Content

In-Depth Research & Reports

Oct 4, 2021

Introduction: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

It is imperative to establish at the outset that there is no silver bullet for maritime cybersecurity. This report is intended to deliver a more complete and operational plan to better protect the MTS by focusing on building upon, broadening, and deepening the priorities put forward by the National Maritime Cyber Plan by focusing on three key principles: risks and standards, information and intelligence sharing, and creating a maritime cybersecurity workforce.

Cybersecurity
Defense Technologies

In-Depth Research & Reports

Oct 4, 2021

A system of systems: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

The MTS is not monolithic; it is a markedly complex “system of systems.” This section segments the MTS into three discrete systems—ships, ports, and cargo—each with its own life cycle, in order to highlight areas of risk and leverage for policy makers and the industry.

Cybersecurity
Maritime Security

In-Depth Research & Reports

Oct 4, 2021

Recommendations: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

This report puts forward twelve recommendations—split into three overarching themes—to help better secure all subsystems of the MTS from evolving cyber threats.

Cybersecurity
Maritime Security

The 5×5

Sep 29, 2021

The 5×5—The future of cyber diplomacy

By Simon Handler

We brought together experts with a range of perspectives to discuss cyber diplomacy and what the future of responsible cyber statecraft looks like.

Civil Society
Conflict

GeoTech Cues

Sep 28, 2021

Getting ahead of the next catalyst: A new paradigm for cybersecurity in the space domain

By Andrew LaBarbera and Jeremy Harchelroad

Consider the terms “cyber attacks”and” information and influence activities.” These two terms were relatively infrequently used before the computer malware Stuxnet and the 2016 US presidential election , respectively. Yet these events and the terms characterizing the emergence of new threats mark a threshold where a traditional […]

Cybersecurity

New Atlanticist

Sep 17, 2021

How Russia made Apple and Google complicit in its internet crackdown

By Dylan Myles-Primakoff, Justin Sherman

Just as voting opened in Russia, Apple and Google deleted an app from their stores published by Alexei Navalny's team designed to deliver candidate recommendations. Here's why that signals an international problem.

Cybersecurity
Elections

In the News

Sep 13, 2021

Handler and Schroeder on Defense & Aerospace Report’s Cyber Report podcast: Lessons from aircraft hijacking to counter ransomware

By Atlantic Council

On this week’s Cyber Report, sponsored by Northrop Grumman, Simon Handler and Emma Schroeder discuss the new paper “Countering Ransomware: Lessons from Aircraft Hijacking,” with Defense & Aerospace Report Editor Vago Muradian.

Cybersecurity
Security & Defense

Report

Sep 13, 2021

Cyber defense across the ocean floor: The geopolitics of submarine cable security

By Justin Sherman

The vast majority of intercontinental global Internet traffic—upwards of 95 percent—travels over undersea cables that run across the ocean floor. The construction of new submarine cables is a key part of the constantly changing physical topology of the Internet worldwide. However, this dependence is not matched by increased security, leaving our undersea cables—the core of the global internet—at risk.

Cybersecurity
Europe & Eurasia

Issue Brief

Aug 31, 2021

Trusted connectivity: A framework for a free, open, and connected world

By Kaush Arha

As democracies address the global demand for a free, open, and connected world while ensuring that local and global emissions targets are met, they need an organizing framework: the concept of “trusted connectivity.”

China
Cybersecurity

Issue Brief

Aug 26, 2021

Countering ransomware: Lessons from aircraft hijacking

By Simon Handler, Emma Schroeder, Frances Schroeder, and Trey Herr

Ransomware has plagued organizations for more than a decade, but the last three years have experienced a surge in both the number of incidents and the ransoms demanded. To more effectively counter ransomware, the US government should develop a strategy that draws on lessons learned from addressing a surge in aircraft hijackings through the late 1960s and early 1970s.

Cybersecurity
Terrorism

Experts

Events