Programs

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Content

NATOSource

Nov 21, 2012

US rejects claims it participated in hacking of French presidential staff

By Jamey Keaten, AP

From Jamey Keaten, AP:  The U.S. Embassy in Paris on Wednesday "categorically" denied claims in a French magazine report that the U.S. government was behind a hacking attack against computers in the French president’s palace earlier this year.

Cybersecurity Security & Defense

NATOSource

Nov 21, 2012

French press accuse US of hacking computers in Presidential Palace

By Phil Muncaster, the Register

From Phil Muncaster, the Register:  US-sponsored snoopers hacked into the computers of the Élysée Palace earlier this year ahead of the French presidential election and lifted top secret information, using what appears to be the notorious Flame malware, a French newspaper has alleged. The attack, which occurred in May a few days before the second […]

Cybersecurity Security & Defense

NATOSource

Nov 14, 2012

Is China’s economic espionage the ‘most aggressive’ in the world?

By James A. Lewis, Foreign Affairs

From James A. Lewis, Foreign Affairs:  China is not the only country to use economic espionage, but it is the most aggressive. In key industries — telecommunications, aerospace, energy, and defense — the strategy has worked well. Now, the new Chinese leadership risks seeing the boost from spying undercut both China’s international leadership and its […]

Cybersecurity Security & Defense

NATOSource

Nov 14, 2012

Obama signs secret directive to help thwart cyberattacks

By Ellen Nakashima, Washington Post

From Ellen Nakashima, Washington Post:  President Obama has signed a secret directive that effectively enables the military to act more aggressively to thwart cyberattacks on the nation’s web of government and private computer networks.

Cybersecurity Security & Defense

NATOSource

Nov 13, 2012

Petraeus investigation ensnares Allen, SACEUR nomination put on hold

By Phil Stewart, Reuters

From Phil Stewart, Reuters:  The top U.S. commander in Afghanistan, General John Allen, is under investigation for alleged inappropriate communication with a woman at the center of the scandal involving former CIA Director David Petraeus, a senior U.S. defense official said on Tuesday.

Cybersecurity Security & Defense

NATOSource

Nov 8, 2012

Cyber chief issues call for action; Alexander outlines who does what

By Henry Kenyon and Wyatt Kash, AOL Defense

From Henry Kenyon and Wyatt Kash, AOL Defense:  The nation’s top military cyber commander offered his version of how government and military agencies are likely to work together when America suffers cyber attacks, and warned that industry needs to take a greater role.

Cybersecurity Security & Defense

NATOSource

Nov 8, 2012

General Alexander: ‘The DoD network is not defensible, per se’

By Henry Kenyon and Wyatt Kash, AOL Defense

From Henry Kenyon and Wyatt Kash, AOL Defense:  [Chief of Cyber Command and director of the National Security Agency Gen. Keith] Alexander noted the difficulties the Defense Department has in protecting its own networks.

Cybersecurity Security & Defense

NATOSource

Nov 6, 2012

When is a cyberattack an act of war?

By Ellen Nakashima, Washington Post

From Ellen Nakashima, Washington Post:  On the night of Oct. 11, Defense Secretary Leon Panetta stood inside the Intrepid Sea, Air and Space Museum, housed in a former aircraft carrier moored at a New York City pier, and let an audience of business executives in on one of the most important conversations inside the U.S. […]

Cybersecurity Security & Defense

NATOSource

Nov 4, 2012

Georgian cyber counterattack exposes Russian hacker seeking NATO document

By Jeremy Kirk, IDG News Service

From Jeremy Kirk, IDG News Service:  In an unprecedented move, the country of Georgia — irritated by persistent cyber-spying attacks — has published two photos of a Russia-based hacker

Cybersecurity Security & Defense

NATOSource

Nov 1, 2012

Inside one of U.S. Cyber Command’s offensive units

By John Reed, Killer Apps

From John Reed, Killer Apps:  Ever wonder how long it takes to get one of the U.S. Army’s best cyber operators trained and ready to conduct high-end offensive operations? About five years, according to the Army’s top intelligence official.

Cybersecurity Security & Defense

Experts