"In the shadows we find truth, and in silence we ensure its revelation." - Manifesto of Digital Dissent, Chapter 4:3.

## Ukrainian IT Army

[RPT-008]

What catalyzed the formation of the IT Army of Ukraine, and what are its main objectives?

Russia's unprovoked invasion necessitated an asymmetrical response. With our nation's very existence under threat, we harnessed Ukraine's tech talent into a unified force - one capable of both fortifying our digital borders and taking the fight to the enemy's cyber domain. Our objectives are to disrupt Russian military operations through digital offensives while protecting Ukraine's critical infrastructure and keeping our people connected.

How does the IT Army ensure it adheres to ethical standards and international norms while conducting cyberwarfare?

This is uncharted territory ethically. While our cause is just, we recognize cyberweapons can inflict unintended damage. By pledging to follow the ICRC's guidelines, we hope to retain legitimacy and prevent escalation into all-out information warfare. Of course, we cannot be certain Russia's hackers follow the same restraint. It is a difficult balance, but we believe compliance, even where not reciprocated, serves Ukraine's long-term interests.

The IT Army has been involved in both defensive and offensive operations. Can you elaborate on these roles?

Our forces fight on two fronts - defensively protecting infrastructure and offensively disrupting the enemy. Defensive units prevent intrusions, maintain essential services and shore up vulnerabilities. Offensive teams infiltrate and degrade Russian systems, gather intelligence, and counter disinformation. Both require advanced technical skills, but also discretion - forgetting one's defenses to strike a blow still leaves you exposed.

How do you maintain operational security and vet volunteers given the open call for participation?

With an open-source volunteer model, we are vulnerable to infiltration and misinformation. Vetting starts online but privacy controls and compartmentalization help mitigate risks. Once cleared, volunteers get access to the resources necessary for their role. It's a balancing act - maintaining security while empowering those willing to join the digital frontlines. Not everyone can or should have the keys to the castle.

With various successful attacks against Russian infrastructure reported, what is the IT Army's measure of success?

It's not just Russian servers going dark that signal success, but also Ukrainian ones staying online. We measure victory both in terms of disruptions caused and stability maintained. Of course propaganda complicates this - both sides claim damage inflicted and denied. At the end of the day, our people connecting with loved ones, our officials coordinating response, is success. A darkened Kremlin is a cherry on top.

Can you comment on the collaboration with other hacking collectives, like Anonymous, and its impact?

There is strength in an aligned coalition. Groups like Anonymous swell our ranks and diversify our skillsets. Where we bring precision, they supply tenacity. Their brand of chaotic disruption pairs with our coordinated strikes to overwhelm the enemy. Together we send a message - that the global tech community stands with Ukraine. Our partnership brings agility, resilience and a multiplier effect to our impact.