The CSS Blog Network

Cryptocurrencies: Potential for Terror Financing?

Image courtesy of MichaelWuensch/Pixabay

This article was originally published by the S. Rajaratnam School of International Studies (RSIS) on 30 April 2018.

Synopsis

Given their transaction anonymity and user-friendliness, cryptocurrencies appeal to extremist groups as they offer a viable alternative to the mainstream financial system and fiat money which are perceived as ‘kafir’ (infidel) currencies. The threat of cyber-driven terrorist financing is expected to grow.

» More

Landing Stations of Submarine Cables in the US and China

EmailFacebookTwitter

This graphic maps the various landing stations of submarine cables in both the US and China. To find out about cybersecurity in Sino-American relations, see Marie Baezner’s recent addition to the CSS’ Analyses in Security Policy series here. For more CSS charts and graphs on defense policy, click here.

Artificial Intelligent Agents: Prerequisites for Rights and Dignity

Image courtesy of ITU Pictures/Flickr. (CC BY 2.0)

This article was originally published in Volume 2, Issue 2 of Age of Robots magazine on 6 March 2018.

IBM’s Deep Blue was a chess-playing computer that achieved remarkable success in 1997 when it defeated the world champion Gary Kasparov in 19 moves. Kasparov had never lost a match to a human in under 20 moves. He managed to beat Deep Blue in the next games but was again defeated the following year after Deep Blue received an upgrade—and the unofficial nickname “Deeper Blue”. This was a landmark moment in artificial intelligence, but at no point was the genius chess machine deemed worthy of “rights”. Although theoretically able to visualize 200 million chess positions per second, Deep Blue had limited general abilities and could not work on other tasks beyond what it was programmed to do—such as playing chess, in this case.

» More

Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms

Image courtesy of Colin/Wikimedia Commons. (CC BY-SA 4.0)

This article was originally published by the Council on Foreign Relations (CFR) on 23 February 2018.

Without increased cooperation, the global digital economy is vulnerable to catastrophic cyberattack.

The Challenge

Information and communications technology (ICT) presents one of the most critical modern challenges to global security. Threat assessments predict that the next major international crisis could be due to a state or terrorist group weaponizing ICTs to devastate critical infrastructure or military logistics networks. The proliferation of asymmetric warfare (i.e., conflicts between nations or groups that have disparate military capabilities) has increased states’ use of ICTs, which necessitates the development of an international code of cyber conduct.

» More

Selected Chinese AI Companies, Projects and Cooperations

EmailFacebookTwitter

This graphic maps out a selection of Chinese AI companies and provides an overview of their current projects and collaborative efforts. To find out more about China’s ambitions to become a world leader in artificial intelligence, see Sophie-Charlotte Fischer’s recent addition to our CSS Analyses in Security Policy series here. For more graphics on economics, see the CSS’ collection of graphs and charts on the subject here.

Page 1 of 22