| Infrastructure cyber attacks |
State-linked cyber units and aligned groups. |
Immediate to multi-week. |
Power, water, transport, and industrial control systems. |
Economic disruption and civilian pressure without overt battlefield escalation. |
| Financial system attacks |
State or proxy cyber operators. |
Sudden event risk. |
Payment rails, market infrastructure, banks. |
Confidence shock and liquidity stress. |
| Satellite interference |
State technical units. |
Intermittent; event-driven. |
ISR, communications, navigation support chains. |
Degraded targeting, coordination, and maritime safety. |
| GPS disruption/spoofing |
Regional electronic warfare actors. |
Localized but recurring. |
Maritime routes and aviation support corridors. |
Operational confusion and elevated accident risk. |
| Information warfare |
State media, online influence networks, bot ecosystems. |
Continuous. |
Public opinion, diaspora communities, political fault lines. |
Polarization and policy noise that slows coherent crisis management. |
| AI-enabled targeting support |
State militaries and advanced non-state technical teams. |
Growing medium-term use. |
Target selection, ISR triage, disinformation generation. |
Faster kill chains and faster narrative warfare cycles. |