Search: USA,Cybersecurity (58 materials)

 

Broad Cyber-Consensus

... all the worse by the new trend towards using the ICT for military and intelligence purpose as well as by numerous public accusations and threats emanating from both sides. One such example is the recent New York Times article on U.S. preparations for ... ... hack of U.S. government departments and corporations (known as the SolarWinds hack), which Russia is said to have carried out. Cybersecurity remains a sore point in U.S.–China relations as well. Tensions between major powers need to be reduced if we are ...

30.03.2021

The U.S. on the Way to Strategic Invulnerability

... will total USD 14.1 billion, which is 15 per cent more than in 2019. The Pentagon’s space programmes are classified, which creates additional risks for strategic stability. It is known that projects are under way in the United States to develop reusable space hypersonic systems and micro spacecraft, intercept spacecraft with “inspector” satellites, and carry out kinetic and non-kinetic attacks on satellites. Projects for directed-energy impact on nuclear weapons command systems are particularly ...

10.07.2020

Business and the State: Together into the Brave “Cyber World”?

... easier to do business. Third, if single standards and rules are developed, those companies that fail to comply may be held accountable. This is an excellent way to consolidate one’s market standing and undermine competitors. Steve Crown: Microsoft Cybersecurity Initiatives Finally, by calling for government regulations, companies will be able not merely to join the process of drafting rules that suit them, but to take the lead in this, especially since they have the groundwork already laid out....

18.05.2020

It’s Hard to Find a Black Cat in a Dark Room, Especially If It Isn’t There. RAND on the Search for Cyber Coercion

What we need is not strategies against cyber coercion, which RAND experts call for, but international frameworks for precluding cyberspace conflicts. What is cyber coercion and how have states used cyber operations to coerce others? These are the questions addressed in the RAND think tank's recent report " Fighting Shadows in the Dark. Understanding and Countering Coercion in Cyberspace ". The authors discuss cyber operations conducted by four states — Russia, China, Iran and North Korea...

19.11.2019

Strategic Instability in the Era of Information and Communication Technologies: Crisis or the New Norm?

The possibility that decisions about the use of nuclear weapons will be influenced by information and communication technologies (ICTs) is the most serious threat that exists today. Strategic stability is once again becoming a primary concern in international relations. The topic has received a great deal of attention of late, mainly because of the steady erosion of the reduction and limitation regime: the United States has now withdrawn from both the Anti-Ballistic Missile Treaty (ABM Treaty)...

07.11.2019

India in the Era of Cyber Wars

... and a high level of oversight, thus making it possible to achieve outstanding successes with minimal expenses (India’s space program is a prime example), areas believed to be of secondary importance are plagued by chronic problems. Until recently, cybersecurity was not one of the Indian government’s top priorities, and consequently, the relevant departments in state agencies were, as a rule, staffed residually. Since work in this area was not considered important or prestigious, employees working ...

29.07.2019

Cyberwarfare without Rules

... to consider the situation from the point of view of the security of critical infrastructure, the possibility of carrying out cyberattacks and the rules of conduct in ICT. The Informational Security of Critical Infrastructure Pavel Karasev: New U.S. Cybersecurity Strategies Protecting critical infrastructure from malicious attacks in the ICT environment is a crucial national security task, one that all developed countries are attempting to solve in one way or another. Each country draws up their ...

24.07.2019

What Insurance Can Offer for Global Cyberspace Stability and Resilience

... hundreds of millions of users, such as the a widely-used mobile operating system platform, or the dependency of hundreds of thousands of businesses on central providers of Internet infrastructure, such as a major cloud service. It’s important for the ... ... resilience and safety in global cyberspace by protecting against financial losses from major cyber incidents and raising the cybersecurity baseline. Thus the report on cyber insurance and systemic risk is strategic and complementary to the Institute’s ...

27.06.2019

Can Washington and Moscow Agree to Limit Political Interference?

The first U.S.-Russia joint view on how to deal with the interference problem After his meeting with U.S. Secretary of State Mike Pompeo in May, Russian Foreign Minister Sergei Lavrov said that Russia had proposed a mutual non-interference pledge. He recalled the exchange of letters between U.S. President Franklin Roosevelt and Soviet Foreign Minister Maxim Litvinov in 1933 in which, in return for U.S. diplomatic recognition, Moscow made pledges not to interfere in U.S. domestic politics and...

14.06.2019
 

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
For business
For researchers
For students