The CSS Blog Network

Cyber War – And Nobody Will Come?

Image courtesy of Markus Spiske/Unsplash.

This article was originally published by the ETH Zukunftsblog on 15 June 2018.

Myriam Dunn Cavelty calls for a realistic assessment of what state institutions can do to combat cyberattacks.

When a cyberattack has been orchestrated by a state actor, people may be tempted to call it “war”. After all, it’s an attack waged on national infrastructures by a foreign power. But the term “cyber war” has been used so often for dramatic effect that I don’t just want to warn against hype. It’s also time to dampen expectations regarding the scope of governmental intervention.

» More

Conflicting Goals

Image courtesy of e-Magine Art/Flickr. (CC BY 2.0)

This article was originally published by ETH Zurich’s Zukunftsblog on 11 May 2018. It is also available in German.

Safeguarding both humanitarian traditions and the interests of the domestic pharmaceutical industry creates tension in the Swiss health-related foreign policy, says Ursula Jasper.

» More

Jihadi Networks in Switzerland: Regional Clusters and their Transnational Links

On 25 May 2018, the Center for Security Studies at ETH Zurich, together with the Austrian Institute for International Affairs (oiip) and the University of Lucerne, hosted a conference on “Jihadi Networks in Switzerland: Regional Clusters and Transnational Links”. Experts from academia and politics discussed the similarities, differences and connections of jihadist networks in Switzerland, Austria, Germany, France, Belgium, Italy and the Balkans.

» More

Survey «Studie Sicherheit 2018»

The Military Academy at ETH Zurich and the Center for Security Studies at ETH Zurich have published the annual survey «Sicherheit 2018». Since 1999, the study has evaluated long-term trends and tendencies in public opinion on foreign, security and defense policy issues in Switzerland.

» More

New Joint Tasks Require a Great Deal of Coordination

EmailFacebookTwitter

This graphic outlines the multi-level stakeholder coordination utilized by Switzerland to address security threats- both physical and cyber. For more on subsidiarity and the evolution of Swiss security policy, see Matthias Bieri and Andreas Wenger’s newest addition to the CSS’ Analyses in Security Policy here. For more CSS charts, maps and graphics, click here.

Page 1 of 9