Matthijs R. Koot

530 Followers
51 Following
62 Posts
IT, privacy, security, democracy. PhD. Employed as IT security specialist. PGP: 51F9 8FC9 C92A 1165 (http://keybase.io/mrkoot). Bluesky: @cyberwar.nl. LinkedIn: /in/mrkoot.
The eID Wallet still doesn’t deserve your full trust (10 March 2026) https://edri.org/our-work/the-eid-wallet-still-doesnt-deserve-your-full-trust/ by EDRi / @edri

What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem (August 2025) https://petsymposium.org/popets/2025/popets-2025-0163.php

By Wang et al., presented at PET Symposium 2025. Open Access.

Artifacts available at The Citizen Lab’s GitHub: https://github.com/citizenlab/wechat-security-report/tree/artifact

Taiwan Bounty: PRC Cross-Agency Operations Target Taiwanese Military Personnel (25 July 2025) https://jamestown.org/program/taiwan-bounty-prc-cross-agency-operations-target-taiwanese-military-personnel/

'[...] the Guangzhou Public Security Bureau recently issued a “wanted” notice offering a reward for information leading to the apprehension of 20 retired and active personnel in Taiwan’s Information, Communication, and Electronic Force Command (ICEFCOM). [...]'

Commercially sourced intelligence: friend or foe? (2024, Open Access) https://doi.org/10.1080/02684527.2024.2437955

By Vivi Ringnes Berrefjord and Tor Erling Bjørstad, published online December 2024 in Intelligence and National Security, Volume 40, Issue 3.

AI Risk Repository (2024) https://airisk.mit.edu/ at MIT

A comprehensive living database of over 700 AI risks categorized by their cause and risk domain.

More details in this 79-page preprint (1.9MB .pdf): https://cdn.prod.website-files.com/669550d38372f33552d2516e/66bc918b580467717e194940_The%20AI%20Risk%20Repository_13_8_2024.pdf

The MIT AI Risk Repository

A comprehensive living database of over 1700 AI risks categorized by their cause and risk domain

Cyber Effects in Warfare: Categorizing the Where, What, and Why (Aug 2024) https://tnsr.org/2024/08/cyber-effects-in-warfare-categorizing-the-where-what-and-why/

By Jason Healey. Published in Texas Nat'l Security Review, Vol 7, Issue 4, Fall 2024.

Paper introduces a novel analytical framework to assess offensive cyber operations based on the circumstances of their use across the different phases of war, from shaping operations prior to the conflict to the actual battlefield.

Cyber Effects in Warfare: Categorizing the Where, What, and Why - Texas National Security Review

For decades, military practitioners and academics have come up with theories, evidence, and examples that indicate that offensive cyber operations might revolutionize modern warfare. Others have made an equally impressive case that refutes that such operations would even be relevant, making it hard to reach any definite conclusions. This paper introduces a novel analytical framework to assess offensive cyber operations based on the circumstances of their use across the different phases of war, from shaping operations prior to the conflict to the actual battlefield. This framework substantially simplifies the key questions of practitioners and academics in order to pose the more direct question: Where, when, and how might offensive cyber operations affect warfare outcomes, both today and in the future?

Texas National Security Review

Commercial Enablers of China’s Cyber-Intelligence and Information Operations (2024) https://digitalcommons.usf.edu/mca/vol7/iss1/1/

Published in Military Cyber Affairs, Vol. 7, Issue 1.

Direct link to paper (0.5MB .pdf, 12 pages) https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1106&context=mca

Commercial Enablers of China’s Cyber-Intelligence and Information Operations

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.

Digital Commons @ University of South Florida

Espionage by Europeans 2010–2021. A Preliminary Review of Court Cases (May 2022) https://foi.se/en/foi/news-and-pressroom/news/2022-05-16-threat-of-spies-is-increasing-in-europe.html

Direct link to report (1.2MB .pdf, 80pp) https://foi.se/rest-api/report/FOI-R--5312--SE

Commissioned by the Swedish Security Service and Swedish Armed Forces. Study covers 62 individuals of whom 42 have been convicted.

Summary: see pic.

Threat of spies is increasing in Europe

A series of high-profile cases that have recently led to arrests and convictions shows that the threat posed by spies seems to have increased in Europe over the past decade.

Audit of the FBI's National Security Undercover Operations (13MB .pdf, December 2022, 45pp): https://oig.justice.gov/sites/default/files/reports/23-012.pdf

Report from the U.S. DOJ Inspector General.

It makes 10 recommendations to improve how the FBI manages its NatSec Undercover Operations (UCO) program.