3,503
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Organizing cyber capability across military and intelligence entities: collaboration, separation, or centralization

Pages 131-145 | Received 07 May 2022, Accepted 14 Sep 2022, Published online: 29 Sep 2022

References

  • Backman, Sara. 2021. “Conceptualizing Cyber Crises.” Journal of Contingencies and Crisis Management 29 (4): 429–438. doi:10.1111/1468-5973.12347.
  • Boeke, Sergei. 2018a. “National Cyber Crisis Management: Different European Approaches.” Governance 31 (3): 449–464. doi:10.1111/gove.12309.
  • Boeke, Sergei. 2018b. “Hackers, Wiz Kids, en Offensieve Cyberoperaties.” Atlantisch Perspectief 42 (5): 27–30.
  • Buchanan, Ben. 2016. The Cybersecurity Dilemma: hacking, Trust, and Fear between Nations. New York: Oxford University Press.
  • Bunk, Joost, and Max Smeets. 2021. “Dutch Cyber Security Strategy.” In Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian, 132–142. London: Routledge.
  • Burton, Joe, and George Christou. 2021. “Bridging the Gap between Cyberwar and Cyberpeace.” International Affairs 97 (6): 1727–1747. doi:10.1093/ia/iiab172.
  • Burkhard, Thierry. 2021. Strategic Vision of the Chief of Defense Staff.
  • Cavelty, D. Myriam Dunn, and Andreas Wenger. 2020. “Cyber Security Meets Security Politics: Complex Technology, Fragmented Politics, and Networked Science.” Contemporary Security Policy 41 (1): 5–32. doi:10.1080/13523260.2019.1678855.
  • Chesney, Robert. 2020. “Ending the “Dual-Hat” Arrangement for NSA and Cyber Command?” Lawfare, December 20.
  • Chopin, Olivier. 2017. “Intelligence Reform and the Transformation of the State: The End of a French Exception.” Journal of Strategic Studies 40 (4): 532–553. doi:10.1080/01402390.2017.1326100.
  • Christensen, K. Kristoffer, and Tobias Liebetrau. 2019. “A New Role for ‘the Public’? Exploring Cyber Security Controversies in the Case of WannaCry.” Intelligence and National Security 34 (3): 395–408. doi:10.1080/02684527.2019.1553704.
  • Claver, Alexander. 2018. “Governance of Cyber Warfare in The Netherlands: an Exploratory Investi- Gation.” The International Journal of Intelligence, Security, and Public Affairs 20 (2): 155–180. doi:10.1080/23800992.2018.1484235.
  • Commission du Livre blanc sur la défense et la sécurité nationale 2008. Livre Blanc sur la Défense et Sécurité nationale 2008.
  • Conger, Kate, and Sheera Frenkel. 2021. “Thousands of Microsoft Customers May Have Been Victims of Hack Tied to China.” New York Times, March 6 and August 26.
  • Crerar, Pippa, Jon Henley, and Patrick Wintour. 2018. “Russia Accused of Cyber-Attack on Chemical Weapons Watchdog.” The Guardian, October 4.
  • Defence Cyber Command 2019. The Netherlands Armed Forces Doctrine for Military Cyberspace Operations.
  • Delerue, F. 2020. Cyber Operations and International Law. Cambridge: Cambridge Unitersity Press.
  • Demchak, C. Chris. 2021. “Five Reasons Not to Split Cyber Command from the NSA Any Time Soon – If Ever.” War on the Rocks, March 5.
  • Desforges, Alix. 2022. “Separation of Offensive and Defensive Functions: The Originality of the French Cyberdefense Model Called into Question?” In Conflicts, Crimes and Regulations in Cyberspace. Volume 2, edited by Sébastien-Yves Laurent, 63–88. London and Hoboken: ISTE and Wiley.
  • Devanny, Joe, and Tim Stevens. 2021. “What Will Britain’s New Cyber Force Actually do?” War on the Rocks, May 26.
  • Ducheine, P. A. L., K. L. Arnold, and Pijpers Peter. 2020. “Decision-Making and Parliamentary Control for International Military Cyber Operations by The Netherlands Armed Forces.” In Amsterdam Law School Research Paper No. 2020-07, 1–22. Amsterdam: Amsterdam Center for International Law.
  • European Union External Action Service 2022. A Strategic Compass for Security and Defence: For a European Union That Protects Its Citizens, Values and Interest and Contributes to International Peace and Security. Bruxelles.
  • Michael, Fischerkeller. P, and Richard. J. Harknett. 2020. Cyber Persistence Theory, Intelligence Contests and Strategic Competition. Institute for Defense Analyses, Alexandria, Virginia.
  • Florant, Jean-Baptiste. 2021. “Cyberarmes: La Lutte Informatique Offensive Dans la Manaeuvre Future.” Focus Stratégique n° 100, Ifri.
  • Forsvarsdepartementet 2014. Forsvarsdepartementets retningslinjer for informasjonssikkerhet og cyberoperasjoner.
  • Forsvarsdepartementet 2018. Høringsnotat. Forslag til ny lov om Etterretningstjenesten.
  • Forsvarsdepartementet 2019a. Prop. 1S (2019–2020).
  • Forsvarsdepartementet 2019b. cyberoperasjoner [cyber operations]. Letter to the author.
  • Forsvarsdepartementet 2020. Prop. 14 S (2020–2021). Evne til forsvar – vilje til beredskap. Langtidsplan for forsvarssektoren
  • Flybjerg, Bent. 2006. “Five Misunderstandings about Case-Study Research.” Qualitative Inquiry 12 (2): 219–245.
  • Gartzke, Erik, and Jon. R. Lindsay. 2015. “Weaving Tangled Webs: offense, Defense, and Deception in Cyberspace.” Security Studies 24 (2): 316–348. doi:10.1080/09636412.2015.1038188.
  • Géry, Aude. 2020. “The French Cyber Defence Strategy.” Penseemiliterre, March 27.
  • Gioe, David. V., Michael. S. Goodman, and Time Stevens. 2020. “Intelligence in the Cyber Era: evolution or Revolution?” Political Science Quarterly 135 (2): 191–224. doi:10.1002/polq.13031.
  • Amaelle, Guiton. 2020. “Cyber à la Française: l’attaque et la Défense, de la” Séparation à” L’interaction.” Liberation, January 30.
  • Guédard, Le Martial. 2020. Gestion de crise et chaînes cyber: organisation européenne et française, Institut des hautes études du ministère de l‘Intérieur. https://www.ihemi.fr/articles/organisation-france-europe-cybersecurite-cyberdefense-V2
  • Haataja, S. 2019. Cyber Attacks and International Law on the Use of Force – The Turn to Information Ethics. London: Routledge.
  • Harknett, Richard. J, and Max Smeets. 2022. “Cyber Campaigns and Strategic Outcomes.” Journal of Strategic Studies 45 (4): 534–567. doi:10.1080/01402390.2020.1732354.
  • Hogeveen, Bart. 2018. A Rare Insight into Cyber Espionage: Dutch Intelligence and Two Russian Bears. Australian Strategic Policy Institute.
  • Jacobsen, Jeppe. T. 2021. “Cyber Offense in NATO: challenges and Opportunities.” International Affairs 97 (3): 703–720. doi:10.1093/ia/iiab010.
  • Liebetrau, Tobias. 2022. “Cyber Conflict Short of War: A European Strategic Vacuum.” European Security 1–20. online first. doi:10.1080/09662839.2022.2031991.
  • Liebetrau, Tobias, and Kristoffer Christensen. 2021. “The Ontological Politics of Cyber Security: Emerging Agencies, Actors, Sites, and Spaces.” European Journal of International Security 6 (1): 25–43. doi:10.1017/eis.2020.10.
  • Lindsay, Jon. R. 2021. “Cyber Conflict vs. Cyber Command: hidden Dangers in the American Military Solution to a Large-Scale Intelligence Problem.” Intelligence and National Security 36 (2): 260–278. doi:10.1080/02684527.2020.1840746.
  • Matania, Eviatar, Lior Yoffe, and Tal Goldstein. 2017. “Structuring the National Cyber Defence: in Evolution towards a Central Cyber Authority.” Journal of Cyber Policy 2 (1): 16–25. doi:10.1080/23738871.2017.1299193.
  • Ministère des Armées 2019a. Politique ministérielle de lutte informatique défensive.
  • Ministère des Armées 2019b. Éléments publics de doctrine militaire de lutte informatique offensive.
  • Ministère des Armées 2021. Éléments publics de doctrine militaire de lutte informatique d’influence.
  • Ministry of Defense 2015. Defense cyber strategy.
  • Ministry of Defense 2018. Defense cyber strategy.
  • Ministry of Defense 2020. Defence Vision 2035: Fighting for a secure future.
  • NATO 2022. NATO 2022 Strategic Concept. Madrid.
  • Newman, H. Lily. 2021. “A Year After the SolarWinds Hack, Supply Chain Threats Still Loom.” Wired, December 8.
  • Pernik, Piret. 2020. “National Cyber Commands.” In Routledge Companion to Global Cyber-Security Strategy, edited by Scott N. Romaniuk and Mary Manjikian, 186–198. London: Routledge.
  • Roscini, M. 2014. Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press.
  • Rovner, Joshua. 2020. “What is an Intelligence Contest?” Texas National Security Review 3 (4): 114–120.
  • David, Sanger. E, and Nicole Perlroth. 2021. “Pipeline Attack Yields Urgent Lessons About U.S. Cybersecurity.” New York Times, May 14 and June 8.
  • Secrétariat général de la défense et de la sécurité nationale 2018. Revue stratégique de cyberdéfense.
  • Secrétariat général de la défense et de la sécurité nationale 2019. Manifeste: Pour l’ANSSI des dix prochaines années - pour l’écosystème de la cybersécurité.
  • Schmitt, M. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd ed. Cambridge: Cambridge University Press.
  • Slayton, Rebecca. 2017. “What is the Cyber Offense-Defense Balance? Conceptions, Causes and Assessment.” International Security 41 (3): 72–109. doi:10.1162/ISEC_a_00267.
  • Smeets, Max. 2018. “A Matter of Time: on the Transitory Nature of Cyberweapons.” Journal of Strategic Studies 41 (1-2): 6–32. doi:10.1080/01402390.2017.1288107.
  • Smeets, Max. 2018. “Integrating Offensive Cyber Capabilities: meaning, Dilemmas, and Assessment.” Defence Studies 18 (4): 395–410. doi:10.1080/14702436.2018.1508349.
  • Smeets, Max. 2019. “NATO Members’ Organizational Path towards Conducting Offensive Cyber Operations: A Framework for Analysis.” Paper presented at the 11th International Conference on Cyber Conflict. Silent Battle, NATO CCD COE Publications, Tallinn.
  • Smeets, Max. 2021. The Challenges of Military Adaption to the Cyber Domain: A Case Study of the Netherlands Paper presented at the 2021 Conference on Cyber Norms: Governing through crisis. Conflict, crises, and the politics of cyberspace.
  • Smeets, Max. 2022. “Cyber Arms Transfer: Meaning, Limits, and Implications.” Security Studies 31 (1): 65–91. doi:10.1080/09636412.2022.2041081.
  • Taillat, Stéphane. 2019. “Signaling, Victory, and Strategy in France’s Military Cyber Doctrine.” War on the Rocks, May 8.
  • Villarreal, Aleandra. 2021. “Russian SolarWinds Hackers Launch Email Attack on Government Agencies.” The Guardian, May 28.
  • Weiss, Moritz, and Vytautas Jankauskas. 2019. “Securing Cyberspace: How States Design Governance Arrangements.” Governance 32 (2): 259–275. doi:10.1111/gove.12368.
  • Yin, Robert. K. 2014. Case Study Research: Design and Methods. Los Angeles, CA: Sage.