Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Reports

Mapping Threat Actor Behavior in the Ransomware Payment Ecosystem: A Mini-Pilot

Zoë Brammer

viewpdf

Reports

May 2023 Progress Report: Ransomware Task Force: Gaining Ground

Ransomware Task Force

viewpdf

Reports

Castles Built on Sand: Towards Securing the Open-Source Software Ecosystem

Zoë Brammer, Silas Cutler, Marc Rogers, Megan Stifel

viewpdf

Reports

Cyber Incident Reporting Framework: Global Edition

Cyber Threat Alliance, Institute for Security and Technology

viewpdf

Reports

AI-NC3 Integration in an Adversarial Context: Strategic Stability Risks and Confidence Building Measures

Alexa Wehsener, Andrew W. Reddie, Leah Walker, Philip Reiner

viewpdf

Op-ed

The Nuclear Risk Reduction Approach: A Useful Path Forward for Crisis Mitigation

Sylvia Mishra

view

Reports

Nuclear Crisis Communications: Mapping Risk Reduction Implementation Pathways

Sylvia Mishra

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Intervention or Cooperation? The Roles for Military and Law Enforcement in Combating Ransomware

Lauren Zabierek, Gavin Wilde, Gary Corn, Dmitri Alperovitch, and Megan Stifel

EVENT DESCRIPTION

Ransomware may be the most visible cybersecurity crisis of the moment, but it’s just one aspect of a broader national security threat landscape. As the pressure builds for greater government-led responses to cyber threats, the Biden Administration has reportedly opted to lean heavily on U.S. Cyber Command.

USCYBERCOM is one element of a comprehensive and diverse whole-of-government approach to cyber threats. As the United States looks to build and fund an effective toolbox of public-private collaboration on cybersecurity risk management, we’ll take a closer look at the role of law enforcement and military authorities in managing the ransomware threat.

The threat landscape is generally known, the cybersecurity best practices are well established though not widely implemented. But what are the rules of engagement for law enforcement and the military in preparing for and responding to threat actors operating overseas, often in jurisdictions that lack the political will to effectively address these actors? What’s at stake in blending these tools and how do and should we work with allies or even adversarial countries in combating ransomware?

On December 15, 2021, IST’s Megan Stifel hosted a conversation with Lauren Zabierek, Gavin Wilde, Gary Corn, and Dmitri Alperovitch on law enforcement and the military’s role in combating national-scale cyber threats.