Book

Technology Security and National Power: Winners and Losers

Authors:

Abstract

In Technology Security and National Power, Stephen D. Bryen shows how the United States has squandered its technological leadership through unwise policies. Starting from biblical times, he shows how technology has either increased national power or led to military and political catastrophe. He goes on to show how the US has eroded its technological advantages, endangering its own security. The scope of Technology Security and National Power extends across 3,000 years of history, from an induced plague in Athens to chemical weapons at Ypres to an atomic bomb on Hiroshima to the nuclear balance of terror. It describes new weapons systems and stealth jets, cyber attacks on national infrastructure, the looting of America’s Defense secrets, and much more. The core thesis is supported by unique insight and new documentation that reaches into today’s conflicted world. More than a litany of recent failures and historical errors, this book is a wake-up call for political actors and government officials who seem unable to understand the threat. Technology Security and National Power proposes that the United States can again become a winner in today’s globalized environment.
... The Tribes entered the Land of Israel with a devotion and ferocity that was unprecedented. This was matched by an ability to combine highly effective military art with very strong religious beliefs [1,2]. ...
... In other words, people have already died from this; and not a trivial number of them. The United States military establishment left some six billion dollars of equipment on the ground in Iraq, after its hasty retreat [2,12] 3 . All exemplars of equipment were promptly shipped "next door" to Iran and Iran has reverse-engineered virtually all the technologies. ...
Article
Full-text available
For the past three millennia or so, land warfare has been based upon three types of fighting forces, infantry, rapid deploy forces (such as horse-based cavalry) and armoured vehicular forces. This article discusses aspects of the latter. We examine a bit of the history and attempt some extrapolation to conceive where this force may be headed. In that sense, the article is also speculative. Basically, where are armoured fighting vehicles going (pardon the pun)? At present, it appears that they may have reached a technological impasse, as motor technology has not advanced significantly for the past century-fuel use today is remarkably similar to that of the original Ford Model T. We begin the discussion with historical aspects emphasising the difficulty of powering mechanisms, continue with electronic vulnerabilities that are not well-known and then finish with powering issue for the future. Tanks historical success has been firstly based upon their power-source, with vulnerabilities coming into play primarily when the issue is tank-to-tank; this may change. Today’s vulnerabilities may be more profound than is generally perceived.
... Therefore, many related studies address the privacy issue, for example, a simple scan at distance has proposed for immediately concealed weapons though using ground-breaking technology [14][15]. For semiconductors, the technology world has developed many digital imaging sensors to increase the performance of IR cameras [16]. To provide a uniform image output, modern consumer electronics for capturing image has deployed over electromagnetic spectrum aspects, which used to high substantial internal processing. ...
Article
Full-text available
p>Monitoring the general public gathered in large numbers is one of the most challenging tasks faced by the law and order enforcement team. There is swiftly demand to that have inbuilt sensors which can detect the concealed weapon, from a standoff distance the system can locate the weapon with very high accuracy. Objects that are obscure and invisible from human vision can be seen vividly from enhanced artificial vision systems. Image Fusion is a computer vision technique that fuses images from multiple sensors to give accurate information. Image fusion using visual and infrared images has been employed for a safe, non-invasive standoff threat detection system. The fused imagery is further processed for specific identification of weapons. The unique approach to discover concealed weapon based on DWT in conjunction with Meta heuristic algorithm Harmony Search Algorithm and SVM classification is presented. It firstly uses the traditional discrete wavelet transform along with the hybrid Hoteling transform to obtain a fused imagery. Then a heuristic search algorithm is applied to search the best optimal harmony to generate the new principal components of the registered input images which is later classified using the K means support vector machines to build better classifiers for concealed weapon detection. Experimental results demonstrate the hybrid approach which shows the superior performance.</p
... All existing source code must be stored for Enterprise access, using a Software Configuration Management system or some derivative model. Access to this should be limited in a way that is acceptable to corporate needs, project needs and development staff [2]. All source modules accessed for update must be accessed only through the SCM/EAM system. ...
Article
Full-text available
Information is data processed in such a manner such that it becomes meaningful for the user (consumer) of that information. Namely, data organised for semantic association. This is particularly true of "information about information" ("meta-information"). Software is a form of information; what we are talking about is information used to describe software. The IS' role is to capture data, organise by semantic association and allow meaningful uses via expressive queries. In addition, IS' are most successful when the data has human-imposed structure. Relational systems provide powerful tools because they supply "human" constraints, helping users fit it to the application domain. There exists the counter example of the worldwide web (totally devoid of structure). However, this is not a refutation because hyperlinks are not a coherent information domain (which is exactly its strength, it is not meant to be one information system). Abstract Often the most fertile insights into contemporary problems come not from those in the mainstream but from the more adventurous spirits who have charted their own intellectual course. Definition of anthropology: the science of human beings; especially: the study of human beings and their ancestors through time and space and in relation to physical character, environmental and social relations, and culture. What are the anthropological aspects of information and of software-the entity that controls information (at least, certain dimensions of control)? We know that software and information are both notoriously difficult to manage well. What does that mean, why is it important, and what can be done about it? Much to the surprise of many readers, these questions are life critical issues, for almost all of humanity.
Book
Terrorism and WMDs: Awareness and Response, Third Edition is updated to include the latest technology and tactics surrounding the threats posed by terrorist groups—detailing plausible contexts in which chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons could be used by such actors. Two new chapters outline the historical origins of terrorism, terrorist typologies, and the evolution of the modern terrorist environment. Coverage also focuses on the chemistry and biology of weapons of mass destruction and, the development and history of their use, as well as the human health effects of such weapons. Added references, chapter questions—and the addition of recent terrorist acts to relevant sections—all present the modern threat environment and realistic WMD material access and attack capabilities. Given that terrorist weapons and delivery methods are becoming increasingly sophisticated, the book provides a comprehensive, current survey of terrorism and weapons of mass destruction.
Article
Artykuł to kontynuacja rozdziału Priorytet odstraszania i ocean światowy – dwie tezy o uwarunkowaniach bezpieczeństwa Polski z książki zbiorowej Współczesne wyzwania bezpieczeństwa Polski, WAT 2015. Polska polityka i strategia obronna może korzystać z synergii czterech tez: 1. Wskutek nierówności potencjałów i braku głębi strategicznej naturalnym priorytetem Polski jest odstraszanie. Trzeba wzmacniać odstraszanie nuklearne i konwencjonalne przez NATO i rozwijać narodowe siły odstraszania, będące zarazem wkładem do potęgi NATO i UE. 2. Polska powinna aktywnie korzystać z położenia nad morzem zgodnie z myślą Mahana, geopolityką i strategią NATO. Rozwój potęgi na morzu daje liczne korzyści, w tym opcję odstraszania środkami o maksymalnej zdolności przetrwania pierwszego ataku. 3. Polska może osiągnąć strategiczną przewagę – nie ilościową, lecz jakościową – przez rozwój nauki, technologii i gospodarki opartej na wiedzy, pod warunkiem zwiększenia udziału R&D w gospodarce i nakładów na obronność do poziomu czołowych państw Zachodu i Azji Wschodniej. Sprzyja Polsce członkostwo w UE, NATO i OECD. 4. Połączyć trzeba dwa historyczne polskie programy geopolityczne – piastowski (zachodni) i jagielloński (wschodni) – w pojedynczy program euroatlantycki. Dotąd przeciwstawne i konkurencyjne, programy te mogą i powinny być połączone dziś, gdy Polska należy do NATO i UE, zajmując miejsce na flance wschodniej organizacji zachodnich. Obydwa programy zaczęły być realizowane niesprzecznie już w czasach starań Polski o przyjęcie do NATO i UE, a zarazem rozwijania współpracy z krajami środkowoeuropejskimi w ramach Grupy Wyszehradzkiej i wschodnioeuropejskimi na Międzymorzu. Polska nie może izolować się od żadnych części obszaru euroatlantyckiego i ograniczać swojego dostępu do ich różnych zasobów – od zasobów naukowych i technologicznych po porty morskie i oceaniczne. Jednoczesne przyjęcie wszystkich czterech tez pozwala wszechstronnie wyjaśnić stan i wyzwania bezpieczeństwa zewnętrznego Polski oraz znaleźć adekwatne rozwiązanie.
Article
Full-text available
It is clear to any objective observer that in the coming decades – likely by the year 2050 – the use of hydrogen for energy will be a central global phenomenon – facts on the ground demand it, facts under the ground demand it and consumers demand it (the latter being the most important). When a Business Model is driven by consumer demand, the products, as well as the model, must be as responsive as those consumers expect. Hydrogen will be increasingly needed for automobiles, and this is probably the largest application in terms of quantity of gas used, but it is also sorely needed for many other applications; industrial but not only large-scale industrial (the coming decades will also see a large increase in individual manufacturing via printing technologies, as well as greater emphasis on nanotechnologies, and hydrogen is also very important to both of those). However, there are two impediments which must be addressed: scaling up and Green Hydrogen (or at least, significantly “greener”) both of those terms are described below. This article addresses these two central issues, as well as other less central, issues needed to support that effort. The project herein described is an actual project (not theoretical) in process of being built. Caveat: Specific Product names are not used to prevent ethical violations.
ResearchGate has not been able to resolve any references for this publication.