PIR Center consultant Oleg Demidov describes the role of the Verisign corporation in the DNS root zone management, comments on the process U.S. Department of Trade’s withdrawal from direct contractual relationship with the technical management of the root zone, and looks at the potential impact of c...
tags
Popular articles
Four principles of strategic stability
It is possible, at least conceptually, to sketch out a set of broad principles for U.S-Russian strategic stability – those principles are rooted in Cold War legacies but need to be adapted, revisited, and broadened in light of changing strategic capabilities a...
On July 16, 2018, President Putin and President Trump finally held their first summit in Helsinki. The summit did not yield specific agreements in arms control domain, which means the current problems will have to be addressed by next U.S.-Russia summit. Now there are only two major arms control ...
Latest projects
Shaping the next generation of experts is the main goal of the education and training system on nonproliferation, created and supported by PIR Center...
The project Global Internet Governance and International Information Security is part of the PIR Center Emerging Technologies and Global Security prog...
PIR Center recommends to read
The recent PIR Center report, “Iran in the Regional and Global Perspective” offers a fresh twist on advice for negotiators as they continue to work on an agreement. As a compilation of articles by experts who met in Bangkok and Moscow in 2014 to explore the prerequisites of longer term solutions for...
The book “The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy” by David Hoffman is a true documentary thriller focusing on the most difficult period of the 20th century. The international situation at that time is described as teetering on the brink of a nuclear world ...
Articles
Identification of internet users, owners of internet content and technical infrastructure, as well as persons providing various services via the internet, has undoubtedly become one of the hottest topics of discussions between representatives of government agencies and the expert community. As far a...
It is not Iran that the story of Flame begins with. The first versions of this malware, or rather of its prototype, were found by the American company Webroot Сommunity in late 2007 in Europe. The following year the virus was spotted in the UAE. At the time of its detection in early May 2012, Flame ...
In the French White Paper on Defence and National Security presented by the President in June 2008, information systems security emerged, alongside deterrence, as an area in which the sovereignty of France should be fully expressed. More collective work remains to be done in order to fully achieve t...
Cyberspace includes all information infrastructures accessible via the Internet beyond all territorial boundaries. In Germany all players of social and economic life use the possibilities provided by cyberspace. As part of an increasingly interconnected world, the state, critical infrastructures, bu...
The growth of the internet has been the biggest social and technological change of my lifetime. It is a massive force for good in the world in the way it drives growth, reduces barriers to trade, and allows people across the world to communicate and co-operate. As we saw this spring in the Arab worl...
This report explores key trends and challenges to the right of all individuals to seek, receive and impart information and ideas of all kinds through the Internet. The Special Rapporteur underscores the unique and transformative nature of the Internet not only to enable individuals to exercise their...