6 research outputs found

    Enabling NATO’s Collective Defense: Critical Infrastructure Security and Resiliency (NATO COE-DAT Handbook 1)

    Get PDF
    In 2014 NATO’s Center of Excellence-Defence Against Terrorism (COE-DAT) launched the inaugural course on “Critical Infrastructure Protection Against Terrorist Attacks.” As this course garnered increased attendance and interest, the core lecturer team felt the need to update the course in critical infrastructure (CI) taking into account the shift from an emphasis on “protection” of CI assets to “security and resiliency.” What was lacking in the fields of academe, emergency management, and the industry practitioner community was a handbook that leveraged the collective subject matter expertise of the core lecturer team, a handbook that could serve to educate government leaders, state and private-sector owners and operators of critical infrastructure, academicians, and policymakers in NATO and partner countries. Enabling NATO’s Collective Defense: Critical Infrastructure Security and Resiliency is the culmination of such an effort, the first major collaborative research project under a Memorandum of Understanding between the US Army War College Strategic Studies Institute (SSI), and NATO COE-DAT. The research project began in October 2020 with a series of four workshops hosted by SSI. The draft chapters for the book were completed in late January 2022. Little did the research team envision the Russian invasion of Ukraine in February this year. The Russian occupation of the Zaporizhzhya nuclear power plant, successive missile attacks against Ukraine’s electric generation and distribution facilities, rail transport, and cyberattacks against almost every sector of the country’s critical infrastructure have been on world display. Russian use of its gas supplies as a means of economic warfare against Europe—designed to undermine NATO unity and support for Ukraine—is another timely example of why adversaries, nation-states, and terrorists alike target critical infrastructure. Hence, the need for public-private sector partnerships to secure that infrastructure and build the resiliency to sustain it when attacked. Ukraine also highlights the need for NATO allies to understand where vulnerabilities exist in host nation infrastructure that will undermine collective defense and give more urgency to redressing and mitigating those fissures.https://press.armywarcollege.edu/monographs/1951/thumbnail.jp

    Investigation of mobile devices usage and mobile augmented reality applications among older people

    Get PDF
    Mobile devices such as tablets and smartphones have allow users to communicate, entertainment, access information and perform productivity. However, older people are having issues to utilise mobile devices that may affect their quality of life and wellbeing. There are some potentials of mobile Augmented Reality (AR) applications to increase older users mobile usage by enhancing their experience and learning. The study aims to investigate mobile devices potential barriers and influence factors in using mobile devices. It also seeks to understand older people issues in using AR applications

    Data, Debt & Daemons: Systemic Asymmetries on Spaceship Earth

    Get PDF
    Day by day, the rate at which we create new data increases exponentially. Our capacity to learn cannot keep up. We are tiny members of a vast universal network, incapable of discerning cause and effect. Instead, we develop simplified narratives, leaving ourselves misguided yet complacent. The information management trade of both physical and intellectual property has become more vital to global economies than ever, replacing physical resources and manufacturing. Through our deepening reliance on specialization, we forfeit agency over our own homes while accruing unprecedented debt. Housing costs have risen dramatically compared to wages, despite reportedly successful economies. Citizens were supposed to have the ability to participate in financial markets using their property as collateral. This seduced many into the ideologies of unregulated capitalism. However, by the 21st century, these systems had become unrecognizable mutilations of their intended designs. The momentum we have gathered in the past century has thrust us on an unsustainable trajectory we have little hope of predicting. We laid the foundation for Western economic dominance with technology, monetary policy, and globalization, but we did so using incentive structures that exacerbated wealth inequality. These systems integrate digital technology into both our physical and virtual spaces, operating on invisible planes that bypass our senses. The radical novelty of computers has entangled us in niche engineered concepts that few understand. They create a lack of accountability in Big Tech that policy-makers are ill-prepared for. We cannot ensure an equitable distribution of the leverage or stakes when we entrust brokers, politicians, traders, and captains of industry to make complex decisions for us without bearing the risks of their consequences. Our long-term welfare, including our future habitation on this planet, is not visceral enough to force effective reform. Both our physical and our digital spaces are designed, built, evaluated, and monitored on asymmetric principles, causing disasters that future generations and the least fortunate always pay for. How did we normalize this moral hazard? How can digital systems born out of frustration with modern policy combat these issues, without disrupting the benefits of a techno-utopia? How can they promote efficiency, security, and transparency in the spaces we call home

    Towards a Peaceful Development of Cyberspace - Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of Cyberweapons

    Get PDF
    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace
    corecore