3,897 research outputs found

    Evolutionary Roots of Property Rights; The Natural and Cultural Nature of Human Cooperation

    Get PDF
    Debates about the role of natural and cultural selection in the development of prosocial, antisocial and socially neutral mechanisms and behavior raise questions that touch property rights, cooperation, and conflict. For example, some researchers suggest that cooperation and prosociality evolved by natural selection (Hamilton 1964, Trivers 1971, Axelrod and Hamilton 1981, De Waal 2013, 2014), while others claim that natural selection is insufficient for the evolution of cooperation, which required in addition cultural selection (Sterelny 2013, Bowles and Gintis 2003, Seabright 2013, Norenzayan 2013). Some scholars focus on the complexity and hierarchical nature of the evolution of cooperation as involving different tools associated with lower and the higher levels of competition (Nowak 2006, Okasha 2006); others suggest that humans genetically inherited heuristics that favor prosocial behavior such as generosity, forgiveness or altruistic punishment (Ridley 1996, Bowles and Gintis 2004, Rolls 2005). We argue these mechanisms are not genetically inherited; rather, they are features inherited through cultural selection. To support this view we invoke inclusive fitness theory, which states that individuals tend to maximize their inclusive fitness, rather than maximizing group fitness. We further reject the older notion of natural group selection - as well as more recent versions (West, Mouden, Gardner 2011) – which hold that natural selection favors cooperators within a group (Wynne-Edwards 1962). For Wynne-Edwards, group selection leads to group adaptations; the survival of individuals therefore depends on the survival of the group and a sharing of resources. Individuals who do not cooperate, who are selfish, face extinction due to rapid and over-exploitation of resources

    The Land, Space, and Cyberspace Nexus: Evolution of the Oldest Military Operations in the Newest Military Domains

    Get PDF
    Over the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph examines the relationships among these domains and how they apply to U.S. Army and joint warfighting. It concentrates on the central question: How are U.S. military operations in the newest domains of space and cyberspace being integrated with operations in the traditional domain of land? This inquiry is divided into three major sections: • Existing Doctrine: This section presents an overview of the current state of joint and U.S. Army doctrinal development for each of the domains of land, space, and cyberspace. • Operations in Multiple Domains: This section examines the concept of cross-domain synergy and its ability to enhance globally integrated operations. • Future Operations: This section explores probable future operating environments as well as the resulting implications for U.S. Army and joint force development. It includes recommendations for policymakers and senior leaders regarding the future development and integration of space and cyberspace doctrine. Anticipated future trends favor the decreased emphasis on traditional large-scale land operations and increased frequency and intensity of conflict in space and cyberspace, perhaps even where these newer domains may become preeminent for a given operation. The joint staff’s pursuit of achieving cross-domain synergy in planning and operations offers a credible method to face some of the challenges of the future joint force, but this will likely remain an evolutionary vice revolutionary endeavor.https://press.armywarcollege.edu/monographs/1399/thumbnail.jp

    Department of Defense Dictionary of Military and Associated Terms

    Get PDF
    The Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components

    Complex Terrain: Megacities and the Changing Character of Urban Combat

    Get PDF

    BUILDING PARTNER CAPACITY FOR UNCONVENTIONAL DETERRENCE: A SYSTEMS APPROACH FOR ASYMMETRIC DEFENSE IN TAIWAN

    Get PDF
    Building partner capacity (BPC) is a vital strategic tool for the U.S. to compete with great power adversaries and deter aggression against partners and allies. But security partnerships and alliances are unique and complex adaptive systems; they display certain characteristics at the local level that lead to non-linear, system-wide emergent properties over time. Currently, the Joint Force and SOF enterprise lack a systems-based approach to develop and implement effective BPC strategies for great power competition (GPC). This thesis presents a systems approach to the trilateral relationship between Taiwan, China, and the U.S. in order to develop a common framework for BPC in the context of deterrence and GPC. Conventional "deterrence by punishment" strategies for Taiwan primarily focus on high-end arms sales, but an unconventional "deterrence by denial" strategy focused on civil resilience and threats of organized resistance could deter China by rendering its relative military superiority irrelevant, protracting a fait accompli indefinitely, and sabotaging its grand strategy. The Asymmetric Warfare Group's (AWG) advisory support in Taiwan as well as the Resistance Operating Concept (ROC) and NSHQ's Comprehensive Defence Handbook (CDH) provide ready-made frameworks to build Taiwan's capacity for resilience, resistance, and asymmetric defense. Additionally, strategic communication and deception through a continued policy of "strategic ambiguity" are essential elements.Major, United States ArmyApproved for public release. Distribution is unlimited

    Complex Terrain

    Get PDF
    This edited volume, composed by military professionals in the Gray Scholars Program at Marine Corps University, describes the changing character of urban operations. The pattern of human settlement and interaction is changing and the future is urban. Because the majority of the world’s population lives within cities, the future of strategic competition and conflict reside there as well. The density and connectivity of urban environments create a new type of complex terrain. Interests change from neighborhood to neighborhood, often intersecting global, political, and economic networks. Each city block sees shifting allegiances that often seem unclear from the outside. The cityscape compresses time and space while increasing uncertainty and complicating the conduct of military operations

    Classifying resilience approaches for protecting smart grids against cyber threats

    Get PDF
    Smart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are caused by the usage of heterogeneous communication technologies and their distributed nature. While preventing or detecting cyber attacks is a well-studied field of research, making SG more resilient against such threats is a challenging task. This paper provides a classification of the proposed cyber resilience methods against cyber attacks for SG. This classification includes a set of studies that propose cyber-resilient approaches to protect SG and related cyber-physical systems against unforeseen anomalies or deliberate attacks. Each study is briefly analyzed and is associated with the proper cyber resilience technique which is given by the National Institute of Standards and Technology in the Special Publication 800-160. These techniques are also linked to the different states of the typical resilience curve. Consequently, this paper highlights the most critical challenges for achieving cyber resilience, reveals significant cyber resilience aspects that have not been sufficiently considered yet and, finally, proposes scientific areas that should be further researched in order to enhance the cyber resilience of SG.Open Access funding provided thanks to the CRUE-CSIC agreement with Springer Nature. Funding for open access charge: Universidad de Málaga / CBUA

    TIME FOR A COAST GUARD OPERATING CONCEPT

    Get PDF
    The Coast Guard is a military service whose role is broader, and less defined, than other services, since it encompasses military missions, law enforcement, search and rescue, marine safety and other statutory missions. The Navy’s role is to attain command of the seas, the Army’s to occupy and hold land in support of national objectives, the Air Force's to attain air supremacy, the Space Force's to attain space supremacy, and the Marine Corps' to project power from the sea in support of naval strategy and national objectives. These services have a culture that is best adapted to conventional, high-end, nation-state conflict, and while they fight unconventionally when necessary, the institutional preference is for conventional conflict. Despite instances throughout history where these services regularly conduct Phase 0 (shaping the operational environment) theater cooperation, partner building, and humanitarian/disaster relief operations, these activities are nested within a military culture focused on national defense. Coast Guard capabilities focused on stability are underutilized in the Joint Force construct, which spreads stabilization efforts across the services despite their focus on conventional nation-state conflict.Commander, United States Coast GuardApproved for public release. Distribution is unlimited

    A Systematic Review of the State of Cyber-Security in Water Systems

    Get PDF
    Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence. Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial espionage and sabotage against these systems. In this paper, we review the state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure. We cover the publication statistics of the research in this area, the aspects of security being addressed, and future work required to achieve better cyber-security for water systems
    • …
    corecore