Content

Report

Nov 7, 2022

The cyber strategy and operations of Hamas: Green flags and green hats

By Simon Handler

This report seeks to highlight Hamas as an emerging and capable cyber actor, and help the policy community understand how similar non-state groups may leverage the cyber domain in the future.

Conflict Cybersecurity

Issue Brief

Oct 17, 2022

China’s surveillance ecosystem and the global spread of its tools

By Bulelani Jili

This paper seeks to offer insights into how China’s domestic surveillance market and cyber capability ecosystem operate, especially given the limited number of systematic studies that have analyzed its industry objectives.

Cybersecurity

Tech at the Leading Edge

Sep 22, 2022

Assumptions and hypotheticals: Second edition

By Emma Schroeder

In the second "Assumptions and Hypotheticals," we explore various topics, including the cyber sovereignty debate, the question of an attribution threshold, and the utility of cyber tools in crisis escalation.

Cybersecurity

Conflict, Risk, and Tech

Sep 19, 2022

Untangling the Russian web: Spies, proxies, and spectrums of Russian cyber behavior 

By Justin Sherman

This issue brief analyzes the range of Russian government’s involvement with different actors in the large, complex, and often opaque cyber web, as well as the risks and benefits the Kremlin perceives or gets from leveraging actors in this group. The issue brief concludes with three takeaways and actions for policymakers in the United States, as well as in allied and partner countries.

Cybersecurity Russia

Issue Brief

Aug 2, 2022

Behind the rise of ransomware

By John Sakellariadis

Between 2016 and 2019, cybercriminals shifted from automated ransomware campaigns that emphasized scale to targeted extortion operations against organizations. This adaption made ransomware more disruptive and more profitable, culminating in the 2021 surge in ransomware. Though the US government has devoted more attention to ransomware since 2021, ransomware remains a significant and long-term threat to the US economy.

Cybersecurity

Conflict, Risk, and Tech

Jul 25, 2022

Hackers, Hoodies, and Helmets: Technology and the changing face of Russian private military contractors

By Emma Schroeder, Gavin Wilde, Justin Sherman, and Trey Herr

This issue brief explores the technological capabilities of Russian private military companies and how they are used across various types of missions in support of and in parallel with Russian policy.

Africa Cybersecurity

Tech at the Leading Edge

May 9, 2022

Assumptions and hypotheticals: First edition

By Yumi Gambrill and Emma Schroeder

The first edition of "Assumptions and Hypotheticals" considers several ongoing debates, including the escalatory potential of cyber operations, the measure of deniability created through the use of proxies, and the offense-defense balance in cyber engagements. 

Cybersecurity

Conflict, Risk, and Tech

Apr 29, 2022

The 5×5—Addressing the global market for offensive cyber capabilities

By Simon Handler

Five experts unpack the global market for offensive cyber capabilities and the implications associated with the proliferation of hacking tools.

Conflict Cybersecurity

In-Depth Research & Reports

Apr 18, 2022

America the Unready: Viking Age lessons for ransomware

By Emma Schroeder

"America the Unready: Viking Age lessons for ransomware" explores the rising tide of ransomware and presents three lessons that the US Government can learn from the English Viking Age about combating persistent, distributed threats through strengthening collective resilience and defense.

Cybersecurity

New Atlanticist

Jan 31, 2022

Cord-cutting, Russian style: Could the Kremlin sever global internet cables?

By Justin Sherman

Moscow knows that information is vital in a crisis—and that controlling or entirely disrupting its flow can provide important strategic advantages.

Conflict Eastern Europe