Tag: Hybrid Threats

Antagonistic Information Threats: Lessons from Ukraine

Control room with multiple broadcast monitors showing a political speech, illustrating “antagonistic information threats” in modern media environments.

Russia’s full-scale invasion of Ukraine highlights how modern conflict increasingly relies on antagonistic information threats alongside military force. This policy brief examines how such threats operate and what lessons they offer for European resilience. First, it outlines a framework through which hostile actors gradually weaken societies’ capacity to interpret events and trust institutions. Second, the brief analyzes Ukrainian cyber operations, highlighting that sustained defensive investment can reduce destructive impact even as attack activity intensifies. The brief further examines the economic implications, showing that antagonistic threats create continuous fiscal pressure as monitoring, detection, and incident response become permanent public expenditures rather than temporary crisis measures. Finally, the brief draws policy implications for Europe, stressing the need to treat cyber and information resilience as macro-critical infrastructure and to strengthen coordination across policy domains.

Introduction

Ukraine’s experience since the full-scale invasion of 2022 illustrates how antagonistic threats operate in contemporary conflict. The war demonstrates that modern confrontation extends far beyond conventional military force. Instead, it functions as a hybrid system in which military, informational, economic, and political instruments are combined into a coordinated architecture of pressure. While this dynamic is most visible in active war, its underlying mechanisms are not confined to the battlefield. Similar forms of antagonistic pressure are increasingly directed at European societies despite the absence of open military confrontation.

Within this broader system, information threats have become particularly significant, largely due to technological change and the digitalization of communication. Networked information environments allow hostile actors to combine cyber operations, disinformation campaigns, and other forms of manipulation at low cost and large scale, amplifying the effects of other forms of pressure. Information operations can shape how events are interpreted, undermine institutional trust, and influence political behavior, often reinforcing technical disruption or economic coercion.

This brief focuses on antagonistic information threats — hostile activities that include disinformation campaigns, cyber operations, and other forms of manipulation targeting the information environment. We first outline a structural framework for understanding the targets and effects of such threats. We then examine how cyber operations have been used in Ukraine and assess their associated costs. The brief concludes with policy lessons relevant for strengthening resilience in European societies.

Layers of Antagonistic Information Influence

Understanding antagonistic information threats requires moving beyond viewing disinformation or cyber incidents as isolated events. Instead, these activities form a structured and multi-layered architecture of pressure aimed at gradually degrading democratic governance. Rather than aiming for immediate institutional breakdown, these operations gradually weaken a society’s capacity to interpret events, trust institutions, and act collectively across four interconnected layers: cognitive, institutional, informational, and behavioral. This four-layer framing synthesizes Ukraine’s wartime practice with established research on cognitive warfare and decision-making manipulation, hybrid warfare, and institutional effectiveness (NATO STO, n.d.; Havlík & Horáček, 2026; Tsybulska, 2023; World Bank, 2017).

At the cognitive layer, hostile actors target how individuals interpret reality, shaping threat perception, responsibility attribution, and identity boundaries. This dynamic is well documented in research on cognitive warfare and reflexive control, which demonstrates that perception manipulation can redirect strategic decision-making without direct confrontation (Havlík & Horáček, 2026; Thomas, 2004). By exploiting uncertainty, fear, and emotional triggers, adversaries influence how citizens understand crises before institutional responses even occur. Cognitive distortion thus lays the foundation for broader destabilization.

At the institutional layer, hostile actors target trust in government, elections, and public authority. Evidence from hybrid warfare analysis demonstrates that weakening institutional legitimacy degrades both crisis response and democratic resilience (OECD, 2022; World Bank, 2017). As Tsybulska (2023) argues, delegitimization, rather than outright destruction, is often the central objective of a hybrid strategy. When public trust erodes, policy implementation fragments, and crisis communication loses authority.

The informational layer addresses narrative dominance and agenda-setting. Hostile actors use saturation, repetition, and cross-platform amplification to ensure that adversarial frames define the terms of public debate (McCombs & Shaw, 1972; Paul & Matthews, 2016). The goal is not simply to spread falsehoods but to normalize certain interpretations over time, embedding them into how societies process political reality (Tsybulska, 2024).

Finally, the behavioral layer translates perception and narrative control into observable outcomes, from voting behavior and protest mobilization to compliance with policy measures and support for defense decisions. Research on misinformation and political behavior demonstrates that even marginal shifts in turnout, polarization, or policy support can generate significant strategic consequences (Allcott & Gentzkow, 2017). Behavioral influence does not require majority conversion; small distortions at scale can reshape political outcomes.

Ukraine’s post-2022 experience shows that antagonistic information threats function as a long-term governance pressure system, designed for erosion. This is why recognizing the layered architecture of these threats is essential for building durable resilience.

Threats at the Operational Level: Lessons from Ukraine

Ukraine’s wartime experience illustrates how antagonistic information threats operate in practice, particularly through cyber operations. Unlike kinetic warfare, cyber operations continue even during ceasefires: they are relatively low-cost, scalable, and persistent, generating both technical disruption and information that can later be exploited in influence campaigns.

The Computer Emergency Response Team of Ukraine (CERT-UA) recorded 4,315 cyber incidents in 2024, nearly a 70% increase over 2023 and more than triple the 2021 level (SSSCIP/CERT-UA, 2025c). In the first half of 2025 alone, incidents increased by a further 17% (SSSCIP/CERT-UA, 2025b). These figures reflect strategic structural pressure, as shown in Table 1.

Table 1. Registered cyber incidents in Ukraine, 2021–2024

Source: CERT-UA / State Service of Special Communications and Information Protection of Ukraine (SSSCIP), Russian Cyber Operations: Analytics for the Second Half of 2024.At the same time, a parallel trend deserves attention: while overall incident volume rose sharply, critical and high-severity incidents declined by 94% between 2022 and 2024 (SSSCIP/CERT-UA, 2025a). Ukrainian authorities attribute this to strengthened monitoring networks, early detection mechanisms, and international cooperation. The policy conclusion is clear: sustained defensive investment reduces destructive impact even as attack frequency increases.

The operational model has also evolved. Rather than prioritizing spectacular disruption, campaigns increasingly emphasize persistent access, credential theft, and selective data exfiltration, so-called ‘steal and go’ tactics (SSSCIP/CERT-UA, 2025b). The objective is chronic degradation rather than dramatic collapse. Data theft supports later narrative exploitation; minor disruption normalizes instability; repeated low-grade incidents strain administrative capacity.

This shift aligns with the broader strategic goal identified in Ukrainian cybersecurity reporting: producing distrust, paralysis, delayed response, societal fatigue, and long-term strategic advantage. The sectoral and methodological breakdown confirms this pattern (Table 2).

Table 2. Target sectors and attack methods in Ukraine in 2024

Source: CERT-UA/SSSCIP, Russian Cyber Operations: Analytics for the Second Half of 2024. Sector figures are incident counts; method figures reflect malware-specific incidents.

Artificial intelligence (AI) further accelerates this dynamic. Large-scale content saturation campaigns, such as the Pravda/Portal Kombat network, have been documented flooding digital ecosystems and targeting AI retrieval environments (American Sunlight Project, 2025; Sadeghi & Blachez, 2025). While academic debate continues over the scale of LLM manipulation (Alyukov et al., 2025), the strategic investment in content flooding is well documented.

Generative AI reduces the marginal cost of producing multilingual disinformation. CERT-UA has also identified indications of AI-assisted scripting in phishing and malware deployment (SSSCIP/CERT-UA, 2025b). As Havlík and Horáček (2026) warn, AI increasingly enables the precision targeting of cognitive vulnerabilities, thereby compressing defenders’ response time.

These dynamics illustrate how cyber operations generate effects across the four layers of antagonistic information influence identified earlier. Repeated incidents and data leaks shape the informational environment; narrative exploitation of stolen or manipulated data affects how events are cognitively interpreted; persistent disruptions undermine institutional credibility and crisis response; and accumulated uncertainty ultimately influences political and societal behavior.

Crucially, antagonistic information threats do not operate alone. They are part of a synchronized system of persistent pressure. Cyber operations, Foreign Information Manipulation and Interference, economic coercion, electronic warfare, and kinetic activity are integrated into a unified strategy. Ukrainian authorities report temporal synchronization between cyber intrusions, energy-sector targeting, and missile strikes (SSSCIP/CERT-UA, 2025a). Narrative campaigns frame events before and after disruption; cyber operations generate exploitable material; economic pressure increases uncertainty; kinetic or electronic actions amplify fear. The compound effect exceeds what any single domain could achieve on its own.

Ukrainian experience highlights vulnerabilities relevant for Europe more broadly. Hybrid pressure operates as a synchronized, multi-domain system in which military, informational, economic, and political instruments reinforce one another. European governance, however, addresses these domains through separate institutional channels. Energy security, cyber defence, strategic communications, and democratic resilience are managed in distinct policy silos with different authorities and threat perceptions. This fragmentation creates exploitable gaps: an adversary operating through tightly coordinated cross-domain pressure can exploit exactly the delays and blind spots that institutional separation produces.

The lesson from Ukraine is therefore not limited to wartime resilience. Even without open conflict, antagonistic actors can pursue gradual systemic pressure by targeting infrastructure, information, economic vulnerabilities, and institutional trust simultaneously. Effective resilience, therefore, requires moving beyond sectoral responses toward integrated governance capable of anticipating and responding to coordinated cross-domain pressure.

Economic Costs of Antagonistic Information Threats

Antagonistic information threats are persistent and structurally embedded, which means their economic implications extend beyond isolated incidents. Ukraine’s experience provides a rare empirical case showing how these costs accumulate and how sustained investment can mitigate them. Hybrid pressure does not produce only one-off destruction; it generates continuous fiscal demand. Monitoring, detection, and incident response systems have therefore become permanent budget items rather than crisis expenditures.

In 2024 alone, national monitoring systems processed hundreds of billions of telemetry events, identified around 3 million security events, and confirmed 1,042 cyber incidents requiring formal response (SSSCIP, 2024). These figures illustrate that antagonistic threats impose a constant administrative and financial burden, underscoring the fiscal consequences of inaction.

Ukraine’s cybersecurity market reached approximately 138 million USD in 2024, having quadrupled over eight years (SSSCIP, 2024). This growth reflects systemic adaptation under sustained pressure rather than discretionary digital modernization. The statistics in Table 1 show that investment did not eliminate the threat, but it fundamentally reduced its destructive impact. The burden falls disproportionately on public administration. With 76% of recorded incidents targeting government, local authorities, and the defense-industrial sector, the fiscal weight of cybersecurity concentrates where the budgets are most constrained. In this way, the institutions most essential to democratic governance bear the highest cost of defence.

Beyond direct-response spending, antagonistic threats impose systemic economic costs. Insurance premiums rise while cyber coverage narrows; compliance costs increase under frameworks such as NIS2, and procurement and crisis coordination become slower and more complex. As public administration becomes a primary target, trust and institutional credibility weaken, raising coordination costs across markets and public systems. As a result, governance efficiency itself becomes economically vulnerable.

At the same time, the costs of inaction are substantial. At the European level, ENISA estimates total cyber-related losses over five years at approximately €300 billion, with Germany alone reporting €205.9 billion in losses in 2023 (Nagy, 2023). While these figures do not isolate state-linked hybrid operations, they indicate the fiscal environment in which antagonistic threats operate and suggest a scale of what unmitigated exposure would cost.

The EU’s persistent security workforce deficit of 260,000 to 500,000 specialists (ENISA, 2024) further constrains the capacity for the type of sustained defensive investment that Ukraine’s experience shows to be effective.

Table 3 highlights a central policy lesson. In Ukraine, both the number of detected threats and the capacity to identify them increased sharply, while the share of destructive incidents declined significantly. This demonstrates that rising incident volume does not necessarily translate into rising damage. It thus indicates that the economic trade-off is not between security spending and fiscal savings, but between investing in preventive resilience and absorbing escalating systemic costs.

Table 3. The Returns on Sustained Investment, Ukraine

Sources: CERT-UA/SSSCIP (2025a, 2025b, 2025c); SSSCIP (2024); ENISA (2024); Howden (2025).

In economic terms, resilience reduces the probability of high-impact shocks, whereas delayed investment merely defers their costs. For European policymakers, cyber and information resilience must be treated as macro-critical infrastructure, with financial consequences extending well beyond IT systems into fiscal stability, labour markets, and long-term growth.

Conclusions

Ukraine’s experience since 2022 demonstrates that antagonistic information threats must be treated as a systemic governance challenge, not just a communication problem. Operating simultaneously across cognitive, institutional, informational, and behavioral layers, these threats aim to erode decision-making capacity rather than trigger immediate collapse. The strategic objective is gradual fragmentation of perception, trust, narrative coherence, and ultimately political action. For policymakers, the implication is straightforward: resilience must be built across all four layers.

Moreover, Ukraine’s operational data demonstrates that antagonistic information threats are persistent, adaptive, AI-accelerated, and strategically synchronized. Resilience must therefore be systemic, coordinated, and anticipatory, not reactive and sector-bound.

Ukrainian experience shows that sustained investment did not eliminate cyber pressure, but it dramatically reduced high-severity impact while expanding detection capacity. At the same time, the burden of defense falls disproportionately on public administration. Treating resilience spending as macro-critical infrastructure investment could be part of the solution.

References

Disclaimer: Opinions expressed in policy briefs and other publications are those of the authors; they do not necessarily reflect those of the FREE Network and its research institutes.

What Europe Can Learn From Ukraine’s Battle Against Information Aggression

Panelists and moderators at Stockholm School of Economics discussing Ukraine Information Aggression during an academic event.

On 12 February 2026, the Stockholm Institute of Transition Economics (SITE), the Center for Statecraft and Strategic Communication (CSSC) at SSE, and the Swedish Ukrainian Chamber of Commerce in Scandinavia (SUCC) hosted a high-level seminar on how democracies should respond to information aggression and hybrid threats. The event brought together Ukrainian officials, researchers, and business experts to share lessons from more than a decade of confronting Russia’s information warfare. As a result, the discussion offered guidance for European policymakers, regulators, and civil society leaders.

Ukraine’s Experience with Information Aggression

For Ukraine, information aggression is a daily reality rather than a theoretical risk. Since 2014, hostile disinformation, manipulation, and psychological pressure have preceded and accompanied every major escalation of Russia’s war. Consequently, Ukraine has learned that shifts in the information space often signal impending military, economic, or cyber shocks.

Experts from SITE, CSSC, and SUCC emphasized that information aggression is not merely a media issue, but also a matter of security, economic stability, and governance. They further stressed that universities and policy institutes play a critical role in transforming frontline experience into practical guidance.

In their opening remarks, SITE Director Torbjörn Becker and CSSC Director Rikard Westerberg argued that information operations must be treated as a core component of modern conflict. Ukrainian diplomats noted that information warfare often shapes alliances and delays international responses long before tanks move. Ignoring information aggression, therefore, leaves democracies divided, unprepared, and economically vulnerable.

Analysis and Key Insights

Narratives, Trust, and the Cognitive Battlefield

Keynote speaker Liubov Tsybulska, Director of the Center for Strategic Communications and Information Security in Ukraine, described the information space as a central battlefield. She showed how narrative flooding, dehumanisation, and strategic ambiguity can erode trust and break alliances over time. In this context, perception becomes as important as territory.

Therefore, trust in institutions, media, and expert communities is both the main target and the main defence. Long-term investment in institutional credibility and transparent decision-making is crucial. In addition, Ukraine’s experience shows that early detection of hostile narratives, rapid factual responses, and careful avoidance of amplifying false content are vital tools.

Institutions and Digital Resilience

Advisor Natalia Mishyna from Ukraine’s State Service of Special Communications and Information Protection focused on institutional adaptation. Ukraine has strengthened digital infrastructure protection, electoral security, and crisis communication across government and civil society. As a result, the country has built faster incident response and clearer lines of responsibility.

For Europe, the key lesson is that cybersecurity, strategic communication, and public outreach must be integrated rather than separated into silos. Many EU states have hybrid threat or cyber units. However, coordination often remains fragmented and reactive. Therefore, more unified structures that link technical security with clear public messaging are needed.

Markets, Media, and Incentives

Associate Professor Carlos Diaz Ruiz from Hanken School of Economics added a market-based view. He underlined that information aggression exploits weaknesses in media and platform business models. Sensational and polarising content can be rewarded by advertising systems even when it harms democratic resilience.

Consequently, regulatory frameworks, competition policy, and platform governance all influence how hostile narratives spread. Responses cannot treat media and technology firms as passive channels. Instead, they must align private-sector incentives with the broader goal of information resilience.

Key Lessons from Ukraine for Europe

Across the seminar, several concise lessons for Europe emerged:

  • Information aggression is a systemic risk that affects security, markets, and social cohesion.
  • Trust and credibility are core defence assets, not soft add-ons.
  • Civil society and state coordination are essential for response and recovery.
  • International cooperation is necessary, as information threats ignore borders.

Taken together, these insights show that information aggression is a persistent strategic challenge embedded in wider hybrid warfare, not a temporary disturbance.

Why It Matters

Implications for European Democracies

Since the full-scale invasion of Ukraine in 2022, hybrid operations against European societies have become more frequent and complex. These include cyber attacks, targeted narrative campaigns, and energy-related disinformation. Ukraine’s experience illustrates the cost of underestimating such activities.

When information aggression goes unchecked, it can reduce support for sanctions and military assistance. It can also deepen social polarisation and weaken trust in elections, public health measures, and climate policy. Therefore, national security strategies, risk assessments, and crisis exercises must include the information dimension as a central pillar.

Policy and Governance Priorities

The EU has already launched frameworks to counter hybrid threats, yet implementation often lags behind the pace of attacks. Ukraine’s experience suggests three priorities for Europe.

  • First, countries should embed information resilience into total defence and security planning, not just media policy.
  • Second, rules for online platforms, political advertising, and data use should explicitly consider how they can be misused by information aggression.
  • Third, cross-border strategic communication must improve, as hostile narratives are rarely limited to one country.

At the same time, responses must stay grounded in democratic values. Heavy-handed censorship can damage the trust that democracies seek to protect. Consequently, transparency, accountability, and open engagement with citizens are essential elements of any credible strategy.

Conclusion: Building Information Resilience

The SSE seminar delivered a clear message: Europe cannot afford to ignore information aggression. Ukraine’s experience shows that early recognition, coordinated action, and sustained investment in trust-building can limit long-term damage from hybrid campaigns.

Going forward, European governments, businesses, and civil society organisations will need to treat information resilience as a continuous task. Moreover, deeper cooperation with Ukrainian institutions and experts can help Europe avoid repeating costly mistakes. By convening diplomacy, security, research, and business communities, SSE and its partners contribute to a growing community of practice on countering information aggression. In this way, they highlight that defending the information space is now central to protecting open and resilient European societies.

Suggested Additional Resources

  • EUvsDisinfo: East Stratcom Task Force, a team of experts with a background mainly in communications, journalism, social sciences, and Russian studies. Part of the EU’s diplomatic service, which is led by the EU’s High Representative.
  • NATO StratCom COE: Contributes to improved strategic communications capabilities within NATO and Allied nations. Strategic communication is an integral part of the efforts to achieve the Alliance’s political and military objectives, thus it is increasingly important that the Alliance communicates in an appropriate, timely, accurate and responsive manner on its evolving roles, objectives, and missions.
  • Hybrid CoE: The European Centre of Excellence for Countering Hybrid Threats is an autonomous, network-based international expert organization dedicated to addressing hybrid threats.

Suggested Policy Briefs

  • Ukraine and NATO – Evidence from Public Opinion Surveys. This policy brief analyzes how public opinion in Ukraine has shifted over time toward unprecedented support for NATO membership—especially in response to repeated Russian aggression—and examines regional differences and the broader societal implications of this change.
  • Russia’s Data Warfare. This policy brief discusses how, after Russia’s invasion of Ukraine in 2022, the Kremlin has systematically withheld and obscured key economic statistics to hinder transparency and analysis of its economy and the effects of sanctions as part of a broader disinformation strategy, and explores alternative ways to assess Russia’s economic performance despite the lack of reliable official data.
  • Trending? Social Media Attention on Russia’s War in Ukraine. This policy brief examines how social media attention to Russia’s war in Ukraine, especially trending hashtags on platforms like X/Twitter across 62 countries, has fluctuated over time, revealing patterns of global public engagement and interest in the conflict beyond traditional news coverage.