254 research outputs found

    A 2-Categorical Analysis of the Tripos-to-Topos Construction

    Full text link
    We characterize the tripos-to-topos construction of Hyland, Johnstone and Pitts as a biadjunction in a bicategory enriched category of equipment-like structures. These abstract concepts are necessary to handle the presence of oplax constructs --- the construction is only oplax functorial on certain classes of cartesian functors between triposes. A by-product of our analysis is the decomposition of the tripos-to-topos construction into two steps, the intermediate step being a weakened version of quasitoposes

    Resilience and Resistance 2.0: initial lessons of Ukraine and the implications of resilience and resistance efforts to deter and respond to invasion and occupation by revisionist powers

    Get PDF
    Civil-defence resilience capacities focus on man-made threats to national security. While terror attacks like 9/11 drove civil-defence efforts throughout the 2000s, the Russian invasion of portions of Ukraine in 2014 forced nations to build resilience against new threats. These included covert grey-zone and disinformation operations. Additionally, the 2014 events forced nations bordering or within the sphere of influence of revisionist nations to begin to prepare for possible invasion and occupation. Recognition of these threats resulted in two multinational doctrinal concepts that set the stage for what is collectively referred to as resilience and resistance (R&R). Resilience is the efforts by a nation prior to a conflict to build pre-crisis capacity to resist a host of threats, including invasion and occupation, in hopes of deterring threat actions. If deterrence fails, then the efforts transition into resistance to invasion and occupation. The Russian 2022 invasion of Ukraine demonstrated the need for R&R and the strengths and weaknesses of national resistance in action. This event is a strategic R&R inflection point. Nations developing R&R should reflect on and apply the lessons learned from Ukraine’s efforts and ultimately establish R&R 2.0 as an irregular deterrent on par and mutually supporting conventional and nuclear deterrents

    Deterring Malicious Behavior in Cyberspace

    Get PDF
    Recent incidents reveal cyberattacks are being employed and honed in a systematic, coordinated fashion to achieve the objectives of malicious actors. Deterrence of the wide array of actors in cyberspace is difficult, since deterrence has to work in the mind of the attacker. Each attacker will weigh the effort of the attack against the expected benefit under their own criteria or rationality. This article analyzes whether the contemporary and complementary deterrence strategies of retaliation, denial, and entanglement are sufficient to deter malicious cyber actors or if the alternative of active cyberdefense is necessary and viable

    Cyber Attacks: Proportionality and Precautions in Attack

    Get PDF
    Malicious cyber activities are becoming more and more commonplace, including between nations. This has caused great speculation as to the rules that govern military cyber operations, particularly during armed conflict. The upcoming publication of the Tallinn Manual on the International Law Applicable to Cyber Warfare is indicative of the importance of this discussion. This article analyzes the application of the law of armed conflict principles of proportionality and precautions to cyber operations, including reference to the Tallinn Manual. In most cases, the existing law provides a clear paradigm to govern cyber activities. However, this article identifies several areas where governments and military operators might question how to apply these principles to a specific cyber operation. In these areas, greater precision is needed to provide clear guidance to those who plan, order, and conduct cyber operations

    Structural studies of 'soft' ferroelectrics

    Get PDF

    LEVERAGING INTELLIGENCE AND BIG DATA IN THE MEXICAN NAVY’S PUBLIC SECURITY MISSION

    Get PDF
    When Mexican President López Obrador took office in 2018, he vowed to save the country from violence and corruption. His strategy involves creating a National Guard to fight violence and gradually withdrawing military forces from the cities. However, during its first five years, this force will be formed and trained by the military police of the Mexican Army and Navy. As other countries have leveraged technology and big data in their intelligence-led policing efforts, these tools have the potential to help the Mexican Navy in its mission to restore public security in the country and fight drug-trafficking networks. This thesis poses the question of how the Mexican Navy can implement intelligence-led security methodologies to increase the effectiveness of operations against organized crime and reduce levels of violence in the country. In applying the concepts of action research and contextual analysis of the essential issues manifest in Mexico’s security policy, this thesis examines the existing legal frameworks, policies, and decision-making processes to propose a new methodology to capitalize on the Navy’s strengths and opportunities while mitigating its threats and weaknesses. The thesis concludes with recommendations for Mexico to improve its intelligence-sharing platform using technological solutions and big data.Teniente de Fragata, Mexican NavyApproved for public release. Distribution is unlimited

    Irregular Competition: Contemporary Lessons Learned and Implications for the Future

    Get PDF
    Irregular Competition is defined in this study as “State and non-state actors proactively engaging in activities to influence populations and affect legitimacy during times of peace, competition, and conflict.” The research question asked by this study is “Derived from contemporary case study lessons learned, what are the implications for the future of Irregular Competition in support of greater US national security objectives?” In answering the research question, Hans Morgenthau’s Realist Theory of International Politics was applied, although other aspects of realism and theories of international relations theory were considered. The rationale for this study is that despite a general reprioritization toward conventional concerns espoused in current US national security strategy documents, America’s state and non-state adversaries continue to operate globally with malign intent through unconventional methods. This qualitative, inductive, grounded-theory research centers on the linear-analysis of three cases: US Irregular Competition activities to undermine the Soviet Union in Afghanistan, 1979-1989; US Irregular Competition activities directed toward Iran, 2001-2021; Chinese Irregular Competition against the Philippines, 2012-2021. A summary of case study lessons learned as well as theoretical, practical, and empirical implications for the future are presented. The three primary academic contributions of this research to the body of knowledge on this subject are: (1) A new definition of Irregular Competition is provided along with an explanation for its need (2) Analysis of whether a distinct, Chinese, International Relations (IR) theory exists in the specific context of Irregular Competition (3) A unique theoretical model for conceptualizing whole-of-government Irregular Competition is constructed

    UAS Pilots Code – Annotated Version 1.0

    Get PDF
    The UAS PILOTS CODE (UASPC) offers recommendations to advance flight safety, ground safety, airmanship, and professionalism.6 It presents a vision of excellence for UAS pilots and operators, and includes general guidance for all types of UAS. The UASPC offers broad guidance—a set of values—to help a pilot interpret and apply standards and regulations, and to confront real world challenges to avoid incidents and accidents. It is designed to help UAS pilots develop standard operating procedures (SOPs), effective risk management,7 safety management systems (SMS), and to encourage UAS pilots to consider themselves aviators and participants in the broader aviation community
    corecore