The intensifying strategic competition between the US and China has made artificial intelligence (AI) one of the central pillars of national security policy. Major powers are investing heavily in ...
The growing complexity of border-transcending security issues confronts the international community with a plethora of challenges. Within the topic of “Global Security”, we examine how geopolitical ...
No. 313: Russian Foreign Propaganda in Occupied Ukraine, Moldova, and Belarus (2024) Russian Analytical Digest (RAD) Center for Security Studies (CSS), ETH Zürich; Research Centre for East European ...
Author(s): Farzaneh Badiei, Marie Baezner, Matteo E. Bonfanti, Aaron F. Brantly, Sean Cordey, Myriam Dunn Cavelty, Jacqueline Eggenschwiler, Johan Eriksson, Giampiero ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
The aim of this book is to bring together different expert and practitioner perspectives on the question of where the Organization for Security and Co-operation in Europe (OSCE) stands at the ...
This book tries to answer the following seven questions: ...
For both China and Russia, the Taliban’s takeover of Afghanistan presents opportunities as well as risks. In recognition of the Taliban’s continued strength, both countries cultivated ties with the ...
Historically, discussions on cyber conflict have primarily centered on the involvement of state-sponsored or affiliated groups. Yet, the growing prominence of criminal actors – specifically, ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results