Content

New Atlanticist

Jul 29, 2020

The 5×5—Fighting COVID-19 with surveillance: Perspectives from across the globe

By Simon Handler and Lily Liu

As more countries rely on digital tools to contain the spread of COVID-19, how will enhanced surveillance challenge privacy norms in the future? According to the World Health Organization, public health surveillance is critical to containing the pandemic. However, can enhanced surveillance during a public health crisis set precedents for digital surveillance in the future?

Africa Coronavirus

Blog Post

Jul 27, 2020

#DFRLabCoffeeBreak with DFRLab Nonresident Fellow Cindy Otis

The DFRLab Coffee Break is a video series meant to discuss how disinformation and digital change affect industries, policy making, and society with a community of experts, academics, and leaders from around the world. Our guest in this video is DFRLab Nonresident Fellow Cindy Otis. In the interview, Cindy breaks down how society can tackle […]

Cybersecurity Digital Policy

Feature

Jul 26, 2020

Deep impact: States and software supply chain attacks

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

States have used software supply chain attacks to great effect. Hijacked updates have routinely delivered the most crippling state-backed attacks, thanks in part to a continued failure to secure the code-signing process.

China Cybersecurity

Report

Jul 26, 2020

Breaking trust: Shades of crisis across an insecure software supply chain

By Dr. Trey Herr, William Loomis, Stewart Scott, June Lee

Software supply chain security remains an under-appreciated domain of national security policymaking. Working to improve the security of software supporting private sector enterprise as well as sensitive Defense and Intelligence organizations requires more coherent policy response together industry and open source communities.

Cybersecurity Defense Technologies

Trackers and Data Visualizations

Jul 26, 2020

Software supply chain security: The dataset

By Will Loomis, Stewart Scott, Trey Herr, Sara Ann Brackett, Nancy Messieh, and June Lee

Want to dive deeper into the Breaking Trust database? You have come to the right place.

Cybersecurity Technology & Innovation

Feature

Jul 26, 2020

App stores in focus

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

App stores and hubs are a popular target for software supply chain attacks on large numbers of users, exploiting trust in proprietary app ecosystems and the security of storefronts like Play Store and App Store.

Cybersecurity Technology & Innovation

In the News

Jul 24, 2020

The geopolitics of digital identity: Dr. David Bray and Lord Tim Clement Jones

By Atlantic Council

Lord Tim Clement Jones, Geotech fellow, and Dr. David Bray, director of the Geotech Center, discussed the issue of digital identity in a recent event at the IdentityNorth Summit. Lord Jones pointed out how technologies for securely connecting an individual’s digital presence to their identity are not new, but have yet to be applied at a national scale, or in a universal manner that would be necessary to maximize their impact. He recognized, though, that certain applications of digital identity technology might be of concern to ordinary people; though he might be comfortable using his digital identity as part of the United Kingdom Parliament’s new system for MPs to vote, the average citizen might take concern with their votes being tabulated digitally, or being connected to other facets of their online identity.

Cybersecurity Digital Policy

Conflict, Risk, and Tech

Jul 22, 2020

Troubled vision: Understanding recent Israeli–Iranian offensive cyber exchanges

By JD Work and Richard Harknett

Reported Iranian intrusions against Israeli critical infrastructure networks and alleged Israeli actions against Iranian proliferation-associated targets pose substantial new challenges to understanding ongoing competition and conflict in the Middle East.

Cybersecurity Iran

In the News

Jul 20, 2020

Sherman interviewed on Cornell Law School’s “A Law in Common” podcast on the US-India tech relationship

Cybersecurity Defense Technologies

New Atlanticist

Jul 20, 2020

Nine cyberattacks that will remind you of your ex

By Safa Shahwan Edwards

Just as you should be wary of reconnecting with someone who should probably be left in the past, keep an eye out for an increase in cyber incidents. In preparation for the very real possibility of exes coming out of the woodwork and cyber incidents making the news, we’ve identified nine cyberattacks that will remind you of your ex.

Cybersecurity

Experts