60,397 research outputs found

    Not quite the 'Great Britain of the Far East': Japan's security, the US-Japan alliance and the 'war on terror' in East Asia

    Get PDF
    Japan, in responding to US expectations for support in the 'war on terror', has displayed a degree of strategic convergence on global security objectives, thus prompting policy-makers and observers to dub it the 'Great Britain of the Far East'. This article argues, however, that Japan is far from assuming this role. For Japan, the 'war on terror' serves more as a political pretext for legitimating long-planned changes in military security policy that are often only marginally related to the US's anti-terrorism agenda. Instead, Japan has focused much more on using the terror threat rationale as a means to push forward its response to the regional and traditional security challenges of North Korea and China, even if at times it attempts to depict both as 'new security challenges' or as involving elements of counterterrorism. The final conclusion is that US military hegemony may be weakened by Japan's and the Asia-Pacific's potential divergence from the US global security agenda

    Dimension-8 Operators in the Standard Model Effective Field Theory

    Full text link
    We present a complete basis of dimension-8 operators in the Standard Model Effective Field Theory. Attention is paid to operators that vanish in the absence of flavor structure. The 44,807 operators are encoded in 1,029 Lagrangian terms. We also briefly discuss a few aspects of phenomenology involving dimension-8 operators, including light-by-light scattering and electroweak precision data.Comment: 50 pages, 21 tables; v4: added missing contribution to matching in Eq. (5.19). T parameter calculation unchange

    Reflections on globalisation, security and 9/11

    Get PDF
    The study of globalisation carries important conceptual insights into the contemporary security agenda following the events of September 11th 2001 ('9/11'). This article argues that globalisation can be defined in a variety of ways, ranging from liberalisation to Westernisation, and can also be extended into concepts of supra-territorialisation. In combination, these definitions help to explain the generation of 9/11 style-conflict by providing the political-economic motivation for hyper-terrorism, by facilitating the political identities and activities of non-state actors; and by creating an environment for the global reach of terror movements. Additionally, the interconnection between globalisation and security can be seen in the response of the United States to 9/11 and its striving to project military power on a global scale with declining reference to time and geographical distance, and the varied ability of sovereign states to respond to the challenge of trans-sovereign security problems in the future

    Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems

    Get PDF
    There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation, maritime, rail and power-generation infrastructures has created common, vulnerabilities. In consequence, more people now possess the technical skills required to identify and exploit vulnerabilities in safety-critical systems. Arguably for the first time there is the potential for cross-modal attacks leading to future ā€˜cyber stormsā€™. This situation is compounded by the failure of public-private partnerships to establish the cyber-security of safety critical applications. The fiscal crisis has prevented governments from attracting and retaining competent regulators at the intersection of safety and cyber-security. In particular, we argue that superficial similarities between safety and security have led to security policies that cannot be implemented in safety-critical systems. Existing office-based security standards, such as the ISO27k series, cannot easily be integrated with standards such as IEC61508 or ISO26262. Hybrid standards such as IEC 62443 lack credible validation. There is an urgent need to move beyond high-level policies and address the more detailed engineering challenges that threaten the cyber-security of safety-critical systems. In particular, we consider the ways in which cyber-security concerns undermine traditional forms of safety engineering, for example by invalidating conventional forms of risk assessment. We also summarise the ways in which safety concerns frustrate the deployment of conventional mechanisms for cyber-security, including intrusion detection systems
    • ā€¦
    corecore