排序方式: 共有81条查询结果,搜索用时 31 毫秒
41.
现代多功能制导站中央控制计算机并行计算技术研究 总被引:1,自引:1,他引:0
:通过实例分析 ,研究了现代多功能制导站中央控制计算机适合并行计算的软硬件结构与设计思想 相似文献
42.
43.
Ross W. Bellaby 《Journal of Military Ethics》2016,15(4):299-319
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified. 相似文献
44.
The anchoring effect is a well-studied subject. This article connects the effect with the rules-in-use within a military intelligence institution. Particularly the rules-in-use that dictate that an analyst takes his or hers starting point from recently conducted assessments of the specific area or threat. The threat assessment as well as the written assessment were affected. The results show that officers have an aversion to lower a previous given threat assessment. This gives that to understand risk assessment we not only need to understand the methods used, we also need to understand the institutions in which they are used. This is especially relevant for military intelligence as the assessments are conducted in an environment of high uncertainty. 相似文献
45.
Secure second strike nuclear forces are frequently held to be easy to procure. Analysts have long argued that targeting intelligence against relocatable targets like submarine launched and land mobile ballistic missiles is difficult to obtain. However, the scholarly consensus on intelligence for counterforce operations is seriously overdrawn. Both during and after the Cold War, the United States developed substantial intelligence capabilities to track and target submarines and mobile missiles. These efforts achieved important and under-appreciated success. Second strike forces have been far more vulnerable than most analysts are willing to credit. 相似文献
46.
Mouhamadou Kane 《African Security Review》2014,23(3):312-317
The outbreak of violence following the insurgency by a coalition of armed groups called Séléka represents one of the darkest pages in the contemporary history of the Central African Republic (CAR). Although the country has experienced chronic instability since independence from France in 1960, it has never before descended into the current near-genocidal situation, which has pitted Muslims against Christians. The CAR has been embroiled in conflict since March 2013, with unprecedented security and humanitarian consequences. In December 2013, the United Nations representative for the first time described the situation as an alarming security threat and evoked the likelihood of genocide and humanitarian disaster if nothing is done. 相似文献
47.
Piet de Klerk 《The Nonproliferation Review》2014,21(3-4):411-424
The 2014 Nuclear Security Summit (NSS) in The Hague was a resounding success, both in organizational terms and in terms of substance. The new substance can be found in the Communiqué, as well as in innovative joint statements by participants, all of which may be considered as implementation of actions decided upon in the Final Document of the 2010 Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons. The next two years in the NSS process cannot be business as usual. This viewpoint makes some suggestions for NSS states to undertake between now and the final summit in 2016, including preparations for winding down the NSS process as we know it. 相似文献
48.
In the late 1950s, as intercontinental ballistic missiles (ICBMs) replaced bombers, the development of Soviet ICBMs prompted fears of strategic vulnerability in the West. The Eisenhower administration's decision to deploy Intermediate Range Ballistic Missiles (IRBMs) on the territory of NATO allies sought to redress the perceived vulnerability until American ICBMs were ready. British deception planners considered how to enhance the threat posed by the IRBMs. An outline plan codenamed ‘Celestial’ was intended to persuade the Soviets that the otherwise vulnerable missiles could not be readily neutralised. This article explores this deception and how such planning also sought to convey accurate information alongside disinformation. It also suggests that deception planners appear to have given little heed to the potentially counterproductive consequences of such an operation. 相似文献
49.
Alexander Ovodenko 《战略研究杂志》2013,36(1):119-144
As the January 1968 Tet holiday approached, CIA analysts and American commanders in South Vietnam developed more accurate conclusions about communist military strategy than did intelligence analysts at CIA headquarters. Besides valuing different types of intelligence, General William Westmoreland, Lieutenant General Frederick Weyand, and CIA analysts in Saigon also placed greater emphasis on new information about communist military strategy than did CIA analysts at Langley. These different reactions to information highlight reasons why military commanders and intelligence analysts stationed in the theater of operations might develop more accurate conclusions about enemy military strategy than intelligence analysts stationed at their national headquarters. 相似文献
50.
Erik J Dahl 《战略研究杂志》2013,36(1):31-55
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism. 相似文献