RESEARCH / PUBLICATIONS

Share Wisely: Protecting Data in the Digital Age

From the moment an individual  wakes up in the morning to the time s/he sets the alarm for the following day – and even while sleeping, one’s life is now being captured in a continuous loop of digital surveillance via tech gadgets. Individual actions, interactions, preferences, and nearly every aspect of the  digital life  is being monitored and converted into data points. This surveillance extends to personal data from sources such as search history, social media platforms, web page views

17 views

Read More »

The Age of Robots: Military Modernisation or Oppenheimer Moment?

‘Now I am become Death, the destroyer of worlds,’ said J. Robert Oppenheimer after realising that his pivotal role in the making of atomic bomb could be ruination for humanity. In contemporary times, technologically driven Revolutions in Military Affairs (RMA) are increasingly displacing human roles in the military,

21 views

Read More »

Governing the Digital Frontier : Cyberspace as the New Global Common

Cyberspace is commonly defined as ‘the online world of computer networks, particularly the Internet.’ Its utilisation spans both personal and professional domains, encompassing activities from entertainment and communication to business and the arts, thereby accommodating the full spectrum of contemporary human endeavours

44 views

Read More »

Entering a New Era of Information Warfare

The traditional recourse to kinetic combat capabilities may no longer be adequate in a technological era increasingly dominated by non-kinetic modalities of warfare. Information warfare, an emerging mode of hostile engagement, includes actions taken to deny, exploit, corrupt, or destroy an enemy’s information and its

30 views

Read More »

Supercharging AI Models: The Formula One of Tech Dominance

The pursuit of technological advancements powered by Artificial Intelligence (AI) has become crucial for startups and organisations around the world. There is an increasing realisation of the need of being at the forefront of cross-cutting technologies in the competitive tech market. In this context,

26 views

Read More »

Exploring the Tech Factor in Cyber Espionage

In the traditional modes of warfare and intelligence, espionage was an exclusive domain of spies working covertly to gain access to an enemy’s sensitive information. However, greater leaps in technology over the years have raised the significance of cyber domain for intelligence, paving the way for cyber espionage.

59 views

Read More »

EVENTS

Stay Connected

Follow and Subscribe

Join Our Newsletter
And get notified everytime we publish new content.

© 2022 CASSTT ALL RIGHTS RESERVED

Developed By Team CASSTT

Contact CASS

CASS (Centre for Aerospace & Security Studies), Old Airport Road, Islamabad
+92 51 5405011
cass.thinkers@casstt.com
career@casstt.com

All views and opinions expressed or implied are those of the authors/speakers/internal and external scholars and should not be construed as carrying the official sanction of CASS.