Artificial Intelligence & Language Preservation
Policy Paper Series Guest User Policy Paper Series Guest User

Artificial Intelligence & Language Preservation

The United Nations Educational Scientific and Cultural Organization (UNESCO) has designated 2022-2032 the International Decade of Indigenous Languages. This initiative comes at a time when endangered language speakers, linguists, and other groups are concerned about language extinction and the rapid spread of artificial intelligence (AI). Some researchers are optimistic that AI can be leveraged to help document, preserve, and revitalize at-risk languages, while others are concerned that the technology will accelerate the homogenization of human language.

Read More
True Costs of Misinformation | The Global Spread of Misinformation Laws
Journal Article, Bradshaw Guest User Journal Article, Bradshaw Guest User

True Costs of Misinformation | The Global Spread of Misinformation Laws

Between 2010 and 2022, 80 countries enacted new legislation or amended existing laws in an attempt to curb the spread of misinformation online. This sharp and global adoption of misinformation laws, however, cannot be explained by the sudden emergence of false or misleading information, as these problems have existed for a very long time.

Read More
Gotta Track’em All: Data Privacy and Saudi Arabia’s Pokémon Go Acquisition
Expert Commentary, Bradshaw, Jackson Guest User Expert Commentary, Bradshaw, Jackson Guest User

Gotta Track’em All: Data Privacy and Saudi Arabia’s Pokémon Go Acquisition

In a given month, more than 100 million people open Pokémon Go—the app that allows users to superimpose the world’s most profitable media franchise onto reality using only their smartphone. Using their phone camera and a flick of the wrist, they captured tiny digital monsters at the park, at the office, sometimes in active minefields, and, yes, in the bathroom.

Who else was watching?

Read More
Primer on the Costs of Cyber Espionage
White Paper, Akoto, Herr Guest User White Paper, Akoto, Herr Guest User

Primer on the Costs of Cyber Espionage

Cyber espionage is the use of cyber tools and techniques to gather intelligence or steal sensitive information from targeted entities. This form of espionage poses significant risks to national security, economic stability and corporate integrity. Given the complex and often hidden nature of cyber espionage activities, accurately measuring their costs presents a significant challenge.

Read More
Disinformation and Identity-Based Violence
White Paper, Bradshaw Guest User White Paper, Bradshaw Guest User

Disinformation and Identity-Based Violence

Disinformation spread via digital technologies is accelerating and exacerbating violence globally. There is an urgency to understand how coordinated disinformation campaigns rely on identity-based disinformation that weaponizes racism, sexism, and xenophobia to incite violence against individuals and marginalized communities, stifle social movements, and silence the press.

Read More
Mythical Beasts and Where to Find Them
Report, Herr Sam Bradshaw Report, Herr Sam Bradshaw

Mythical Beasts and Where to Find Them

The Mythical Beasts project addresses this meaningful gap in contemporary public analysis on spyware proliferation, pulling back the curtain on the connections between 435 entities across forty-two countries in the global spyware market. These vendors exist in a web of relationships with investors, holding companies, partners, and individuals often domiciled in different jurisdictions.

Read More
Secret Cyber Wars: Why States Are Increasingly Turning to Economic Espionage and How Cyber Proxies Play a Key Role
Expert Commentary, Akoto Guest User Expert Commentary, Akoto Guest User

Secret Cyber Wars: Why States Are Increasingly Turning to Economic Espionage and How Cyber Proxies Play a Key Role

In September 2001, operatives for Procter & Gamble were caught diving in dumpsters outside a Unilever facility in Chicago in search of documents and other discarded items containing confidential information about Unilever’s hair care products business. To avoid litigation and the negative publicity that often accompanies such disputes, the companies quietly reached a negotiated settlement where Procter & Gamble agreed to not use any of the information obtained. This early example illustrates the ongoing vulnerability companies face regarding data security. In today’s corporate environment where digital data storage is the norm, companies now have to be wary of not only paper documents but also discarded storage devices like hard drives, USBs, and even old office equipment that might store digital data.

Read More
Book Review Fight for the Final Frontier: Irregular Warfare in Space
Sam Bradshaw Sam Bradshaw

Book Review Fight for the Final Frontier: Irregular Warfare in Space

A seasoned scholar, strategist, and expert in space policy and strategy, Dr. John J. Klein is well-versed in applying strategic theory to the space domain. In his new book, Fight for the Final Frontier: Irregular Warfare in Space (2023), Klein argues that irregular warfare, in both its military and nonmilitary forms, is a vital and underutilized concept for understanding malicious activities in space and the nature of space warfare. His argument draws on a diverse list of strategic theorists, historians, and contemporary policy analyses. Klein weaves these sources together persuasively, providing an accessible overview of a technologically demanding subject. Policy generalists and students, along with veteran analysts of space policy, will benefit from his account.

Read More
Book Review - Cyber Threats & Nuclear Weapons
Sam Bradshaw Sam Bradshaw

Book Review - Cyber Threats & Nuclear Weapons

As the world’s infrastructure becomes increasingly interconnected, more critical systems are exposed to cyber threats. A cyber threat is a malicious act intended to steal, damage, or disrupt digital data. Cyber threats seek to turn potential security vulnerabilities into attacks on systems and networks.

Read More
Markets Matter - A Glance into the Spyware Industry
Report, Herr Sam Bradshaw Report, Herr Sam Bradshaw

Markets Matter - A Glance into the Spyware Industry

The Intellexa Consortium, a complex web of holding companies and vendors for spyware and related services, have been the subject of recent, extensive sanctions by the US Department of the Treasury and the focus of reporting by the European Investigative Collaborations among others. The Consortium represents a compelling example of spyware vendors in the context of the market in which they operate—one which helps facilitate the commercial sale of software driving both human rights and national security risk. This paper addresses an international policy effort among US partners and allies, led by the French and British governments, as well as a surge of US policy attention to address the proliferation of this spyware.

Read More
Small Satellites and International Security
Christopher Barclay Christopher Barclay

Small Satellites and International Security

Orbiting satellites perform many tasks: communications, broadcasting, weather forecasting, earth observation, intelligence-gathering, and scientific research. The first satellite, launched in 1957, was a modest metal sphere containing a simple radio transmitter. Since then, satellites have grown in size and complexity. Many are visible to anyone with a reasonably powerful backyard telescope.

Read More
Who spies on whom? Unravelling the puzzle of state-sponsored cyber economic espionage
Journal Article, Akoto Guest User Journal Article, Akoto Guest User

Who spies on whom? Unravelling the puzzle of state-sponsored cyber economic espionage

Traditional conceptions of state-sponsored cyber economic espionage suggest that countries with different product profiles should experience high levels of espionage between them. However, this is not what we observe empirically. This article offers new insights into the strategic calculations that underpin state-sponsored cyber espionage and challenges scholars and policymakers to rethink the dynamics of international economic competition and security in the digital age.

Read More
New Technology and Nuclear Risk
Sam Bradshaw Sam Bradshaw

New Technology and Nuclear Risk

In 2006, two leading scholars of the nuclear era warned that the age of mutually assured destruction (MAD) was ending. Seventeen years later, the authors are doubling down on these claims, arguing that the outbreak of new conventional conflicts has changed nuclear decision making, increasing the threat of coercive nuclear escalation. In an age of new technology, this warning is more pertinent than ever. The rapid introduction of emerging technologies and their weaponization raises concerns about maintaining strategic stability. 

Read More