Keep up with our work!

Follow us on Twitter for to keep up with the latest cybersecurity developments

Follow us on Spotify for the latest and greatest in cyber-themed music playlists

Follow the Atlantic Council on LinkedIn for the the latest geopolitical analysis

Cyber Statecraft projects

Cyber Statecraft team

Cyber Statecraft fellows

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Content

Issue Brief

Nov 22, 2022

The cases for using the SBOMs we build

By Amelie Koran, Wendy Nather, Stewart Scott, and Sara Ann Brackett

Software bills of materials (SBOMs) provide key data suit for many uses. Industry and government can continue to sharpen their demand signals, shape implementation, and continue driving development and adoption.

Cybersecurity Technology & Innovation

Tech at the Leading Edge

Nov 18, 2022

GRU 26165: The Russian cyber unit that hacks targets on-site

By Justin Sherman

Russian hackers are not always breaching targets from afar, typing on their keyboards in Moscow bunkers or St. Petersburg apartment buildings. Enter GRU Unit 26165, a military cyber unit with hackers operating remotely and on-site. Going forward, Western intelligence and law enforcement personnel, as well as multinational organizations, would be wise to pay attention. 

Cybersecurity Russia

The 5×5

Nov 16, 2022

The 5×5—The rise of cyber surveillance and the Access-as-a-Service industry

By Simon Handler

Experts discuss the rise of cyber surveillance and the impact of the Access-as-a-Service industry on the United States and its allies.

Cybersecurity Intelligence

Report

Nov 7, 2022

The cyber strategy and operations of Hamas: Green flags and green hats

By Simon Handler

This report seeks to highlight Hamas as an emerging and capable cyber actor, and help the policy community understand how similar non-state groups may leverage the cyber domain in the future.

Conflict Cybersecurity

The 5×5

Oct 26, 2022

The 5×5—Non-state armed groups in cyber conflict

By Simon Handler

Five experts from various backgrounds assess the emerging threats posed by non-state armed groups in cyber conflict.

Conflict Cybersecurity

Issue Brief

Oct 17, 2022

China’s surveillance ecosystem and the global spread of its tools

By Bulelani Jili

This paper seeks to offer insights into how China’s domestic surveillance market and cyber capability ecosystem operate, especially given the limited number of systematic studies that have analyzed its industry objectives.

Cybersecurity

New Atlanticist

Oct 12, 2022

Experts react: The hits and misses in Biden’s new National Security Strategy

By Atlantic Council experts

We put the call out to our experts from across the Atlantic Council: Does this document deliver? What does it get right and what’s missing?

Middle East National Security

The 5×5

Sep 28, 2022

The 5×5—The Internet of Things and national security

By Simon Handler

Five experts from various backgrounds assess the national security challenges posed by IoT and discuss potential solutions.

Cybersecurity Digital Policy

Report

Sep 26, 2022

Security in the billions: Toward a multinational strategy to better secure the IoT ecosystem

By Patrick Mitchell, Liv Rowley, and Justin Sherman with Nima Agah, Gabrielle Young, and Tianjiu Zuo

The explosion of Internet of Things (IoT) devices and services worldwide has amplified a range of cybersecurity risks to individuals’ data, company networks, critical infrastructure, and the internet ecosystem writ large. In light of this systemic risk, this report offers a multinational strategy to enhance the security of the IoT ecosystem. It provides a framework for a clearer understanding of the IoT security landscape and its needs, looks to reduce fragmentation between policy approaches, and seeks to better situate technical and process guidance into cybersecurity policy.

Cybersecurity Internet of Things

Article

Sep 22, 2022

Assumptions and hypotheticals: Second edition

By Emma Schroeder

In the second "Assumptions and Hypotheticals," we explore various topics, including the cyber sovereignty debate, the question of an attribution threshold, and the utility of cyber tools in crisis escalation.

Cybersecurity