20,062
Views
31
CrossRef citations to date
0
Altmetric
Research Article

A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society

ABSTRACT

Public and academic knowledge of cyber conflict relies heavily on data from commercial threat reporting. There are reasons to be concerned that these data provide a distorted view of cyber threat activity. Commercial cybersecurity firms only focus on a subset of the universe of threats, and they only report publicly on a subset of the subset. High end threats to high-profile victims are prioritized in commercial reporting while threats to civil society organizations, which lack the resources to pay for high-end cyber defense, tend to be neglected or entirely bracketed. This selection bias not only hampers scholarship on cybersecurity but also has concerning consequences for democracy. We present and analyze an original dataset of available public reporting by the private sector together with independent research centers. We also present three case studies tracing reporting patterns on a cyber operation targeting civil society. Our findings confirm the neglect of civil society threats, supporting the hypothesis that commercial interests of firms will produce a systematic bias in reporting, which functions as much as advertising as intelligence. The result is a truncated sample of cyber conflict that underrepresents civil society targeting and distorts academic debate as well as public policy.

On October 1, 2018, a Citizen Lab report revealed that the phone of Omar Abdulaziz, a prominent dissident of the Kingdom of Saudi Arabia, had been infected with sophisticated spyware (Marczak et al. Citation2015). The researchers established with a high degree of confidence that his phone was compromised by an operator associated with the Saudi Arabian government; they also identified the spyware as the ‘Pegasus’ suite manufactured by the Israel-based vendor NSO Group. Abdulaziz, a university student and Canadian resident, runs a popular YouTube channel posting satirical videos critical of the Saudi regime. One day later, another high-profile dissident, Washington Post journalist Jamal Khashoggi, was lured into the Saudi consulate in Istanbul, Turkey, where he was murdered and dismembered. Soon thereafter it was revealed that Abdulaziz and Khashoggi were working together on a social media opposition campaign against the Crown Prince of Saudi Arabia, principally communicating over an encrypted, supposedly private WhatsApp conversation but which Citizen Lab discovered was being remotely monitored by Saudi intelligence. Although the reasons underlying the specific decision to murder Khashoggi are unknown, many have drawn connections to the surveillance uncovered in this operation (Rogin, Citation2018; Shezaf, Citation2018).

This case calls into question several popular assumptions about cybersecurity. First, prevalent narratives emphasize threats to critical infrastructure, intellectual property, and state secrets. In this case, however, Saudi Arabia used a sophisticated exploitation platform to target a lone critic running a comedy channel. Second, cyberspace is widely thought to advantage weaker actors against the strong, but the asymmetry here runs in the reverse direction.Footnote1 NSO Group, a self-described “cyber warfare” firm valued at 1 billion USD, sells its technology exclusively to government, law enforcement, military, and intelligence agencies, yet the Saudi regime used its military-grade capabilities to hack a dissident’s iPhone. Third, security firms and government agencies are usually considered experts in cybersecurity, yet this threat was identified and disclosed by civil society itself. Citizen Lab is a small unit of a major research university that conducts interdisciplinary research into targeted digital threats,Footnote2 and it detected the threat to Abdulaziz only because it was studying a broader pattern of human rights violations abetted by NSO Group. While scholarly and policy discourse about cybersecurity focuses on high-end threats to high-profile actors, there are reasons to believe that the targeted exploitation of civil society is a fundamental feature of the cyber revolution. Russian interference in the 2016 U.S. presidential election dramatically highlighted the vulnerability of civil society and the shortcomings of the cybersecurity debate, precisely because the victim was a democratic superpower. More typically, civil society has suffered in silence.

What explains the gap between perception and practice? Most of what we know about cyber conflict stems from data provided by public reporting from cybersecurity firms, yet in these reports civil society targets like Omar Abdulaziz tend to receive only passing attention. We consider commercial threat reporting in terms of the publicly available reports on targeted digital threats by private vendors of threat intelligence services. These reports are primarily marketing instruments aiming to increase revenue from the paid products offered by these vendors, namely private intelligence reporting and network defense services. Importantly, the incentives driving public reporting tend to create a biased sample of incidents at the high end of conflict spectrum and/or targeting rich actors who can afford to pay for commercial cyber defense. Threats against civil society organizations (CSOs)Footnote3 who cannot afford to pay, however, tend to go unreported while their networks go undefended. This is bad for both the health of democracy and the study of cybersecurity.

Hence, we argue, commercial threat reporting presents a truncated sample of cyber conflict that distorts threat perceptions. This reporting is subject to systematic bias, yet this bias has not been systematically examined. Threat inflation within commercial reports is a well-established problem, but selection bias across reports has not been sufficiently addressed in the literature on cyber conflict. Importantly, because commercial threat reporting offers by far the largest, and often the only, source of data on cyber conflict, this bias is likely to impact perception among both policy-makers and researchers.

We test this theory with an original dataset of all available public reporting on targeted exploitation, comprised of 700 reports in total, from 2009–2018. The reports we collected were derived from two types of sources: first, commercial threat intelligence vendors (629 reports), and second, independent research centers (71 reports). We also examine helpline data from AccessNow, a digital rights advocacy group, reflecting digital threats as reported by civil society itself. We find that a low proportion of commercial threat reports discuss civil society, and those that do focus on high-profile victims and threat actors. The geographical distribution of reporting and attribution patterns are congruent with the hypothesized selection bias. As a further plausibility probe, we select three cases of civil society exploitation, one attributed to Russia and the other two to China, for structured focused comparison. The forensic data strongly confirm our theory as even the least-likely case exhibits clearly selective reporting. We conclude with a discussion of implications for scholarship and democracy in the digital age.

The problem: what do we know?

Early cybersecurity scholarship imagined a future of cyberwar that relied mostly on speculation since data was scarce. John Arquila and David Ronfeldt hypothesized in 1993 that “the information revolution implies the rise of cyberwar, in which neither mass nor mobility will decide outcomes” (Citation1993, p. 141). In this scenario, information trumps mass, geography is secondary as conflict occurs ‘in cyberspace’ at unprecedented speeds, and power is diffused toward smaller actors, leading to a rise of asymmetric threats (Arquilla & Ronfeldt, Citation1993, p. 143–55). This cyberwar scenario became conventional wisdom in cybersecurity discourse and persisted for almost two decades.

Consequently, in 2010 Lynn III argued that “cyberwarfare is asymmetric ….A dozen determined computer programmers can, if they find a vulnerability to exploit, threaten the United States” (Lynn, Citation2010). Similarly, Joseph Nye asserts that “low barriers to entry contribute to the diffusion of power in the cyberdomain” (Nye, Citation2011, p. 124). This perception led to a focus on threats to critical infrastructure, and the assumption that vulnerabilities in the latter “provide asymmetrical advantages to nonstate actors ”(Rattray, Citation2009, p. 265). Yet the threat of destructive cyberwar has remained hypothetical, and even the best candidate for an exception (Stuxnet) violates conventional assumptions about cyberwar (Lindsay, Citation2013), thus proving the rule.

Around the same time, however, Citizen Lab demonstrated that empirical data collection on cyber conflict was possible as its researchers discovered that a hacking operation against the Tibetan exile government was part of a global Chinese espionage campaign targeting government agencies and civil society across 103 countries (R. Deibert & Rohozinski, Citation2009). This report, titled “Ghost Net”, changed the cybersecurity landscape, as private vendors started publishing reports under names like “Shady RAT” and “Aurora” detailing cyber operations discovered in the wild (HBGary, Citation2010; McAfee, Citation2010). The same year the Stuxnet malware offered the first evidence of cyber operations causing physical damage. Importantly, most empirical evidence on this operation came from commercial threat reports (ESET, Citation2010; Langner, Citation2011; Symantec, Citation2011). Such public reporting, freely available on vendors’ websites, quickly increased in volume, providing both scholars and policy-makers with a rich new source of data.

Building on these data, several scholars challenged the established wisdom on cyberwar. In 2012, Thomas Rid argued that the “the world never experienced an act of cyber war … instead, the last decade saw increasingly sophisticated acts of network-enabled sabotage, espionage, and subversion.” (Rid, Citation2012, p. 29). Jon Lindsay’s study of Stuxnet (Citation2013), primarily relying on commercial threat reporting data, underlined that “the technically and organizationally sophisticated level of play required for cyber warfare is generally beyond the capacity of a lone hacker, a small group of amateurs, or even organized criminals” (Lindsay, Citation2013, p. 389). Similarly, Erik Gartzke concludes that ”by far the most compelling scenario for the transformation of political conflict through the internet … involves the use of the internet for espionage” (Gartzke, Citation2013, p. 70). The limited effectiveness of cyber operations as means of warfare, coercion and destruction has since been emphasized by an increasing number of scholars (Borghard & Lonergan, Citation2017; Slayton, Citation2017; Smeets, Citation2018). In short, acts of violence or physical destruction involve non-trivial operational challenges that only powerful actors are both likely to overcome and unlikely to have interests in, given other more reliable ways of generating coercive harm. By contrast, digital espionage offers significant gains at relatively low risk.

Meanwhile, the volume of commercial threat reporting has increased exponentially and academics increasingly rely on the rich data these reports provide. Examples include Lindsay’s survey of Chinese cyber espionage (Citation2014), Thomas Rid and Ben Buchanan’s analysis of attribution (Citation2015), Buchanan’s 2017 book The Cybersecurity Dilemma, and Ben Jensen, Ryan Maness and Brandon Valeriano’s case study of Russia (Citation2019). This growing availability of publicly accessible data is clearly a positive development.

Yet commercial actors adopted the method pioneered by Citizen Lab, but not the substance of reporting. Commercial threat reporting primarily focuses on cybercrime, economic espionage and sabotage of critical infrastructure (CrowdStrike, Citation2019, 2; FireEye, Citation2019, 4; Symantec, Citation2019, p. 2–3). Since these reports constitute the largest, and often the only, source of data on cyber operations, perceptions of both policy-makers and academics can be expected to reflect patterns evident in threat reporting. Accordingly, JD Work underlines that due to the lack of alternative sources of data, “policymakers, military professionals, and scholars must rely heavily on this new range of sources to understand developments in the cyber domain” (Work, Citation2020, p. 2). Consequently, “a growing number of major policy issues are … profoundly shaped by underlying commercial intelligence reporting” (Work, Citation2020, p. 2). What is reported and what is not thus has a significant influence on academia and policy.Footnote4

The interference in the 2016 US Presidential elections through leaked information and social media influence campaigns upset prevailing threat models. As Jayamaha and Matisek put it, “no one expected that ‘subversive instruments’ would be used in such a way as to create intra-societal tensions through exploitation of civil society organizations” (Citation2018). Subsequent investigations – including by special counsel Robert Mueller III (Citation2019) – revealed a large-scale influence campaign using disinformation to sway voter opinions and foster divisions (Isaac & Wakabayashi, Citation2017; ODNI, Citation2017). Its actual effects on election outcomes continue to be hotly debated, but its significance is clear and reflected in threat perceptions of this operation as an ‘act of war’ (Schleifer & Walsh, Citation2017). This Russian influence campaign focusing on individuals and civil society caught most scholars and policy-makers off guard; it did not correspond to prevailing threat models focusing on critical infrastructure disruption and large-scale digital espionage.

The collective surprise among scholars and policy-makers alike suggests commercial threat reporting, a key data source informing prevailing threat models, provides an incomplete picture of cyber conflict. Significantly, in stark contrast to Jayamaha and Matisek’s claimed surprise, one scholar warned as early as 2003 that “pressures from the security and commercial sectors to regulate and control the Internet are beginning to alter its basic material architecture in ways that may undermine not only the activities of global civic networks, but also the long-term prospects for an open global communications environment” (Deibert, Citation2003). Others have noted the threat cyber conflict poses to civil society (Brantly, Citation2014), yet in academia it has remained mostly a fringe topic. Meanwhile, independent research centers and nonprofit organizations have documented the proliferation of targeted digital threats to civil society for over a decade.Footnote5 Independent research centers have only a fraction of the resources of commercial vendors, however, limiting their capacity to investigate and report on such threats at scale.

Threat intelligence has become a multibillion-dollar industry, hence vendors have the resources to report on many different threat types. However, commercial threats reports are unlikely to provide a representative sample of cyber conflict due to underlying business incentives. Existing research has addressed shortcomings of current attribution processes (Egloff, Citation2020; M. Mueller et al., Citation2019) and a trend of threat inflation in commercial reports to increase sales of security products (Dunn Cavelty, Citation2013). Since commercial reporting is usually the main source of data on cyber conflict, this threat inflation likely shaped exaggerated fears of ‘cyber doom’ (Lawson, Citation2013) and cyber terrorism that distort current debates and policy-making (Myriam Dunn-Cavelty, Citation2008). Yet such problems within reporting is well-established, systematic bias across reporting by different firms, affecting what types of threats are reported, and which are not, has not been sufficiently explored. A closer examination of the incentives behind threat reporting lead us to expect not only threat inflation, but systematic underreporting of specific threat types – and particularly threats to civil society. This problem is especially acute because of the scarcity of alternative data sources, and the dire consequences for civil society itself.

Commercial threat reporting presents a truncated sample of cyber conflict

We argue that commercial threat reporting presents a truncated sample of cyber conflict due to the private interests that shape reporting. Profit incentives lead firms to prioritize high-end threats to powerful actors using unique methods in their reporting, while neglecting threats to weaker actors – in particular, civil society. Consequently, threat reporting provides a distorted understanding of targeted cyber threats that focuses on activity at the high end of the conflict spectrum, and neglecting or bracketing activity at the lower end. This situation constitutes a market failure that leaves those most in need of accurate information about threats – vulnerable civil society actors – least well-informed. Moreover, because commercial reporting is often the only source of data, the distorted perception it provides to policy makers and academics results in an under prioritization of the problem.

Commercial threat reporting is part of the threat intelligence and network defense sector in information security. Threat intelligence firms are profit-driven enterprises that generate three main products: freely available public reporting, more comprehensive private reporting available to paying subscribers, and custom protection services that come at a substantial premium. We focus on public reports, where private vendors publish findings of their investigations into cyber operations detailing the tactics, techniques and procedures (TTP) used by so-called ‘threat actors’ to breach systems for data theft, surveillance and/or disruption.Footnote6

Importantly, public reporting is foremostly a marketing insrument to increase revenue from the two premium services mentioned above. Cybersecurity, in terms of both threat magnitude and defensive effectiveness, is notoriously hard to measure (Anderson et al., Citation2013). When a firm cannot directly advertise its comparative advantage, it will resort to indirect measures. A technically detailed report on a dramatic intrusion into a high-value target says, in effect, because our employees are smart enough to reverse engineer cyberwarfare, they are also smart enough to protect your business from it. According to Juan Andrés Guerrero-Saade, then a researcher at prominent vendor Kaspersky, “the intended purpose is a PR-coup to both attract new customers for closed-release intelligence reports as well as garner brand recognition and industry respect for formidable findings” (Guerrero-Saade, Citation2015, p. 4). Similarly, JD Work underlines that a ‘majority’ of public reporting constitutes ‘marketing collateral’ designed to “attract new customers, position themselves for evaluation by industry market research analysts” and “engage with prospective investors,” (Work, Citation2020, p. 16).

Consequently, commercial reports typically have two parts: first, they inform the audience about threats, and second, they highlight products to alleviate these threats. Vendors can be expected to target those sectors most likely to buy their products. CSOs, however, are notoriously cash-strapped (Crete-Nishihata et al., Citation2014, 2; CLTC, Citation2018), and thus least likely to invest in premium security products. In short, sectors of the greatest interests to threat intelligence vendors – government, military, Fortune-500 firms, etc – are likely to be prioritized in reporting, while low-revenue sectors are likely to be neglected or entirely ignored. If these assumptions are right, threat reporting presents a distorted picture of cyber conflict where threats aligned with the profit incentives of cybersecurity vendors are overrepresented, while civil society threats are underreported or entirely missing. This expectation aligns with Egloff’s contestation that only financially potent or politically relevant targets “have the public visibility for security companies to show off their skills” (Egloff, Citation2020, p. 7). The result is a classic market failure, i.e., the “failure of a more or less idealized system of price-market institutions to sustain ‘desirable’ activities or to stop ‘undesirable’ activities” (Bator, Citation1958, p. 351).

Although concentrated business interests shape what goes into public reporting, the product nonetheless provides diffuse benefits to the wider cybersecurity community about targeted threats.Footnote7 Accordingly, Rosenzweig has proposed characterizing commercial threat reporting as a public good (Citation2011). Threat reports fulfil and important role because the knowledge they provide not only helps scholars better understand cyber conflict, but it is essential for practitioners and potential victims to increase resilience and mitigate intrusions. Nascent community-driven initiatives to consolidate knowledge from threat reporting in shared resources attests to this importance.Footnote8

The underprovision of threat reporting to CSOs that results from the profit-incentives driving it has two key consequences. First, these organizations lack information on the threats they face. CSOs generally lack technical expertise and resources, making them easy targets. Moreover, they are also attractive targets for security services interested in surveilling, exploiting, or repressing them. Potential consequences are more severe compared to commercial actors because they involve personal harm, detention, or even death (Crete-Nishihata et al., Citation2014, p. 117). Therefore, CSOs urgently need accurate threat information. Second, underreporting of threats to civil society exacerbates their lack of defenses because it leads to insufficient prioritization of the issue by both policy-makers and funders.

Sources of bias in reporting

Commercial reporting is driven by specific business interests that determine what gets reported, and what does not. The resulting selection criteria can be expected to produce a truncated sample of cyber conflict. As marketing instruments, threat reports need to maximize attention. Based on public statements, existing research and one formal interview with a threat intelligence researcher at a prominent firm, we identify three key selection criteria that shape reporting. Threats to civil society tend to score low across all three and can thus be expected to be neglected or entirely bracketed in commercial threat reporting.

First, a cyber operation exhibits some unique characteristics, typically in its TTP. According to a threat intelligence researcher, to make it into a public report “it needs to be something unique, something that hasn’t been reported before, for example a zero-day, or some kind of unique tactic used“ (Threat Intelligence Researcher, Citation2018).

Second, it has a high-profile victim. Since threat reports are intended to sell protection products, the more significant the threat, and the more high-profileFootnote9 the targeted actor, the better. From the perspective of threat intelligence firms, the highest profile actors are those with the greatest revenue potential. If threat reporting is intended to sell private reports and protection services, a rational profit-seeking actor can be expected to prioritize reporting on threats to the most lucrative targets. Since the Global North is more affluent, and since most firms are headquartered in the Global North, facilitating sales, reporting can be expected to prioritize threats targeting this region

Third, a high-profile threat actor is behind the campaign. We identify three key measures of high-profile actors: (1) attribution to strategic competitors of nation-state(s) in which the target audience resides; (2) previous coverage in general news outlets, and (3) attribution to previous campaigns perceived as a national or international threat. The majority of threat intelligence firms are based in North America (Kuerbis & Badiei, Citation2017, p. 471–72), hence threats by the main adversaries perceived by a North American audience – Russia, Iran, China and North Korea (YouGov, Citation2017) – can be expected to be prioritized.

We expect targeted threats to civil society score low on at least two of these three variables: first, due to porous defenses, attackers can often rely on generic and cheap methods; and, second, their lack of purchasing power renders CSOs unattractive clients – and thus low-profile actors from the perspective of threat intelligence vendors.Footnote10 In conclusion, we expect commercial threat reporting to present a truncated sample of cyber conflict that distorts perceptions of the priorities and methods of capable threat actors. We expect it to prioritize the high-end of cyber conflict: high-profile actors going after high-profile targets with sophisticated and unique methods. If the selection criteria identified here are accurate, the low end, where most of the targeting of civil society occurs, will be either neglected or entirely bracketed.

Hypotheses and research design

We hypothesize that business incentives result in systematic selection bias in threat reporting.Footnote11 To test our assumptions, we employ a mixed method research design following Lieberman’s nested approach, which “combines the statistical analysis of a large sample of cases with the in-depth investigation of one or more of the cases contained within the large sample.” (Lieberman, Citation2005, p. 434–35). We proceed in three steps. First, we formulate a set of hypotheses. Second, we test them against summary statistics drawn from our dataset of all available threat reporting. Third, we proceed with a qualitative analysis of three case studies to verify whether our predictions are congruent with reporting patterns on these cases.

Part I: threat reporting data

We present a new dataset of all available public reporting on targeted threats and employ content analysis to identify overall reporting patterns. This approach leverages the strength of large-N analysis in identifying broad trends (Lieberman, Citation2005, p. 436). Content analysis is a useful tool because it allows quantitative analysis of unstructured data to identify trends and potential biases (Mukherjee, Citation2018, p. 29–30). Our main research question is straightforward: what threats are being reported by commercial vendors? Our auxiliary research question is: how do reporting patterns differ among commercial and independent reporting?

Our dataset comprises 700 threat reports, 629 reports by threat intelligence firms and 71 reports by independent research centers. Reports were collected from vendor/organization websites and community-run resources. Selection criteria were straightforward: to be included, reports had to discuss (1) a targeted digital threat, and (2) be available publicly.Footnote12 We then specified a set of categories and coded all reports across these categories, before using descriptive statistics to verify the following three hypotheses (capturing three types of selection bias)Footnote13

H1: Threats to civil society are underreported in commercial threat reports.

To test H1, we rely on two indicators: first, the overall proportion of reporting on civil society, and second, reporting on commercial spyware. The hypothesis is confirmed if only a small proportion of reports discuss threats to civil society. Conversely, if a majority of reports discuss civil society threats, it is false. Concerning the second indicator, commercial reporting on the targeted use of commercial spyware against civil society is expected to be non-existent to minimal. Our hypothesis would be disconfirmed if the analysis instead shows a significant proportion of commercial reporting focusing on spyware.

H2: Reporting is geographically skewed toward the Global North.

We use geographical distribution as an indicator of high-profile targets because it is the most uniformly reported metric.Footnote14 If commercial reporting exhibits the expected geographical skew, and independent reporting does not, it further corroborates our hypothesis. If both commercial and independent reports exhibit identical or similar geographical bias, the hypothesis is invalidated. The same applies to the comparison with self-reporting data provided by AccessNow.

H3: Reporting is skewed toward operations attributed to the target audience’s main adversaries.

We chose attribution to measure the profile of a threat actor because threat reporting does not provide data on the values for the other hypothesized determinants of a high-profile actor (public and media attention, previous campaigns).Footnote15 Attributing cyber operations to governments is risky due to potential repercussions (Guerrero-Saade, Citation2015), hence firms often avoid conclusive statements on this matter. However, commercial reports provide a wealth of indicators and attribute operations to specific state actors with a reasonable degree of confidence in about half of the cases (49%) – allowing tracking of attribution patterns.Footnote16

If a majority of reporting discusses threats by the main strategic competitors of the United States (Russia, China, Iran, North Korea) the hypothesis is verified. If, however, reporting is evenly spread across different threat actors, or otherwise distributed, the hypothesis is invalidated. We compare attribution patterns across commercial and independent reporting to spot divergences.

To conclude, our aim is not to show that independent reporting is more representative than commercial reporting – it has its own selection bias prioritizing civil society. Instead, we simply aim to test our hypothesis that commercial reporting provides a truncated sample by showing that there is reason to believe that additional threat phenomena exist in the world that could be, but are not, reported by commercial firms. The quantitative analysis constitutes a hoop-test of our theory (Van Evera, Citation1997, p. 31), meaning negative findings eliminate the theory yet positive findings do not invalidate rival explanations.Footnote17 Content analysis does not allow for confirming causal relationships among variables, however (Mukherjee, Citation2018, p. 36). Therefore, positive results of this analysis alone cannot confirm the presence of systematic bias in commercial threat reporting.

Part II: case studies

Hence, we shift the level of analysis to qualitative analysis of three cases from within the same dataset (Lieberman, Citation2005, p. 440) that serve as a plausibility probe. We employ congruence testing and controlled comparison to “match the predictions and expectations of the theory with the outcomes of the cases to see if they are consistent” (George & Bennett, Citation2005, p. 227). The aim is to verify the predicted bias in commercial reporting toward operations involving unique TTP, pursued by high-profile threat actors against high-profile victims. Each case involves a distinct cyber operation targeting civil society analyzed in a Citizen Lab report and involves three analytical steps corresponding to the three sources of selection bias identified. First, we track the overall volume of commercial reporting on the threat actor involved. Second, within this sample of reporting on the actor in question, we trace the prioritization of civil society targeting vis-à-vis other targets. Third, within the same sample, we trace prioritization of highly sophisticated TTP versus less sophisticated methods used by the same actor.

We select most- and least-likely cases covering the full range of values on each of the three selection criteria, constituting the independent variables. Our two most-likely cases are at the extreme ends of the spectrum, where our theory would predict a very high, and a very low, respectively, volume of reporting and prioritization within individual reports. The first involves a high-profile actor using unique TTP against a high-profile target, the other a low-profile actor using generic TTP against low-profile targets. The least-likely case involves a medium-profile actor targeting a medium-profile target with somewhat advanced TTP, where our theory does not make a strong prediction about reporting volume and prioritization of threats to civil society. If our predictions fail in the most-likely cases, strong doubt is cast on our theory, while successful prediction in a least-likely case strongly supports the theory (George & Bennett, Citation2005, p. 147).

Findings: content analysis

H1 predicts a low proportion of reporting prioritizing threats to civil society, and is verified by the findings. As shown in , only a small minority, 82 out of the 629 commercial reports analyzed (13%), discuss a targeted threat to civil society. A deeper look at prioritization of the issue within this subset of commercial reporting revealed that only 22 out of these reports (4% of total reporting) place their primary focus on civil society. Meanwhile, 30 reports (5%) place a secondary focus on civil society targeting, with limited analysis, and 30 reports (5%) mention civil society in only passing. These results provide strong support for H1.

Figure 1. Commercial reporting – reporting volumes and prioritization of civil society targeting

Figure 1. Commercial reporting – reporting volumes and prioritization of civil society targeting

Findings on commercial spyware are also striking, confirming the expected neglect of the issue in commercial reporting.

above shows spyware infrastructure as detected by Citizen Lab reports in 2012, comprising 12 countries. In 2018 this number had proliferated massively to 51 countries (, below).

Figure 2. Independent reporting – commercial spyware infrastructure detection 2012

Figure 2. Independent reporting – commercial spyware infrastructure detection 2012

Figure 3. Independent reporting – commercial spyware infrastructure detection 2018

Figure 3. Independent reporting – commercial spyware infrastructure detection 2018

The growth of command and control infrastructure is an indication of the use of the associated spyware tool by the host government, but it does not reveal targets of such spyware (Marczak et al., Citation2015). However, our data shows that Citizen Lab reports have tracked the use of spyware against civil society in 22 of these countries – a third of the cases.

In comparison, only 8 out of 629 commercial threat reports (>1%) track the targeted use of commercial spyware, and two mention civil society targeting. This miniscule fraction of commercial reporting on commercial spyware, in contrast to its evident global proliferation, strongly confirms the hypothesized underreporting of threats to civil society.Footnote18

H2 predicts a geographical bias toward the Global North, which is supported by our findings on the absolute distribution of reporting, and further corroborated by the relative distribution as compared to independent reporting.

projects the geographical location of CSOs that have become victims of targeted digital threats in commercial reporting, counting the number of reports. The high concentration of reporting on targets in China (25) could be interpreted to challenge our hypothesis, yet this pattern corresponds to the hypothesized focus on strategic competitors (see below). Meanwhile, apart from three reported operations targeting civil society in Egypt, Africa and South America remain a blank spot.

Figure 4. Commercial reporting – civil society targeting by country

Figure 4. Commercial reporting – civil society targeting by country

In contrast, independent reporting () reveals a host of targeted threats to civil society on these two continents. There are six instances in four different countries in South and Central America (Mexico, Ecuador, Brazil, Paraguay), and twelve reported instances in five different countries in Africa (Morocco, Egypt, Ethiopia, Kenia, South Africa). The absolute geographical distribution of commercial reporting on targeted threats to civil society thus supports H2, which is further supported by its relative distribution compared to independent reporting.

Figure 5. Independent reporting – civil society targeting by country

Figure 5. Independent reporting – civil society targeting by country

Figure 6. AccessNow – helpline data

Figure 6. AccessNow – helpline data

Comparison to AccessNow helpline data further underlines the underrepresentation of the Global South.

Although this sample only covers 17 months (January 2016 – May 2018), it shows a much wider and more even distribution than commercial reporting (). There is a plethora of activity in the Global South that is missing from commercial reporting. Granted, these are very different sources of data and thus not easily comparable – nonetheless, the divergence reinforces the trend identified in the comparison above, thus providing further support to our hypothesis.

H3 predicts reporting to be skewed toward perceived adversaries of the target audience. Our findings are strikingly clear.

As depicted in , commercial reporting attributes the vast majority (88%) of targeted threats to civil society to the United States’ key strategic competitors: China (18), Russia (11) and Iran (6). Only five campaigns are attributed to other states: Vietnam (3), North Korea (1) and Lebanon (1). This pattern is strikingly congruent with the hypothesized bias toward the perceived ‘main adversaries’ of a North American audience. Russia, China and Iran are often counted among the world’s leading ‘cyber powers’, hence it is conceivable that they are the main perpetrators of threats to civil society.

Figure 7. Commercial reporting – attribution of targeted threats to civil society

Figure 7. Commercial reporting – attribution of targeted threats to civil society

Accordingly, independent reporting () also covers six campaigns by these ‘big three’, underlining their importance. However, it also documents the use of targeted digital threats by a range of other governments absent from commercial reporting: Kazakhstan (1), Ethiopia (3), Kuwait (1), Saudi Arabia (1), United Arab Emirates (1) and Bahrain (1), and Mexico (3). Independent reporting shows not only a more evenly distributed attribution pattern, but the total number of operations by ‘other’ states is actually greater than those attributed to the ‘big three’. These findings strongly support the hypothesized bias toward adversarial actors.

Figure 8. Independent reporting – attribution of targeted threats to civil society

Figure 8. Independent reporting – attribution of targeted threats to civil society

Our findings thus provide strong support for hypothesis 1, 2 and 3; the theory of bias in commercial reporting passes the hoop test.

Case studies

This section develops a plausibility probe of our theory. Our case studies test the hypothesized selection bias in commercial reporting in favor of unique TTP, high-profile victim, and high-profile perpetrators against evidence from three case studies of cyber operations targeting civil society ().

Table 1. Summary of case studies

Case 1: Tainted Leaks

The Tainted Leaks operation targeted a journalist and involved the theft of personal e-mails and subsequent ‘leaking’ of this data (Hulcoop, Scott-Railton, Tanchak, Brooks, & Deibert, Citation2017). It is a most-likely case with high values across all three selection criteria, and reporting patterns are congruent with expectations: commercial reporting prominently covers the threat actor, but not its targeting of civil society. Moreover, even reports that do discuss civil society focus on high-profile targets while bracketing lower-profile targeting. In this case, we trace such omissions in detail, impossible in the other two cases due to a lack of available commercial reporting on the respective campaigns/threat actors.

This operation is a most-likely case with extreme values across all three selection criteria. First, it involved unique TTP of ‘tainting’ leaked data, by carefully including disinformation within otherwise legitimate data. Second, it involves high-profile targets. The victim, journalist David Satter, is a high-profile Kremlin critic, but a low-profile actor concerning the sector’s revenue potential. The operation was part of a larger scale phishing operation against several high-profile targets, including “a former Russian Prime Minister, members of cabinets from Europe and Eurasia, ambassadors, high ranking military officers, CEOs of energy companies” (Hulcoop et al., Citation2017). Third, the operation was pursued by a high-profile actor. Citizen Lab found circumstantial evidence pointing to APT28, and based on “additional evidence” Forbes confirmed this suspected attribution one day later (Fox-Brewster, Citation2017). APT28 has been attributed to the Russian military intelligence agency GRU (US vs. NETYKSHO et al, Citation2018), it has received extensive media coverage – especially since its intrusion into the DNC (CrowdStrike, Citation2016) – and is consistently ranked among the most dangerous threat actors (Burgess, Citation2017; NCSC, Citation2018). Due to the high-profile actor, high-profile victims and unique TTP, we would expect a high volume of reporting on this actor and the campaign the Tainted Leaks operation was part of.

Reporting volumes are congruent with expectations: a significant proportion of threat reports discuss APT28 operations, 57 out of the 630 reports in our dataset (9%). Considering there are over forty known threat actors, this disproportionate attention to APT28 supports the hypothesized reporting bias toward high-profile threat actors.

Prioritization of civil society targeting is also in line with predictions. Unfortunately, few commercial threat reports include targeting proportions. However, the Citizen Lab investigation did include such proportions: in the phishing campaign associated with the Tainted Leaks case, civil society was the second-largest target group at 21%, behind only governments, comprising 24% of targets (Hulcoop et al., Citation2017). Those few commercial reports with targeting proportions confirm this prioritization of civil society. SecureWorks’ investigation of an APT28 phishing campaign in 2016 using similar methods found that most targets (41%) were military, but the second largest target group were civil society actors at 36% (including NGOs, activists, and journalists) (SecureWorks, Citation2016b). Moreover, a 2015 TrendMicro report identified civil society as the main target of APT28’s domestic operations (TrendMicro, Citation2015b). Finally, the first commercial report on APT28, published by FireEye in 2014, explicitly highlighted its targeting of journalists to “monitor public opinion, identify dissidents, spread disinformation or facilitate further targeting.” (FireEye, Citation2014). Evidently, civil society is a priority target of APT28, hence unbiased commercial reporting patterns should reflect this prioritization.

Out of 57 commercial reports on APT28, however, only 15 mention civil society (26%), and only two out of these prioritize a threat to civil society. The great majority of reporting (39 reports, 74% of all reporting on APT28) entirely omits threats to civil society. If one were to build an analysis of APT28 activity entirely based on commercial reporting, civil society would appear a low priority, or only an occasional target of this actor.

Meanwhile, congruent with our predictions, reporting prioritizes high-profile targets. Most reports characterize APT28 as a highly sophisticated espionage actor targeting governments and the private sector. For example, CrowdStrike describes it as a “Russian-based threat actor … responsible for targeted intrusion campaigns against the Aerospace, Defense, Energy, Government and Media sectors.” (CrowdStrike, Citation2016). Similarly, Symantec states that “the organizations targeted by APT28 during 2017 and 2018 include: a well-known international organization, military targets in Europe, Governments in Europe, a government of a South American country, an embassy belonging to an Eastern European country” (Symantec, Citation2018). Notably, this periodization includes the Tainted Leaks campaign, yet neither the latter, nor the wider spear phishing campaign against civil society it is part of are mentioned by Symantec. In short, the prioritization of government and military targets in commercial reporting is congruent with our predicted selection bias toward high-profile targets. The apparent omission of civil society targeting in most reporting provides further support for our theory. Recall that its targeting of dissidents was mentioned in very first report on APT28, and available data on vertical targeting patterns suggest civil society is among its main targets. It would thus be highly surprising if this pattern is entirely absent from a majority of its reported activity.

Moreover, prioritization of high-profile targets is evident not only in the reports that do not mention civil society, but also in those that do. For example, a FireEye survey of APT28 activity in 2014–2017 only mentions one civil society target: the dissident band Pussy Riot (FireEye, Citation2017, p. 4), which has received widespread media coverage. A 2015 TrendMicro also leads with the targeting of Pussy Riot, and reveals the APT28’s broad targeting of civil society (TrendMicro, Citation2015b). Yet even this report is scant on the details, instead prioritizing high-profile victims in its analysis, noting that “to illustrate one of the credential phishing attacks Pawn Storm [APT28] sends to its targets, we will focus on a particular attack on high-profile Yahoo users” (TrendMicro, Citation2015b).

Finally, only a small proportion of commercial reporting mentions the credential phishing operation preceding the Tainted Leaks campaign. This finding is congruent with the expected selection bias toward unique TTP. Most reports on APT28 focus on sophisticated methods, few mention the relatively simple deception involved in the phishing campaign. Nine commercial reports mention credential phishing, seven of which do discuss civil society. Two out of the latter discuss the specific technique of credential phishing used in the Tainted Leaks operation and against Hillary Clinton’s campaign (SecureWorks, Citation2016b, Citation2016a). Importantly, SecureWorks only published its first report one day after CrowdStrike had revealed APT28’s breach of the DNC, which provided a high-profile target and corresponding media attention. The timing of publication provides additional support for the hypothesized prioritization of high-profile targets.

Meanwhile, no commercial reports mention the technique of ‘tainting leaks’. One report briefly highlights ‘alleged’ data manipulation, noting how “prior to leaking the information [obtained by APT28], parts of the documents and e-mails were allegedly altered. “ (TrendMicro, Citation2017, p. 6). Yet it provides no further details about the data involved, the method or possible aims.

In short, reporting patterns are largely congruent with expectations. Commercial reporting frames APT28 as a highly sophisticated espionage actor targeting governments and large private sector entities. There are references to civil society targeting, but only among a minority of reports. The targeting of journalists to spread disinformation was indicated from the beginning of reporting on APT28 in 2014, hence one would expect operations such as Tainted Leaks to be reported prominently. Yet commercial reporting mostly brackets civil society, and does not discuss ‘tainted leaking’ apart from a passing mention. Findings in this most-likely case confirm the hypothesized selection bias.

Case 2: Spying on a Budget

Our second case study lies at the opposite end of the spectrum concerning selection criteria. The Spying on a Budget report by Citizen Lab identifies a spear phishing campaign targeting the Tibetan community of activists. It involves a low-profile actor using generic methods to go after (mostly) low-profile targets (Crete-Nishihata, Dalek, Maynier, & Scott-Railton, Citation2018). These properties make it a most-likely case, where our theory predicts a low volume or complete lack of reporting on the actor in question and/or this specific campaign. Findings confirm this expectation, no commercial report mentions either the actor or the campaign – hence precluding an analysis of prioritization of civil society targeting within commercial reporting.

Spying on a Budget analyzes a phishing operation active from around January 2016 until July 2017 using a range of tactics to obtain the e-mail credentials of members from the Tibetan activist community and potentially other social movements in China (Crete-Nishihata et al., Citation2018). These individual activists and civil society groups constitute low-profile targets promising little business opportunities and media attention. However, while the decoy documents employed indicate the Tibetan community as the main target, additional documents used indicate the same campaign also targeted government agencies in South and Southeast Asia. The presence of higher-profile victims increases the likelihood of threat reporting. The operation’s methods were cheap and unsophisticated; the Citizen Lab estimates a total budget of only 1000 USD. Finally, the threat actor involved is unknown, exhibits “only basic technical skills” and is sloppy, leading Citizen Lab researchers to conclude it is likely a ‘low-level contractor’ (Crete-Nishihata et al., Citation2018). In short, it is a very low-profile threat actor, highly unlikely to fulfil the third selection criterion for publication in threat reporting. Hence, our theory would predict only few, if any, passing mentions of this campaign and/or actor in commercial reporting.

Results are congruent with our expectations. There are no preceding commercial reports on this threat actor and/or the phishing campaign involved. Moreover, there are also no follow-up reports after publication of the Citizen Lab report. These findings are in line with our expectations. However, RecordedFuture published a thoroughly researched report on a campaign targeting the Tibetan community six months after Citizen Lab’s report, attributing it to the same threat actor (Recorded Future, Citation2018). This level of attention to the same low-level actor would challenge our theory, were it not for the fact of the overall “increased level of sophistication for the attacker” (Recorded Future, Citation2018). Evidently, the threat actor had passed the necessary threshold in uniqueness and sophistication to be included in a threat report. Findings on the overall lack of commercial reporting on this threat actor, as well as the inclusion only following an increase in sophistication, are congruent with our theory’s predictions.

Case 3: Familiar Feeling

The Familiar Feeling operation also targets Tibetan activists, but is pursued by a somewhat higher-profile actor that also targets additional, somewhat higher-profile victims, and employs somewhat unique TTP. Because it involves a medium-profile actor using TTP of medium sophistication going after medium-profile targets, this is a least-likely case where our theory does not provide strong predictions either way. Findings concerning reporting volume are inconclusive: there are five commercial reports on this threat actor, less than on high-profile actors like APT28, but more than the lowest profile actors – such as in the case above. Findings on the prioritization of civil society targeting within these five reports, however, strongly confirm the expected selection bias: none of them mention civil society – even though one of the reports specifically mentions a key piece of evidence indicating civil society targeting.

The Familiar Feeling campaign involves a known threat actor, known as Tropic Trooper or KeyBoy (Alexander et al., Citation2018), which was also behind a 2016 campaign targeting the Tibetan community (Hulcoop, Brooks, Maynier, Scott-Railton, & Crete-Nishihata, Citation2016). Tropic Trooper has not been conclusively linked to a specific government, but is suspected to be associated with China. It has not received attention in general news media. However, dedicated information security media has covered previous activity by this actor (Muncaster, Citation2017; Networks Asia Staff, Citation2015). Its campaign reported by Citizen Lab – dubbed ‘Resurfaced’ employed a new version of a previously known set of malware exploiting known vulnerabilities. Finally, while this campaign focuses on low-profile victims (an unnamed Tibetan NGO), Citizen Lab links it to preceding TropicTrooper/KeyBoy campaigns against government and large private sector actors in East and Southeast Asia. Hence, it involves both low and high(er)-profile targets.

In short, this campaign falls in the middle of the spectrum of selection criteria, with a medium level of sophistication, a medium-profile threat actor and a low-profile target but previous campaigns against higher profile targets. Hence, it is a least-likely case where our theory only weakly predicts reporting outcomes: it is possible some commercial reporting covers this campaign since it may cross the necessary thresholds for publication, but the opposite outcome is similarly likely. However, since this campaign includes both lower and higher-profile victims, any evidence for a prioritization of high-profile targets – and in particular omissions of lower profile targets – provides strong support for our theory.

Threat reporting patterns on this case clearly support our expectations. Overall, five commercial reports discuss campaigns by TropicTrooper, which by itself does not confirm or challenge our expectations. Significantly, however, none of them mention civil society targeting, instead exclusively focusing on high-profile government and corporate targets. Rapid7 first reported on the actor in 2013, vaguely hypothesizing targeting of “either someone in the telecommunications industry or a representative of the local government” (Rapid7, Citation2013). TrendMicro reported targeting of “major government sectors and corporations in both Taiwan and the Philippines” (TrendMicro, Citation2015a). PwC’s report quotes previous Citizen Lab research on the actor but without mentioning civil society. Instead, while noting the lack of “clear visibility” into targeting, it nonetheless highlights that it “does appear that this latest campaign targets at least some Western organizations, likely for corporate espionage purposes” (PwC, Citation2017) – providing support for the hypothesized prioritization of victims in the Global North. Based on commercial reporting, one would thus conclude that this is an actor focusing exclusively on international espionage.

There are three plausible explanations for this exclusive focus on high-profile government and corporate actors: (1) the campaigns reported by Citizen Lab are the only ones targeting civil society, (2) commercial researchers were unaware of the targeting of civil society, or (3), commercial researchers were aware but did not include it in reporting due to the prioritization of high-profile victims. In the former two cases, we would not expect any evidence pointing toward civil society targeting commercial threat reporting. However, there are two key pieces of such evidence – and congruent with the third explanation. First, the reference to Citizen Lab research in the PwC report shows its authors were familiar with Tropic Trooper’s targeting of civil society. Second, the latest report characterizes it as an actor “focusing on … government, healthcare, transportation, and high-tech industries” and reports on the evolution of its tradecraft (TrendMicro, Citation2018). However, that report’s ‘indicators of compromise’ section also includes the domain “tibetnews[.]today”, pointing directly toward the targeting of Tibetan community by the same actor (later shown in the Resurfaced campaign by Citizen Lab). Yet the TrendMicro report does not address this piece of evidence and its implications. To be sure, none of these findings provide conclusive ‘smoking gun’ evidence of selection bias in favor of high-profile targets in commercial reporting. However, both overall reporting patterns and anecdotal pieces of evidence pointing to the omission of civil society targeting are closely congruent with our predictions and thus strongly support our theory.

In conclusion, none of the findings in the most-likely cases challenge our theory, while findings in our least-likely case strongly confirm our expectations. Our hypotheses pass the plausibility probe.

Discussion

Both the quantitative and qualitative analysis support our hypotheses about threat reporting sample bias. Overall reporting patterns, as well as the cases examined, are congruent with predictions based on our theory of threefold selection bias. While the limitations of available data prevent a causal analysis, the unambiguousness of our findings – in particular the least-likely case – strongly indicate that reporting prioritizes sophisticated and unique campaigns by high-profile threat actors against high-profile targets. Conversely, the cybersecurity marketplace fails to provide sufficient reporting at the low-end of cyber conflict. Cybersecurity firms are guilty of failures of omission rather than commission – firms are focusing preferentially on particular classes of threats rather than actively discriminating against another. This situation has two important implications.

First, commercial reporting creates a distorted picture of cyber conflict as researchers base their analyzes on a skewed sample of cases. There is growing evidence that cyber conflict thrives especially at the low end of the conflict spectrum (Lindsay, Citation2017), and in this conflict civil society is right at the frontlines (Deibert, Citation2015). Yet, our findings suggest this portion of conflict is systematically sidelined in threat reporting.

Second, this distorted picture poses a risk for democracy by systematically underrepresenting the threats to the CSOs that are vital for the functioning of democracy. Indeed, it seems increasingly likely that the original cyberwar narrative had things precisely backwards. The information revolution does not portend a new anarchy rife with destructive disruption but rather the encroaching hierarchy of the surveillance state. Cyberspace may create asymmetric advantages, but they are advantages of the strong to monitor and enforce the behavior of the weak. The good news about a lower likelihood of cyberwar is expressly bad news for democratic liberties and human rights.

Moreover, this distorted picture implies a linear relationship between technical sophistication and threat level that does not hold in practice. Gioe et al. argue that cybersecurity firms typically focus on the technical aspects of security “because they are relatively easier to secure”, although most cyber operations exploit weaknesses in human cognition and “do not need high-end nation state cyber tools to achieve their goals” (Gioe, Goodman, & Wanless, Citation2019, p. 118). These are precisely the types of threats that we have shown to be underreported, underlining the need to transition from a technical, state-centric conception of cybersecurity toward a human-centric approach (Deibert, Citation2018).

The solution to this problem cannot come from the market alone, yet governments are simultaneously key threats to civil society. Several threat intelligence firms are offering pro-bono services to civil society, which is a move to be welcomed, but these individual measures cannot override the market logic that dictates the priorities of the commercial security sector as a whole. We have already alluded to the public goods nature of public threat reporting at the outset of this article.Footnote19 Public goods theory tells us that if such goods are provided by private actors, they will be insufficiently and unevenly distributed because benefits are shared among the group while costs are borne by the individual actor(s) providing it alone (Olson, Citation1971, p. 34–36). As Olson shows, these characteristics lead to a classic collective action problem: a market failure manifested in the overrepresentation of concentrated interests and underprovision of diffuse benefits. The classic solution to such cases where markets fail to allocate resources efficiently and evenly is state intervention (Hardin, Citation2015, p. 52). Yet in this case, state security agencies are the main threats to civil society, and CSOs require independence from governments. Consequently, a government-driven solution is not a viable option. After all, government-sponsored support to CSOs abroad challenging authoritarian regimes constitutes a form of interference that those regimes can perceive as a cyber-attack on their vital interests in domestic political stability.

Conversely, widespread surprise at the methods used in Russia’s meddling in the 2016 U.S. election attests to a fundamental lack of awareness of the vulnerabilities of democratic institutions and civil society more broadly that are emerging in the deepening information revolution. Russia did not invent civil society surveillance, suppression, and disruption, and authoritarian actors will continue to find new ways to leverage cyberspace. The distorted understanding of the nature of cyber threats has resulted in (1) lower than necessary prioritization and resource-allocation for cyber defense in public policy, as well as (2) insufficient preparedness by both policy-makers and civil society itself when it comes to detecting and mitigating these threats.

Our findings highlight the need for a follow-up analysis with statistical methods on these and additional data as well as ethnographic engagement with cybersecurity firms to gauge significance of the selection criteria identified here. In particular, the impact of the level of sophistication as well as the profile of the threat actor on reporting volume needs to be analyzed more systematically. This task faces two key challenges: first, establishing a general measure of sophistication, including both technical and social aspects, and second, it requires consolidating the naming schemes to track reporting. Currently, each firm employs their own naming schemes, and there are no commonly accepted criteria for sophistication.

The best available solution to close the information gap is awareness of the limitations of commercial research, as well as increased independent research of targeted threats across the entire spectrum of cyber conflict. There is an urgent need for more interdisciplinary research into targeted threats with academic rigor and transparency of methods and selection criteria. This analysis points to the need for foundations and funders that are often the principal supporters of civil society to take notice of these targeted digital threats and take measures to mitigate them through their grant-making. There are signs of change, such as the Ford Foundation’s digital security initiative (Brennan, Eagen, Nunez, Scott-Railton, & Sears, Citation2017), but we are still far from a broad recognition and prioritization of this issue.

Declaration of interest statement

The authors declare there are no conflicts of interest.

Acknowledgments

The authors would like to thank Max Smeets, Masashi Crete-Nishita, Irene Poetranto, Adam Casey, and Alexei Abrahams for their insightful comments on earlier drafts of this paper. We also thank the participants of the 2018 “Global Digital Futures” workshop at Columbia University’s School of International and Public Affairs, the team at ETH Zurich’s Center for Security Studies, participants of the 2019 ISA panel on Digital Technologies and Human Rights, and the Ostrom workshop at Indiana University Bloomington for their helpful feedback. Daria Goriacheva provided excellent research assistance for the reliability test. We are grateful for the generous funding from the Carnegie Corporation of New York and the School of International and Public Affairs at Columbia University, the Ford Foundation, the John D. and Catherine T. MacArthur Foundation, the Sigrid Rausing Trust, the Oak Foundation and the Open Society Foundations that helped make this project possible. Finally, we thank AccessNow for providing us with aggregate data, and in particular Daniel Bedoya for his help in preparing this data.

Data availability statement

A copy of the dataset can be accessed here: https://docs.google.com/spreadsheets/d/1FyzBsZ1UvhR2inK_cKItBgSzY7J-lGHDLbrEQKFD08w/edit?usp=sharing

Additional information

Funding

This work was supported by the Carnegie Corporation of New York; Ford Foundation; John D. and Catherine T. MacArthur Foundation; Oak Foundation; Open Society Foundations; Sigrid Rausing Trust.

Notes on contributors

Lennart Maschmeyer

Lennart Maschmeyer is a Senior Researcher at the Center for Security Studies, ETH Zurich.

Ronald J. Deibert

Ronald J. Deibert is a Professor of Political Science, and Director of the Citizen Lab at the Munk School of Global Affairs & Public Policy, University of Toronto.

Jon R. Lindsay

Jon R. Lindsay is an Assistant Professor of Digital Media and Global Affairs at the Munk School of Global Affairs and Public Policy, University of Toronto.

Notes

1. See the next section for more details.

2. For more details and a definition of these threats, please see Online Appendix, Section A1.

3. A definition is included in the Online Appendix, Section A1.

4. For examples of this influence, please see Online Appendix, Section A2.1.

5. These include Citizen Lab, Electronic Frontier Foundation, AccessNow, Human Rights Watch and Amnesty International.

6. See Online Appendix, Section A1, for definitions of these terms.

7. This dual role also allows for a less cynical interpretation of threat reporting as a quasi-academic enterprise, yet with similar results. See Online Appendix, Section A2.2 for more details.

8. There are two such projects: (1) APT Groups and Operations, a sheet consolidating naming schemes and operations; and (2) APTNotes, a repository of commercial reporting.

9. See Online Appendix, Section A2.3 for more details.

10. See Online Appendix, Section A2.4 for a more detailed discussion of these expectations.

11. See Online Appendix, Section A3.3, for further details on the assumed causal mechanism and limitations in the availability of data.

12. See Online Appendix, Section A3.1, for further details on these criteria.

13. A coding guide is available in the Online Appendix, Section A3.4, which also discusses reliability measures and provides a link to our data.

14. See Online Appendix, Section A3.6, for further details.

15. Our qualitative analysis tracks these additional indicators as well.

16. For coding details on attribution, see Online Appendix, Section A3.4.

17. See Online Appendix, Section A3.2 for a discussion of rival theories.

18. Some commercial reports discuss spyware in general (Cf. Kaspersky Citation2017), but not its targeted use.

19. Public goods are defined by two key properties: they are non-exclusive (Samuelson, Citation1954), and non-rivalrous (Ostrom & Ostrom, Citation1977). In other words, no one can be excluded from the benefits of the good, while its consumption by one actor does not reduce the availability to others. Public threat reporting fulfills both criteria: it is freely available online and reading a report does not reduce availability to others (Rosenzweig, Citation2011).

References