Intelligence

Unlocking Justice: A Policy Roadmap for Victims of Spyware (Nadine Farid Johnson – Just Security)

The proliferation of spyware poses a serious threat to civil rights and civil liberties with few avenues for accountability. Despite representative promises by industry...

Undeclared North Korea: Sinpung-dong Missile Operating Base (Joseph S. Bermudez Jr., Victor Cha and Jennifer Jun – Center for Strategic & International Studies)

Located approximately 27 kilometers from the China-North Korean border, the Sinpung-dong Missile Operating Base is an undeclared ballistic missile operating base in North Pyongan...

The Pentagon’s Rare Earth Gamble: Smart Strategy or State-Crafted Monopoly? (Henry Sanderson – RUSI)

The Pentagon’s direct investment in rare earth miner MP Materials marks a decisive shift in US industrial and defence policy – one that shatters...

National digital IDs in the age of artificial intelligence (Onur Kara – IISS)

In the United Kingdom, it seems the government of Prime Minister Keir Starmer is considering the rollout of national digital IDs – a potential...

Whack-a-Mole No More: How Extremists Choose Their Digital Safe Havens (Mariana Olaizola Rosenblat – Lawfare)

Tamar Mitts’s “Safe Havens for Hate” arrives at a moment when debates over online extremism and platform regulation are increasingly urgent—and increasingly polarized. Governments...

Legal Frameworks for Addressing Spyware Harms (Lisandra Novo – Just Security)

The first half of 2025 has seen significant developments to curb the use of spyware, software that can extract users’ data, such as videos,...

The UN’s Permanent Process on Cybersecurity Faces an Uphill Battle (Pavlina Pavlova, Christopher Painter – Lawfare)

In July, the United Nations Open-Ended Working Group on security of and in the use of information and communications technologies (ICTs) reached consensus on...

The Rules of the Road in Cyberspace, 10 Years Later (Allison Pytlak, Christina Rupp, Eugene EG Tan, Louise Marie Hurel, Talita Dias and Valentin...

Cyber operations have become an enduring feature of geopolitical competition, increasingly targeting critical infrastructure and testing the boundaries of international stability. In the past...

A ‘Window Sticker’ for Software (Adam Isles – Lawfare)

In June 2017, a cyberattack known as notPetya corrupted the Ukrainian tax accounting software Medoc and used it to infect victim machines with destructive...

Latest articles