923 resultados para algebraic attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The English cleric Matthew Sutcliffe arguably produced the first comprehensive security concept in history. It had at its centre the war between England and Spain (1585-1604), and Sutcliffe advocated taking the war to the Iberian Peninsula to seize Philip II's main Atlantic ports, rather than remaining satisfied with the indirect combat of Spain in Flanders, defensive action against naval attacks on England and the guerre de course on Spanish shipping at sea. This approach seems to be at the heart of Essex's 1596 naval campaing against Spanish ports, which foundered on the bureaucratic politics of the Elizabethan government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The concept of slow vortical dynamics and its role in theoretical understanding is central to geophysical fluid dynamics. It leads, for example, to “potential vorticity thinking” (Hoskins et al. 1985). Mathematically, one imagines an invariant manifold within the phase space of solutions, called the slow manifold (Leith 1980; Lorenz 1980), to which the dynamics are constrained. Whether this slow manifold truly exists has been a major subject of inquiry over the past 20 years. It has become clear that an exact slow manifold is an exceptional case, restricted to steady or perhaps temporally periodic flows (Warn 1997). Thus the concept of a “fuzzy slow manifold” (Warn and Ménard 1986) has been suggested. The idea is that nearly slow dynamics will occur in a stochastic layer about the putative slow manifold. The natural question then is, how thick is this layer? In a recent paper, Ford et al. (2000) argue that Lighthill emission—the spontaneous emission of freely propagating acoustic waves by unsteady vortical flows—is applicable to the problem of balance, with the Mach number Ma replaced by the Froude number F, and that it is a fundamental mechanism for this fuzziness. They consider the rotating shallow-water equations and find emission of inertia–gravity waves at O(F2). This is rather surprising at first sight, because several studies of balanced dynamics with the rotating shallow-water equations have gone beyond second order in F, and found only an exponentially small unbalanced component (Warn and Ménard 1986; Lorenz and Krishnamurthy 1987; Bokhove and Shepherd 1996; Wirosoetisno and Shepherd 2000). We have no technical objection to the analysis of Ford et al. (2000), but wish to point out that it depends crucially on R 1, where R is the Rossby number. This condition requires the ratio of the characteristic length scale of the flow L to the Rossby deformation radius LR to go to zero in the limit F → 0. This is the low Froude number scaling of Charney (1963), which, while originally designed for the Tropics, has been argued to be also relevant to mesoscale dynamics (Riley et al. 1981). If L/LR is fixed, however, then F → 0 implies R → 0, which is the standard quasigeostrophic scaling of Charney (1948; see, e.g., Pedlosky 1987). In this limit there is reason to expect the fuzziness of the slow manifold to be “exponentially thin,” and balance to be much more accurate than is consistent with (algebraic) Lighthill emission.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using panel data for 111 countries over the period 1982–2002, we employ two indexes that cover a wide range of human rights to empirically analyze whether and to what extent terrorism affects human rights. According to our results,terrorism significantly, but not dramatically, diminishes governments’ respect for basic human rights such as the absence of extrajudicial killings, political imprisonment, and torture. The result is robust to how we measure terrorist attacks, to the method of estimation, and to the choice of countries in our sample. However, we find no effect of terrorism on empowerment rights.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of Terrorist Transgressions is to analyse the myths inscribed in images of the terrorist and identify how agency is attributed to representation through invocations and inversions of gender stereotypes. In modern discourses on the terrorist the horror experienced in Western societies was the appearance of a new sense of the vulnerability of the body politic, and therefore of the modern self with its direct dependency on security and property. The terrorist has been constructed as the epitome of transgression against economic resources and moral, physical and political boundaries. Although terrorism has been the focus of intense academic activity, cultural representations of the terrorist have received less attention. Yet terrorism is dependent on spectacle and the topic is subject to forceful exposure in popular media. While the terrorist is predominantly aligned with masculinity, women have been active in terrorist organisations since the late 19th century and in suicidal terrorist attacks since the 1980s. Such attacks have confounded constructions of femininity and masculinity, with profound implications for the gendering of violence and horror. The publication arises from an AHRC networking grant, 2011-12, with Birkbeck, and includes collaboration with the army at Sandhurst RMA. The project relates to a wider investigation into feminism, violence and contemporary art.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What are the main causes of international terrorism? Despite the meticulous examination of various candidate explanations, existing estimates still diverge in sign, size, and significance. This article puts forward a novel explanation and supporting evidence. We argue that domestic political instability provides the learning environment needed to successfully execute international terror attacks. Using a yearly panel of 123 countries over 1973–2003, we find that the occurrence of civil wars increases fatalities and the number of international terrorist acts by 45%. These results hold for alternative indicators of political instability, estimators, subsamples, subperiods, and accounting for competing explanations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We assess the robustness of previous findings on the determinants of terrorism. Using extreme bound analysis, the three most comprehensive terrorism datasets, and focusing on the three most commonly analyzed aspects of terrorist activity, i.e., location, victim, and perpetrator, we re-assess the effect of 65 proposed correlates. Evaluating around 13.4 million regressions, we find 18 variables to be robustly associated with the number of incidents occurring in a given country-year, 15 variables with attacks against citizens from a particular country in a given year, and six variables with attacks perpetrated by citizens of a particular country in a given year.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We analyze the impact of political proximity to the United States on the occurrence and severity of terror. Employing panel data for 116 countries over the period 1975–2001 we find that countries voting in line with the U.S. are victims of more and deadlier attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.