Digital Forensic Research Lab

Mon, Nov 13, 2023

This Job Post Will Get You Kidnapped: A Deadly Cycle of Crime, Cyberscams, and Civil War in Myanmar

In Myanmar, cybercrime has become an effective vehicle through which nonstate actors can fund and perpetuate conflict.

by Emily Ferguson and Emma Schroeder

Combating Cybercrime Security & Defense
A wounded woman uses a phone at Nasser Hospital after an airstrike in the city of Khan Yunis, amid the continuing conflict between Israel and the Palestinian Hamas movement.

Fri, Nov 3, 2023

How information travels during Gaza’s communications blackouts

People in Gaza turn to eSIMS and other solutions amid cellular and internet outages

by Layla Mashkoor

Critical Infrastructure Policy Gaza
FILE PHOTO: A police officer stands in front of a damaged building, amid Russia's attack on Ukraine, in the town of Avdiivka, Donetsk region, Ukraine October 17, 2023. REUTERS/Yevhen Titov/File Photo

Thu, Nov 2, 2023

Russian War Report: Russia just lost the most troops in a single battle so far in 2023

In Ukriane, fighting over the strategically important town of Avdiivka has led to heavy Russian losses. In Armenia, Russian propaganda is targeting the Armenian government.

by Digital Forensic Research Lab

Detail from ISIS article, "Practical Steps to Fight the Jews."

Thu, Nov 2, 2023

Accounts on Facebook, TikTok spread ISIS call for violence against Jewish targets

Accounts openly shared publication advocating offline violence, which continues to circulate on both platforms

by Ali Chenrose

Content Moderation Policies Facebook
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY

Wed, Nov 1, 2023

Hacker collectives take sides in the Mideast crisis

Telegram feeds of hacker groups document alleged attacks targeting Israel

by Ruslan Trad

Conflict in and through the Cyber Domain Cybersecurity
An image of browser icons for Edge, Firefox, Chrome, Opera, and Brave browsers

Mon, Oct 30, 2023

Homogeneity and Concentration in the Browser

Web browsers are the gateway to the internet. As browser developers replicate design features and concentrate around shared underlying technologies, they create cybersecurity risks with the potential to impact many internet users at once.

by Justin Sherman and Jessica Edelson

Cybersecurity Telecomms and the Internet

Fri, Oct 27, 2023

The 5×5—The Cybersecurity Implications of Artificial Intelligence

A group of experts with diverse perspectives discusses the intersection of cybersecurity and artificial intelligence.

by Maia Hamin and Simon Handler

Artificial Intelligence Series and Response
FILE PHOTO: European Internal Market and Industry Commissioner Thierry Breton speaks at a news conference in Brussels, Belgium February 23, 2023. REUTERS/Yves Herman/File Photo

Thu, Oct 26, 2023

As Israel and Hamas go to war, the Digital Services Act faces its first major test

The EU’s first actions in the context of the conflict will inevitably set standards for this landmark law’s long-term impact

by Rose Jackson, Jacqueline Malaret

Digital Policy Europe

Thu, Oct 19, 2023

Russian War Report: Ukraine inflicts heavy damage on Russian positions

Ukraine used US-provided ATACMS missiles to strike two Russian-occupied airfields in Zaporizhzhia oblast and Luhansk.

by Digital Forensic Research Lab

Hamas's al-Qassam Brigades train with paragliders as they prepare for an armed air assault, in this screengrab obtained from a social media video released on October 7, 2023. (Source: Izz el-Deen al-Qassam Brigades via Telegram/Reuters)

Thu, Oct 12, 2023

In Israel-Hamas conflict, social media become tools of propaganda and disinformation

An endless flood of false, misleading, and unverified information risks inflaming the conflict.

by Dina Sadek, Layla Mashkoor

Conflict Disinformation

Thu, Oct 12, 2023

Driving Software Recalls: Manufacturing Supply Chain Best Practices for Open Source Consumption

Product recalls require practices that can help software vendors move toward better component selection and tracking and better relationships with customers, all while making software vendors responsible for OSS security instead of maintainers.

by Jeff Wayman, Brian Fox

Cybersecurity Open Source Software
Kiyozumi Dera, Kyoto, Japan

Thu, Oct 5, 2023

Quiet part out loud: Rules of the internet and the 2023 Internet Governance Forum

A breakdown of the 2023 Internet Governance Forum (IGF) and the competing factions vying for the future rules of the internet.

by Leah (Léa) Fiddler

Digital Policy International Organizations