Cameras Vulnerable To Hacking During Skype Calls
Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype (2016).
From research papers to training packs, find the resources you need, all in one place. For GISF members, please log in to access member-only resources.
Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype (2016).
A presentation on supporting family members during an abduction, focusing particularly on lessons learned.
This is a example of an organisation’s global safety and security procedures.
This guidance document provides brief advice to hostages to aid them during their abduction.
This is an example of an organisation’s global health, safety and well-being policy.
This is an example of an organisation’s global security policy.
This research paper takes a closer look at the domestic and external implications of Zimbabwe’s economic reform and re-engagement agenda.
This paper by Jane Kinninmont (2016) focuses on the challenges of defining and understanding ‘extremism’ in the context of the Gulf Arab states, and the related issues this creates for UK policy.
This paper by Ghadi Sary (2016) assesses the development of the local administration of Rojava, its context within Syria and the wider Kurdish political scene. It aims to present a different perspective on the challenges, opportunities and threats faced by…
The purpose of this paper by Harriet Moynihan (2016) is to set out a clear statement of the law on aiding and assisting as it stands, with particular regard to its application in situations of armed conflict and counterterrorism. The…