Showing posts with label WHY ARE ALL THE PLANES COMING DOWN?. Show all posts
Showing posts with label WHY ARE ALL THE PLANES COMING DOWN?. Show all posts

Saturday, April 05, 2025

WHY ARE ALL THESE PLANES COMING DOWN LATELY. WE SHOULD KNOW. RUSSIA IS AN EXPERT AT CYBER HACKING PLANES.

JEWISH KING JESUS IS COMING AT THE RAPTURE FOR US IN THE CLOUDS-DON'T MISS IT FOR THE WORLD.THE BIBLE TAKEN LITERALLY- WHEN THE PLAIN SENSE MAKES GOOD SENSE-SEEK NO OTHER SENSE-LEST YOU END UP IN NONSENSE.GET SAVED NOW- CALL ON JESUS TODAY.THE ONLY SAVIOR OF THE WHOLE EARTH - NO OTHER. 1 COR 15:23-JESUS THE FIRST FRUITS-CHRISTIANS RAPTURED TO JESUS-FIRST FRUITS OF THE SPIRIT-23 But every man in his own order: Christ the firstfruits; afterward they that are Christ’s at his coming.ROMANS 8:23 And not only they, but ourselves also, which have the firstfruits of the Spirit, even we ourselves groan within ourselves, waiting for the adoption, to wit, the redemption of our body.(THE PRE-TRIB RAPTURE)

 WHY ARE ALL THESE PLANES COMING DOWN LATELY. WE SHOULD KNOW. RUSSIA IS AN EXPERT AT CYBER HACKING PLANES.

LONG EXPLANATION OF AMERICAS DESTRUCTION (NEW YORK POLITICAL BABYLON OF REVELATION CHAPTER 18)(REVELATION CHAPTER 17 IS THE DESTRUCTION OF THE RELIOUS BABYLON THE VATICAN IN ROME)

JEREMIAH 51:29-32
29  And the land shall tremble and sorrow: for every purpose of the LORD shall be performed against Babylon,(AMERICA-NEW YORK) to make the land of Babylon (NEW YORK) a desolation without an inhabitant.
30  The mighty men of Babylon (AMERICA) have forborn to fight, they have remained in their holds: their might hath failed; they became as women: they have burned her dwellingplaces; her bars are broken.
31  One post shall run to meet another, and one messenger to meet another, to shew the king of Babylon (NEW YORK) that his city is taken at one end,
32  And that the passages are stopped,(THE WAR COMPUTERS HACKED OR EMP'D) and the reeds they have burned with fire, and the men of war are affrighted.(DON'T KNOW WHAT TO DO)

LEVITICUS 26:30-34 (NY IS BUILT ON A GARBAGE DUMP)
30  And I will destroy your high places, and cut down your images, and cast your carcases upon the carcases of your idols, and my (GODS) soul shall abhor you.
31  And I will make your cities waste,(GARBAGE-DESTROYED) and bring your sanctuaries unto desolation, and I will not smell the savour of your sweet odours.
32  And I will bring the land into desolation:(RUIN) and your enemies which dwell therein shall be astonished at it.
33  And I will scatter you among the heathen,(ENEMY NATIONS) and will draw out a sword after you: and your land shall be desolate, and your cities waste.
34  Then shall the land enjoy her sabbaths, as long as it lieth desolate, and ye be in your enemies' land; even then shall the land rest, and enjoy her sabbaths.

2 KINGS 19:25
25  Hast thou not heard long ago how I have done it, and of ancient times that I have formed it? now have I brought it to pass, that thou shouldest be to lay waste fenced cities into ruinous heaps.

ISAIAH 34:10
10  It (NEW YORK-POLITICAL BABYLON) shall not be quenched night nor day; the smoke thereof shall go up for ever: from generation to generation it shall lie waste; none shall pass through it for ever and ever.

EZEKIEL 39:21
21 And I will set my glory among the heathen, and all the heathen shall see my judgment that I have executed, and my hand that I have laid upon them.

ISAIAH 18:1-2
1 Woe to the land shadowing with wings, which is beyond the rivers of Ethiopia:
2 That sendeth ambassadors by the sea, even in vessels of bulrushes upon the waters, saying, Go, ye swift messengers, to a nation scattered and peeled, to a people terrible from their beginning hitherto; a nation meted out and trodden down, whose land the rivers have spoiled!(AMERICA)

JEREMIAH 50:11,37,12
11 Because ye were glad, because ye rejoiced, O ye destroyers of mine heritage,(ISRAEL) because ye are grown fat as the heifer at grass, and bellow as bulls;(BACKSLIDERS)
37 A sword is upon their horses, and upon their chariots, and upon all the mingled people that are in the midst of her; and they shall become as women: a sword is upon her treasures; and they shall be robbed.(A NATION OF MINGLED PEOPLE)
12 Your mother (england) shall be sore confounded; she that bare you shall be ashamed:(MOTHER ENGLAND) behold, the hindermost of the nations shall be a wilderness, a dry land, and a desert.

JEREMIAH 51:13,7,53
13 O thou that dwellest upon many waters, abundant in treasures, thine end is come, and the measure of thy covetousness.
7 Babylon hath been a golden cup in the LORD's hand, that made all the earth drunken: the nations have drunken of her wine; therefore the nations are mad.
53 Though Babylon (NEW YORK) should mount up to heaven, and though she should fortify the height of her strength, yet from me shall spoilers come unto her, saith the LORD.

REVELATION 18:3,5,7
3 For all nations have drunk of the wine of the wrath of her fornication, and the kings of the earth have committed fornication with her, and the merchants of the earth are waxed rich through the abundance of her delicacies.
5 For her sins have reached unto heaven, and God hath remembered her iniquities.
7 How much she hath glorified herself, and lived deliciously, so much torment and sorrow give her: for she saith in her heart, I sit a queen, and am no widow, and shall see no sorrow.

JEREMIAH 50:3,24
3 For out of the north (RUSSIA) there cometh up a nation against her, which shall make her land desolate, and none shall dwell therein: they shall remove, they shall depart, both man and beast.
24 I have laid a snare for thee, and thou art also taken, O Babylon,(NEW YORK) and thou wast not aware: thou art found, and also caught, because thou hast striven against the LORD. (RUSSIA A SNEAK ATTACK ON NEW YORK)

REVELATION 18:9-11,15-21
9 And the kings of the earth, who have committed fornication and lived deliciously with her, shall bewail her, and lament for her, when they shall see the smoke of her burning,(NUKE ATTACK I BELIEVE FROM RUSSIA)
10 Standing afar off for the fear of her torment, saying, Alas, alas that great city Babylon, that mighty city! for in one hour is thy judgment come.
11 And the merchants of the earth shall weep and mourn over her; for no man buyeth their merchandise any more:
15 The merchants of these things, which were made rich by her, shall stand afar off for the fear of her torment, weeping and wailing,
16 And saying, Alas, alas that great city,  (NEW YORK) that was clothed in fine linen, and purple, and scarlet, and decked with gold, and precious stones, and pearls!
17 For in one hour so great riches is come to nought. And every shipmaster, and all the company in ships, and sailors, and as many as trade by sea, stood afar off,
18 And cried when they saw the smoke of her burning, saying, What city is like unto this great city! (NEW YORK)
19 And they cast dust on their heads, and cried, weeping and wailing, saying, Alas, alas that great city, wherein were made rich all that had ships in the sea by reason of her costliness! for in one hour is she made desolate.(1 HOUR NEW YORK IS GONE)
20 Rejoice over her, thou heaven, and ye holy apostles and prophets; for God hath avenged you on her.
21 And a mighty angel took up a stone like a great millstone, and cast it into the sea, saying, Thus with violence shall that great city Babylon (NEW YORK) be thrown down, and shall be found no more at all.
THE CRAZY WORLD IS STILL TRYING TO POKE GOD IN THE EYE WITH THIS USELESS WASTE OF TIME ISRAEL HATE CEASEFIRE.he continued.“When the locals realized that the elephant population was dwindling, they gradually shifted their focus to fallow deer. Identifying the deer’s plentiful source, they began to develop the unique scrapers in the same place. This is the earliest instance of a phenomenon that later spread throughout the world,” Litov said.The Mount Gerizim location, near Nablus, is especially important because numerous fallow deer bones were found there at an ancient altar site. As Gerizim is associated with the Israelite’s entry into the Land of Israel and is considered a sacred site by the local Samaritan community, “apparently, the Mountains of Samaria gained a prominent, or even sacred status as early as the Paleolithic period, and retained their unique cultural position for hundreds of thousands of years,” the researchers said.

WHY ARE ALL THESE PLANES COMING DOWN LATELY. WE SHOULD KNOW. RUSSIA IS AN EXPERT AT IT.

MIKE FROM THE INTERNET SAID THIS - WHY THE PLANES OUR BEING DOWNED. THE PLANES ON AUTO PILOT EQUIPMENT IS SPOOFED OR MIMICK OR DECIEVED BY THE GPS WITH FALSE IMFORMATION BY A PERSON. AND THIS CAN BRING A PLANE DOWN. PEOPLE ARE REALLY SCARED TO RIDE ON A PLANE. THEY REALLY ARE.BECAUSE ON AUTO PILOT ITS NOT SUPPOSE TO BE DECENDING. AT RAPID RATES ON AUTO PILOT. NOT LIKE THAT. AND THEN THESES PILOTS ARE REPORTING THERE ALTIMATORS ARE NOT WORKING.THIS INSTRUMENT IS FLUCTUATING. THEIR GPS IS SHOWING THE WRONG COUNTRY. THIS IS HAPPENING ALL OVER THE WORLD. AND BELIEVE IT OR NOT RUSSIA IS THE ONES THAT SAID THEY WOULD DO THIS. RUSSIA SAID THAT AT THE BEGINING OF THE YEAR. AND NO ONE PAID ANY ATTENTION TO IT. THIS IS NOT BEING REPORTED BY THE LAME-BRAIN FAKE MEDIA. RUSSIA SAID THEY WERE GONNA DO IT. IT BEGAN TO HAPPEN. WE KNEW IT WOULD REACH A POINT WERE THE AVERAGE PERSON WOULD HAVE  SIMULAR TECHNOLOGY. AS THE EXPERTS AND NOW IT HAS HAPPENED.RUSSIA LET US KNOW THEY HAVE THIS CAPABILTY AND ITS HAPPENING. BOTH TO CIVILIAN AND MILITARY AIRCRAFT. AGAIN THERES JUST NO WAY YOU'RE GONNA HAVE A BLACK HAWK PILOT FLY RIGHT INTO A JET. MAKES NO SENSE.


How Russia has been ‘targeting thousands of flights with electronic attacks’ for years-Sarah Hooper-Published April 22, 2024 11:06am

In recent months, more and more civilian aircraft have been hit with electronic jamming, wiping out their GPS systems and other vital navigation tools.But the phenomenon, while terrifying, is not new.Russia is suspected to have been targeting aircraft systems for years, but only recently caught attention for affecting RyanAir, Wizz-Air, British Airlines, Easyjet, TUI and Jet2.Between August 2023 and March 2024 alone, 46,000 flights in areas such as the Baltic, Black Sea and eastern Mediterranean logged interference issues.RyanAir had 2,300 flights affected, Wizz-Air recorded 1,300 flights jammed and British Airlines, Easyjet, TUI and Jet2 were also affected.The UK Civil Aviation Authority has insisted that flying is still safe as there are ‘several protocols’ in place to protect their systems onboard.Yet the warnings about suspected Russian interference into everyday flights went seemingly unheeded for years.    How normal is electronic interference on aeroplanes? A recent YouTube video documenting a long-haul flight from Copenhagen to Bangkok on Scandinavian Airlines revealed just how normal the interference has become for pilots.Flightradar 24’s video showed the moment the routine flight was jammed over the Black Sea, as the dashboard of the plane lit up.‘This one is now offline, and the other one is struggling,’ the pilot explained. ‘This is just the first one. There’s going to be more now.‘The navigation is still super precise. It’s not a problem. It’s only a problem if you’re going to land somewhere.’It’s not just GPS systems being jammed – position tools, navigation and timing (PNT) services have all been targeted.Later in the video, the clock on the plane was affected, forcing the pilots to ask air traffic control what time it is.The radar altimeter was also forced to be switched off during the flight because it signaled the plane was flying into the ground – it was not.Luckily airplanes have other systems to fall back on to keep passengers safe – but the phenomenon is still worrying.What does Russia gain from disrupting aircraft? Chatham House Russian expert Keir Giles, who is familiar with planes, told Metro.co.uk that disrupting electronic systems is one way Russia can practise for war with Nato.He added: ‘If Russia found itself able to deny GPS services not just for aircraft but also for ground transport, this would immediately sow chaos. What we have seen over the last few months is Russia practicing immobilizing Europe.‘But those who are most directly affected are the countries closest to the jamming or the aircraft flying overhead. As a result, most of Europe has barely noticed.‘Normalisation is bad. This is just a symptom of how much Russia does damage to our countries, ordinary people and businesses – and costs us. But nobody knows what’s happening – or pretends they don’t.’Cyber attack threats have also been on the rise from foreign countries.In early 2023, government minister Oliver Dowden revealed the National Cyber Security Centre (NCSC) issued an ‘official threat notice’ to those who operate critical national infrastructure.The NCSC said there was an ’emerging risk posed by state-aligned adversaries’ as a result of the Russia-Ukraine war, and organisations needed to ‘act now’ to protect themselves against attacks.Mr Dowden said these Russian-aligned groups now have a motive to ‘disrupt or destroy’ UK infrastructure.How long has Russia been disrupting aircraft? Warnings of Russian interference with plane navigation systems are not unheard of – and the Kremlin has continued to deny any wrongdoing.In 2019, the Norwegian defence ministry brought up the issue in a bilateral meeting with Russian officials.The electronic attacks have also been allegedly deployed in the Donbas, eastern Ukraine, dating back to 2015.In 2020, the Swedish Defence Research Agency wrote of how Russian navigational systems could attack vulnerable navigational systems. The warnings were seemingly ignored.Mr Giles added: ‘There was speculation that this was just spillover effects from Russia exercising its powerful electronic warfare capabilities in the region, but in recent times, it has become more systematic and more sustained.‘Now the interruption of navigational Services is treated as routine by airline pilots. Russia’s electronic warfare systems claim to have reaches of thousands of kilometers – and they have placed them at Russia’s Western extremities.‘Not just in Kaliningrad, but also in the far north. What we are seeing may be only a small part of Russia’s capabilities.’

Terrifying new cyber hack that can bring down passenger planes-By NIKKI MAIN SCIENCE REPORTER FOR DAILYMAIL.COM-Published: 12:06 EDT, 14 August 2024 |

A terrifying new hack that has the potential to bring down passenger planes is becoming more widespread, experts warn.GPS Spoofing can push planes off their flight paths and confuse the autopilot’s landing feature, causing them to potentially miss the designated tarmac.Cybersecurity experts have issued a warning about a surge in GPS spoofing attacks that have risen 400 percent since the first quarter of this year.They are also becoming more common in warzones, with areas like Ukraine, Russia and the Middle East becoming hotspots.Experts don't yet know the official reason why hackers are now employing GPS spoofing, but it can be used to alter location data and allow them to monitor people's activities and endanger flights.GPS spoofing attacks raise the potential that flights could crash by installing ransomware that could veer the aircraft off course and send them careening into other aircraft, terrain or the ocean.The attacks are becoming more common, but experts are still unsure why and a group has been set up to investigate the incidents and determine who is overriding the plane's GPS systems and why.A newly published report by the cybersecurity company OPS Group revealed that GPS spoofing attacks worldwide skyrocketed from an average of 200 per day from January to March to 900 daily since April.They reported that spoofing attacks targeted as many as 1,350 flights on some days.Hackers transmit counterfeit radio signals to the airline’s receiver antennas to override legitimate GPS signals and send false alerts to the plane’s localization systems that are meant to keep the aircraft away from rough terrain.Pilots have reportedly noticed that one of the first indicators that a hacker has employed GPS spoofing is when the aircraft clock begins to run backward.‘We think too much about GPS being a source of position, but it's actually a source of time,’ Ken Munro, founder of cybersecurity firm Pen Test Partners, said during a presentation at the DEF CON hacking convention in Las Vegas on Saturday.‘We're starting to see reports of the clocks on board airplanes during spoofing events start to do weird things.’He later told Reuters that ‘an aircraft operated by a major Western airline had its onboard clocks suddenly sent forward by years, causing the plane to lose access to its digitally encrypted communication systems.’In April, Finnair was forced to temporarily pause all flights to Tartu in Estonia due to GPS spoofing, which the airline blamed on Russian hackers.‘Is it going to make a plane crash? No, it's not,’ Munro told Reuters.‘What it does is it just creates a little confusion. And you run the risk of starting what we call a cascade of events, where something minor happens, something else minor happens, and then something serious happens.’However, experts reported that there has been an uptick in incidents near war zones - particularly in the Middle East and around Ukraine and Russia.Stuart Fox, director of flight and technical operations at the International Air Transport Association told The Wall Street Journal in February that the incidents are raising concerns about cybersecurity risks, although they haven’t caused any major safety issues yet.‘For the longer term, we need to ensure we are involved in the design of future satellite navigation systems. Countering this risk is a priority for the Agency,’ the European Union Aviation Safety Agency (EASA) said in January.These issues have still largely remained unaddressed, but a GPS spoofing workgroup consisting of 450 registered participants has been put together to address the problem, OPS Group reported.The participants include representatives across industry organizations and airlines including United Airlines, American Airlines, Aer Lingus, Turkish Airlines and Alaska Airlines.NASA, Boeing, the Federal Aviation Administration (FAA) and FlightSafety International are also involved in the workgroup.A Federal Aviation Administration (FAA) spokesperson told DailyMail.com: 'We have received no reports of GPS spoofing in the National Airspace System,' adding that 'the FAA does not track spoofing and jamming incidents for other regions.'DailyMail.com has also reached out to the Transportation Security Administration (TSA) and several airlines for comment.

Russia’s Shadow War Against the West-Brief by Seth G. Jones-Published March 18, 2025-Download the Brief 5324kb
https://www.csis.org/analysis/russias-shadow-war-against-west
Remote Visualization-The Issue-Russia is conducting an escalating and violent campaign of sabotage and subversion against European and U.S. targets in Europe led by Russian military intelligence (the GRU), according to a new CSIS database of Russian activity. The number of Russian attacks nearly tripled between 2023 and 2024. Russia’s primary targets have included transportation, government, critical infrastructure, and industry, and its main weapons and tactics have included explosives, blunt or edged instruments (such as anchors), and electronic attack. Despite the increase in Russian attacks, Western countries have not developed an effective strategy to counter these attacks.Introduction-Russia is engaged in an aggressive campaign of subversion and sabotage against European and U.S. targets, which complement Russia’s brutal conventional war in Ukraine. The number of Russian attacks in Europe nearly tripled between 2023 and 2024, after quadrupling between 2022 and 2023. Russia’s military intelligence service, the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (or GRU), was likely responsible for many of these attacks, either directly by their own officers or indirectly through recruited agents. The GRU and other Russian intelligence agencies frequently recruited local assets to plan and execute sabotage and subversion missions. Other operations relied on Russia’s “shadow fleet,” commercial ships used to circumvent Western sanctions, for undersea attacks.The data indicate that Russia poses a serious threat to the United States and Europe and that the Russian government, including President Vladimir Putin, cannot be trusted. Roughly 27 percent of the attacks were against transportation targets (such as trains, vehicles, and airplanes), another 27 percent were against government targets (such as military bases and officials), 21 percent were against critical infrastructure targets (such as pipelines, undersea fiber-optic cables, and the electricity grid), and 21 percent were against industry (such as defense companies). Many of these targets had links to Western aid to Ukraine, such as companies producing or shipping weapons and other matériel to Ukraine. Russia also used a variety of weapons and tactics. The most common (35 percent) involved explosives and incendiaries. Other weapons and tactics included blunt or edged instruments (27 percent), such as anchors used to cut undersea fiber-optic cables; electronic attack (15 percent); and the weaponization of illegal immigrants (8 percent).The increase in attacks indicates that the West has failed to coerce Russia from stopping its campaign of sabotage and subversion. Russian attacks are not just a European problem, but a U.S. problem as well. The GRU and other organizations have conducted operations against U.S. targets, such as U.S. bases in Germany. The United States and European countries, including the European Union and NATO, have largely focused on defensive measures to counter Russian actions, such as sharing intelligence and strengthening resilience (including cyber defense). While these efforts are necessary, they are not sufficient. NATO countries should develop a calibrated offensive campaign against Russia that includes several components: escalating sanctions against Moscow; targeted offensive cyber operations against important Russian military and commercial targets; information and influence operations targeting the populations of Russia and its partners, such as Belarus; and more aggressive actions against assets valuable to Russia, such as its shadow fleet. In short, NATO should design a campaign to escalate the costs on Russia should the country continue such operations.To better understand Russian actions, this brief asks several questions. What are Russian objectives in conducting these attacks? What are the main tactics and targets of Russian actions? And what should the United States and other Western countries do to better deter and counter Russian activity? To answer these questions, the analysis utilizes several sources of data. Most importantly, it builds and analyzes a database of Russian destructive attacks and plots between January 2022 and March 2025, including date, location, target, weapon, and other information.1 In addition, it supplements this database with an overview of historical Russian and Soviet activity. It also utilizes data from other sources, such as CSIS’s database of hundreds of cyber incidents since 2006. Finally, it uses information from interviews with U.S. and European government officials.The rest of this brief is divided into five sections. The first provides an overview of actions below the threshold of conventional warfare, including their historical use by the Soviet Union and Russia. The second section assesses Russian motivations for conducting this type of warfare, including the benefits and drawbacks. The third examines the main Russian actors involved in planning and executing its shadow war, from the Kremlin to the GRU and local recruits. The fourth section analyzes the primary trends in Russia’s actions, including geographic location, targets, and weapons. And the fifth outlines policy implications for the United States and its allies.Russian Shadow Wars: The Historical Context-Actions below the threshold of conventional warfare have long been an important component of statecraft.2 U.S. military doctrine refers to these types of actions as “irregular warfare” or “irregular activities,” while European governments have frequently referred to these actions as “hybrid warfare” or “hybrid threats.”3 Others have used different terms to capture some or all of these actions, such as gray zone activity, political warfare, asymmetric conflict, unconventional warfare, and low-intensity conflict.4 These types of activities involve using tools of statecraft below the threshold of conventional warfare to shift the balance of power in their favor. Examples include:Information and influence operations, including psychological operations and propaganda.Offensive cyber operations and electronic warfare.Support to state and non-state partners, such as guerrillas and proxy forces.Covert and clandestine actions by intelligence and special operations forces, including sabotage and subversion.Economic coercion.5-Russia and the Soviet Union have a rich tradition of conducting this type of warfare. During the Cold War, the Soviet Union developed an aggressive campaign to influence populations across the globe in ways that aided Soviet interests and undermined the United States and its allies, which was best captured in the phrase “active measures” (or активные меры).6 Led by the KGB, the Soviet Union’s premier spy agency, active measures included several types of activities:Written and oral disinformation (or дезинформация), including “gray” (unattributed) and “black” (falsely attributed) propaganda.The use of agents of influence, including foreign academics and media assets.Clandestine radio stations.The use of foreign political parties and international front groups to pursue Soviet national security objectives.Support for international revolutionary and terrorist organizations, including national liberation movements.Political blackmail and kidnapping.Targeted assassinations, including the killing of defectors.7-Soviet active measures focused primarily on the United States, which it referred to as the main opponent or adversary (or главный противник), though the KGB and other Soviet agencies, such as the GRU, also focused on Western European and other countries in order to undermine U.S. influence and alliances. As one former Warsaw Pact intelligence operative noted:Target No. 1 was the United States. . . . The objective was to hurt the United States wherever and whenever it was possible, to weaken the positions of the United States and Western Europe, to create new rifts within the NATO Alliance, to weaken the position of the United States in developing countries, to cause new rifts between the United States and developing countries, to disinform the United States and the Western allies about the military strength of the Soviet bloc countries.8-The documents collected by Vasili Mitrokhin, an archivist for the Soviet Union’s foreign intelligence service who defected to the West just as the Cold War ended, provide some of the most illuminating insights into Soviet active measures. As one KGB analysis explained, “The main value of all Active Measures lies in the fact that it is difficult to check the veracity of the information conveyed and to identify the real source. Their effectiveness is expressed as a coefficient of utility, when minimum expenditure and effort achieves maximum end results.”9 In addition to active measures, the Soviet Union and more recently Russia also used such strategies and tactics as denial and deception (or маскировка) and information confrontation (or информационное противоборство).10-Russian Strategy-Today, Russian active measures support the following types of foreign policy objectives:Influencing public opinion through psychological operations in Europe, the United States, and other countries to support Russian interests.Coercing governments, companies, or individuals to stop taking specific actions, particularly curbing military and other assistance to Ukraine.Deterring countries, companies, or individuals from taking specific actions, such as escalating the type and amount of military aid to Ukraine.Deterring Russian soldiers, government officials, and citizens from defecting to the West.Creating fissures between governments, especially between NATO allies.Undermining the democratic norms and values that underpin the West.These types of operations have several benefits, which make them attractive to Russian leaders. First, they allow countries to conduct coercive activities against a state below a threshold that is likely to trigger a costly or risky conventional war. Countries generally do not respond to actions below the threshold of conventional warfare by declaring war on the perpetrator. For example, Article 5 of the North Atlantic Treaty states that an armed attack against one NATO member is considered an attack on all members. But NATO governments typically do not consider active measures “an armed attack” that requires collective self-defense.11 This means that perpetrators, including Russia, know that they can conduct these activities without causing a conventional war. As a 2024 Norwegian intelligence assessment concluded, “Any act of sabotage would most likely be performed in a manner that would make it challenging to prove who was behind it. One important reason for this is that Russia wants to avoid any situation that could trigger Article 5 of the NATO Treaty regarding collective defense.”12-Second, these types of actions are relatively inexpensive for perpetrators. Unlike conventional war, they generally do not require vast sums of money and do not cause the perpetrator to suffer substantial casualties. Some of these actions—such as offensive cyber, electronic warfare (including GPS jamming), and influence operations—can also be done from a state’s own territory, a third country, or virtual networks.Third, these types of actions are often deniable, and targeted governments are frequently cautious—sometimes overly cautious—about attributing them due to fear of escalation. Since they may not be directly perpetrated by a government operative, countries can—and generally do—deny responsibility. Governments have frequently used a number of entities as cut-outs, such as local recruits, including criminal organizations or diaspora populations, non-governmental organizations, and companies. Russia has also used commercial vessels, such as the oil tanker Eagle S, which sailed under the flag of the Cook Islands, for sabotage operations.13-Remote Visualization-Several European government agencies assessed that the Eagle S oil tanker belonged to Russia’s shadow fleet and was engaged in sabotage operations against undersea power cables.Despite these benefits, however, actions below the threshold of conventional warfare have limitations. To begin with, they often have a limited impact. For example, it is difficult to conquer a country using irregular or hybrid means.14 In addition, local assets recruited to conduct covert actions may not be professional operatives with extensive training in strategic sabotage and tradecraft beyond what their case officers can teach them, undermining the effectiveness of these operations. As the head of MI5, Ken McCallum remarked about Russian actions in Europe, “Russia’s use of proxies further reduces the professionalism of their operations, and—absent diplomatic immunity—increases our disruptive options.”15 MI6 chief Richard Moore similarly noted that Russia is “having to do it through criminal elements” in Europe, which has some costs. “Criminals do stuff for cash,” he noted. “They’re not reliable. They’re not particularly professional. . . . I think Russian intelligence services has gone a bit feral, frankly, in some of their behavior.”16-Outsourcing actions to non-state or quasi-state actors creates a classic principal-agent problem.17 If a group’s or actor’s goals are not closely aligned with that of its patron, the potential for agency loss is high and local recruits could go rogue. These types of actions can also trigger a response from the targeted government or governments, even if it is not a conventional war. Examples include economic sanctions, expulsion of government officials, the arrest and imprisonment of perpetrators, or even irregular and hybrid actions in response. Finally, these types of actions can backfire and cause a rally-around-the-flag effect in the targeted country by increasing resolve among the affected population, strengthening opposition to the sponsor’s policies, and driving up military spending, as well as increasing interest in balancing alliances.Russian Actors-Russian covert operations against the West are part of its foreign policy, and decisionmaking for them is centralized in the Kremlin and led by an experienced hand in covert action, President Vladimir Putin. As an operative in the KGB, Putin served in the station (or резидентура) in Dresden, East Germany, and helped spearhead active measures against West Germany.18 He later became head of the Federal Security Service (FSB), a successor to the KGB involved in countering foreign intelligence services, combating organized crime, and ensuring economic and financial security. Putin has long supported strategies and tactics below the threshold of conventional warfare.Within the Kremlin, there have been several reforms regarding the organization and implementation of active measures. Around 2022, Russian Presidential First Deputy Chief of Staff Sergey Kiriyenko established the Committees of Special Influence, which is responsible for assigning Russian special services with specific tasks in target countries. In addition, activities such as violent provocations are authorized by a committee of the National Security Council under the guidance of its secretary, Sergei Shoigu.19-The main Russian organization involved in active measures is the GRU, headed by Admiral Igor Kostyukov. In addition, Andrei Averyanov, deputy head of the GRU, is likely responsible for overseeing all active measures other than those targeting Ukrainian territory. Averyanov established the Service for Special Activities, which includes three main entities: Unit 29155, Unit 54654, and a headquarters and planning department for coordinating the Service for Special Activities.20-Remote Visualization-Sergey Kiriyenko, Russian Presidential First Deputy Chief of Staff-Remote Visualization-Sergei Shoigu, Secretary of Russia’s National Security Council-Remote Visualization-Igor Kostyukov, Director of the GRU-Remote Visualization-Andrey Averyanov, Deputy Director of the GRUGRU Unit 29155 is the most well known of these entities. It is also referred to as the 161 Intelligence Specialists Training Centre (Центр подготовки специалистов специального назначения), or 161 Centre. Soviet leaders established the unit in 1963 and brought together human intelligence and special operations personnel. Today, some evidence suggests that the 161 Centre is organized into a headquarters unit, three training units, an operational planning unit, three operational units, a financial and logistical unit, and a supply unit. It deploys personnel to Europe and other locations for active intelligence under partial legalization. For Russia’s special services, “legalization” involves the establishment of a cover identity that allows an individual to conduct covert activity in a target country or countries. Depending on the duration of the activity, Russia divides legalization into “full” and “partial” categories. Full legalization generally means that an operator stays in place for an indefinite period of time, while partial legalization assumes a short-term stay and basic levels of scrutiny by the target government’s intelligence or law enforcement services.21-GRU Unit 29155 was linked to the March 2018 nerve agent poisoning in the United Kingdom of Sergei Skripal, a former GRU officer that had worked for British intelligence and then defected, along with his daughter. The unit was also likely behind the September 2020 poisoning of Russian opposition politician Aleksei Navalny; a campaign to provide money to Taliban-linked militants in Afghanistan to target foreign forces, including potentially U.S. troops; a failed coup attempt in Montenegro in 2016; and the poisoning of Bulgarian arms dealer Emilian Gebrev, his son, and his business manager in 2015.22-GRU Unit 54654 is designed to build a network of illegal operatives operating under full legalization. The unit recruits individuals with prior military service or other backgrounds—including foreign students studying at Russian universities. It also recruits contractors through front companies, keeps their names and personally identifiable information out of government records, and embeds its officers in Russian ministries unrelated to defense or in private companies.23-There are other GRU organizations involved in subversive activities—particularly cyber operations—such as GRU Unit 26165 (also referred to as Fancy Bear) and GRU Unit 74455 (also referred to as Sandworm).24 The United States and European Union have sanctioned a wide range of GRU operatives for their involvement in clandestine activity. For example, the European Union sanctioned Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov from GRU Unit 29155 for their involvement in cyberattacks against Estonia.25 The United States also sanctioned GRU officer Valery Korovin for his involvement in influence operations targeting the 2024 U.S. presidential election.26-Russia’s Foreign Intelligence Service (SVR), the Main Directorate for Deep Sea Research (GUGI), and the FSB have also been involved in active measures in Europe, the United States, and other countries. SVR cyber units, such as Nobelium (also known as Advanced Persistent Threat 29, the Dukes, Cozy Bear, and Midnight Blizzard), have conducted a wide range of cyberattacks against U.S. and European targets.27 As Microsoft assessed in one attack, their cyber analysts identified “Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors.”28 The SVR’s Nobelium unit was involved in the massive data breach of SolarWinds, a company based in Austin, Texas, that made network monitoring software. The SolarWinds supply chain attack gave Russia the ability to spy on and disrupt more than 18,000 computer systems across the globe, including in the U.S. Departments of Commerce, State, Defense, and the Treasury.29-GUGI is a secretive Russian agency belonging to the Russian Ministry of Defense that operates submarines and vessels that can engage in sabotage, such as cutting undersea fiber-optic cables, collecting intelligence, and conducting other operations.30 There are currently 16 cables running under the Atlantic that connect the United States with mainland Europe. They are primarily operated by such companies as Google, Microsoft, France’s Alcatel Submarine Networks, and China’s Huawei Marine Networks. Submarine cables are critical for global communication and account for roughly 95 percent of all transatlantic data traffic. These cables are vulnerable to subversion and sabotage, even from the anchors on ships.31 When ships drag anchors on the bottom of the seabed, it can either completely sever cables or cause partial damage that over time leads to deterioration—and ultimate failure—of the cable.32 As a result, Russia does not even need to use GUGI’s specialized equipment to disrupt these cables.

European Voices-Richard Moore, head of MI6, the United Kingdom’s foreign intelligence agency: “We have recently uncovered a staggeringly reckless campaign of Russian sabotage in Europe, even as Putin and his acolytes resort to nuclear saber-rattling, to sow fear about the consequences of aiding Ukraine, and challenge Western resolve in so doing.”[33]-Ken McCallum, head of MI5, the United Kingdom’s domestic intelligence agency: “The GRU in particular is on a sustained mission to generate mayhem on British and European streets: we’ve seen arson, sabotage and more. Dangerous actions conducted with increasing recklessness.”[34]-Anne Keast-Butler, director of GCHQ, the United Kingdom’s main cyber agency: The United Kingdom “is increasingly concerned about growing links between the Russian intelligence services and proxy groups to conduct cyber attacks—as well as physical surveillance and sabotage operations.”[35]-Thomas Haldenwang, head of the Federal Office for the Protection of the Constitution, or BfV, Germany’s domestic intelligence agency: “We have been observing aggressive actions by the Russian intelligence services for some time now. Russia is using the entire toolbox, from influencing political discussions to cyber attacks on critical infrastructure to sabotage on a significant scale.”[36]-Bruno Kahl, head of the Bundesnachrichtendienst, or BND, German’s foreign intelligence agency: “Whether we like it or not, we are in direct confrontation with Russia.”[37]-Donald Tusk, prime minister of Poland, “Russia was planning acts of air terror, not only against Poland but against airlines around the world.”[38]-An analysis by the Polish Ministry of Foreign Affairs: “The Russian Federation is waging a hybrid war against Poland. This includes cyberattacks and assaults at Poland’s eastern frontier, which is also the Schengen areas’ border.”[39]-Radoslaw Sikorski, Polish foreign minister: “I have information that the Russian Federation is behind sabotage attempts both in Poland and allied countries.”[40]-Tomasz Siemoniak, Polish interior minister, “We are facing a foreign state that is conducting hostile and—in military parlance—kinetic action on Polish territory. There has never been anything like this before.”[41]-An analysis by NATO: “NATO Allies are deeply concerned about recent malign activities on Allied territory, including those resulting in the investigation and charging of multiple individuals in connection with hostile state activity affecting Czechia, Estonia, Germany, Latvia, Lithuania, Poland, and the United Kingdom. These incidents are part of an intensifying campaign of activities which Russia continues to carry out across the Euro-Atlantic area, including on Alliance territory and through proxies. This includes sabotage, acts of violence, cyber and electronic interference, disinformation campaigns, and other hybrid operations. NATO Allies express their deep concern over Russia's hybrid actions, which constitute a threat to Allied security.”[42]-Vice Admiral Nils Andreas Stensoenes, head of the Norwegian Intelligence Service (NIS): “The risk level has changed. We believe sabotage is more likely, and we see acts of sabotage happening in Europe now which indicate that they (the Russians) have moved a bit on that scale.”[43]-Kaja Kallas, prime minister of Estonia: “There’s a shadow war going on against our societies. The aim of Russia’s influence operations is to influence our democratic decision making. By making these events public, we raise awareness so that these operations would not have the effect Russia is hoping for.”[44]-Remote Visualization-Finally, Russia uses a wide range of non-state or quasi-state actors to conduct active measures. The significant expulsion of Russian spies from Europe since 2022 has, in part, forced Moscow to rely on other networks, though governments have long used non-state or quasi-state entities for actions below the threshold of conventional warfare. One example is criminal organizations.45 As Ken McCallum, head of MI5, explained, “The more eye-catching shift this year has been Russian state actors turning to proxies for their dirty work, including private intelligence operatives and criminals from both the UK and third countries.”46 In addition, the GRU and other Russian organizations have frequently relied on local recruits, sometimes referred to as “disposable agents.”47 In some cases, Russia has recruited these individuals on Telegram channels, through chat functions of popular online games, or through other online locations.48 The GRU and other organizations have recruited Russian-speaking, and on some occasions technologically savvy, young men between 20 and 30 years old. Some may be ideologically motivated and support Russia, while others may simply do it for the money.49-Russia has also used commercial ships, including its “shadow fleet,” to conduct active measures such as sabotage.50 The shadow fleet emerged as a way for Russia to circumvent Western-imposed sanctions on Russian oil transported by sea. To skirt the restrictions, the Kremlin invested billions of dollars in a fleet of tankers whose ownership is difficult to trace to Russia. Many sail under the flags of other nations—such as Gabon, Liberia, the Marshall Islands, and Panama—and sell to buyers in countries like China and India.51 According to one assessment, approximately 70 percent of Russia’s oil is being transported by so-called shadow tankers.52 Russia has used other civilian vessels for intelligence collection and sabotage, including its vast commercial fishing fleet and marine research ships. Some of the ships are relatively modern, longer than 300 feet, and equipped with sonar and other technology that allows them to scan the seabed. Such vessels have mapped critical subsea infrastructure around Europe and identified potential targets.53-Russian Actions-Russia has conducted a wide range of active measures in Europe. This section is divided into four areas: (1) overall trends, (2) targets, (3) weapons, and (4) geographic area. It relies on several data sources. The first is a CSIS database of Russian subversive actions between January 2022 and March 2025, including date, location, target, weapon type, and other information. The data cover Russian attacks and plots that had (or were intended to have) physical effects, such as weapons and tactics using explosives, other incendiaries, firearms, and anchors for cutting undersea fiber-optic cables. Attribution is always difficult for active measures. To be included in the database, CSIS identified at least three credible sources for the direct or indirect involvement of the Russian government, interviewed government and non-government experts, and asked several experts to review the data and analysis. In addition, CSIS assessed the level of confidence for each incident.54-The CSIS database excluded several types of activities. For example, most Russian cyber operations were excluded. It is virtually impossible to build a comprehensive unclassified database of cyber operations, since cyberattacks do not necessarily have a physical effect (such as a warehouse blowing up, an individual assassinated, or a cable cut) and the targets (such as foreign government agencies and companies) have numerous incentives not to publicly acknowledge the attacks. In addition, Russia and other state actors frequently perpetrate cyber operations to collect intelligence, not necessarily to impose a cost on a foreign state or other entity. However, the CSIS database did include those incidents where Russian cyber or electronic warfare attacks had an observable physical effect. These types of attacks are designed to disrupt critical infrastructure, such as power grids, water systems, and transportation networks that can lead to power outages, disruptions, or physical harm.The CSIS database also excluded Russian disinformation campaigns, such as election interference and efforts to sow discord or otherwise influence the populations or governments in Europe, the United States, and other locations. Much like cyberattacks, it is virtually impossible to build a comprehensive unclassified database of information or influence campaigns since attacks frequently do not have a physical effect and the targets have numerous incentives not to publicly acknowledge the attacks. Nevertheless, Moscow has developed an aggressive campaign to interfere with democratic elections in individual countries and European Parliament elections, co-opt politicians for elite capture, and spread disinformation.55 As noted previously in this analysis, the Soviet Union and such organizations as the KGB have a rich history of disinformation campaigns and other active measures.Overall Trends in Attacks-The most significant finding from the data is that the number of Russian attacks in Europe nearly tripled between 2023 (12 attacks) and 2024 (34 attacks), after quadrupling between 2022 (3 attacks) and 2023. As noted in more detail below, Russian agencies orchestrated attacks in 2024 against a wide range of targets, from critical infrastructure to transportation targets, using a variety of weapons and tactics, from explosives to blunt or edged weapons such as anchors.What factors caused this dramatic increase? While it is difficult to know with certainty, there are likely several factors.First, it appears that Russia made a strategic decision to escalate its shadow war in Europe in response to U.S. and European aid to Ukraine. Many of the targets were linked to Ukraine in some capacity. Examples range from a Russian military defector assassinated in Spain to a series of companies—such as BAE Systems, Rheinmetall, German Diehl Group, and EMCO—that produce weapons for Ukraine. As a Norwegian intelligence assessment concluded, one of the primary Russian targets in Norway includes “actors involved in arms donations and the training of Ukrainian personnel. They are especially at risk of being targeted because arms deliveries could have a direct impact on the battlefield in Ukraine.”56 There were also no recorded incidents against several countries that did not provide significant aid to Ukraine, such as Hungary and Serbia, which suggests that Moscow was deliberate in where it conducted attacks—as well as where it did not conduct attacks.Second, Russia may have increased its attack tempo because there were few, if any, costs for its actions. Russian leaders knew they could get away with attacks—including an escalation in attacks—without paying a major price.Targets-Russia’s most frequent targets in Europe were in the transportation sector (27 percent), such as trains and airplanes (including through GPS jamming), and against government targets (27 percent), such as government officials, military bases, and border crossings. Russia also conducted attacks on critical infrastructure (21 percent), such as pipelines and undersea fiber-optic cables, and industry (21 percent), such as defense companies.Remote Visualization-Maritime, land, and air transportation targets were a major focus of Russian active measures. Germany experienced a railway cable-cutting attack in 2022. In addition, Russia conducted multiple attacks against Poland’s rail system.57 Russia also targeted airplanes through electronic attack.Critical infrastructure attacks were also a focus of Russian operations, including undersea cables and pipelines. Finnish investigators assessed that the Newnew Polar Bear, a Chinese-registered ship operated by a Russian crew, damaged two subsea data cables and a gas pipeline in the Baltic Sea with its anchor. The ship was trailed by the Sevmorput, a nuclear-powered merchant ship owned by the Russian government.58 In addition, the Eagle S, an oil tanker, apparently dragged its anchor and damaged a cable in the Gulf of Finland.59 The Vezhen, a Maltese-flagged ship, damaged an undersea fiber-optic cable linking Latvia and Sweden. Armed police parachutists from Sweden promptly boarded the ship.60 Finally, the Chinese ship Yi Peng 3, which had a Russian captain, cut an undersea cable on its journey through the Baltic Sea.61-The use of some Chinese cargo ships, with Russian crew, is noteworthy because China has also engaged in attacks against Taiwan’s undersea fiber-optic cables.62 Taiwan has approximately 14 international underwater submarine cables and 10 domestic ones, as well as limited satellite access in low Earth orbit, making it vulnerable to a subversive campaign. In January 2025, for example, a Chinese-owned vessel cut an undersea fiber-optic cable near Taiwan’s Keelung Harbor.63 While it is unclear to what degree Russia and China have cooperated and shared lessons, both countries have adopted a similar tactic (the use of commercial vessels) against similar targets (undersea cables and pipelines).Private industry, especially the defense industry, was also a common target of Russian activity. The two largest European donors of military aid to Ukraine—Germany and the United Kingdom—experienced attacks on numerous defense manufacturing plants.64 In May 2024, for example, a major fire broke out at a Diehl Group factory in Berlin, which manufactures IRIS-T surface-to-air missiles used in Ukraine.65 A month earlier, there was an explosion at a weapons manufacturing site in South Wales belonging to BAE Systems, the United Kingdom’s largest arms manufacturer, which has supplied ammunition, weapons, and other defense equipment to Ukraine.66 A BAE investigation into the incident found no evidence of sabotage.Russian sabotage occurred in other countries as well. There was an explosion linked to Russian services at a warehouse in Spain that stored communications equipment bound for Ukraine.67 Less than a year earlier, explosions went off in the ammunition warehouses of the Bulgarian arms manufacturer and trader EMCO, only days after Bulgaria announced it would officially join the coalition to supply shells to Ukraine.68-Russia also targeted several types of individuals that cut across government and industry sectors: corporate executives, including ones involved in supplying weapons and other matériel to Ukraine; journalists that investigated Russian activity; Russian defectors to the West, including a Russian soldier; and Ukrainian officials. Several were assassination plots that failed: one in Poland targeting Ukrainian President Volodymyr Zelensky; one in Austria against Bulgarian investigative journalist and director of the Bellingcat investigative reporting group Christo Grozev; and one in Germany targeting Armin Papperger, the chief executive officer of Rheinmetall, a large producer of artillery and tanks that had sent shells to Ukraine.69 The assassination plot against Papperger was one of the first instances in which Russia attempted to take lethal action against a Western citizen who had no previous connection to Moscow.70-There were several other attacks against individuals. One was the assassination in Spain of Maksim Kuzminov, a Russian helicopter pilot who defected from Russia in August 2023. Another was the 2024 assault in Lithuania on Leonid Volkov, a Russian citizen and former close aide of now-deceased Russian opposition leader Alexei Navalny. The assailants, who Lithuanian intelligence assessed were likely “Russian organized,” broke Volkov’s arm but failed to kill him.71 Another incident involved the vandalization of a car belonging to Estonian Minister of the Interior Lauri Läänemets.72-Remote Visualization-Captain Maksim Kuzminov, a Russian helicopter pilot, defected to Ukraine in August 2023. Russian operatives likely assassinated Kuzminov in Spain in February 2024.In addition, German prosecutors charged three Russian-German nationals—Dieter Schmidt, Alexander J., and Alex D.—with acting as secret service agents for Russia and plotting bombing and arson attacks against U.S. military bases in Germany. Dieter Schmidt also allegedly participated in other sabotage operations, including taking pictures of military installations with an aim to endanger national security.73 The U.S. bases had connections to Ukraine. At the U.S. base in Grafenwoehr, Germany, Ukrainian troops were being trained to operate M1 Abrams tanks.74-Tactics and Weapons-The most frequent type of weapon used in Russia’s shadow war were explosives or incendiaries (35 percent), including bombs; blunt or edged instruments (27 percent), such as anchors; and electronic attack (15 percent). The next most common were the weaponization of illegal immigrants (8 percent) and the use of firearms (2 percent). Russia’s use of weapons that kill, injure, or destroy property suggests that Moscow seeks to send a clear message to deter or coerce behavior, such as sending weapons to Ukraine. But the attacks had few casualties, indicating that Russia wants to keep the costs low and maximize deniability. The low level of violence has also allowed Moscow to escalate if necessary.Remote Visualization-One of the most innovative weapons in Russian attacks was the use of electric massagers implanted with a magnesium-based flammable substance that exploded at DHL logistics hubs in Leipzig, Germany; Birmingham, England; and Jablonow, Poland. These plots may have been a test run to figure out how to get such incendiary devices aboard planes.75 Polish prosecutor Katarzyna Calow-Jaszewska concluded that Russia’s goal was to “test the transfer channel for such parcels, which were ultimately to be sent to the United States of America and Canada.”76 German police who tested models of the incendiary devices noted that that once the magnesium ignited, it would have been difficult to extinguish with the firefighting systems on most airplanes.77 Fires also targeted warehouses and other targets across Europe, from the United Kingdom to Poland.78-Russian agencies utilized electronic attack and cyber operations with physical effects against transportation targets. Estonia, Finland, Lithuania, Norway, and Poland all reported specific incidents of deliberate GPS signal jamming from Russia, which led to navigation errors, flight deviations, and communication breakdowns—endangering the lives of those on board.79 Several countries, such as Poland, also reported cyberattacks against transportation targets, such as rail lines. More broadly, Russian-linked actors conducted hundreds of cyberattacks against targets in Europe, the United States, and other regions to collect intelligence, deface websites, orchestrate a denial of service, and occasionally conduct sabotage, according to a broader CSIS database of cyber incidents between 2006 and 2025 where losses were greater than a million dollars.80-Finally, Russia and Belarus weaponized illegal immigrants against several border countries, such as Finland, Latvia, Lithuania, Norway, and Poland. In 2021, Belarusian leader Alexander Lukashenko threatened to “flood” the European Union with “drugs and migrants,” and then his government sent thousands of migrants from Iraq and other countries to the borders of Latvia, Lithuania, and Poland in 2021 and 2022.81 In November 2023, Finland closed its border with Russia following a surge of border crossings instigated by Russia; 900 third-country nationals arrived in Finland without valid documentation in November alone. In the summer of 2024, Poland experienced a surge to nearly 400 illegal border crossings a day. These border crises were likely orchestrated to pressure state institutions, drain resources, and fuel anti-migrant rhetoric exploited by far-right parties across Europe.82-Geographic Area-Russia conducted attacks throughout Europe, as indicated in Figure 4. However, the attacks were largely concentrated in NATO’s eastern flank, such as Estonia, Finland, Latvia, Lithuania, and Poland, as well as waters like the Baltic Sea. In addition, Russia targeted countries that supplied weapons or other matériel to Ukraine or sheltered Russian defectors, such as Bulgaria, France, Germany, Spain, and the United Kingdom. There were no recorded attacks against countries with closer relations with Russia, such as Hungary or Serbia. Russia also did not conduct attacks against several other European states, such Greece, Portugal, Romania, and Switzerland.83-Remote Visualization-Going on Offense-Russian active measures are not just a European problem, but a U.S. problem as well. The GRU and other organizations have plotted attacks against U.S. bases in Europe, including in Germany, and mapped undersea transatlantic fiberoptic cables that connect the United States and Europe. In addition, Russian military and intelligence agencies have also conducted offensive cyberattacks, disinformation, and other active measures against the United States both at home and abroad.Russia’s escalation of its shadow war indicates a Western failure to impose sufficient costs on Moscow. Some European leaders have refrained from attributing attacks to Moscow because they fear further escalation.84 The United States and European countries have largely focused on defensive measures to deter or counter Russian actions. Examples include:Increasing intelligence sharing among Western military, intelligence, and law enforcement agencies.85 In February 2023, for instance, NATO created an Undersea Infrastructure Coordination Cell to assess vulnerabilities and coordinate efforts between NATO governments and the private sector.Heightening patrols and surveillance. NATO established the Baltic Sentry operation to protect underwater cables and pipelines by enhancing the alliance’s surface, sub-surface, and air presence in strategic locations. The operation involved frigates, maritime patrol aircraft, submarine satellites, remotely operated vehicles, drones, and other surveillance assets.86-Strengthening national resilience by hardening critical infrastructure, including protecting oil and gas pipelines, warehouses, and cyber networks. For example, the European Union and NATO established an EU-NATO Task Force on Resilience of Critical Infrastructure.87 Several countries, such as Finland, Sweden, the Baltic states, and Poland, have also adopted measures to strengthen resilience.In addition, there have been some actions designed to impose costs on Russia. Examples include:losing Russian consulates, such as the one in Poznan, Poland.88-Expelling Russian government officials, including over 750 diplomats and intelligence officials between February 2022 and October 2024.Denying diplomatic visa applications to potential Russian spies.90-Arresting and prosecuting perpetrators of attacks, such as Dylan Earl for allegedly sabotaging Ukrainian businesses in east London, Alexander Suranovas (also known as Igor Prudnikov) for his apparent involvement in the DHL bombing plot, Dieter Schmidt and his colleagues for plotting bombing and arson attacks against U.S. bases in Germany, alleged GRU operative Mikhail Mikushin (also known José Assis Giammaria) who was arrested by Norway for subversive activities, and Siergey S. for his apparent involvement in arson attacks in Poland.91-Closing borders, such as the decision by Finland in November 2023 to close its 830-mile (1,340-kilometer) border with Russia in part because of Russia’s weaponization of illegal immigrants.Imposing limited sanctions on individuals, companies, and other perpetrators of active measures. For example, the European Union sanctioned Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov—operatives in GRU Unit 29155—for their alleged involvement in cyberattacks targeting Estonia.92-Defense is necessary, but not sufficient. These actions are not particularly costly for Russia and are unlikely to coerce Moscow into ending, or even reducing, its active measures. Western countries have decided not to impose more significant costs for several reasons. First, some leaders have worried that a more robust response would cause further Russian escalation. As one analysis concluded, “Western leaders are reluctant to call for a larger military response to these attacks, which could trigger uncontained escalation.”93 Second, some have opposed a more robust response because they argue that the West is not “at war” with Russia. As one assessment summarized, “the West may be limited in the kinds of counteroperations it can launch in the face of continued acts of Russian sabotage. For one thing, the United States and its allies cannot easily respond in kind, because they are not officially at war with Russia.”94-Unlike authoritarian countries such as Russia, this logic assumes that democratic countries cannot—or should not—conduct forceful actions against Russia because they are not involved in a declared war. Yet these concerns are largely fallacious, and they reflect a mindset of self-deterrence. Russia, not Europe or the United States, chose to escalate a shadow war in Europe. In fact, a failure to respond will likely increase the likelihood of a protracted Russian campaign.Instead, NATO should complement these defensive measures with a calibrated offensive campaign that focuses on several elements. These actions could be integrated into broader negotiations on a peace deal with Ukraine, in which the United States or European countries threaten—either implicitly or explicitly—offensive measures if Russia continues its sabotage campaign.First, NATO should develop and communicate a clearer strategy that involves ramping up sanctions to stop Moscow’s shadow war in Europe. This approach might include increasing secondary sanctions against countries that import Russian goods, including oil and gas, as well as sanctioning additional entities and individuals involved in illegal Russian exports.Second is an increase in NATO covert and overt actions. For example, Russia’s shadow fleet, which is illegally shipping oil and gas to overseas markets, is vulnerable to seizure. Russia also has oil and gas pipelines that are vulnerable to sabotage.Third is conducting targeted offensive cyber operations against important Russian military and commercial targets, including the networks of Russia’s energy sector that are vital to Russia’s economy. There was some reporting that U.S. Cyber Command briefly halted offensive cyber opera­tions against Russia in an effort to draw President Putin into talks on Ukraine, though some Pentagon officials denied these reports.95 Offensive cyber operations against Russia remain an important stick that can be used if Russian sabo­tage and subversion continues.Fourth, NATO countries should conduct a more aggressive offensive information campaign targeting the populations of Russia and its partners, such as Belarus, devised to counter state-run media.An offensive campaign should be designed to signal to Moscow that continued active measures in Europe will be costly. In short, a successful Western campaign needs to be coercive to change Moscow’s behavior, and the pain has to appear contingent on Russian behavior. But a strategy that does not include raising the costs on Moscow is likely to fail.This report was updated on March 20, 2025, to reflect findings from an internal investigation conducted by BAE Systems on the 2024 explosion at its weapons manufacturing site in South Wales.Seth G. Jones is president of the Defense and Security Department at the Center for Strategic and International Studies in Washington, D.C.The author wishes to thank Katherine Trauger, Iselin Brady, and Riley McCabe for their help in building the database and for other research assistance during the research, writing, and production phases. Thanks also to Daniel Byman and Philip Wasielewski for their reviews of the document and outstanding comments.This brief was made possible through general funding to CSIS.

 

ALLTIME