Exploits are code that gives hackers or malware undue powers within a computer system. The past decade saw a spectacular rise and fall in the market for these digital weapons, temporarily stoking fears about what supply chains might look like in cyberwar.
“The digitization of banking has radically transformed what it means to rob a financial institution. North Korea, a country strapped for cash and with little to lose, is leading the world when it comes to the emerging art of cyberheists.”
In this article, Analyst and Editor Ryan Atkinson outlines the pervasive surveillance technologies used by the Gadhafi regime to spy on Libya’s population. Previously secret archives discovered after the fall of Tripoli in 2011 reveal the extent of the export of such technologies to the regime by foreign corporations.
In this special report, Ryan Atkinson outlines the problem disinformation poses to NATO, including an overview of the major steps member states are taking to counter the evolving threat.
In this article, Junior Research Fellow Maryse Kiese analyzes Canada’s contribution to NATO’s cyber defence strategy by shedding the light on its national approach to improve cyber security and deter cyber criminals.
In this article, Ryan Atkinson discusses the danger of electoral interference exemplified by Presidential Elections in Ukraine and the United States.
In the final article of a three part series, we explore what norms govern cyber attacks, retaliatory or otherwise, within the realm of international conflict.