Content

Event Recap

Oct 9, 2020

Future of DHS Project identifies new threats to the homeland

By Julia Siegel

On Wednesday, September 9, the Scowcroft Center’s Forward Defense practice launched the Future of DHS Project Final Report, building on its Key Findings and Recommendations released in August. Following the report release, Forward Defense hosted three panels of distinguished speakers to discuss the future of the Department of Homeland Security (DHS) in a changing threat landscape.

China Coronavirus

Report

Oct 9, 2020

Effective resilience and national strategy: Lessons from the pandemic and requirements for key critical infrastructures

By Franklin D. Kramer

A US national strategy for "effective resilience," the capacity to prepare for and withstand shocks of the magnitude of a major pandemic or equivalent such as a major cyberattack with any resulting disruption significantly less than that caused by COVID-19.

Coronavirus Crisis Management

In the News

Oct 7, 2020

Akhtar in Pakistan Politico: Deepfakes, AI & Digital Soldiers: Challenges of Cross-Domain Coercion for Pakistan

By Atlantic Council

Cybersecurity Digital Policy

New Atlanticist

Oct 7, 2020

The 5×5—Cybersecurity and the 117th Congress

By Simon Handler

Approximately eighty congressional committees and subcommittees claim jurisdiction over at least some dimension of cybersecurity policy. As the agenda for the coming years is only getting more crowded, Congress must improve its agility in order to pass meaningful cybersecurity legislation effectively.

Cybersecurity Disinformation

Resources

Oct 5, 2020

BGP incident data

By Justin Sherman

The Border Gateway Protocol communicates potential paths that Internet packets can take from their origin to their destination. It’s the Internet’s “GPS” for traffic and a key part of the Internet’s digital rules. There are multiple physical routes available to send an email from Washington, DC, to a user in Berlin, because the Internet is […]

Cybersecurity Internet

Report

Oct 5, 2020

The politics of internet security: Private industry and the future of the web

By Justin Sherman

The private sector plays a crucial role in defining the changing shape of the Internet, especially its security. This report examines two protocols as examples of private sector influence over presently vulnerable systems key to the Internet’s function: the Border Gateway Protocol (BGP), used to route Internet traffic, and the Domain Name System (DNS), used to address Internet traffic.

Cybersecurity Internet

Article

Oct 1, 2020

How to counter worsening cyber-security threats: The international strategy of the Dutch government

By Timo S. Koster

Cyber-security reports show that threats are getting worse, not decreasing. International cooperation is vital to consolidate the rules of the road in cyberspace, further their implementation by increasing the chance of exposing and stopping those who break the rules, and assist other countries in upgrading their resilience.

Cybersecurity European Union
Belarus Cyber Partisans

Article

Oct 1, 2020

Lukashenka’s regime confused by protest-driven cyber attacks

By Nika Aleksejeva

Government reactions to attacks by the Belarus Cyber Partisans marred by defensiveness, contradictions and ignorance.

Belarus Cybersecurity

Future of DHS

Oct 1, 2020

Future of DHS Report quoted in Chairman Thompson’s remarks at House Rules Committee hearing

By Atlantic Council

On October 1, Chairman Thompson of the House Committee on Homeland Security spoke on a panel before the House Rules Committee. In his remarks, he mentioned a recommendation from the Future of DHS Report, expressing his agreement.

Cybersecurity Disinformation

Report

Sep 28, 2020

Dude, where’s my cloud? A guide for wonks and users

By Simon Handler, Lily Liu, and Trey Herr

Cloud computing is transforming society, from interactions between people to the ways by which companies do business, and even how militaries operate. If you have ever been curious about what exactly “the cloud” meant; if you are a policy wonk not a technologist, a user not an admin, then this report is for you.

Cybersecurity Internet

Experts

Events