Preview

U.S./China/Russia Cyber Non-Aggression Treaty

Good Essays
Open Document
Open Document
887 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
U.S./China/Russia Cyber Non-Aggression Treaty
U.S./China/Russia Cyber Non-Aggression Treaty

United States of America, China, and Russia
A Proclamation
Recognizing the security issues we face in the world at large, posing threats to our prosperity and security; international trade, military, and technology secrets being stolen through cyber espionage. This threat comes at a time when the international economy is suffering and cutting edge technology is a key element in the growth of national economies.
Recognizing these threats affect national businesses and research institutions because valuable and sensitive information is being stored at an increasing rate online. Accessing this data is easily accomplished through unauthorized breaches of computer systems. With the increase of sensitive information being stored online, foreign nations and third-party actors such can conduct cyber-attacks on those systems without detection.
Recognizing that these cyber-attacks from sovereign nations carry their own political risks, the minimization of the attacks and the respect of other nations’ rights is vital to maintain amicable international relations.
Affirming it is the national policy of the signatory countries, the United States of America, China and Russia, to not conduct aggressive cyber actions on other international entities and to work together to provide economic growth within our own nations. If any signatory nation is in need of assistance to improve technological growth, all parties will agree to assist.
The signing parties have agreed as follows:
Article I
For the purpose of this Treaty it shall be understood that:
(a) The United States/U.S. means the United States of America
(b) China means the People’s Republic of China
(c) Russia means the Russian Federation
(d) The Commission means the International Cyber Boundary and Non-Aggression Commission, United States, China and Russia, as described in Article 2 of this Treaty.

Article II
The Cyber International Boundary and



Bibliography: Page http://www.usatoday.com/news/washington/story/2011-11-03/china-russia-cybersecurity/51065010/1 http://www.ft.com/cms/s/0/8f0d63e4-0646-11e1-a079-00144feabdc0.html#axzz24JFmXzA1 http://www.telegraph.co.uk/technology/news/8868802/US-accuses-China-and-Russia-of-repeated-cyber-spying.html http://www.eweek.com/c/a/Security/US-Congressional-Report-Accuses-China-Russia-of-CyberEspionage-809875/ http://www.reuters.com/article/2011/11/03/us-usa-cyber-china-idUSTRE7A23FX20111103 http://www.washingtonpost.com/world/national-security/us-cyber-espionage-report-names-china-and-russia-as-main-culprits/2011/11/02/gIQAF5fRiM_story.html http://web.ebscohost.com/ehost/detail?vid=3&hid=110&sid=3d2a4346-7af2-4efd-814d-036ef8f09464%40sessionmgr115&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=iih&AN=63991980

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This week I read “The Silent War”, which is an article written by James Bamford. This article is about the cyberwar that the US has been preparing for years. The articles states the resources available now to win the war, and what has been done so far to protect US interests. With the boom of the internet, the digitalization of the sensitive information, the increase of electronic communication, and the electronic monitoring of nuclear weapons, it becomes available to launch different types of cyberattacks. An example is given in the story about a cyberattack against the Iranian nuclear system with the collaboration of the Israeli. Also, the story gives a biography of the general Keith Alexander who led the National Security Agency (NSA) for…

    • 189 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    My decision about the cause of Edgar Allan Poe’s death being a suicide was the right decision. My decision was the right decision because I was able to make it by using reliable information that I found online and the opinions of others on the situation to make it. While doing this assignment I thought of the following quote, “Maybe it's fitting that since he invented the detective story, he left us with a real-life mystery". (Chris Semtner, Smithsonian). Now, I want you to consider that quote while reading this essay.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Good Essays

    History of NATO

    • 753 Words
    • 4 Pages

    They agreed upon that NATO member being attacked are considered as attacks against them all. Consequently they agreed that, in case of such an attack, each of them will do whatever it takes to restore and maintain the security.…

    • 753 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Good Essays

    When thinking of philosophers one of biggest names out there is Plato. The greek meaning of the name plato meant “Broad Shouldered”.Plato was around during 428 - 347 B.C and was one of the most influential philosophers of his time. During Plato’s early life was around Peloponnese War and grew into his teenage years around the time of Athens defeat of Spartan. Plato was descendants of Athenian Nobles on both sides of his family. Plato’s father Ariston died when plato was young and his mother Perictione remarried. Plato destined to be an active role in Politics but he was more interested in education and philosophy. As an middle aged child plato studied philosophy, poetry, and gymnastics. His first teacher was Cratylus, and as he grew up he became a…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The improvements being done in technology touted to make lives and work easier also makes it easier for cyber-criminals to perform his or her nefarious deeds. Some of the most vulnerable and potentially damaging targets are critical infrastructures such as the energy grid and nuclear-power plants. To help combat this, the U.S. Government is launching a program dubbed “Perfect Citizen” to help safeguard those critical infrastructures as well as private companies. In this paper I will discuss the Wall Street Journal article on the Perfect Citizen project posted on the Wall Street Journal website.…

    • 816 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Good Internet Censorship

    • 2008 Words
    • 9 Pages

    Cheung, A., 2006. The business of governance: China 's legislationoncontent regulation in cyberspace. International Law and Plitics, Volume 38, pp. 1-38.…

    • 2008 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Some of the global threats included cyber, counterintelligence, terrorism, weapons of mass destruction and proliferation, space and counter space, transnational organized crimes, economic, natural resources, and human security. According to the 2015 National intelligence estimate report, there is an ever-increasing cyber threat. Such cyber threats can come in several different forms and can affect American citizens and the economy alike. For example, Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014 (usatoday.com). According to the report, although the cyber threat is imminent, catastrophic cyber attacks against the U.S. is unlikely. Some of the nations that have the highest risks of launching a cyber attack against the U.S. are china, Russia, Iran and North Korea (dni.gov). The U.S. defense system against cyber attack cannot eliminate the threat the systemic interdependencies between different critical infrastructure sectors (dni.gov). The cyber threat actors are motivated by different factors and all pose a different threat to the national security of the United States. According to the national security estimates, Russia military is establishing a cyber security division and its main objective is to implement cyber attacks against other states. Those attacks can include propaganda, and inserting malware into a country command system and network operations (dni.gov). According to the report, Russia’s cyber division has been proven to be successful at implementing malware into other countries website and the likelihood of such attack on the U.S. is coming. Another country that continuously poses a cybersecurity threat is China. The Chinese government has always been trying to get an economic advantage against the U.S. The report assert that in order to…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Answer: because cyberwarfare is more complex than conventional warfare. Cyberwarfare is Internet based conflict that involves political motivated attacks on information systems. Cyberwarfare attacks are disabling financial systems and communication networks. This is a serious problem because the potential targets for these attacks are military power grids but this cyberwarfare is targeting MNC, technology firms, and news organizations. This causes Obama (who is the official first cyberwarfare president) to not only worry about who is attacking his military but who is attacking and targeting his country.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    First of all, I think, that the Commission has established itself once more with the member states as a «player». I think we went through a quite difficult time, when we seemed only to be arguing with the member states, when at least some of them really questioned the Commission’s value. From my point of view we have come through that difficult period.…

    • 5109 Words
    • 21 Pages
    Good Essays
  • Powerful Essays

    3. Declaration of the Heads of States - members of the Shanghai Cooperation Organization, July 5, 2005, Astana //http://www.mid.ru/ns-rasia.nsf/3a0108443c964002432569e7004199c0/432569d80021985fc32570350039ead2?OpenDocument (May 2006)…

    • 4290 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    The purpose of this proposal is to identify Russia's role in the establishment and development of the Shanghai Cooperation Organization, to evaluate the initiatives of Russia and to determine what the competitive spheres for Russia and China…

    • 1761 Words
    • 8 Pages
    Better Essays

Related Topics