1:"$Sreact.fragment" 2:I[62319,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js","/_next/static/chunks/0vcrl8nq585~c.js","/_next/static/chunks/0b6-gt.yzr91b.js"],"Navbar"] 3:I[5014,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js","/_next/static/chunks/0vcrl8nq585~c.js","/_next/static/chunks/0b6-gt.yzr91b.js"],"default"] 11:I[97367,["/_next/static/chunks/0hddkyy7scto8.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"OutletBoundary"] 12:"$Sreact.suspense" 0:{"rsc":["$","$1","c",{"children":[[["$","$L2",null,{}],["$","main",null,{"className":"min-h-screen bg-[#f5f5f5] px-4 pb-24 pt-36 text-[#0e1229] md:px-8","children":["$","section",null,{"className":"mx-auto max-w-[1180px]","children":[["$","div",null,{"className":"mb-12","children":[["$","p",null,{"className":"text-sm font-semibold uppercase tracking-[0.32em] text-[#6f7280]","children":"Case studies"}],["$","h1",null,{"className":"mt-4 max-w-4xl text-[52px] font-semibold leading-none tracking-normal md:text-[86px]","children":"Applied AI systems with measurable outcomes."}]]}],["$","div",null,{"className":"grid gap-5","children":[["$","a","support-pilot",{"href":"/case-studies/support-pilot","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#323d68"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Multichannel Integration",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Multichannel Integration"}],["$","span","Knowledge Base Engineering",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Knowledge Base Engineering"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Support Pilot - Multichannel AI Customer Assistant"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A customer support assistant connected across chat, email, and internal documentation to reduce response delays and keep service available around the clock."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":[["path",{"d":"M7 7h10v10","key":"1tivn9"}],["path",{"d":"M7 17 17 7","key":"1vkiza"}]],"className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}],["$","a","retail-flow",{"href":"/case-studies/retail-flow","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#0e1229"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","AI Forecasting",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"AI Forecasting"}],["$","span","Process Automation",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Process Automation"}],["$","span","Systems Integration",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Systems Integration"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Retail Flow - AI-Driven Demand Forecasting & Inventory Automation"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A forecasting and inventory automation workflow that helped store teams anticipate demand, reduce stockouts, and save operational time."}]]}],"$L4"]}]]}]]}],"$L5","$L6","$L7","$L8","$L9","$La","$Lb","$Lc","$Ld"]}]]}]}]],["$Le","$Lf"],"$L10"]}],"isPartial":false,"staleTime":300,"varyParams":null,"buildId":"5GYVpYaq5Rczv4hgtnuFm"} 4:["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}] 5:["$","a","leadsense",{"href":"/case-studies/leadsense","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#4f5b7f"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","AI Lead Scoring",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"AI Lead Scoring"}],["$","span","Workflow Automation",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Workflow Automation"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Leadsense - Automated Lead Qualification & Routing Engine"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A qualification and routing engine that scored incoming leads, matched them to the right team, and reduced manual review work."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 6:["$","a","cyber-threats-pakistan-power-grid",{"href":"/case-studies/cyber-threats-pakistan-power-grid","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#1f3650"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Critical Infrastructure",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Critical Infrastructure"}],["$","span","Threat Analysis",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Threat Analysis"}],["$","span","ICS/OT Security",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"ICS/OT Security"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Cyber Threats to Pakistan's National Power Grid"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Analysis of cyber risk exposure in Pakistan's power infrastructure and the strategic implications for grid resilience and public service continuity."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 7:["$","a","strategic-comprehension-cyber-insecurity-pakistan",{"href":"/case-studies/strategic-comprehension-cyber-insecurity-pakistan","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#253f58"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","National Cyber Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"National Cyber Strategy"}],["$","span","Policy Gap",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Policy Gap"}],["$","span","Cyber Governance",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyber Governance"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"The Absence of Strategic Comprehension Leading to Cyber Insecurity for Pakistan"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A policy-focused paper exploring structural and strategic gaps that weaken national cybersecurity posture and institutional cyber preparedness."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 8:["$","a","cyber-risks-to-nuclear-strategic-environment",{"href":"/case-studies/cyber-risks-to-nuclear-strategic-environment","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#2b4a65"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Strategic Security",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Strategic Security"}],["$","span","Nuclear Domain",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Nuclear Domain"}],["$","span","Cyber Risk",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyber Risk"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Dissecting Security Strategies for the Cyberspace Strategic Environment and Identifying Cyber Risks to the Nuclear Strategic Environment"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Examination of strategic security theory in cyberspace and its relevance to risk within nuclear decision environments."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] 9:["$","a","algorithmic-warfare-analysis",{"href":"/case-studies/algorithmic-warfare-analysis","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#324f6b"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Emerging Technology",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Emerging Technology"}],["$","span","Military Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Military Strategy"}],["$","span","AI and Security",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"AI and Security"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Algorithmic Warfare - Analysis"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"A strategic review of algorithmic warfare and the implications of rapid technological change for military power and national security."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] a:["$","a","cyber-attack-a-nation-unprepared",{"href":"/case-studies/cyber-attack-a-nation-unprepared","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#3a5875"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Incident Analysis",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Incident Analysis"}],["$","span","National Resilience",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"National Resilience"}],["$","span","Operational Impact",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Operational Impact"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"A Cyber Attack, A Nation Unprepared"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Case analysis of national-level disruption and the wider institutional and societal consequences of cyber-induced outages."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] b:["$","a","pakistan-private-sector-strategic-cyber-context",{"href":"/case-studies/pakistan-private-sector-strategic-cyber-context","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#43627f"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Private Sector",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Private Sector"}],["$","span","Defense Innovation",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Defense Innovation"}],["$","span","Cyber Ecosystem",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyber Ecosystem"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"Examining the Role of Pakistan's Private Sector in a Strategic Cyber Context"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Discussion of how private industry contributes to strategic cyber capability development and national security outcomes."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] c:["$","a","strategic-competitive-enabler-part-1",{"href":"/case-studies/strategic-competitive-enabler-part-1","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#4c6c89"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Cyberspace Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyberspace Strategy"}],["$","span","Competition",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Competition"}],["$","span","Military Thought",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Military Thought"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"A Strategic Competitive Enabler (Part-1)"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Part one of a strategic series framing cyberspace as a core competitive domain in contemporary statecraft and security planning."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] d:["$","a","strategic-competitive-enabler-part-2",{"href":"/case-studies/strategic-competitive-enabler-part-2","className":"group grid overflow-hidden rounded-[8px] border border-white/80 bg-[#f5f5f5] shadow-[inset_0_3px_1px_rgba(255,255,255,.8),0_18px_50px_rgba(14,18,41,.08)] transition-transform hover:-translate-y-1 md:grid-cols-[0.72fr_1.28fr]","children":[["$","div",null,{"className":"min-h-56","style":{"backgroundColor":"#557694"}}],["$","div",null,{"className":"p-6 md:p-8","children":[["$","div",null,{"className":"flex flex-wrap gap-2","children":[["$","span","Cyberspace Strategy",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Cyberspace Strategy"}],["$","span","Competition",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Competition"}],["$","span","Military Thought",{"className":"rounded-[8px] border border-[#0e1229]/15 px-3 py-2 text-xs font-semibold text-[#555968]","children":"Military Thought"}]]}],["$","div",null,{"className":"mt-10 flex items-end justify-between gap-6","children":[["$","div",null,{"children":[["$","h2",null,{"className":"max-w-3xl text-3xl font-semibold leading-tight md:text-5xl","children":"A Strategic Competitive Enabler (Part-2)"}],["$","p",null,{"className":"mt-4 max-w-2xl text-base leading-7 text-[#555968]","children":"Part two continuing the strategic perspective on cyberspace as a decisive factor in long-term national competition."}]]}],["$","span",null,{"className":"grid size-12 shrink-0 place-items-center rounded-full bg-[#0e1229] text-white transition-transform group-hover:translate-x-1 group-hover:-translate-y-1","children":["$","$L3",null,{"iconNode":"$0:rsc:props:children:0:1:props:children:props:children:1:props:children:0:props:children:1:props:children:1:props:children:1:props:children:props:iconNode","className":"lucide-arrow-up-right","size":22}]}]]}]]}]]}] e:["$","script","script-0",{"src":"/_next/static/chunks/0vcrl8nq585~c.js","async":true}] f:["$","script","script-1",{"src":"/_next/static/chunks/0b6-gt.yzr91b.js","async":true}] 10:["$","$L11",null,{"children":["$","$12",null,{"name":"Next.MetadataOutlet","children":"$@13"}]}] 13:null