PIR Center consultant Oleg Demidov describes the role of the Verisign corporation in the DNS root zone management, comments on the process U.S. Department of Trade’s withdrawal from direct contractual relationship with the technical management of the root zone, and looks at the potential impact of c...
tags
Popular articles
Four principles of strategic stability
It is possible, at least conceptually, to sketch out a set of broad principles for U.S-Russian strategic stability – those principles are rooted in Cold War legacies but need to be adapted, revisited, and broadened in light of changing strategic capabilities a...
On July 16, 2018, President Putin and President Trump finally held their first summit in Helsinki. The summit did not yield specific agreements in arms control domain, which means the current problems will have to be addressed by next U.S.-Russia summit. Now there are only two major arms control ...
Latest projects
Shaping the next generation of experts is the main goal of the education and training system on nonproliferation, created and supported by PIR Center...
The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...
PIR Center recommends to read
The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...
The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...
Articles
- What are clandestine capabilities?
- What are the challenges of clandestine capabilities for deterrence?
- What strategies can states adopt regarding clandestine capabilities?
- A preliminary case study: U.S. strategic anti-submarine warfare
Presentation on the international seminar "Disruptive Technologi...
In the past, nuclear reductions seemed safe:
-Goal is strategic stability (no counterforce disarming strikes) -In the Cold War, cuts seemed compatible with strategic stability -Large arsenals + modest counterforce capabilities = AC possible
Today, nuclear reductions are becoming dangerous:
-Techno...
Dear colleagues. I'll focus on the several ascpects of the Collective Security Treaty Organization's activity in countering challenges to security in Central Asia and Europe.
You would probably agree that Central Asia is not the most trouble-free region: civil war in Tajikistan (1990-s), revolutions...
In this issue of Russia Confidential, we continue our review of highlights of the 4th Moscow Conference on International Security attended by leading security experts, military specialists, and decision-makers from 86 countries.
The focus of this issue is on information security - which was for the f...
On April 26-27 an event took place in Moscow that brought together the leading military specialists and practitioners in the field of international security from 86 countries - the Russian MoD’s VI Moscow Conference on International Security (MCIS). While last year’s conference was attended by more ...
At first glance, last couple of years added nothing new to the global cybersecurity threat landscape of the nuclear energy industry and its incident track records. The last major publicly reported cybersecurity incidents were cyber-attack on KHNP in late 2014-early 2015, and worm infection of the Gu...