983 resultados para security threat
Resumo:
This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.
Resumo:
We present a real-world problem that arises in security threat detection applications. The problem consists of deploying mobile detectors on moving units that follow predefined routes. Examples of such units are buses, coaches, and trolleys. Due to a limited budget not all available units can be equipped with a detector. The goal is to equip a subset of units such that the utility of the resulting coverage is maximized. Existing methods for detector deployment are designed to place detectors in fixed locations and are therefore not applicable to the problem considered here. We formulate the planning problem as a binary linear program and present a coverage heuristic for generating effective deployments in short CPU time. The heuristic has theoretical performance guarantees for important special cases of the problem. The effectiveness of the coverage heuristic is demonstrated in a computational analysis based on 28 instances that we derived from real-world data.
Resumo:
Colombia's increasingly effective efforts to mitigate the power of the FARC and other illegitimately armed groups in the country can offer important lessons for the Peruvian government as it strives to prevent a resurgence of Sendero Luminoso and other illegal non-state actors. Both countries share certain particular challenges: deep economic, social, and in the case of Peru ethnic divisions, the presence of and/or the effects of violent insurgencies, a large-scale narcotics production and trafficking, and a history of weak state presence in large tracts of isolated and scarcely-populated areas. Important differences exist, however in the nature of the insurgencies in the two countries, the government response to them and the nature of government and society that affects the applicability of Colombia's experience to Peru. The security threat to Panama from drug trafficking and Colombian insurgents --often a linked phenomenon-- are in many ways different from the drug/insurgent factor in Colombia itself and in Peru, although there are similar variables. Unlike the Colombian and Peruvian cases, the security threat in Panama is not directed against the state, there are no domestic elements seeking to overthrow the government -- as the case of the FARC and Sendero Luminoso, security problems have not spilled over from rural to urban areas in Panama, and there is no ideological component at play in driving the threat. Nor is drug cultivation a major factor in Panama as it is in Colombia and Peru. The key variable that is shared among all three cases is the threat of extra-state actors controlling remote rural areas or small towns where state presence is minimal. The central lesson learned from Colombia is the need to define and then address the key problem of a "sovereignity gap," lack of legitimate state presence in many part of the country. Colombia's success in broadening the presence of the national government between 2002 and the presence is owed to many factors, including an effective national strategy, improvements in the armed forces and police, political will on the part of government for a sustained effort, citizen buy-in to the national strategy, including the resolve of the elite to pay more in taxes to bring change about, and the adoption of a sequenced approach to consolidated development in conflicted areas. Control of territory and effective state presence improved citizen security, strengthened confidence in democracy and the legitimate state, promoted economic development, and helped mitigate the effect of illegal drugs. Peru can benefit from the Colombian experience especially in terms of the importance of legitimate state authority, improved institutions, gaining the support of local citizens, and furthering development to wean communities away from drugs. State coordinated "integration" efforts in Peru as practiced in Colombia have the potential for success if properly calibrated to Peruvian reality, coordinated within government, and provided with sufficient resources. Peru's traditionally weak political institutions and lack of public confidence in the state in many areas of the country must be overcome if this effort is to be successful.
Resumo:
Ce mémoire a pour objectif d’analyser la pertinence d’une culture stratégique particulière, celle de l’Inde. Au moins quatre variables culturelles à dimension sécuritaire – l’identité, les valeurs, les normes et les perceptions – permettent d’expliquer la conception de la sécurité et du pouvoir indiens. L’hypothèse avancée dans ce mémoire est la suivante : à cause de l’influence de la culture stratégique indienne, l’océan Indien est perçu par l’élite indienne comme l’endroit où réside la principale menace à la sécurité de l’Inde. En outre, cette perception particulière de la menace permet de mieux comprendre les ambitions maritimes de l’Inde dans l’océan Indien à l’aube du 21e siècle. Afin de confirmer l’hypothèse, nous analysons l’influence de la culture stratégique indienne sur les approches stratégiques privilégiées par les décideurs Indiens au sein de l’océan Indien. Nous concluons, sur la base de l’étude cas, que l’objectif stratégique de New Delhi est de devenir la puissance maritime dominante de l’océan Indien. Le moyen privilégié est la création d’une marine océanique puissante, capable de maintenir en permanence une escadre en patrouille loin de ses bases navales. Sur le plan théorique, les actions indiennes – qui ont surtout un caractère défensif – sont justifiées par une doctrine de non-ingérence des grandes puissances dans les affaires indiennes, doctrine calquée sur la doctrine Monroe. Selon la doctrine indienne, seules les puissances régionales sont à même de préserver la stabilité dans la région de l’océan Indien. Conséquemment, le Gouvernement indien œuvre à réduire l’ingérence des marines de guerre étrangères au sein de l’océan Indien.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
El presente trabajo de investigación surge de la necesidad de estudiar el reciente fenómeno de las maras que se presenta en la región, analizando los elementos que las componen y los escenarios que las rodean, siendo los puntos claves para lograr entender su peligrosidad y porque se les considera un desafío a la seguridad de las naciones.
Resumo:
El presente estudio de caso tiene como objetivo principal analizar, desde el punto de vista venezolano, las estrategias implementadas por Venezuela para contrarrestar las que identifica como múltiples amenazas a su seguridad nacional desde 1998 hasta 2009, puesto que la alta mediatización de las acciones emprendidas durante la última década por parte del gobierno venezolano para mitigar las que considera amenazas a su seguridad nacional, está produciendo estereotipos y polarización no sólo en los ciudadanos venezolanos, sino también, en la comunidad internacional.
Resumo:
El calentamiento global trae consigo unos supuestos que antes no se contemplaban en las relaciones internacionales. La vulnerabilidad de algunos Estados frente al fenómeno en términos de seguridad, como lo es el caso de Tuvalu, hace que la supervivencia de ciertos países se vea amenazada.
Resumo:
El propósito principal de esta monografía es ofrecer una perspectiva crítica sobre el conflicto latente en la Península Coreana, haciendo un acercamiento al mismo desde un marco teórico asentado en el realismo estructural de Kenneth Waltz. De este modo, se busca responder a cuestiones sobre los intereses estatales como fundamento básico de las estrategias de mantenimiento de la Estructura en regiones geopolíticamente sensibles. Al final, se llega a la conclusión afirmando que la Estructura ejerce una serie de funciones para garantizar su preservación mediante una acción de convergencia en la conducta de los Estados. Esta realidad ha mantenido a la Península Coreana sin un conflicto bélico en los últimos 50 años, muy a pesar de estar al borde del mismo en varias ocasiones, ya que de llegarse a presentar se rompería la estabilidad de la región, y por ende el Equilibrio de Poderes estaría en grave riesgo.
Resumo:
Este documento surge de la pregunta ¿por qué a pesar de los costos y los inconcluyentes resultados de la guerra contra las drogas, ésta se ha mantenido por más de 40 años? El texto analiza los factores que motivaron a Estados Unidos a iniciar un proceso de construcción discursiva para transformar el problema de las drogas en una amenaza a la seguridad nacional de ese país y del mundo, y cómo Colombia ha aprovechado esa situación para redefinir constantemente su identidad nacional e impulsar sus intereses. La aproximación al problema de las drogas se desarrolla desde la perspectiva del proceso de securitización y desde la óptica de la búsqueda de los intereses nacionales, soportada sobre la base teórica del constructivismo. Desde esa perspectiva, se evidencia cómo la construcción de la guerra contra las drogas ha dependido de la identidad (personalidad) de los Estados, de las políticas e intereses de sus gobernantes, pero también de elementos propios del contexto histórico que han potenciado su desarrollo. Finaliza con el planteamiento de un posible proceso de des-secutiritización del problema de las drogas.
Resumo:
La presente monografía busca explicar el proceso de securitización realizado por la AOSIS del cambio climático en las COP de la CMNUCC. Esta investigación defiende que la AOSIS sí ha hecho dicho proceso a través de estrategias como el liderazgo moral y los nexos con actores no-estatales; pero dicho proceso no ha sido exitoso, dado el predominio del discurso del desarrollo sostenible en las negociaciones, el debilitamiento de la AOSIS como actor securitizador y el poco apoyo formal de las potencias emergentes y el bloque UMBRELLA. Para sustentar lo anterior, se realizará una revisión de informes científicos que demuestran que el cambio climático es una amenaza a la seguridad, y un estudio desde de la teoría de securitización de Thierry Balzacq, de los discursos dados por los estados AOSIS, de las COP y de las posiciones de algunos bloques de negociación sobre el cambio climático.
Resumo:
Desde finales de los 70 la piratería se convirtió en un problema para Nigeria. Con el tiempo adquirió características del crimen organizado y en 2010 se transformó en un problema transnacional, afectando a Estados del golfo de Guinea. Así, a través de una base conceptual, el estudio de caso concluyó que los factores internos –como la pobreza, debilidad estatal y marginalización- y externos –siendo ellos la falta de políticas internas destinadas a las aguas y la ausencia de estrategias marítimas en la región- de la piratería, crearon una dinámica para que dicha actividad se convirtiera en una amenaza a la seguridad marítima del golfo de Guinea, tomando como referencia a Benín y Togo. Siguiendo la línea argumentativa, se demuestra que la búsqueda de una solución a la delincuencia marítima ha generado interacciones de seguridad que sugieren las primeras fases de un posible complejo de seguridad regional.
Resumo:
Pakistan is geographically situated between China and the Gulf. In order to balance its strategic position against the major security threat of India, Pakistan formed a special and stable strategic alliance with China against common threats since the period of the cold war even though the two countries have neither a political ideology nor political system in common. On the other hand Pakistan established another special relation with Saudi Arabia on the basis of Islamic identity. With its expanding economic capacity, China proposed a project by the name of "new silk road economic corridor" with the intention of expanding and multiplying trade routes with the Middle East and Europe. Within this framework Pakistan is expected to expand the role of an alternative land route that connects the Gulf and China for use if unfavorable emergencies occur in the Malacca route. However, the continuous political uncertainty in Afghanistan after the pullout of US-NATO fighting forces at the end of 2014 and sporadic outbreaks of terrorist acts by Pakistan Taliban in Pakistan have increased China's anxiety regarding Uyghur issues at home. Avoiding military options for the moment, China is trying to find ways to play an active role in the security issues of Afghanistan with help from Pakistan if available. On the other hand, it is noteworthy that the Pakistani government formed in the general election of 2008 completed its full term and transferred authority to the newly elected government in 2013, something never observed before in Pakistan's history. Coincidently, in Afghanistan the presidential election was carried out peacefully in 2014 in spite of the Taliban threat. Although it is too early to make any definite conclusion, constitutional processes, in spite of their defects, reflected to some extent wishes for normal life of the people of Pakistan and Afghanistan who were disgusted with weak governance and the prevalence of terrorism.
Resumo:
As American leadership has narrowly focused on fighting global terror in Iraq and Afghanistan, the modern version of the KGB, now known as the FSB, has been conducting continuous clandestine warfare operations against the United States. These warfare operations include strategic economic and political partnerships with anti-American entities worldwide and direct embedding of double agents in the US intelligence community. This paper investigates the role of Russia's cultural history leading to the merger of the Russian Federal Security Service (FSB) and Russian Organized Crime (ROC). This paper concludes that the FSB is the most pervasive security threat to the United States and that employing Russian native and heritage speakers of Russian in the US intelligence community compromises US national security.
Resumo:
Since June 2014, Islamic State (IS) has been regarded as the principal security threat in the Middle East and one of the most important problems for European and global security. Islamic State, which for many years was just one of many terror organisations with links to al-Qaeda, has succeeded in achieving much more than other similar organisations: it has taken over control of large swathes of territory in Syria and Iraq by military means, created its own para-state structures in that area, and become the greatest civilisational challenge for the region in a century as it established a self-proclaimed caliphate and credibly pledged to expand further on a global scale. Those successes have been accompanied by widely publicised acts of systemic brutality which meets the definition of crimes against humanity. One outcome of these developments is the emergence of an exotic informal alliance to combatthe Islamic State, which has brought together all the states from the Middle East and many from beyond the region. However, contrary to what could have been predicted, after almost a year of the declared war against IS, the Caliphate still holds most of the ground it gained in 2014.