Content

Mon, Jun 24, 2024

User in the Middle: An Interoperability and Security Guide for Policymakers

When technologies work together, it benefits users and the digital ecosystem. Policymakers can advance interoperability and security in tandem by understanding how each impacts the other.

by Maia Hamin, Alphaeus Hanson

Cybersecurity Cybersecurity Standards and Requirements

Wed, Jun 12, 2024

“Reasonable” Cybersecurity in Forty-Seven Cases: The Federal Trade Commission’s Enforcement Actions Against Unfair and Deceptive Cyber Practices

The FTC has brought 47 cases against companies for unfair or deceptive cybersecurity practices. What can we learn from them?

by Isabella Wright, Maia Hamin

Cybersecurity Cybersecurity Standards and Requirements
Generative art showing paper airplanes flying over Red Square in Moscow.

Mon, Jun 10, 2024

Another battlefield: Telegram as a digital front in Russia’s war against Ukraine

In this new report, the DFRLab investigates the role of Telegram in Russia since the February 2022 invasion of Ukraine

Conflict Disinformation

Mon, Apr 22, 2024

Markets Matter: A Glance into the Spyware Industry

The Intellexa Consortium is a complex web of holding companies and vendors for spyware and related services. The Consortium represents a compelling example of spyware vendors in the context of the market in which they operate—one which helps facilitate the commercial sale of software driving both human rights and national security risk.

by Jen Roberts, Trey Herr, Emma Taylor, Nitansha Bansal

Civil Society Cybersecurity
An image of a GPU overlaid with a computer terminal showing the results of an nmap command, a network scan.

Thu, Feb 15, 2024

Hacking with AI

Can generative AI help hackers? By deconstructing the question into attack phases and actor profiles, this report analyzes the risks, the realities, and their implications for policy.

by Maia Hamin, Stewart Scott

Artificial Intelligence Cybersecurity
Smartphone with the app from TikTok on the flags of the USA and China. (Source: Reuters)

Wed, Feb 14, 2024

TikTok: Hate the Game, Not the Player

How Strategic and Regulatory Confusion Around TikTok Prevent an Effective National Security Response

by Rose Jackson, Seth Stodder, Kenton Thibaut

Americas China

Tue, Jan 16, 2024

Design Questions in the Software Liability Debate

Software liability—resurgent in the policy debate since its mention in the 2023 US National Cybersecurity Strategy—describes varied potential structures to create legal accountability for vendors of insecure software. This report identifies key design questions for such regimes and tracks their discussion through the decades-long history of the debate.

by Maia Hamin, Sara Ann Brackett, and Trey Herr, with Andy Kotz

Cybersecurity Cybersecurity Standards and Requirements

Mon, Nov 13, 2023

This Job Post Will Get You Kidnapped: A Deadly Cycle of Crime, Cyberscams, and Civil War in Myanmar

In Myanmar, cybercrime has become an effective vehicle through which nonstate actors can fund and perpetuate conflict.

by Emily Ferguson and Emma Schroeder

Combating Cybercrime Security & Defense
Telephone with messaging apps. “Protecting point-to-point messaging apps: Understanding Telegram, WeChat, and WhatsApp in the United States” cover image.

Mon, Aug 14, 2023

Protecting point-to-point messaging apps: Understanding Telegram, WeChat, and WhatsApp in the United States

A year-long project on protecting users' data and privacy that analyzes the growing use of point-to-point messaging platforms in the United States and the implications their design and governing policies have for user privacy and free speech.

by Iria Puyosa

Democracy Derailed report cover art

Tue, Aug 8, 2023

Sudan’s precarious information environment and the fight for democracy

An examination of the time from December 2018, when protests against then-president Omar al-Bashir first broke out, and December 2022, when a framework agreement between civilian and military leaders came into play.

by Tessa Knight, Lujain Alsedeg

A World Map Of China 3D Rendering - Chinese Discourse Power Cover graphic

Wed, Aug 2, 2023

Chinese discourse power: Capabilities and impact

An examination of China's online and offline channels for the dissemination of "discourse power" and the mechanisms of oversight on which such communications rely.

by Kenton Thibaut

Mon, Jul 10, 2023

Critical Infrastructure and the Cloud: Policy for Emerging Risk

Critical infrastructure increasingly depends upon cloud computing. Policy must adapt its approach to risk management accordingly.

by Tianjiu Zuo, Justin Sherman, Maia Hamin, and Stewart Scott

Cloud Computing Cybersecurity