security
The radicalisation challenge on gaming and gaming-adjacent platforms
August 12, 2024VOX-Pol Blog Post. ...
Migration Moments: Extremist Adoption of Text‑Based Instant Messaging Applications
September 18, 2023This report examines the patchwork of online text‑based instant messaging applications preferred by jihadist and far‑right extremist groups, with a focus on charting their technical affordances and their host companies’ stances on user privacy, security and regulation. To this end, the report analyses six online messaging services (BCM, Gab Chat, Hoop Messenger, Riot.im, Rocket.Chat and ...
Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors
September 18, 2023The online space is a haven for extremists of all kinds. Although efforts to remove violent and extremist content are increasing, there is a widely accepted need to also contest extremist messages with counter messages designed to undermine and disrupt extremist narratives. While the majority of academic focus has been on large and well‐funded efforts ...
The California Independent System Operator Security Vulnerabilities
September 18, 2023Our country is still in the early stages of the 21st century where technology is advancing on a daily basis allowing the threat of terrorism, both domestic and foreign, to pose a serious risk to both its citizens and its assets if not addressed soon. There are numerous potentially vulnerable sites throughout the country that ...
Identification And Ranking Of Critical Assets Within An Electrical Grid Under Threat Of Cyber Attack
September 18, 2023This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack. Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations ...