Cyber Statecraft Initiative

Wed, Sep 4, 2024

Mythical Beasts and Where to Find Them

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights is concerned with the commercial market for spyware and provides data on market participants.

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Cybersecurity Proliferation of Offensive Cyber Capabilities

Wed, Sep 4, 2024

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights

The Mythical Beasts project pulls back the curtain on the connections between 435 entities across forty-two countries in the global spyware market.

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Cybersecurity Proliferation of Offensive Cyber Capabilities

Wed, Sep 4, 2024

Mythical Beasts and Where to Find Them: Data and Methodology

Learn more about the methodology and dataset behind Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Cybersecurity Proliferation of Offensive Cyber Capabilities

Mon, Aug 19, 2024

AI in Cyber and Software Security:  What’s Driving Opportunities and Risks?

This issue brief discusses the drivers of evolving risks and opportunities presented by generative artificial intelligence (GAI), particularly in cybersecurity, while acknowledging the broader implications for policymakers and for national security.

by Maia Hamin, Jennifer Lin, Trey Herr

Artificial Intelligence Cybersecurity
CSI Russian Tech Isolation

Mon, Jul 29, 2024

Russia’s Digital Tech Isolationism: Domestic Innovation, Digital Fragmentation, and the Kremlin’s Push to Replace Western Digital Technology 

Russia’s technological isolation is both a reality and a desired goal for Moscow. This piece explores the impacts of this phenomenon and offers recommendations for how to deal with that evolving digital ecosystem.

by Justin Sherman

Cybersecurity Internet

Wed, Jul 24, 2024

OT Cyber Policy: The Titanic or the Iceberg

Current policy does not address the issue of cyber-physical security with a systemic approach, instead focusing with tunnel vision on specific events. This analysis uses the iceberg model for systems thinking to address policy gaps in the OT ecosystem, detailing recommendations for the Cybersecurity and Infrastructure Security Agency (CISA).

by Danielle Jablanski

Critical Infrastructure Policy Operational Technology

Mon, Jul 1, 2024

The Impact of Corruption on Cybersecurity: Rethinking National Strategies Across the Global South  

As the Global South prepares for the next stage in ICT development, governments must prioritize policies that reduce corruption in critical network software procurement to protect those countries' developing cyberspace.

by Robert Peacock

Corruption Cyber Strategy

Mon, Jun 24, 2024

User in the Middle: An Interoperability and Security Guide for Policymakers

When technologies work together, it benefits users and the digital ecosystem. Policymakers can advance interoperability and security in tandem by understanding how each impacts the other.

by Maia Hamin, Alphaeus Hanson

Cybersecurity Cybersecurity Standards and Requirements

Wed, Jun 12, 2024

“Reasonable” Cybersecurity in Forty-Seven Cases: The Federal Trade Commission’s Enforcement Actions Against Unfair and Deceptive Cyber Practices

The FTC has brought 47 cases against companies for unfair or deceptive cybersecurity practices. What can we learn from them?

by Isabella Wright, Maia Hamin

Cybersecurity Cybersecurity Standards and Requirements

Mon, May 13, 2024

International Cyberspace & Digital Policy Strategy: AC Tech Programs Markup

On May 6, the Department of State released the United States International Cyberspace & Digital Policy Strategy. Read along with AC Tech Programs staff, fellows, and experts for commentary and analysis.

by Emma Schroeder, Graham Brookie, Raul Brens Jr., Emerson Brooking, Safa Shahwan Edwards, Trey Herr, Rose Jackson

Artificial Intelligence Cyber Strategy

Tue, May 7, 2024

Lessons Learned from the Cyber 9/12 Strategy Challenge 

Students from Tufts University tell us their greatest lessons learned from competing in the Cyber 9/12 Strategy Challenge.

by Sara Mishra, Hannah Dora Patterson, Ethan Moscot, and Andrew Vu

Cyber 9/12 Strategy Challenge Cybersecurity

Wed, May 1, 2024

The 5×5—The XZ Backdoor: Trust and Open Source Software

Open source software security experts share their insights into the XZ backdoor, and what it means for open source software security.

by Nitansha Bansal, Stewart Scott

Cybersecurity Open Source Software