Catch up on GZERO's coverage of the UN General Assembly (UNGA 78)
Scroll to the top

{{ subpage.title }}

Podcast: Cyber Mercenaries and the digital “wild west"

Transcript

Listen: The concept of mercenaries, hired soldiers and specialists working privately to fight a nation’s battles, is nearly as old as war itself.

In our fourth episode of “Patching the System,” we’re discussing the threat cyber mercenaries pose to individuals, governments, and the private sector. We’ll examine how spyware used to track criminal and terrorist activity around the world has been abused by bad actors in cyber space who are hacking and spying activists, journalists, and even government officials. And we’ll talk about what’s being done to stop it.

Read moreShow less
Spyware concerns prompt US Congress to move toward sanctions
Spyware Concerns Prompt US Congress to Move Toward Sanctions | Cyber In 60s | GZERO Media

Spyware concerns prompt US Congress to move toward sanctions

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

After years of inaction from lawmakers, there are now louder and louder calls in Congress for sanctions of spyware companies. Even those from Israel, which is remarkable because it has a strong surveillance industry, but also has been a strong ally for the United States.

Read moreShow less
US, NATO, & EU condemn China's Microsoft hack; Pegasus spyware leak
US, NATO, & EU Condemn China's Microsoft Hack; Pegasus Spyware Leak | Cyber In :60s | GZERO Media

US, NATO, & EU condemn China's Microsoft hack; Pegasus spyware leak

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

The US, NATO, and the EU have all condemned China for its hack of Microsoft Exchange servers. What happens next?

Now, the joint statement sends a strong signal, but there are operational steps that need to be clarified. Firstly, why was it possible to hack Microsoft servers at all and how to close the gaps to make software more resilient? Additionally, governments making statements condemning China or others are well-advised to attach consequences to such attributions. Sanctions of the economic, financial or immigration type, as well as restrictions on state-owned enterprises, should all be on the table. Certainly, clear criteria need to be there with regard to responsible behavior and the application of international law in cyberspace.

Read moreShow less

Subscribe to our free newsletter, GZERO Daily

Latest