The military escalation between Israel, the United States, and Iran, along with the regional spread of the war, are shaping the security situation in the Middle East. However, Europe and other parts ...
Gorana Grgić and Daniel Möckli place this year’s edition of Strategic Trends in the context of profound changes in the international order, characterized by shifting power balances, increasing rivalry ...
The series “CSS Analyses in Security Policy” has been discussing current developments in foreign and security policy and their contexts in a concise format since 2006. The topics are often analyzed ...
Eugenio Benincasa is a Senior Researcher in the Cyberdefense Project with the Risk and Resilience Team at the Center for Security Studies (CSS) at ETH Zurich. Prior to joining CSS, he worked as a ...
Gilli, Andrea; Gilli, Mauro; Ricchi, Antonio; Russo, Aniello; Carniel, Sandro (2024), Climate Change and Military Power: Hunting for Submarines in the Warming Ocean ...
Auf dieser Seite finden Sie aktuelle Publikationen und Medienbeiträge des CSS zu den aktuellen Entwicklungen. Darüber hinaus bieten wir Hintergrundanalysen und weitere zentrale Forschungsarbeiten von ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
Few people know that Germany recently agreed to import 1.9 million Kenyan workers, or that it is currently mobilizing 500 000 Bundeswehr conscripts for military operations in Eastern Europe.
Space systems are an integral part of modern war fighting. Militaries use them to conduct everything from reconnaissance to communications and data transfers, mission planning, and maintain ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results