Intelligence

The Digital Battlefield: How Terrorists Use the Internet and Online Networks for Recruitment and Radicalization (Aaron Y. Zelin – The Washington Institute for Near...

A terrorism expert discusses what U.S. policymakers and tech companies can do to stem the proliferation of jihadist activity online, including greater attention to...

What Ukraine can teach Europe and the world about innovation in modern warfare (Joyce Hakmeh, Chatham House)

Ukraine’s war effort has become a case study in how necessity fuels innovation. In the face of a far larger and better-equipped adversary, Ukraine...

Pentagon to build AI for war planning in Europe and Asia (Patrick Tucker, Jennifer Hlad – Defense One)

In a bid to accelerate military decision-making—particularly in the European and Indo-Pacific regions—the Pentagon has hired Scale AI to prototype an artificial-intelligence program to...

Espionage Actor ‘Lotus Blossom’ Targets South East Asia (Alexander Culafi, Dark Reading)

An espionage-focused threat actor dubbed "Lotus Blossom" is targeting areas around the South China Sea with a proprietary backdoor malware known as "Sagerunex.". The...

US charges Chinese nationals in cyberattacks on Treasury, dissidents and more (Jonathan Greig, The Record)

U.S. law enforcement agencies announced dozens of criminal charges against a web of hackers employed by the Chinese government and private companies in China...

Trump orders halt to intelligence sharing with Ukraine, CIA director says (Daryna Antoniuk, The Record)

U.S. President Donald Trump ordered a suspension of intelligence sharing with Ukraine, CIA Director John Ratcliffe said in an interview with Fox Business Network...

Ukraine’s intel service honors civilian hackers for the first time with military award (Daryna Antoniuk, The Record)

Ukraine's military intelligence service (HUR) has honored a group of civilian cyber activists for their role “in strengthening national security,” marking the agency’s first...

Hybrid AI and Human Red Teams: Critical to Preventing Policies from Exploitation by Adversaries (David Bray, Stimson Center)

Contrary to conventional wisdom that policymakers need only consider geopolitical implications when crafting technology policies and export controls, this assumption misses three critical points:...

From Open-Source to All-Source: Leveraging Local Knowledge for Atrocity Prevention (Jacqueline Geis, Just Security)

The tools available to human rights researchers have expanded dramatically over the past 20 years, enabling greater remote investigative powers than ever before. Analysts...

Latest articles