August 12, 2016
Posted by: Jessica Beyer
The following article is in a series focusing on countries that restrict speech online in order to prevent “social panic” or “anxiety amongst citizenry.” The series will examine Venezuela, China, and Saudi
August 8, 2016
Posted by: Jessica Beyer
Extremist use of information and communication technology (ICT) has resulted in tension between the government, industry actors, and ICT users. In their response to extremist use of ICT, industry actors have faced a serious dilemma over how to respond to bad actors in a way that promotes security but does not infringe upon users’ rights to privacy and freedom of speech.
June 28, 2016
Posted by: Jessica Beyer
North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.
June 21, 2016
Posted by: Jessica Beyer
The closeness of China and Russia’s cybersecurity relationship is not dependent on their ties with each other, but is defined in relation to the US. Instead of augmenting the trust or preventing cyber-espionage between the two countries, Sino-Russian cybersecurity cooperation is a strategic move to challenge US dominance over the Internet.
June 20, 2016
Posted by: Monique Thormann
Eight Jackson School undergraduates spent the morning of June 7 in a different kind of classroom: presenting their research on “Extremist Use of Information and Communications Technology – Transcending the
June 14, 2016
Posted by: Jessica Beyer
In the video below, Teyloure Ring explains the Russian Federation’s attitude towards encryption and encrypted products. Ms. Ring argues that while there was a lot of concern that countries such
May 31, 2016
Posted by: Jessica Beyer
In today’s increasingly interconnected world, governments are struggling to strike a balance between privacy and security within their borders, particularly regarding the issues around encryption. Information technology (IT) companies are also joining
May 25, 2016
Posted by: Jessica Beyer
On October 6, 2015, the European Court of Justice (ECJ) struck down the Safe Harbor law in an action that could be argued to be the single most important legislation
April 26, 2016
Posted by: Jessica Beyer
Apple has been in the news a lot recently. As discussed in Alexander Kegel’s post contextualizing the iPhone encryption debate, the San Bernardino terrorists used an iPhone and the FBI
April 19, 2016
Posted by: Jeremy D Pritchard
In recent years, small start-ups and technological entrepreneurs have emerged as cutting edge innovators in space-related technology. The sudden growth in private sector innovation in areas such as space launch