853 resultados para National security - Japan


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this thesis I sought to explain the origins of national security concerns over foreign investments in the United States from 1919 to 2008. I identified and examined 29 cases of national security concerns over foreign investments in the United States during that period, and argued that in order to understand the circumstances under which foreign investments in the United States are perceived to be threats to the U.S. security we must rely on a combination of democratic peace theory and the version of political realism known as power transition theory. Thus, I tested the argument that national security concerns over foreign investments in the United States from 1919 to 2008 resulted from: (1) perceptions of international power transition, (2) perceptions of ideological and institutional differences between the United States and the home country of the investor, (3) perceptions of the strategic importance of the sector where the investment is made, and (4) perceptions of participation or control of the foreign investor by the government of the country of origin. I found that all these hypotheses have some explanatory power.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This edited collection brings together leading scholars to comparatively investigate national security, surveillance and terror in the early 21st century in two major western jurisdictions, Canada and Australia. Observing that much debate about these topics is dominated by US and UK perspectives, the volume provides penetrating analysis of national security and surveillance practices in two under-studied countries that reveals critical insights into current trends. Written by a wide range of experts in their respective fields, this book addresses a fascinating array of timely questions about the relationship among national security, privacy and terror in the two countries and beyond. Chapters include critical assessments of topics such as: National Security Intelligence Collection since 9/11, The Border as Checkpoint in an Age of Hemispheric Security and Surveillance, Unmanned Aerial Vehicles and Law Enforcement, as well as Federal Government Departments and Security Regimes. An engaging and empirically driven study, this collection will be of great interest to scholars of security and surveillance studies, policing, and comparative criminology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this chapter the co-editors introduce the comparative volume and its rationales, provide context about national security, surveillance and terror in both Canada and Australia, describe contributions found in the volume, and conclude with an overview of the volume.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

FOREWORD. When one looks at the present state of the CSDP, one cannot help but look on with disenchantment at the energy that appears to have abandoned both institutions and Member States. Commentators increasingly take for granted that nothing much should be expected from this field of EU policy. The reasons for this state of mind are well known: the recent economic and financial strains, which have impacted all EU action since 2008, means that most of the Member States will struggle to keep their defence budgets at their present level in the future, and we may even see reductions. Furthermore, and to put it mildly, most of the recent CSDP operations have also experienced a lack of enthusiasm. Adding to this overall trend, the EU is far from presenting a common vision of what security and defence should really mean. Many of the Member States do not want to be involved in all of today’s international turmoils, and they rarely share the strategic culture which inspires those Member States who see themselves as having special responsibilities in dealing with these crises. In the end it may be that Member States diverge fundamentally on the simple question of whether it is relevant for the EU to engage in most of the ‘hot’ crises Europe faces; many prefer to see Europe as a soft power, mostly dedicated to intervening on less dramatic fronts and more inclined to mend than to fight. For whatever reason given, it remains that if there is a lack of common understanding on what CSDP should really be about, it should not come as a surprise if this policy is presently in stalemate. As an additional blow, the Ukrainian crisis, which dragged on for the whole of last year, could only add to the downward spiral the EU has been experiencing, with a new Russia aggressively confronting Europe in a manner not too distant from the Cold War days. This attitude has triggered the natural reaction among EU Member States to seek reassurances from NATO about their own national security. Coupled with the return of France a few years ago into the integrated military command, NATO’s renewed relevance has sent a strong message to Europe about the military organisation’s credibility with regard to collective defence. Surprisingly, this overall trend was gathering momentum at the same time as other more positive developments. The European Council of December 2013 dedicated its main session to CSDP: it underlined Europe’s role as a ‘security provider’ while adopting a very ambitious road map for Europe in all possible dimensions of the security sector. Hence the impression of a genuine boost to all EU institutions, which have been invited to join efforts and give CSDP a reinvigorated efficiency. In the same way, the increasing instability in Europe’s neighbourhood has also called for more EU operations: most recently in Iraq, Libya, Northern Nigeria or South Sudan. Pressure for further EU engagement has been one of the most constant features of the discussions taking place around these crises. Moreover, a growing number of EU partners in Asia, Latin America or Eastern Europe have shown a renewed eagerness to join CSDP missions in what sounds like a vote of confidence for EU capacities. What kind of conclusion should be drawn from this contradictory situation? Probably that the EU has much more potential than it can sometimes figure out itself, if only it would be ready to adapt to the new global realities. But, more than anything else, an enhanced CSDP needs from all Member States strong political will and a clear vision of what they want this policy to be. Without this indispensable ingredient CSDP may continue to run its course, as it does today. It may even grow in efficiency but it will keep lacking the one resource that would definitely help it overcome all the present shortcomings that have prevented Europe from finding its true role and mission through the CSDP. Member States remain central to EU security and defence policy. This is why this collection of essays is so valuable for assessing in no uncertain way the long road that lies ahead for any progress to be made. Pierre VIMONT Senior Associate at Carnegie Europe Former Executive Secretary-General of the European External Action Service

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The postwar development of the Intelligence Services in Japan has been based on two contrasting models: the centralized model of the USA and the collegiality of UK, neither of which has been fully developed. This has led to clashes of institutional competencies and poor anticipation of threats towards national security. This problem of opposing models has been partially overcome through two dimensions: externally through the cooperation with the US Intelligence Service under the Treaty of Mutual Cooperation and Security; and internally though the pre-eminence in the national sphere of the Department of Public Safety. However, the emergence of a new global communicative dimension requires that a communicative-viewing remodeling of this dual model is necessary due to the increasing capacity of the individual actors to determine the dynamics of international events. This article examines these challenges for the Intelligence Services of Japan and proposes a reform based on this new global communicative dimension.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Jackson, Peter, 'France and the Problems of Security and Disarmament after the First World War', Journal of Strategic Studies (2006) 29(2) pp.247-280 Special Issue: Enforcing arms limits: Germany post 1919; Iraq post 1991 RAE2008

Relevância:

90.00% 90.00%

Publicador:

Resumo:

McInnes, C., Lee, K. (2006). Health, security and foreign policy. Review of International Studies, 32 (1), 5-23. RAE2008

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Among the many issues that were raised in the White Book on National Security of the Republic of Poland (WBNSRP), there were also those related to the functioning of a Common Security and Defence Policy (CSDP). Its importance for the security of Poland was indicated, as well as the need on the part of EU Member States to broaden collaboration in the sphere of security and defence. The key problems occurring in the context of CSDP were also emphasised and their causes indicated. The aim of the article is to present the factors responsible for the weakening of CSDP effectiveness, ones taken into account in the White Book, and subsequently to present a Framework for their analysis in the light of further scholarship.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Within the framework of state security policy, the focus of this dissertation are the relations between how new security threats are perceived and the policy planning and bureaucratic implementation that are designed to address them. In addition, this thesis explores and studies some of the inertias that might exist in the core of the state apparatus as it addresses new threats and how these could be better managed. The dissertation is built on five thematic and interrelated articles highlighting different aspects of when new significant national security threats are detected by different governments until the threats on the policy planning side translate into protective measures within the society. The timeline differs widely between different countries and some key aspects of this process are also studied. One focus concerns mechanisms for adaptability within the Intelligence Community, another on the policy planning process within the Cabinet Offices/National Security Councils and the third focus is on the planning process and how policy is implemented within the bureaucracy. The issue of policy transfer is also analysed, revealing that there is some imitation of innovation within governmental structures and policies, for example within the field of cyber defence. The main findings of the dissertation are that this context has built-in inertias and bureaucratic seams found in most government bureaucratic machineries. As much of the information and planning measures imply security classification of the transparency and internal debate on these issues, alternative assessments become limited. To remedy this situation, the thesis recommends ways to improve the decision-making system in order to streamline the processes involved in making these decisions. Another special focus of the thesis concerns the role of the public policy think tanks in the United States as an instrument of change in the country’s national security decision-making environment, which is viewed from the perspective as being a possible source of new ideas and innovation. The findings in this part are based on unique interviews data on how think tanks become successful and influence the policy debate in a country such as the United States. It appears clearly that in countries such as the United States think tanks smooth the decision making processes, and that this model with some adaptations also might be transferrable to other democratic countries.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

El propósito principal de esta monografía es ofrecer una perspectiva crítica sobre el conflicto latente en la Península Coreana, haciendo un acercamiento al mismo desde un marco teórico asentado en el realismo estructural de Kenneth Waltz. De este modo, se busca responder a cuestiones sobre los intereses estatales como fundamento básico de las estrategias de mantenimiento de la Estructura en regiones geopolíticamente sensibles. Al final, se llega a la conclusión afirmando que la Estructura ejerce una serie de funciones para garantizar su preservación mediante una acción de convergencia en la conducta de los Estados. Esta realidad ha mantenido a la Península Coreana sin un conflicto bélico en los últimos 50 años, muy a pesar de estar al borde del mismo en varias ocasiones, ya que de llegarse a presentar se rompería la estabilidad de la región, y por ende el Equilibrio de Poderes estaría en grave riesgo.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

La década de 1950 fue determinante en el establecimiento y póstumo desarrollo del sistema de política exterior de la República Popular China. Al respecto, es de vital importancia realizar un análisis exhaustivo sobre esta primera etapa en donde actores externos a la nación tuvieron un papel determinante. Se busca, entonces, analizar la incidencia que tuvo el discurso de Estados Unidos en la política exterior China a través de un profundo análisis cualitativo que tendrá como base elementos propios de la historiografía. Mediante aproximaciones constructivistas, se pretende demostrar que las creencias pre-existentes de ambos actores (así como la intersubjetividad entre los mismos), determinó la identidad construida a través de la percepción mutua. Lo anterior, impulsó las relaciones predominantemente agresivas entre Estados Unidos y la China Maoísta de principios de la Guerra Fría.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Discussion of the national interest often focuses on how Britain's influence can be maximized, rather than on the goals that influence serves. Yet what gives content to claims about the national interest is the means-ends reasoning which links interests to deeper goals. In ideal-typical terms, this can take two forms. The first, and more common, approach is conservative: it infers national interests and the goals they advance from existing policies and commitments. The second is reformist: it starts by specifying national goals and then asks how they are best advanced under particular conditions. New Labour's foreign policy discourse is notable for its explicit use of a reformist approach. Indeed, Gordon Brown's vision of a 'new global society' not only identifies global reform as a key means of fulfilling national goals, but also thereby extends the concept of the national interest well beyond a narrow concern with national security.

Relevância:

90.00% 90.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In the wake of the Bali bombing the Australian government has proposed a number of national security measures that pose a real danger to human security in Australia and the region. These measures include renewed and increased military and intelligence exchanges with Indonesia, and laws that allow the Australian Security Intelligence Organization (ASIO) to detain people without charge or even suspicion in order to gather intelligence. In less emotional times these initiatives would be rejected as contrary to human rights concerns and Australia’s democratic traditions, which include the rule of law and due process protections. In the current climate, however, human rights and civil liberties are apt to be portrayed as unaffordable luxuries.