Programs

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Content

In-Depth Research & Reports

Aug 4, 2020

Alliance power for cybersecurity

By Kenneth Geers

There is only one internet, and cybersecurity is therefore an inherently international challenge that countries cannot tackle alone. Alliances like NATO and the EU give democratic countries a cyber edge over their authoritarian challengers.

Cybersecurity Europe & Eurasia

Event Recap

Jul 31, 2020

Event recap | The future of trust and sensemaking

By Hannah Biggs

On July 30, 2020, the GeoTech Center hosted a discussion on ways to best increase trust and sensemaking in our communities as we further integrate our digital and physical lives.

Cybersecurity Digital Policy

In the News

Jul 29, 2020

Jun interviewed on NK News about North Korea’s cyber activity

Cybersecurity Korea

New Atlanticist

Jul 29, 2020

The 5×5—Fighting COVID-19 with surveillance: Perspectives from across the globe

By Simon Handler and Lily Liu

As more countries rely on digital tools to contain the spread of COVID-19, how will enhanced surveillance challenge privacy norms in the future? According to the World Health Organization, public health surveillance is critical to containing the pandemic. However, can enhanced surveillance during a public health crisis set precedents for digital surveillance in the future?

Africa Coronavirus

Blog Post

Jul 27, 2020

#DFRLabCoffeeBreak with DFRLab Nonresident Fellow Cindy Otis

The DFRLab Coffee Break is a video series meant to discuss how disinformation and digital change affect industries, policy making, and society with a community of experts, academics, and leaders from around the world. Our guest in this video is DFRLab Nonresident Fellow Cindy Otis. In the interview, Cindy breaks down how society can tackle […]

Cybersecurity Digital Policy

Trackers and Data Visualizations

Jul 26, 2020

Software supply chain security: The dataset

By Will Loomis, Stewart Scott, Trey Herr, Sara Ann Brackett, Nancy Messieh, and June Lee

Want to dive deeper into the Breaking Trust database? You have come to the right place.

Cybersecurity Technology & Innovation

Feature

Jul 26, 2020

App stores in focus

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

App stores and hubs are a popular target for software supply chain attacks on large numbers of users, exploiting trust in proprietary app ecosystems and the security of storefronts like Play Store and App Store.

Cybersecurity Technology & Innovation

Feature

Jul 26, 2020

Deep impact: States and software supply chain attacks

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

States have used software supply chain attacks to great effect. Hijacked updates have routinely delivered the most crippling state-backed attacks, thanks in part to a continued failure to secure the code-signing process.

China Cybersecurity

Report

Jul 26, 2020

Breaking trust: Shades of crisis across an insecure software supply chain

By Dr. Trey Herr, William Loomis, Stewart Scott, June Lee

Software supply chain security remains an under-appreciated domain of national security policymaking. Working to improve the security of software supporting private sector enterprise as well as sensitive Defense and Intelligence organizations requires more coherent policy response together industry and open source communities.

Cybersecurity Defense Technologies

In the News

Jul 24, 2020

The geopolitics of digital identity: Dr. David Bray and Lord Tim Clement Jones

By Atlantic Council

Lord Tim Clement Jones, Geotech fellow, and Dr. David Bray, director of the Geotech Center, discussed the issue of digital identity in a recent event at the IdentityNorth Summit. Lord Jones pointed out how technologies for securely connecting an individual’s digital presence to their identity are not new, but have yet to be applied at a national scale, or in a universal manner that would be necessary to maximize their impact. He recognized, though, that certain applications of digital identity technology might be of concern to ordinary people; though he might be comfortable using his digital identity as part of the United Kingdom Parliament’s new system for MPs to vote, the average citizen might take concern with their votes being tabulated digitally, or being connected to other facets of their online identity.

Cybersecurity Digital Policy

Experts