With Joseph Stiglitz’ and Maxim Ventura-Bolet's formal analysis of external page AI and digital platforms showing that truthful information behaves like clean air or public safety, the summit’s most ...
The Center for Security Studies’ annual flagship publication, Strategic Trends, identifies key developments shaping international politics and global order. Today’s geopolitical landscape is marked by ...
Andreas Wenger is professor of International and Swiss Security Policy at ETH Zurich. He studied History, Political Science and German Literature at the University of Zurich. He holds a Doctorate from ...
The Resilience & Crisis Management Team conducts research and provides policy consulting on a range of fields that center on risks and strategies to prevent, prepare, or respond to disasters and ...
The annual Bulletin on Swiss Security Policy (Bulletin zur schweizerischen Sicherheitspolitik) deals with current issues in Swiss foreign and security policy and presents selected CSS projects. It ...
Homepage chevron_right About us chevron_right … CSS News and Impact chevron_right 2026 chevron_right 03 chevron_right Focus Middle East chevron_right Details ...
As great-power rivalries intensify and revisionist actors engage in increasingly probing behaviors, military security and defense are firmly back on the political agenda of Western states. Within this ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Space systems are an integral part of modern war fighting. Militaries use them to conduct everything from reconnaissance to communications and data transfers, mission planning, and maintain ...
Islamist armed actors frame their struggle in terms derived from the Qur’an and the Prophetic traditions. In recent years, such groups have expanded and consolidated power in different intrastate ...