Political parties are an essential part of electoral democracy. They have also been identified by the intelligence community and academic researchers as a weak point in the cybersecurity of many democracies. The hacking of the Democratic National Committee’s emails is one prominent example of how ineffective cybersecurity by a political party can have far-reaching implications. …
Dr. David Hofmann Presented at the 2018 Atlantic Security Conference In this presentation, Dr. Hofmann will discuss his recently completed funded research (TSAS / Public Safety Canada) into the three different types of social networks formed by lone-wolves during the 24 months prior to the commission of their first act of terrorist violence. Dr. Hofmann …
Forbidden Feeds: Government Controls on Social Media in China is a report by PEN America that provides some insights into the development of censorship and surveillance of Social Media in China and its impacts. PEN America is a group that works to champion freedom of speech for writers. The report they have put together provides …
I see a lot of our work as being the antidote to the poison of FUD (Fear, Uncertainty and Doubt). Oxford puts FUD in its place nicely by suffixing the definition with “,usually evoked intentionally in order to put a competitor at a disadvantage.” Superlative laden stories about the biggest, worst, most expensive, unstoppable, etc. hacking …
Power Projection in the Digital Age: The Only Winning Move is to Play General Darren W. McDew, USAF, is the Commander of U.S. Transportation Command (USTRANSCOM), the Command responsible for the transportation for the US Department of Defence. He provides an interesting insight into the importance of cybersecurity to the capabilities of the modern military. Information …
A piece by Jean Peccoud, Jenna E. Gallegos,Randall, Wallace G. Buchholz,and Sanjay Raman sounds an alarm for the biotechnology industry and researchers. The development of technology has blurred the gap between the digital and biological. Recent research has shown the potential for threats to cross over between these realms by coding malware into a DNA …
Governments around the world are being increasingly trapped between progress to a digital state and the insecurity of cyberspace. Estonia has been a vanguard for development of a digital society in many ways by transitioning many services to digital technologies and also by being subject to assault by cyber weapons. Nick Robinson and Prof Keith …
Ben Buchanan looks at American Exceptionalism in the form of the NOBUS approach to signals intelligence in his contribution to the Hoover Institution’s Aegis Paper Series. There is a tension between the needs of nations in the information age to both secure and steal communications. The United States has traditionally met this by exploiting a …
Francesca Bosco – UNICRI, Presented at the 2016 Spring SERENE-RISC Workshop. Advances in the field of global technology have transformed the way in which societies function, affecting governments, businesses, and individuals alike, evoking a wide array of societal benefits, while also subjecting populations to varying degrees of cyber risk. Critical infrastructure serves as …
Short answer is bad, but for more reasons than first come to mind. Wikileaks recently released a vault of documents allegedly from the CIA relating to their cyber capabilities[1]. This is not the first time that Wikileaks has released fairly targeted documents against an agency in the United States[2][3][4][5]. Wikileaks founder Julian Assange has clear …