Cyber Security | Wilson Center

Cyber Security

'The Modus Operandi and Toolbox of Russia and Other Autocracies for Undermining Democracies Throughout the World': Ben Buchanan Testifies before Senate Judiciary Sub-Committee on Crime and Terrorism

Wilson Center Global Fellow and fellow at Harvard University’s Belfer Center for Science and International Affairs Benjamin Buchanan testified before the Senate Judiciary Subcommittee on Crime and Terrorism.

The State of Cybersecurity in Mexico: An Overview

The cost of cybercrime incidents in the world has gone from US$3 trillion in early 2015 to a projected US$6 trillion by 2021. Luis Almagro, the Secretary General of the OAS, acknowledged that information and communication technologies (ICTs) and its multiple uses continue to evolve at a rapid pace in the region and countries are highly vulnerable to potentially devastating cyberattacks. 

Bridging the Gaps in Cybersecurity Policy

Major questions impacting key cybersecurity policy decisions remain unanswered.  As a new Administration takes office, how should key stakeholders think about gaps like the capabilities of non-state actors to do harm in the digital space? Will other nations follow Russia’s lead and steal and leak information against foes? Is the future of the public-private partnership – especially in protecting America’s critical infrastructure – a promising one?

The Cybersecurity Dilemma

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. 

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions.

Bridging the Gaps in Cybersecurity Policy

 

Major questions impacting key cybersecurity policy decisions remain unanswered.  As a new Administration takes office, how should key stakeholders think about gaps like the capabilities of non-state actors to do harm in the digital space?  Will other nations follow Russia’s lead and steal and leak information against foes? Is the future of the public-private partnership – especially in protecting America’s critical infrastructure – a promising one?  And what’s the state of play in development of international norms?  Can the U.S. provide meaningful input?

The Spy Who Couldn't Spell: A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets

The thrilling, true-life account of the FBI’s hunt for the ingenious traitor Brian Regan—known as the Spy Who Couldn’t Spell.
 
Before Edward Snowden’s infamous data breach, the largest theft of government secrets was committed by an ingenious traitor whose intricate espionage scheme and complex system of coded messages were made even more baffling by his dyslexia. His name is Brian Regan, but he came to be known as The Spy Who Couldn’t Spell.
 

Pages