scholarly journals European Defence: a puzzle with many unknowns

2020 ◽  
pp. 21-52
Author(s):  
Tatyana Arzamanova ◽  

Under the pressure of the growing turbulence of EuroAtlantic space due to the increasing isolationism of the United States and the fact that Global security is now determined by the confrontation between the two centers of power – the United States and China, as well as the shift of strategic decision-making into the USA-Russia-China triangle, Europe is forced to admit that the period of solidarity of the collective West is over. If earlier differences between the allies were exclusively tactical, now they affect already fundamental foundations. In the current situation, Europe will try to intensify the development of the European defence component and strengthen integration in the field of security policy in order to achieve full strategic sovereignty. This process is complicated by the low level of European defence capacity, the shortage of funds of the European defence budget, weak strategic planning, and the unresolved issue of limits of supranational competences of the command of the European Armed Forces. With the use of comparative, event and content analysis, it is concluded that the key problem is that EU member states have a different scale of assessment of risks and security threats, they find it difficult to reach a common understanding, without which the development of a strategic concept of European defence will be largely decorative. The author cosiders that it is first and foremost necessary to establish a Pan-European consensus on basic points, including a set of definitions. A serious challenge for the European defence project was coronavirus COVID-19. The pandemic revealed a global crisis of leadership, a lack of solidarity, and the world's lack of preparedness for a large-scale biological threat. In the near future, states will consider biological attacks among the priority security threats, and this seems to the author to be a promising field for cooperation within the framework of European defence. It is about the development of a Pan-European system of recognition, warning and opposition to the bacteriological threat using developments in the field of artificial intelligence.

Author(s):  
Volodymyr Yushkevych

The article reveals a set of measures taken by the United States of America to assist “the refugees of war” in the context of local conflict in the Korean Peninsula. It is underlined that securing assistance to hundreds of thousands of Korean refugees has become a unique experience for the United States and the international community in providing financial support, assistance programs, combat operations, and organized troop deployment. Particular attention was paid to the decisions and actions of the US Armed Forces Command aimed at avoiding panic among refugees from the North, evacuating civilians, setting up and operating Refugee Camps. The unprecedented scale of the Hungnam rescue operation carried out during the offensive of the Chinese and North Korean troops in December 1950 is examined. The first exampled experience was the work of the United Nations Civil Aid Command in Korea, whose field teams distributed clothing, supplies, consumer goods and large-scale vaccinations against smallpox and typhoid during the second half of 1950. In addition, it reviewed the work of UNCURK, which was to help rebuild the country. As part of the program, Korean refugees received rice, used clothing and shoes, and medical equipment. At the same time, the establishment and activities of the UNKRA, to whom the United States has been the major donor, have played a leading role in assisting the forced migrants. The relief programs subsequently became a significant factor in the Westernization and economic revival of the Republic of Korea. It has been shown that in the context of the military conflict in Korea, US assistance to refugees was provided not only through a profile UN agency but also through the active involvement of US military structures and non-governmental organizations. The role of volunteer organizations and private initiatives of the American public in support of the Korean Refugee was noted.


2009 ◽  
Vol 60 (1) ◽  
pp. 83 ◽  
Author(s):  
Anna M. Roberts ◽  
Matthew J. Helmers ◽  
Ian R. P. Fillery

Dryland salinity and water quality problems occur in the Great Plains and cornbelt regions of the United States of America (USA) and southern Australia due to the replacement of native perennial systems by annual species. We outline the hydrological effects of selected farming systems in both countries and review progress towards development of new perennial systems with potential to reduce dryland salinity effects. In Australia, development and large-scale trialling are further advanced than in the USA. In both countries there are usually insufficient benefits to farmers to adopt perennials at the scale needed to reduce environmental effects. Perennials are generally more complex to manage and, for successful adoption, greater skills are often required than to manage annuals. Experience from the Conservation Reserve Program in the USA to encourage conversion of cropland to perennials indicates that the scale of landscape change achieved (in the order of 5%) is still low. Lessons learnt in both countries from experiences include: (1) careful thought as to where perennials are most needed (targeting); (2) plant development programs targeted at key environments; (3) involvement of farmers in research at the outset to ensure that systems developed are profitable and adoptable; (4) the need for a trialling and learning program; (5) appropriate choice of policy tools to maximise environmental outcomes.


Author(s):  
Olga Novikova ◽  

Beginning with an overview of the threats of terrorism in Europe and the USA, the author offers a survey of factors that have been identified as influencing the practices of counterterrorism or law enforcement agencies. Massive counterterrorism operations in Syria and Iraq as well as effectiveness of the counterterrorism authorities curbed large-scale attacks of jihadists in both Western Europe and the United States. But with one of the Islamic State’s key goals being the formation of a new society, rather than simply military victories, the dissemination of its brand and ideology via mainstream social media becomes critical to achieving ISIS’ strategic goals. A surge in the Muslim population with subsequent high Muslim unemployment has been shown to be a predisposing factor for radicalization of the part of Muslim diasporas and its recruitment into the global jihad. The EU-members and the United States need to work more closely on disrupting jihadists’ social media, travel, recruitment and logistics, countering terrorist finance, protecting potential targets. The importance of sharing information is specifically underlined. But the polarisation of society, discrimination and other psychological and sociological factors can reinforce people’s vulnerability to radical discourse. Thus, counter-terrorism should not be purely repressive: integration and iclusion would contribute to prevention efforts, assuming that a more cohesive and inclusive society can help prevent the spread of extremist ideologies leading to terrorism.


Author(s):  
Michael Snape

This chapter identifies the wartime roots of the post-Second World War religious revival in the United States, stressing the importance of military service as a galvanizing force in religious terms. Far from being a product of the Cold War, or a simple echo of ‘foxhole religion’, the revival owed much to the privileged position of religion in America’s armed forces during the war years and to the resources devoted to their religious and moral well-being. Fortified by post-war prosperity and by the benefits of the GI Bill, US veterans were well placed to further the religious revival stirred by the war itself. The situation in Britain was very different. Although the war also had an invigorating effect on British religion, the economic situation of post-war Britain and the lot of veterans helped to ensure that a religious revival comparable to that in the USA failed to materialize.


2021 ◽  
pp. 139-144
Author(s):  
S. STEZHKO ◽  
T. SHEVCHENKO

The content and key aspects of the US Cyber Security Strategy are considered. The principles of the state cyber security policy of the USA are defined. Typical threats to the United States in cyberspace are outlined. The state priorities for strengthening the components of cyber defense in the United States are summarized. The issue of financing cyber security in the United States in 2021 is detailed. The principles of joint activities of American-Ukrainian relations in the field of cyber security are specified. The list of measures implemented in the United States to strengthen the state's capabilities in the field of cyber security has been identified.


Vojno delo ◽  
2021 ◽  
Vol 73 (1) ◽  
pp. 1-14
Author(s):  
Dejan Vuletić ◽  
Miloš Milenković ◽  
Anđelija Đukić

Modern society is critically dependent on information as a strategic resource and information and communications technology, which carries out its transmission, processing and exchange. Information and communications technology has created a new environment, cyberspace, in which tensions, disagreements and incidents are becoming more frequent. In recent years, the mentioned area has increasingly appeared as a domain of conflict between the leading world and regional powers. The paper gives a brief description of the concept of operations in several domains and elements of the new concept of joint warfare of the US Armed Forces. The importance of cyberspace for the US has been pointed out with a review of organizational changes and the adoption of certain strategic and doctrinal documents. The paper presents certain events and activities in cyberspace, in recent years, between the United States on the one hand, and Iran and North Korea on the other. The United States Cyber Command (USCYBERCOM) was created in 2009. USCYBERCOM was elevated to the status of a full and independent unified command in May 2018. It indicates the importance of cyberspace for the Pentagon. In many ways, the separation of USCYBERCOM from Strategic Commands, which oversees strategic rejection, is a symbol of the change in the US attitude in cyberspace from "defensive" to "persistent engagement." The United States is still the strongest force in cyberspace and shows ambition to carry out cyber operations at all levels of command. It is unlikely that Iran will provoke the United States into a large-scale military conflict and wage a direct war in cyberspace. Iran has rapidly improved its ability to operate in cyberspace, and it is estimated that this trend will continue. The imbalance can prevent Iran from a direct military conflict with the United States and its allies. Greater action is expected with an asymmetric arsenal such as e.g. cyber attacks. Iranian and North Korean operations are similar in target selection, planning and exploitation of attacks. Both countries undertake different variants of phishing attacks in an attempt to deceive their victims into downloading malicious software by presenting it as a legitimate link or file. Whereas Iran usually had a motive only to cause disruption to the functioning of financial institutions, North Korean motive was both financial and political retaliation. Certain discovered incidents indicate that North Korea devotes much more time to conducting invasive surveillance before carrying out attacks. Numerous examples show that some activities have been prepared over the years and with the support of certain state bodies. Regardless of the fact that an investigation has been launched against certain groups, most often sponsored by states, it is unlikely that this will deter countries such as North Korea and Iran from giving up further activities and will pose an increasing threat to the US security.


2020 ◽  
Vol 196 (2) ◽  
pp. 320-338
Author(s):  
Mikołaj Kugler

The article discusses how the United States of America has contributed to the security of Central and Eastern Europe, both politically and militarily, since the end of the Cold War, using Poland’s example. It shows that the United States committed itself to the security of both Poland and the region, following the collapse of communism in Poland in 1989, albeit to a varying degree in different countries. America played a pivotal role in NATO enlargement in the 1990s, and in extending security assurances to Poland, Hungary, and the Czech Republic, as well as to other countries in the subsequent years. It has continued to assist Poland with its defence reform, thus enhancing its military capabilities. It was also instrumental in strengthening NATO’s eastern flank after 2014, a salient point on Poland’s security agenda since it acceded to the Alliance. It is argued that American political and military involvement in Poland’s security has been both substantial and beneficial, and there is a real need for continued political and military cooperation with the USA and its presence in the region. In the article, the determinants of Poland’s post-Cold War security policy are outlined. Next, the roles that both countries have played in each other’s policies are explained. After that, the US contribution to Poland’s security, both in the political and military spheres, is presented. Finally, an attempt is made to evaluate American involvement, and the author’s perspective on the future of the Poland-US cooperation is offered.


2021 ◽  
Vol 2 (53) ◽  
pp. 181-187
Author(s):  
S.A. Starykh  ◽  
◽  
 S.A. Lavoshnikova ◽  
 A.D. Chesnokova ◽  
◽  
...  

Subject. Trade relations between the United States and China on the example of Apple and Huawei. Topic. The competitiveness of Apple and Huawei products. Purpose. Calculate the integral indicator by means of technical and economic parameters of the competitiveness of products of these organizations. Methodology. Methods of logical and comparative analysis of the turnover of Apple and Huawei companies. Results. Large-scale forms of competition acquire the character of a trade war, which increasingly restrains the opponent with the help of the non-price factor of competition. Application area. The trade balance between China and the United States by means of sales of Apple and Huawei products. Conclusions. The article examines the consequences of the trade war between the United States and China on the example of the companies «Apple» and «Huawei». Based on the calculation of the integral indicator, the technical and economic parameters of the competitiveness of the products of these organizations were obtained. It was concluded that large-scale forms of competition acquire the character of a trade war, which increasingly restrains the opponent with the help of the non-price factor of competition. Key words: trade war, competitive advantage, trade balance between China and the USA, global smartphone market, integral indicator of competitiveness


1966 ◽  
Vol 05 (02) ◽  
pp. 67-74 ◽  
Author(s):  
W. I. Lourie ◽  
W. Haenszeland

Quality control of data collected in the United States by the Cancer End Results Program utilizing punchcards prepared by participating registries in accordance with a Uniform Punchcard Code is discussed. Existing arrangements decentralize responsibility for editing and related data processing to the local registries with centralization of tabulating and statistical services in the End Results Section, National Cancer Institute. The most recent deck of punchcards represented over 600,000 cancer patients; approximately 50,000 newly diagnosed cases are added annually.Mechanical editing and inspection of punchcards and field audits are the principal tools for quality control. Mechanical editing of the punchcards includes testing for blank entries and detection of in-admissable or inconsistent codes. Highly improbable codes are subjected to special scrutiny. Field audits include the drawing of a 1-10 percent random sample of punchcards submitted by a registry; the charts are .then reabstracted and recoded by a NCI staff member and differences between the punchcard and the results of independent review are noted.


Sign in / Sign up

Export Citation Format

Share Document