Negotiations on National Security Risks: The Case of U.S.–Soviet Relations

2009 ◽  
pp. 1-20
Author(s):  
Victor Kremenyuk
2011 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Matthew Warren ◽  
Shona Leitch

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.


2019 ◽  
Vol 185 (3-4) ◽  
pp. 330-333 ◽  
Author(s):  
Sean D Mclaughlin ◽  
Ramey L Wilson

Abstract Developing, cultivating, and sustaining medical interoperability strengthens the support we provide to the warfighter by presenting our Commanders options and efficiencies to the way we can enable their operations. As our national security and defense strategies change the way our forces are employed to address our security risks throughout the world, some military commands will find they cannot provide adequate medical care without working in concert with willing and available partners.This article proposes a tiered framework that allows medical personnel to further describe and organize their engagement activities around the concept and practicalities of medical interoperability. As resources become diverted to other theaters or missions expand beyond assigned capabilities, medical interoperability provides Commanders with options to medically enable their missions through their partnerships with others. This framework links and connects activities and engagements to build partner capacity with long-term or regional interoperability among our partners and challenges engagement planners to consider ways to build interoperability at all four tiers when planning or executing health engagements and global health development. Using this framework when planning or evaluating an engagement or training event will illuminate opportunities to develop interoperability that might have otherwise been unappreciated or missed.


Author(s):  
Marianna Sokolova

The article examines the prospects and risks associated with the development of quantum technologies in the perspective of the US-China technological rivalry. In the coming decades, quantum technologies will act as a driving force for technological development, and the priority in the development and use of this innovative technology will pave the way for global technological leadership in national security, digital economy, military and defense industries. A number of future risks are predicted, among them those related to the socially fair use of quantum technologies, geopolitical and national security aspects of their use, and the need to create regulatory mechanisms (including international ones) and standards for quantum technologies. The question is raised about the current ethical initiatives of the IT and business communities to prevent the risks associated with quantum technologies in the future.


2021 ◽  
pp. 207-229
Author(s):  
Tetiana FASOLKO ◽  
Petro SEMYANCHUK ◽  
Olha FEDORCHUK

The exceptional importance, extreme necessity and permanent relevance of the study of national security problems of Ukraine are substantiated. The essence of Ukraine’s national security is clarified through protection of national interests and strengthening of national position in the spheres of health care, childhood protection, social policy, pension provision, housing and communal services, migration policy, financial services market, property rights protection, stock market and securities circulation, fiscal and customs policy, trade, business, banking services, investment policy, auditing, monetary policy, licensing, industry, agriculture, transport, communications, energy and energy saving, operation natural monopolies, subsoil use, land and water resources, minerals, education, science, science technology and innovation policy, cultural development, information protection, information technology, freedom of speech and information security, cyber security and cyber defence, ecology and environmental protection, law enforcement, anti-corruption, border activities, defence, and other areas of public administration. Elements of national security of Ukraine are grouped into economic, social, informational, educational-scientific, law enforcement, defence, ecological and cultural blocks, as well as a block of other spheres of public administration. The technique of calculation of the parameters defining level of stability and durability of national security of Ukraine is developed and offered on the basis of theoretical approach. The essence of risks, dangers and threats to the national security of Ukraine is highlighted. Variants and cases of inverse curvilinear dependence between the probability of occurrence of risks in the sphere of national security of Ukraine and the degree of stability and strength of national security of Ukraine are established, modelled and characterized. With the help of the defined integral, the methods of calculating losses and loss of benefits of the state, legal entities and individuals due to the occurrence of risks, as well as the field of spread of national security risks of Ukraine are outlined. The classification and attempt to calculate the probability of occurrence of national security risks of Ukraine by elements and blocks is made.


2020 ◽  
Author(s):  
Muhammad Firdaus

Supply chain security is a vital component of American national security. United State officials have continued to warn that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage. There has been an intense investigation on Huawei, ranging from their software development processes to allegations of back doors. While it may be debated if Huawei is a pawn in a trade war or national security risks, it reinforces the importance of knowing one’s ecosystem. This article summarizes a panel discussion at the RSA2020 cybersecurity conference in San Francisco, titled "How to Reduce Supply Chain Risk: Lessons from Efforts to Block Huawei" was moderated by Craig Spiezle, founder of Agelight Advisory and Research Group, with panelists Katie Arrington, cyber information security officer of acquisitions for the U.S. Department of Defense; Donald Andy Purdy, chief security officer of Huawei Technologies USA; Bruce Schneier, security researcher and lecturer at the Harvard Kennedy School; and Kathryn Waldron, a fellow at R Street Institute. This session uses Huawei as a case study for best practices to assess risk and provide transparency to all stakeholders.


2017 ◽  
Vol 23 (1) ◽  
pp. 166-171
Author(s):  
Diana Ivanova

Abstract The purpose of this article is to present the Hungarian security policy over the last two years, focused on the migrant crisis. This policy is explained on the basis of the National Security Strategy. According to the Strategy, the migration is treated as a natural and at the same time complex phenomenon, bringing economic and demographic advantages and, at the same time, carrying public and national security risks. It is concluded that resolving the crisis is one of the most important priorities of the Hungarian security policy. The paper highlights the differences between the Hungarian security policy and the official policy of the EU. Like the other members of the Visegrád Group, Budapest is against the quota system for the allocation of migrants. The position of Hungary is that the discussion of the migrant problem both in the Group and at EU level should be based on the concept of effective solidarity. The country supports European integration of the Western Balkans. The study is based on documents, mainly of the Visegrád Group, and materials from the media.


Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2019 ◽  
Vol 16 (2) ◽  
pp. 245-254 ◽  
Author(s):  
Andrej Privara

Citizenship-for-sale schemes aimed at attracting wealthy and mobile individuals, so-called “high net worth individuals” (HNWIs) whose net assets are of US$1 million or more. A growing number of governments now seek to attract this category of migrants with abundant wealth. Many large and small states introduced various programmes and schemes to attract foreign investors. However, the European Commission has many concerns about these schemes regarding national security risks, ethics of nationality and can possible economic distortions. In a resolution adopted in January 2014, the European Parliament expressed its concern that the “outright sale of EU citizenship undermines the mutual trust upon which the Union is built”. It maintained that “EU citizenship implies the holding of a stake in the Union” and this “should never become a tradeable commodity”. This article explores citizenship for sale schemes in three new member states that joined the EU in 2004-2007 pointing out key areas of concern in the implementation of citizenship-for-sale schemes in the cases of Cyprus, Malta, and Bulgaria.


Sign in / Sign up

Export Citation Format

Share Document