The aim of the scientific article is to reveal motives and features of using private military companies in Russian Federation foreign and security policy in 2014-2019. In order to do so, qualitative research method is applied, using case analysis method. From the analysis of the motives for the use of private military companies and conventional forces, it can be said that they are similar, as the use of both military structures allows to achieve more or less the same interests. However, it was observed that in terms of the specifics of the forces and the diversity scheme of social deviations, private military and security companies are more similar to regular forces. Nevertheless, both types of private companies help Russia avoid direct liability for various violations of the law. Considering the case of Russia analyzed in the study, the factors explained in the microtheory are adjusted, supplemented and interrelated. The analysis found that not all regions that are far from Russia are financially beneficial, but strategically, all give Russia an advantage over the United States.
This work is beneficial for researchers doing study cases on Russian Federation foreign and security policy. Due to the novelty and relevance of the research object, a new microtheory in political science has been applied. Research is carried out using principal-agent theory which was only used analyzing US case.
The world faces new challenges and threats to international security environment, among which a key role play different types of cyberthreats. This follows, primarily the global links in a cyberspace in terms of critical infrastructure of the state’s and intergovernment’s objects in the international security environment and the fact that the cyberaggressor’s tools are becoming cheaper, and their skills are more and more advanced. There is an urgent need for the analysis of present and future cyberthreats in the security environment, to understand their impact on everone, States, Nations and organizations and develop effective methods of response in this highly complex reality. The article presents the concept of defining of main types of cyberhreats (i.e. information warfare, cyberterrorism, cybercrime and cyberespionage) on the base of the new theoretical approach of modern security environment model.