Categories
Terrorism CSS Blog

The Changing Risk Landscape

EmailFacebookTwitter

This graphic plots the change in the perceived likelihood and impact of various societal, technological, geopolitical and environmental risks between 2012 and 2018. For more on resilience and the evolution of deterrence, see Tim Prior’s chapter for Strategic Trends 2018 here. For more CSS charts, maps and graphics on risk and resilience, click here.

Categories
Cyber

Cybersecurity: The China Problem

Image courtesy of Taskin Ashiq/Unsplash

This article was originally published by Pacific Forum CSIS on 27 June 2018.

As China rolls out its 2016 cyber security law, its drive to develop national cyberspace sovereignty continues. China’s law outlines a rules-based view of privacy and emphasizes critical infrastructure and domestic collection of citizen data. With the second largest economy in the world and the largest number of internet users, China has a tough task attempting to establish a national framework for cyber security while fostering an innovative technology sector. China is now a rule maker in cyberspace and home to a number of very large and highly capable technology companies. However, China’s lofty goals in cyberspace and innovation are undercut by its behavior in other countries.

War in the Fourth Industrial Revolution

Image courtesy of US Navy/John Williams.

This article was originally published by War on the Rocks on 19 June 2018.

Retiring Chinese general He Lei recently made news by suggesting that China’s greatest military weakness compared to the United States was that it has never fought a real war. He noted none of Beijing’s increasingly advanced weapons, jets, and ships have been tested in combat. Moreover, the large People’s Liberation Army continues to rely upon conscripts rather than the long-serving professionals in the U.S. military. He argued the Chinese military “will be ridden with doubts until they get into a real fight.”

The Leap into Quantum Technology: A Primer for National Security Professionals

Image courtesy of TheDigitalArtist/pixabay

This article was originally published by War on the Rocks on 17 November 2017.

China recently announced the launch of its Jinan Project, a quantum information effort billed as “the world’s first unhackable computer network.” Building on its launch last year of the world’s first quantum-enabled satellite, China has made significant strides in quantum technology, a field with rapidly increasing relevance to national security. Its satellite has been hailed as a major step toward “unbreakable” encrypted communications.

Modeling Peace and Security: The Future of Computer-Supported Policy

Courtesy of Anders Sandberg/Flickr. (CC BY-NC 2.0)

This article was originally published by IPI Global Observatory on 13 June 2017.

Central Europe received a major increase in refugees fleeing Syria in 2015. With the region’s politicians initially overwhelmed and claiming the situation was unforeseeable, civil society had to step into the breach on humanitarian assistance. Eventually, politicians did propose a broad range of solutions to cope with the phenomenon, typically informed by their political persuasions. Naturally, these were widely debated, and none were able to be categorically proven as effective.

But what if there was a way to evaluate the proposed solutions? What if the means existed to analyze the challenges faced and provide support for decision-makers? Existing computer simulation models are, in fact, quite capable of doing just that in a range of fields. Though their capabilities are not taken full advantage of at present, the situation appears to be changing.

One field—and a big one at that—starting to adopt large-scale computer modeling is healthcare. With many national health insurance programs facing the challenges of demographic shifts (an aging population and fewer contributors to the pool of available funds), the quest for cost efficiency has opened the door to healthcare technology assessment (HTA).