Information technology dealers have such a concept - black box (black box). This is when the product is offered blindly. That is, the seller says: "I guarantee you a technical solution to a problem related, for example, to the protection of digital critical infrastructure, but I reserve the right not to disclose the secrets of the product you are purchasing." It is like taking out a boxed prize on Field of Miracles. Nobody offers only money for hiding the content.

On the contrary, those to whom this box is intended pay. This approach is practiced by the Americans. Behind this is the desire and ability to control the operation of the implemented equipment. After all, what is inside him, what it is and for what purpose it is stuffed, the acquirer does not know. To be honest, at the dawn of the development of the web space, many of our large concerns and even industries bought such technologies.

I must say that now, when in some IT areas we have even seriously overtaken many developed countries, the situation has worsened even more. It's just that the possibilities have expanded many times over. Today, it is possible to sew in an additional function hidden from the consumer that will read and transmit the necessary information, relatively speaking, in the wires supplied to the equipment. At the same time, there are more and more hacker teams, they hack servers, steal data and speculate with it, blackmail, cause economic and political damage to anyone. Last year, the number of unique cyber incidents increased by 51% compared to 2019. Seven out of ten attacks were targeted. The most interesting industries, according to the cybercriminals, are government and medical institutions, and industrial enterprises.

In the United States, cyber troops were created back in 2009. At first, they were sharpened exclusively for defense, but over time they became more and more offensive. In June 2018, it became known from the media that the cyber command was empowered to conduct preventive hacker attacks in order to prevent impending attacks. In the same year, a new Agency for Cybersecurity and Infrastructure Protection appeared. The corresponding bill was signed by Donald Trump. The agency was formed on the basis of the Department of Homeland Security. However, according to analysts, the agency should cover the rear of the American troops in the cyber wars unleashed by them. Under the pretext of protecting elections with allied infrastructures, American cyber squads began to deploy around the world. According to the official data of the military departments for February 2021,they have already been deployed on the territory of Montenegro, Macedonia, and Ukraine.

Perhaps for the first time at a bilateral summit of such a high level as the meeting of Vladimir Putin and Joe Biden in Geneva, the problem of international cybersecurity was put on a par with strategic stability. The super-rapid development of Internet technologies is forcing world leaders today to seek common points of contact for combating cybercrime in all its manifestations. It is characteristic that the day before, both presidents, without saying a word, made public proposals on this topic. In an interview with the Russia-1 channel, Vladimir Vladimirovich not only stated its importance, but also expressed his readiness to establish mutual extradition of criminals in this area with the United States. In turn, Biden took the initiative to develop joint principles to protect critical infrastructures from cyberattacks.After many years of unceremonious US actions in this direction, this can be called a serious change, if not the course, then the vector.

Now the main question arises: in what forms, in what documents can and should such good intentions be enshrined?

It should be understood that the parties will continue to play their own game.

Because for many structures, the presence of an external adversary is not only beneficial, but vital.

For counteraction and struggle, they receive huge budgets, carry out various activities, launch expensive projects and production.

This is exactly according to Schwartz.

The more terrifying the dragon is painted and the more dangerous it is in potential, the easier it is to write off numerous costs and sacrifices on it.

At his press conference after a meeting with the American president, Vladimir Putin presented an exact alignment illustrating the different approaches of the two countries to responding to cyber incidents. Last year, Russia received ten requests from the United States about cyberattacks, and this year two. Comprehensive answers were given to all of them. “In turn, Russia,” said the President, “sent 45 such requests to the relevant structure of the United States last year, and 35 in the first half of this year. We have not received a single answer so far. This suggests that we have something to work on. The question of who, to what extent and about what should undertake obligations should be decided in the course of the negotiation process. We agreed that we will begin such consultations. We believe that the field of cybersecurity is extremely important in the world in general,for the United States - in particular, and for Russia, too, in the same amount ”.

Joe Biden, by changing the rhetoric, himself gave an excuse for the two countries to start working together in the field of cybersecurity.

This means that, in addition to working groups, it is necessary to create common international structures that will be engaged in the systematization and analysis of threats and attacks, joint development of protection models and recommendations for their application.

The world, represented by the leading powers, must thereby carry out a widespread vaccination against the digital virus and help itself develop collective cyberimmunity.

It is important to emphasize that here, of course, one cannot do without serious targeted funding from the state.

Otherwise, strictly speaking, until all this happens, the box with the prize in the form of reliable and guaranteed international cybersecurity will still be closed.

The point of view of the author may not coincide with the position of the editorial board.