You are here
The successful employment of Tomahawk Land Attack Cruise Missiles (TLAMs) in Kosovo and Afghanistan
Continue Reading
Become A Member
To access the full text of this article and many other benefits, become a RUSI member.
To access the full text of this article and many other benefits, become a RUSI member.
Haroro J Ingram
Malign actors are exploiting weak points in modern democratic governance.
Tags: Cyber, RUSI Journal, Domestic Security, Information, TechnologyJames Sullivan and Rebecca Lucas
A risk-management approach is the best way to secure the UK's future 5G network.
Tags: China, Cyber, Cyber Security, Future UK Cyber Security Strategy Project, United States, Occasional Papers, UK, Domestic Security, Information, Intelligence, Technology, EuropeAnton Moiseienko
This paper shows that e-commerce continues to be exploited by criminal actors. Regulators and governments can do more to prevent this.
Tags: Centre for Financial Crime and Security Studies, Financial Crime 2.0, AML/CTF, Occasional Papers, UK, Organised Crime, Technology, EuropeKayla Izenman
The US government’s move against two alleged cyber-criminals serves as a warning sign to the cryptocurrency community. The community may choose to respond by cloaking itself in an even heavier mantle of anonymity, or it may just understand that it stands to gain from policing its activities.
Tags: Centre for Financial Crime and Security Studies, Cyber, Financial Crime 2.0, Future UK Cyber Security Strategy Project, Illicit Trade, Sanctions, United States, US Defence Policy, AML/CTF, Law and Ethics, Organised Crime, TechnologyJohn Hemmings
The detention of a chief Huawei executive has spotlighted yet again a controversial Chinese technology giant, and may be a harbinger of stronger international pressure on the company.
Tags: Asia, China, Cyber, Future UK Cyber Security Strategy Project, Terrorism and Conflict, UK, Global Security Issues, Information, Intelligence, Law and Ethics, National Security, TechnologyJames Sullivan
Russia is emulating approaches used by cybercriminals as it blurs the line between state and non-state activities in cyberspace
Tags: Cyber, Future UK Cyber Security Strategy Project, Terrorism and Conflict, Russia, TechnologyAldwin Wight and James Spencer
Its history provides important insights on the current situation in Yemen.
Tags: Military Personnel, TechnologyDaniel Salisbury
Pyongyang has proved adept at evading sanctions.
Tags: Aerospace, North Korea, TechnologyRyan Henrici
Ryan Henrici reviews Biosecurity in Putin’s Russia, by Raymond A Zilinskas and Philippe Mauger
Tags: RUSI Journal, Russia, Technology
Time for a New UK–US Relationship
Adversarial Studies: Russian Strategic Thinking and the Kremlin’s Approach to Coercion
The Future of UK–EU Security Cooperation