Geopolitical Hacktivism in Palestine Conflict
While many of the hacktivist groups seem at this point unsophisticated in how they are conducting their operations, there are those that are more capable and more experienced.
Start your day with intelligence. Get The OODA Daily Pulse.
While many of the hacktivist groups seem at this point unsophisticated in how they are conducting their operations, there are those that are more capable and more experienced.
In April 2023, the European Union (EU) officialized the text of its USD 1.2 billion Cyber Solidarity Act (CSA), regulations designed to strengthen common EU detection, situational awareness, and response to cyber incidents, particularly as cyber operations ...
Recently, the International Committee of the Red Cross(ICRC) released ethical guidelines for civilian hackers and hacktivists to consider prior to engaging in armed conflicts. The eight recommendations are based on humanitarian law-based rules in order to protect civilians ...
This post provides observations and compelling views on the threat of intrusive surveillance technologies.
This post provides insights into some major elements in the US government concerned with countering foreign malign influence, highlighting some overlaps and possible discontinuities.
Here we present analysis relevant to cyber conflict including the potential of spillover into non combatants and provide insights on the relevance of recent Russian statements.
In this report we capture context on the shift in ICC intentions regarding investigating and prosecuting cyber war crimes. Recent reporting reveals that the International Criminal Court (ICC) will now investigate and prosecute cyber war crimes in the ...
This post seeks to inform your understanding of the cyber landscape from the perspective of the realities of the world as it is vice as we would like it to be. International efforts to grapple with ...
This review of U.S. National Intelligence Strategy and observations on PRC reaction to it leads to insights that can inform corporate strategic planning not found anywhere else.
Over the last 2 decades cyber attacks have shifted from the theoretical to reality. This report provides insights from real world activities that can inform strategists and policymakers seeking to mitigate risks from nation state ...