Governments stockpile cyberweapons for future use against adversaries, but doing so has a tendency to make their own citizens less safe. How does this work, and how can cyberweapons be better regulated to reduce collateral damage?
Exploits are code that gives hackers or malware undue powers within a computer system. The past decade saw a spectacular rise and fall in the market for these digital weapons, temporarily stoking fears about what supply chains might look like in cyberwar.
In this article, Analyst and Editor Ryan Atkinson outlines the pervasive surveillance technologies used by the Gadhafi regime to spy on Libya’s population. Previously secret archives discovered after the fall of Tripoli in 2011 reveal the extent of the export of such technologies to the regime by foreign corporations.
In this special report, Ryan Atkinson outlines the problem disinformation poses to NATO, including an overview of the major steps member states are taking to counter the evolving threat.
Ryan Atkinson discusses the dangerous implications of future political influence operations, arguing that research must work to understand how current operations will incorporate advancing technologies.
In this article, Ryan Atkinson discusses the danger of electoral interference exemplified by Presidential Elections in Ukraine and the United States.