By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Building the digital front line: Understanding big tech decision-making in Ukraine
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Building the digital front line: Understanding big tech decision-making in Ukraine
News

Building the digital front line: Understanding big tech decision-making in Ukraine

News Room
Last updated: 2025/11/17 at 10:36 AM
News Room Published 17 November 2025
Share
Building the digital front line: Understanding big tech decision-making in Ukraine
SHARE

Report

November 17, 2025 • 10:35 am ET


Building the digital front line: Understanding big tech decision-making in Ukraine

By
Emma Schroeder

Table of contents

Executive summary

The war in Ukraine has seen Russia launch and sustain a full-scale invasion across the information and physical domains against a country that has embraced technological development and increased technological and geopolitical connections to the United States, Canada, and Europe. Private technology companies have provided essential and often irreplaceable support to Ukraine following Russia’s invasion in 2022 and—especially in the early months of the conflict—did so largely without a request from an allied state or payment from Ukraine.

However, more than three years on, although the private sector’s assistance in Ukraine has been well-documented, the policymaking community at large is still largely unaware of how companies decided whether and how to provide technological support to and in Ukraine. Through open research as well as interviews and roundtable discussions with various private sector and government representatives, this report posits that companies were primarily motivated by a complex combination of factors in tandem, which pulled them toward or pushed them away from support. The factors pulling companies toward cooperation were the moral clarity of the conflict, and alignment with existing business opportunities. At the same time however, among factors pushing companies away from involvement in Ukraine was the difficulty of coordinating assistance in-country, as well as the risk of Russian retaliation. Meanwhile, both sets of factors were either enhanced—or mitigated—due to various actions taken by Ukraine, allied states, and international bodies. This includes Ukrainian tech diplomacy; the development of Ukraine’s technical capabilities; aid facilitations and coordination efforts by both various groups and entities; and risk mitigation efforts undertaken by both states and private companies.

Dependency on the private sector in the cyber domain has become a somewhat frequent refrain in domestic cybersecurity conversations. However, prior to the February 2022 Russian invasion of Ukraine, no one—not supranational bodies, states, or even companies themselves—was prepared for the role they would assume once the tanks rolled and the missiles fired.  The Russia-Ukraine conflict’s cyber dimension has revealed an underlying dependency on products, services, and infrastructure owned and operated by private companies. This has proved to be both a source of opportunity to enhance Ukraine’s defenses, while at the same time revealing fundamental risks and vulnerabilities. Given the heft and impact of technology companies in today’s digital infrastructure, let alone in conflict, it is essential that policymakers grasp this complex interplay of factors that influenced companies‘ decision-making as they headed in Ukraine, to inform planning or preparedness for future conflicts where the private sector will inevitably play a key role.

Introduction

Amid the Russia-Ukraine conflict, the private sector was and is a crucial line of defense and source of cyber resilience to a greater extent than any conflict previously observed. As the first case study of this phenomenon in an overt, conventional war, the past three years in Ukraine have clearly demonstrated how crucial the cyber and informational domain, and the private companies at its forefront, will be in competition, conflict, and war to come.

More than three years following the full-scale Russian invasion of Ukraine in the early morning of February 24, 2022, the war—and the crucial role of the international community in it—continues, but not unchanged. The war that Putin expected to end in Russian victory within a handful of days is now well into the third year of the largest and deadliest war in Europe since World War II.

This study examines the characteristics of this conflict that influenced companies’ decision-making regarding the type and degree of their involvement in Ukraine. Which factors and actions taken by states shaped tech companies’ decisions throughout the conflict as to whether and how to lend their support to Ukraine? These include both pull factors, those that increased the likeliness and degree of technology company involvement in Ukraine, and push factors, those that decreased the likeliness or degree of the same. Additionally, a key element influencing this space was the response by the Ukrainian government, allied governments, and international bodies to either build on the effects of the pull factors or mitigate the effects of the push factors throughout the conflict.

These factors and reactions are explored through open research, individual interviews with executives from tech companies active in Ukraine, and workshop discussions including private sector, civil society, and representatives from various governments. It puts forward the private sector’s perspective on its own involvement in Ukraine since the 2022 invasion, reflecting on opinions and actions as they stood at the time of initial decision but also on the lessons learned since. The intention is to contribute to a baseline of understanding of public-private cooperation in Ukraine so that future policy decisions, whether in the Ukraine context or beyond, are built upon a full evaluation of experience.

Clarity of conflict

Clarity of conflict refers to the perception of the “right” and “wrong” or “victim” and “perpetrator” in a conflict, among one or more set audiences, whose support has the potential to provide materiel aid. In examining the role of this factor in the provision of tech aid to Ukraine, these audiences are primarily state policymakers, general populations, and technology leaders in Europe and North America. Overwhelmingly, in both public reporting and private interviews, the central reason given by companies themselves for why private companies provide aid and services supporting Ukraine is the moral clarity that these companies, their employees, and a large portion of their customers saw in the conflict and its conduct. Many interviewed commented on how the Russo-Ukrainian War, distinct from most other conflicts, has a clear and binary “right” and “wrong” side in the perspective of at least most of the Western world, from governments to individuals. 

Russia engaged in continuous overt and covert aggressive action through a wide variety of coercive, though largely nonescalatory, tools in an attempt to exert control on Ukraine and its population. On February 24, 2022, however, Russia unleashed coordinated missile strikes on Ukrainian cities, airborne deployments of soldiers to key locations beyond the border region, conventional advancement across the border, and coordinated cyber aggression.

In March 2022, Amnesty International released a statement saying, in part, that “In less than a week, Russia’s invasion of Ukraine has triggered a massive human rights, humanitarian, and displacement crisis that has the makings of the worst such catastrophe in recent European history.” Photos and videos poured out of Ukraine, documenting Russian violence and war crimes against the people of that country. Reports on Russian atrocities and Ukrainian resistance dominated the headlines and news discussions in the West for months.  A Monmouth University survey conducted in March 2022 found that 89 percent of Americans believed that Russia’s actions in Ukraine were not justified. Similarly, a poll of public perceptions of responsibility for war, taken across ten European countries showed that a clear majority in all countries attribute the primary responsibility to Russia.

During these early months of 2022 the private sector quickly became an essential pillar of support for the Ukrainian war effort. As one expert put it, “If you had ordered a generic villain, you would have gotten Putin. From a moral standpoint, it was really easy for companies to take a stand, you have a moral highpoint.” Russia’s long decade of slowly escalating violence toward Ukraine, culminating in a brutal conventional assault and now, yearslong war, created an unusually stark geopolitical environment in which both Western states and the majority of their populations not only supported the defense of Ukraine but did so enthusiastically.

Across interviews and roundtable discussions, industry experts demonstrated an appreciation of the clarity of the “right” and “wrong” in the case of Ukraine. Nearly every private sector individual interviewed highlighted the importance of this factor in determining whether and how their company decided to begin or deepen its involvement in Ukraine following the invasion. One expert from a leading tech company said that “This was the easiest of all scenarios I could imagine for the private sector to seek to help an entity like Ukraine. The clarity on the conflict made the decision to assist Ukraine clear.” As several experts attested, much of the cyber aid provided to Ukraine required technical expertise that was not only limited to a few companies but also limited to a relatively small population of skilled individuals. At this level of analysis, the degree of available assistance had to take into account the bandwidth and possible burnout risk for these individuals as well as a strong, prevalent reluctance to work with a government or, especially, a military. The perceived clarity of the war in Ukraine, however, was critical to overcoming these concerns—at least for a while.

Reaction – Ukrainian tech diplomacy

Tech diplomacy is the engagement between state authorities and tech companies, civil society organizations, other states, and multilateral fora to influence the development of both technology itself and the policy that surrounds it. Within the early days of the conflict, members of the Ukrainian government and especially the Minister for Digital Transformation Mykhailo Fedorov, rallied for aid across the technology sector. These calls, and the generally positive reception to them, built on arguments regarding the clarity of the conflict. Although this tech diplomacy has been the project of various Ukrainian officials and offices, both before the 2022 invasion and in the years since, a focus in on Fedorov is illustrative of the Ukrainian approach to cultivating and extracting mutual benefit from relationships with international technology companies.

In 2019, Fedorov was tapped as deputy prime minister and minister of digital transformation and was subsequently named deputy prime minister for innovation, education, science and technology and minister for digital transformation and most recently first deputy prime minister of Ukraine—minister of digital transformation of Ukraine. Fedorov and his team have been adept, according to government affairs executive from a US-based multinational technology corporation, at creating and using “carrots and sticks” to influence company leadership and employees to more favorably view Ukraine and to augment their willingness to contribute to its defense.

Fedorov cultivated a strong social media presence with an audience both within Ukraine and across Europe and North America. He emphasized the importance of social media platforms—using primarily English to connect with an international audience—to bring awareness to the dire situation in Ukraine. He pointed to the social media platform X (formerly Twitter), saying it “has become an efficient tool that we are using to counter Russian military aggression.” In efforts like United24, the Ukrainian government’s official fundraising platform, which began with Fedorov tweeting the government’s crypto wallet addresses with an ask for donations, he saw it not just as a fundraising tool, but as a tool that is “keeping people around the world aware of what is going on in Ukraine.” Crowdfunding efforts, even if donations are small, make people feel that their contributions are making a difference and fosters a closer relationship between that person and the Ukraine regardless of the distance.

Fedorov leveraged this engaged global audience to incentivize company action, effectively mobilizing his audience’s attention. A look at Fedorov’s social media presence shows a clear pattern of this strategy in action. Between March 2022 and July 2024, Fedorov posted fifty-two requests for aid from specific companies, celebrated companies and individuals taking positive action, and called out companies engaging in business practices that he deemed detrimental to Ukrainian defense efforts. These posts served as additional public acknowledgement of the contributions of specific companies to Ukraine in a global public forum that other states were watching, as were individuals, aid organizations, and companies. One tech executive explained that not only did these callouts serve as thanks, they also leveraged the competitive nature of these companies that “one up” each other with aid as an additional driver.

The Starlink case provides an interesting example of this strategy in action. Fedorov tagged Elon Musk in an X post and asked him directly to instruct SpaceX to provide Ukraine with Starlink stations, calling him out for trying to “colonize Mars” instead of helping civilians on Earth. Musk responded publicly on X less than twelve hours later that, “Starlink Service is now active in Ukraine. More terminals en route.” Two days later these stations, which would come to serve critical functions for civilians, government entities, and even military personnel, arrived. Fedorov again publicly responded on X with a photo of a truck full of terminals saying, “Starlink – here. Thanks, @elonmusk.”

According to Fedorov’s deputy minister, Alex Bornyakov, in the months leading up to the Russian invasion, Fedorov’s office was unable to secure a meeting with Elon Musk. However, SpaceX President and COO Gwynne Shotwell indicated in March of 2022 that the company had been coordinating with Ukraine as part of its European expansion effort for several weeks before the invasion and were awaiting final approval from the Ukrainian government.  According to Shotwell, “they tweeted at Elon and so we turned it on … that was our permission. That was the letter from the minister. It was a tweet. These early interactions show that at the very least, Fedorov’s social media engagement functioned as a nontraditional method to accelerate the provision and delivery of essential technical equipment that would enable connectivity for civilians, government entities, and even military units.

Six months before the February 2022 invasion, Fedorov went on a tech diplomacy tour to Silicon Valley, intent on building stronger relationships with key technology companies with Ukraine’s digital transformation on the agenda. Fedorov‘s tech diplomacy work laid a solid foundation for coordination between the Ukrainian government and these technology companies by the time the war began. These relationships and Fedorov and his ministry’s direct approach with private companies meant that his office could seek solutions in the private sector directly and more swiftly than in traditional government acquisition. For example, in less than a month, a new and improved air raid alert system was implemented across the country as a result of a direct and informal conversation between Ajax Systems Chief Marketing Officer Valentine Hrytsenko, Deputy Minister of Digital Transformation Valeriya Ionan, and a team of digital transformation officers. 

Therefore, Ukraine’s approach to tech diplomacy represents a significant shift in how states, especially small or mid-power states, should conceptualize and shape their relationships with technology companies. Given that global technology companies’ (“big tech”) yearly revenue continually overshadows the gross domestic product (GDP) of many states, this evolution in states’ relationships with big corporations suggests that corporate ties are sometimes more important than a state’s relationship with another state. This was echoed in a statement from the Danish government, recognizing the extent to which technological disruption affects societal and geopolitical change, nothing that the companies driving that innovation “have become extremely influential; to the extent that their economic and political power match—or even surpass—that of our traditional partners, the nation states.” Fedorov’s actions therefore proved the importance of tech diplomacy as a key government priority to secure the cooperation of the tech sector in a crisis, aided by the moral clarity that many companies saw in assisting Ukraine in a time of war.

Business alignment

For companies examining whether and how to provide tech-based support to Ukraine in its defense, business alignment can take a variety of forms, but typically refers to some combination of benefits that the company receives from these activities. Although the primary driver cited publicly for tech companies’ involvement has been the desire to aid Ukraine, their customers, and employees in Ukraine against blatant Russian aggression, another factor in companies’ decision-making was in fact how the provision of assistance to Ukraine fit into and supported the overall health and security of their organizations. This included the character of preexisting relationships with both Ukraine and Russia, direct financial profit, and indirect benefits such as instructive experience, field-testing products, and reputational benefits.​

Preexisting relationships

The Russian invasion of Ukraine in February 2022 was not the start of the conflict between the two nations, nor was it the beginning of technology companies’ relationships with Ukraine and Russia. The nature and tone of these relationships provided a key foundation for these companies’ decisions throughout the post-2022 conflict. Ukraine and Russia, both as partners and as markets, had different starting points and were also on different active trajectories that informed the types and depth of engagement that tech companies wished to have with each country, both individually and comparatively.

One of the primary motivations cited for company involvement in Ukraine after the Russian invasion was the simple fact that many of these companies were already active in Ukraine to some extent and their leadership felt a responsibility to protect its employees and continue to serve its customers within Ukraine. For example, threat intelligence companies like Mandiant and CrowdStrike had been engaged in Ukraine since at least 2014, actively tracking cyber espionage, influence, and attack operations, while companies like Microsoft and Google were actively building capacity in the country despite Ukraine’s prohibitions on cloud services. In 2020, Google opened its second research and development center in Ukraine and Microsoft signed a memorandum of understanding with Ukraine’s Ministry of Digital Transformation to include a $500 million investment to build two data centers.

Several private sector and government representatives conveyed in private interviews that one of companies’ greatest concerns in the first few weeks of the conflict was the safety of their employees in Ukraine. Many companies set up or contributed to programs intended to help employees leave the country, if they wished, or to provide protection measures for those who remained. Additionally, companies with existing customers in Ukraine saw their mission as largely unchanged, seeking to serve their customers regardless of their location. Companies with these preexisting relationships had more reason to continue or expand their work in the country due to these long-term connections.

By contrast, many of these companies also had preexisting, albeit weaker, ties with and in Russia. According to a 2024 report from the Center for Security and Emerging Technology, however, of the eighteen US tech companies that provided “direct assistance on the battlefield and/or services to maintain critical infrastructure or government functions,” none had “significant economic or financial linkages to Russia.” While Ukraine had undertaken concerted steps to foster mutually beneficial relationships, Russia had been largely coercive. The Kremlin in the years before the 2022 reinvasion sought to tighten control over the Russian information space and exert influence over international tech companies’ activities in Russia. For example, in 2021 Russia passed a law requiring large technology companies with a presence in the Russian market to establish Russian offices registered with the Federal Service for Supervision of Communications, Information Technology, and Mass Media, commonly known as Roskomnadzor, or risk severe punitive measures. Some in the industry viewed the move as an attempt to blackmail tech companies into complying with Russian censorship. Google was one such target of these coercive measures—in a push to force Google to censor the content available on its platforms within Russia, Russian authorities seized the company’s bank accounts. In response, Google’s Russian subsidiary declared bankruptcy and ceased all but its free services within Russia.

Amplified by the clarity of conflict discussed above, and Ukrainian tech diplomacy efforts for companies to sever financial ties with Russia and the Russian market, the decision calculus for these companies was less complex than it may have been otherwise.

Not all companies chose to leave the Russian market completely. Despite the coercion that Google faced, the company chose to keep YouTube available in Russia; however, without ads for users in Russia and without the ability to monetize content that would “exploit, dismiss, or condone Russia’s war in Ukraine.”“ As discussed previously, many companies decided to continue services in Ukraine out of an obligation to existing customers. Depending on the company and the type of product sold or service provided, this same motivation was seen with respect to Russia as well. One tech executive explained that some of these products and services remained active because they provided a benefit to the Russian public, as opposed to the Russian government. For example, YouTube remained partially active, with restrictions, so that the platform could continue to serve as an alternate source of information for Russians.

Direct profit

For companies, both those with an existing presence in Ukraine and those without, providing technical services in and to Ukraine could also serve more clear-cut business interests. Some were at least partially motivated by direct financial gain like new paid contracts and revenue potential such as additional value generated through the delivery of services and the possibility of positive publicity for the company or their products.

Although much of private companies’ work in Ukraine was (or started as) free of charge, many others were acquired in a more traditional contractual manner, with either Ukraine or an allied government footing the bill. Company representatives said in several interviews and roundtables that while they wish to continue their work in the country, as the war continues, they will require financial support to do so.

Indirect benefit

Some of the tech companies active in Ukraine derived value from the very act of providing a service itself, with indirect gains that included instructive experience with Russian cyber operations, the ability to field-test products, and reputational benefits.

For more than a decade, many multinational threat intelligence companies have been tracking Russian cyber aggression in Ukraine as part of their core function. These services helped to drive the development of Ukrainian cyber infrastructure, but it was not solely a charitable effort. It was in these companies own interests to gain the closest possible insights into areas like Ukraine that experience a high degree and sophistication of cyberattacks. As a result, these companies sowed valuable intelligence from their experience, and improved their business offerings across the board. As one executive in threat intelligence at a US cybersecurity nonprofit put it: “for threat intelligence companies, having this depth of access is a gold mine, the details delivered out of Ukraine on Russian tactics, techniques, and procedures (TTPs) are quite amazing.”

These benefits are not only limited to threat intelligence companies. Companies that run active platforms used by and in Ukraine, such as cloud platforms, also gained greater direct experience against Russian cyber operations. As one executive put it, “while acting as a shield, [these] companies are collecting vast intelligence that can be used to improve their products and protect all their customers.” The experience of defending against Russian activity at that scale and volume served as training of sorts for companies’ cybersecurity teams.

Both representatives from private companies and the Ukrainian government cited an additional benefit to working in Ukraine during the current war: it served as a testing ground for technology. As Fedorov stated, Ukraine “is the best test ground for all the newest tech … because here you can test them in real-life conditions.” Several company executives privately seconded this notion, saying that alongside their company’s desire to do the right thing, their work in Ukraine provided proof of concept for their capabilities. Ukraine also offered a means to demonstrate to potential customers the effectiveness of their offerings. Founding partner of Green Flag Ventures Deborah Fairlamb said at a European defense conference that “no one would even look at a product unless it had ‘Tested in Ukraine’ stamped on it.” During a roundtable conversation, a company executive said that governments were more likely, having seen a company’s work in Ukraine, to purchase their products and trust that they are secure.

Finally, companies working actively in Ukraine were also motivated by the benefits to public perception and reputation. Popular support of Ukraine meant that companies’ support may have improved their reputation by association. In a TIME article from early 2024, author Vera Bergengruen argued that this reputational concern was part of Palantir’s decision calculus for its work in Ukraine, by helping to dispel characterization of the company’s work as a tool to support intrusive government surveillance. This would situate Palantir’s work in Ukraine among its similar efforts to “shed its reputation as a shadowy data-mining spy contractor.” Clearview AI’s reputational concerns also likely motivated its assistance to Ukraine. The company was sanctioned multiple times throughout Europe for privacy violations and was lambasted in a 2020 New York Times article for its controversial use by law enforcement and private companies to track people through AI-enabled facial recognition. Nevertheless, the company received an outpouring of positive press following public announcements that Ukraine  was using this same AI-enabled facial recognition software to identify Russian soldiers, including deceased soldiers and those suspected of committing war crimes in Ukraine. Whether trying to capitalize on a positive reputation or counter negative perceptions, companies benefit from their association with a cause popular across their customer base.

Reaction – Ukrainian technical capability and posture

In both the buildup to war and the conduct of it, some companies with interest in setting up operations in or with Ukraine were reluctant      to do so out of concern regarding Ukraine’s ability to act as a capable and trustworthy recipient of goods and services. Executives working in threat intelligence and information security at US-based multinational technology companies have pointed to corruption in Ukraine as a barrier to engagement prior to the invasion and a factor that was carefully considered when deciding how to provide aid in Ukraine. This challenge is openly acknowledged in Ukraine’s Anti-Corruption Strategy for 2021-25, which states that “corruption prevalence and distrust in the judiciary are the key obstacles to attracting foreign investment to Ukraine.”

To mitigate these factors, Ukraine and its partners have invested heavily over the past decade to take on corruption and build out legal, economic, and technical frameworks to transform Ukraine so as to make it a more appealing target for assistance and cooperation from the public and private sectors. According to Alex Bornyakov, Ukraine’s deputy minister of digital transformation, Ukraine’s sought to develop “the largest IT hub in Eastern Europe with the fastest growing GDP, industrial parks, and its own security-focused ‘Silicon Valley.’”

Anti-corruption efforts

The Ukrainian government’s commitment to anti-corruption efforts has been an important factor for the success of the process, which began well before the buildup of Russian tanks on its border. According to the 2025 Organization for Economic Cooperation and Development (OECD) Integrity and Anti-Corruption Review of Ukraine, since 2013 Ukraine “significantly reformed its anti-corruption framework to fight what were then historically high corruption levels in the country.”

Ukraine’s public and private IT sectors have long been a breeding ground for software acquisition-related fraud, a scheme in which an individual reports the purchase of a legitimate software license but actually buys a pirated or outdated version of that software and pockets the difference. Before 2014, approximately 80 percent of Ukrainian government and private entities were using network software that had either never been or was no longer supported by the associated software vendor, making Ukraine a difficult and unappealing market for software vendors.

In 2014, anti-corruption activists started the ProZorro project, which over the past decade moved public sector procurement, including that of IT infrastructure, to a central platform built around the tenets of transparency, efficiency, and cross-sector collaboration and competition. According to a report by Dr.Robert Peacock, through the use of ProZorro and other anti-corruption efforts, senior officials at Ukraine’s State Special Communications Service estimated that “the share of pirated and unsupported software on the country’s networks had dropped from more than 80 percent in 2014 to only 20 percent in 2020.”

As the conflict in Ukraine escalated into a full-scale war, Ukraine’s anti-corruption efforts became even more urgent and essential. For example, UNITED24, the country’s official fundraising platform to fund the Ukrainian war effort that has raised approximately $350 million since the beginning of the war, sends money directly into transparent national accounting systems depending on the choice of the donor, with the leading global accounting firm Deloitte auditing platform. In addition, in the first year of the war Ukrainian President Volodymyr Zelenskyy and his government dismissed several high-ranking government officials based on allegations of corruption. This included two of the top Ukrainian cyber officials after they were accused of participated in corrupt procurement practices. According to the country’s National Anti-Corruption Bureau, the accused allegedly embezzled $1.7 million between 2020 and 2022 through fraudulent software acquisition. The Ukrainian government’s efforts  largely mitigated companies’ concerns regarding corruption, and those companies that cited corruption as a barrier to working with Ukraine have since commenced programming previously denied to Ukraine on those grounds.

For a private company to make the decision to invest more heavily in Ukraine, the benefits—financial or otherwise—must outweigh the risks. By addressing corruption within the government, and especially tech-related corruption, the Ukrainian government effectively diminished the weight of this factor in companies’ overall decision calculus. Crucially, such efforts take time to implement and yet more time to create meaningful change. Had these anti-corruption programs not been well underway before 2022, the question of corruption may have significantly deterred companies from deeper involvement in Ukraine.

Ukraine turns toward tech

Instead of sowing distrust in the idea of cyberspace as a safe space for economic and even government services, the past decade of Russian aggression against Ukraine in cyberspace motivated Ukraine to invest heavily in that space and turn its former weakness into a newfound strength. It could even be said that the continuous Russian aggression against Ukraine, through cyberspace and otherwise, helped Ukraine to better defend itself against Russia. Before the 2022 Russian invasion and even more so since, the Ukrainian government sees a flourishing technology sector within Ukraine as a key component to the economic strength of the country. However, to foster such a flourishing tech environment, Ukraine needed to first invest in its legal and economic foundations.

As a response to escalating Russian aggression in 2014, Ukraine began what would be an intensive decade of government reform and policy advancement on cyber issues. The figure below highlights various investment and development programs aimed at enhancing Ukrainian technological capacity, including efforts of the Ukrainian government itself and in partnership with various international entities such as the North Atlantic Treaty Organization (NATO) and the US Agency for International Development (USAID).

interactive diagram visualization

These, among other efforts were essential steps to creating and expanding a technologically capable and developed Ukraine. Especially important was the increased relative cybersecurity of the Ukrainian digital environment, the development of Ukraine’s cyber workforce and general cyber literacy, and an influx of capital enabling increased investment in private sector tools and services.

On the economic front, the Ukrainian government made strides to create an attractive environment for investment. The government’s mission has been to shift the conversation from purely one of donations and aid to a direct appeal to the companies’ more pecuniary concerns. According to Bornyakov, “The best way to help Ukraine is to invest in Ukraine.” This call is both international and domestic. The Ukrainian government has implemented a number of projects and programs dedicated to fostering the local tech ecosystem. As of December 2024, the IT sector accounted for 4.4 percent of Ukraine’s GDP and 38 percent of the country’s total service exports. Much of this technological energy is being dedicated back to the war effort—according to a report compiled in cooperation with the Ministry of Digital Transformation of Ukraine, 97 percent of Ukrainian IT companies are “actively supporting projects that contribute” to Ukrainian defense.

Diia City in particular, launched just two weeks before the invasion, is a tool intentionally designed to make it easier and more appealing for foreign companies to set up and run operations within Ukraine. Diia City is a “virtual free economic zone for tech companies in Ukraine” that offers a variety of legal and tax benefits. The connected Brave1 initiative launched in early 2023 to “create a fast track for innovation in the defense and security sectors,” especially those projects of high importance to Ukrainian military leadership, such as “drones, robotic systems, electronic warfare, artificial intelligence tools, cybersecurity, communications, and information security management systems.”

These efforts, both domestic and international, bolstered the defense of Ukraine by building and demonstrating trustworthiness, capability, and economic value for the private sector. In other words, the political and economic engine driving technological development in Ukraine was composed of more than a decade of concentrated action from Ukraine and its international partners, and was in place well before tanks began rolling across the borders. This vital work ultimately helped to bring about conducive conditions for private sector investment or provision of services, as long-term structural factors indirectly shaping company decision-making to aid Ukraine.

Push factors

Difficulty of coordination

Difficulty of coordination refers to the friction that private companies experienced along the lifecycle of technical assistance to Ukraine—from understanding which products or services would be impactful, knowing who to coordinate with and how, or the logistics of providing that assistance. Friction, as in all domains of warfare, is the imposition of the constraints of reality upon one’s plans and impulses, and therefore each additional complexity that stands between a certain technology and its use in Ukraine increases the likelihood that that desired provision will not occur, will take longer, or will be provided in a less helpful form.

One of the most persistent hindrances to the provision of tech-related assistance from private companies in Ukraine was the difficulties that all parties involved faced, which was to effectively coordinate the assistance available with the assistance that Ukraine needed most in a fast-moving and high-pressure environment, particular as more Ukrainian organizations expressed a need for more threat intelligence, licenses, or training for tools. In almost every conversation with industry representatives about their experience in this space raised this coordination problem. The factors that most significantly impacted coordination effectiveness included whether a company had a preexisting presence in or relationship with Ukraine, the clarity with which Ukraine communicated its technical needs, and the ability to assess the effectiveness and impact of products or services provided. 

Especially in the early months of the full-scale Russian war, much of the assistance that private tech companies provided was coordinated by companies themselves and in a largely ad hoc manner. In addition, Ukraine experienced communications challenges such as a lack of secure channels or limited visibility into networks and infrastructure on the ground. Companies that did not have a strong relationship with the Ukrainian public sector prior to the conflict found that direct coordination was difficult to establish once the conflict had begun. For some, not having a direct relationship with or in Ukraine had been an intentional choice, due to regulation complexity or corruption concerns. Initially, companies without a preexisting presence often struggled to pinpoint the correct office or person with which to speak. They bridged this gap most often with some combination of brand recognition driving direct outreach from the Ukrainian government and facilitation by Ukrainian private companies that had established relationships with international tech companies and could act as middlemen.

Even in cases of existing relationships within Ukraine, complexities abound for companies. A threat intel executive indicated that, for many, there is a tension between what companies thought they could provide and what the Ukrainian government knew about its own needs. While Ukraine was effective in communicating its technical needs at the tactical level, according to various company representatives, effective coordination was somewhat hampered by their ability to effectively communicate and coordinate technical assistance needs across government at a strategic level lagged behind.

An additional point of friction was the high degree of difficulty in deconflicting the assistance provided to Ukraine from different companies. Understandably, the Ukrainian government—and various individuals and agencies working within it—were responding to imminent threats and thus would send out the same or similar requests to various companies in the hope that one would respond. This meant that at times various companies were devoting time and resources to developing an assistance measure that was not actually needed and would not be implemented, or if it was in part, had a lesser relative impact on Ukrainian defense because of duplicative measures. This inability to understand and plan around the impact of assistance was broader than just the duplication issue; dozens of company representatives reported difficulties in getting a clear view as to whether their assistance was actually effective once provided.

Without this data, future requests for and fulfillments of technical aid will continue to be based on theory rather than evidence from their growing experiences together. A 2024 paper from the Cyber Defense Assistance Collaborative (CDAC) and Columbia School of International and Public Affairs, made strides in its effort to collate and assess the effectiveness of those companies and organizations that provided cyber defense assistance to Ukraine through their program. The report identified both direct indicators, where effectiveness can be assessed via concrete measures, and proxy indicators, where possible contributing factors are assessed on a scale of perceived impact.

Reaction – Ukrainian coordination and adaptation

On top of domestic development efforts, Ukrainian government officials spent concerted time and effort to build relationships that would serve as the foundation for future cooperation. Fedorov‘s tech diplomacy work forged new connections with these companies, as well as their leadership and employee bases, that in many ways enabled the speed of company response following Russia’s February 2022 invasion. “When the invasion began, we had personal connections to these companies,” Fedorov said. “They knew who we are, what we look like, what our values are and our mission is.”

According to Fedorov, in the first month of the war he sent “more than4,000 requests to companies, governments, and other organizations, each one personally signed.” Some of these connections built on existing relationships, but companies without preestablished links either initiated conversations directly with or received direct requests from the Ukrainian Government. Beyond the Ministry of Digital Transformation, various Ukrainian offices like the State Special Communications Service of Ukraine, Security Service of Ukraine, National Security and Defense Council of Ukraine, and Ukrainian National Cybersecurity Coordination Center were engaging in relationship building and outreach efforts in order to coordinate the provision of tech assistance. According to Bornyakov, the early days of coordination with the international private sector were chaos. Various offices and employees sent out messages and requests without internal coordination, and products or services were provided without sufficient due diligence to ensure that they were truly useful to the Ukrainian war effort.

The Ukrainian government quickly updated its practices to facilitate more efficient cooperation. Among the first of these moves was a Ukrainian policy change to directly enable increased private sector participation. In February 2022, prior to the invasion, the Ukrainian parliament Verkhovna Rada amended the laws that had barred government use of Cloud services. This change meant that just days before the Russian invasion, companies including Amazon, Microsoft, Google, and Cloudflare were able the aid the Ukrainian government and several critical sector entities in migrating their critical data to their cloud servers—a critical move, as Russia’s attacks during the first few weeks of the war specifically targeted physical data centers. In addition, due to the imposition of martial law, Ukraine adopted two resolutions to streamline public procurement. Resolution 169, adopted on February 28, 2022, enabled government contracting authorities to ignore, when necessary, the procurement procedures required by the laws on public and defense procurement. Resolution 723, passed four months later, added new, more efficient requirements to the procurement process, amending both resolution 169 and resolution 822, most important of which was the introduction of the ProZorro platform as the mandatory electronic procurement system. As previously discussed, this platform was both a tool to facilitate procurement and to counter corruption in the procurement process at large.

Despite improvements to coordinate more effectively with private tech companies, and even as international coordination mechanisms emerged, a significant contingent of companies has maintained a preference for direct coordination. One government affairs executive noted that their company, like many others, preferred direct coordination with the Ukrainian government since it enabled more immediate and relevant support, and they were skeptical that third-party mechanisms would be as effective.

Reaction – International aid facilitation

Since the February 2022 Russian invasion of Ukraine, and even before that, international entities—states, supranational bodies, and non-state groups— played an important role in coordinating technical-focused aid in support of Ukraine.

However, states’ coordination efforts were notably inconsistent. In the first year and a half after the Russian reinvasion, the United States allocated $113 billion in response to the war in Ukraine—largely allocated to the Department of Defense at 54.7 percent, USAID at 32.3 percent, and the Department of State at 8.8 percent. This money should not be viewed like a check signed over to the Ukrainian government, but rather as money allocated to respond to the Russian invasion through a combination of forms and recipients, primarily the defense industrial base in the United States. By contrast, private companies publicly announced and celebrated their digital and tech aid to Ukraine. In an interview, one leading tech executive observed a clear dearth of focus from the US government toward digital and tech aid, instead opting for significant humanitarian and more traditional military assistance. This prioritization was likely an intentional choice—the US government’s perspective seems to have been that it was leading conventional aid by a significant margin and wanted others, like European governments and the private sector, to take the lead on digital and tech matters.Though not speaking specifically on cyber and tech elements, Secretary of Defense Pete Hegseth in February 2025 called publicly for European states to provide the “overwhelming” majority of defense funding for Ukraine, bemoaning what he saw as an “imbalanced relationship.” Hegseth specifically pushed for the expansion of existing Europe-led coalitions—discussed below—dedicated to coordinating technological aid.

By contrast, industry experts agreed that the UK Foreign, Commonwealth and Development Office (FCDO) was a very effective facilitator of private sector aid. The UK’s efficiency on this issue was due in part to fewer restrictions on aid money between distinct civilian- and military-designated buckets. According to an assessment from the Independent Commission for Aid Impact, which scrutinizes UK aid spending, this flexibility enabled the FCDO to respond and adapt to the constant evolutions of the war and geopolitical environment—thereby acting as an effective channel for private sector assistance into Ukraine.

The ad hoc nature of many of the early digital assistance programs provided by private companies was in some ways a double-edged sword. In many cases they were present and able to move more quickly than government programs, and in some places they stepped into de facto political roles—shaping the conflict and public understanding of it. However, this efficiency and effectiveness became difficult to sustain in the long run as governments and government-sponsored mechanisms were slow or insufficient to step in to support these efforts. US government entities were instrumental in facilitating support from private companies to Ukraine through purchase agreements, such as that of hundreds of Starlink devices and subscriptions in coordination with other governments and partnerships. US government entities also participated in intelligence sharing and collaboration efforts regarding Russian cyber capabilities and activities and even conducted hunt forward operations to assist in Ukrainian defense against Russian cyber aggression both before and after the February 2022 Russian invasion.

In various conversations, both industry and government representatives confirmed the lack of effective governmental and supranational coordination and its impact on the private sector, and on Ukrainian defense. Company representatives across the United States and Europe shared the same refrain: “we can’t keep supporting Ukraine ourselves forever without government assistance.

In addition to bilateral assistance efforts, various entities emerged across the conflict focused on cooperation organization and facilitation of digital and tech aid. The first of these was the CDAC, not a government entity, but a nonprofit organization that brought together a number of cybersecurity and technology organizations to better coordinate assistance efforts. The organization was founded by Gregory Rattray and a coalition of cyber executives to address the impediments and complications that accompanied the early days of digital and tech assistance provision from the private sector. A CDAC representative said in May 2024 that the group had facilitated $20-30 million in tech-related assistance for Ukraine since its inception. As Ukrainian and CDAC representatives noted, CDAC’s facilitation efforts have since slowed for a variety of reasons: decreased ability to act as an intermediary as requests have become more specific, a stabilization among companies that no longer require a coordinator after their relationships in Ukraine were established, and a lack of sufficient financial support for both CDAC and the companies willing to provide assistance.

The vacuum noted by industry representatives and CDAC founders in the shape of a true digital and tech aid coordination body with the resources and remit to execute that mission is the planned role of the IT Coalition and the Tallinn mechanism. The IT Coalition, part of the Ukraine Defense Contact Group (UDCG; also known as the Ramstein Group), was established in September 2023 as “a dedicated group of donor nations led by Estonia and Luxembourg within the UDCG framework, focused on delivering support to Ukraine’s Defense Forces in the area of IT, communications, and cyber security.” The group consists of eighteen member countries, with the European Union, NATO, the United States, and France acting as observers. In 2024 and 2025, the coalition had raised “€1,1 billion in both financial and material assistance.” The coalition aims to support Ukraine cyber defense capability and command and control integration while also delivering on more long-term goals such as fostering innovation and cloud adoption. The United States is currently an observing member of the IT Coalition and have thus far has declined taking a more active role. Those familiar with the inner workings of the mechanism have emphasized the clear benefit of a more active US role in the mechanism, as most of the tech companies with whom the organization would like to coordinate are headquartered out of the United States.

The Tallinn Mechanism was established in December 2023 with 11 states to “coordinate and facilitate civilian cyber capacity building” within Ukraine, and is intended to be complementary to military-focused cyber aid facilitation bodies like the IT Coalition. The Tallinn Mechanism is focused on “amplifying the cyber support of donors to Ukraine in the civilian domain.” The mechanism raised approximately $210 million by the end of 2024 and has focused on bolstering cyber defense capabilities, especially that of critical national infrastructure, through the public and private provision of hardware and software, incident response, satellite communication provision, and cybersecurity training for government officials.

The international community has certainly made strides to better facilitate technology aid to Ukraine, to counteract the pushing effect that complicates such coordination for technology companies. However, it is yet unclear whether these programs and practices will meet the demands of this conflict, or those of conflicts to come. The most effective element of the tech sector at large’s efforts in Ukraine has been its speed, both in its response to the invasion itself and to individual challenges that have arisen over the course of this war. Meanwhile, government and supranational coordination—aside from those programs already in place—were much slower to implement.

Risk of retaliation

A significant factor shaping the behavior of companies’ work in and with Ukraine is the heightened threat state created by active warfare. Various technology company officials cited their concern about potential backlash—whether financial, cyber, or physical violence—from Russia against their infrastructure, products, and people. The real risk that these companies took on was informed by a number of factors, such as the application of their products or services by and for military ends, the required physical presence of personnel, products, or infrastructure, and also the degree to which increased Russian aggression against these companies might be a meaningful increase from prewar conditions.

Defense application

An undeniable yet complex risk that companies face as a result of providing support to Ukraine is the threat of Russian retaliatory action. Private sector behavior in Ukraine is shaped by the degree to which the goods and services provided are connected to the conduct of the conflict itself. Products and services provided to civilian groups for purely humanitarian purposes come with a different risk profile than goods that underpin government functions. Though not discrete or exhaustive, cyber and technical aid to Ukraine can be understood in four categories: humanitarian aid, critical infrastructure protection, government support, and military application. In practice, this division exists on a continuum, from purely humanitarian support to products or services that the state itself has come to rely on for the continued provision of government services, with particular importance placed on whether the good is for military use and whether that use is in direct support of combat operations. 

By and large, companies have made their own determinations as to how to amend their work in Ukraine, looking not only at the direct military application of their product or service but also examining existing and potential products or services to determine potential applicability for offensive operations—and where to avoid their abuse. A clear example of this is Google’s cessation of the live traffic display functionality within Google Maps. A team of open source researchers at the Middlebury Institute of International Studies, under the leadership of Professor Jeffrey Lewis, were allegedly able to infer the early movements of the February 2022 Russian invasion before official reporting by analyzing Google Maps traffic data in combination with radar imagery. Following these reports, Google announced that it would temporarily disable live traffic data so that it would not be used to plan military operations. An internal task force at Google largely coordinated these and similar decisions to coordinate aid to Ukraine and, most importantly, to examine their actions and decisions in order to identify and address programs that had a potential to cause harm. However, even after these amendments were made, Google Maps was again the subject of controversy. In November 2024, Ukrainian defense chiefs accused Google of revealing the location of key military positions following an earlier Google Maps update. According to Russian military bloggers, among these revelations was the position of new air defense systems, including US-made Patriot anti-aircraft missiles, surrounding an airport near Kyiv. According to the head of Ukraine’s counter-disinformation unit Andriy Kovalenko, Google representatives reached out to Ukrainian government officials to address the issue shortly thereafter.

Similar in many ways was the SpaceX effort to restrict use of the Starlink satellite network close to the active front of the war. Though controversial in the public eye, and significant for military operators and planners, the SpaceX decision to restrict the use of Starlink devices near the front was an intentional one—to limit escalation directly supported by their devices. SpaceX President Gwynne Shotwell explained “our intent was never to have them use it for offensive purposes.” The Starlink network, despite these imposed limitations, has undeniably been an extremely useful tool for the Ukrainian military, but its network also supports a much wider geography of users, from individuals to government entities. The inherent dual-use nature of the Starlink network poses a much greater risk should its network be considered a military object. This risk framework is likely a significant part of the drive behind Space X’s creation of Starshield, announced in early December 2022. A partner project to Starlink, Starshield operates on a separate network and is specifically and exclusively for government—rather than consumer and commercial—use. With this application in mind, reports still vary as to whether such a contract, like the $1.8 billion deal with the National Reconnaissance Office, would be operated by the contractee, in this case the NRO, or whether, like Starlink, the service would remain operated by SpaceX. It is possible that this case will follow, in practice, the principle that the closer that the operation of a technology sits to strategic and sensitive national priorities, the higher the risk for both state and company of that technology being operated by said company, and the more likely that technology will come to be operated from within a government body.

Physicality

Products and services that require the physical presence of personnel, products, or infrastructure within Ukraine are the riskiest to undertake. Providing support in this way carries a level of risk that most companies did not have either the willingness or the infrastructure to take on. While some companies, for certain products, chose to partner with government entities to deliver products or services where physical presence was necessary, as in the preceding example, others chose instead to eschew options with such a requirement. In an interview, one expert said, “there were some products that you wanted to go forward with, but you couldn’t. Your informational security can only be as good as your physical security, so projects requiring new physical infrastructure development, or new infrastructure dependencies, was a major stumbling block.”

Russia’s cyber-offensive impact

To some degree, most of the technology companies in question—especially those with a preexisting presence in Ukraine—were already a target of a significant volume of Russian cyber intrusion attempts as well as other coercive actions. As one industry executive put it when asked about the role of risk assessment in decisions to deepen their work in Ukraine following the invasion, “we knew the risk, we were already targeted on a daily basis.” The risk of Russian aggression and retaliation remains, but for many large tech companies, their work already took them into spaces where they were in direct or indirect conflict with Russian or Russian-affiliated groups. However, the risk of Russian cyber intrusions against their networks was already a built-in calculation for their existing cybersecurity plans.

In addition to the experience and expectations of many of these private companies, Russian cyber operations accompanying and following its February 2022 invasion were less disruptive than previously anticipated. The most prominent case of coordinated disruption in the information space remains the ViaSat satellite communications system hack during the invasion. As cyber scholar Jon Bateman writes, this intrusion demonstrated clear “timing (one hour before Russian troops crossed the border), clear military purpose (to degrade Ukrainian communications), and international spillover (disrupting connectivity in several European countries).” However, the incident appeared to be limited in duration and unclear in impact—senior Ukrainian official Victor Zhora acknowledged the loss to communications during the early hours of the invasion, but later stated that the incident was less disruptive than it could have been because of redundancies in Ukrainian communication methods.

As nonresident senior fellow Justin Sherman explored in May 2025 report, Unpacking Russia’s cyber nesting doll, the comparably muted effectiveness of Russian cyber operations during the war is the result of a multitude of factors including:

  • Cross-domain coordination difficulties
  • Resource constraints
  • Interagency competition
  • Intentional strategic prioritization
  • Ukrainian defensive strength

Sherman goes on to explain that while cyber operations against Ukraine did not have that catastrophic impact expected by some—the promised cyber Pearl Harbor—Russian cyber capabilities should not be underestimated.

In just the first year of the war, Russia and—importantly—non-state actors in Russia’s orbit, launched a multitude of cyberattacks and intrusions against the public and private sector in Ukraine—including those entities relying on products, platforms, or infrastructure owned and operated by Western tech companies. In May 2025, the US Cybersecurity and Infrastructure Security Agency released a joint cybersecurity advisory highlighting this threat, and explicitly calling out Russian targeting of “those involved in the coordination, transport, and delivery of foreign assistance to Ukraine.” The question at hand, then, is not what level of risk is associated with these actions but how prepared the company is to encounter such risks.

Reaction – Risk definition and mitigation

In response to the risk of Russian retaliatory action, either through cyber or kinetic means, states and intranational bodies had a role to play in helping companies to navigate and mitigate these risks. The first method by which this was attempted was in an increased clarity on the types of actions that may be considered military or escalatory in nature. Additionally, in many cases states were necessary partners in securing any element of product delivery or operation required new physical presence in or movement into and across Ukraine.

Definition

Throughout the conflict, industry executives and civil society displayed a great deal of concern about where the line falls between civilian actors and military objectives, and how to ensure that their activities fall squarely on the civilian side of this line. Individuals and companies reiterated a desire for increased clarity on this question from Western governments and international legal bodies. Current humanitarian law requires the country at war to target only military objects, defined as objects “whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage” in a manner proportional to the military gain foreseen by the operation.

In a 2023 report, the International Red Cross posited that, “tech companies that operate in situations of armed conflict should understand and monitor whether the services they provide may amount to a direct participation in hostilities by their employees and whether the company might qualify as a military objective.” Essentially, the line between civilian and military object is determined by Russia in its assessment of the battlespace, as well as the broader question of whether the Kremlin is concerned about staying within the bounds of international humanitarian law. The subjectivity of this divide allows for some range in interpretation. Indeed some, like Lindsay Freeman at UC Berkeley School of Law, argue that “civilian objects have been intentional, direct targets and not simply collateral damage.” Ukraine and its allies cannot simply dictate where such a line exists. However, greater clarity from national and supranational entities would provide some measure of cover to these companies and help solidify their ability to make more accurate risk calculations.

Mitigation

For products and services that require physical presence, either of people or products, many companies view some kind of partnership with government, local or otherwise, as a virtual necessity to bridge the risk imposed.

Cisco’s Project PowerUp, led by Senior Security Strategist Joe Marshall of Cisco Talos Intelligence Group, is a clear demonstration of this. The project innovated and delivered a new industrial ethernet switch that could ensure continued effective power grid management even when Russian GPS jamming blocked Ukrenergo substation synchronization, and avoid the resulting forced outages across the Ukrainian power grid. The delivery of these devices into Ukraine was coordinated via a phone call to a US government official who coordinated the first shipment on an upcoming cargo shipment to Poland and then onto a train into Ukraine to be installed by Ukrenergo engineers. While this project was conceived of and executed by Cisco employees, those involved in the project emphasized the importance of Cisco’s partnership with the US government on this, as well as other private assistance programs.

Several governments and international organizations have established insurance programs, particularly political risk insurance to help shield companies from the financial risk of investment into Ukraine. In 2023, the Multilateral Investment Guarantee Agency of the World Bank issued guarantees of $9.1 million to support the construction and operation in the M10 Industrial Park in Lviv. Additionally, the US International Development Finance Corporation has established several financial packages guaranteeing millions in political risk insurance for a variety of projects. Within Ukraine, war and political risk insurance is offered by the Export Credit Agency, which insure loans for qualifying Ukrainian businesses against such risks, as well as for direct investment from or into Ukraine. The Ukrainian Ministry of Economy also drafted a law, in cooperation with the National Bank of Ukraine, which would create a unified framework for political or war risk insurance, with a focus on mitigating risks that may deter foreign investments.

The physical element of presence in Ukraine and especially near the battlefield remains a clear demarcation between activities that are the realm of the public sector and those that are the realm of the private sector. In this area, cooperation and coordination between companies and governments could largely follow established practices and procedures. But, for technology whose infrastructure does not touch the territory of Ukraine, the question of where the line is between civilian product and military object, and where bodies like NATO, the European Union, and the United Nations would define that line to be, resembles a gradual gradient rather than a stark line.

Key takeaways and conclusion

Behind much of the discussions and debates among various groups on the role of the private sector in in the war in Ukraine is a deeper anxiety about the evolving character of warfare as we reach the quarter marker of the twenty-first century. The integration and implementation of new technologies and its effect on the practice of war is familiar territory for theoreticians and practitioners alike, from Douhet’s theories on the supremacy of air power to the revolution of military affairs (RMA) school of thought, to those today that focus on the effect of evolving drone tactics on the operation and strategy of war. Less comfortable, however, is the analysis of what changes in technology may mean in practice not just for the conduct of war itself, but more fundamentally for the very nature of actors whose abilities and choices shape the conduct of war.

Over the past few years, private companies, especially technology companies based in North America and Western Europe have made decisions as to whether and how to contribute to the Ukrainian war effort in ways that have greatly impacted the ability of the Ukrainian government to direct and effectuate its own defense. In other words, they have moved beyond the status of resource providers in this conflict toward something more resembling actors in and of themselves, at times approaching the importance of states in their contributions.

Clarity of conflict

The war in Ukraine—especially in the first months and years of the war— was notably less divisive in the court of public opinion in the West than many other contemporary conflicts. The historical context of the Russia-Ukraine relationship, along with the sustained aggression launched against Ukraine for more than a decade prior to this invasion and the nature of the invasion itself, combined with myriad factors including those discussed throughout this report, created conditions conducive to widespread sympathy and support across much of Western Europe and North America. The efforts of the Ukrainian government proactively built on these conditions both before and after the invasion. Ukrainian leaders, Zelenskyy in particular, both publicly and in private conversations with government and private sector representatives, clearly communicated the effects of Russian aggression against Ukraine and the actions undertaken by the Ukrainian government and its people.

Clarity of conflict, as a motivating factor for tech companies’ decision-making over the course of this conflict, was important in creating favorable conditions for such choices, but is not determinative. Most important as a lesson applicable in potential future conflicts, is that the seeds that grew these conditions into place were planted well before Russian forces rolled across the Ukrainian borders in February 2022.

Business alignment

Many firms had preexisting operations, employees, or customers in Ukraine—generating both a sense of duty and a pragmatic incentive to safeguard assets and personnel. Firms that were already active in Ukraine, or whose services directly contributed to protecting their employees and customers, were the most proactive and consistent contributors. Additionally, companies could derive direct or indirect benefits from their engagement. Several firms leveraged their involvement as an opportunity for product testing, cybersecurity innovation, and real-world validation of technologies under extreme conditions. In doing so, companies not only supported Ukraine’s defense but also advanced their own technical capabilities and reputational standing.

Ukraine’s long-term digital transformation further enhanced this alignment. Over the past decade, the government has implemented legal and technical reforms aimed at combating corruption and promoting digital industry growth, positioning the country as a prospective regional tech hub and a credible, innovation-friendly partner. This proactive transformation reassured corporate partners that their investments and assistance could be practicable and impactful.

For future conflicts, states will need to account for business alignment factors as an important driving factor in private sector’s decision-making. This includes the uncomfortable, yet important finding that this includes companies’ ability to profit, or at a minimum, sustain their operations in a conflict in a way that maintains their organizational health, noting that companies’ motivations will not always align with that of the states in which they are headquartered. While moral conviction catalyzed early engagement, sustained corporate involvement in Ukraine depended on alignment between ethical action and business strategy.

Difficulty of coordination

Even amid broad goodwill, the initial months of the war revealed the challenge of coordination. Companies often struggled to identify appropriate Ukrainian counterparts, assess needs accurately, or ensure that their offerings were deployed effectively. Early efforts were marked by confusion—with multiple government offices issuing overlapping requests and little centralized control. As Bornyakov later acknowledged, the early days of outreach “were chaos.”

Many of the most significant factors that shaped company involvement were already in place and being acted upon before the February 2022 Russian invasion. Preexisting relationships were key, both as a motivating factor and a facilitating factor, effectively minimizing coordination friction. Additionally, the technological and policy developments well underway before the February 2022 invasion created the appealing Ukrainian tech landscape and improved coordination necessary once the conflict was underway.

While private companies excelled in speed and agility, governments brought scale, reliability, and regulatory legitimacy. The war illustrated how preparedness for potential future conflicts will depend on preestablished coordination frameworks that merge these strengths—enabling rapid mobilization of technological capabilities, matching private capabilities with public needs in real time.

Risk of retaliation

Providing assistance to Ukraine exposed technology companies to new security risks from cyberattacks, sanctions, or kinetic threats against personnel or infrastructure. The degree of perceived risk—and retaliation—varied depending on each company’s exposure, particularly for firms whose technologies had direct military applications or some kind of physical presence.

Ambiguity around international law, cyber norms, and export controls can delay or discourage private assistance. Companies must understand whether providing certain technologies or services could be construed as escalatory, illegal, or sanctionable. Private firms are increasingly targeted in state-level cyber operations. The possibility of retaliation, in any of a myriad of forms, was a serious risk for companies aiding Ukraine; managing and sharing that risk is essential to sustaining long-term cooperation.

To mitigate these risks, Ukraine and allied governments played an essential supportive role, clarifying the boundaries between civilian and military assistance, helping companies avoid escalatory missteps and, in some cases, underwrote contracts or insurance to shield firms from loss. Such measures demonstrate the emerging need for risk-sharing frameworks between states and corporations. In cases where physical operations within Ukraine were necessary, governments provided logistical and security coordination to protect personnel and assets. Such collaboration underscores an emerging model of public-private security cooperation, wherein states and corporations jointly navigate the blurred boundaries between national defense and digital resilience.

If private technology companies’ decisions and actions are so impactful to the conduct of war, as they have shown themselves to be, then the character of warfare has evolved in such a way as to require states to likewise evolve in the ways that they provide military assistance and plan for potential future conflicts. The foundation for this evolution needs to be a greater understanding of the factors in the case of Ukraine that most greatly impacted company decision-making regarding their participation, or not, in the conflict space, starting with the four factors identified in this report: those that pulled companies toward cooperation, and those that pushed companies away. By assessing the factors that drove companies’ decision-making in Ukraine, states can better plan and prepare for future crises and conflicts—and not leave such critical capabilities, once again, to chance.

About the author

Emma Schroeder is an associate director with the Cyber Statecraft Initiative, part of the Tech Programs. Her focus in this role is on developing statecraft and strategy for cyberspace useful for both policymakers and practitioners. Her work focuses on the role of cyber and cyber-enabled technology in conflict and crime.  

Originally from Massachusetts, Schroeder holds an MA in History of War from King’s College London’s War Studies Department. She also attained her BA in International Relations & History, with a concentration in Security Studies, from the George Washington University’s Elliott School of International Affairs. 

Acknowledgements

This report was made possible by the participation of dozens of scholars and practitioners who shared their expertise and experiences with the author.

Thank you to the Cyber Statecraft Initiative team for their support, particularly Nikita Shah and Trey Herr for their guidance. Particular thanks to Emerson Johnston, Grace Menna, and Zhenwei Gao for their research assistance, as well as to Nancy Messieh, Samia Yakub, and Donald Partyka for the creation and review of language and digital assets. All errors are the author’s own.

Explore the program

The ’s Cyber Statecraft Initiative, part of the Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Oppo Reno 15, Reno 15 Pro Launched In China: When Should We Expect In India? Oppo Reno 15, Reno 15 Pro Launched In China: When Should We Expect In India?
Next Article AIOZ AI: The People-Powered AI Stack on AIOZ Network | HackerNoon AIOZ AI: The People-Powered AI Stack on AIOZ Network | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

systemd 259-rc1 Released With Musl libc Support, New run0 “Empower” Mode
systemd 259-rc1 Released With Musl libc Support, New run0 “Empower” Mode
Computing
AWS Introduces Remote Build Cache in ECR to Accelerate Docker Image Builds
AWS Introduces Remote Build Cache in ECR to Accelerate Docker Image Builds
News
Intel Xeon Granite Rapids, filtrados
Intel Xeon Granite Rapids, filtrados
Mobile
Stanley water bottles are up to 50% off ahead of Black Friday — here are 7 holiday deals you can’t miss
Stanley water bottles are up to 50% off ahead of Black Friday — here are 7 holiday deals you can’t miss
News

You Might also Like

AWS Introduces Remote Build Cache in ECR to Accelerate Docker Image Builds
News

AWS Introduces Remote Build Cache in ECR to Accelerate Docker Image Builds

6 Min Read
Stanley water bottles are up to 50% off ahead of Black Friday — here are 7 holiday deals you can’t miss
News

Stanley water bottles are up to 50% off ahead of Black Friday — here are 7 holiday deals you can’t miss

1 Min Read
Bose’s noise-canceling QuietComfort Headphones are more than 50 percent off
News

Bose’s noise-canceling QuietComfort Headphones are more than 50 percent off

2 Min Read
Germany vs. Slovakia: Livestream World Cup 2026 Qualifier Soccer From Anywhere
News

Germany vs. Slovakia: Livestream World Cup 2026 Qualifier Soccer From Anywhere

12 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?