scholarly journals Quantum Cryptography for Nuclear Command and Control

2020 ◽  
Vol 13 (1) ◽  
pp. 72 ◽  
Author(s):  
Derek Hall ◽  
Timothy Sands

The nuclear inventory of Russia and the USA currently comprises 12,685 warheads in a large network of vehicles; and the interconnected network is managed by a command and control communication system. This command and control communication system (C3) must also relay information from numerous airborne, space-born, and ground sensors throughout the network in potentially degraded environments and are nonetheless meant to securely hold transmissions that must be held to the highest standards of encryption. C3 systems are also arguably one of the most challenging systems to develop, since they require far more security, reliability, and hardening compared to typical communication systems, because they typically must (absolutely) work while other systems fail. Systems used for C3 are not always cutting-edge technology, but they must be upgraded at crucial junctures to keep them at peak performance. This manuscript outlines a blueprint of a way to embed current and future systems with revolutionary encryption technology. This will transform the security of the information we pass to our C3 assets adding redundancy, flexibility, and enhanced speed and insure vehicles and personnel in the system receive network message traffic. Quantum key distribution (QKD) has the potential to provide nearly impregnable secure transmissions, increased bandwidth, and additional redundancy for command and control communication (C3). While QKD is still in its adolescence, how QKD should be used or C3 must be charted out before it can be engineered, tested, and implemented for operations. Following a description QKD functionality, its pros and cons, we theorize the best implementation of a QKD system for C3.

2020 ◽  
Vol 18 (2) ◽  
pp. 91-104
Author(s):  
Tony McAleavy, BA (Hons), MSc, PhD

Objective: This study investigates emergency manager’s perceptions of Command and Control to answer the question “how do emergency managers metaphorically interpret Command and Control?”Design: An interpretivist paradigm, verbatim transcription, and content and linguistic metaphor analysis were used within this study.Setting: Fifteen interviews per country, three per selected organization were conducted in the United Kingdom and the United States of America.Subjects: Purposive sampling identified suitable participants from key organizations engaged in emergency management at local, subnational, and national levels.Interventions: The study consisted of 30 semi-structured face-to-face interviews conducted within the work-place.Main Outcome Measure(s): The inductive and qualitative nature of the study resulted in a 300,000-word corpus of data from which the two posited theories emerged.Results: The UK Gold, Silver, Bronze model and the USA Incident Command System were considered tried and tested although they are conceptually misunderstood. Moreover, they are believed to be essential, scalable, and flexible. Able to manage the perceived chaos of increasing scales of disaster which contradicts the existing literature.Conclusions: Two conceptual metaphors are theorized to create flexible learning tools that challenge the entrenched nature of these findings. Command and Control as a Candle demonstrates the effects of increasing disaster scale on systemic efficacy. Command and Control as a Golden Thread illustrates problems caused by time, distance, resource depletion, and infrastructure degradation. These tools engender deeper more critical perspectives by linking theory to practice through metaphor to engender perceptual change.


Author(s):  
Raphaël Gellert

The final chapter provides conclusions containing a summary of the main argument pertaining to the risk-based approach as an implementation of meta regulation in the data protection context. It returns to the debate between rights and risk-based approaches with a focus on the issue of standard setting in data protection, given that the latter has been left out of the equation of the risk-based approach. This renewed focus on the distinction between rights and risk-based approaches allows for a final discussion on the pros and cons of the risk-based approach especially in contrast to a command and control type of data protection. Finally, the chapter also reflects on some of the limitations and contradictions inherent in the notion of regulation and regulation models, and what this means for the future of data protection.


Author(s):  
Artsrun Hovhannisyan

It is no surprise that just like the previous years, this year as well China has expanded its military budget, put another ship to sea, demonstrated new weaponary at the military parade, etc. For the last two decades, all the combat arms of the Chinese army has been developing at a high rate. Many authors claim very specific reasons for the Chinese armaments especially highlighting the conflicts with its immediate neighbors. From a geopolitical point of view, an interesting balance of power is being formed in the East. It’s been several years now that there are some precise problems in China-Japan conflict related to the power over some islands. China actively builds artificial islands which can serve as military bases far away from its shores approximately at an operative depth. And this matter deeply concerns the Philippines and Vietnam. In this light, it would be very interesting to study the balance of forces in the region and to analyze the American military doctrine on the one hand and the Chinese specific military and military-political attempts to appose it on the other hand. It is common knowledge that in political and professional circles in the USA are concerned about the actions and capabilities of China and Russia, which can considerably restrict the US access to key regions of Eurasia: Today, China and Russia have great potential to influence on the traditional American Net-platform weaponary, Air Forces, Navy, command and control networks, and even the orbital groupings. The two countries mentioned above, which are perceived as potential adversaries in the USA, strive to reach the level of the American military by all possible means and develop powerful techonologies. Russia and especially China are designing powerful satellite systems, various long-range missiles, fighter jets, UAVs, etc. New Electronic Warfare (EW) systems are being developed, to suppress or weaken the command and management systems of the US or its allies. The People’s Liberation Army (PLA) of China also has the capacity to destroy settelites, disrupt extraterrestrial intelligence, wreck command and control networks, etc. According to experts, there is no guarantee that the armed forces of the USA can ensure reliable and secure communication and conncetion during conflicts on the theater of military operations, in particular on operational and strategic levels.


Sign in / Sign up

Export Citation Format

Share Document