Keep up with our work!

Follow us on Twitter for to keep up with the latest cybersecurity developments

Follow us on Spotify for the latest and greatest in cyber-themed music playlists

Follow the Atlantic Council on LinkedIn for the the latest geopolitical analysis

Events

Cyber Statecraft projects

Cyber Statecraft team

Cyber Statecraft fellows

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Content

The 5×5

Oct 26, 2022

The 5×5—Non-state armed groups in cyber conflict

By Simon Handler

Five experts from various backgrounds assess the emerging threats posed by non-state armed groups in cyber conflict.

Conflict Cybersecurity

Issue Brief

Oct 17, 2022

China’s surveillance ecosystem and the global spread of its tools

By Bulelani Jili

This paper seeks to offer insights into how China’s domestic surveillance market and cyber capability ecosystem operate, especially given the limited number of systematic studies that have analyzed its industry objectives.

Cybersecurity

New Atlanticist

Oct 12, 2022

Experts react: The hits and misses in Biden’s new National Security Strategy

By Atlantic Council experts

We put the call out to our experts from across the Atlantic Council: Does this document deliver? What does it get right and what’s missing?

Middle East National Security

The 5×5

Sep 28, 2022

The 5×5—The Internet of Things and national security

By Simon Handler

Five experts from various backgrounds assess the national security challenges posed by IoT and discuss potential solutions.

Cybersecurity Digital Policy

Report

Sep 26, 2022

Security in the billions: Toward a multinational strategy to better secure the IoT ecosystem

By Patrick Mitchell, Liv Rowley, and Justin Sherman with Nima Agah, Gabrielle Young, and Tianjiu Zuo

The explosion of Internet of Things (IoT) devices and services worldwide has amplified a range of cybersecurity risks to individuals’ data, company networks, critical infrastructure, and the internet ecosystem writ large. In light of this systemic risk, this report offers a multinational strategy to enhance the security of the IoT ecosystem. It provides a framework for a clearer understanding of the IoT security landscape and its needs, looks to reduce fragmentation between policy approaches, and seeks to better situate technical and process guidance into cybersecurity policy.

Cybersecurity Internet of Things

Article

Sep 22, 2022

Assumptions and hypotheticals: Second edition

By Emma Schroeder

In the second "Assumptions and Hypotheticals," we explore various topics, including the cyber sovereignty debate, the question of an attribution threshold, and the utility of cyber tools in crisis escalation.

Cybersecurity

Issue Brief

Sep 19, 2022

Untangling the Russian web: Spies, proxies, and spectrums of Russian cyber behavior 

By Justin Sherman

This issue brief analyzes the range of Russian government’s involvement with different actors in the large, complex, and often opaque cyber web, as well as the risks and benefits the Kremlin perceives or gets from leveraging actors in this group. The issue brief concludes with three takeaways and actions for policymakers in the United States, as well as in allied and partner countries.

Cybersecurity Russia

Blog Post

Sep 15, 2022

Policy hackers take Vegas

By Will Loomis, Safa Shahwan Edwards, Trey Herr, Stewart Scott, and Sarah Powazek

Every year, in the early August heat, thousands of hackers from around the world head to Las Vegas, Nevada for a series of cybersecurity conferences known as Hacker Summer Camp. This year, the Cyber Statecraft Initiative – and a few friends – decided to ship out to see what all the hype is about.

Cybersecurity

Report

Sep 14, 2022

Dragon tails: Preserving international cybersecurity research

By Stewart Scott, Sara Ann Brackett, Yumi Gambrill, Emmeline Nettles, Trey Herr

A quantitative study on whether legal context can impact the supply of vulnerability research with detrimental effects for cybersecurity writ large through the coordinated vulnerability disclosure process (CVD), using recent regulations in China as a case study.

China Cybersecurity

The 5×5

Aug 15, 2022

The 5×5—The US-Japan-South Korea trilateral cybersecurity relationship

By Simon Handler

Five experts share their insights on the future of US-Japan-South Korea trilateral cybersecurity cooperation.

Cybersecurity East Asia