Within this theme, developments within the Euro-Atlantic security environment and architecture that are relevant to Swiss foreign, security, and defense policy are in focus. A particular emphasis is ...
The Center's publications make a significant research contribution in the field of security and strategic studies, while at the same time fostering public debate on Swiss and international security ...
Publisher(s): Center for Security Studies (CSS), ETH Zürich; Research Centre for East European Studies (FSO), University of Bremen; Caucasus Research Resource Center (CRRC-Georgia); Center for Eastern ...
Publisher(s): Center for Security Studies (CSS), ETH Zürich; Research Centre for East European Studies (FSO), University of Bremen; Institute for European, Russian and Eurasian Studies (IERES), George ...
Initially, CEMA was envisioned solely as an organizational change to plan, coordinate, and deconflict non-kinetic US Army operations. In this setup, a military commander in the field would receive ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Space systems are an integral part of modern war fighting. Militaries use them to conduct everything from reconnaissance to communications and data transfers, mission planning, and maintain ...
Technological competition between the US and China is one of the defining features of contemporary geopolitics. Nowhere is this more evident than in the global semiconductor industry, a sector whose ...
The Ukrainian military situational awareness platform Delta (Дельта) is at the heart of this CSS report. Initially developed in 2015 by Aerorozvidka (Аеророзвідка – then military unit A2724), the ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...