Recent Events

On October 10th, the Atlantic Council’s Cyber Statecraft Initiative and DEF CON hosted a public event on the vulnerabilities in US voting infrastructure and recommendations for a path forward in securing our democracy. Panelists included Ambassador Douglas Lute, former US permanent representative to NATO; Jeff Moss, founder of DEF CON and senior fellow for the Cyber Statecraft Initiative; John Gilligan, chairman of the board for the Center for Internet Security; Sherri Ramsay, former director of the NSA/CSS Threat Operations Center; and Harri Hursti, founding partner of Nordic Innovation Labs and organizer of the DEF CON Voting Village. The panel was moderated by Jake Braun, a lecturer at the University of Chicago and opening remarks were given by Fred Kempe.
On November 7, the Atlantic Council’s Cyber Statecraft Initiative launched its first-ever report on Aviation Cybersecurity—Finding Lift, Minimizing Drag, underwritten by Thales. The event featured a keynote by Jeanette Manfra, assistant secretary for cybersecurity and communications at the US Department of Homeland Security. Opening remarks were provided by The Hon. Jane Holl Lute, CEO of SICPA North America, former deputy secretary of the US Department of Homeland Security and Atlantic Council Board Director, as well as Alan Pellegrini, CEO of Thales North America and Atlantic Council Board Director.
 
In an increasingly connected aviation ecosystem, the ever-expanding and complex cybersecurity issues that affect aviation stakeholders are immense. The launch convened a group of leading aviation industry and cybersecurity experts that discussed the report's key findings and examined the threats, vulnerabilities and potential solutions. Panelists included Pete Cooper, author of the report and senior fellow at the Atlantic Council's Cyber Statecraft Initiative; Christian Espinosa, white hat hacker and CEO of Alpine Security; Steve Luczynski, former deputy director of cyber plans and operations at the Office of the Secretary of Defense; David Silver, vice president of civil aviation at the Aerospace Industries Association and Elizabeth Wharton, senior assistant city attorney for Hartsfield-Jackson International Airport.

On August 2, 2017, the Cyber Statecraft Initiative at the Atlantic Council’s Brent Scowcroft Center on International Security hosted a panel discussion on the week-long round of cybersecurity conferences known as “Hacker Summer Camp” – DEF CON, Black Hat, and BSides Las Vegas. Ariel Robinson, Analyst and Reporter for ITSP Magazine and Host of The Tech Effect podcast, moderated a conversation with Nick Leiserson, Legislative Director for the Office of U.S. Representative Jim Langevin; Cris Thomas (also known as Space Rogue), Global Strategy Lead for IBM X-Force Red; Jessica Wilkerson, Professional Staff Member of the U.S. House of Representatives’ Committee on Energy and Commerce; and Beau Woods, Deputy Director of the Cyber Statecraft Initiative at the Atlantic Council’s Brent Scowcroft Center on International Security on the three cybersecurity conferences that welcomed top hackers, academics, journalists, professionals, and government representatives. 
On Monday July 17th, the Atlantic Council’s Cyber Statecraft initiative, part of the Brent Scowcroft Center on International Security, held a moderated discussion where panelists Laura Galante, senior fellow with the Council’s Cyber Statecraft Initiative and former director of Global Intelligence at FireEye; Alexander Klimburg, senior fellow with the Council’s Cyber Statecraft Initiative and program director at The Hague Centre for Strategic Studies; Jane Holl Lute, Atlantic Council board director and CEO of SICPA; and  moderator Tal Kopan, political reporter at CNN, discussed the chilling consequences of cyberspace as a new field of conflict.
On May 12, 2017, the world was shaken by a ransomware cyberattack called Wanna Crypt (also known as WannaCry) that spread like a network worm. The attack impacted over 45 National Health System (NHS) organizations across England and Scotland, forcing hospitals to cancel appointments and loose critical patient records, as well as the German S-Bahn.

The impacts did not stop there. In less than ten days, WannaCry affected approximately 200,000 systems in 150 countries, swiftly becoming one of the most impactful malware outbreaks in recent history, and dominating the news cycle for the next several days.
At what point does a cyberattack become an act of war? Should the government react to a cyber-attack on the private sector? Is cyber privateering the answer to the government’s woes? These were some of the questions students (including this author) contended with at the Atlantic Council’s 2017 Cyber 9/12 student challenge on March 17 and 18.

Held at American University’s Washington College of Law, this was the fifth and biggest iteration of the annual student competition. Forty-five teams from 32 universities from across the United States took on the roles of cyber policy experts advising the National Security Council on how to react to a fictional cyber catastrophe.
On Wednesday, February 8, Atlantic Council’s Cyber Statecraft Initiative, the NATO Cooperative Cyber Defence Centre of Excellence (CCD COE), and the Embassy of the Kingdom of the Netherlands launched the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations.
The Presidential Commission on Enhancing National Cybersecurity turned its report in to the President on December 1, 2016. Established in February 2016 by executive order, the Commission was charged with making recommendations to “address actions that can be taken over the next decade” to improve national cybersecurity. The Commission’s recommendations are expected to include information for government agencies, private companies, and other stakeholders, covering a wide range of activities in cyberspace, emerging technologies, the Internet of Things, and industry best practices.
With more cars and medical devices connecting to the internet, what happens if automakers and health care companies don't start prioritizing digital security?

Many cybersecurity experts worry that faulty code in the so-called Internet of Things (IoT) won't just cause systems to malfunction and freeze. Instead, they say, flaws inside connected cars or pacemakers could lead to serious injury or death.
Could malicious hackers or foreign operatives actually interfere with voting on Nov. 8 and influence the outcome on Election Day?

Probably not. But it's still a question many technical and election experts are asking, Washington is worried about, and both Donald Trump and Hillary Clinton are talking about in the final stages of a presidential campaign already marked by unprecedented warnings of fraud at the polls.

In a statement earlier this month, the Department of Homeland Security and the Office of the Director of National Intelligence said the US "is confident that the Russian government directed the recent compromises of emails from US persons and institutions ... to interfere with the US election process." Separately, in August, the FBI reported breaches into Illinois and Arizona's voter registration databases and cautioned other states to bolster cybersecurity protections against of Nov. 8.


    

RELATED CONTENT