Technology

An Orwellian Fortress: The Pegasus Spyware

An Orwellian Fortress: The Pegasus Spyware

The gentle clatter of hooves made by Pegasus sounds magical in the Greek mythical world where nature bloomed under his majestic wings. However, in our contemporary society, the name of this divine winged horse carries a darker significance, unveiling a concealed dystopian society hiding in plain sight. Dubbed as one of the most sophisticated cyber weapons, the Pegasus spyware is used to suppress dissent and opposing views, targeting the individuals who advocate for human rights and justice or simply expose state crimes.

China's Ascent in the New Space Era: Geopolitics, Technology, and the Quest for Outer Space Supremacy

China's Ascent in the New Space Era: Geopolitics, Technology, and the Quest for Outer Space Supremacy

Ever since humankind succeeded in launching its first satellite into orbit, space has been considered the last frontier. The ideological rivalries of the Cold War led to the birth of the space age, which was aggravated by the clash between the US and the USSR. Today, the rapid economic development of emerging powers such as China, the gradual reduction in the cost of rocket launches, technological sophistication, and public-private collaboration and entrepreneurship are just some of the elements that make the commercialization and exploration of Outer Space one of the most vibrant fields of international activity in the present and future. Although this discipline is vast, this article will be an introduction to the People's Republic of China's activities in Outer Space, encompassing both civilian and military aspects (which are closely related). These aspects, and the activities of the US, Russia, or India, may be touched on in future publications.

Guarding Humanity: Mapping the Landscape of X-Risks

Guarding Humanity: Mapping the Landscape of X-Risks

Existential risk has become a growing field of scientific inquiry, as humanity's future on this planet seems increasingly insecure. This is due to a range of potential threats, including the rapid advancement of AI technology, climate change, and nuclear war.

Digital Authoritarianism in the Middle East

Digital Authoritarianism in the Middle East

Over the past ten years, governments of the Middle East have employed digital information and communication technologies as a tool to reinforce control over their citizens. Drawing inspiration from models provided by China, Russia and Israel, Middle Eastern governments have implemented policies and strategies aimed at censorship, digital deception and mass surveillance, worsening human rights records in the region.

The Malware Targeting Human Life and Weaponising Interdependency

The Malware Targeting Human Life and Weaponising Interdependency

Unprecedented internet connectivity in dangerous machinery and the essential function of society requires preventative cyber risk solutions. This article reviews the new Kinetic Cyber, the UK’s upcoming Product Security and Telecommunications Infrastructure (PSTI) Bill and reflects upon International Humanitarian Law (IHL) relating to weapons of mass destruction.

Terrorist use of the Metaverse: new opportunities and new challenges

Terrorist use of the Metaverse: new opportunities and new challenges

Research shows that terrorists use the Internet to spread their propaganda, communicate, fund their organisations and attacks, train aspiring terrorists and plan and execute attacks off- and online. With the emergence of the metaverse – or Web3 – opportunities will unfold for terrorists online, and so will challenges to tackle these opportunities. Recruitment and attack planning possibilities will likely emerge and new targets might appear. A set of new laws, regulations and capabilities will therefore certainly be needed from stakeholders to ensure users’ safety and prevent the use of the Internet for terrorist purposes.


The Environmental Cost of the Future

The Environmental Cost of the Future

Technology stands at the centre of human development. With it comes numerous problems, including how humanity has changed and continues to change its environment. This article explores some of the problems surrounding energy security, specifically those associated with Industry 4.0 (the fourth industrial revolution) as well as the field of Artificial Intelligence and Machine Learning (AI/ML). While there are few definitive solutions to the problems created by improving old technologies and implementing new ones, change is dependent on sparking conversations about sustainability and ultimately the type of future humanity chooses to create for itself.

Artificial Intelligence: A Game Changer for All-Source Intelligence Activities?

Artificial Intelligence: A Game Changer for All-Source Intelligence Activities?

Intelligence agencies today have to collect and analyse intelligence on numerous individuals, state and non-state actors in an environment of many complex hybrid threats and overlapping interests. Additionally, there is a glut of data from several sources that need to be processed quickly and accurately. Artificial Intelligence (AI) presents a viable way to maximise the value of the All-Source intelligence products. Despite all the promise AI holds for the Intelligence Community, the technology is far from perfect.

Plenty of Phish in the Sea: How Artificial Intelligence is Transforming the Oldest form of Cybercrime

Plenty of Phish in the Sea: How Artificial Intelligence is Transforming the Oldest form of Cybercrime

Artificial intelligence and machine learning (AI/ML) have seamlessly and fundamentally transformed the way we interact with digital technology [1]. Dual-use applications, such as the case of AI/ML, can be quickly exploited by cybercriminal activities. One example is phishing, one the first types of cybercrime. While phishing in today’s world is still perceived as an outdated scam, AI/ML advancements have paved the way for more convincing phishing attacks and the wider use of hyper-targeted spear-phishing. This article will focus on the AI/ML-enabled transformation of phishing and spear-phishing and the consequences it poses for the cybersecurity environment.

Ethics, Artificial Intelligence and Predictive Policing

Ethics, Artificial Intelligence and Predictive Policing

AI is increasingly being used in all areas of our lives, including law enforcement. Through pattern identification, AI offers the field of law enforcement an incredible opportunity to better prevent crime. In this regard, AI is being used in predictive policing, or the ability to predict crime before it happens. The practice itself already poses many ethical and legal dilemmas, but AI reinforces these problems. This article explains how the use of AI in predictive policing poses a threat to fundamental rights and proposes a possible alternative.

The Augmentative Effect of AI in The Open Source Intelligence Cycle

The Augmentative Effect of AI in The Open Source Intelligence Cycle

Artificial Intelligence (AI) has become one of the most polarising topics and eye-catching terms in our contemporary lexicon; seen as either a paragon of modern technology or as a harbinger of humankind’s technological doom, depending on who you ask. From pocket AIs such as Siri to self educating AIs in Silicon Valley, AI has permeated into virtually all facets of life.

Artificial intelligence and nuclear warfare. Is Doomsday closer? - Cyber Security and AI Series

Artificial intelligence and nuclear warfare. Is Doomsday closer? - Cyber Security and AI Series

Artificial intelligence (AI) has the potential to radically change societies. By employing it in numerous fields, ranging from healthcare to the economy can improve humans’ lives. However, this revolutionary technology may cause disruptive imbalances in the military power relations between countries, especially in the field of nuclear stability. Although the development of AI-based defensive weapon systems might improve nuclear deterrence, incorporating artificial intelligence into nuclear offensive capabilities and command and control (C2) systems could accelerate escalation in crisis scenarios.

Switching Off The Lights - Cyber Security and AI Series

Switching Off The Lights - Cyber Security and AI Series

There is the confidence that the globalised, networked systems we have built are resilient enough to overcome significant disruptions. What if this confidence is misplaced? This article seeks to answer this question in relation to what is likely the most important of humankind’s networks: the electrical grid. Two methods for conducting a cyber attack against the electrical grid will be considered; the first for disrupting the grid, and the second for destroying core elements. A warning will be offered to the West not to rely on technological supremacy in cyberspace as a deterrent to cyber attacks.

The Central Role of Memes on Alt-Right Radicalisation in the “Chanosphere”

The Central Role of Memes on Alt-Right Radicalisation in the “Chanosphere”

The internet forms an important component of ideological radicalisation, as it provides a platform for like-minded individuals to communicate in virtual communities like the ‘Chanosphere,’ which in turn allows for extremist groups to develop safe havens of communication and information exchange [1]. Using the case study of a cluster of alt-right terrorist attacks initiated by the Christchurch mosque shootings in 2019, this analysis will demonstrate that alt-right memes played a central role in radicalisation, in that they acted as vessels of encoded racist ideology which used ‘weaponised irony’ as a means of communicating group identity

Challenges Faced by Social Media in Curbing Misinformation

Challenges Faced by Social Media in Curbing Misinformation

The spread of misinformation, especially during the pandemic has posed several challenges for social media companies. The structure of their algorithms and exploitation of human biases have exacerbated the impact of misinformation. Despite the efforts by social media companies, misinformation has continued to grow at an enormous scale which has further endangered life during the pandemic.

Ethiopia’s Internet Shutdowns: Contributing to humanitarian catastrophe in the Tigray

Ethiopia’s Internet Shutdowns: Contributing to humanitarian catastrophe in the Tigray

Internet shutdowns are becoming increasingly common across Africa. In Ethiopia, the practice has proven to be one of the government’s favoured tools to control information reaching its subregions’ ethnic groups since at least 2015. After the start of the Tigrayan War in November 2020, Internet cuts have heavily contributed to the creation of the humanitarian crisis.

Market for Force: The Emerging Role of Private Military and Security Companies in Non-Traditional Fields

Market for Force: The Emerging Role of Private Military and Security Companies in Non-Traditional Fields

Previous articles in this series have shed light on the evolution of Private Military and Security Companies (PMSC). Growing beyond the commonly held conceptions in academia and of the industry itself, PMSCs are involved in conflicts around the world. Used by both states and non-state actors, these companies are also branching out into other demographics and types of security. These include intelligence gathering and analysis as well as cyberspace, domains that are typically the preserve of states. The cyber realm has not only been populated by a number of private cybersecurity firms but also hackers-for-hire willing to strike anyone anywhere. Additionally, this article will briefly explore the emerging opportunities for PMCSs in Latin America and China.

Hypersonic Weapons: Challenging the Hype

Hypersonic Weapons: Challenging the Hype

A prevailing orthodoxy is recently emerging around hypersonic weapons. It is one characterised by eminent and imminent threat. This impression is largely misguided and misleading and should be challenged. Hypersonic weapons are an awesome military power that threatens to totally upend the conduct and course of modern warfare. A prevailing orthodoxy is recently emerging around hypersonic weapons. It is one characterised by eminent and imminent threat.

Middle-Power Space Strategies: A Comparison of Canada and South Korea

Middle-Power Space Strategies:   A Comparison of Canada and South Korea

Space policy issues are often framed in the context of great power competition. States like Russia, the People’s Republic of China and the United States are the main drivers of technological innovation in this area, but their rivalries also constitute barriers in negotiations regarding international governance. Nonetheless, space efforts of middle powers are not just important for the preservation of these states’ economic position in the international system but