Russia’s election interference reflects a trend that blends premeditation with opportunism. To bolster resilience, countries must urgently share best practices and lessons learned.
A discussion on how different states use cyber proxies and the challenges they pose.
One genuine piece of news behind the U.S. sanctions against Russian individuals and organizations is the attribution to Russia of a hacking campaign that has targeted critical U.S. infrastructure.
Three potential paths have emerged for future efforts to develop norms for state behavior in cyberspace.
Cyber, like the nuclear field, is now a leading means through which international relations play out today.
The story of Karim Baratov and Alexsey Belan provides insight into proxy relationships between the Russian state and hackers.
Many states are employing ostensibly independent hackers as proxies to project influence both domestically and overseas.
Many states outsource their cyber operations to non-state actors, with varying degrees of control over their actions. The crisis in Ukraine is a perfect example of this phenomenon.
To understand how Iran uses cyber proxies, it’s important to understand how Tehran thinks about cyber security in the first place.
As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power.