Search: Cybersecurity,Cyber-attacks (2 materials)

It’s Hard to Find a Black Cat in a Dark Room, Especially If It Isn’t There. RAND on the Search for Cyber Coercion

... inferred from practice) and claim that demands and threats expressed as part of such coercion are sometimes ambiguous, as identification of the threatening party can be. But what remains of coercion if its defining characteristics are removed? Large-scale cyber-attacks are not just a show of force but achievement of specific objectives, so they have nothing to do with coercion . The above seems to challenge the accuracy of the question asked at the beginning of the paper under review: “What is cyber ...

19.11.2019

Nuclear-Cybernetic Systems

... Washington conference on September 15, 2016. This would allow all the parties involved to speak the same language, thus improving the effectiveness of dialogue. Also worth mentioning is the initiative voiced by former United States National Security Council Cybersecurity Director Richard Clarke, who called for an international treaty that would accomplish the following: Ban cyber-attacks on certain facilities (including components of nuclear weapons infrastructure); Require signatory nations to pass laws enforcing such norms; Enable the UN Security Council to impose sanctions on violator states, as it did in the past ...

25.07.2017

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
For business
For researchers
For students