Binding Hook
banner
bindinghook.bsky.social
Binding Hook
@bindinghook.bsky.social
Expert commentary on emerging tech and security. Send us your article ideas at pitch@bindinghook.com. Project from @VirtualRoutes.bsky.social
Despite progress in #cyberresilience, Japan’s constitutional limits and pacifist strategic culture still restrain fully offensive cyber operations. Read more from Abhishek Sharma: bindinghook.com/balancing-ex...
Balancing external pressures and internal restraints, Japan turns toward active defence
Japan’s efforts to establish comprehensive cyber policy frameworks have not yet fully translated into effective external threat responses.
bindinghook.com
November 11, 2025 at 8:34 AM
Research recently commissioned by UK's Department for Science, Innovation and Technology found that small- and medium-sized enterprises have a variety of reasons for not purchasing #cyberinsurance. What can be done to address this? bindinghook.com/why-dont-sma...
Why don’t small and medium UK enterprises buy cyber insurance?
Recent research shows that SMEs are unaware of, and confused by cyber insurance, in addition to facing financial and technological constraints.
bindinghook.com
November 6, 2025 at 9:17 AM
Reposted by Binding Hook
An interesting article talking about public attribution and the lack thereof in Indonesia and India on @bindinghook.bsky.social.

bindinghook.com/india-and-in...
India and Indonesia’s approach to publicly attributing cyberattacks? No naming, no shaming
India and Indonesia’s reticent approach to publicly attributing cyberattacks is the result of strategic culture, insufficient technical capacity, and the lack of clear returns
bindinghook.com
November 5, 2025 at 5:15 PM
Today Binding Hook is taking a deeper look at Indian and Indonesian approaches to cyber with a pair of articles by Arindrajit Basu and Gatra Priyandita on #cyberstrategies, #cyberdiplomacy, and #attribution.
November 4, 2025 at 1:47 PM
Reposted by Binding Hook
You like to read tech-related fiction? Until tomorrow, you can suggest a book for the 2025 @bindinghook.bsky.social Tech Fiction Reading List!

For inspiration, check out last year's list: bindinghook.com/its-the-most...

All English-language books published in 2021 or later qualify.
It’s the most wonderful time of the year… to catch up on your cyber fiction
Want to take a break from reading about AI, cybersecurity, and digital surveillance for work and instead do it for fun over the holidays? We’ve got you covered
bindinghook.com
November 3, 2025 at 12:09 PM
At Binding Hook Live in London on Monday, the main topics of conversation were China, capitalism, and conflict. Managing editors @jamesshires.bsky.social and @maxwsmeets.bsky.social share some of their observations: bindinghook.com/insights-fro...
Insights from Binding Hook Live
Themes of China, capitalism, and conflict wove throughout the day of Binding Hook’s first live event
bindinghook.com
October 30, 2025 at 12:26 PM
While @microsoft.com's ban on IDF Unit 8200 using some Azure services might not have been October’s biggest web service provider story, it could have important lasting impacts. Read more in this month’s Hooked! bindinghook.com/hooked-8-mic...
Hooked! #8: Microsoft’s stronger stance on Israeli surveillance abuses pressures other tech companies to follow suit
In a first, a big American tech company has cut off some IDF access to some services, raising questions about tech neutrality, digital sovereignty, and the wider impacts of the latest war.
bindinghook.com
October 24, 2025 at 6:49 AM
Reposted by Binding Hook
Important loophole in sanctions against ISPs that host malicious actors & disinfo campaigns - because RIPE only freezes resources of sanctioned ISPs, preventing them from transferring IP space or acquiring new space but doesn't revoke space/resources, rogue ISPs can simply rebrand to evade sanctions
October 21, 2025 at 11:53 AM
Reposted by Binding Hook
🚨 My latest research for @bindinghook is out!

I explore how sanctions against #Aeza and #StarkIndustries reveal the limits of current policy, and how #ThreatActivityEnablers exploit RIR policy and company registration frameworks to maintain infrastructure and support ongoing cyber operations.
October 21, 2025 at 8:53 AM
In his latest for Binding Hook, @lawrencesec.bsky.social looks at how internet service providers work within the system to evade sanctions and enable #cyberattacks and #disinformation campaigns: bindinghook.com/neutral-inte...
‘Neutral’ internet governance enables sanctions evasion
Internet service providers and hosting companies enable cybercrime and cyber operations. Why don’t sanctions stop them?
bindinghook.com
October 21, 2025 at 7:19 AM
#Surveillance has become central to #counterterrorism in democracies, but its spread into daily life raises a key question: how much monitoring can a free society absorb without losing trust? bindinghook.com/why-democrac...
Why democracies need emotional resilience against surveillance
Surveillance technologies have become central to democratic counterterrorism, reshaping how citizens relate to the state. By extending into everyday life, these tools not only promise protection but a...
bindinghook.com
October 16, 2025 at 11:19 AM
If the EU wants to strengthen its cyber defences, it must move beyond bureaucracy and forge a true culture of #civilmilitarycooperation, writes @virtualroutes.bsky.social fellow Isabella Neumann in Binding Hook: bindinghook.com/the-internet...
The internet age has brought the civilian and military worlds closer than ever – the EU needs to catch up
The EU must foster a culture of civil-military collaboration to effectively counter cyber threats.
bindinghook.com
October 14, 2025 at 6:32 AM
The EU’s push for hashtag#digitalsovereignty has raised questions about reliance on foreign companies for sensitive tech like policing software. Ausma Bernot looks to China for answers in her latest: bindinghook.com/chinas-polic...
China’s policing modernisation could offer lessons for Europe
Europe’s reliance on US tech giants for law enforcement tools collides with its sovereignty agenda, inviting a closer look at how China’s state-centric model balances innovation and control.
bindinghook.com
October 10, 2025 at 7:27 AM
Reposted by Binding Hook
My first article for @bindinghook.bsky.social examines how Ukraine’s Main Intelligence Directorate, HUR, uses rapid self-attribution of cyber operations, such as the 2025 Crimea server breach, to shape transparency and legitimacy in wartime intelligence communication. 1/
October 9, 2025 at 7:53 AM
Ukraine’s intelligence service announced in July that it had gained full access to Russian servers in Crimea, extracting over 100 terabytes of data. But what purpose does this openness serve? Read more from @psguu.bsky.social: bindinghook.com/self-attribu...
Self-attribution as strategy in the Russo-Ukrainian War
Ukraine’s military intelligence service has turned cyber self-attribution into a weapon, claiming responsibility for operations to disrupt Russia and using visibility as a tool of strategic communicat...
bindinghook.com
October 9, 2025 at 8:36 AM
🗓️ #BindingHookLive agenda is out now! Check it out & request your invite: bindinghooklive.com/agenda/
October 7, 2025 at 9:59 AM
Last month’s #JaguarLandRovercyberattack may cost £3.5B in revenue, but the bigger issue is the impact on 230,000 workers at JLR and in the supply chain facing layoffs, work reductions, and lost wages. @jasonnurse.bsky.social, Tom Johansmeyer & Gareth Mott: bindinghook.com/jaguar-land-...
Jaguar Land Rover cyberattack shows that governments must provide post-incident support
Cyber incidents impacting key national industries highlight the need for better approaches to protect the individuals who suffer most
bindinghook.com
October 7, 2025 at 8:03 AM
About 100,000 North Koreans work abroad in fields other than IT, earning the regime $500M a year. Most wages go back to Pyongyang, despite sanctions. Labour exports are central to its strategy. Read more from Kritika Roy: bindinghook.com/how-north-ko...
How North Korea revamped old tactics for the IT age
A largely unseen army of IT operatives quietly infiltrates global networks and secures foreign currency as part of a system Pyongyang has honed over decades through the strategic export of its labour ...
bindinghook.com
October 2, 2025 at 8:30 AM
In his latest for Binding Hook, Rogier Creemers explores #MadeinChina2025, which has encouraged innovation and led to major successes in fields from #solarpanels to #semiconductors. Read more: bindinghook.com/the-curious-...
The curious case of Chinese innovation
Political red lines limit chatbots, but not circuit boards. Support for industry matters more – when the state builds, the market often follows, sometimes at breakneck speed
bindinghook.com
October 1, 2025 at 9:49 AM
Since 2012, states have used #exportcontrols to monitor and restrict #cybersurveillance tools, aiming to reduce risks to security and human rights. Recent multilateral initiatives have kept the momentum going: bindinghook.com/using-export...
Using export controls to tackle the proliferation and misuse of spyware and cyber-surveillance tools
While the US and the Wassenaar Arrangement have historically led the way on spyware export controls, it may be the EU’s and the Pall Mall Process’s turn
bindinghook.com
September 30, 2025 at 7:39 AM
Reposted by Binding Hook
And for some OSS funding and security history, check out this article from CSI nonresident senior fellow John Speed Meyers and his coauthor, Jacqueline Kazil, in @bindinghook.bsky.social: bindinghook.com/articles-bin...
How to ‘harden’ open-source software - Binding Hook
Much of today's critical infrastructure and military systems rely on open-source software
bindinghook.com
September 26, 2025 at 8:10 PM
The January release of DeepSeek AI was a shock – How could China create such an effective technology at a fraction of what it cost to create similar LLMs in the US?
September 25, 2025 at 10:50 AM
🚨 #BindingHookLive tickets are going fast! 🚨 A little over a month to go until the very first Binding Hook Live! Don't miss the chance to be part of this one-of-a-kind event featuring a fantastic line-up of expert speakers. 🎟️ Request your invite: bindinghooklive.com
September 24, 2025 at 8:38 AM
In September’s #Hooked!, Binding Hook editor @katharinegk.bsky.social compared some of the cyber aspects of China’s military parade and the SCO summit to European approaches to the military and defense. bindinghook.com/hooked-7-i-l...
Hooked! #7: I love a parade (but what does it mean?) - Binding Hook
Between the military parade and the SCO summit, China started its September highlighting technological prowess and ambitions
bindinghook.com
September 18, 2025 at 9:08 AM
Reposted by Binding Hook
In the first installment of the #AIoverLunch interview series, Apolline Rolland sat down with NATO's CIO, Manfred Boudreaux-Dehmer, to discuss NATO’s use of AI for security and resilience.

👉 Read the full interview: virtual-routes.org/ai-over-lunc...
September 17, 2025 at 8:15 AM