965 resultados para Special operations (Military science)
Resumo:
"B-242608"--p.1.
Resumo:
Mode of access: Internet.
Resumo:
"No. 646."
Resumo:
"Concluding observations, by the editor": p. 273-376.
Resumo:
Includes indexes.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
The relationship between theory and practice has been discussed in the social sciences for generations. Academics from management and organization studies regularly lament the divide between theory and practice. They regret the insufficient academic knowledge of managerial problems and their solutions, and criticize the scholarly production of theories that are not relevant for organizational practice (Hambrick 1994). Despite the prevalence of this topic in academic discourse, we do not know much about what kind of academic knowledge would be useful to practice, how it would be produced and how the transfer of knowledge between theory and practice actually works. In short, we do not know how we can make academic work more relevant for practice or even whether this would be desirable. In this introduction to the Special Issue, we apply philosophical, theoretical and empirical perspectives to examine the challenges of studying the generation and use of academic knowledge. We then briefly describe the contribution of the seven papers that were selected for this Special Issue. Finally, we discuss issues that still need to be addressed, and make some proposals for future avenues of research.
Resumo:
The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.
Resumo:
This thesis examines the development of state-narco networks in post-transition Bolivia. Mainstream discourses of drugs tend to undertheorise such relationships, holding illicit economies, weak states and violence as synergistic phenomena. Such assumptions fail to capture the nuanced relations that emerge between the state and the drug trade in different contexts, their underlying logics and diverse effects. As an understudied case, Bolivia offers novel insights into these dynamics. Bolivian military authoritarian governments (1964-1982), for example, integrated drug rents into clientelistic systems of governance, helping to establish factional coalitions and reinforce regime authority. Following democratic transition in 1982 and the escalation of US counterdrug efforts, these stable modes of exchange between the state and the coca-cocaine economy fragmented. Bolivia, though, continued to experience lower levels of drug-related violence than its Andean neighbours, and sustained democratisation despite being a major drug producer. Focusing on the introduction of the Andean Initiative (1989-1993), I explore state-narco interactions during this period of flux: from authoritarianism to (formal) democracy, and from Cold War to Drug War. As such, the thesis transcends the conventional analyses of the drugs literature and orthodox readings of Latin American narco-violence, providing insights into the relationship between illicit economies and democratic transition, the regional role of the US, and the (unintended) consequences of drug policy interventions. I utilise a mixed methods approach to offer discrete perspectives on the object of study. Drawing on documentary and secondary sources, I argue that state-narco networks were interwoven with Bolivia’s post-transition political settlement. Uneven democratisation ensured pockets of informalism, as clientelistic and authoritarian practices continued. This included police and military autonomy, and tolerance of drug corruption within both institutions. Non-enforcement of democratic norms of accountability and transparency was linked to the maintenance of fragile political equilibrium. Interviews with key US and Bolivian elite actors also revealed differing interpretations of state-narco interactions. These exposed competing agendas, and were folded into alternative paradigms and narratives of the ‘war on drugs’. The extension of US Drug War goals and the targeting of ‘corrupt’ local power structures, clashed with local ambivalence towards the drug trade, opposition to destabilising, ‘Colombianised’ policies and the claimed ‘democratising mission’ of the Bolivian government. In contrasting these US and Bolivian accounts, the thesis shows how real and perceived state-narco webs were understood and navigated by different actors in distinct ways. ‘Drug corruption’ held significance beyond simple economic transaction or institutional failure. Contestation around state-narco interactions was enmeshed in US-Bolivian relations of power and control.
Resumo:
There is clearly contention over the shape and formation of science curriculum and over, ultimately, what will count as scientific knowledge, skill, capacity and world view. The Cold War set the policy context for an ongoing focus on science education across Western nations. Sputnik-era US and UK educational policy offered a broad premise for the purpose of school science: in a risky geopolitical environment, high levels of advanced scientific expertise were central to the national interest and necessary for the maintenance of military/industrial and technological power. Half a century on, in the context of global economic and environmental crisis, as a justification for digital, industrial and biomedical innovation, the rationale for the production of scientific capital is central to curriculum settlements and educational policy in Europe, Asia and the Americas.
Resumo:
This paper improves implementation techniques of Elliptic Curve Cryptography. We introduce new formulae and algorithms for the group law on Jacobi quartic, Jacobi intersection, Edwards, and Hessian curves. The proposed formulae and algorithms can save time in suitable point representations. To support our claims, a cost comparison is made with classic scalar multiplication algorithms using previous and current operation counts. Most notably, the best speeds are obtained from Jacobi quartic curves which provide the fastest timings for most scalar multiplication strategies benefiting from the proposed 12M + 5S + 1D point doubling and 7M + 3S + 1D point addition algorithms. Furthermore, the new addition algorithm provides an efficient way to protect against side channel attacks which are based on simple power analysis (SPA). Keywords: Efficient elliptic curve arithmetic,unified addition, side channel attack.
Resumo:
This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3 + 1 over fields of large characteristic. We provide examples of pairing-friendly elliptic curves of this form which are of interest for efficient pairing implementations.