Unpacking State-Sponsored Cyber Conflict: Intelligence-Driven Strategic Competition in Cyberspace
White Paper, Akoto Safa Qureshi White Paper, Akoto Safa Qureshi

Unpacking State-Sponsored Cyber Conflict: Intelligence-Driven Strategic Competition in Cyberspace

In 2010, Stuxnet, a stealthy, sophisticated computer worm widely attributed to the United States and Israel, infiltrated Iran’s Natanz uranium enrichment facility and sabotaged its industrial controls, delaying Iran’s nuclear program without a single bombing raid or overt military strike. A few years later, Russian operatives hacked into U.S. political organizations in 2016, stealing and leaking emails in an effort to sway the presidential election. At the same time, Chinese state-sponsored groups quietly penetrated foreign government and corporate networks to siphon off military technology and industrial secrets over many years. These incidents, though bloodless and often deniable, had clear strategic stakes.

Read More
State-Sponsored Cyber Conflict: How Russia Responds to Election Interference Allegations on Social Media
White Paper, Akoto Safa Qureshi White Paper, Akoto Safa Qureshi

State-Sponsored Cyber Conflict: How Russia Responds to Election Interference Allegations on Social Media

Russia has been repeatedly accused of employing non-state cyber proxies to conduct sophisticated cyber-attacks and information operations aimed at influencing US elections. These allegations, notably around the contentious 2016 US presidential election, have attracted substantial global attention, underscoring critical vulnerabilities within democratic institutions.

Read More
Primer on the Costs of Cyber Espionage
White Paper, Akoto, Herr Guest User White Paper, Akoto, Herr Guest User

Primer on the Costs of Cyber Espionage

Cyber espionage is the use of cyber tools and techniques to gather intelligence or steal sensitive information from targeted entities. This form of espionage poses significant risks to national security, economic stability and corporate integrity. Given the complex and often hidden nature of cyber espionage activities, accurately measuring their costs presents a significant challenge.

Read More
Disinformation and Identity-Based Violence
White Paper, Bradshaw Guest User White Paper, Bradshaw Guest User

Disinformation and Identity-Based Violence

Disinformation spread via digital technologies is accelerating and exacerbating violence globally. There is an urgency to understand how coordinated disinformation campaigns rely on identity-based disinformation that weaponizes racism, sexism, and xenophobia to incite violence against individuals and marginalized communities, stifle social movements, and silence the press.

Read More