Please select a Date, Category or Tag

The Rise of ‘Digital Nations’

April 14, 2017

By Cheng Lai Ki The Internet-of-Things (I0T) refers to the dense nexus of sensors and computers built on the hyper-connectivity of the Internet essential for economic development, national security and intelligence collection. While dominated by technical solutions, we are seeing an increase in policy-based interventions designed to tackle human vulnerabilities. During closing discussions between a … Continue reading “The Rise of ‘Digital Nations’”


Strife Feature – A Beginners Guide to the Musical Scales of Cyberwar

December 28, 2016

By: Jessica “Zhanna” Malekos Smith Whether you are a cybersecurity professional, policymaker, or student, this article is a beginner’s guide to understanding the ‘musical scales’ of cyberwar. As such, it addresses what constitutes a use of force in cyberspace and how states may lawfully respond. Understanding the legal confines of offensive and defensive cyber operations … Continue reading “Strife Feature – A Beginners Guide to the Musical Scales of Cyberwar”


Strife Feature, Abstract: A Beginners Guide to the Musical Scales of Cyberwar

December 15, 2016

By: Jessica “Zhanna” Malekos Smith In Strife’s long-form feature piece for December, Jessica Malekos Smith writes about the beginner’s guide to the ‘musical scales’ of cyberwar. Using the analogy of a piano keyboard, her article aims to promote an understanding of what constitutes a use of force in cyberspace and how a state may lawfully … Continue reading “Strife Feature, Abstract: A Beginners Guide to the Musical Scales of Cyberwar”


Cybersecurity in Practice (Part V): Securing the Digital Frontier

November 18, 2016

By: Cheng Lai Ki The digital-physical divide is shrinking, evident from the increased incorporation of cloud computing alongside an exponential increase in development of smart systems and products. With billions of people connected to the internet today, this globalized informatization can be represented as an ‘Internet-of-Things’ (IoT). IoT can be defined as the nexus of … Continue reading “Cybersecurity in Practice (Part V): Securing the Digital Frontier”


Cybersecurity in Practice (Part IV): Realities and Importance of effective Cyber Crisis-Management infrastructures

November 14, 2016

By: Nicolas Castellon We are now witnessing the beginning of the digital age. In the last couple of years, we have witnessed a hyper-digitization of society as the number of users online has risen to nearly 3.5 billion from 1.2 billion just ten years ago. Beyond people having a presence online, our devices are also … Continue reading “Cybersecurity in Practice (Part IV): Realities and Importance of effective Cyber Crisis-Management infrastructures”


Cybersecurity in Practice (Part III): PWNED Maritime Systems

November 11, 2016

By: Cheng Lai Ki Russian cybersecurity firm Kaspersky suggested in a May 2015 report that the current cybersecurity capabilities of the maritime industry make it ‘easy meat for cyber criminals’. Commercially, the maritime industry remains a critical component of national development, supporting state expansion, national economic growth, and international trade. The sector has steadily modernized alongside … Continue reading “Cybersecurity in Practice (Part III): PWNED Maritime Systems”


Cybersecurity in Practice (Part II): Cybersecurity of Unmanned Autonomous Vehicles

November 9, 2016

By: Arthur Laudrain The resilience of aerial and space platforms are not the first issue that oomes to mind when cybersecurity is generally discussed. Yet, they increasingly constitute the backbone of our societies, both in the civilian and military worlds.[1] We will address two categories of aerospace platforms: unmanned or otherwise increasingly autonomous vehicles,[2] and … Continue reading “Cybersecurity in Practice (Part II): Cybersecurity of Unmanned Autonomous Vehicles”


Cybersecurity In Practice (Part I): Software Power

November 2, 2016

By Marcelo A. O. Malagutti[1] ‘Might an army of software wizards use insidious electronic means to dislocate the support systems of modern societies, such as transport, banking, and public health?’ This question, posed by Sir Lawrence Freedman,[2] brings together the two elements of cyber-power: software (whose wizards would use, or command, insidious electronic means) or … Continue reading “Cybersecurity In Practice (Part I): Software Power”


Cybersecurity in Practice (Introduction): Outside the Mainstream

October 31, 2016

By: Cheng Lai Ki Over the last century, human experiences have progressively benefited from continuously advancing information technology (IT) systems. Within civilian domains, advanced IT services have facilitated the globalized sharing of commercial and financial information critical to the prosperity of private conglomerates. Within governmental domains, IT enabled technologies have supported the distribution and transference … Continue reading “Cybersecurity in Practice (Introduction): Outside the Mainstream”


Brainjacking: The uncomfortable truth of bio-technology

October 3, 2016

By: Cheng Lai Ki On July 25 2013, renowned hacker and information security expert Barnaby Jack was discovered dead at his San Francisco apartment. As a bearer of an implanted device himself, he was known for exposing security vulnerabilities of implanted medical devices, such as in insulin pumps  ‘that could be [programmed] to dispense a … Continue reading “Brainjacking: The uncomfortable truth of bio-technology”


Filter

By Date:




By Categories:




By Tags:



  • Share this

    Copyright © 2018 Strife Blog. All Rights Reserved.

    Designed by Kris Chan