Open Access

The Role of Civilian Cybersecurity Companies in Military Cyber Operations

   | Feb 28, 2024

Cite

Amazon. (2023). Amazon’s cybersecurity assistance for Ukraine. Amazon. Available at: https://www.aboutamazon.com/news/community/amazons-cybersecurity-assistance-for-ukraine. Search in Google Scholar

Conti, G., & Raymond, D. (2011). Leadership of Cyber Warriors: Enduring Principles and New Directions. Small Wars Journal. Available at: https://smallwarsjournal.com/blog/journal/docs-temp/811-contiraymond.pdf. Search in Google Scholar

Davydiuk, A, & Zubok, V. (2023). Analytical Review of the Resilience of Ukraine’s Critical Energy Infrastructure to Cyber Threats in Times of War. 15th International Conference on Cyber Conflict: Meeting Reality, 121–140. DOI:10.23919/CyCon58705.2023.10181813. Search in Google Scholar

European Commission. (2020). The EU’s Cybersecurity Strategy for the Digital Decade. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0. Search in Google Scholar

European Commission. (2023). The EU Cyber Solidarity Act. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/policies/cyber-solidarity. Search in Google Scholar

European Commission. (2023). The DIGITAL Europe Programme – Work Programmes. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/activities/work-programmes-digital. Search in Google Scholar

European Commission. (2024). Shaping Europe’s digital future. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-policies. Search in Google Scholar

European Cybersecurity Competence Centre. (2024). The European Cybersecurity Competence Centre. ECCC. Available at: https://cybersecurity-centre.europa.eu/index_en. Search in Google Scholar

European Parliament and the Council. (2019). Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013. European Parliament and the Council. Available at: https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32019R0881. Search in Google Scholar

European Parliament and the Council. (2022). Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148. European Parliament and the Council. Available at: https://eur-lex.europa.eu/eli/dir/2022/2555. Search in Google Scholar

European Union External Action. (2022). A Strategic Compass for Security and Defence. European Union External Action. Available at: https://www.eeas.europa.eu/eeas/strategic-compass-security-and-defence-0_en. Search in Google Scholar

European Union. (2023). Cybersecurity Skills Academy: a coordinated approach to boost the EU cyber workforce. European Union. Available at: https://digital-skills-jobs.europa.eu/en/cybersecurity-skills-academy. Search in Google Scholar

Fabian, S. (2019). The Russian hybrid warfare strategy – neither Russian nor strategy. Defense & Security Analysis, Vol. 35, Issue 3, 308–325. DOI: 10.1080/14751798.2019.1640424. Search in Google Scholar

Fleming, J. (2022). RUSI Annual Security Lecture 2022. GCHQ. Available at: https://www.gchq.gov.uk/speech/rusi-asl. Search in Google Scholar

Giles, K. (2023). Russian cyber and information warfare in practice. London: Chatham House. ISBN: 978 1 78413 589 8. DOI: 10.55317/9781784135898. Search in Google Scholar

Google. (2023, February 24). Updates on our support for Ukraine. Google. Available at: https://blog.google/outreach-initiatives/public-policy/updates-google-support-for-ukraine/. Search in Google Scholar

Joint Cyber Advisory. (2022, April 20). Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure. U.S. Department of Defense. Available at: https://media.defense.gov/2022/Apr/20/2002980529/-1/-1/1/JOINT_CSA_RUSSIAN_STATE-SPONSORED_AND_CRIMINAL_CYBER_THREATS_TO_CRITICAL_INFRASTRUCTURE_20220420.PDF. Search in Google Scholar

Joyce, R. (2023, April 23). State of the Hack 2023. RSA Conference 2023. Available at: https://www.rsaconference.com/library/presentation/usa/2023/state%20of%20the%20hack%202023%20%20nsas%20perspective. Search in Google Scholar

Kaushik, A. (2023). Ukraine’s cyber defence: Insights on private sector contributions since the Russian invasion. GlobSec. Available at: https://www.globsec.org/what-wedo/publications/ukraines-cyber-defence-insights-private-sector-contributions-russian. Search in Google Scholar

Schmitt, M.N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press. ISBN: ISBN 978-1-107-17722-2. Search in Google Scholar

Schmuki, Y. (2023). The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict. In T. Jančárková, D. Giovannelli, K. Podiņš & I. Winther (Eds.), 15th International Conference on Cyber Conflict: Meeting Reality, 25–38. CCDCOE Publications. ISBN: 978-9916-9789-3-1 Search in Google Scholar

Smith, B. (2022, June 22). Defending Ukraine: Early Lessons from the Cyber War. Microsoft. Available at: https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/. Search in Google Scholar

Sosento, S. (2022). The IT Army of Ukraine. Structure, Tasking, and Eco-System. Center for Security Studies (CSS), ETH Zürich. DOI: 10.3929/ethz-b-000552293. Search in Google Scholar