This Alert looks at the impact of the ICT on sub-Sharan Africa’s political culture and civil society development. It identifies how various ICT solutions are influencing a number of realms, as well the structural and social limitations to using and spreading ICT tools on the continent.
Cyber history provides many examples of crises that should make users, governments and businesses take immediate action. But the recent WannaCry attack shows, all stakeholders have been slow (or unwilling) to learn the lessons of these past experiences and implement effective countermeasures.
As they enter a period of critical elections, the US and European countries are being confronted by a series of threats from cyberspace. Electronic voting infrastructure and networks of political groups have recorded repeated intrusion, while strategic leaks of compromising documents have sought to influence public opinion.
Migrant groups and host communities have developed a number of smart technology apps aimed at providing new arrivals with information on housing, education and employment opportunities. This Alert looks at how EU authorities can utilise these new technologies to help migrants, while exploring the associated dilemmas.
This Report investigates opportunities for improving European strategic thinking on space security. It analyses potential threats to critical European space infrastructure, and offers ideas for improving space system resilience, reducing external dependence, and working with international partners to ensure a secure and sustainable environment for outer space activities.
With law enforcement agencies pooling resources to counter ISIL's online propaganda, this Alert seeks to raise awareness of the jihadists’ use of the so-called ‘Dark Web’, the hidden underbelly of the little explored Deep Web.
Industrial espionage – i.e. the theft of trade secrets, intellectual property, and scientific know-how from enterprises and research centres – is on the rise worldwide. This Alert assesses state-sponsored industrial espionage in peacetime, and seeks to highlight the threat it poses to national and economic security.
With the virtual and physical worlds becoming ever more blurred, and the links between such hacker collectives and governments still unclear, is it still possible to set rules for governing cyberspace?
This Brief explains how the internet has increasingly become a tool for extremists to recruit new members, raise funds, and conduct new types of attacks. What can be done to stop the rise of cyber jihadism?