This graphic outlines the multi-level stakeholder coordination utilized by Switzerland to address security threats- both physical and cyber. For more on subsidiarity and the evolution of Swiss security policy, see Matthias Bieri and Andreas Wenger’s newest addition to the CSS’ Analyses in Security Policy here. For more CSS charts, maps and graphics, click here.
This graphic highlights the connection between political sentiment and Islamophobia in Switzerland. To find out more about views on Islam in times of terrorism, see Darius Farman and Enzo Nussio’s recent addition to the CSS’ Analyses in Security Policy series here. For more CSS charts and graphics, click here.
Image courtesy of Richard Rutter/Flickr. (CC BY 2.0)
This article was originally published by War on the Rocks on 4 December 2017.
I have participated in National Security Council meetings in the past three administrations on issues ranging from efforts to counter ISIL and prevent homeland attacks to the response to Russia’s military interventions in Ukraine and Syria. Across the years, I’ve participated and watched as senior policymakers from across the political spectrum have struggled to formulate policy responses in the face of a familiar set of challenges, including incomplete information, perceived and real time constraints, resource limitations, competing priorities, bureaucratic impediments, and intense public and legislative scrutiny. » More
Image courtesy of TheDigitalArtist/pixabay
This article was originally published by War on the Rocks on 17 November 2017.
China recently announced the launch of its Jinan Project, a quantum information effort billed as “the world’s first unhackable computer network.” Building on its launch last year of the world’s first quantum-enabled satellite, China has made significant strides in quantum technology, a field with rapidly increasing relevance to national security. Its satellite has been hailed as a major step toward “unbreakable” encrypted communications.
This article was originally published by Institute for Security Studies on 20 October 2017
Counter-terrorism fails when it alienates the very communities it is meant to help.
Counter-terrorism strategies aim to disrupt activities of violent extremist groups and limit the spread of violent ideologies. Recent ISS research, supported by several other studies, suggests that some state responses to terrorism – far from alleviating security concerns – instead exacerbate the problem.
States often take a blanket approach to counter-terrorism, identifying a whole group or community as a ‘risk community’ based on a shared identity with violent extremist groups. In such cases, a clear conflict is created between upholding democratic principles of pluralism, the respect for the rule of law and human rights, and states’ views on how to achieve national security objectives.