The Cyber Statecraft Initiative works at the nexus of geopolitics, technology, and security to craft strategies to help shape the conduct of statecraft and to better inform and secure users. This work extends through the competition of state and non-state actors, the security of the internet and computing systems, the safety of operational technology and physical systems, and the communities of cyberspace. The Initiative convenes a diverse network of passionate and knowledgeable contributors, bridging the gap among technical, policy, and user communities.

Our work

The Atlantic Council Technology Programs comprises five existing efforts—the Digital Forensic Research Lab (DFRLab), the GeoTech Center, the Cyber Statecraft Initiative, the Democracy + Tech Initiative, and the Capacity Building Initiative. These operations work together to address the geopolitical implications of technology and provide policymakers and global stakeholders necessary research, insights, and convenings to address challenges around global technology and ensure its responsible advancement.

Team

Fellows

Publications

Conflict, Risk, and Tech

Sep 19, 2022

Untangling the Russian web: Spies, proxies, and spectrums of Russian cyber behavior 

By Justin Sherman

This issue brief analyzes the range of Russian government’s involvement with different actors in the large, complex, and often opaque cyber web, as well as the risks and benefits the Kremlin perceives or gets from leveraging actors in this group. The issue brief concludes with three takeaways and actions for policymakers in the United States, as well as in allied and partner countries.

Cybersecurity Russia

Blog Post

Sep 15, 2022

Policy hackers take Vegas

By Will Loomis, Safa Shahwan Edwards, Trey Herr, Stewart Scott, and Sarah Powazek

Every year, in the early August heat, thousands of hackers from around the world head to Las Vegas, Nevada for a series of cybersecurity conferences known as Hacker Summer Camp. This year, the Cyber Statecraft Initiative – and a few friends – decided to ship out to see what all the hype is about.

Cybersecurity

Report

Sep 14, 2022

Dragon tails: Preserving international cybersecurity research

By Stewart Scott, Sara Ann Brackett, Yumi Gambrill, Emmeline Nettles, Trey Herr

A quantitative study on whether legal context can impact the supply of vulnerability research with detrimental effects for cybersecurity writ large through the coordinated vulnerability disclosure process (CVD), using recent regulations in China as a case study.

China Cybersecurity

The 5×5

Aug 15, 2022

The 5×5—The US-Japan-South Korea trilateral cybersecurity relationship

By Simon Handler

Five experts share their insights on the future of US-Japan-South Korea trilateral cybersecurity cooperation.

Cybersecurity East Asia

Feature

Aug 5, 2022

Operational technology: Cloudy, with a chance of data 

By Emma Schroeder

In the second episode of The Cyber Moonshot, we again follow Neymar, Zafira, and Ernest in a quaint little food court on the surface of the moon. Follow along in their journey to understand the operational technology-cloud convergence and track down the path of the malware that has infected their port – before it becomes a permanent winter wonderland!

Cyber 9/12 Project

Aug 3, 2022

2022 Washington, DC Cyber 9/12 Strategy Challenge Playbook

Rockshot, Standingpalm, Software, Shoot! Scenario Summary Intelligence Report I Intelligence Report I Recommendations Intelligence Report II Intelligence Report II Recommendations Intelligence Report III Intelligence Report III Briefings Intelligence Report III Recommendations Scenario Summary In November 2022, while Qatar was hosting the , staff at the noticed a water-cooling issue within the plant. The staff managed […]

Cybersecurity

Issue Brief

Aug 2, 2022

Behind the rise of ransomware

By John Sakellariadis

Between 2016 and 2019, cybercriminals shifted from automated ransomware campaigns that emphasized scale to targeted extortion operations against organizations. This adaption made ransomware more disruptive and more profitable, culminating in the 2021 surge in ransomware. Though the US government has devoted more attention to ransomware since 2021, ransomware remains a significant and long-term threat to the US economy.

Cybersecurity

Conflict, Risk, and Tech

Jul 25, 2022

Hackers, Hoodies, and Helmets: Technology and the changing face of Russian private military contractors

By Emma Schroeder, Gavin Wilde, Justin Sherman, and Trey Herr

This issue brief explores the technological capabilities of Russian private military companies and how they are used across various types of missions in support of and in parallel with Russian policy.

Africa Cybersecurity

The 5×5

Jun 29, 2022

The 5×5—Cybercrime and national security

By Simon Handler, Liv Rowley

Five experts weigh in on emerging trends in cybercrime and their impacts on national security. 

Cybersecurity Intelligence

Cyber 9/12 Project

Jun 27, 2022

Atlantic Council’s Cyber 9/12 Strategy Challenge expands to Scotland

The Abertay University cyberQuarter joins as a strategic partner for Cyber 9/12 Strategy Challenge, the world’s only multidisciplinary cyber competition. WASHINGTON DC – JUNE 27, 2022 – The Atlantic Council’s Cyber Statecraft Initiative, in partnership with the Scottish Government, Dewar Cyber Consulting, and Abertay University, will host the inaugural edition of the Cyber 9/12 Strategy […]

Events


The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Licensing CSI Graphics

All original graphics created by the Cyber Statecraft Initiative (CSI) are available for re-use under the following conditions:

  • Written permission must be granted by CSI.
  • Graphics may be copied and distributed in any medium or format in unadapted form only, for noncommerical purposes, and only so long as attribution is given.1Language based on Creative Commons CC BY-NC-ND 4.0
  • The attribution must reference the Cyber Statecraft Initiative and include a link to the content.
  • CSI cannot grant permission for the use of images or graphics licensed from third parties.

Events