The Armed Forces: Instrument of Peace, Strength, Development and Prosperity


Book Description

Across the ages, technological developments have been accelerated by the military. This results from the fact that able-bodied vibrant youths are generally involved and are also exposed to high-tech training prevailing at their times for assignments (defence and security) that are essential but not desired. They form the Armed Forces for the nations. Such brilliant military officers like Caesar and Napoleon made their marks; and, in contemporary times, the Armed Forces of United States, France, Britain, Australia, etc are making remarkable contributions to technological developments. Such infrastructure as the Internet, the GPS and the cell phones are products that have significant military contributions. This book scans across the major regions of the world, highlights the efforts of representative countries in the regions and observes that nations that have harnessed the efforts of their Armed Forces have progressively developed. It is also observed that developments in America and Europe, though not entirely dependent on their Armed Forces, have been greatly affected by their efforts. In Asia, such countries as the People's Republic of China, Brazil, India, Pakistan and Singapore utilise the human and material resources within the Armed Forces for national growth and cohesion. Development effort is least in the African Region, except South Africa and Egypt; notwithstanding the high potentials as exhibited by Nigeria's Armed Forces. Although attempts to industrialise through the Armed Forces may be able to create economic development for developing nations, such factors as historical background, economic resources, political climate, government policies and infrastructure are equally important. Economic development programme of an aspiring country should: i. promote education and access to knowledge ii. aspire to economic self-sufficiency in economic power iii. allow and promote private sector and foreign participation in defence production, research and development iv. commit itself to the establishment and support of defence industries v. indigenise defence programmes, establish a balance between military and economic development and vi. mobilise the nation's economy through technology partnership with the private sector and foreign investors.




Human Rights in Nigeria's External Relations


Book Description

This book is a broad-ranging argument for thorough reforms at home and abroad in Nigeria as the only antidote to the nation-building dilemmas Nigeria confronts in the first quarter of the twenty-first century. Because of its enormous material and human endowments, Nigeria is dubbed the “Giant of Africa.” It is a moniker many of its leaders take seriously. Yet, Nigeria is a state rife with instability, some of it periodically erupting into violence. Given still-ongoing national security challenges in the land that notoriously includes a bloody religion-oriented terrorism, the Fourth Republic since 1999, the longest period of continuous democratic rule since independence—key to the timeline of this book—has not been insulated from the spell of instability. The main argument of this work is that internationally agreed-upon ethical standards embedded in human rights can save Nigeria. This book is a methodologically and theoretically-grounded, seminal discourse on Nigerian foreign relations that spells out the human rights or lack thereof in those relations, including underlying and impinging domestic forces. This work is set around six issues of application embedded in a temple of Nigeria’s human rights foreign policy, comprising two steps and four pillars: reconstructed national interest, increased human rights at home, redesigned peacekeeping, reshaped foreign policy machinery, increased bilateralism in foreign relations, and the use of ECOWAS as human rights tool. Although focused on the period since independence, for proper understanding of events from the past that shape the current patterns of politics in the land, this book also embodies a historical background chapter that overviews the pre-colonial and colonial eras.




Space Capstone Publication Spacepower


Book Description

This book, Space Capstone Publication Spacepower: Doctrine for Space Forces, is capstone doctrine for the United States Space Force and represents our Service's first articulation of an independent theory of spacepower. This publication answers why spacepower is vital for our Nation, how military spacepower is employed, who military space forces are, and what military space forces value. In short, this capstone document is the foundation of our professional body of knowledge as we forge an independent military Service committed to space operations. Like all doctrine, the SCP remains subject to the policies and strategies that govern its employment. Military spacepower has deterrent and coercive capacities - it provides independent options for National and Joint leadership but achieves its greatest potential when integrated with other forms of military power. As we grow spacepower theory and doctrine, we must do so in a way that fosters greater integration with the Air Force, Army, Navy, Marine Corps, and Coast Guard. It is only by achieving true integration and interdependence that we can hope to unlock spacepower's full potential.







Globalization of the Free Economy


Book Description

There are deep flaws in this view of globalization. The chief one is that established fact and known economic patterns don’t support skepticism about the benefits of trade and cross border investment. While open economies always are subject to new competition and structural changes that affect firms and jobs, the flip side of the coin is that the same economic processes create a lot of new jobs and business opportunities, and ultimately improve the living standards. Moreover, the new jobs that are created tend to be better rewarded and come with better working conditions. New output is often greener and thrives on new technology, leading to positive change also outside the economy. This book will take a thorough view about the impact of globalization on the economy of Brazil and how it began and where it arrived. Economy of Brazil is the world's sixth largest economy by nominal GDP and eighth largest by purchasing power parity. The Brazilian economy is characterized by a mixed economy that relies on import substitution to achieve economic growth. Brazil has an estimated US$21.8 trillion worth of natural resources which includes vast amounts of gold, uranium, iron, and timber.




Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities


Book Description

The internet has greatly enhanced access to, dissemination, and sale of child pornography, which is a profitable industry estimated to generate billions of dollars worldwide. While efforts to address the issue of sexual exploitation of children may be slow, the capabilities of offenders to organize, communicate over the internet, and harness technology are unequivocally fast. Protection of children against cyber exploitation has become imperative, and measures should be taken that are specific and targeted to provide specialized victim identification capabilities; adequate protection for children using the internet; genuine participation of children; a full and responsible private sector; and finally, coordinated, effective, and structured international cooperation to protect all children. Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities provides innovative research for understanding all elements of combating cyber exploitation of children including the roles of law enforcement, international organizations, and the judicial system and educating children and their families to the dangers of the independent internet usage through cyberspace awareness programs. The content within this publication examines child grooming, cyberbullying, and cybercrime. It is designed for law enforcement, lawmakers, teachers, government officials, policymakers, IT specialists, cybercriminal researchers, psychologists, victim advocates, professionals, academicians, researchers, and students.




Security Solutions for Hyperconnectivity and the Internet of Things


Book Description

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.




The ESL Writer's Handbook, 2nd Ed.


Book Description

The ESL Writer’s Handbook is a reference work for ESL students who are taking college-level courses. Because its purpose is to provide help with the broad variety of writing questions students may have when working on school assignments, the text focuses on English for Academic Purposes. Unlike other handbooks on the market, this book’s sole purpose is to address the issues of second language learners. The spiral-bound Handbook complements a student writer’s dictionary, thesaurus, and grammar reference book. It would be suitable as a text for an advanced ESL writing course when used together with the companion Workbook (978-0-472-03726-1). The new edition features significant revisions to Sections 3 and 4; in particular, both APA and MLA style guides have been updated and new sample papers for each are included. The new edition includes new and revised exercises and many new samples of student writing. Like its predecessor, the 2nd Edition has these special features: The topic selection is based on ESL writers’ needs as observed by the authors over many years. The coverage of topics is more complete than the limited amount usually provided for ESL writers in first language or L1 handbooks. The explanatory language is appropriate for ESL students, in contrast to the more complex and idiomatic language of other English handbooks. Many of the examples of paragraphs, essays, research papers, and exercise sentences were written by ESL students to help users realize that they too can become effective writers.




The New Era Of Exponential Encryption


Book Description

In their book "Era of Exponential Encryption - Beyond Cryptographic Routing" the authors provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes: Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both, encryption and decryption, require more session-related and multiple keys, so that numerous options even exist for configuring hybrid encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption, with that ciphertext is converted again and again to ciphertext. It will be analyzed how a handful of newer applications like e.g. Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger and other open source software programming implement these encryption mechanisms. Renewing a key several times - within the dedicated session with "cryptographic calling" - has forwarded the term of "perfect forward secrecy" to "instant perfect forward secrecy" (IPFS). But even more: if in advance a bunch of keys is sent, a decoding of a message has to consider not only one present session key, but over dozens of keys are sent - prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco Keys. Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and define Fiasco Forwarding, the approach which complements and follows IPFS. And further: by adding routing- and graph-theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If routing does not require destination information but is replaced by cryptographic insights, then it is "beyond cryptographic routing". "Cryptographic Discovery" means: If the cryptographic token is matching, the message belongs to me. The Echo Protocol is in this regard an initial welcome within the Era of Exponential Encryption. The authors identify also four arms within the Era of Exponential Encryption and derive from these developments social, legal, political and economic recommendations.




Indo-Pacific Strategy Report - Preparedness, Partnerships, and Promoting a Networked Region, 2019 DoD Report, China as Revisionist Power, Russia as Revitalized Malign Actor, North Korea as Rogue State


Book Description

This important report was issued by the Department of Defense in June 2019. The Indo-Pacific is the Department of Defense's priority theater. The United States is a Pacific nation; we are linked to our Indo-Pacific neighbors through unbreakable bonds of shared history, culture, commerce, and values. We have an enduring commitment to uphold a free and open Indo-Pacific in which all nations, large and small, are secure in their sovereignty and able to pursue economic growth consistent with accepted international rules, norms, and principles of fair competition. The continuity of our shared strategic vision is uninterrupted despite an increasingly complex security environment. Inter-state strategic competition, defined by geopolitical rivalry between free and repressive world order visions, is the primary concern for U.S. national security. In particular, the People's Republic of China, under the leadership of the Chinese Communist Party, seeks to reorder the region to its advantage by leveraging military modernization, influence operations, and predatory economics to coerce other nations. In contrast, the Department of Defense supports choices that promote long-term peace and prosperity for all in the Indo-Pacific. We will not accept policies or actions that threaten or undermine the rules-based international order - an order that benefits all nations. We are committed to defending and enhancing these shared values.China's economic, political, and military rise is one of the defining elements of the 21st century. Today, the Indo-Pacific increasingly is confronted with a more confident and assertive China that is willing to accept friction in the pursuit of a more expansive set of political, economic, and security interests. Perhaps no country has benefited more from the free and open regional and international system than China, which has witnessed the rise of hundreds of millions from poverty to growing prosperity and security. Yet while the Chinese people aspire to free markets, justice, and the rule of law, the People's Republic of China (PRC), under the leadership of the Chinese Communist Party (CCP), undermines the international system from within by exploiting its benefits while simultaneously eroding the values and principles of the rules-based order.This compilation includes a reproduction of the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community. 1. Introduction * 1.1. America's Historic Ties to the Indo-Pacific * 1.2. Vision and Principles for a Free and Open Indo-Pacific * 2. Indo-Pacific Strategic Landscape: Trends and Challenges * 2.1. The People's Republic of China as a Revisionist Power * 2.2. Russia as a Revitalized Malign Actor * 2.3. The Democratic People's Republic of Korea as a Rogue State * 2.4. Prevalence of Transnational Challenges * 3. U.S. National Interests and Defense Strategy * 3.1. U.S. National Interests * 3.2. U.S. National Defense Strategy * 4. Sustaining U.S. Influence to Achieve Regional Objectives * 4.1. Line of Effort 1: Preparedness * 4.2. Line of Effort 2: Partnerships * 4.3. Line of Effort 3: Promoting a Networked Region * Conclusion