• EXTREMISMStudy of Tommy Robinson's Social Media Reveals How Online Influencers Mobilize Supporters without Direct Calls to Action

    Analysis shows how influencers shape public behavior and legitimize violence through narratives, not instructions. Far-right extremist Tommy Robinson “used emotional appeals and conspiracy narratives to set up a worldview where violence felt like a natural, even necessary response,” says one researcher.

  • MARITIME CYBERSECURITYResearchers Find Training Gaps Impacting Maritime Cybersecurity Readiness

    Whether it’s a fire or a flood, a ship’s crew can only rely on itself and its training in emergencies at sea. The same is true for crews facing digital threats on oil tankers, cargo ships, and other commercial vessels.

  • CHINA WATCHWondering Where China’s Cyber Effort Will Go Next? Just Read the Five-Year Plan

    By Jack Evans

    Adversaries sometimes declare strategic priorities, yet cyber incidents that align with them are not assessed accordingly. We should in fact be guarding against intrusions before they happen by taking note of foreign and industrial policies that indicate where they’re likely to concentrate.

  • EXTREMISMAI and Extremist Propaganda: An Assessment

    By Saman Ayesha Kidwai

    AI has rapidly accelerated the transformation of the global violent extremist landscape by acting as a force multiplier in the manufacturing and dissemination of extremist propaganda. This presents a broader set of challenges for states and reinforces the need for technologically grounded counter-violent extremist frameworks.

  • CYBER-STRATEGYTrump’s Cyber Strategy Falls Short on China, Iran, and the Threats That Matter Most

    By Matthew Ferren

    Iranian cyber retaliation is escalating. Chinese operators remain embedded in U.S. infrastructure. Ransomware groups continue to disrupt hospitals, schools, and local governments. Trump’s recently released cyber strategy raises doubts the administration is prepared to address these threats.

  • DISINFORMATIONFrance Strikes to Address Misinformation Weakening Western Alliance

    By Eric Frecon and Fitriani

    The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.

  • ENCRYPTIONChip-Processing Method Could Assist Cryptography Schemes to Keep Data Secure

    By Adam Zewe

    By enabling two chips to authenticate each other using a shared fingerprint, this technique can improve privacy and energy efficiency.

  • CHINA WATCHIf We Can’t Name China’s Cyberattacks, We Lose Trust in Ourselves

    By Justin Bassi

    In the space of just a few days, two big US tech companies took different approaches to China’s cyberattacks. Palo Alto Networks generically referred to a global cyber espionage operation by unnamed actors while Google specifically named China as the globe’s leading cyber security threat. That inconsistency hurts everyone but China.

  • SOCIAL MEDIASocial Media’: The Changing Tech of Terror

    By Adil Rasheed

    In the wake of the white noise generated by mainstream social media channels and apps, a new trend of ‘anti-social media’ has emerged in recent years, which seeks to abandon mainstream platforms, reduce screen time, and seek private, intimate, or even ‘analogue’ communication to avoid algorithm-driven polarization, surveillance and loneliness. But some of these so-called anti-social media platforms have also become off-the-wall mediums for disseminating extremist propaganda.

  • SOCIAL MEDIAYour Social Media Feed Is Built to Agree with You. What If It Didn’t?

    By Luke Auburn

    The feedback loop is an essential component of the architecture of the social media echo chamber: a space where familiar ideas are amplified, dissenting voices fade, and beliefs can harden rather than evolve. A new study points to algorithm design as a potential way to reduce echo chambers—and polarization—online.

  • CHINA WATCHAllfare: China’s Whole-of-Nation Strategy

    By Michael Margolius

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

  • POWER GRIDOn Plum Island, DOE Trains Utilities, Protection Teams to Defend the Grid

    By Ethan Huffman

    Plum Island, just off New York’s northeastern coast, is a sparsely populated outpost with a century-long legacy, stretching back to the Spanish-American War, of playing an important role in helping protect the nation. More recently, scientists have used Plum Island to research lethal pathogens – threatening both humans and farm animals — for which there is no vaccines or treatment. Now, the island hosts exercises which train power companies, industry experts, and government officials to respond to disruptive cyberattacks.

  • POWER-GRID SABOTAGEHacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon

    By Saman Zonouz

    The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.

  • CYBERSECURITYThe Sky is Full of Secrets: Glaring Vulnerabilities Discovered in Satellite Communications

    With $800 of off-the-shelf equipment and months worth of patience, a team of U.S. computer scientists set out to find out how well geostationary satellite communications are encrypted. And what they found was shocking.

  • TRUTH DECAYWhy Are Older Adults More Likely to Share Misinformation Online?

    By Sy Boles

    Older adults tend to do well at identifying falsehoods in experiments, but they’re also likelier than younger adults to like and share misinformation online. Older adults have greater tendency to seek out, believe material that conforms to pre-existing views, expert says.