45 resultados para Political of security
Resumo:
On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.
Resumo:
The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).
Resumo:
Side-channel attacks (SCA) threaten electronic cryptographic devices and can be carried out by monitoring the physical characteristics of security circuits. Differential Power Analysis (DPA) is one the most widely studied side-channel attacks. Numerous countermeasure techniques, such as Random Delay Insertion (RDI), have been proposed to reduce the risk of DPA attacks against cryptographic devices. The RDI technique was first proposed for microprocessors but it was shown to be unsuccessful when implemented on smartcards as it was vulnerable to a variant of the DPA attack known as the Sliding-Window DPA attack.Previous research by the authors investigated the use of the RDI countermeasure for Field Programmable Gate Array (FPGA) based cryptographic devices. A split-RDI technique wasproposed to improve the security of the RDI countermeasure. A set of critical parameters wasalso proposed that could be utilized in the design stage to optimize a security algorithm designwith RDI in terms of area, speed and power. The authors also showed that RDI is an efficientcountermeasure technique on FPGA in comparison to other countermeasures.In this article, a new RDI logic design is proposed that can be used to cost-efficiently implementRDI on FPGA devices. Sliding-Window DPA and realignment attacks, which were shown to beeffective against RDI implemented on smartcard devices, are performed on the improved RDIFPGA implementation. We demonstrate that these attacks are unsuccessful and we also proposea realignment technique that can be used to demonstrate the weakness of RDI implementations.
Resumo:
A dynamic global security-aware synthesis flow using the SystemC language is presented. SystemC security models are first specified at the system or behavioural level using a library of SystemC behavioural descriptions which provide for the reuse and extension of security modules. At the core of the system is incorporated a global security-aware scheduling algorithm which allows for scheduling to a mixture of components of varying security level. The output from the scheduler is translated into annotated nets which are subsequently passed to allocation, optimisation and mapping tools for mapping into circuits. The synthesised circuits incorporate asynchronous secure power-balanced and fault-protected components. Results show that the approach offers robust implementations and efficient security/area trade-offs leading to significant improvements in turnover.
Resumo:
This article reviews ongoing work to increase awareness of, and raise standards in relation to, freedom of peaceful assembly across Europe, the South Caucasus, and Central Asia. The work is led by the Office of Democratic Institutions and Human Rights (ODIHR) at the Organisation of Security and Co-operation in Europe (OCSE). The article begins by highlighting the importance of freedom of peaceful assembly within democratic societies, and then describes the development of the ODIHR Guidelines on Peaceful Assembly. The article outlines some of the key issues of contention relating to the regulation of freedom of assembly, and discusses the process of reviewing the existing and draft legislation against the standards articulated in the Guidelines. In this context, the article also explores the potential for constructive engagement between government, civil society, and the OSCE to facilitate legislative amendments that respect key human rights norms and principles. Finally, the article reviews recent developments in training monitors of public assemblies with the aim of building local monitoring capacity and thus developing an evidence base of the practical implementation of laws relating to freedom of peaceful assembly. © The Author (2009). Published by Oxford University Press. All rights reserved.
Resumo:
Considerable time, research money and expertise has been spent exploring the complex reality of ethno nationalist conflict and the role that public management plays in supporting the transition from violent conflict to stability, order and prosperity (Esman 1999; Guelke and Milton-Edwards 2000; Brinkerhoff 2005; Brinkerhoff, Wetterberg et al. 2012; Rao 2014). However, there seems to be a gap in relation to the practical challenges of managing change within, through and beyond such conflict. This paper aims to begin the process of putting a framework around the real experience of public management in conflict and transition by shifting the lens of analysis from macros concerns about sequencing interventions (Rao 2014) and legitimate requirements of security, stability and service delivery (Brinkerhoff, Wetterberg et al. 2012) to a micro analysis of the attitudes, behaviours, challenges and compromises held and faced by those public servants on the front line of conflict management and conflict transformation processes. Using senior managers as the unit of analysis and Northern Ireland as an embryonic case study, this paper discusses the links between ethno nationalist societal conflict, public sector reform and manager behaviour. In doing so, it highlights some initial data from an early pilot study into the experiences of individuals in significant public service roles at various stages of the NI conflict / peace process and draws some tentative conclusions about the viability of a wider study.
Resumo:
This article assesses the effect that leveraging civilian defense force militias has on the dynamics of violence in civil war. We argue that the delegation of security and combat roles to local civilians shifts the primary targets of insurgent violence toward civilians, in an attempt to deter future defections, and re-establish control over the local population. This argument is assessed through an analysis of the Sunni Awakening and ancillary Sons of Iraq paramilitary program. The results suggest that at least in the Al-Anbar province of Iraq, the utilization of the civilian population in counterinsurgent roles had significant implications for the targets of insurgent violence.
Resumo:
Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.
Resumo:
Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.
Resumo:
The general consensus on the security-development nexus is that both are key to achieving sustainable peace in war-torn societies. However, this debate has largely taken place among international actors, with little empirical evidence about how security and development relate to each other or are even considered by local actors. The current paper applies the security-development nexus to the case of land restitution in Colombia. Following decades of internal armed conflict, in 2012 the national government passed sweeping land restitution legislation amid on-going violence. Through in-depth interviews and focus groups with multiple actors involved in this process, ranging from international organizations to national government units, from regional institutions to local communities, the paper analyses the objectives, impact, challenges and opportunities for land restitution related to security and development. Undermining peacebuilding, a lack of coherence in the integration of security and development priorities limits the extent to which either supports, or is promoted by, land restitution efforts in Colombia. The paper concludes with reflections on how the security-development nexus may promote peacebuilding amid on-going conflict.
Resumo:
The intention of this article is to provide a structural and operational analysis of policing beyond the police in Northern Ireland. While the polity enjoys low levels of ‘officially’ recorded crime as part of its post-conflict status, little empirical analysis exists as to the epistemological roots of security production outside that of the Police Service of Northern Ireland. The empirical evidence presented seeks to establish that beyond more prominent analyses related to paramilitary ‘policing’, the country is in fact replete with a substantial reservoir of legitimate civil society policing – the collective mass of which contributes to policing, community safety and quality of life issues. While such non-state policing at the level of locale was recognised by the Independent Commission for Policing, structured understandings have rarely permeated governmental or academic discourse beyond anecdotal contentions. Thus, the present argument provides an empirical assessment of the complex, non-state policing landscape beyond the formal state apparatus; examines definitions and structures of such community-based policing activities; and explores issues related to co-opting this non-state security ‘otherness’ into more formal relations with the state.
Resumo:
As an enduring legacy of the conflict, paramilitary policing remains an unpalatable but indisputable fact within Belfast's working-class, Republican communities. Historically, while much attention has been devoted to the causes and consequences of paramilitarism along with the terrorist threat posed by such organizations, little attention has been paid to the influence upon, or relations between, such nonstate policing actors, the communities in which they exist and the delivery of policing by the Police Service of Northern Ireland. While local and international literature surrounding paramilitary violence has tended towards political axiom or physical impact of such activity, the current paper presents an empirical study of the relations between communities and Republican paramilitary organizations who seek to exploit a perceived dearth of state-based policing at the community level within Belfast. Framing the ontology of paramilitary policing and its support from a community, rather than political or security perspective, the paper argues that continuing grass-roots support for this ‘new’ paramilitary policing within Republican communities of Belfast is more complex and nuanced than the political antecedents of the conflict from which such activity emerged – especially in terms of such support surviving successive political negotiations and police reforms since the ‘Good Friday’ Agreement of 1998.
Resumo:
In this paper, a new blind and readable H.264 compressed domain watermarking scheme is proposed in which the embedding/extracting is performed using the syntactic elements of the compressed bit stream. As a result, it is not necessary to fully decode a compressed video stream both in the embedding and extracting processes. The method also presents an inexpensive spatiotemporal analysis that selects the appropriate submacroblocks for embedding, increasing watermark robustness while reducing its impact on visual quality. Meanwhile, the proposed method prevents bit-rate increase and restricts it within an acceptable limit by selecting appropriate quantized residuals for watermark insertion. Regarding watermarking demands such as imperceptibility, bit-rate control, and appropriate level of security, a priority matrix is defined which can be adjusted based on the application requirements. The resulted flexibility expands the usability of the proposed method.
Resumo:
The suggestion that the general economy of power in our societies is becoming a domain of security was made by Michel Foucault in the late 1970s. This paper takes inspiration from Foucault?s work to interpret human rights as technologies of governmentality, which make possible the safe and secure society. I examine, by way of illustration, the site of the European Union and its use of new modes of governance to regulate rights discourse – in particular via the emergence of a new Fundamental Rights Agency. „Governance? in the EU is constructed in an apolitical way, as a departure from traditional legal and juridical methods of governing. I argue, however, that the features of governance represent technologies of government(ality), a new form of both being governed through rights and of governing rights. The governance feature that this article is most interested in is experts. The article aims to show, first and foremost, how rights operate as technologies of governmentality via a new relation to expertise. Second, it considers the significant implications that this reading of rights has for rights as a regulatory and normalising discourse. Finally, it highlights how the overlap between rights and governance discourses can be problematic because (as the EU model illustrates) governance conceals the power relations of governmentality, allowing, for instance, the unproblematic representation of the EU as an international human rights actor