from Digital and Cyberspace Policy Program

CFR Tracker Documents Rise in States Sponsoring Cyberattacks

November 1, 2017

News Releases

The number of countries sponsoring cyber operations is rising, reveals a new Council on Foreign Relations (CFR) Cyber Operations Tracker that catalogs nearly two hundred state-sponsored cyber incidents known to the public since 2005.

More From Our Experts

CyberOperations Tracker

More on:

Cybersecurity

Defense and Security

In addition to Russia, China, North Korea, and the United States, the sixteen countries suspected of engaging in cyber operations include newcomers such as Vietnam, Kazakhstan, and Mexico. The incidents include distributed denial of service (paralyzing a computer network by flooding it with data), espionage, defacement, data destruction, sabotage, and doxing (publishing private or identifying information). The tracker—produced by CFR's Digital and Cyberspace Policy program—notes that in response to growing insecurity, states have begun using sanctions and criminal charges to punish alleged perpetrators and state sponsors.

"Information about state-sponsored cyber incidents has been challenging to access. Incidents are either not reported or they are reported inconsistently across sources," notes Adam Segal, the Ira A. Lipman chair in emerging technologies and national security and director of the Digital and Cyberspace Policy program. "By collecting and publishing this data publicly, we hope not only that policymakers can get a more complete picture of cyber threats but also that researchers can share information and better understand state activity online."

The Cyber Operations Tracker offers

More From Our Experts
  • a searchable database of nearly two hundred state-sponsored cyber-incidents known to the public;
  • a timeline listing incidents from 2005 to the present;
  • a downloadable dataset for deeper investigation;
  • a submission tool for reporting new incidents;
  • profiles of more than fifty threat actors;
  • explanations of the six most common types of cyber operations; and
  • an analysis of important trends.

The tracker is regularly updated by CFR’s Digital and Cyberspace Policy program. View the tracker at www.cfr.org/CyberTracker. Follow Segal on Twitter @adschina and the Digital and Cyberspace Policy program’s updates on the Net Politics blog. To learn more or to request an interview, please contact the Communications team at communications@cfr.org or 212.434.9888.

More on:

Cybersecurity

Defense and Security

CFR’s Digital and Cyberspace Policy program addresses one of the most challenging issues facing the country in the twenty-first century: keeping the global internet open, secure, and resilient in the face of unprecedented threats.

Up
Creative Commons
Creative Commons: Some rights reserved.
Close
This work is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License.
View License Detail
Close

Explore More on CFR

North Korea

The Singapore summit lessened the chances of conflict in the short term, but the ultimate legacy of the summit could still be a march toward war.

 

Public Health Threats and Pandemics

Endemic to the African tropics, the Ebola virus has killed thousands in recent years, putting the World Health Organization and major donor countries in the limelight as they’ve grappled with how to respond to outbreaks.