape hybrid warfare. While its potential benefits are immense, Venables expressed concern over its misuse by adversaries. \u201cAI is already here, and our adversaries are exploiting it to its full potential,\u201d he said, noting how AI is used to enhance disinformation campaigns, develop advanced malware, and analyze vulnerabilities.\r\n\r\nThe European Union\u2019s regulatory approach to AI could limit its member states\u2019 ability to keep pace with adversaries like Russia and China, which operate without such constraints. \u201cWhile I\u2019m excited about AI\u2019s potential, I\u2019m also fearful of the harm it could do if fully weaponized by our adversaries,\u201d he added.\r\n<blockquote>\r\n<p style=\"text-align: center;\">\"While I\u2019m excited about AI\u2019s potential, I\u2019m also fearful of the harm it could do if fully weaponized by our adversaries.\"<\/p>\r\n<\/blockquote>","image":null,"align":""},{"acf_fc_layout":"text","type":"text","text":"<h4>Strengths and vulnerabilities of Estonia\u2019s digital landscape<\/h4>\r\nAs a global leader in e-governance, Estonia\u2019s digital infrastructure is both a strength and a potential vulnerability. The country\u2019s digital-first approach streamlines governance, enhances efficiency, and enables rapid innovation, but it also creates a larger attack surface for adversaries. \u201cThe more connected we are, the greater the target we become,\u201d said Venables.\r\n\r\nHe emphasized the need for continued investment in cybersecurity and critical infrastructure protection. \"Although Estonia\u2019s resilience against constant cyberattacks has been commendable, complacency is not an option. We cannot afford to relax. Even as we celebrate past successes, we must stay vigilant and proactive.\u201d he warned.\r\n<blockquote>\r\n<p style=\"text-align: center;\">\"Although Estonia\u2019s resilience against constant cyberattacks has been commendable, complacency is not an option. We cannot afford to relax. Even as we celebrate past successes, we must stay vigilant and proactive.\"<\/p>\r\n<\/blockquote>\r\nUkraine\u2019s ability to maintain internet connectivity and power supplies during both cyber and physical attacks provides a blueprint for resilience. \u201cCritical national infrastructure protection is absolutely vital,\u201d said Venables. He highlighted the need for comprehensive security measures, from safeguarding power grids to educating the public about disinformation.\r\n\r\nDisinformation, particularly on social media platforms, remains a potent weapon. \u201cA simple TikTok video or YouTube short can be as effective as a cyberattack,\u201d he cautioned. He emphasized the importance of education and public awareness in recognizing and countering hybrid tactics. In addition, educating both young people and older generations on recognizing and resisting such tactics is essential. These efforts must be integrated into a broader strategy to counter hybrid threats.\r\n\r\nEstonia\u2019s greatest strength, according to Venables, lies in its cohesive society. The country\u2019s small, united population values its independence and traditions, creating a natural resilience against hybrid threats. \u201cThis cultural cohesion is something other nations can learn from,\u201d he said. However, protecting this unity requires constant effort, particularly in countering divisive narratives aimed at Russian-speaking communities within Estonia.\r\n\r\nAs hybrid warfare continues to test the resilience of nations, Estonia remains a beacon of preparedness and a reminder that even in the face of constant threats, unity and vigilance can prevail.","image":null,"align":""}],"related_authors":[{"author":10492,"position":"Editor"}]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hybrid warfare: the invisible threat to Estonia and beyond - Trialoog<\/title>\n<meta name=\"description\" content=\"Cyberattacks are part of Russia\u00b4s hybrid warfare. What tactics are being used and how well is Estonia coping with it ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hybrid warfare: the invisible threat to Estonia and beyond - Trialoog\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks are part of Russia\u00b4s hybrid warfare. What tactics are being used and how well is Estonia coping with it ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/\" \/>\n<meta property=\"og:site_name\" content=\"Trialoog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61555592234506\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-13T12:28:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/12\/Landscape--scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eveliis Vaaks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eveliis Vaaks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/\"},\"author\":{\"name\":\"Eveliis Vaaks\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#\\\/schema\\\/person\\\/298421563bc6fa08635ee92967fbee05\"},\"headline\":\"Hybrid warfare: the invisible threat to Estonia and beyond\",\"datePublished\":\"2025-02-13T12:28:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/\"},\"wordCount\":9,\"publisher\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trialoog.taltech.ee\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Landscape--scaled.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Digital future\",\"Hybrid Warfare\"],\"articleSection\":[\"Society\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/\",\"url\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/\",\"name\":\"Hybrid warfare: the invisible threat to Estonia and beyond - Trialoog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trialoog.taltech.ee\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Landscape--scaled.jpg\",\"datePublished\":\"2025-02-13T12:28:14+00:00\",\"description\":\"Cyberattacks are part of Russia\u00b4s hybrid warfare. What tactics are being used and how well is Estonia coping with it ?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trialoog.taltech.ee\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Landscape--scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/trialoog.taltech.ee\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Landscape--scaled.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"Adrian Venables. Foto: TalTech\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid warfare: the invisible threat to Estonia and beyond\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/\",\"name\":\"Trialoog\",\"description\":\"Entrepreneurship and science portal\",\"publisher\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#organization\"},\"alternateName\":\"Trialoog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#organization\",\"name\":\"Tallinna Tehnika\u00fclikool\",\"url\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/trialoog.taltech.ee\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/trialoog-logo-tumesinine-hall.svg\",\"contentUrl\":\"https:\\\/\\\/trialoog.taltech.ee\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/trialoog-logo-tumesinine-hall.svg\",\"width\":342,\"height\":87,\"caption\":\"Tallinna Tehnika\u00fclikool\"},\"image\":{\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61555592234506\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/trialoog-taltech\\\/about\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/#\\\/schema\\\/person\\\/298421563bc6fa08635ee92967fbee05\",\"name\":\"Eveliis Vaaks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dd4fe60df2a24feb0a822825f77c77a2407f4f82f1a55518d71c8f41128e8dd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dd4fe60df2a24feb0a822825f77c77a2407f4f82f1a55518d71c8f41128e8dd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dd4fe60df2a24feb0a822825f77c77a2407f4f82f1a55518d71c8f41128e8dd?s=96&d=mm&r=g\",\"caption\":\"Eveliis Vaaks\"},\"url\":\"https:\\\/\\\/trialoog.taltech.ee\\\/en\\\/author\\\/eveliis-vaaks\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hybrid warfare: the invisible threat to Estonia and beyond - Trialoog","description":"Cyberattacks are part of Russia\u00b4s hybrid warfare. What tactics are being used and how well is Estonia coping with it ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/","og_locale":"en_US","og_type":"article","og_title":"Hybrid warfare: the invisible threat to Estonia and beyond - Trialoog","og_description":"Cyberattacks are part of Russia\u00b4s hybrid warfare. What tactics are being used and how well is Estonia coping with it ?","og_url":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/","og_site_name":"Trialoog","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61555592234506","article_published_time":"2025-02-13T12:28:14+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/12\/Landscape--scaled.jpg","type":"image\/jpeg"}],"author":"Eveliis Vaaks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eveliis Vaaks","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/#article","isPartOf":{"@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/"},"author":{"name":"Eveliis Vaaks","@id":"https:\/\/trialoog.taltech.ee\/en\/#\/schema\/person\/298421563bc6fa08635ee92967fbee05"},"headline":"Hybrid warfare: the invisible threat to Estonia and beyond","datePublished":"2025-02-13T12:28:14+00:00","mainEntityOfPage":{"@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/"},"wordCount":9,"publisher":{"@id":"https:\/\/trialoog.taltech.ee\/en\/#organization"},"image":{"@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/#primaryimage"},"thumbnailUrl":"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/12\/Landscape--scaled.jpg","keywords":["Artificial Intelligence","Cybersecurity","Digital future","Hybrid Warfare"],"articleSection":["Society"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/","url":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/","name":"Hybrid warfare: the invisible threat to Estonia and beyond - Trialoog","isPartOf":{"@id":"https:\/\/trialoog.taltech.ee\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/#primaryimage"},"image":{"@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/#primaryimage"},"thumbnailUrl":"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/12\/Landscape--scaled.jpg","datePublished":"2025-02-13T12:28:14+00:00","description":"Cyberattacks are part of Russia\u00b4s hybrid warfare. What tactics are being used and how well is Estonia coping with it ?","breadcrumb":{"@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/#primaryimage","url":"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/12\/Landscape--scaled.jpg","contentUrl":"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/12\/Landscape--scaled.jpg","width":2560,"height":1440,"caption":"Adrian Venables. Foto: TalTech"},{"@type":"BreadcrumbList","@id":"https:\/\/trialoog.taltech.ee\/en\/hybrid-warfare-the-invisible-threat-to-estonia-and-beyond\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trialoog.taltech.ee\/en\/"},{"@type":"ListItem","position":2,"name":"Hybrid warfare: the invisible threat to Estonia and beyond"}]},{"@type":"WebSite","@id":"https:\/\/trialoog.taltech.ee\/en\/#website","url":"https:\/\/trialoog.taltech.ee\/en\/","name":"Trialoog","description":"Entrepreneurship and science portal","publisher":{"@id":"https:\/\/trialoog.taltech.ee\/en\/#organization"},"alternateName":"Trialoog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trialoog.taltech.ee\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/trialoog.taltech.ee\/en\/#organization","name":"Tallinna Tehnika\u00fclikool","url":"https:\/\/trialoog.taltech.ee\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trialoog.taltech.ee\/en\/#\/schema\/logo\/image\/","url":"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/02\/trialoog-logo-tumesinine-hall.svg","contentUrl":"https:\/\/trialoog.taltech.ee\/wp-content\/uploads\/2024\/02\/trialoog-logo-tumesinine-hall.svg","width":342,"height":87,"caption":"Tallinna Tehnika\u00fclikool"},"image":{"@id":"https:\/\/trialoog.taltech.ee\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61555592234506","https:\/\/www.linkedin.com\/showcase\/trialoog-taltech\/about\/"]},{"@type":"Person","@id":"https:\/\/trialoog.taltech.ee\/en\/#\/schema\/person\/298421563bc6fa08635ee92967fbee05","name":"Eveliis Vaaks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2dd4fe60df2a24feb0a822825f77c77a2407f4f82f1a55518d71c8f41128e8dd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2dd4fe60df2a24feb0a822825f77c77a2407f4f82f1a55518d71c8f41128e8dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2dd4fe60df2a24feb0a822825f77c77a2407f4f82f1a55518d71c8f41128e8dd?s=96&d=mm&r=g","caption":"Eveliis Vaaks"},"url":"https:\/\/trialoog.taltech.ee\/en\/author\/eveliis-vaaks\/"}]}},"_links":{"self":[{"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/posts\/10487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/comments?post=10487"}],"version-history":[{"count":10,"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/posts\/10487\/revisions"}],"predecessor-version":[{"id":10643,"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/posts\/10487\/revisions\/10643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/media\/8817"}],"wp:attachment":[{"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/media?parent=10487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/categories?post=10487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trialoog.taltech.ee\/en\/wp-json\/wp\/v2\/tags?post=10487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}