805 resultados para National security
Resumo:
September 11 has originated a wide range of artistic manifestations which have not only searched for plausible explanations for the tragedy, but also tried to review the events. In this sense, this paper aims at showing how a novel reevaluates this episode. The attacks made the United States experience a strong sense of vulnerability, triggering reactions from the American government, whose quick action was translated into a new national security strategy, associated with the war on terror. This paper analyzes the narrative strategies employed by the American author Don DeLillo in his novel Falling Man (2007) in order to reevaluate that tragedy. The debate of the topics is based on texts concerning the relationship between literature and history, postmodern fiction and issues on terrorism. This study contributes to enrich the discussion related to the events that led to the catastrophe and its aftermath, examining characters and groups linked to the September 11 terrorist attacks, revealing multiple truths subjected to social, ideological and historical conditions.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Resumo:
Under President Ronald Reagan, the White House pursued a complex foreign policy towards the Contras, rebels in trying to overthrow the Sandinista regime in Nicaragua, in Nicaragua. In 1979, the leftist Sandinista government seized power in Nicaragua. The loss of the previous pro-United States Somoza military dictatorship deeply troubled the conservatives, for whom eradication of communism internationally was a top foreign policy goal. Consequently, the Reagan Administration sought to redress the policy of his predecessor, Jimmy Carter, and assume a hard line stance against leftist regimes in Central America. Reagan and the conservatives within his administration, therefore, supported the Contra through military arms, humanitarian aid, and financial contributions. This intervention in Nicaragua, however, failed to garner popular support from American citizens and Democrats. Consequently, between 1982 and 1984 Congress prohibited further funding to the Contras in a series of legislation called the Boland Amendments. These Amendments barred any military aid from reaching the Contras, including through intelligence agencies. Shortly after their passage, Central Intelligence Agency Director William Casey and influential members of Reagan¿s National Security Council (NSC) including National Security Advisor Robert McFarlane, NSC Aide Oliver North, and Deputy National Security Advisor John Poindexter cooperated to identify and exploit loopholes in the legislation. By recognizing the NSC as a non-intelligence body, these masterminds orchestrated a scheme in which third parties, including foreign countries and private donors, contributed both financially and through arms donations to sustain the Contras independently of Congressional oversight. This thesis explores the mechanism and process of soliciting donations from private individuals, recognizing the forces and actors that created a situation for covert action to continue without detection. Oliver North, the main actor of the state, worked within his role as an NSC bureaucrat to network with influential politicians and private individuals to execute the orders of his superiors and shape foreign policy. Although Reagan articulated his desire for the Contras to remain a military presence in Nicaragua, he delegated the details of policy to his subordinates, which allowed this scheme to flourish. Second, this thesis explores the individual donors, analyzing their role as private citizens in sustaining and encouraging the policy of the Reagan Administration. The Contra movement found non-state support from followers of the New Right, demonstrated through financial and organizational assistance, that allowed the Reagan Administration¿s statistically unpopular policy in Nicaragua to continue. I interpret these donors as politically involved, but politically philanthropic, individuals, donating to their charity of choice to further the principles of American freedom internationally in a Cold War environment. The thesis then proceeds to assess the balance of power between the executive and other political actors in shaping policy, concluding that the executive cannot act alone in the formulation and implementation of foreign policy.
Resumo:
There is interest in developing a reliable, sustainable, domestic U.S. biofuels industry. A domestic biofuels industry has the potential to provide economic, environmental, and national security benefits on a local, regional, national, and global level. The Mascoma Corporation plans to develop a cellulosic ethanol facility in Michigan’s eastern Upper Peninsula. The primary feedstock of the plant site would be trees sourced within a 150 mile supply radius. In the eastern Upper Peninsula, this radius encompasses Alger, Chippewa, Delta, Luce, Mackinac, and Schoolcraft counties. In these six counties there are 1,320,500 acres of NIPF (non-industrial private forestlands). These acres account for 40% of the total timberland in these six counties. Thus it is likely that in order for the successful implementation of a cellulosic ethanol facility the support of local NIPF owners will be necessary. This thesis presents research on how eastern Upper Peninsula forest landowners think about and manage their land. It is based on 48 in-depth interviews with these landowners. The goal was to determine how landowner values and beliefs, on a variety of issues including wildlife management, land management, biofuels development, and climate change, are expressed through both their current management decisions, and possibly their future land management decisions. Some of the values articulated by the landowners in this study included biodiversity protection, conservation of healthy game populations, and the production of high-value timber. Understanding the values and beliefs of landowners in the eastern Upper Peninsula of Michigan is critical for successfully developing a sustainable regional woody bioenergy.
Resumo:
A range of societal issues have been caused by fossil fuel consumption in the transportation sector in the United States (U.S.), including health related air pollution, climate change, the dependence on imported oil, and other oil related national security concerns. Biofuels production from various lignocellulosic biomass types such as wood, forest residues, and agriculture residues have the potential to replace a substantial portion of the total fossil fuel consumption. This research focuses on locating biofuel facilities and designing the biofuel supply chain to minimize the overall cost. For this purpose an integrated methodology was proposed by combining the GIS technology with simulation and optimization modeling methods. The GIS based methodology was used as a precursor for selecting biofuel facility locations by employing a series of decision factors. The resulted candidate sites for biofuel production served as inputs for simulation and optimization modeling. As a precursor to simulation or optimization modeling, the GIS-based methodology was used to preselect potential biofuel facility locations for biofuel production from forest biomass. Candidate locations were selected based on a set of evaluation criteria, including: county boundaries, a railroad transportation network, a state/federal road transportation network, water body (rivers, lakes, etc.) dispersion, city and village dispersion, a population census, biomass production, and no co-location with co-fired power plants. The simulation and optimization models were built around key supply activities including biomass harvesting/forwarding, transportation and storage. The built onsite storage served for spring breakup period where road restrictions were in place and truck transportation on certain roads was limited. Both models were evaluated using multiple performance indicators, including cost (consisting of the delivered feedstock cost, and inventory holding cost), energy consumption, and GHG emissions. The impact of energy consumption and GHG emissions were expressed in monetary terms to keep consistent with cost. Compared with the optimization model, the simulation model represents a more dynamic look at a 20-year operation by considering the impacts associated with building inventory at the biorefinery to address the limited availability of biomass feedstock during the spring breakup period. The number of trucks required per day was estimated and the inventory level all year around was tracked. Through the exchange of information across different procedures (harvesting, transportation, and biomass feedstock processing procedures), a smooth flow of biomass from harvesting areas to a biofuel facility was implemented. The optimization model was developed to address issues related to locating multiple biofuel facilities simultaneously. The size of the potential biofuel facility is set up with an upper bound of 50 MGY and a lower bound of 30 MGY. The optimization model is a static, Mathematical Programming Language (MPL)-based application which allows for sensitivity analysis by changing inputs to evaluate different scenarios. It was found that annual biofuel demand and biomass availability impacts the optimal results of biofuel facility locations and sizes.
Resumo:
There is an ongoing mission in Afghanistan; a mission driven by external political forces. At its core this mission hopes to establish peace, to protect the populace, and to install democracy. Each of these goals has remained just that, a goal, for the past eight years as the American and international mission in Afghanistan has enjoyed varied levels of commitment. Currently, the stagnant progress in Afghanistan has led the international community to become increasingly concerned about the viability of a future Afghan state. Most of these questions take root in the question over whether or not an Afghan state can function without the auspices of international terrorism. Inevitably, the normative question of what exactly that government should be arises from this base concern. In formulating a response to this question, the consensus of western society has been to install representative democracy. This answer has been a recurring theme in the post Cold War era as states such as Bosnia and Somalia bear witness to the ill effects of external democratic imposition. I hypothesize that the current mold of externally driven state-building is unlikely to result in what western actors seek it to establish: representative democracy. By primarily examining the current situation in Afghanistan, I claim that external installation of representative democracy is modally flawed in that its process mandates choice. Representative democracy by definition constitutes a government reflective of its people, or electorate. Thus, freedom of choice is necessary for a functional representative democracy. From this, one can deduce that because an essential function of democracy is choice, its implementation lies with the presence of choice. State-building is an imposition that eliminates that necessary ingredient. The two stand as polar opposites that cannot effectively collaborate. Security, governing capacity, and development have all been targeted as measurements of success in Afghanistan. The three factors are generally seen as mutually constitutive; so improved security is seen as improving governing capacity. Thus, the recent resurgence of the Taliban in Afghanistan and a deteriorating security environment moving forward has demonstrated the inability of the Afghan government to govern. The primary reason for the Afghan government’s deficiencies is its lack of legitimacy among its constituency. Even the use of the term ‘constituency’ must be qualified because the Afghan government has often oscillated between serving the people within its territorial borders and the international community. The existence of the Afghan state is so dependent on foreign aid and intervention that it has lost policy-making and enforcing power. This is evident by the inability of Afghanistan to engage in basic sovereign state activities as maintaining a national budget, conducting elections, providing for its own national security, and deterring criminality. The Afghan state is nothing more than a shell of a government, and indicative of the failings that external state-building has with establishing democracy.
Resumo:
This paper explores the development of civil–military relations in Myanmar since 1988. After the Tatmadaw (Myanmar Armed Forces) took over the state by means of a coup d’état in 1988, the top generals ruled the country without recourse to significant formal political institutions such as a constitution, elections and parliament. A unique authoritarian regime, where political power was predominantly under the military’s influence, lasted for more than 20 years in the country. It seemed to many observers that the military regime was highly durable and that its dictator, General Than Shwe, had no intention of altering the highly repressive character of the political system. However, a new leader, President Thein Sein, who came to power in March 2011, has decided to implement some political and economic reforms that could undermine the Tatmadaw’s dominant role in politics and the economy. This paper examines the background to this sudden political change in Myanmar, focusing on the relationship between its dictator, the military and the state. This paper’s main argument is that Than Shwe has carefully prepared the transition of 2011 as a generational change in the Tatmadaw and in state leadership. The argument is also made that the challenges created by Thein Sein can be understood as a result of his redefinition of national security and balancing of security-centralism with state-led developmentalism.
Resumo:
As it is defined in ATM 2000+ Strategy (Eurocontrol 2001), the mission of the Air Traffic Management (ATM) System is: “For all the phases of a flight, the ATM system should facilitate a safe, efficient, and expedite traffic flow, through the provision of adaptable ATM services that can be dimensioned in relation to the requirements of all the users and areas of the European air space. The ATM services should comply with the demand, be compatible, operate under uniform principles, respect the environment and satisfy the national security requirements.” The objective of this paper is to present a methodology designed to evaluate the status of the ATM system in terms of the relationship between the offered capacity and traffic demand, identifying weakness areas and proposing solutions. The first part of the methodology relates to the characterization and evaluation of the current system, while a second part proposes an approach to analyze the possible development limit. As part of the work, general criteria are established to define the framework in which the analysis and diagnostic methodology presented is placed. They are: the use of Air Traffic Control (ATC) sectors as analysis unit, the presence of network effects, the tactical focus, the relative character of the analysis, objectivity and a high level assessment that allows assumptions on the human and Communications, Navigation and Surveillance (CNS) elements, considered as the typical high density air traffic resources. The steps followed by the methodology start with the definition of indicators and metrics, like the nominal criticality or the nominal efficiency of a sector; scenario characterization where the necessary data is collected; network effects analysis to study the relations among the constitutive elements of the ATC system; diagnostic by means of the “System Status Diagram”; analytical study of the ATC system development limit; and finally, formulation of conclusions and proposal for improvement. This methodology was employed by Aena (Spanish Airports Manager and Air Navigation Service Provider) and INECO (Spanish Transport Engineering Company) in the analysis of the Spanish ATM System in the frame of the Spanish airspace capacity sustainability program, although it could be applied elsewhere.
Resumo:
The relationship between the United States and Taiwan is of great importance to both parties. Taiwan offers certain strategic opportunities for the promotion of American national security interests, and the U.S. accordingly provides Taiwan with support of both a defensive and diplomatic nature. The official U.S. policies regarding relations with Taiwan are enumerated in the Taiwan Relations Act (United States Code Title 22 Chapter 48 Sections 3301 - 3316). The act, approved by the U.S. Congress in 1967, stipulates the terms of the bilateral relationship with regard to national defense and diplomatic relations among other factors. This paper seeks to obtain a more developed picture of sentiments on both sides of this relationship in order to understand better the U.S.'s influence and power in Taiwan and in the region.
Resumo:
The competing powers of Saudi Arabia and Iran continue to redress and reverse the strategic imbalance and direction of the Middle East’s regional politics. The 1979 Iranian Revolution catapulted these two states into an embittered rivalry. The fall of Saddam Hussein following the 2003 U.S. led invasion, the establishment of a Shi’ite Iraq and the 2011 Arab Uprisings have further inflamed tensions between Saudi Arabia and Iran. Iran and Saudi Arabia have not confronted each other militarily, but rather have divided the region into two armed camps on the basis of political and religious ideology in seeking regional allies and promulgating sectarianism as they continue to exploit the region’s weak states in a series of proxy wars ranging from conflicts in Iraq to Lebanon. The Saudi-Iranian strategic and geopolitical rivalry is further complicated by a religious and ideological rivalry, as tensions represent two opposing aspirations for Islamic leadership with two vastly differing political systems. The conflict is between Saudi Arabia, representing Sunni Islam via Wahhabism, and Iran, representing Shi’ite Islam through Khomeinism. The nature of the Saudi-Iranian rivalry has led many Middle East experts to identify their rivalry as a “New Middle East Cold War.” The Saudi-Iranian rivalry has important implications for regional stability and U.S. national security interests. Therefore, this thesis seeks to address the question: Is a cold war framework applicable when analyzing the Saudi Arabian and Iranian relationship?
Resumo:
As American leadership has narrowly focused on fighting global terror in Iraq and Afghanistan, the modern version of the KGB, now known as the FSB, has been conducting continuous clandestine warfare operations against the United States. These warfare operations include strategic economic and political partnerships with anti-American entities worldwide and direct embedding of double agents in the US intelligence community. This paper investigates the role of Russia's cultural history leading to the merger of the Russian Federal Security Service (FSB) and Russian Organized Crime (ROC). This paper concludes that the FSB is the most pervasive security threat to the United States and that employing Russian native and heritage speakers of Russian in the US intelligence community compromises US national security.
Resumo:
En la primera parte del artículo se aborda el problema que ha de afrontar el estadista Antonio Maura al convertirse en el jefe del gobierno español, a finales de 1903 y consistente en concluir el proceso de negociación sobre Marruecos entablado con Francia desde 1901. Se resalta el carácter continuista del ideario colonial de Maura con respecto al del anterior líder conservador, Silvela, y la preponderancia de cuestiones como la seguridad nacional como motivadoras de dicho ideario. En la segunda parte, se explica la apelación del gobierno maurista a una ayuda por parte de Alemania, en función de movimientos previos de la diplomacia germana que se había interesado por controlar una parte del Marruecos español, o por conseguir compensaciones en Fernando Po. Finalmente se analiza el intento de Berlín de instrumentalizar al gobierno Maura en el curso de las conversaciones hispano-francesas sobre el Imperio jerifiano.
Resumo:
The revelation of the top-secret US intelligence-led PRISM Programme has triggered wide-ranging debates across Europe. Press reports have shed new light on the electronic surveillance ‘fishing expeditions’ of the US National Security Agency and the FBI into the world’s largest electronic communications companies. This Policy Brief by a team of legal specialists and political scientists addresses the main controversies raised by the PRISM affair and the policy challenges that it poses for the EU. Two main arguments are presented: First, the leaks over the PRISM programme have undermined the trust that EU citizens have in their governments and the European institutions to safeguard and protect their privacy; and second, the PRISM affair raises questions regarding the capacity of EU institutions to draw lessons from the past and to protect the data of its citizens and residents in the context of transatlantic relations. The Policy Brief puts forward a set of policy recommendations for the EU to follow and implement a robust data protection strategy in response to the affair.