2,329 research outputs found

    Endnotes

    Get PDF
    Endnote

    Explosive Weapon Effects

    Get PDF
    Motivated by its strategic goal to improve human security and equipped with subject expertise in explosive hazards, the GICHD launched a research project to characterise explosive weapons. The GICHD perceives the debate on explosive weapons in populated areas (EWIPA) as an important humanitarian issue. The aim of this research into explosive weapons characteristics and their immediate, destructive effects on humans and structures, is to help inform the ongoing discussions on EWIPA, intended to reduce harm to civilians. The intention of the research is not to discuss the moral, political or legal implications of using explosive weapon systems in populated areas, but to examine their characteristics, effects and use from a technical perspective

    The Improbable Militarist: Jimmy Carter, the Revolution in Military Affairs and Limits of the American Two-Party System

    Get PDF
    Jimmy Carter is known for championing peace and pro-democracy causes in his post-presidency and is widely respected as a moral leader. Few Americans, however, are aware of the fact that in his last two years, Carter presided over a huge increase of the military budget that amounted to the largest in history to that point and promoted the adoption of fancy new military technologies which would be applied in wars waged by his successors. This paper examines Carter’s foreign policy and his embrace of the so-called Revolution in Military Affairs (RMA), which aimed to reinvigorate American military power after Vietnam through the embrace of the digital revolution, and development of new precision guided weapons, stealth bombers and drone warfare capabilities. Neglected in many academic studies, the RMA, with its emphasis on precision-guided strikes and “smart weapons,” built on long-standing techno-fanaticism in U.S. culture which prioritized technical solutions to major social problems, in this case the prospect of American imperial decline after Vietnam. It in turn complemented Carter’s human rights agenda in its aim of facilitating a more “activist foreign policy” by fostering the illusion that future wars could be waged cleanly and with limited collateral damage

    Conceptual Model for Bomb Victims Information System (BVIS) In Iraq Using WAP Standard

    Get PDF
    Many Iraqis have died resulting from insurgent bombings, revenge killings and U.S. military intervention during the 2003 invasion. This situation led to the destabilization of the security in the country and increased the number of dead and missing, making the search for missing loved ones very complex. To find a missing person, many procedures needed to be satisfied, one of which is to search in the area of bomb explosion, in the casualties section of the hospitals and in the police stations. Moreover, the Iraqis who are killed by terrorists are published in the newspapers but they do not account for all the victims and their information are imprecise. Wireless Application Protocol (WAP) is a technology that may provide the solution to problem of looking for loved ones. WAP is characterized as easy, fast delivery of relevant information and services to mobile users. It is a secure technology allowing users to access instant information through wireless handheld devices like mobile phones, pagers, two-way radios, smart phones and communications. The goal of the present study is to develop a conceptual design model of Bomb Victims Information System (BVIS) through the use of WAP Standard to provide information regarding Iraqi bomb victims

    The Threat of Plant Toxins and Bioterrorism: A Review

    Get PDF
    The intentional use of highly pathogenic microorganisms, such as bacteria, viruses or their toxins, to spread mass-scale diseases that destabilize populations (with motivations of religious or ideological belief, monetary implications, or political decisions) is defined as bioterrorism. Although the success of a bioterrorism attack is not very realistic due to technical constraints, it is not unlikely and the threat of such an attack is higher than ever before. It is now a fact that the capability to create panic has allured terrorists for the use of biological agents (BAs) to cause terror attacks. In the era of biotechnology and nanotechnology, accessibility in terms of price and availability has spread fast, with new sophisticated BAs often being produced and used. Moreover, there are some BAs that are becoming increasingly important, such as toxins produced by bacteria (e.g., Botulinum toxin, BTX), or Enterotoxyn type B, also known as Staphylococcal Enterotoxin B (SEB)) and extractions from plants. The most increasing records are with regards to the extraction / production of ricin, abrin, modeccin, viscumin and volkensin, which are the most lethal plant toxins known to humans, even in low amounts. Moreover, ricin was also developed as an aerosol biological warfare agent (BWA) by the US and its allies during World War II, but was never used. Nowadays, there are increasing records that show how easy it can be to extract plant toxins and transform them into biological weapon agents (BWAs), regardless of the scale of the group of individuals

    Technological Perspectives of Countering UAV Swarms

    Get PDF
    Conventional AD systems have been found less effective for countering UAVs and loitering munitions. Thishas necessitated the development of counter-UAV systems with different functionalities. A cluster of armed UAVsas swarm formations has further rendered the conventional AD systems far from effective, emphasizing the need to consider countering swarms as the most crucial element in new-generation aerial threat mitigation strategies. In this paper, the capabilities of UAV swarms and vital military assets exposed to such attacks are identified. To protect the vital assets from aerial swarm threats, ideal system characteristics of a counter-UAV (C-UAV) swarm system to overcome the challenges are discussed. Currently available acquisition & engagement technology is analyzed and the application of these systems to counter swarm applications is brought out. New requirements are discussed and a conceptual design of a layered system is derived which can handle a large spectrum of aerial threats including a swarm of UAVs. This system is expected to have a higher rate of engagement and can be designed with low-cost network-integrated systems

    The New Way of War: Is There A Duty to Use Drones?

    Get PDF
    Part I of this Article briefly describes the newest battlespace occupants. Robotic systems have been taking active part in combat. They now inhabit the air, the land, and the sea. They carry out missions ranging from surveillance and bomb disposal to “destroy and disable.” Part II examines the relevant principles of LOAC. It argues that drones are not, per se, unlawful under LOAC. Rather, the critical question is the same for drones as for other types of weapons, i.e., whether the specific use of the weapon complies with LOAC. In this context, the weapon must be deployed in accordance with LOAC’s fundamental principles of humanity, proportionality, distinction, taking precautions, and military necessity. Even if a specific type of weapon is not unlawful per se (or has not been specifically prohibited by particular treaties), it may not be used improperly, e.g., in a manner that would run afoul of these principles. Part III applies the principles of LOAC to drones. First, it analyzes the general trajectories of the development of new weapons throughout human history, which has involved trading off between three main considerations, namely distance, accuracy, and lethality. Second, it examines the rise of precision-guided munitions as an attempt to balance these three considerations, increasing military efficiency while minimizing harm to civilians and civilian objects. Part IV discusses the ability of drones to combine both remote exercise of force and high accuracy to reduce lethality. Part IV also closely examines both the promised benefits that the use of drones may bring to battlespace and the challenges to their deployment. Part V returns to the question of whether states and their military commanders have an obligation to use drones in the context of an armed conflict. It argues that although there are no treaties that deal specifically with the use of drones in armed conflict and no customary norms obligating the use of drones, such a duty may be derived from the cardinal principles of the law of armed conflict. It suggests that such an interpretation is merited if we accept that drones offer the possibility of a more humane war by combining remote and accurate use of force to reduce lethality among both friendly forces and innocent civilians. Part V concludes by setting out further challenges that ought to receive careful attention in developing and elaborating on the obligation to use drones in the battlefield

    Target Lists: A 1923 Idea with Applications for the Future

    Get PDF

    Future Implications of Emerging Disruptive Technologies on Weapons of Mass Destruction

    Get PDF
    This report asks the questions: What are the future implications of Emerging Disruptive Technologies (EDTs) on the future of Weapons of Mass Destruction (WMD) warfare? How might EDTs increase the lethality and effectiveness of WMDs in kinetic warfare in 2040? How can civic leaders and public servants prepare for and mitigate projected threats? Problem  In the coming decade, state and non-state adversaries will use EDTs to attack systems and populations that may initiate and accelerate existing geopolitical conflict escalation. EDTs are expected to be used both in the initial attack or escalation as well as a part of the detection and decision-making process. Due to the speed of EDTs, expected confusion, and common lack of human oversight, attacks will also be incorrectly attributed, which has the capacity to escalate rapid geopolitical conflict to global military conflict, and ultimately, to the use of nuclear WMDs. The use of EDTs in the shadow of nuclear WMDs is also expected to create an existential threat to possible adversaries, pushing them to “lower the bar” of acceptability for using nuclear WMDs. EDTs will enable and embolden insider threats, both willing and unknowing, to effect geopolitical conflict on a global scale. In addition, the combination of multiple EDTs when used together for attacks will create WMD effects on populations and governments. Furthermore, EDTs will be used by adversaries to target and destabilize critical infrastructure systems, such as food, energy, and transportation, etc. that will have a broader effect on populations and governments. EDTs will enable adversaries to perpetrate a long-game attack, where the effect and attribution of the attack may not be detected for an extended period -- if ever. Solution  To combat these future threats, organizations will need to conduct research and intelligence gathering paired with exploratory research and development to better understand the state of EDTs and their potential impacts. With this information, organizations will need to conduct collaborative “wargaming” and planning to explore a range of possible and potential threats of EDTs. The knowledge gained from all of these activities will inform future training and best practices to prepare for and address these threats. Organizations will also need to increase their investments in EDT related domains, necessitating countries to not only change how they fight, but also evolve their thinking about deterrence. Expanded regulation, policy making, and political solidarity among members will take on an increasingly more significant and expanded role. Broader government, military, and civilian cooperation will be needed to disrupt and mitigate some of these future threats in conjunction with broader public awareness. All of these actions will place a higher value on cooperation and shared resiliency among NATO members
    corecore