Conflict is not shaped only by states but also those that develop, operate, and employ cyber-enabled capabilities and technologies for their own purposes. The Conflict, Risk, and Tech program explores the strategic risks created by non-state actors present in current conflicts, the relationships between key actors and capabilities, and the implications for technology, cyberspace, and international security writ large.

Featured Content

Proliferation of Offensive Cyber Capabilities

Cybercrime

Publications

The 5×5

May 30, 2023

The 5×5—Cross-community perspectives on cyber threat intelligence and policy

By Simon Handler

Individuals with experience from the worlds of cyber threat intelligence and cyber policy share their insights and career advice.

Cybersecurity Intelligence

Issue Brief

May 15, 2023

What is driving the adoption of Chinese surveillance technology in Africa?

By Bulelani Jili

When examining the proliferation of Chinese surveillance systems and cyber capabilities in Africa, research disproportionately focuses on the motivations and ambitions of the supplier. This perspective, while it highlights Chinese diplomatic ambitions and corporate opportunities, ignores local features that drive the adoption of Chinese surveillance tools.

Africa China

The 5×5

May 3, 2023

The 5×5—Cryptocurrency hacking’s geopolitical and cyber implications

By Simon Handler

Experts explore the cybersecurity implications of cryptocurrencies, and how the United States and its allies should approach this challenge.

Cybersecurity Digital Currencies

The 5×5

Mar 22, 2023

The 5×5—Conflict in Ukraine’s information environment

By Simon Handler

Experts provide insights on the war being waged through the Ukrainian information environment and take away lessons for the future.

Conflict Cybersecurity

Conflict, Risk, and Tech

Mar 1, 2023

Makings of the Market: Seven perspectives on offensive cyber capability proliferation

By Jen Roberts and Emma Schroeder

The marketplace for offensive cyber capabilities continues to grow globally. Their proliferation poses an expanding set of risks to national security and human rights, these capabilities also have legitimate use in state security and defense. To dive deeper on this topic, we asked seven experts to offer their perspectives.

Cybersecurity
Russian bombardment of telecommunications antennas in Kiev

Report

Feb 27, 2023

A parallel terrain: Public-private defense of the Ukrainian information environment

By Emma Schroeder with Sean Dack

The report analyzes Russia’s continuous assaults against the Ukrainian information environment, and examines how Russian offensives and Ukrainian defense both move through this largely privately owned and operated environment. The report highlights key questions that must emerge around the growing role that private companies play in conflict.

Conflict Cybersecurity

The 5×5

Feb 23, 2023

The 5×5—Strengthening the cyber workforce

By Simon Handler

Experts provide insights into ways for the United States and its allies to bolster their cyber workforces.

Cybersecurity Education

The 5×5

Jan 30, 2023

The 5×5—China’s cyber operations

By Simon Handler

Experts provide insights into China’s cyber behavior, its structure, and how its operations differ from those of other states.

China Cybersecurity

Conflict, Risk, and Tech

Nov 18, 2022

GRU 26165: The Russian cyber unit that hacks targets on-site

By Justin Sherman

Russian hackers are not always breaching targets from afar, typing on their keyboards in Moscow bunkers or St. Petersburg apartment buildings. Enter GRU Unit 26165, a military cyber unit with hackers operating remotely and on-site. Going forward, Western intelligence and law enforcement personnel, as well as multinational organizations, would be wise to pay attention. 

Cybersecurity Russia

Conflict, Risk, and Tech

Nov 16, 2022

The 5×5—The rise of cyber surveillance and the Access-as-a-Service industry

By Simon Handler

Experts discuss the rise of cyber surveillance and the impact of the Access-as-a-Service industry on the United States and its allies.

Cybersecurity Intelligence

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.