The document is an official statement about U.S. claims to world domination in cyberspace. International law mentioned in passing, the emphasis is on the actual replacement of the "voluntary commitment [of other countries] optional a code of responsible conduct of States in time of peace". The United States will encourage States to such "commitment", and one will entice those will be "forced" for the sake of "protecting America's interests both domestically and abroad."
"Cyberstrategy" aggressively threatening countries which the US considers a source of cyber threats: the declared right to pursue others for the fact that America, as we know thanks to Snowden, herself. However, the contradiction is imaginary. Uniqueness, special role of the US in world politics repeatedly announced, not only in this but in other documents. While America does not hide that is valid by the law of force.
We offer you the basic information about the document.
"Cyberstrategy" contains four sections, or "principles":
- to protect the American people, America and the American way of life;
- ensuring America's prosperity;
- the preservation of peace by the method of coercion;
- the promotion of American influence.
Presentation "cyber strategies", we believe, can be structured differently, for brevity focusing not on returns but on the substantive provisions of the instrument.
First and foremost the protection cyberhugs be subject to national security, energy, banking and Finance, health and safety of citizens, communications, information technology and transport. Especially said about the infrastructure of Maritime transport, for it will be provided with a separate cyber security and special satellite constellation that provides navigation.
Control over the security of the IT infrastructure in these and other industries is concentrated at the Federal level. The Ministry of national security will be given access to all information systems of authorities and powers to protect them. Supervision over observance of rules of safety infrastructure, as now, given the budgetary and administrative management. CIO authorities are responsible for compliance with procurement of IT products priorities in the field of security of networks and data for this purpose will be developed common to all authorities of the Federal service risk assessment of such procurement. The "wrong" parties were forbidden to participate in government procurement that already happened with "Kaspersky Lab" (either company or public evidence of the dangers of software products of the Laboratory are not presented).
Will also create a network of data transmission "next generation." From these works in the USA, we will remind, in the summer of ousted Chinese contractors.
Quantum computation and artificial intelligence
"Cyberstrategy" separately allocates the cryptographic data. The US government expects from the NIST standards for encryption, "resistant to quantum effects". Here quantum computers, and artificial intelligence, referred to as practically applicable technologies. However, even without direct references, we can assume that the meaning of the phrase "US law enforcement agencies will increase collaboration with private companies to overcome technological barriers in the investigation of cyber threats, including technologies of anonymity and encryption". Probably talking about the decipherment of third party data referred to "quantum effects".
From "Cyber Strategies"
"One of our goals is to provide leadership of the United States in the field of new technologies, facilitating the identification and support of these technologies by the government, including artificial intelligence, quantum computer science and telecommunications infrastructure of the next generation".
Punitive functions of the United States in cyberspace
"Cyberstrategy" cracks down on those who are in the United States deemed by cyber criminals. From foreign law enforcement, the U.S. government will demand help in apprehending these people "on demand". In addition, the United States intends to push for the accession of more countries to the Council of Europe Convention on cybercrime (Budapest Convention), which authorizes its parties without approval to operate in the territory of a foreign state. Russia in the Budapest Convention is not involved.
From "Cyber Strategies"
"Federal law enforcement agencies work hard to arrest and criminal prosecution of offenders, crippling of criminal infrastructure, limiting the spread and misuse of information and computer systems, the prevention benefit the criminals and their state sponsors from illegal activities, arrest and confiscation of their assets.
...The administration will develop and submit to the Congress for consideration of changes to the legislation on electronic surveillance systems and crimes using computer technology to expand the ability of law enforcement to gather the necessary legal evidence of criminal activity, disrupt criminal infrastructure by using civil injunctions and enforcement measures against intruders.
...The United States will make every effort to address gaps in existing procedures and will develop new effective mechanisms of criminal prosecution abroad criminals who commit crimes using computer technology".
Propaganda the American way of life and state protection of the interests of American companies is impossible without "an open Internet", stated in the document.
The US will not allow to abandon the multilateral ("multistakeholder") of the Internet governance model and to prevent nation-States to exercise sovereignty in cyberspace.
To counteract the non-us influence on the development of the Internet and national restrictions on access to content, the U.S. will continue to work with "like – minded countries, industry, civil society and other stakeholders" (stakeholders).
To preserve influence for the successful propaganda of the American way of life, America needs the Internet in its current form – with key infrastructure elements that are not controlled by nation-States.
The United States will try to reduce attempts at "authoritarian States" to take control over national segments of the Internet (obviously, projects the distribution of Internet from satellites OneWeb and balloons made USA and for this purpose too).
Digital the American economy
In "cyber strategies" this topic is not given so much attention, but it is clear that the economy is the key to the entire document. United States, as has been said, I officially declare that you act according to the law of force, and the economy – and the source of that power, and the object of the power of protection.
National and economic security of the United States based on international trade and transportation infrastructure, and the future of the American economy due to the "supporting infrastructure" and the development of cyberspace, says "Cyberstrategy".
For the United States is crucial to achieve, by persuasion or force, the consent of other States for cross-border transmission of data.
From "Cyber Strategies"
"Many countries are increasingly resorting to various constraints for data locality and introducing regulatory mechanisms to implement the policy of digital protectionism under the pretext of national security. These actions have a negative impact on the competitiveness of American companies."
Except for this everything in "cyber strategies" is written on the digital economy of the United States, nothing but inessential terminological differences (e.g., their "supporting infrastructure" overlaps in meaning with our "crosscutting technologies"), not different from what is called the digital economy in Russia.
Cybertheater military action
About "punishing individuals and States, using digital tools for malicious purposes", the President of trump explicitly stated in the preamble to "cyber strategies". The text of this presidential threat detailed. From "cyber strategies" clearly indicate that the US is prepared to use military force to resolve cyber incidents.
From "Cyber Strategies"
"Russia, Iran and North Korea conducted a cyber-attack, which caused significant damage to American and multinational companies, our allies and partners, and did not suffer the corresponding punishment... China is using cyberspace for economic espionage and theft of intellectual property, the value of which is measured in trillions of dollars."
To prevent "the irresponsible behaviour of States in cyberspace use and the resulting damage to the U.S. or American partners," as well as for the punishment for such actions would apply diplomatic, military (both cyber and some "kinetic", i.e. "kinetic"), financial, intelligence methods, public statements and "law enforcement".
About the meaning of mysterious in this context, the term "kinetic" do not presume to guess, but instead of Russia it would be foolish not to assume that we are talking about a regular military force.
The U.S. intelligence community, said "cyber strategies", "will retain its advantage of using all digital intelligence received from any source". The data will be transferred to the U.S. government, which together with partners will identify the hostile foreign state and a list of emergency response measures "to protect US interests".
The impression of a man who has read "Cyberstrategy the United States," much depends on which country it is. In any case, the discussion document on the merits goes beyond the competence of the IT edition. Let us simply say: the sincerity of the Americans will not give up, they informed the world about its intentions clear and unambiguous.
- 29-05-2012Drugs in the service of the Third Reich
- 12-09-2010Many experts believe the best tank Merkava main battle tank in the world
- 12-09-2010The Minister of defence of Germany introduced draft large-scale reform of the armed forces
- 21-04-2001To the question about the war of the fourth sphere