Recently, the International Committee of the Red Cross(ICRC) released ethical guidelines for civilian hackers and hacktivists to consider prior to engaging in armed conflicts. The eight recommendations are based on humanitarian law-based rules in order to protect civilians ...
Analysis
This post provides observations and compelling views on the threat of intrusive surveillance technologies.
Analysis
This post provides insights into some major elements in the US government concerned with countering foreign malign influence, highlighting some overlaps and possible discontinuities.
Analysis
Here we present analysis relevant to cyber conflict including the potential of spillover into non combatants and provide insights on the relevance of recent Russian statements.
Analysis
In this report we capture context on the shift in ICC intentions regarding investigating and prosecuting cyber war crimes.
Recent reporting reveals that the International Criminal Court (ICC) will now investigate and prosecute cyber war crimes in the ...
Analysis
This post seeks to inform your understanding of the cyber landscape from the perspective of the realities of the world as it is vice as we would like it to be.
International efforts to grapple with ...
Analysis
This review of U.S. National Intelligence Strategy and observations on PRC reaction to it leads to insights that can inform corporate strategic planning not found anywhere else.
Analysis
Over the last 2 decades cyber attacks have shifted from the theoretical to reality. This report provides insights from real world activities that can inform strategists and policymakers seeking to mitigate risks from nation state ...
Analysis
As things stall in the United Nations on all things cyber, the United States has been actively engaged in strengthening cyber cooperation with key individual states, as well as regional blocs, in an effort to ...
Analysis
In 2020, the U.S. Cyber Command (CYBERCOM) established its private sector partnership program dubbed UNDER ADVISEMENT, the purpose of which is to engage industry organizations and share critical cyber threat information and intelligence that supports ...
Analysis