The Cyber Statecraft Initiative works at the nexus of geopolitics, technology, and security to craft strategies to help shape the conduct of statecraft and to better inform and secure users. This work extends through the competition of state and non-state actors, the security of the internet and computing systems, the safety of operational technology and physical systems, and the communities of cyberspace. The Initiative convenes a diverse network of passionate and knowledgeable contributors, bridging the gap among technical, policy, and user communities.

Our work

The Atlantic Council Technology Programs comprises five existing efforts—the Digital Forensic Research Lab (DFRLab), the GeoTech Center, the Cyber Statecraft Initiative, the Democracy + Tech Initiative, and the Capacity Building Initiative. These operations work together to address the geopolitical implications of technology and provide policymakers and global stakeholders necessary research, insights, and convenings to address challenges around global technology and ensure its responsible advancement.

Team

Fellows

Publications

Press Release

Oct 4, 2021

Atlantic Council’s Cyber 9/12 Strategy Challenge expands to South Africa

The University of Cape Town’s Cybersecurity Capacity Centre for Southern Africa joins as strategic partner for virtual competition

Cybersecurity

In-Depth Research & Reports

Oct 4, 2021

Introduction: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

It is imperative to establish at the outset that there is no silver bullet for maritime cybersecurity. This report is intended to deliver a more complete and operational plan to better protect the MTS by focusing on building upon, broadening, and deepening the priorities put forward by the National Maritime Cyber Plan by focusing on three key principles: risks and standards, information and intelligence sharing, and creating a maritime cybersecurity workforce.

Cybersecurity
Defense Technologies

In-Depth Research & Reports

Oct 4, 2021

A system of systems: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

The MTS is not monolithic; it is a markedly complex “system of systems.” This section segments the MTS into three discrete systems—ships, ports, and cargo—each with its own life cycle, in order to highlight areas of risk and leverage for policy makers and the industry.

Cybersecurity
Maritime Security

In-Depth Research & Reports

Oct 4, 2021

Recommendations: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

This report puts forward twelve recommendations—split into three overarching themes—to help better secure all subsystems of the MTS from evolving cyber threats.

Cybersecurity
Maritime Security

Report

Oct 4, 2021

Appendices: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

The appendices for key players and an acronym list referred to in ‘Raising the colors: Signaling for cooperation on maritime cybersecurity.’

Cybersecurity
Maritime Security

In-Depth Research & Reports

Oct 4, 2021

Raising the colors: Signaling for cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

Few industries are as critical to the global economy as the maritime transportation system (MTS). However, the efficient operation of the MTS is at risk, as the industry is increasingly vulnerable to cyber threats. The MTS must work to raise its baseline for cybersecurity and better protect its actors from systemic cyber threats going forward.

Cybersecurity
Maritime Security

The 5×5

Sep 29, 2021

The 5×5—The future of cyber diplomacy

By Simon Handler

We brought together experts with a range of perspectives to discuss cyber diplomacy and what the future of responsible cyber statecraft looks like.

Civil Society
Conflict

New Atlanticist

Sep 17, 2021

How Russia made Apple and Google complicit in its internet crackdown

By Dylan Myles-Primakoff, Justin Sherman

Just as voting opened in Russia, Apple and Google deleted an app from their stores published by Alexei Navalny’s team designed to deliver candidate recommendations. Here’s why that signals an international problem.

Cybersecurity
Elections

In the News

Sep 13, 2021

Handler and Schroeder on Defense & Aerospace Report’s Cyber Report podcast: Lessons from aircraft hijacking to counter ransomware

By Atlantic Council

On this week’s Cyber Report, sponsored by Northrop Grumman, Simon Handler and Emma Schroeder discuss the new paper “Countering Ransomware: Lessons from Aircraft Hijacking,” with Defense & Aerospace Report Editor Vago Muradian.

Cybersecurity
Security & Defense

Report

Sep 13, 2021

Cyber defense across the ocean floor: The geopolitics of submarine cable security

By Justin Sherman

The vast majority of intercontinental global Internet traffic—upwards of 95 percent—travels over undersea cables that run across the ocean floor. The construction of new submarine cables is a key part of the constantly changing physical topology of the Internet worldwide. However, this dependence is not matched by increased security, leaving our undersea cables—the core of the global internet—at risk.

Cybersecurity
Europe & Eurasia

Events


The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Licensing CSI Graphics

All original graphics created by the Cyber Statecraft Initiative (CSI) are available for re-use under the following conditions:

  • Written permission must be granted by CSI.
  • Graphics may be copied and distributed in any medium or format in unadapted form only, for noncommerical purposes, and only so long as attribution is given.1Language based on Creative Commons CC BY-NC-ND 4.0
  • The attribution must reference the Cyber Statecraft Initiative and include a link to the content.
  • CSI cannot grant permission for the use of images or graphics licensed from third parties.