Cyber Security | Wilson Center

Cyber Security

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country.

Mass Killing and Technology: The Hidden Links

This blog post originally appeared on Debugged, a Wilson Center Blog from the Digital Futures Project. 

Going Darker? The Challenge of Dark Net Terrorism

When most people think of the Dark Net, they think of crime, fraud, illegal online activities and terrorism. But what really is the Dark Net? Why is it appealing to internet-savvy terrorists? How can we counter this new age of terrorism? Perhaps most crucially, is the Dark Net all Dark?

Quo Vadis? Mexico’s National Cybersecurity Strategy

In order to reach a destination, you have to know where you are going. Having a roadmap traces a path towards reaching a goal and that is the purpose of a national Cybersecurity strategy. Mexican society has become ever more reliant on information and communications technology (ICTs) and on-line government services. The financial sector and the national economy as a whole is increasingly dependent on digital platforms. Being interconnected, however, brings risks and having a national security strategy is fundamental to protecting the country’s well-being.

Pulling Back the Curtain on the Dark Net

The majority of internet content – as much as 96 percent – exists beyond the reach of your Google searches in a place known as the “dark net.” This hidden part of the web, which is not indexed by standard search engines and browsers, serves as a haven for criminals and cyberterrorists, but also provides an important tool for democracy activists and journalists. Is it possible to police bad actors without destroying a powerful option for those with legitimate reasons to operate with anonymity?

'Time is Now' to Support Women Leadership in Global Cybersecurity

International Women’s Day, celebrated worldwide annually on March 8, is a chance to reflect on past and present-day challenges associated with achieving gender equality[1]. As technology is harnessed to enable digital transformation for global good, it is time for the members of the world community to work toward a future where women from all walks of life will no longer be subject to injustices, inequality, and discrimination.

Russian Meddling Is a Meme

Recently I had a lot of fun watching a short-film-length campaign video from Colombia that tells an elaborate story of some vodka-drinking foul-mouthed Russian spies trying to understand Colombian politics. The country holds presidential elections this coming May. The campaign behind the video is that of Claudia López, a senator and a respected former investigative journalist, running on an anticorruption platform.

2nd Annual Transatlantic Symposium on ICT and Policy


Leveraging People, Technology, and Information for a Smart and Connected Society