For this first episode of our second interview series, we interviewed Jonáš Syrovátka, Program Manager at the Prague Security Studies Institute (PSSI). Mr. Syrovátka primarily works on projects concerning Russian influence activities in the Czech Republic. During our conversation we discussed the ‘infodemic’ amid the pandemic.
COVID-19 has been disrupting people’s lives and forcing governments to take measures rapidly to contain the virus and prevent further deaths. It took governments by surprise and revealed their lack of preparedness, leading them to formulate policy responses which engaged with securitisation. To fight the pandemic, authorities have introduced measures that drastically infringed upon citizens’ personal freedoms, starting with their freedom of movement. They engaged in a process of securitising COVID-19 using these exceptional times as a rationale to enact exceptional measures. A glaring example is the introduction of contact tracing apps: for citizens to be able to move around freely again, governments had to find a way to track the virus by identifying contaminated citizens and their contacts. Seen by some as an open door to governments collecting more health data, this measure is questionable in terms of ethics and privacy. This article argues that the introduction of contact tracing apps is the result of a securitisation process that stems from governments’ desire to show that they are taking action and controlling the situation.
The post 9-11 “War on Terror” era is characterized by the parallel ascension of social media. Social media has become a strategic tool to communicate and enact terrorism, thereby revolutionizing its impact. It has also been a key medium in the rise of radicalization and the dissemination of online extremist content around the world. This has offered terrorists groups the unprecedented ability to disseminate images and sentiments at a rapid pace to a borderless audience. While there has always been a relationship between terrorism and traditional media in the forms of print and television, social media networks have given terrorists the ability to have their acts communicated in a more potent and instantaneous way – with a lens that can been distorted by their bias.
Kenya’s status as a major technological innovator in recent years has positioned it as Africa’s Silicon Valley, but what implications does this have for the continent’s future prospects? And how can we mitigate the burgeoning shortcomings? This piece looks at some of the most salient challenges of digital technologies in Kenya today.
In this third episode, we are interviewing Belén Rodríguez, Research Associate at the NATO Strategic Communications Centre of Excellence (NATO StratCom COE). Rodríguez mainly focuses on Russian ‘information laundering’, a “process [in which] false or deceitful information is legitimised through a network of intermediaries that apply gradually a set of techniques in order to de-contextualise it and obscure the original source”. In our conversation with Rodríguez, we discussed different information laundering techniques, examples of information laundering during the corona crisis, and the future of the NATO-Russia relations.
“With machine learning and artificial intelligence, disinformation will be even more complicated to debunk, but generally, the reciprocal aims of NATO and Russia should stay the same.”
“One of the biggest geopolitical risks of this crisis is the polarisation of public opinion towards democratic institutions.”
Recent allegations of Kim Jong Un’s death have triggered old questions regarding succession within the Kim dynasty and sparked new controversies regarding North Korea’s approach to nuclear weapons. However, these issues have been raised in the middle of a global crisis, namely the COVID-19 pandemic. This article will move the focus from North Korean nuclear weapons to biological weapons capabilities, after introducing the present situation of the country, and will assess its potential for production and use of those weapons.
A decade ago, malware Stuxnet took over the control system for uranium enrichment in Iran and caused hardware to malfunction. A virtual entity caused damage in the material world and demonstrated that futuristic cyber weapons are real. This was not, however, the first case when critical infrastructure (CI) was physically destroyed in a cyber attack. More importantly, the attack did not result in human casualties, so the damage was not enough to politically trigger cyber arms control. Even today, after 10 years of accelerating development and innovation, cyber arms exist — while cyber disarmament does not.
Disinformation is a rapidly evolving process, and it is becoming more sophisticated with advances in and successful integration of Machine Learning (ML) and Artificial Intelligence (AI) technology. Where AI represents machine intelligence as compared to human intelligence, ML is the subset of AI which represents algorithms that perform specific tasks without explicit instructions, as they rely instead on inference and patterns. This article examines the ways ML/AI have transformed the art of disinformation campaigning, and to what extent this development will effectively shape public opinion and political discourse. ML/AI technologies are increasingly sophisticated in manipulation of both the rate and nature of information production. It is subsequently more crucial than ever to strike a balance between countering disinformation with user freedoms and overall credibility.
THE INTERNET AS AN EXTENSION OF COLONIALISM
Globally digital technologies and the Internet have been increasingly normalised seeing Western states dominate cyberspace and technological developments. As such, questions have arisen regarding the prominence of Western bias at both the developmental and implementational level leading to negative implications for non-Western users. This article draws upon the concept of digital colonialism seeking to address the potential emergence of colonial attitudes towards integration and usage of digital technologies and the Internet.
Cybercrime in Ecuador: An Asymmetrical Threat
In the digital era we live in, cybercrime represents a direct threat not only for nations but also for corporations and individuals. Nations that lack development in technology and cybersecurity strategies are especially vulnerable to this type of threat. The recent data leak in Ecuador has highlighted the substantial threat of cybercrime to less technologically developed nations and the enormous impact it can have on their populations’ data protection.
DON’T DEPEND ON DRONES IN INTELLIGENCE
Drones have advanced warfare and counterinsurgency operations carried out in the War on Terror, their positive effect on intelligence is less significant however. Whilst drone technology has facilitated better observational intelligence, lethal capacity, and new forms of counterinsurgency strategy, they are limited in their application and not as infallible as policy-makers often believe. It also remains uncertain if drones will remain as applicable to future intelligence operations as they are today.
THE STRATEGIC-TACTICAL DICHOTOMY OF DRONE WARFARE
“Drones have arguably revolutionised modern warfare, especially their use in targeted killings. However, over-reliance on this tactic due to its measurable results has come at the expense of long-lasting strategic advances, moving drones away from their original intelligence-focused tasks and stagnating an already exhaustive War On Terror.”
THE APPLICATION OF ARTIFICIAL INTELLIGENCE FOR PEACEKEEPING
“The increasing amount of available data, mainly due to the proliferation of access to the internet in countries where peacekeeping missions take place, has caused a technology-driven transformation of the operational environment. This comes at a time of significant developments in the fields of artificial intelligence and particularly machine learning, most of whose applications still rely on massive amounts of data. As such these developments have produced some promising individual initiatives to exploit this new and growing potential for United Nations operations.“
DISINFORMATION AND CYBER-THREATS: VULNERABILITY AND RESILIENCE IN THE 2019 EU ELECTIONS
In May 2019, over 350 million European citizens will express their vote for the constituency of the new European Parliament in a moment of significant challenges for the European Union (EU). As these may be the most important elections ever faced by the EU, policy-makers should pay particular attention to disinformation campaigns and cyber-threats to guarantee fair and free elections.
WHEN SMARTER IS NOT ALWAYS SAFER: THE CYBERSECURITY OF THE ELECTRIC GRID
An increased reliance on electricity combined with new production methods and structural changes in the grid pose new challenges in guaranteeing stable and affordable access to electricity. These structural changes imply the integration of ‘smart’ control systems, which often rely on internet connections. Yet, considering the rapid development of malicious activities in the cyber domain, a smarter grid is not always safer.
EU’S ROLE IN SHAPING CYBER LEGISLATION – PART TWO OF THREE
The European Union´s role as a global cyber power mainly relies on its ability to shape cyber-related legislation and standards of state behavior. This might prove challenging due to its institutional structure and civilian power characteristics. Still, the cyber diplomacy directive adopted by the European Council in December 2015 marks the EU’s more proactive role in international cyberspace policy development.
THE CHINESE SWARMING PROGRAMME – PART THREE OF THREE
The People Liberation Army has recognised the potential of swarm technology to disrupt the current order; the low cost of swarming technology means that it could be used for saturation assaults on a high-value target by simply overwhelming the current defensive systems.
THE AMERICAN SWARMING PROGRAMME – PART TWO OF THREE
In an attempt to stay ahead of the curve, the US has been heavily investing in the research and development of drone swarms. Three developments in the US swarming programme are particularly interesting: the Perdix drone swarm, the Low-Cost UAV Swarming Technology (LOCUST) and the Control Architecture for Robotic Agent Command and Sensing, or CARACaS systems.
EU AND CYBER SECURITY: NEW PLAYER AGAINST EMERGING THREATS IN CYBERSPACE – PART ONE OF THREE
Transport, energy, health, and finance are the most vulnerable sectors exposed to cyber-threats. Issuing the EU Cybersecurity Strategy in 2013 was an important step forward in developing a common framework; however, the strategy lacked the practical initiatives that would deliver tangible outcomes.
SWARMING TECHNOLOGY IS CHANGING DRONE WARFARE – PART ONE OF THREE
Swarming technology, therefore, represents a disruption in terms of the strategic status quo of warfare due to the low entry cost, the general trend towards more autonomous systems, and the onus of differentiation being placed on those being attacked.
BIG WORLD, BIG DATA
The number of potential applications for the use of big data is immense. Initially intended as a private sector tool, big data is now finding its place within the realm of politics. Cambridge Analytica’s involvement in the Trump and Brexit campaigns has demonstrated the onset of a new era where big data may be used not only for population analysis, but also to influence the political views and preferences of the population as well.
3D PRINTING AND NUCLEAR PROLIFERATION
The combination of innovation and digitalisation poses a threat to the Non-Proliferation Treaty (NPT) as the current institutional framework is targeted at objects, not information. The spread of technology does not fall under the jurisdiction of the NPT and is, due to its digital nature, hard to regulate.
Once a concept confined solely to science fiction movies, human augmentation is rapidly transforming into a tangible reality. While Hollywood often portrays such enhanced humans through flashy, futuristic technology, the reality is that we are on the cusp of witnessing such innovations quite soon. Far from the realm of fiction, human augmentation is moving into the sphere of real-world applications, especially in the field of defence and healthcare.