<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Science and technology → UNIDIR</title>
	<atom:link href="https://unidir.org/focus-area/science-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://unidir.org</link>
	<description>Building a more secure world.</description>
	<lastBuildDate>Wed, 13 May 2026 15:00:37 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://unidir.org/wp-content/uploads/2023/10/android-chrome-72x72-1.png</url>
	<title>Science and technology → UNIDIR</title>
	<link>https://unidir.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Additive Manufacturing of Conventional Military Equipment: Implications for Arms Control and Security</title>
		<link>https://unidir.org/publication/additive-manufacturing-of-conventional-military-equipment-implications-for-arms-control-and-security/</link>
		
		<dc:creator><![CDATA[Maria Belen Lopez Conte]]></dc:creator>
		<pubDate>Mon, 11 May 2026 16:01:17 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=27301</guid>

					<description><![CDATA[<p>Additive manufacturing, also known as 3D printing, is increasingly being adopted in defence and military contexts, with significant implications for conventional arms production, arms control and international security. While not a new technology, recent advances in machine capabilities and declining costs have accelerated its integration into military supply chains, operational environments and industrial production. As<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/additive-manufacturing-of-conventional-military-equipment-implications-for-arms-control-and-security/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/additive-manufacturing-of-conventional-military-equipment-implications-for-arms-control-and-security/">Additive Manufacturing of Conventional Military Equipment: Implications for Arms Control and Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Additive manufacturing, also known as 3D printing, is increasingly being adopted in defence and military contexts, with significant implications for conventional arms production, arms control and international security.</p>



<p>While not a new technology, recent advances in machine capabilities and declining costs have accelerated its integration into military supply chains, operational environments and industrial production. As a dual-use, cyber-physical manufacturing technology, additive manufacturing offers strategic advantages, but it also raises proliferation and diversion risks that warrant closer scrutiny by policymakers and the arms control community.</p>



<p>This primer provides a short overview of what additive manufacturing is and how it works, explains what types of military equipment it can help produce, who is involved, why it is sought and what its limitations are. It also examines the risks emerging from the use of this technology in manufacturing and provides an overview of existing arms control and transfer control measures, as well as their gaps and limitations. The primer concludes by outlining several considerations for policymakers on how to overcome existing challenges.</p>



&nbsp;



<p>Citation: <em>Grand-Clément, Sarah and Sunniva Selmer Reinertsen, Additive Manufacturing of Conventional Military Equipment: Implications for Arms Control and Security. A Primer (Geneva: UNIDIR, 2026). <a href="https://doi.org/10.37559/CWP/26/ERC/06">https://doi.org/10.37559/CWP/26/ERC/06</a>.</em></p>



<p></p><p>The post <a href="https://unidir.org/publication/additive-manufacturing-of-conventional-military-equipment-implications-for-arms-control-and-security/">Additive Manufacturing of Conventional Military Equipment: Implications for Arms Control and Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Technological Developments in Small Arms: Implications for International Arms Control Instruments</title>
		<link>https://unidir.org/publication/technological-developments-small-arms-implications-international-arms-control-instruments/</link>
		
		<dc:creator><![CDATA[Asa Cusack]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 07:57:46 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=27183</guid>

					<description><![CDATA[<p>Technologies used to design, manufacture and control small arms and light weapons (SALW) have evolved significantly since the adoption of the 2001 United Nations Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All its Aspects (PoA) and the 2005 International Instrument to Enable States to<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/technological-developments-small-arms-implications-international-arms-control-instruments/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/technological-developments-small-arms-implications-international-arms-control-instruments/">Technological Developments in Small Arms: Implications for International Arms Control Instruments</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Technologies used to design, manufacture and control small arms and light weapons (SALW) have evolved significantly since the adoption of the 2001 United Nations Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All its Aspects (PoA) and the 2005 International Instrument to Enable States to Identify and Trace, in a Timely and Reliable Manner, Illicit Small Arms and Light Weapons (ITI).</p>



<p>In response, the Fourth Review Conference of the PoA in 2024 established an Open-Ended Technical Expert Group (OETEG). This report aims to introduce national representatives to the four primary issues under the OETEG’s mandate:</p>



<ol class="wp-block-list">
<li>Polymer frames and receivers</li>



<li>Modular SALW</li>



<li>3D printing of SALW</li>



<li>Technology to counter diversion of SALW</li>
</ol>



<p>The report summarizes the current state of knowledge, building on a series of webinars convened between October 2025 and February 2026, background research, and interviews with experts from international organizations, governments, academia, civil society and industry.</p>



<p>It explains each of the four issues, detailing the challenges they pose, outlining approaches to addressing them and highlighting key considerations for the OETEG.</p>



&nbsp;



<p><em>Citation: Ruben Nicolin, Paula Soumaya Domit, Sunniva Selmer Reinertsen and Matilde Vecchioni. Technological Developments in Small Arms: Implications for International Arms Control Instruments. Geneva: UNIDIR, 2026. <a href="https://doi.org/10.37559/CWP/26/ASC/05">https://doi.org/10.37559/CWP/26/ASC/05</a></em></p>



<p></p><p>The post <a href="https://unidir.org/publication/technological-developments-small-arms-implications-international-arms-control-instruments/">Technological Developments in Small Arms: Implications for International Arms Control Instruments</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Innovations Dialogue 2025: Neurotechnologies and their Implications for International Peace and Security</title>
		<link>https://unidir.org/publication/innovations-dialogue-2025-neurotechnologies-and-their-implications-for-international-peace-and-security/</link>
		
		<dc:creator><![CDATA[Maria Belen Lopez Conte]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 11:00:37 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=26755</guid>

					<description><![CDATA[<p>This conference report provides a summary of the key themes, issues and takeaways from UNIDIR&#8217;s Innovations Dialogue 2025 on neurotechnologies and their implications for international peace and security. Neurotechnologies, while still emerging, are advancing rapidly and gaining prominence. These technologies have a clear dual-use nature: in addition to civilian applications, military research laboratories are actively<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/innovations-dialogue-2025-neurotechnologies-and-their-implications-for-international-peace-and-security/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/innovations-dialogue-2025-neurotechnologies-and-their-implications-for-international-peace-and-security/">Innovations Dialogue 2025: Neurotechnologies and their Implications for International Peace and Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This conference report provides a summary of the key themes, issues and takeaways from <a href="https://unidir.org/event/2025-innovations-dialogue-neurotechnologies-and-their-implications-for-international-peace-and-security/">UNIDIR&#8217;s Innovations Dialogue 2025</a> on neurotechnologies and their implications for international peace and security.</p>



<p>Neurotechnologies, while still emerging, are advancing rapidly and gaining prominence. These technologies have a clear dual-use nature: in addition to civilian applications, military research laboratories are actively exploring ways to enhance soldiers’ cognitive, sensory and physical capabilities, including through direct brain-machine interfaces with uncrewed systems. The potential military use of neurotechnologies raises significant security concerns and could affect the conduct of warfare, presenting complex disarmament, ethical and legal challenges.</p>



<p>The Innovations Dialogue 2025, building on existing international efforts, sought to provide a neutral space to address this topic through the lens of arms control, disarmament and international security. It did so by examining the current state of neurotechnologies, considering associated risks and opportunities for international peace and security, and exploring pathways towards responsible governance.</p><p>The post <a href="https://unidir.org/publication/innovations-dialogue-2025-neurotechnologies-and-their-implications-for-international-peace-and-security/">Innovations Dialogue 2025: Neurotechnologies and their Implications for International Peace and Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Neurotechnology in the Military Domain: A Primer</title>
		<link>https://unidir.org/publication/neurotechnology-in-the-military-domain-a-primer/</link>
		
		<dc:creator><![CDATA[Meyha Sharma]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 13:45:57 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=24288</guid>

					<description><![CDATA[<p>Neurotechnology is an emerging but rapidly advancing field that offers significant promise across various domains, while also posing considerable risks. These risks have prompted an emerging discussion over the need for governance to ensure that the technology is developed in ways that are ethical, safe and secure. In particular, the dual-use nature of neurotechnologies raises<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/neurotechnology-in-the-military-domain-a-primer/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/neurotechnology-in-the-military-domain-a-primer/">Neurotechnology in the Military Domain: A Primer</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Neurotechnology is an emerging but rapidly advancing field that offers significant promise across various domains, while also posing considerable risks. These risks have prompted an emerging discussion over the need for governance to ensure that the technology is developed in ways that are ethical, safe and secure. In particular, the dual-use nature of neurotechnologies raises the potential for them to become disruptive military technologies. Militaries worldwide have explored the integration of a wide suite of neurotechnologies into the military domain throughout the 21st century, with some initiatives dating back to the late 20th century. Recent advances in various scientific and technological fields have rendered the integration of neurotechnology into military contexts increasingly likely to become a reality in the near future. In contrast to civilian neurotechnology, this trend has received comparatively less attention, while carrying with it significant potential risks for international peace and security. A preliminary mapping of the potential risks, challenges and opportunities specifically associated with the militarization of neurotechnology is therefore both timely and necessary.</p>



&nbsp;



<p>Citation: <em>Federico Mantellassi and Edward Madziwa, Neurotechnology in the Military Domain: A Primer (Geneva: UNIDIR, 2025)</em></p>



<p></p><p>The post <a href="https://unidir.org/publication/neurotechnology-in-the-military-domain-a-primer/">Neurotechnology in the Military Domain: A Primer</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Changing Tides in Maritime Warfare: Closing the Reporting Gap on Uncrewed Maritime Systems in the United Nations Register of Conventional Arms</title>
		<link>https://unidir.org/publication/changing-tides-in-maritime-warfare-closing-the-reporting-gap-on-uncrewed-maritime-systems-in-the-united-nations-register-of-conventional-arms/</link>
		
		<dc:creator><![CDATA[Mireia Mas Vivancos]]></dc:creator>
		<pubDate>Tue, 18 Feb 2025 14:58:18 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=20851</guid>

					<description><![CDATA[<p>Surface and underwater uncrewed maritime systems (UMS) are gaining importance in the maritime domain due to their force multiplier effect and their ability to enhance naval force projection. UMS pose or could pose challenges to international security due to their proliferation, contributing to arms races, illicit use by non-state actors and risks for civilian infrastructure.<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/changing-tides-in-maritime-warfare-closing-the-reporting-gap-on-uncrewed-maritime-systems-in-the-united-nations-register-of-conventional-arms/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/changing-tides-in-maritime-warfare-closing-the-reporting-gap-on-uncrewed-maritime-systems-in-the-united-nations-register-of-conventional-arms/">Changing Tides in Maritime Warfare: Closing the Reporting Gap on Uncrewed Maritime Systems in the United Nations Register of Conventional Arms</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Surface and underwater uncrewed maritime systems (UMS) are gaining importance in the maritime domain due to their force multiplier effect and their ability to enhance naval force projection. UMS pose or could pose challenges to international security due to their proliferation, contributing to arms races, illicit use by non-state actors and risks for civilian infrastructure.</p>



<p>This UNIDIR research examines trends in the development and use of UMS between 2019 and 2024, identifying 60 UMS programmes across 17 countries that have utilized a wide range of systems. More than 40 attacks took place during the same period, with a notable rise since 2023.</p>



<p>The United Nations Register of Conventional Arms could play an important role in enhancing mutual trust and confidence between States if it were to contain information on international transfers and acquisitions of armed UMS. Due to their technical characteristics, however, most UMS fall outside the Register’s reporting categories, therefore remaining unreported.</p>



<p>This research puts forward four options for consideration by the Group of Governmental Experts in 2024-2025 on the continuing operation and future development of the Register. These options could also be considered by States participating in other multilateral instruments that contribute to increasing transparency in international transfers and acquisitions.</p>



&nbsp;



<p>Citation: <em>Anabel García García, Sarah Grand-Clément, Paul Holtom, &#8220;Changing Tides in Maritime Warfare: Closing the Reporting Gap on Uncrewed Maritime Systems in the United Nations Register of Conventional Arms&#8221;, UNIDIR, Geneva, 2025, <a href="https://doi.org/10.37559/CAAP/25/ERC/03">https://doi.org/10.37559/CAAP/25/ERC/03</a></em>.</p><p>The post <a href="https://unidir.org/publication/changing-tides-in-maritime-warfare-closing-the-reporting-gap-on-uncrewed-maritime-systems-in-the-united-nations-register-of-conventional-arms/">Changing Tides in Maritime Warfare: Closing the Reporting Gap on Uncrewed Maritime Systems in the United Nations Register of Conventional Arms</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enabling Technologies and International Security: A Compendium (2024 edition)</title>
		<link>https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2024-edition/</link>
		
		<dc:creator><![CDATA[Jack Conneely]]></dc:creator>
		<pubDate>Mon, 23 Dec 2024 08:07:33 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=20453</guid>

					<description><![CDATA[<p>Enabling technologies—such as advanced materials, microchips and sensors, computing power and connectivity infrastructure—are driving innovation across other areas, not least in information and communications technologies (ICTs), artificial intelligence and autonomous systems. These enabling technologies are reshaping the digital landscape and hold significant potential for applications in both civilian and military domains. While progress has been<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2024-edition/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2024-edition/">Enabling Technologies and International Security: A Compendium (2024 edition)</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Enabling technologies—such as advanced materials, microchips and sensors, computing power and connectivity infrastructure—are driving innovation across other areas, not least in information and communications technologies (ICTs), artificial intelligence and autonomous systems. These enabling technologies are reshaping the digital landscape and hold significant potential for applications in both civilian and military domains. While progress has been made in addressing the security implications of ICTs and lethal autonomous weapons systems within various intergovernmental processes, comparatively less attention has been devoted to the underlying technologies that are enabling or driving their further development. This underscores the urgent need for a more thorough and comprehensive examination of enabling technologies as well as their potential impacts on international security.&nbsp;</p>



<p>To address this knowledge gap, UNIDIR’s annual Compendium on Enabling Technologies and International Security focuses on identifying and analysing key advancements in enabling technologies, with a particular emphasis on those still in their early stages of development or application. This 2024 edition builds upon the <a href="https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2023-edition/" target="_blank" rel="noreferrer noopener">2023 compendium</a>, providing an update on the latest developments in enabling technologies as they relate to international peace and security. While this edition addresses technological developments and applications specific to 2024, the 2023 compendium remains an essential resource for more detailed foundational analyses.&nbsp;</p>



<p>The compendium categorises enabling technologies into four areas:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Category I:</strong> advanced materials, including semiconductors, superconductors and nanotechnology;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Category II:</strong> parts and components, such as microchips and sensors;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Category III:</strong> processing and computing, covering cloud, edge and quantum computing; and&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Category IV:</strong> connectivity infrastructure, spanning fifth- and sixth-generation telecommunications (5G and 6G), the Internet of Things and satellite communications.&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Funded by</h4>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" width="829" height="1024" src="https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-829x1024.png" alt="" class="wp-image-20128" style="width:162px;height:auto" srcset="https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-829x1024.png 829w, https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-243x300.png 243w, https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-768x948.png 768w, https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07.png 946w" sizes="(max-width: 829px) 100vw, 829px" /></figure>



&nbsp;



<p>Citation: He, Wenting. <em>“Enabling Technologies and International Security: A Compendium (2024 edition)”, Geneva, Switzerland: UNIDIR, 2024. </em></p><p>The post <a href="https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2024-edition/">Enabling Technologies and International Security: A Compendium (2024 edition)</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2024 Innovations Dialogue: Quantum Technologies and Their Implications for International Peace and Security</title>
		<link>https://unidir.org/publication/2024-innovations-dialogue-quantum-technologies-and-their-implications-for-international-peace-and-security/</link>
		
		<dc:creator><![CDATA[Jack Conneely]]></dc:creator>
		<pubDate>Fri, 20 Dec 2024 13:46:10 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=20450</guid>

					<description><![CDATA[<p>The 2024 Innovations Dialogue, co-organized by UNIDIR&#8217;s Security and Technology Programme and the Geneva Science and Diplomacy Anticipator Foundation (GESDA), explored the transformative potential and risks of quantum technologies in shaping international peace and security. Held on 22 November 2024 in Geneva, this flagship event convened policymakers, scientists, industry leaders and civil society to address<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/2024-innovations-dialogue-quantum-technologies-and-their-implications-for-international-peace-and-security/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/2024-innovations-dialogue-quantum-technologies-and-their-implications-for-international-peace-and-security/">2024 Innovations Dialogue: Quantum Technologies and Their Implications for International Peace and Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The <a href="https://unidir.org/event/2024-innovation-dialogue-quantum-technologies-and-their-implications-for-international-peace-and-security/" target="_blank" rel="noopener" title="2024 Innovations Dialogue">2024 Innovations Dialogue</a>, co-organized by UNIDIR&#8217;s Security and Technology Programme and the Geneva Science and Diplomacy Anticipator Foundation (GESDA), explored the transformative potential and risks of quantum technologies in shaping international peace and security. Held on 22 November 2024 in Geneva, this flagship event convened policymakers, scientists, industry leaders and civil society to address the dual-use nature of quantum technologies, their ethical implications, and the urgency of inclusive governance.  </p>



<p>The dialogue featured multidisciplinary discussions on quantum computing, communications and sensing, focusing on equitable access, capacity building, and the role of multilateral frameworks. Key themes included bridging the &#8220;quantum divide,&#8221; fostering collaboration across sectors and integrating quantum advancements with Sustainable Development Goals.&nbsp;&nbsp;</p>



<p>The 2024 Innovations Dialogue emphasized fostering inclusive, collaborative and forward-thinking approaches to quantum governance. By uniting global stakeholders and leveraging innovative ideas, the conference explored possible pathways to responsibly harness quantum technologies&#8217; transformative power. It laid the groundwork for future multilateral discussions to shape secure, equitable and innovative quantum advancements.</p>



<p>This report is not intended to be a detailed account of the conference proceedings but rather an easily accessible reference point. For more information, watch the <a href="https://www.youtube.com/watch?v=CTI0S7ONzrM&amp;ab_channel=UnitedNationsInstituteforDisarmamentResearch" target="_blank" rel="noopener" title="full conference recording">full conference recording</a>. </p>



&nbsp;



<p>Citation:&nbsp;<em>Dongyoun Cho, 2024 Innovations Dialogue: Quantum Technologies and Their Implications for International Peace and Security, Conference Summary Report, Geneva, UNIDIR, 2024.</em></p><p>The post <a href="https://unidir.org/publication/2024-innovations-dialogue-quantum-technologies-and-their-implications-for-international-peace-and-security/">2024 Innovations Dialogue: Quantum Technologies and Their Implications for International Peace and Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloud Computing and International Security: Risks, Opportunities and Governance Challenges</title>
		<link>https://unidir.org/publication/cloud-computing-and-international-security-risks-opportunities-and-governance-challenges/</link>
		
		<dc:creator><![CDATA[Jack Conneely]]></dc:creator>
		<pubDate>Wed, 18 Dec 2024 16:16:26 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=20416</guid>

					<description><![CDATA[<p>Cloud computing has become a foundational element of the global digital economy, unlocking unprecedented levels of innovation and connectivity. While providing enormous benefits – from cost-efficiency, strengthened resilience, access to large computational resources, easier data-sharing and analytics – cloud computing also carries potential downsides and risks. The centrality of cloud computing to modern life and<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/cloud-computing-and-international-security-risks-opportunities-and-governance-challenges/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/cloud-computing-and-international-security-risks-opportunities-and-governance-challenges/">Cloud Computing and International Security: Risks, Opportunities and Governance Challenges</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Cloud computing has become a foundational element of the global digital economy, unlocking unprecedented levels of innovation and connectivity. While providing enormous benefits – from cost-efficiency, strengthened resilience, access to large computational resources, easier data-sharing and analytics – cloud computing also carries potential downsides and risks. </p>



<p>The centrality of cloud computing to modern life and the concentration of services among a few actors mean that failures – either accidental or as the result of adversarial action – can be severe, with cascading effects across industries, services and states. To understand the profound impacts of this critical enabling technology on international security, this report provides an overview of relevant use cases, benefits and risks of cloud computing, as well as its key governance challenges and implications for arms control. Structured into two parts – a technology primer and a governance primer – this report offers both technical insights and policy analysis.</p>



&nbsp;



<h4 class="wp-block-heading">Citation</h4>



<p>Brief &#8211; <em>Federico Mantellassi and Giacomo Persi Paoli, Cloud Computing Governance: a Research Brief (Geneva: UNIDIR, 2024).</em></p>



<p>Full report &#8211; <em>Federico Mantellassi and Giacomo Persi Paoli, Cloud Computing and International Security: Risks, Opportunities and Governance Challenges (Geneva: UNIDIR, 2024).</em></p><p>The post <a href="https://unidir.org/publication/cloud-computing-and-international-security-risks-opportunities-and-governance-challenges/">Cloud Computing and International Security: Risks, Opportunities and Governance Challenges</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Governance Implications of Synthetic Data in the Context of International Security</title>
		<link>https://unidir.org/publication/governance-implications-of-synthetic-data-in-the-context-of-international-security/</link>
		
		<dc:creator><![CDATA[Jack Conneely]]></dc:creator>
		<pubDate>Mon, 16 Dec 2024 16:16:31 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=20405</guid>

					<description><![CDATA[<p>Data is crucial to the training and development of artificial intelligence (AI) systems. However, three key data-related issues can act as barriers to development and deployment of AI capabilities and systems. Synthetic data – data that is artificially generated in the digital world with properties that are often derived from an original set of data<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/governance-implications-of-synthetic-data-in-the-context-of-international-security/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/governance-implications-of-synthetic-data-in-the-context-of-international-security/">Governance Implications of Synthetic Data in the Context of International Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Data is crucial to the training and development of artificial intelligence (AI) systems. However, three key data-related issues can act as barriers to development and deployment of AI capabilities and systems. </p>



<ul class="wp-block-list">
<li>First, the development of AI technologies has – at least in part – depended on the availability of large datasets to train AI models. </li>



<li>Second, data is a resource whose availability, collection, cleaning, use and sharing is affected by factors such as collection costs, lack of real-world data in certain domains, as well as regulatory, legal and ethical constraints. </li>



<li>Third, data quality, representativeness, and diversity are directly linked to an AI model’s performance, level of bias, accuracy and reliability. </li>
</ul>



<p>Synthetic data – data that is artificially generated in the digital world with properties that are often derived from an original set of data – has been proposed as a solution to address some of these data-related issues, especially for AI model training. However, synthetic data is no panacea, and has been shown to potentially exacerbate many of the issues it seeks to curtail, sparking governance discussions.</p>



<p>To explore the governance challenges of synthetic data in the context of international security, UNIDIR’s Security and Technology Programme held an event titled <a href="https://unidir.org/event/technology-and-security-seminar-on-synthetic-data-exploring-governance-implications/" title="Technology and Security Seminar on Synthetic Data: Exploring Governance Implications">Technology and Security Seminar on Synthetic Data: Exploring Governance Implications</a>.</p>



<p>This report provides a summary of the key themes and takeaways from discussions at the event. The report is divided into two parts, reflecting the structure of the event. The first part provides a short overview of the technology and its uses in the military domain. The second part presents the various views, issues and potential challenges to governance presented by synthetic data in the context of international security.</p>



&nbsp;



<p>Citation:&nbsp;<em>Federico Mantellassi, “Governance Implications of Synthetic Data in the Context of International Security”, UNIDIR, Geneva, 2024.</em></p><p>The post <a href="https://unidir.org/publication/governance-implications-of-synthetic-data-in-the-context-of-international-security/">Governance Implications of Synthetic Data in the Context of International Security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Towards a Regular Institutional Dialogue on International ICT Security: Review of Current Proposals and Considerations for Effective Dialogue </title>
		<link>https://unidir.org/publication/towards-regular-institutional-dialogue-on-international-ict-security-review-of-current-proposals-and-considerations-for-effective-dialogue/</link>
		
		<dc:creator><![CDATA[Jack Conneely]]></dc:creator>
		<pubDate>Fri, 29 Nov 2024 10:06:37 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=20235</guid>

					<description><![CDATA[<p>This report, developed by UNIDIR’s Security and Technology Programme, reviews existing proposals for establishing a permanent United Nations mechanism to address international information and communications technology (ICT) security. The report explores key areas of convergence and divergence among states regarding the purpose, objectives, principles, structure and modalities of a future institutional dialogue. It aims to<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/towards-regular-institutional-dialogue-on-international-ict-security-review-of-current-proposals-and-considerations-for-effective-dialogue/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/towards-regular-institutional-dialogue-on-international-ict-security-review-of-current-proposals-and-considerations-for-effective-dialogue/">Towards a Regular Institutional Dialogue on International ICT Security: Review of Current Proposals and Considerations for Effective Dialogue </a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This report, developed by UNIDIR’s Security and Technology Programme, reviews existing proposals for establishing a permanent United Nations mechanism to address international information and communications technology (ICT) security. The report explores key areas of convergence and divergence among states regarding the purpose, objectives, principles, structure and modalities of a future institutional dialogue. It aims to support States in their discussions on creating a mechanism that remains effective amid evolving ICT challenges.</p>



<p>Since 1999, the UN has expressed concern over the misuse of ICTs and initiated multilateral processes, including Groups of Governmental Experts and Open-ended Working Groups (OEWGs), to address ICT threats. With the second OEWG concluding in 2025, there is a recognized need for a permanent mechanism under UN auspices to ensure continuity in addressing ICT security. Key resolutions (75/240, 77/37, and 78/16) and past consensus OEWG reports have laid the groundwork for further action, culminating in States recommending the establishment of a future permanent mechanism at the 8th substantive session of the OEWG in July 2024.</p>



<h4 class="wp-block-heading">Background</h4>



<p>The initial iteration of this report was developed as food-for-thought to support discussions among State representatives during a UNIDIR workshop on future permanent mechanism convened in June 2024. An updated version of this report was shared with delegates ahead of the 8th substantive session of the Open-ended Working Group (OEWG) in July 2024, where formal deliberations on establishing a permanent mechanism on ICT security took place.</p>



<p>The new iteration synthesizes insights from UN General Assembly resolutions, OEWG sessions and State submissions, offering potential pathways for creating a fit-for-purpose permanent mechanism on ICT security. It also contains an appendix summarizing discussions from the June 2024 UNIDIR workshop and highlighting specific elements of the future permanent mechanism agreed by States at the OEWG in July 2024.</p>



<h4 class="wp-block-heading"><strong>Key findings</strong> </h4>



<p>This report highlights the following areas of convergence, divergence and key findings:</p>



<ul class="wp-block-list">
<li>Areas of convergence: States agree on the need for a permanent mechanism to promote international peace and security in cyberspace, as well as its general purpose, structure and guiding principles of inclusivity, flexibility, transparency, sustainability, complementarity and non-duplication.</li>



<li>Areas of divergence: Differences remain regarding the mechanism’s precise modalities, thematic focus and programmatic priorities. Specific issues, such as its name, sequencing of activities, participation of non-governmental stakeholders and thematic groups, also require further discussions.</li>
</ul>



<p>The report also highlights that the success and long-term viability of a permanent UN mechanism on ICT security will depend on finding a balance between high-level political discussions and technical exchanges. By building on areas of convergence and incorporating ongoing discussions around divergences, States can establish a sustainable mechanism capable of enhancing international cooperation and strengthening global ICT security over time while minimizing the risk of institutional gridlocks.</p>



&nbsp;



<p>Citation: UNIDIR Security and Technology Programme,<em> &#8220;Towards regular institutional dialogue on international ICT security: Review of current proposals and considerations for effective dialogue”</em>, UNIDIR, Geneva, 2024.&nbsp;</p><p>The post <a href="https://unidir.org/publication/towards-regular-institutional-dialogue-on-international-ict-security-review-of-current-proposals-and-considerations-for-effective-dialogue/">Towards a Regular Institutional Dialogue on International ICT Security: Review of Current Proposals and Considerations for Effective Dialogue </a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quantum Technology, Peace and Security: A Primer</title>
		<link>https://unidir.org/publication/quantum-technology-peace-and-security-a-primer/</link>
		
		<dc:creator><![CDATA[Jack Conneely]]></dc:creator>
		<pubDate>Thu, 21 Nov 2024 14:59:27 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=20071</guid>

					<description><![CDATA[<p>This primer provides policymakers and diplomats with an introduction to quantum technology and its anticipated impact on international security, focusing on both its potential benefits and its risks. Quantum advancements promise transformative changes in sensing, computing, communication and cryptography, and they offer enhanced capabilities for intelligence, surveillance and reconnaissance (ISR) as well as critical advancements<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/quantum-technology-peace-and-security-a-primer/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/quantum-technology-peace-and-security-a-primer/">Quantum Technology, Peace and Security: A Primer</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This primer provides policymakers and diplomats with an introduction to quantum technology and its anticipated impact on international security, focusing on both its potential benefits and its risks. Quantum advancements promise transformative changes in sensing, computing, communication and cryptography, and they offer enhanced capabilities for intelligence, surveillance and reconnaissance (ISR) as well as critical advancements in information security and cryptographic resilience. However, these same technologies also introduce challenges that could destabilize the security frameworks that underpin global peace.</p>



&nbsp;



<p>Citation: <em>Malekos Smith, Zhanna L., and Persi Paoli, Giacomo. “Quantum Technology, Peace and Security: A Primer”. Geneva, Switzerland: UNIDIR, 2024.</em></p>



<h4 class="wp-block-heading">Funded by </h4>



<figure class="wp-block-image size-large is-resized"><img decoding="async" width="829" height="1024" src="https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-829x1024.png" alt="" class="wp-image-20128" style="width:147px;height:auto" srcset="https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-829x1024.png 829w, https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-243x300.png 243w, https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07-768x948.png 768w, https://unidir.org/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-18.09.07.png 946w" sizes="(max-width: 829px) 100vw, 829px" /></figure><p>The post <a href="https://unidir.org/publication/quantum-technology-peace-and-security-a-primer/">Quantum Technology, Peace and Security: A Primer</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Compendium of Good Practices: Developing a National Position on the Interpretation of International Law and State Use of ICT</title>
		<link>https://unidir.org/publication/a-compendium-of-good-practices-developing-a-national-position-on-the-interpretation-of-international-law-and-state-use-of-ict/</link>
		
		<dc:creator><![CDATA[Natalia Mendez Alzate]]></dc:creator>
		<pubDate>Thu, 09 May 2024 14:43:05 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=18096</guid>

					<description><![CDATA[<p>This report provides a collection of good practices and national experiences in developing a national position on the interpretation of international law in cyberspace, as recorded by the States that have already developed and published one. It focuses on three aspects of a national position: utility, scope and process. National positions can foster transparency on<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/a-compendium-of-good-practices-developing-a-national-position-on-the-interpretation-of-international-law-and-state-use-of-ict/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/a-compendium-of-good-practices-developing-a-national-position-on-the-interpretation-of-international-law-and-state-use-of-ict/">A Compendium of Good Practices: Developing a National Position on the Interpretation of International Law and State Use of ICT</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This report provides a collection of good practices and national experiences in developing a national position on the interpretation of international law in cyberspace, as recorded by the States that have already developed and published one. It focuses on three aspects of a national position: utility, scope and process.</p>



<p>National positions can foster transparency on the national level as well as internationally. They can act as a reference document and can therefore guide bilateral engagement with international partners as well as national contributions to multilateral processes dedicated to State use of information and communications technology in the context of international peace and security. When drafted in consultation with international partners, a national position can foster international cooperation. It can also enhance preparedness to address future cyber operations by providing national guidelines with respect to assessment, classification and response to variety of malicious cyber operations. Finally, the utility of national positions can be found in their ability to contribute to the development of international law in general.</p>



<p>National positions are dynamic in nature. A State’s national position could initially focus on key issues as defined by that State’s interest and capacity. This approach requires prioritizing certain legal areas, with the understanding that the position may evolve in the future. In particular, it may need to adapt to technological developments and evolving multilateral discussions.</p>



<p>To maximize their utility, national positions should prioritize the interpretation of principles and rules previously agreed by the various multilateral discussions as applicable to State use of ICT. When deciding on the content of its national position, a State could further consult existing regional approaches to the topic and the national positions of other States. Indeed, topics most frequently addressed by existing national positions include the United Nations Charter, international humanitarian law, the law of State responsibility, due diligence and international human rights law.</p>



<p>Last but not least, this compendium suggests 10 steps that a State could consider taking when developing its national position – starting with defining the scope of the position through, inter alia, threat landscape assessment and consideration of foreign policy priorities, and concluding with publication and dissemination of the position.</p>



<p><em>Citation: UNIDIR Security and Technology Programme, &#8220;A Compendium of Good Practices: Developing a National Position on the Interpretation of International Law and State Use of ICT”, UNIDIR, Geneva, 2024.</em></p><p>The post <a href="https://unidir.org/publication/a-compendium-of-good-practices-developing-a-national-position-on-the-interpretation-of-international-law-and-state-use-of-ict/">A Compendium of Good Practices: Developing a National Position on the Interpretation of International Law and State Use of ICT</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enabling Technologies and International Security: A Compendium (2023 Edition)</title>
		<link>https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2023-edition/</link>
		
		<dc:creator><![CDATA[UNIDIR Comms]]></dc:creator>
		<pubDate>Wed, 06 Mar 2024 15:05:14 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/?post_type=publication&#038;p=17235</guid>

					<description><![CDATA[<p>Technological advancements in areas such as advanced materials, microchips, sensors and connectivity infrastructure are enabling innovation across other technology areas, not least in information and communications technologies (ICTs), artificial intelligence (AI) and autonomous systems. These enabling technologies are reshaping the digital landscape and hold potential applications in the military domain. While progress has been made<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2023-edition/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2023-edition/">Enabling Technologies and International Security: A Compendium (2023 Edition)</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Technological advancements in areas such as advanced materials, microchips, sensors and connectivity infrastructure are enabling innovation across other technology areas, not least in information and communications technologies (ICTs), artificial intelligence (AI) and autonomous systems. These enabling technologies are reshaping the digital landscape and hold potential applications in the military domain. While progress has been made in addressing the security implications of ICTs and AI within various intergovernmental processes, comparatively less attention has been devoted to the underlying technologies that are facilitating or driving their further development. This underscores the urgent need for a more thorough and comprehensive examination of enabling technologies as well as their potential impacts on international security.</p>



<p>To address this knowledge gap, this compendium is dedicated to the identification and analysis of the most salient advancements in enabling technologies, with a particular emphasis on those still in their early stages of development or application. The compendium explores four categories of enabling technologies: advanced materials (semiconductors, superconductors and nanotechnology), parts and components (microchips and sensors), processing and computing (cloud, edge and quantum computing), and infrastructure (fifth- and sixth-generation telecommunications (5G and 6G), the Internet of Things, cloud infrastructure and satellite communications).</p>



<p>Citation: <em>Wenting He (2024). &#8220;Enabling Technologies and International Security: A Compendium (2023 Edition)&#8221;, UNIDIR, Geneva.</em></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://unidir.org/wp-content/uploads/2024/02/EN_FundedbytheEU_RGB_POS-1024x228.jpg" alt="" class="wp-image-16876" width="297" height="66" srcset="https://unidir.org/wp-content/uploads/2024/02/EN_FundedbytheEU_RGB_POS-1024x228.jpg 1024w, https://unidir.org/wp-content/uploads/2024/02/EN_FundedbytheEU_RGB_POS-300x67.jpg 300w, https://unidir.org/wp-content/uploads/2024/02/EN_FundedbytheEU_RGB_POS-768x171.jpg 768w, https://unidir.org/wp-content/uploads/2024/02/EN_FundedbytheEU_RGB_POS-1536x342.jpg 1536w, https://unidir.org/wp-content/uploads/2024/02/EN_FundedbytheEU_RGB_POS-2048x456.jpg 2048w" sizes="(max-width: 297px) 100vw, 297px" /></figure><p>The post <a href="https://unidir.org/publication/enabling-technologies-and-international-security-a-compendium-2023-edition/">Enabling Technologies and International Security: A Compendium (2023 Edition)</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Technologies to Counter the Diversion of Small Arms and Light Weapons, and Components of Conventional Weapons</title>
		<link>https://unidir.org/publication/technologies-to-counter-the-diversion-of-small-arms-and-light-weapons-and-components-of-conventional-weapons-2/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Wed, 23 Aug 2023 22:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/technologies-to-counter-the-diversion-of-small-arms-and-light-weapons-and-components-of-conventional-weapons-2/</guid>

					<description><![CDATA[<p>There are many ways in which technology could help to counter the diversion of conventional weapons. Yet despite some discussions in international meetings on conventional arms control, we see limited evidence of technologies being used to strengthen or enhance efforts to prevent, detect, and investigate the diversion of conventional arms, their ammunition, and parts and<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/technologies-to-counter-the-diversion-of-small-arms-and-light-weapons-and-components-of-conventional-weapons-2/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/technologies-to-counter-the-diversion-of-small-arms-and-light-weapons-and-components-of-conventional-weapons-2/">Technologies to Counter the Diversion of Small Arms and Light Weapons, and Components of Conventional Weapons</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>There are many ways in which technology could help to counter the diversion of conventional weapons. Yet despite some discussions in international meetings on conventional arms control, we see limited evidence of technologies being used to strengthen or enhance efforts to prevent, detect, and investigate the diversion of conventional arms, their ammunition, and parts and components.</p>



<p>This paper seeks to bridge this gap by presenting a needs-driven, systematic, and context-sensitive framework to identify and assess technologies that could strengthen efforts to counter the diversion of conventional arms and related components.</p>



<p>The first step of this framework requires an understanding of the risks and methods of diversion, tailored to each specific type of conventional weapon and its life-cycle context. The second step examines the existing technologies which could help address the identified risk(s). The final step assesses the identified technologies according to the context(s) in which they would be applied, as well as against selected attributes the technologies should possess.</p>



<p>The paper also provides two illustrations to show how the framework could be applied to small arms and light weapons on the one hand, and components of conventional weapons on the other.</p>



<p><strong>Sponsor Organizations:</strong> Germany (Conventional Arms and Ammunition Programme) and Germany, the Netherlands, Switzerland and Microsoft (Security and Technology Programme).</p>



<p>Citation: <em>Sarah Grand-Clément and Diederik Cops (2023) &#8220;Project D-TECT: Technologies to Counter the Diversion of Small Arms and Light Weapons, and Components of Conventional Weapons&#8221;, UNIDIR and the Flemish Peace Institute. <a href="https://doi.org/10.37559/CAAP/23/ERC/08">https://doi.org/10.37559/CAAP/23/ERC/08</a> </em></p><p>The post <a href="https://unidir.org/publication/technologies-to-counter-the-diversion-of-small-arms-and-light-weapons-and-components-of-conventional-weapons-2/">Technologies to Counter the Diversion of Small Arms and Light Weapons, and Components of Conventional Weapons</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exploring the Use of Technology for Remote Ceasefire Monitoring and Verification</title>
		<link>https://unidir.org/publication/exploring-the-use-of-technology-for-remote-ceasefire-monitoring-and-verification/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Tue, 14 Jun 2022 22:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/exploring-the-use-of-technology-for-remote-ceasefire-monitoring-and-verification/</guid>

					<description><![CDATA[<p>Ceasefires play an important role in the prevention of further conflict and armed violence. Monitoring and verifying that the terms of a ceasefire agreement are respected plays a key role in ensuring an end to violence. Traditionally, ceasefire monitoring and verification has been human-led. In some circumstances, it can however be difficult deploy observers on<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/exploring-the-use-of-technology-for-remote-ceasefire-monitoring-and-verification/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/exploring-the-use-of-technology-for-remote-ceasefire-monitoring-and-verification/">Exploring the Use of Technology for Remote Ceasefire Monitoring and Verification</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Ceasefires play an important role in the prevention of further conflict and armed violence. Monitoring and verifying that the terms of a ceasefire agreement are respected plays a key role in ensuring an end to violence.</p>



<p>Traditionally, ceasefire monitoring and verification has been human-led. In some circumstances, it can however be difficult deploy observers on the ground. While technology cannot replace humans in all aspects of the monitoring and verification of ceasefires, especially within dialogue and de-escalation efforts, technology can nonetheless support and complement human-led activities.&nbsp;</p>



<p>This report explains what technological solutions are available to help monitor and verify ceasefires, outlining the respective technological advantages and limitations of each solution. The report also provides a series of guiding considerations around the use of technology, highlighting recommended issues to reflect upon before using technology to aid with ceasefire monitoring and verification&nbsp;</p>



<p><strong>Sponsor Organizations:</strong> Germany (Conventional Arms and Ammunition Programme) and Germany, the Netherlands, Switzerland and Microsoft (Security and Technology Programme).</p>



<p>Citation: <em>Sarah Grand-Clément (2022) &#8220;Exploring the Use of Technology for Remote Ceasefire Monitoring and Verification&#8221;, UNIDIR, Geneva.</em> <a href="https://doi.org/10.37559/CAAP/22/ERC/06">https://doi.org/10.37559/CAAP/22/ERC/06</a></p><p>The post <a href="https://unidir.org/publication/exploring-the-use-of-technology-for-remote-ceasefire-monitoring-and-verification/">Exploring the Use of Technology for Remote Ceasefire Monitoring and Verification</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 2021 Innovations Dialogue Conference Report</title>
		<link>https://unidir.org/publication/the-2021-innovations-dialogue-conference-report/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Tue, 21 Dec 2021 23:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/the-2021-innovations-dialogue-conference-report/</guid>

					<description><![CDATA[<p>This report provides a summary of the key themes, issues, and takeaways that emerged from the 2021 Innovations Dialogue on Deepfakes, Trust and International Security. Bringing together 20 expert speakers from government, international organizations, academia, and industry and nearly 1,000 (virtual and in-person) participants from around the world, the Dialogue illuminated how algorithmically generated synthetic<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/the-2021-innovations-dialogue-conference-report/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/the-2021-innovations-dialogue-conference-report/">The 2021 Innovations Dialogue Conference Report</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>This report provides a summary of the key themes, issues, and takeaways that emerged from the 2021 Innovations Dialogue on Deepfakes, Trust and International Security. Bringing together 20 expert speakers from government, international organizations, academia, and industry and nearly 1,000 (virtual and in-person) participants from around the world, the Dialogue illuminated how algorithmically generated synthetic media is created and disseminated, and how it could erode trust and present novel risks for international security and stability. The discussions also explored the key governance issues concerning deepfakes and the technical countermeasures and policy responses by which the technology’s dangers could be addressed. Finally, the Dialogue reflected on how the international community can preserve and foster trust in the digital ecosystem moving forward.<br>&nbsp;</p>



<h4 class="wp-block-heading">HIGHLIGHTS &amp;&nbsp;RECORDINGS:</h4>



<ul class="wp-block-list">
<li> <span style="font-size: revert; color: initial;">Read a brief summary of the </span><strong style="font-size: revert; color: initial;"><a href="https://unidir.org/sites/default/files/2021-12/UNIDIR_2021_Innovations_Dialogue_Hightlights.pdf">Conference Highlights</a></strong> </li>



<li> <span style="font-size: revert; color: initial;">Watch </span><strong style="font-size: revert; color: initial;"><a href="https://www.youtube.com/playlist?list=PLEQ2SvONl8gxxwmw-vmLF2eBWnQtHJrd3">all of the conference sessions</a></strong><span style="font-size: revert; color: initial;"> again (via the </span><a style="font-size: revert;" href="https://www.youtube.com/watch?list=PLEQ2SvONl8gxxwmw-vmLF2eBWnQtHJrd3&amp;v=8pIl86_LG3I&amp;feature=emb_imp_woyt&amp;ab_channel=UNIDIR%E2%80%94theUNInstituteforDisarmamentResearch">UNIDIR YouTube channel</a><span style="font-size: revert; color: initial;"> or below)</span> </li>
</ul>



<p><iframe loading="lazy" title="YouTube video player" src="https://www.youtube.com/embed/videoseries?list=PLEQ2SvONl8gxxwmw-vmLF2eBWnQtHJrd3" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>



<p><strong>Teaser:</strong> Deepfakes, Trust and International Security</p>



<p>Citation: <em>Alisha Anand and Belen Bianco (2021) &#8220;The 2021 Innovations Dialogue Conference Report: Deepfakes, Trust and International Security&#8221;, UNIDIR, Geneva, Switzerland.</em></p><p>The post <a href="https://unidir.org/publication/the-2021-innovations-dialogue-conference-report/">The 2021 Innovations Dialogue Conference Report</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exploring Distributed Ledger Technology for Arms Control and Non-Proliferation: A Primer</title>
		<link>https://unidir.org/publication/exploring-distributed-ledger-technology-for-arms-control-and-non-proliferation-a-primer/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Thu, 09 Sep 2021 22:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/exploring-distributed-ledger-technology-for-arms-control-and-non-proliferation-a-primer/</guid>

					<description><![CDATA[<p>The intrinsic characteristics of distributed ledger technology (DLT) platforms, combined with over a decade of successful development and deployment of this technology in a variety of sectors, make it a particularly relevant opportunity for international security and, more specifically, for arms control and non-proliferation. This paper provides a brief overview of DLT, including its main<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/exploring-distributed-ledger-technology-for-arms-control-and-non-proliferation-a-primer/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/exploring-distributed-ledger-technology-for-arms-control-and-non-proliferation-a-primer/">Exploring Distributed Ledger Technology for Arms Control and Non-Proliferation: A Primer</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The intrinsic characteristics of distributed ledger technology (DLT) platforms, combined with over a decade of successful development and deployment of this technology in a variety of sectors, make it a particularly relevant opportunity for international security and, more specifically, for arms control and non-proliferation.</p>



<p>This paper provides a brief overview of DLT, including its main characteristics, benefits and risks, as well as its potential applications and utility in the context of arms control and non-proliferation.</p>



<p><strong>Sponsor Organizations:</strong> Germany, the Netherlands, Norway, Switzerland and Microsoft</p>



<p>Citation: <em>Giacomo Persi Paoli and Cindy Vestergaard (2021) &#8220;Exploring Distributed Ledger Technology for Arms Control and Non-Proliferation: A Primer&#8221;, UNIDIR, Geneva.</em></p><p>The post <a href="https://unidir.org/publication/exploring-distributed-ledger-technology-for-arms-control-and-non-proliferation-a-primer/">Exploring Distributed Ledger Technology for Arms Control and Non-Proliferation: A Primer</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exploring Science and Technology Review Mechanisms Under the Biological Weapons Convention</title>
		<link>https://unidir.org/publication/exploring-science-and-technology-review-mechanisms-under-the-biological-weapons-convention/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Mon, 14 Jun 2021 22:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/exploring-science-and-technology-review-mechanisms-under-the-biological-weapons-convention/</guid>

					<description><![CDATA[<p>Since the Biological Weapons Convention (BWC) opened for signature in 1972, biology and other converging disciplines have advanced considerably. These changes could have profound implications for a science-based disarmament agreement like the BWC. To address changes in biology and biotechnology, BWC States Parties have established processes to review developments in science and technology (S&#38;T), including<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/exploring-science-and-technology-review-mechanisms-under-the-biological-weapons-convention/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/exploring-science-and-technology-review-mechanisms-under-the-biological-weapons-convention/">Exploring Science and Technology Review Mechanisms Under the Biological Weapons Convention</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Since the Biological Weapons Convention (BWC) opened for signature in 1972, biology and other converging disciplines have advanced considerably. These changes could have profound implications for a science-based disarmament agreement like the BWC. To address changes in biology and biotechnology, BWC States Parties have established processes to review developments in science and technology (S&amp;T), including annual expert meetings on this topic. However, shortcomings are evident in the current approaches and many BWC States Parties have expressed support for a more systematic review of science and technology under the Convention.&nbsp;</p>



<p>This study seeks to inform discussions on establishing a dedicated and systematic S&amp;T review process under the BWC through an examination of existing S&amp;T review-type mechanisms employed in different regimes beyond the BWC, a survey of States Parties views on a possible review mechanism and a study of past and present discourse on this issue in the BWC. Based on the analysis conducted, this study also presents options for BWC States Parties to consider ahead of the Ninth BWC Review Conference.</p>



<p>Citation: <em>James Revill, Alisha Anand and Giacomo Persi Paoli (2021) &#8220;Exploring Science and Technology Review Mechanisms Under the Biological Weapons Convention&#8221;, UNIDIR, Geneva, Switzerland. https://doi.org/10.37559/SECTEC/2021/SandTreviews/01</em></p><p>The post <a href="https://unidir.org/publication/exploring-science-and-technology-review-mechanisms-under-the-biological-weapons-convention/">Exploring Science and Technology Review Mechanisms Under the Biological Weapons Convention</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 2020 Innovations Dialogue Conference Report</title>
		<link>https://unidir.org/publication/the-2020-innovations-dialogue-conference-report/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Mon, 30 Nov 2020 23:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/the-2020-innovations-dialogue-conference-report/</guid>

					<description><![CDATA[<p>The 2020 Innovations Dialogue examined technological advancements and trends that could radically affect the creation, production and delivery of biological weapons:  gene editing techniques, DIYbio, cloud labs and nanobiotechnology.  The Dialogue also explored the challenges to existing governance and arms control approaches arising from the dual-use nature of technological innovations in the life sciences and<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/the-2020-innovations-dialogue-conference-report/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/the-2020-innovations-dialogue-conference-report/">The 2020 Innovations Dialogue Conference Report</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The 2020 Innovations Dialogue examined technological advancements and trends that could radically affect the creation, production and delivery of biological weapons:  gene editing techniques, DIYbio, cloud labs and nanobiotechnology.  The Dialogue also explored the challenges to existing governance and arms control approaches arising from the dual-use nature of technological innovations in the life sciences and considered what new instruments, if any, are needed and how can existing ones improve and adapt to safely and securely support the peaceful exploitation of 21st century biotechnology. This report provides a summary of the key themes, issues and takeaways that emerged from the two-day discussions at the 2020 Innovations Dialogue.</p>



<p>Citation:<em> Alisha Anand (2020) &#8220;The 2020 Innovations Dialogue Conference Report&#8221;, UNIDIR, Geneva, Switzerland.</em></p>



<p><strong>Teaser:</strong> Life Sciences, International Security and Disarmament</p>



<p><strong>Sponsor Organizations:</strong> SecTec core funders: the Governments of Germany, the Netherlands, Norway and Switzerland, and by Microsoft.</p><p>The post <a href="https://unidir.org/publication/the-2020-innovations-dialogue-conference-report/">The 2020 Innovations Dialogue Conference Report</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Weaponization of Increasingly Autonomous Technologies: Autonomous Weapon Systems and Cyber Operations</title>
		<link>https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-autonomous-weapon-systems-and-cyber-operations/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Wed, 15 Nov 2017 23:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-autonomous-weapon-systems-and-cyber-operations/</guid>

					<description><![CDATA[<p>International discussions about autonomous weapons have thus far focused predominantly on conventional weapon systems. These systems are not, however, the only domain in which technological developments in autonomy can have an impact on international security. Rapid advances in machine learning and artificial intelligence also have a significant impact in the field of cyber security, and<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-autonomous-weapon-systems-and-cyber-operations/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-autonomous-weapon-systems-and-cyber-operations/">The Weaponization of Increasingly Autonomous Technologies: Autonomous Weapon Systems and Cyber Operations</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>International discussions about autonomous weapons have thus far focused predominantly on conventional weapon systems. These systems are not, however, the only domain in which technological developments in autonomy can have an impact on international security. Rapid advances in machine learning and artificial intelligence also have a significant impact in the field of cyber security, and in particular for offensive operations carried out in cyberspace, so-called “cyber operations”. As this paper explains, the interaction of cyber operations and increasingly autonomous physical weapon systems may give rise to new security challenges, as these interactions can multiply complexity and introduce new vulnerabilities.</p>



<p>Citation: <em>Security and Technology Programme (2017) &#8220;The Weaponization of Increasingly Autonomous Technologies: Autonomous Weapon Systems and Cyber Operations&#8221;, UNIDIR, Geneva.</em></p><p>The post <a href="https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-autonomous-weapon-systems-and-cyber-operations/">The Weaponization of Increasingly Autonomous Technologies: Autonomous Weapon Systems and Cyber Operations</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Weaponization of Increasingly Autonomous Technologies: Concerns, Characteristics and Definitional Approaches</title>
		<link>https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-concerns-characteristics-and-definitional-approaches/</link>
		
		<dc:creator><![CDATA[devx]]></dc:creator>
		<pubDate>Wed, 08 Nov 2017 23:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-concerns-characteristics-and-definitional-approaches/</guid>

					<description><![CDATA[<p>Agreeing on a working definition of LAWS will be a challenging endeavour, as there are several working definitions already in circulation, and some stakeholders have already stated a preferred policy response. Moreover, each proposed definition attends to a particular set of concerns and characteristics, while omitting others. One’s position on both an appropriate definition and<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-concerns-characteristics-and-definitional-approaches/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-concerns-characteristics-and-definitional-approaches/">The Weaponization of Increasingly Autonomous Technologies: Concerns, Characteristics and Definitional Approaches</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Agreeing on a working definition of LAWS will be a challenging endeavour, as there are several working definitions already in circulation, and some stakeholders have already stated a preferred policy response. Moreover, each proposed definition attends to a particular set of concerns and characteristics, while omitting others.</p>



<p>One’s position on both an appropriate definition and an adequate policy response ultimately depends on what one is concerned about. Different definitions will attend different sets of concerns, as well as privilege different sets of characteristics.</p>



<p>The objective of this primer is to consolidate and give an overview of both concerns and characteristics and illustrate how different definitional approaches attend to these.</p>



<p>Citation: <em>Security and Technology Programme (2017) &#8220;The Weaponization of Increasingly Autonomous Technologies: Concerns, Characteristics and Definitional Approaches&#8221;, UNIDIR, Geneva.</em></p><p>The post <a href="https://unidir.org/publication/the-weaponization-of-increasingly-autonomous-technologies-concerns-characteristics-and-definitional-approaches/">The Weaponization of Increasingly Autonomous Technologies: Concerns, Characteristics and Definitional Approaches</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Clouds of war: The implications of targeting data centres</title>
		<link>https://unidir.org/clouds-of-war-the-implications-of-targeting-data-centres/</link>
		
		<dc:creator><![CDATA[Maria Belen Lopez Conte]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 15:56:19 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://unidir.org/?p=27105</guid>

					<description><![CDATA[<p>On 1 March, three data centres in the Gulf belonging to Amazon Web Services were the target of drone strikes amid ongoing hostilities in the Middle East. This marked the first documented time that such commercial data centres have been deliberately targeted as part of a military operation. This has far-reaching implications for international peace<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/clouds-of-war-the-implications-of-targeting-data-centres/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/clouds-of-war-the-implications-of-targeting-data-centres/">Clouds of war: The implications of targeting data centres</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>On 1 March, three data centres in the Gulf belonging to Amazon Web Services were the <a href="https://www.bbc.com/news/articles/cgk28nj0lrjo">target</a> of drone strikes amid ongoing hostilities in the Middle East. This marked the first documented time that such commercial data centres have been deliberately targeted as part of a military operation. This has far-reaching implications for international peace and security, digital governance, <a href="https://unidir.org/publication/artificial-intelligence-in-the-military-domain-and-its-implications-for-international-peace-and-security-an-evidence-based-road-map-for-future-policy-action/">artificial intelligence (AI) in the military domain</a>, and international humanitarian law.</p>



<p>It highlights the importance of data centres and of access to computing power (“compute” for short) as enablers of AI-driven capabilities. It also points to a clear step up in the steadily growing role and responsibility of private technology actors in 21st century warfare.</p>



<h4 class="wp-block-heading">The role of the commercial cloud in warfare</h4>



<p>It is first worth setting out why commercial data centres may be seen as targets, and what role they – and cloud computing more generally – play in modern military operations. Data centres are the physical backbone of the digital infrastructure that <a href="https://opiniojuris.org/2026/03/12/aws-in-the-cross-hairs-data-centres-as-targets/">enables</a> much of the <a href="https://www.csis.org/analysis/data-now-front-line-warfare">digital capabilities</a> now required by military operations.</p>



<p><a href="https://unidir.org/publication/cloud-computing-and-international-security-risks-opportunities-and-governance-challenges/">Cloud computing</a> enables access to the vast quantities of compute needed to train and deploy AI algorithms as well as to store, move and analyse data. Data centres are therefore a key element in the ability of modern militaries to leverage AI for autonomous capabilities, decision-support systems, data-fusion, intelligence, surveillance and reconnaissance capabilities and targeting. No public information, however, exists to ascertain whether these specific data centres were directly contributing to ongoing military operations.</p>



<p>The role of <a href="https://unidir.org/publication/ai-military-domain-briefing-note-states/">AI in military operations</a> is continuing to expand as battlefields produce ever more sensor data and require more compute. Operations are thus becoming increasingly reliant on ever more – and faster – collection, fusion and analysis of data. With these changes, the role of commercial cloud service providers (CSPs) – the only ones currently capable of managing such scale – is only likely to grow.</p>



<h4 class="wp-block-heading">Security implications of targeting data centres</h4>



<p>Targeting data centres has clear security implications.</p>



<ul class="wp-block-list">
<li><strong>First, the reliance by armed forces on commercial CSPs <a href="https://ict4peace.org/wp-content/uploads/2026/03/Bombing-Clouds_ICT4Peace.pdf">intertwines</a> military applications with the infrastructure that supports civilian digital applications.</strong> As the same data centres support both military and civilian workloads, strikes against them carry a <a href="https://ict4peace.org/wp-content/uploads/2026/03/Bombing-Clouds_ICT4Peace.pdf">dual risk</a>: they elevate the threat to civilian infrastructure and they lead to cascading effects across civilian life, triggering service outages and possible material effects.</li>
</ul>



<p></p>



<ul class="wp-block-list">
<li><strong>Second, the targeting of data centres raises questions about how to defend such infrastructure.</strong> Hyperscalers – the companies operating the largest data centres – boast advanced cybersecurity capabilities and contingency plans for natural disasters that enable them to ensure service continuity. However, these data centres are built for and considered as commercial enterprises. They are not equipped – or even conceptualized – to deal with military threats. Often the size of small <a href="https://www.brookings.edu/articles/the-future-of-data-centers/">cities</a>, data centres are both <a href="https://www.abc.net.au/news/2026-03-15/iran-war-ai-technology-data-centres/106443004">difficult to hide</a> and extremely <a href="https://www.abc.net.au/news/2026-03-15/iran-war-ai-technology-data-centres/106443004">costly</a> to secure against kinetic threats.</li>
</ul>



<p></p>



<ul class="wp-block-list">
<li><strong>Third, as a <a href="https://www.cloudinfrastructuremap.com/">globally distributed</a> network, data centres need not reside within a State’s borders to serve their purpose.</strong> The free flow of data and workloads across borders is, in many respects, a defining feature of modern cloud architecture. Yet, this means that the digital backbone underpinning military capabilities may be distributed geographically across the territory of neutral States. This carries profound implications for conflict should data centres increasingly become targets. A belligerent may, theoretically, be compelled to target infrastructure well beyond the theatre of active hostilities to deny its adversaries access to their cloud enabled-capabilities. Such strikes risk expanding the borders of a conflict, and so may contribute to escalation dynamics and negatively affect regional security.</li>
</ul>



<p><strong>Legal ramifications of targeting data centres</strong></p>



<p>The legal implications that stem from these strikes relate in particular to international humanitarian law and the extent to which the private sector may be affected. While States remain the primary subjects of international humanitarian law, a host of implications emerge for industry.<br>First, a data centre that serves both civilian and military purposes may constitute a legitimate target as a consequence of its potential status as a <a href="https://ihl-databases.icrc.org/en/ihl-treaties/api-1977/article-52">military objective</a> if it is found to</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“make an effective contribution to military action and [if its] total or partial destruction . . . in the circumstances ruling at the time, offers a definite military advantage”</p>
</blockquote>



<p>as a result of its nature, location, purpose or use. In the context of data centres and, more generally, digital infrastructure, the crux lies in <a href="https://www.justsecurity.org/133685/iranian-attacks-amazon-data-centers-legal-analysis/">the extent to which their destruction would offer “definite military advantage”</a>. The assessment of this advantage must be independent of the existence of redundancy measures in the event of damage to this particular facility.</p>



<p>Second, the destruction of digital infrastructure in war points to States’ obligation to take</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“<a href="https://ihl-databases.icrc.org/en/customary-ihl/v1/rule22">all feasible precautions</a> to protect the civilian population and civilian objects under their control against the effects of attacks”.</p>
</blockquote>



<p>This issue is of particular importance given the potential second- and third-order effects that their destruction may have on <a href="https://ict4peace.org/wp-content/uploads/2026/03/Bombing-Clouds_ICT4Peace.pdf">civilian life</a> and the humanitarian sector, where <a href="https://opiniojuris.org/2026/03/12/aws-in-the-cross-hairs-data-centres-as-targets/">connectivity may constitute a critical enabler</a>. Whether feasible precautions would require the <a href="https://opiniojuris.org/2026/03/12/aws-in-the-cross-hairs-data-centres-as-targets/">strict, physical separation</a> of civilian data centres from the military or even added measures (either by the States hosting or benefitting from a data centre or by the technology provider) to secure and protect these facilities. Regardless of which actor takes which steps, the importance of clarifying these questions and the expected distribution of roles and responsibilities is further emphasized by the “<a href="https://unidir.org/publication/cloud-computing-and-international-security-risks-opportunities-and-governance-challenges/">increased meshing</a>” of civilian and military cloud technologies.</p>



<p>Third, in addition to destruction of the physical hardware, another question arises as to whether the data hosted in dual-use data centres could, itself, constitute a lawful military objective. If this is the case, then the data could be subject to attack by way of (partial) destruction of the infrastructure that hosts it. This issue is of particular relevance due to the <a href="https://www.cigionline.org/static/documents/Afina-Grand_Clement.pdf">increased integration of AI into military systems</a> – and the dependence of these technologies on data <a href="https://repository.essex.ac.uk/41309/">throughout their life cycle</a>.</p>



<p>Beyond the technology, the possible targetability of staff working at these data centres arises. While civilians are, in principle, protected from attacks under international humanitarian law, they may lose their protection if they are found to be directly participating in hostilities. Independently of whether contributing to the operation of a dual-use data centre could constitute direct participation in hostilities, this question is of particular importance in the light of today’s technology-heavy defence landscape.</p>



<p>This trend may, subsequently, require the presence of technical personnel, such as engineers, in or near the frontlines for maintenance and other operational functions critical to the deployment and use of military capabilities. There is precedent of such <a href="https://mwi.westpoint.edu/innovating-under-fire-lessons-from-ukraines-frontline-drone-workshops/">maintenance workshops</a> being established by governmental armed forces. However, States’ dependence on the private sector for military capabilities – extending beyond weapon systems to data centres and other technological infrastructure – is growing. This may lead in the foreseeable future to the deployment in the battlefield of civilian engineers and technicians from technology suppliers to ensure the continued operation and maintenance of that infrastructure.</p>



<h4 class="wp-block-heading">The need for structured engagement between the public and private sectors</h4>



<p>These observations ultimately attest to two realities.<br>The foremost of these is that risk assessments and mitigation measures for both the public and the private sectors will inevitably evolve from traditional structures. While the destruction of military factories is far from being a novel strategy, the increased reliance on dual-use digital infrastructures such as data centres further emphasizes the need for both <a href="https://www.scmp.com/opinion/asia-opinion/article/3347725/ai-infrastructure-front-line-lessons-asean-iran-war?share=6PVzQcD57gYz4DN6domdPd7fKWfIxBlBrYGxYKTVDnrTPHSSwl6iPDW15UOs7Zl9LqpzwGNltTFGRTOMsOb6Ho7srKlMZLiUsje1pSA9G1iFyj83A6Lvl4uxa%2Fu%2FAcnr9rD6AHKFvE9k3aC8iUO%2BXg%3D%3D&amp;utm_campaign=social_share">States</a> and technology suppliers to re-evaluate their risk assessments.</p>



<p>The large prime contractors in the defence industry may already have established structures and processes for such risk assessments. To the extent that their facilities may be military objectives, technology companies should follow suit if they are to supply, even remotely, capabilities to the military. To this end, States and the private sector should clarify expectations with respect to the distribution of roles and responsibilities, including in the context of risk assessments and mitigation.</p>



<p>The other, equally significant, reality is that the need for structured engagement between the public and the private sectors is now more evident than ever. Beyond risks assessments and clarity on the distribution of roles and responsibilities, establishing shared expectations could ultimately foster predictability, mutual trust and accountability and could contribute positively to international peace and security. States and non-state actors (including industry) have engaged extensively since 2018 on information and communications technologies (ICTs) in the context of international security as part of two United Nations open-ended working groups. The upcoming <a href="https://docs.un.org/en/A/RES/80/16">Global Mechanism</a> on ICT in the context of international security subsequently provides an opportunity to deepen the multi-stakeholder dialogue on, among other things, voluntary norms and international law, particularly the protection of dual-use infrastructure and data.</p>



<p>Specifically on AI, UNIDIR in partnership with the Office of the United Nations High Commissioner for Human Rights launched an initiative dedicated to the development of a <a href="https://unidir.org/framework-of-responsible-industry-behaviour-for-ai-in-the-military-domain/">Framework of Responsible Industry Behaviour for AI in the Military Domain</a>. The framework seeks to provide a practical and actionable set of voluntary guidelines firmly grounded in international law and norms, to be co-developed in collaboration with industry actors and governments.</p>



<p>As the boundary between commercial cloud computing and the military domain continues to blur, the strikes on the data centres in the Gulf confirm that digital infrastructure is not only the backbone of our society, but that it also lies on the frontline of modern conflict. The engagement of the international, multi-stakeholder community with governance processes, including within the United Nations, is now more critical than ever to ensure that current and future infrastructure fosters international peace and security, and does not become the catalyst for escalation and conflict.</p><p>The post <a href="https://unidir.org/clouds-of-war-the-implications-of-targeting-data-centres/">Clouds of war: The implications of targeting data centres</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UNIDIR launches Science and Technology Watchtower for global security</title>
		<link>https://unidir.org/unidir-launches-science-and-technology-watchtower-for-global-security/</link>
		
		<dc:creator><![CDATA[Asa Cusack]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 16:16:34 +0000</pubDate>
				<category><![CDATA[Latest news]]></category>
		<guid isPermaLink="false">https://unidir.org/?p=25000</guid>

					<description><![CDATA[<p>On 27 October, UNIDIR launched the Science and Technology Watchtower: Monitoring Innovation for Disarmament project, a three-year initiative to deliver timely analyses on related risks and opportunities to inform international security policy. Supported by the European Union, the project will systematically identify scientific and technological developments across weapons of mass destruction, conventional arms, and information<span class="excerpt-read-more">... <a class="btn--link" href="https://unidir.org/unidir-launches-science-and-technology-watchtower-for-global-security/">Read more</a></span></p>
<p>The post <a href="https://unidir.org/unidir-launches-science-and-technology-watchtower-for-global-security/">UNIDIR launches Science and Technology Watchtower for global security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>On 27 October, UNIDIR launched the <a href="https://unidir.org/event/science-technology-watchtower-project-launch/">Science and Technology Watchtower: Monitoring Innovation for Disarmament</a> project, a three-year initiative to deliver timely analyses on related risks and opportunities to inform international security policy. Supported by the European Union, the project will systematically identify scientific and technological developments across weapons of mass destruction, conventional arms, and information and communication technologies.</p>



<p>The rapid pace of scientific and technological innovation is reshaping the global security landscape, presenting both opportunities and risks for disarmament efforts. Advances in artificial intelligence (AI), biotechnology, additive manufacturing, and autonomous systems are blurring traditional boundaries between civilian and military applications, creating new challenges for weapons control and verification regimes.</p>



<p>In a response to scientific and technological advancements surpassing global disarmament frameworks, UNIDIR hosted the Watchtower project launch as a <a href="https://unidir.org/first-committee-and-unidir-side-events/">side event to the 80th session of the UN General Assembly First Committee</a>. The launch underscored the urgent need to bridge the gap between innovation and international security.</p>



<h4 class="wp-block-heading"><strong>What experts are saying</strong></h4>



<p>The launch event spotlighted some of the most pressing implications of science and technology for disarmament regimes. In the realm of conventional arms and ammunition, Rueben Dass, Senior Analyst with the International Centre for Political Violence and Terrorism Research at the S. Rajatnaram School of International Studies noted that “additive manufacturing (3D printing) enables the rapid, decentralized production of weapons components, potentially undermining export controls and fuelling illicit proliferation.”</p>



<p>Blockchain and cryptocurrency innovations, while promising for supply chain transparency, could also facilitate anonymous funding for arms trafficking. For nuclear weapons, Dr Manpreet Sethi, Science and Technology Advisor at Pacific Northwest National Laboratory, highlighted that “cyber vulnerabilities in command-and-control systems and the rise of small modular reactors introduce dual-edged risks: enhanced energy security alongside proliferation concerns if safeguards lag.”</p>



<h4 class="wp-block-heading"><strong>Key risks and opportunities</strong></h4>



<p>Emerging biotechnologies, such as gene editing and synthetic biology, blur lines between beneficial medical research and chemical or biological weapon development. This is exacerbated by AI tools that democratize access to hazardous designs. Quantum computing further threatens encryption protecting sensitive disarmament data, while AI-driven autonomous systems could erode human oversight in conflict escalation.</p>



<p>Yet, these technologies also hold opportunities for stronger monitoring. AI algorithms could revolutionize safeguards verification by analyzing satellite imagery for undeclared nuclear activities, and mobile apps might empower citizen science for radiation detection. Challenges in science and technology monitoring, however, loom large. The sheer velocity of breakthroughs demands agile, inclusive data-sharing; geopolitical tensions hinder cross-border collaboration; dual-use ambiguities complicate risk assessment; and bridging the divide between scientific communities and policymakers requires sustained trust-building and geographical diversity to ensure equitable representation.</p>



<p>The Watchtower project will provide a systematic horizon-scanning function, track emerging innovations, and assess their potential implications for international peace and security. It will also foster dialogue between policymakers, scientists and disarmament experts to bridge technical and policy perspectives.</p>



<h4 class="wp-block-heading"><strong>What’s next</strong></h4>



<p>In January, UNIDIR is gearing up for the launch of the Expert Networks across three disarmament areas:</p>



<ul class="wp-block-list">
<li>Conventional Arms and Ammunition (co-chaired by Rueben Dass and Josephine Dresner);</li>



<li>Nuclear Weapons (co-chaired by Dr Manpreet Sethi and Dr Hassan Elbahtimy); and</li>



<li>Chemical and Biological Weapons (co-chaired by Dr Jonathan Forman and Dr Una Jakob).</li>
</ul>



<p>These Expert Networks will serve as a collaborative platform to exchange insights, pilot methodologies for technological monitoring, and publish periodic assessments.</p>



<p>The Watchtower project builds on UNIDIR’s ongoing research on emerging technologies and their security implications, including recent analyses under the <a href="https://unidir.org/programme/security-and-technology/">Security and Technology Programme</a>. Previous publications have examined the role of AI in arms control verification, <a href="https://unidir.org/publication/neurotechnology-in-the-military-domain-a-primer/">neurotechnology in the military domain</a>, and trends in biotechnology and material science relevant to non-proliferation. The project will complement and expand this body of work, helping ensure that international disarmament policy evolves in step with scientific progress. <strong>&nbsp;</strong></p>



<p></p><p>The post <a href="https://unidir.org/unidir-launches-science-and-technology-watchtower-for-global-security/">UNIDIR launches Science and Technology Watchtower for global security</a> first appeared on <a href="https://unidir.org">UNIDIR</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quantum technologies, global supply chain, and international peace and security (Rajaratnam School of International Studies)</title>
		<link>https://unidir.org/quantum-technologies-global-supply-chain-and-international-peace-and-security-rajaratnam-school-of-international-studies-science-technology-and-security-quantum-2025/</link>
		
		<dc:creator><![CDATA[Meyha Sharma]]></dc:creator>
		<pubDate>Mon, 14 Apr 2025 09:50:12 +0000</pubDate>
				<category><![CDATA[External publication]]></category>
		<guid isPermaLink="false">https://unidir.org/?p=21774</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
