This paper aims to learn from community-led mediation processes to help international and local actors promote peace in more effective and legitimate ways. It provides a frank overview of the ...
The series “CSS Analyses in Security Policy” has been discussing current developments in foreign and security policy and their contexts in a concise format since 2006. The topics are often analyzed ...
Rapid and effective humanitarian response depends on maintaining a clear, up-to-date understanding of how armed conflicts impact civilian populations, including the location and extent of ...
Cyber, space, and artificial intelligence (AI) are pivotal research fields in contemporary security studies and on the modern battlefield. Cyber has taken on heightened significance as offensive cyber ...
The risk and resilience reports provide a focused discussion of aspects of security risks and vulnerabilities, risk analysis and management, emergency preparedness, and crisis management – often with ...
Early detection saves lives but many humanitarian crises begin in places that are hard to reach or monitor. This project explores the use of nighttime lights (NTL) satellite data to enhance the ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Die Studie von Joane Holliger untersucht, wie internationale und lokale Akteure aus gemeinschaftsgeführten Mediationsprozessen lernen können, um Frieden wirksamer und mit grösserer Legitimität zu ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...