Intersections

IBM and NASA Release Open-Source AI Model to Predict Solar Weather And Help Protect Critical Technology (AI Insider)

IBM and NASA released Surya, an open-source AI model designed to predict solar weather and protect technology on Earth and in space. The model,...

Algorithmic Foreign Influence: Rethinking Sovereignty in the Age of AI (Angelo Toma – Lawfare)

In early 2022, TikTok users in Kenya saw their feeds flooded with political disinformation—including content laced with ethnic hate speech and violent threats ahead...

Biased credit ratings are costing Africa billions—and worsening its health crises (Maggie Mutesi – Atlantic Council)

As Zambia mourned the death of its former President Edgar Lungu on June 5, a quieter crisis was unfolding in the country’s public hospitals....

A Global Vision of Free and Open Spaces: Creating Connectivity in the Modern World (Harsh V. Pant, Harsh V. Pant – Observer Research Foundation)

Globalisation as we know it—characterised by chasing the lowest costs of production, including in rival countries’ territory—is at an end. Global commerce and trade,...

National digital IDs in the age of artificial intelligence (Onur Kara – IISS)

In the United Kingdom, it seems the government of Prime Minister Keir Starmer is considering the rollout of national digital IDs – a potential...

In Preparing for Large-Scale Conflicts, States Neglect Lessons on Civilian Protection at Their Peril (Lucca de Ruiter, Erin Bijl and Megan Karlshoej-Pedersen – Just...

As the international security environment grows more volatile and major militaries shift focus from counterinsurgency and counterterrorism to large-scale combat, critical lessons on reducing...

The UN’s Permanent Process on Cybersecurity Faces an Uphill Battle (Pavlina Pavlova, Christopher Painter – Lawfare)

In July, the United Nations Open-Ended Working Group on security of and in the use of information and communications technologies (ICTs) reached consensus on...

The Rules of the Road in Cyberspace, 10 Years Later (Allison Pytlak, Christina Rupp, Eugene EG Tan, Louise Marie Hurel, Talita Dias and Valentin...

Cyber operations have become an enduring feature of geopolitical competition, increasingly targeting critical infrastructure and testing the boundaries of international stability. In the past...

A ‘Window Sticker’ for Software (Adam Isles – Lawfare)

In June 2017, a cyberattack known as notPetya corrupted the Ukrainian tax accounting software Medoc and used it to infect victim machines with destructive...

Latest articles