Landing Stations of Submarine Cables in the US and China
This graphic maps the various landing stations of submarine cables in both the US and China. To find out about cybersecurity in Sino-American relations, see Marie Baezner’s recent addition to the CSS’...
View ArticleLanding Stations of Submarine Cables in the US and China
This graphic maps the various landing stations of submarine cables in both the US and China. To find out about cybersecurity in Sino-American relations, see Marie Baezner’s CSS’ Analyses in Security...
View ArticleInternet and Political Freedom in 2020
This week’s featured graphic compares the results of two Freedom House reports on political freedom and Internet freedom, which suggest there’s a link between the two. For more on how Internet freedom...
View ArticleWould You Download a Weapon?
3-D printing, while unknown to most of the public, has been around for quite a while. Its industrial applications range from rapid prototyping and archaeological reconstructions to medical uses in...
View ArticleThe New Passive Activism?
“Dear incredible Avaazers, Just a few hours ago, our community reached 10 million people!” Last week’s announcement by Avaaz, an online pressure group, speaks volumes for the continued enthusiasm for...
View ArticleBitcoin, Ripples, and Reality
Back in July 2011 we blogged about Bitcoin, the world’s first digitalized, crypto-currency. At the time, many thought Bitcoin a flash in the pan, attracting attention simply because it was still...
View ArticleTwitter: A Scientific Treasure Trove
The internet and the web have changed the way we do business, learn, communicate, live and even think – a development apparent to many people. What is not so well known is that the internet has also...
View ArticleReview – Cybersecurity and Cyberwar
Cybersecurity and Cyberwar: What Everyone Needs to Know By: P. W. Singer and Allan Friedman New York: Oxford University Press, 2014 The year 2013 saw a number of headline news stories featuring a...
View ArticleThe Future of Values in Cyber Security Strategies
This article was originally published by the Elcano Royal Institute on 27 February 2020. Theme While national cyber security strategies have proliferated worldwide in the past decade, most have been...
View ArticleMediation Perspectives: Moving Training from Room to Zoom
Image courtesy of Team Tumult Mediation Perspectives is a periodic blog entry that’s provided by the CSS’ Mediation Support Team and occasional guest authors. In the context of COVID-19-related...
View Article
More Pages to Explore .....