Retrospective Decryption: Harvest Now, Decrypt Later

With rapid advancements in quantum computing, cybersecurity experts and adversaries are likely to begin to explore and assess the weak points in current cryptographic systems. One of the most discussed challenges is popularly called “Harvest Now, Decrypt Later” or Retrospective Decryption.

At its core, retrospective decryption embodies a surveillance-oriented approach, involving the acquisition and long-term retention of currently unreadable encrypted data which can then be decrypted through a quantum computer.

Read More

Dual-Use Space Technologies - Part 1

This first report in our series on dual-use space technology focuses on Space Situational Awareness (SSA) technology and Space Communications technology. It begins by providing overviews of the international legal landscape regulating dual-use space technology and defining both Space Situational Awareness and Space Communications technologies.

This report focuses on the three major geopolitical actors in SSA and Space Communications technology: the US, China and Russia. In both technology categories, the US dominates and continues to foster partnerships and enhance its existing capabilities, however, China and Russia are also investing in SSA capabilities that can be used for military purposes and strengthen the importance of information warfare in their military doctrines, leading to a significant focus on space communications technology.

Read More

Drone Proliferation in Modern Warfare: A Closer Look at Iran and Ukraine

The case studies of Iran and Ukraine underscore the far-reaching impact of drone proliferation on contemporary conflicts. The rapid growth and globalisation of the Unmanned Aerial System (UAS) industry have created numerous access points for parties looking to acquire drones. While the sector's growth has democratised the technology, the increasing number of states using drones highlights a troubling trend of proliferation.

Read More

London Politica & Warwick Think Tank: The Social Face of Spyware Report

Following the recent heated battle for a TikTok ban in U.S Congress earlier this month, the words ‘TikTok’, ‘China’ and ‘Spyware’ have taken the internet by storm. In this new report, titled The Social Face of Spyware, we examine the ways in which the revolutionary social interface of TikTok may contain deeper interwoven systems of data collection, user tracking and surveillance tools that make it a substantial political threat. Through our series of articles, analysts from both London Politica and Warwick Think Tank delved into the ways in which TikTok has influenced propaganda and misinformation, whether it can be used as a means of surveillance, how it compares to long- standing privacy regulations and what implications this has for the wider international landscape.

Read More

Emerging Disruptive Technologies

Emerging disruptive technologies have the potential to significantly impact and transform various industries, shaping the way we live, work, and interact with the world around us. In this report, we explore a range of such technologies and their potential applications, as well as the ethical and moral considerations that they raise.

These technologies include cultured meats, which are an alternative to traditional animal agriculture; artificial intelligence, which has the potential to revolutionize various industries; quantum computing and quantum cryptography, which leverage the principles of quantum mechanics to perform calculations and transmit information; nuclear fusion reactors, which could provide a virtually limitless and clean source of energy; solar geoengineering, which involves manipulating the Earth's climate to mitigate the effects of global warming; asteroid mining, which could provide access to rare and valuable materials; space-based solar power, which could provide a stable and reliable source of renewable energy; green hydrogen, which is produced through the electrolysis of water using renewable energy sources; lethal autonomous weapon systems, which are a type of military technology that can select and engage targets without human intervention; directed energy weapons, which use focused energy to disable or destroy targets; anti-satellite weapons, which are designed to disrupt, disable, or destroy satellites in orbit; regenerative medicine, which involves the repair and replacement of damaged or diseased tissues and organs; and finally genetic engineering, which involves the manipulation of an organism's genome using biotechnology.

Throughout this report, we delve into the characteristics, current development status, key actors, the technology’s supply chains, as well as the technologies’ potential applications. We also examine the potential impacts of these technologies on their respective industries and on society as a whole.

Read More
Sarah Kuszynski London Politica Sarah Kuszynski London Politica

The Geopolitics of Undersea Cables - Underappreciated and Under Threat

Abstract:

This report assesses the range of threats facing undersea cables, which are central to the internet’s infrastructure, the world’s communication system and thus the global economy. The paper draws particular attention to the nation-state threats, and espionage tactics, namely, cyber-attacks and cable tapping used for surveillance purposes by intelligence agencies and adversarial states to collect sensitive data as well as monitor crime and terror activities. In terms of physical damage to cables Russia presents a persistent threat due to the advanced capabilities of Russian spy vessels. This has led many experts to characterise the threat as existential. Similarly, Chinese telecommunications companies are increasing their global influence, which is of growing importance as US-China technology tensions intensify; illustrating that undersea cable sabotage would have dangerous geopolitical consequences if China were ever to invade Taiwan. Lastly, the report foregrounds how the lack of clarity in regulation represents a critical global infrastructure vulnerability.

Sarah Kuszynski

Read More