首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 375 毫秒
1.
This paper underscores the theory that efficacious law enforcement intelligence addresses current problems of criminal insurgency including acts of terrorism, asymmetric warfare and low intensity conflict, and suggests possible solutions. By introducing the notion of crime as insurgency, a new paradigm may be developed that could assist practitioners and academics alike in analyzing, solving and managing crime. By shifting the perspective for both military and civilian forces from their traditionally reactive stance, to a proactive posture, and merging national security with homeland defense on the most perplexing issues and threats facing US security, this work may provide a base upon which new and actionable policies can be designed. Public administrators must take seriously the lessons from past failures. The single most important supposition being, sound policy is reliant upon good intelligence.  相似文献   

2.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   

3.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   

4.
朱翼 《国防科技》2021,42(4):4-9
发展值得人类用户信任的人工智能系统是影响人机合作发展的核心问题之一。目前,人机合作中信任的研究主要来自于计算机领域,侧重于研究如何构建、实现和优化人工智能系统面对特定任务的计算能力与处理能力。针对"什么因素影响了人对人工智能系统的信任,如何准确测量人对人工智能系统的信任"等问题的研究仍处于起步阶段,尚缺乏人类用户参与的实证研究或实验研究中缺乏严谨的行为科学实验方法。本文回顾了行为科学领域中对人际信任的研究方法,在人机合作框架下,探讨了人与人工智能系统之间的信任关系,梳理了人类个体对人工智能系统信任态度的影响因素。希冀该研究成果能够为构建人机合作中的信任度计算模型提供一定理论依据。  相似文献   

5.
边防情报识别是边防情报工作的一项重要内容,要素分析法是当前公安边防情报识别的基本方法之一。结合公安边防情报的特殊性对要素分析法进行了探讨,旨在更好的运用要素分析法,为公安边防情报的识别提供理论参考,以促进公安边防情报识别工作的进一步发展。  相似文献   

6.
This article analyzes the main factors that contributed to the failure of the US intelligence community to alert against Soviet intentions and the intervention in the Egyptian–Israeli War of Attrition in 1969–70. Based on fresh archival sources, this research describes the US intelligence conception concerning the USSR; explains the crystallization of the intelligence estimate on the probability of Soviet intervention in 1970; deals with the intelligence data that were acquired but eventually ignored; and concludes with several plausible explanations for the intelligence blunder.  相似文献   

7.
面对智能化时代的巨大进步,人工智能安全逐渐成为备受关注的议题。以Web of Science数据库收录的核心论文为研究对象,运用科学计量学方法和可视化技术,对包括国家、机构在内的研究力量分布以及热点、前沿和所涉学科在内的主题内容进行分析和总结。针对潜在的人工智能安全议题,构建定性分析框架,对人工智能安全进行定性定量结合的分析,对人工智能安全技术发展进行初步探索与评估。  相似文献   

8.
智能对于指挥决策模型非常重要,也是提高模拟训练和作战实验质量的关键。作战中指挥决策内容多,问题性质不一,对智能要求高。在分析指挥控制模型发展现状基础上提出模型对智能的需求,分析设定了智能的5个层次,提出一种混合Agent框架,并在框架中对每一层智能给出解决方案,框架兼具认知Agent、BDI Agent和刺激反应Agent的优长,对构建智能化的训练和实验系统有较大帮助。框架在指挥装备作战运用实验中得到应用,具有较好的理论意义和应用价值。  相似文献   

9.
鲁赢  伏涛  张志勇  林文浩 《国防科技》2020,41(3):127-130
随着智能技术的发展,人类已逐步迈入智能时代,而智能时代催生了军事训练变革。本文从智能技术影响军事训练典型领域的角度,分析了智能时代背景下,以大数据和人工智能为核心的智能技术,如何影响军事训练的理念、内容、方式及管理,并催生了这些领域的变革。研究表明,智能时代发展背景下,军事训练理念将更加先进,训练内容更加融合,训练方式更加有效,训练管理更加精准。  相似文献   

10.
随着战争从体能较量、技能较量发展为智能较量,"算法战"与人工智能和指挥控制系统相关联并在其中占据关键地位,是实现智能化作战和建设智能军队的技术基础。通过梳理与总结美军在落实"算法战"研究方面所进行的开创性工作,理清"算法战"发展的脉络,重点对"算法战"产生背景、基本概念与内涵以及发展现状进行了探讨,结合课题组在航空集群作战领域的研究基础,探讨"算法战"在空战领域的落脚应用的可鉴之策,为我空军装备的信息化升级和智能化转型奠定基础。  相似文献   

11.
启发式教育有利于发展学生智力、培养创新能力、开阔思维,是目前绝大多数教育者推崇的教学模式。本文对如何把启发式教学模式融入心理健康教学过程进行了探索,构建了"激发、启发、开发、焕发"四步启发式教学模式。启发式教学从学生的实际出发,依据学习规律和学生身心发展规律,体现了素质教育的思想;同时,在教学中调动学生积极性、主动性和创造性,提高学生分析问题和解决问题的能力。  相似文献   

12.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   

13.
基于警报关联的网络威胁行为检测技术因其与网络上大量部署的安全产品耦合,且能充分挖掘异常事件之间的关联关系以提供场景还原证据,正成为复杂威胁行为检测的研究热点。从威胁行为和网络安全环境的特点出发,引出威胁行为检测的应用需求和分类,介绍基于警报关联的威胁行为检测的基本概念和系统模型;重点论述作为模型核心的警报关联方法,并分类介绍了各类典型算法的基本原理和特点,包括基于因果逻辑的方法、基于场景的方法、基于相似性的方法和基于数据挖掘的方法;并结合实例介绍了威胁行为检测系统的三种典型结构,即集中式结构、层次式结构和分布式结构;基于当前研究现状,提出了对未来研究趋势的一些认识。  相似文献   

14.
基于警报关联的网络威胁行为检测技术因其与网络上大量部署的安全产品耦合,且能充分挖掘异常事件之间的关联关系以提供场景还原证据,正成为复杂威胁行为检测的研究热点。从威胁行为和网络安全环境的特点出发,引出威胁行为检测的应用需求和分类,介绍基于警报关联的威胁行为检测的基本概念和系统模型;重点论述作为模型核心的警报关联方法,并分类介绍了各类典型算法的基本原理和特点,包括基于因果逻辑的方法、基于场景的方法、基于相似性的方法和基于数据挖掘的方法;并结合实例介绍了威胁行为检测系统的三种典型结构,即集中式结构、层次式结构和分布式结构;基于当前研究现状,提出了对未来研究趋势的一些认识。  相似文献   

15.
This article demonstrates that assurances and carrots accompanied credible threats every time Western coercion succeeded in Bosnia. This finding is hardly surprising as it merely confirms earlier research on coercive diplomacy, but it is nevertheless important because the crucial role played by assurances and carrots has been completely ignored in most analyses to date. It also has important policy implications at a time when Western, and particularly American, policy‐makers tend to ignore this fact at their peril. US policy towards Iraq and Western policy towards Yugoslavia have been based almost exclusively on the stick in recent years, and its lack of success is therefore not surprising. If Western policy‐makers had learned the right lessons from Bosnia, they would have known that strategies coupling credible threats with credible assurances and carrots would have been more likely to succeed.  相似文献   

16.
基于改进ACO算法的多UAV协同航路规划   总被引:1,自引:0,他引:1  
针对无人机(Unmanned Aerial Vehicle,UAV)在执行任务过程中遇到的诸如敌方防空火力、地形障碍及恶略天气等各类威胁源,采用威胁源概率分布的方法进行威胁的量化处理,构建任务空间的威胁概率密度分布图,有效消除了威胁源的差异性。根据UAV在任务飞行过程中的性能约束与时、空协同约束,同时考虑任务过程中UAV的损毁概率最小、任务航程最短,构建了相应的综合任务航路代价最优化目标函数。结合传统蚁群优化算法(Ant Colony Optimization,ACO)在解决此类问题中的不足,给出了相应的改进策略,提出采用协同多种群ACO进化策略来实现多UAV在满足时、空协同约束下的协同航路规划。通过相应的仿真计算表明,改进后的ACO协同多种群进化策略算法更适用于多UAV协同任务航路规划问题,具有一定的实用性。从而为多UAV协同任务航路规划问题的求解提供了科学的决策依据。  相似文献   

17.
This article aims to review some of the key lessons learnt by the Royal Ulster Constabulary's (RUC) Special Branch in the 37 years of the troubles in Northern Ireland. Above all counter-terrorism is an intelligence led operation and Special Branch are the key agency for this in all UK police forces, who have now benefited enormously from the expertise that the RUC's Special Branch built up over the years and have passed on to their colleagues throughout the UK. Intelligence is more often than not a human role and relies on human agencies, which was the case in Northern Ireland. The bulk of intelligence gathering was carried out at quite low levels although the sifting and analysing of it became a more specialist skill. Electronic intelligence and computerised systems were often quite low down in the order of priorities and uses, which tends to confound popular impressions. Agents, informers and good old fashioned ‘coppers’ who knew their patch were much more important both in terms of gathering information and in terms of undermining the terrorists morale from within and it was these factors that fundamentally defeated the IRA in Northern Ireland.  相似文献   

18.
基于动态贝叶斯网的炮兵战斗效果评估建模仿真   总被引:1,自引:0,他引:1  
依据炮兵火力作战的特点规律,分析炮兵战斗效果评估的内容、程序、建模过程和影响因素,运用动态Bayesian网建立炮兵战斗效果评估模型,运用主成分分析方法确定评估专家权重,运用Poly Tree的消息传递算法进行评估网络推理分析,最后结合案例仿真验证。结果表明,该研究解决了情报信息不确定性、模糊性和动态性等影响战斗效果精确评估问题。  相似文献   

19.
通过文献和网络调查等方法,对英国警务情报教育培训机制、课程设置等内容进行了介绍和解析,力求通过研究英国警务情报教育培训的现状,为我国新兴的警务情报教育提供可资借鉴的内容和方法。  相似文献   

20.
威胁联网环境中,无人机需要对运动威胁进行规避以安全到达终点。通过建立无人机和威胁的运动模型,并对每一时刻无人机和运动威胁的相对位置进行实时分析;提出了一种基于可飞性分析的航迹重规划方法;最后对该方法进行仿真实验。仿真结果表明,该方法增强了无人机对运动威胁的规避能力。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号