The series “CSS Analyses in Security Policy” has been discussing current developments in foreign and security policy and their contexts in a concise format since 2006. The topics are often analyzed ...
Early detection saves lives but many humanitarian crises begin in places that are hard to reach or monitor. This project explores the use of nighttime lights (NTL) satellite data to enhance the ...
The risk and resilience reports provide a focused discussion of aspects of security risks and vulnerabilities, risk analysis and management, emergency preparedness, and crisis management – often with ...
Cyber, space, and artificial intelligence (AI) are pivotal research fields in contemporary security studies and on the modern battlefield. Cyber has taken on heightened significance as offensive cyber ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
The aim of this book is to bring together different expert and practitioner perspectives on the question of where the Organization for Security and Co-operation in Europe (OSCE) stands at the ...
Historically, discussions on cyber conflict have primarily centered on the involvement of state-sponsored or affiliated groups. Yet, the growing prominence of criminal actors – specifically, ...
In response to Russia’s military aggression against Ukraine, the Federal Council took a clear stance in late February 2022, condemning the breach of international law “in the strongest possible terms” ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...