The Costs of Espionage
Policy Paper Series Safa Qureshi Policy Paper Series Safa Qureshi

The Costs of Espionage

States spend a lot of time worrying about spies, and a lot of money trying to protect themselves from espionage. They construct multilayered personnel policies to keep untrustworthy individuals from government jobs that involve handling classified information. They invest heavily in complex information systems to block access to sensitive communications.

Read More
Unpacking State-Sponsored Cyber Conflict: Intelligence-Driven Strategic Competition in Cyberspace
White Paper, Akoto Safa Qureshi White Paper, Akoto Safa Qureshi

Unpacking State-Sponsored Cyber Conflict: Intelligence-Driven Strategic Competition in Cyberspace

In 2010, Stuxnet, a stealthy, sophisticated computer worm widely attributed to the United States and Israel, infiltrated Iran’s Natanz uranium enrichment facility and sabotaged its industrial controls, delaying Iran’s nuclear program without a single bombing raid or overt military strike. A few years later, Russian operatives hacked into U.S. political organizations in 2016, stealing and leaking emails in an effort to sway the presidential election. At the same time, Chinese state-sponsored groups quietly penetrated foreign government and corporate networks to siphon off military technology and industrial secrets over many years. These incidents, though bloodless and often deniable, had clear strategic stakes.

Read More
State-Sponsored Cyber Conflict: How Russia Responds to Election Interference Allegations on Social Media
White Paper, Akoto Safa Qureshi White Paper, Akoto Safa Qureshi

State-Sponsored Cyber Conflict: How Russia Responds to Election Interference Allegations on Social Media

Russia has been repeatedly accused of employing non-state cyber proxies to conduct sophisticated cyber-attacks and information operations aimed at influencing US elections. These allegations, notably around the contentious 2016 US presidential election, have attracted substantial global attention, underscoring critical vulnerabilities within democratic institutions.

Read More
Insuring the Unseen: Closing the Protection Gap in Economic Cyber-Espionage
Policy Paper Series Guest User Policy Paper Series Guest User

Insuring the Unseen: Closing the Protection Gap in Economic Cyber-Espionage

Economic cyber espionage represents an ongoing threat to both nations and markets, yet unlike other cyber threats, it remains largely uninsured. This does not have to be the case. The underinsurance for economic cyber espionage is more of a mechanical problem, with coverage gaps hinging on proving damage to intangible assets. In fact, this protection gap persists even when attackers are “incompetent” (i.e., unable to use the IP they steal), since victims still incur measurable, indemnifiable costs.

Read More
Buying Security: Open Source Software Funding and Security Posture
Policy Paper Series Guest User Policy Paper Series Guest User

Buying Security: Open Source Software Funding and Security Posture

The security of open source software (OSS) has morphed from a niche technical concern to a central cybersecurity policy challenge. High-profile incidents have led to suggestions for governments to help strengthen the OSS ecosystem, including calls for funds built to support open source projects and their maintainers, such as a proposal for an EU Sovereign Tech Fund. This research examines the argument that unconditional funding—namely, financial support without specific requirements for the recipient—causally improves the security posture of OSS projects.

Read More
Artificial Intelligence & Language Preservation
Policy Paper Series Guest User Policy Paper Series Guest User

Artificial Intelligence & Language Preservation

The United Nations Educational Scientific and Cultural Organization (UNESCO) has designated 2022-2032 the International Decade of Indigenous Languages. This initiative comes at a time when endangered language speakers, linguists, and other groups are concerned about language extinction and the rapid spread of artificial intelligence (AI). Some researchers are optimistic that AI can be leveraged to help document, preserve, and revitalize at-risk languages, while others are concerned that the technology will accelerate the homogenization of human language.

Read More
True Costs of Misinformation | The Global Spread of Misinformation Laws
Journal Article, Bradshaw Guest User Journal Article, Bradshaw Guest User

True Costs of Misinformation | The Global Spread of Misinformation Laws

Between 2010 and 2022, 80 countries enacted new legislation or amended existing laws in an attempt to curb the spread of misinformation online. This sharp and global adoption of misinformation laws, however, cannot be explained by the sudden emergence of false or misleading information, as these problems have existed for a very long time.

Read More
Gotta Track’em All: Data Privacy and Saudi Arabia’s Pokémon Go Acquisition
Expert Commentary, Bradshaw, Jackson Guest User Expert Commentary, Bradshaw, Jackson Guest User

Gotta Track’em All: Data Privacy and Saudi Arabia’s Pokémon Go Acquisition

In a given month, more than 100 million people open Pokémon Go—the app that allows users to superimpose the world’s most profitable media franchise onto reality using only their smartphone. Using their phone camera and a flick of the wrist, they captured tiny digital monsters at the park, at the office, sometimes in active minefields, and, yes, in the bathroom.

Who else was watching?

Read More
Primer on the Costs of Cyber Espionage
White Paper, Akoto, Herr Guest User White Paper, Akoto, Herr Guest User

Primer on the Costs of Cyber Espionage

Cyber espionage is the use of cyber tools and techniques to gather intelligence or steal sensitive information from targeted entities. This form of espionage poses significant risks to national security, economic stability and corporate integrity. Given the complex and often hidden nature of cyber espionage activities, accurately measuring their costs presents a significant challenge.

Read More
Disinformation and Identity-Based Violence
White Paper, Bradshaw Guest User White Paper, Bradshaw Guest User

Disinformation and Identity-Based Violence

Disinformation spread via digital technologies is accelerating and exacerbating violence globally. There is an urgency to understand how coordinated disinformation campaigns rely on identity-based disinformation that weaponizes racism, sexism, and xenophobia to incite violence against individuals and marginalized communities, stifle social movements, and silence the press.

Read More
Mythical Beasts and Where to Find Them
Report, Herr Sam Bradshaw Report, Herr Sam Bradshaw

Mythical Beasts and Where to Find Them

The Mythical Beasts project addresses this meaningful gap in contemporary public analysis on spyware proliferation, pulling back the curtain on the connections between 435 entities across forty-two countries in the global spyware market. These vendors exist in a web of relationships with investors, holding companies, partners, and individuals often domiciled in different jurisdictions.

Read More
Secret Cyber Wars: Why States Are Increasingly Turning to Economic Espionage and How Cyber Proxies Play a Key Role
Expert Commentary, Akoto Guest User Expert Commentary, Akoto Guest User

Secret Cyber Wars: Why States Are Increasingly Turning to Economic Espionage and How Cyber Proxies Play a Key Role

In September 2001, operatives for Procter & Gamble were caught diving in dumpsters outside a Unilever facility in Chicago in search of documents and other discarded items containing confidential information about Unilever’s hair care products business. To avoid litigation and the negative publicity that often accompanies such disputes, the companies quietly reached a negotiated settlement where Procter & Gamble agreed to not use any of the information obtained. This early example illustrates the ongoing vulnerability companies face regarding data security. In today’s corporate environment where digital data storage is the norm, companies now have to be wary of not only paper documents but also discarded storage devices like hard drives, USBs, and even old office equipment that might store digital data.

Read More