Reviewing the cybersecurity agendas of US presidential contenders
Cyber Tuesday: Waiting for Virtual Revelation? Reviewing the cybersecurity agendas of US presidential contenders
This year is going to be the hottest for the US domestic politics in the several past ...
On February 18, 2016 the Russian International Affairs Council (RIAC) held a meeting of experts with Dr. William J. Parker III, Chief Operating Officer at the
EastWest Institute
. Dr. Parker is a retired senior naval officer, author of numerous publications on the problems of Islamic extremism in the Middle East, and worked for US diplomatic missions in Iraq, Afghanistan and Pakistan.
The discussion covered the issues of building trust between Russia and the United States as the countries with the...
... comprehensive cooperation and coordination of U.S. and EU policies in the management of cyberspace on a wide range of issues, including personal data protection, freedom of speech and self-expression, data flow management, internet governance, ecommerce, cybersecurity and cyberwarfare – that is, the report covers the entire spectrum of military-political, economic, social, humanitarian, political and even technical problems associated with the development of cyberspace.
Can Rules of the Game be ...
... Microsoft, PriceWaterhouseCoopers and others, were among the main speakers at the Forum. The meeting was attended by RIAC Program Coordinator Maria Gurova.
Participants’ discussions at thematic sections covered the issues of critical infrastructure cybersecurity in the current setting, of the first results of the law on the right to oblivion in the network, of protecting personal data on the Internet, of increasing the level of digital literacy among pupils and students, as well as of Russia’s ...
... and ways to better security. The paper is full of interesting observations focused on the belief that swift progress in developing information technologies and automating processes at all levels has generated a considerable lag in the development of cybersecurity procedures and culture, primarily in the historically secretive nuclear industry. This only gives rise to new risks and menaces.
Cybersecurity Vaccination for Nuclear Plants
Whereas the industrialized countries or those possessing the entire ...
Singapore — a case of spy envy
We live in a world that seems borderless and limitless. You can find almost anything you want with a short Google-search. Most of us do not believe (many do not even think about it) that we are being watched. Or to tune the paranoia down — we are not necessarily being watched right now, but we can be watched at any given date, time and place. How do you feel about it? That your government can extract your personal information from your laptop, tablet, cellphone?...
The Russian International Affairs Council (RIAC) and the
EastWest Institute
held an expert meeting with
Microsoft
representatives on 17 June 2015. The discussion touched upon such issues as U.S. regulatory practices in cybersecurity, the protection of critical public and private infrastructure online, the development of national strategies to counter cyber threats using the experience of the U.S. and the EU as well as opportunities for radical improvements in U.S.-Russian ...
Silicon Valley, Wall Street and Washington
The Democratic-led U.S. administration and hi-tech community located in San Francisco (often referred to as Silicon Valley) have always relied on each other. But according to recently published articles, there appear to be complications in their relationship. Currently, the most divisive difference between them seems to be innovations associated with the anonymous digital currency (“bitcoin”).
Silicon Valley, Wall Street and Washington
Wall...
Immutable and Problematic Aspects to the Cyber Realm
On April 1, 2015 President Barack Obama issued an executive order enabling the United States to “
block the property of certain persons engaging in significant malicious cyber-enabled activities
.” The President himself grandly declared the maneuver as “giving notice” to those who seek to damage or harm the national security, economy, or critical infrastructure of the United States.
He further defined this as disrupting or hijacking American...
... international standards, protectionist measures against Chinese equipment, the capturing of data and the conclusion of Trans-Atlantic and Trans-Pacific trade agreements that exclude these two countries.
Nicholas Vallejos/
Flickr.com
Maxim Kornev:
Sovereign Cybersecurity
(in Russian)
The current institutional system allows the United States to maintain an unprecedented legal influence
via
the supremacy of their soft law and the English language. Debates over Internet governance are, unlike in Europe, followed ...