Cameras Vulnerable To Hacking During Skype Calls
Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype (2016).
Archive:
Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype (2016).
During the first nine months of 2016, open sources reported 487 aid staff killed, kidnapped, injured or assaulted. That is 60% more than the same period in 2015 according to information gathered by Insecurity Insight. NGOs with sufficient resources and senior…
On 29 June 2012, Steve Dennis, an employee of the Norwegian Refugee Council (NRC), was injured and kidnapped, along with three other colleagues, following an attack during a VIP visit to the IFO II refugee camp in Dadaab, Kenya. Four…
Emerging technology can be used for training humanitarian staff to respond effectively to the increasingly complex needs that arise following disasters, particularly when responding to security incidents and executing emergency plans. Creating realistic exercises during the training is crucial to…
Information communication technologies (ICTs) are increasingly becoming a defining component of twenty-first century humanitarian response operations during both natural disasters and armed conflict. ICTs have changed how information is communicated and received during crises. It may even be changing how…
Issue 64 of the Humanitarian Exchange Magazine, published by the Humanitarian Practice Network (Overseas Development Institute, ODI), focuses on the Ebola crisis in West Africa. In their article for the magazine, GISF Executive Coordinator Lisa Reilly and GISF Researcher Raquel…
Over the past decade we have seen the increased circulation of safety and security incident-related numbers and statistics. Incident statistics on safety and security are useful tools for organisations to provide them with information on the changing nature of threats,…
This paper by CSS (2011) gives a brief history of relations between Russia and the North Caucasus, including tactics by the Russian government to combat secessionist and more recently terrorist threats. This includes an examination of Medvedev’s modernisation policy, stating…
In light of the attacks against the United Nations in both Peshawar and Kabul in autumn 2009, the UN has decided to “harden” itself as a target, using a protection-based strategy to reduce the vulnerability of its staff. But to…
This paper by David J. Topel (2009) aims to deconstruct negotiation techniques and agreements in Colombia. It does not deal specifically with any particular hostage crisis event but gives a short introduction to the groups and history of conflict as…