I talked to Dr Saumya Awasthi on Terrorism and Technology; Emerging trends in #SouthAsia. Here is a link to watch the full conversation. #SouthAsia #Technology #Security
Mehraj Bhat’s Post
More Relevant Posts
-
Discussion Thread: Preventing and Protecting Against Terrorist Attacks discuss:
To view or add a comment, sign in
-
Discussion Thread: Preventing and Protecting Against Terrorist Attacks discuss:
Discussion Thread: Preventing and Protecting Against Terrorist Attacks discuss:
https://brighthomeworktutors.blog
To view or add a comment, sign in
-
Discussion Thread: Preventing and Protecting Against Terrorist Attacks discuss:
Discussion Thread: Preventing and Protecting Against Terrorist Attacks discuss:
https://eliteonlinewriters.blog
To view or add a comment, sign in
-
Recent works on Terrorism in Romaniuk, S. N., Roul, A., Fabe, P., & Besenyő, J. (Eds.). (2024). Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics. CRC Press.
To view or add a comment, sign in
-
🚨 The UK's terrorism threat level is 'Substantial'. What does this mean for your safety? Check out our latest blog to find out how you can stay informed and prepared. 🛡️ Read more: [What Does 'Substantial' Mean?](https://lnkd.in/ej7x-W3N) #SafetyFirst #StayInformed #SecurityMatters #InsightSecurity
To view or add a comment, sign in
-
#AIDemocracy #AIandHumanRights #AIEthics AIRegulation #AIAccountability #AIandPublicSphere #AIandElections #AIandPoliticalParticipation #AIandSocialJustice #AIandMedia #AIandGovernance #AIandPolicy #AIandCitizenship #AIandTransparency #AIandRepresentation #AIandDeliberation #AIandInclusion #AIandDiversity #AIandActivism #AIandDemocracyChallenges
Engineering, security, and education expert with a strong record in overseeing $1.2 billion projects. A passionate advocate for human rights and gender equality.
The issue of cybersecurity is a complex and multifaceted challenge that requires careful consideration. On one hand, it is essential to recognize that China’s cyber activities have raised legitimate concerns. The testimony by Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, sheds light on China’s strategic plan to infiltrate U.S. cyber infrastructure and induce societal panic through ransomware attacks. The Colonial Pipeline incident in 2021 serves as a stark example of the potential impact on everyday American life. However, it is crucial to maintain a balanced perspective. While vigilance is necessary, we must avoid painting an entire nation with a broad brush. Not all Chinese citizens or entities are involved in cyberattacks. Collaborative efforts between nations are essential to address these threats effectively. As we combat cyber threats, let’s focus on constructive dialogue, international cooperation, and robust defense mechanisms. Only through collective action can we safeguard our digital future and maintain stability in an interconnected world. #Disinformation #Propaganda #FakeNews #ElectionInterference #DomesticTerrorism #NationalSecurity #CriticalThinking #MediaLiteracy #PlatformGovernance #Transparency #FreeSpeech #Democracy #ElectionSecurity #Extremism #SocialMedia #Regulation #FactChecking #Misinformation #Radicalization #SocialCohesion #Cyberwarfare U.S. Department of State UK Research and Innovation Centre for Ethics, Safety and Security in Business European Commission NATO U.S. Nuclear Regulatory Commission #Censorship #FreedomOfSpeech #Counterterrorism #TechnologyEthics #ForeignInfluence #Polarization
To view or add a comment, sign in
-
𝗧𝗛𝗘 𝗦𝗜𝗟𝗘𝗡𝗧 𝗜𝗡𝗩𝗔𝗦𝗜𝗢𝗡: 𝗜𝗥𝗔𝗡’𝗦 𝗘𝗫𝗣𝗔𝗡𝗗𝗜𝗡𝗚 𝗚𝗥𝗜𝗣 𝗢𝗡 𝗚𝗟𝗢𝗕𝗔𝗟 𝗜𝗡𝗦𝗧𝗔𝗕𝗜𝗟𝗜𝗧𝗬. Iran’s expanding influence poses significant challenges globally, and Inner Sanctum Vector N360™ is proud to feature a comprehensive report by 𝗗𝗮𝘃𝗶𝗱 𝗠. 𝗟𝘂𝗻𝗮, CEO of 𝗜𝗖𝗔𝗜𝗘, on this pressing issue. In his detailed analysis, '𝗛𝗼𝘄 𝗜𝗿𝗮𝗻’𝘀 𝗧𝗵𝗿𝗲𝗮𝘁 𝗮𝗻𝗱 𝗜𝗹𝗹𝗶𝗰𝗶𝘁 𝗡𝗲𝘁𝘄𝗼𝗿𝗸𝘀 𝗙𝗶𝗻𝗮𝗻𝗰𝗲 𝗖𝗵𝗮𝗼𝘀 𝗮𝗻𝗱 𝗠𝗮𝗹𝗶𝗴𝗻 𝗜𝗻𝗳𝗹𝘂𝗲𝗻𝗰𝗲,' Luna explores how 𝗜𝗿𝗮𝗻'𝘀 𝗻𝗲𝘁𝘄𝗼𝗿𝗸𝘀, through proxies like 𝗛𝗲𝘇𝗯𝗼𝗹𝗹𝗮𝗵, are not only destabilizing the 𝗠𝗶𝗱𝗱𝗹𝗲 𝗘𝗮𝘀𝘁 but also extending their reach across 𝗟𝗮𝘁𝗶𝗻 𝗔𝗺𝗲𝗿𝗶𝗰𝗮. By leveraging 𝗰𝗿𝗶𝗺𝗶𝗻𝗮𝗹 𝗻𝗲𝘁𝘄𝗼𝗿𝗸𝘀, engaging in 𝗶𝗹𝗹𝗶𝗰𝗶𝘁 𝘁𝗿𝗮𝗱𝗲, and building 𝘀𝘁𝗿𝗮𝘁𝗲𝗴𝗶𝗰 𝗮𝗹𝗹𝗶𝗮𝗻𝗰𝗲𝘀, Iran is using 𝗮𝘀𝘆𝗺𝗺𝗲𝘁𝗿𝗶𝗰 𝘄𝗮𝗿𝗳𝗮𝗿𝗲 to undermine 𝗨.𝗦. 𝗶𝗻𝘁𝗲𝗿𝗲𝘀𝘁𝘀. 𝗠𝗼𝘀𝘁 𝗼𝗳 𝘂𝘀 𝗼𝗻𝗹𝘆 𝘀𝗲𝗲 𝗵𝗲𝗮𝗱𝗹𝗶𝗻𝗲𝘀 𝗮𝗻𝗱 𝗯𝗹𝘂𝗿𝗯𝘀 𝗮𝗯𝗼𝘂𝘁 𝘁𝗵𝗲𝘀𝗲 𝗶𝘀𝘀𝘂𝗲𝘀, 𝗯𝘂𝘁 𝗟𝘂𝗻𝗮’𝘀 𝗿𝗲𝗽𝗼𝗿𝘁 𝗽𝘂𝘁𝘀 𝗶𝘁 𝗮𝗹𝗹 𝘁𝗼𝗴𝗲𝘁𝗵𝗲𝗿, 𝗯𝗿𝗶𝗻𝗴𝗶𝗻𝗴 𝘃𝗮𝗹𝗶𝗱 𝗮𝗻𝗱 𝗶𝗺𝗽𝗼𝗿𝘁𝗮𝗻𝘁 𝗰𝗼𝗻𝗰𝗲𝗿𝗻𝘀 𝘁𝗼 𝘁𝗵𝗲 𝗳𝗼𝗿𝗲𝗳𝗿𝗼𝗻𝘁—𝗶𝘀𝘀𝘂𝗲𝘀 𝘄𝗲 𝘀𝗵𝗼𝘂𝗹𝗱 𝗮𝗹𝗹 𝗯𝗲 𝗮𝘄𝗮𝗿𝗲 𝗼𝗳. Next week, Luna will represent 𝗜𝗖𝗔𝗜𝗘 at the 𝗨𝗻𝗶𝘁𝗲𝗱 𝗡𝗮𝘁𝗶𝗼𝗻𝘀 𝗛𝗲𝗮𝗱𝗾𝘂𝗮𝗿𝘁𝗲𝗿𝘀 in 𝗡𝗲𝘄 𝗬𝗼𝗿𝗸 𝗖𝗶𝘁𝘆 for a 𝗣𝗲𝗮𝗰𝗲 𝗜𝗻𝗻𝗼𝘃𝗮𝘁𝗶𝗼𝗻 𝗥𝗼𝘂𝗻𝗱𝘁𝗮𝗯𝗹𝗲, organized by 𝗨𝗣𝗘𝗔𝗖𝗘 and co-sponsored by the 𝗣𝗲𝗿𝗺𝗮𝗻𝗲𝗻𝘁 𝗠𝗶𝘀𝘀𝗶𝗼𝗻 𝗼𝗳 𝗖𝗼𝘀𝘁𝗮 𝗥𝗶𝗰𝗮 𝘁𝗼 𝘁𝗵𝗲 𝗨𝗻𝗶𝘁𝗲𝗱 𝗡𝗮𝘁𝗶𝗼𝗻𝘀. He will unveil ICAIE's new 𝗣𝗔𝗧𝗛𝗦² initiative, aimed at advancing 𝗽𝗲𝗮𝗰𝗲 𝘁𝗵𝗿𝗼𝘂𝗴𝗵 𝗵𝗼𝗹𝗶𝘀𝘁𝗶𝗰 𝘀𝘂𝘀𝘁𝗮𝗶𝗻𝗮𝗯𝗹𝗲 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆. Stay tuned as we revisit his 𝗶𝗻-𝗱𝗲𝗽𝘁𝗵 𝗿𝗲𝗽𝗼𝗿𝘁 on our platform, bringing 𝘃𝗶𝘁𝗮𝗹 𝗶𝗻𝘀𝗶𝗴𝗵𝘁𝘀 to the forefront and highlighting how these 𝗶𝗹𝗹𝗶𝗰𝗶𝘁 𝗻𝗲𝘁𝘄𝗼𝗿𝗸𝘀 are financing 𝗰𝗵𝗮𝗼𝘀 𝘄𝗼𝗿𝗹𝗱𝘄𝗶𝗱𝗲. Linda Restrepo Editor in Chief Soundtrack: Fair Use Educational - "Have you ever seen the Rain?" #Security, #GlobalSecurity, #Iran, #Geopolitics, #NationalSecurity, #CounterTerrorism, #DavidLuna, #InnerSanctumVectorN360, #LatinAmerica, #HybridWarfare, #IllicitNetworks, #PeaceInnovation, #UN, #MiddleEast
To view or add a comment, sign in
-
...CONNECTING THE DOTS... I would like to thank the European Expert Network on Terrorism Issues (EENeT) team, as well as The Coordination Unit for Threat Analysis (CUTA/OCAD) of #Belgium, for the excellent organisation of the Annual EENeT conference in #Brussels...very interesting speeches and presentations! Special thanks to J* and her colleagues for the warm welcome on the roof over the city! It is always a great pleasure to meet long-term experts/friends, and discuss together the evolution of terrorist threats in #EU. I had the privilege of giving a presentation on "Mirages, Shadows, and Fogs: The Cyber-Social Weaponization of Generative Artificial Intelligence (#GenAI)". #AI #MUAI #security #cybersecurity #CyberSocialSecurity #NationalSecurity #PublicSecurity #PVE #CVE #terrorism #ViolenExtremism #radicalization #radicalisation #extremism #experts #democracy #crisis #propaganda #narratives #disinformation #ConspiracyTheories #FIMI #CW #CognitiveWarfare #posttruth #weaponisation #weaponization #OnlineHate #DeepFake #SyntheticMedia #proxy #RiskAssessment #ThreatAssessment #proxyverse
To view or add a comment, sign in
-
My new article with Andrew Silke and Toby Hanks "What drives the frequency of terrorist attacks? Thematic analysis of a rapid evidence assessment" is now available in Dynamics of Asymmetric Conflict. https://lnkd.in/euhfTzq2
What drives the frequency of terrorist attacks? Thematic analysis of a rapid evidence assessment
tandfonline.com
To view or add a comment, sign in
-
On March 20, the U.S. House of Representatives approved the Protecting Americans Data from Foreign Adversaries Act of 2024 by a unanimous vote of 414-0 to prevent companies from selling the American people’s data to rogue nations like China and North Korea. Days before, it passed legislation banning TikTok from the U.S. over concerns over foreign espionage and data mining. The Senate is currently considering both measures. These actions send a clear and concise message that Congress is taking America´s data privacy seriously. But like so many congressional initiatives, these piecemeal actions miss the mark and the point, leaving the nation vulnerable to further cyber-attacks. The U.S. Department of Justice recent indictment of seven Chinese nationals for hacking demonstrates the futility of this exercise. Experts believe the accused individuals remain in China – beyond the reach of the American justice system. The indictment makes for a good press release, but it does not change anything. The UMBRA suite of threat intelligence, data security, precrime surveillance, OSINT and predictive analytics is a legitimate game changer. UMBRA delivers #nationalsecurity. www.theumbra.com #nationaldefense #threatintelligence #computersecurity #precrime #terrorism #infrastructure #OSINT #predictiveanalytics #SIGINT #electronicwarfare #suntzu #ai #datasecurity
UMBRA - National Security for Nation States
theumbra.com
To view or add a comment, sign in