Preview

U.S./China/Russia Cyber Non-Aggression Treaty

Good Essays
Open Document
Open Document
887 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
U.S./China/Russia Cyber Non-Aggression Treaty
U.S./China/Russia Cyber Non-Aggression Treaty

United States of America, China, and Russia
A Proclamation
Recognizing the security issues we face in the world at large, posing threats to our prosperity and security; international trade, military, and technology secrets being stolen through cyber espionage. This threat comes at a time when the international economy is suffering and cutting edge technology is a key element in the growth of national economies.
Recognizing these threats affect national businesses and research institutions because valuable and sensitive information is being stored at an increasing rate online. Accessing this data is easily accomplished through unauthorized breaches of computer systems. With the increase of sensitive information being stored online, foreign nations and third-party actors such can conduct cyber-attacks on those systems without detection.
Recognizing that these cyber-attacks from sovereign nations carry their own political risks, the minimization of the attacks and the respect of other nations’ rights is vital to maintain amicable international relations.
Affirming it is the national policy of the signatory countries, the United States of America, China and Russia, to not conduct aggressive cyber actions on other international entities and to work together to provide economic growth within our own nations. If any signatory nation is in need of assistance to improve technological growth, all parties will agree to assist.
The signing parties have agreed as follows:
Article I
For the purpose of this Treaty it shall be understood that:
(a) The United States/U.S. means the United States of America
(b) China means the People’s Republic of China
(c) Russia means the Russian Federation
(d) The Commission means the International Cyber Boundary and Non-Aggression Commission, United States, China and Russia, as described in Article 2 of this Treaty.

Article II
The Cyber International Boundary and



Bibliography: Page http://www.usatoday.com/news/washington/story/2011-11-03/china-russia-cybersecurity/51065010/1 http://www.ft.com/cms/s/0/8f0d63e4-0646-11e1-a079-00144feabdc0.html#axzz24JFmXzA1 http://www.telegraph.co.uk/technology/news/8868802/US-accuses-China-and-Russia-of-repeated-cyber-spying.html http://www.eweek.com/c/a/Security/US-Congressional-Report-Accuses-China-Russia-of-CyberEspionage-809875/ http://www.reuters.com/article/2011/11/03/us-usa-cyber-china-idUSTRE7A23FX20111103 http://www.washingtonpost.com/world/national-security/us-cyber-espionage-report-names-china-and-russia-as-main-culprits/2011/11/02/gIQAF5fRiM_story.html http://web.ebscohost.com/ehost/detail?vid=3&hid=110&sid=3d2a4346-7af2-4efd-814d-036ef8f09464%40sessionmgr115&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=iih&AN=63991980

You May Also Find These Documents Helpful

  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This week I read “The Silent War”, which is an article written by James Bamford. This article is about the cyberwar that the US has been preparing for years. The articles states the resources available now to win the war, and what has been done so far to protect US interests. With the boom of the internet, the digitalization of the sensitive information, the increase of electronic communication, and the electronic monitoring of nuclear weapons, it becomes available to launch different types of cyberattacks. An example is given in the story about a cyberattack against the Iranian nuclear system with the collaboration of the Israeli. Also, the story gives a biography of the general Keith Alexander who led the National Security Agency (NSA) for…

    • 189 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The US should come forth with an efficient policy discussing the matter directly and including its future uses of cyber-intelligence. Presently, cyber-attacks are uncommon; however they still pose a risk in the future of war and security of a nation. Every country should take measures in ensuring they will be ready for an attack. Because of this extraordinary hazard, the US should make considerable ventures in organizing methods to secure itself and its nation against it.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Data Breach

    • 2467 Words
    • 10 Pages

     Don’t underestimate the tenacity of your adversaries, especially espionage- driven attackers, or the power of the intelligence and tools at your disposal (2013 Data Breach Investigations Report, 2013).…

    • 2467 Words
    • 10 Pages
    Best Essays
  • Good Essays

    The improvements being done in technology touted to make lives and work easier also makes it easier for cyber-criminals to perform his or her nefarious deeds. Some of the most vulnerable and potentially damaging targets are critical infrastructures such as the energy grid and nuclear-power plants. To help combat this, the U.S. Government is launching a program dubbed “Perfect Citizen” to help safeguard those critical infrastructures as well as private companies. In this paper I will discuss the Wall Street Journal article on the Perfect Citizen project posted on the Wall Street Journal website.…

    • 816 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As cyber-attacks related to information warfare have increased throughout the twenty first century we have seen a rise the use of cyber-attacks by nation states. These nation state attackers focus on targeting other nations in the hope of disrupting the nation’s economy, causing public panic, or crippling a country defenses along with many other goals which damage a nation. These attacks in turn allow the nation state which performed the attack to weaken the other nation, make political statement, steal nation’s information or resource, or use the attacks as a greater warfare plan. This often raises the question when discussing nation state cyber-attacks…

    • 843 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Some of the global threats included cyber, counterintelligence, terrorism, weapons of mass destruction and proliferation, space and counter space, transnational organized crimes, economic, natural resources, and human security. According to the 2015 National intelligence estimate report, there is an ever-increasing cyber threat. Such cyber threats can come in several different forms and can affect American citizens and the economy alike. For example, Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014 (usatoday.com). According to the report, although the cyber threat is imminent, catastrophic cyber attacks against the U.S. is unlikely. Some of the nations that have the highest risks of launching a cyber attack against the U.S. are china, Russia, Iran and North Korea (dni.gov). The U.S. defense system against cyber attack cannot eliminate the threat the systemic interdependencies between different critical infrastructure sectors (dni.gov). The cyber threat actors are motivated by different factors and all pose a different threat to the national security of the United States. According to the national security estimates, Russia military is establishing a cyber security division and its main objective is to implement cyber attacks against other states. Those attacks can include propaganda, and inserting malware into a country command system and network operations (dni.gov). According to the report, Russia’s cyber division has been proven to be successful at implementing malware into other countries website and the likelihood of such attack on the U.S. is coming. Another country that continuously poses a cybersecurity threat is China. The Chinese government has always been trying to get an economic advantage against the U.S. The report assert that in order to…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    History of NATO

    • 753 Words
    • 4 Pages

    They agreed upon that NATO member being attacked are considered as attacks against them all. Consequently they agreed that, in case of such an attack, each of them will do whatever it takes to restore and maintain the security.…

    • 753 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Good Internet Censorship

    • 2008 Words
    • 9 Pages

    Cheung, A., 2006. The business of governance: China 's legislationoncontent regulation in cyberspace. International Law and Plitics, Volume 38, pp. 1-38.…

    • 2008 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Answer: because cyberwarfare is more complex than conventional warfare. Cyberwarfare is Internet based conflict that involves political motivated attacks on information systems. Cyberwarfare attacks are disabling financial systems and communication networks. This is a serious problem because the potential targets for these attacks are military power grids but this cyberwarfare is targeting MNC, technology firms, and news organizations. This causes Obama (who is the official first cyberwarfare president) to not only worry about who is attacking his military but who is attacking and targeting his country.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The purpose of this proposal is to identify Russia's role in the establishment and development of the Shanghai Cooperation Organization, to evaluate the initiatives of Russia and to determine what the competitive spheres for Russia and China…

    • 1761 Words
    • 8 Pages
    Better Essays
  • Good Essays

    First of all, I think, that the Commission has established itself once more with the member states as a «player». I think we went through a quite difficult time, when we seemed only to be arguing with the member states, when at least some of them really questioned the Commission’s value. From my point of view we have come through that difficult period.…

    • 5109 Words
    • 21 Pages
    Good Essays
  • Powerful Essays

    3. Declaration of the Heads of States - members of the Shanghai Cooperation Organization, July 5, 2005, Astana //http://www.mid.ru/ns-rasia.nsf/3a0108443c964002432569e7004199c0/432569d80021985fc32570350039ead2?OpenDocument (May 2006)…

    • 4290 Words
    • 11 Pages
    Powerful Essays

Related Topics