Before his multi-stop visit to Mexico, Argentina, Peru, Colombia and Jamaica in Latin America and the Caribbean (LAC) early February 2018, then U.S. Secretary of State Rex Tillerson released many signals for Latin A...Before his multi-stop visit to Mexico, Argentina, Peru, Colombia and Jamaica in Latin America and the Caribbean (LAC) early February 2018, then U.S. Secretary of State Rex Tillerson released many signals for Latin America. Especially in his remarks at the University of Texas at Austin, he portrayed the presence of China and Russia in LAC as a "new imperial power" and called on nations of Latin America and the Caribbean to review and reassess China-LAC relations. By identifying China and Russia as critical reference variables for future U.S.- Latin America relations, he obviously went beyond the bilateral level of U.S.- Latin relations and implied the important changes in U.S. policy toward LAC that pressured by growing influence of extra-regional actors in LAC, the United States might strengthen its diplomatic efforts in LAC to maintain and consolidate its dominance in the region.展开更多
The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as int...The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the展开更多
文摘Before his multi-stop visit to Mexico, Argentina, Peru, Colombia and Jamaica in Latin America and the Caribbean (LAC) early February 2018, then U.S. Secretary of State Rex Tillerson released many signals for Latin America. Especially in his remarks at the University of Texas at Austin, he portrayed the presence of China and Russia in LAC as a "new imperial power" and called on nations of Latin America and the Caribbean to review and reassess China-LAC relations. By identifying China and Russia as critical reference variables for future U.S.- Latin America relations, he obviously went beyond the bilateral level of U.S.- Latin relations and implied the important changes in U.S. policy toward LAC that pressured by growing influence of extra-regional actors in LAC, the United States might strengthen its diplomatic efforts in LAC to maintain and consolidate its dominance in the region.
文摘The contemporary environment within which command,control,communications,computers and intelligence (C4I platforms exist, have a number of characteristics. These characteristics may be most obviously identified as interconnectivity, international networking, speed of data transfer, the compact nature of electronic information and rapidly changing technology. Information security professionals employ a variety of approaches in order to counter risks within this complex and fluid environment. The gamut of potential security activities ranges form access control through a variety of auditing techniques to secure data communications. This field is broad and well documented. Indeed, the discipline of network risk management and data security is both well developed and sophisticated.This paper addresses twin themes:i.The fundamental issue of the method by which specific approaches are employed. This is a precursor to the adoption of an eventual strategy.ii.The crucial issues revolving around the