Governments stockpile cyberweapons for future use against adversaries, but doing so has a tendency to make their own citizens less safe. How does this work, and how can cyberweapons be better regulated to reduce collateral damage?
Exploits are code that gives hackers or malware undue powers within a computer system. The past decade saw a spectacular rise and fall in the market for these digital weapons, temporarily stoking fears about what supply chains might look like in cyberwar.
After a disastrous 2009 currency reform program, North Korean black market traders started storing their wealth in US dollars before shifting towards the Chinese yuan. What does this mean for North Korea and for the world more generally?
“The digitization of banking has radically transformed what it means to rob a financial institution. North Korea, a country strapped for cash and with little to lose, is leading the world when it comes to the emerging art of cyberheists.”
In response to a constitutional court decision that mandated marriage equality, Taiwan held a referendum which showed popular opposition to adjusting current marriage laws. Adam Zivo explains how this debate evolves might have some surprising implications on East Asian geopolitics.
In the final article of a three part series, we explore what norms govern cyber attacks, retaliatory or otherwise, within the realm of international conflict.
Black Mirror is an anthology series that explores the relationship between humanity and technology. Each episode takes us to a near-future world that often demonstrates the disturbing potential of today’s innovations. Season four includes the episode “Metalhead,” in which our anxieties regarding intelligent, autonomous drones is examined.