Islamist armed actors frame their struggle in terms derived from the Qur’an and the Prophetic traditions. In recent years, such groups have expanded and consolidated power in different intrastate ...
Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by ...
Space systems are an integral part of modern war fighting. Militaries use them to conduct everything from reconnaissance to communications and data transfers, mission planning, and maintain ...
The establishment of the Conference on Security and Co-operation in Europe (CSCE) was a long-standing Soviet idea that gained traction in the 1970s. From 1973 to 1975, East and West engaged in a ...
Reports and information disclosures by threat intelligence providers, government agencies, think tanks, and online hacktivists have exposed China’s elaborate multifaceted “hack-for-hire” ecosystem ...
The IT Army of Ukraine was stood up in an ad-hoc manner without a clearly structured and proven plan. Born out of necessity, the IT Army subsequently evolved into a hybrid construct that is neither ...
When democracy and the rule of law appeared to take hold in Eastern Europe after the fall of the Iron Curtain, Belarus ‒ perceived as “Europe’s last dictatorship” ‒ seemed like a relic from a bygone ...
The Ukrainian military situational awareness platform Delta (Дельта) is at the heart of this CSS report. Initially developed in 2015 by Aerorozvidka (Аеророзвідка – then military unit A2724), the ...
Gorana Grgić and Daniel Möckli place this year’s edition of Strategic Trends in the context of profound changes in the international order, characterized by shifting power balances, increasing rivalry ...
In response to Russia’s military aggression against Ukraine, the Federal Council took a clear stance in late February 2022, condemning the breach of international law “in the strongest possible terms” ...
This chapter addresses the types of cyber operations that were conducted against the space sector as well as the types of space entities that have been targeted by threat actors in the context of the ...