Cyber Statecraft Initiative
@cyberstatecraft.bsky.social
77 followers 9 following 180 posts
The Cyber Statecraft Initiative works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.
Posts Media Videos Starter Packs
Pinned
cyberstatecraft.bsky.social
The deadline to sign up your team for the inaugural Monterey #Cyber912 Strategy Challenge has been extended to Monday, October 13 at 11:59PM ET.

If you were thinking about organizing your dream team... consider this your sign! 🔮✨
 
Register here: form.jotform.com/Cyber_Statec...
a man speaking into a microphone with the words " this is your moment " above him
ALT: a man speaking into a microphone with the words " this is your moment " above him
media.tenor.com
cyberstatecraft.bsky.social
Wondering what could prevent another incident like the XZ backdoor? Aeva Black suggests “A healthy dose of caution–particularly for maintainers of low-level system libraries in widespread use–is needed.” Check out the 5x5 to read more:
The 5x5—The XZ backdoor: Trust and open source software
Open source software security experts share their insights into the XZ backdoor, and what it means for open source software security.
www.atlanticcouncil.org
cyberstatecraft.bsky.social
Does more money for open source software lead to better OSS security? Causality is always hard to show, but correlation is easy! Check out our issue brief here: www.atlanticcouncil.org/content-seri...
cyberstatecraft.bsky.social
The deadline to sign up your team for the inaugural Monterey #Cyber912 Strategy Challenge has been extended to Monday, October 13 at 11:59PM ET.

If you were thinking about organizing your dream team... consider this your sign! 🔮✨
 
Register here: form.jotform.com/Cyber_Statec...
a man speaking into a microphone with the words " this is your moment " above him
ALT: a man speaking into a microphone with the words " this is your moment " above him
media.tenor.com
cyberstatecraft.bsky.social
Securing AI means securing all of its data supply chain. This new framework helps policymakers & technologists see the full picture. Read the issue brief here: www.atlanticcouncil.org/in-depth-res...
cyberstatecraft.bsky.social
“There's still a disconnect in recognizing that cybersecurity is a foundational business risk and not a one-time, niche issue,” says Ayan Islam.

When it comes to workforce development, it takes investment at all levels!

See what other experts thought:
The 5×5—Strengthening the cyber workforce
Experts provide insights into ways for the United States and its allies to bolster the cyber workforce.
www.atlanticcouncil.org
cyberstatecraft.bsky.social
Access-as-a-Service firms bypass arms control agreements like the Wassenaar Arrangement by hiring foreign nationals. Policymakers must understand this industry to shape and limit the spread of offensive cyber capabilities. More here: www.atlanticcouncil.org/in-depth-res...
Countering cyber proliferation: Zeroing in on Access-as-a-Service
It is imperative that governments reevaluate their approach to countering the proliferation of offensive cyber capabilities.
www.atlanticcouncil.org
cyberstatecraft.bsky.social
US investment not only funds these companies—it legitimizes them. More money. More talent. More risk to Americans. Overview of this issue set and how to combat it in:
Tackling the Spyware Crisis
Domestic investment in spyware is undermining national security at all levels of society.
nationalinterest.org
cyberstatecraft.bsky.social
For the offensive cyber capabilities market there is a "lack of transparency, insight, and monitorability of this global ecosystem when compared to physical equivalents such as small arms, chemical and radiological weapons etc." writes Ollie Whitehouse in
Makings of the Market: Seven perspectives on offensive cyber capability proliferation
The marketplace for offensive cyber capabilities continues to grow globally. Their proliferation poses an expanding set of risks to national security and human rights, these capabilities also have…
www.atlanticcouncil.org
cyberstatecraft.bsky.social
Cloud myth #4: Cloud providers do not influence the shape of the internet.

Fact: the availability of cloud computing has fundamentally reshapes where and how data is processed and thus how it flows across the internet.

More here:
Four myths about the cloud: The geopolitics of cloud computing
In competition and cooperation, cloud computing is the canvas on which states conduct significant political, security, and economic activity.
www.atlanticcouncil.org
cyberstatecraft.bsky.social
Cyberscam operations emanating from Myanmar create symbiotic benefit for criminal and armed groups, the operations themselves are intensely parasitic to the global cyber domain, the broader Southeast Asian region, and the population of Myanmar. 🔗
This job post will get you kidnapped: A deadly cycle of crime, cyberscams, and civil war in Myanmar
In Myanmar, cybercrime has become an effective vehicle through which nonstate actors can fund and perpetuate conflict.
www.atlanticcouncil.org
cyberstatecraft.bsky.social
There's no doubt non-state actors play a big role in cybersecurity. But how should policy reflect that? Hear from Simon Handler, Emma Schroeder, and Trey Herr on lessons for cyber policy from counterterrorism .
Cyber Security as Counter-Terrorism: Seeking a Better Debate - War on the Rocks
Earlier this month, a senior Justice Department official referred to ransomware as a potential “cyber weapon of mass destruction.” When hackers
warontherocks.com
cyberstatecraft.bsky.social
Sneak Peek: In both the Python and npm ecosystems, funding is correlated with improved scores for both the ⚠️Dangerous Workflows⚠️ and 🗝️Token Permissions🗝️ subchecks, as well as others! Want to know more? Read the full report here report ⬇️ www.atlanticcouncil.org/content-seri...
cyberstatecraft.bsky.social
CSI's recent O$$ report investigates whether open source software projects with general funding have better security practices on average than similar unfunded projects with @OpenSSF Scorecards. We dove into the subchecks to figure out which ones increased with funding 📈💰🔐
cyberstatecraft.bsky.social
Representation matters – if we can’t see, we can’t be.

“We’ve just begun to tap into the capabilities of our full population” says former Acting National Cyber Director Kemba Walden on the National #CyberWorkforce and Education Strategy. See more here:
www.atlanticcouncil.org/event/unleas...
cyberstatecraft.bsky.social
🏆 First-time participant? Our playbook with starter packs & past scenarios will guide you all the way.🔗https://www.atlanticcouncil.org/technology-innovation/cybersecurity/cyber-9-12-strategy-challenge-preparation-materials/
Cyber 9/12 Strategy Challenge Preparation Materials
Each year, competitors from around the globe compete in the Cyber 9/12 Strategy Challenge, developing policy recommendations in response to a realistic cyber crisis simulation. Here, the Cyber…
www.atlanticcouncil.org
cyberstatecraft.bsky.social
☀️ Join the 2025 Monterey, CA #Cyber912 Challenge, Nov 7–8 at Middlebury Insitute of International Studies at Monterey. Team up, tackle a cyber crisis, & learn from experts. Register by September 29, 2025: form.jotform.com/Cyber_Statec...
cyberstatecraft.bsky.social
How can cyber capabilities support crisis & contingency operations? Not just through independent operation during a crisis "but through continuous campaigning in day-to-day strategic competition."
Read the full Michael Fischerkeller piece here:
What do we know about cyber operations during militarized crises?
Policymakers must critically examine assumptions and claims that cyber operations can serve as de-escalatory crisis offramps.
www.atlanticcouncil.org