610,394 research outputs found

    Perspective: border security in the age of globalization: how can we protect ourselves without losing the benefits of openness?

    Get PDF
    Border security has become increasingly important since 9-11. Yet the benefits of globalization depend on moving people and goods across national boundaries. How can we improve border security without losing the benefits of openness?National security

    Patterns of information security postures for socio-technical systems and systems-of-systems

    Get PDF
    This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems. Such systems typically span many organisational boundaries, integrating multiple computer systems, infrastructures and organisational processes. The paper describes the motivation for the proposed work, and our approach to the development, specification, integration and validation of security patterns for socio-technical and system-of-system scale systems

    Beyond Boundaries: A Promising New Model for Security and Global Development

    Get PDF
    In 2007, a team of international security experts and researchers at the Henry L. Stimson Center launched an initiative to build an effective model for sustainable nonproliferation of biological, chemical, and nuclear weapons. The project represented an exciting and innovative way of thinking about security: a "dual-use" approach that operated at the nexus of the security and development communities. The team's ingenuity paid off. After less than six years, the Stimson Center is phasing out its involvement in the successful program, which will now be government funded. This paper shows how a novel idea, supported with modest grants from Carnegie Corporation, went on to secure millions in support from international sources, achieving real-world policy wins

    The European Security Industry: A Research Agenda

    Get PDF
    The security industry can be defined, in the first instance, as the industry that produces the goods and services required to protect citizens from insecurity. Yet, this industry, as opposed to defence, has not been an area of intense research. Their boundaries are unclear and the industry is not well characterised. This paper analyses this knowledge gap and presents some ideas for a research agenda for this industry that could assist in unveiling the main features, the potential weaknesses and strengths, and the capability to solve the security needs of society in an efficient and effective way. The paper discusses a definition of this economic sector useful in setting its boundaries, and it briefly describes the main types of industries operating within the sector. It analyses methods for gathering information regarding the industry, customers, and other market agents. Finally, it outlines ways for assessing market performance in terms of the structure-conduct-performance paradigm.security industry, security market, terrorism and organised crime countermeasures, competition, market performance

    Disappearing Legal Black Holes and Converging Domains: Changing Individual Rights Protection in National Security and Foreign Affairs

    Get PDF
    This Essay attempts to describe what is distinctive about the way the protection of individual rights in the areas of national security and foreign affairs has been occurring in recent decades. Historically, the right to protection under the U.S. Constitution and courts has been sharply limited by categorical distinctions based on geography, war, and, to some extent, citizenship. These categorical rules carved out domains where the courts and Constitution provided protections and those where they did not. The institutional design and operating rules of the national security state tracked these formal, categorical rules about the boundaries of protection. There have been many “legal black holes” historically, domains where legal protections did not exist for certain people. Foreign affairs and national security have historically been areas defined by their legal black holes. In recent years, legal black holes are disappearing, and previously distinct domains are converging. The importance of U.S. citizenship to protection under the Constitution and courts is decreasing, formal barriers to legal protection and judicial review based on geography and war are dissolving, and the dissolution of these categorical boundaries is changing the design and operation of the national security state. National security and foreign affairs law is being domesticated and normalized, as rights protections available in ordinary, domestic, peacetime contexts are extended into what were previously legal black holes. The jurisprudence of categorization and boundary-marking is fading away. The core of this Essay identifies, names, and discusses these trends, seeking to give a vocabulary and conceptual and historical coherence to current discussions of individual rights protection in national security and foreign affairs contexts. Secondarily, this Essay suggests some factors that might be driving convergence and closing of legal black holes today. Because most of these potential causal drivers are still exerting their force on the shape of the law, this Essay concludes that the future of national security law will likely see more convergence and fewer black legal holes and then offers several specific predictions

    Disappearing Legal Black Holes and Converging Domains: Changing Individual Rights Protection in National Security and Foreign Affairs

    Get PDF
    This Essay attempts to describe what is distinctive about the way the protection of individual rights in the areas of national security and foreign affairs has been occurring in recent decades. Historically, the right to protection under the U.S. Constitution and courts has been sharply limited by categorical distinctions based on geography, war, and, to some extent, citizenship. These categorical rules carved out domains where the courts and Constitution provided protections and those where they did not. The institutional design and operating rules of the national security state tracked these formal, categorical rules about the boundaries of protection. There have been many “legal black holes” historically, domains where legal protections did not exist for certain people. Foreign affairs and national security have historically been areas defined by their legal black holes. In recent years, legal black holes are disappearing, and previously distinct domains are converging. The importance of U.S. citizenship to protection under the Constitution and courts is decreasing, formal barriers to legal protection and judicial review based on geography and war are dissolving, and the dissolution of these categorical boundaries is changing the design and operation of the national security state. National security and foreign affairs law is being domesticated and normalized, as rights protections available in ordinary, domestic, peacetime contexts are extended into what were previously legal black holes. The jurisprudence of categorization and boundary-marking is fading away. The core of this Essay identifies, names, and discusses these trends, seeking to give a vocabulary and conceptual and historical coherence to current discussions of individual rights protection in national security and foreign affairs contexts. Secondarily, this Essay suggests some factors that might be driving convergence and closing of legal black holes today. Because most of these potential causal drivers are still exerting their force on the shape of the law, this Essay concludes that the future of national security law will likely see more convergence and fewer black legal holes and then offers several specific predictions

    Privacy protocols

    Full text link
    Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels using secure channels. But just like some security protocols can be broken without breaking the underlying cryptography, some privacy protocols can be broken without breaking the underlying security. Such privacy attacks have been used to leverage e-commerce against targeted advertising from the outset; but their depth and scope became apparent only with the overwhelming advent of influence campaigns in politics. The blurred boundaries between privacy protocols and privacy attacks present a new challenge for protocol analysis. Covert channels turn out to be concealed not only below overt channels, but also above: subversions, and the level-below attacks are supplemented by sublimations and the level-above attacks.Comment: 38 pages, 6 figure

    The interface between the area of freedom, security and justice and the common foreign and security policy of the European Union: legal constraints to political objectives

    Get PDF
    This paper argues that the objective of increased foreign policy coherence, as expressed in the Treaty of Lisbon and the Stockholm Programme of the European Union (EU), faces significant legal obstacles. In particular, the blurred boundaries between situations falling within the EU’s competence regarding the so-called Area of Freedom, Security and Justice (AFSJ), on the one hand, and its Common Foreign and Security Policy (CFSP) on the other hand, may give rise to inter-institutional turf battles. This is illustrated with the practice of adopting restrictive sanctions against individuals and non-State entities in the context of the EU’s fight against terrorism

    Facing west, facing north: Canada and Australia in East Asia

    Get PDF
    This report, published by the Centre for International Governance Innovation (CIGI) and the Australian Strategic Policy Institute (ASPI), calls for Canada and Australia to deepen their regional security cooperation in East Asia. The risk of regional instability is growing, due to China’s re-emergence, continued speculation about US strategic engagement in Asia and increased competition over disputed maritime boundaries. These developments provide opportunities for collaboration between countries like Canada and Australia. Non-traditional security threats, including natural disasters, climate change, food security and cyber security, point to a range of areas where the two countries can work more closely together. The report contains several policy recommendations for Canada and Australia to: strengthen regional security bolster regional governance mechanisms enhance bilateral defence cooperation boost defence industry and economic cooperation

    A software approach to defeating side channels in last-level caches

    Full text link
    We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud). Our approach dynamically manages physical memory pages shared between security domains to disable sharing of LLC lines, thus preventing "Flush-Reload" side channels via LLCs. It also manages cacheability of memory pages to thwart cross-tenant "Prime-Probe" attacks in LLCs. We have implemented our approach as a memory management subsystem called CacheBar within the Linux kernel to intervene on such side channels across container boundaries, as containers are a common method for enforcing tenant isolation in Platform-as-a-Service (PaaS) clouds. Through formal verification, principled analysis, and empirical evaluation, we show that CacheBar achieves strong security with small performance overheads for PaaS workloads
    corecore