Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2022, Small Wars Journal
This article summarizes the present era of neuro cognitive warfare alerting readers to its non-kinetic technologies having long term strategic effects. Global leaders are urged to take note of the threat and assign it priority before its insidious nature undermines civilized society and opens the door to indirect colossal influences on thought, judgement, behavior and reasoning
Polytechnique Insights, 2025
Cognitive warfare explores the potential manipulation by hostile actors using cognitive science, such as propaganda and disinformation.
Advances in Neurotechnology: Ethical, Legal, and Social Issues, 2014
HAL (Le Centre pour la Communication Scientifique Directe), 2023
Cognitive warfare is an emerging concept in the literature, linked to the development of new technologies and of knowledge on cognition, as well as the involvement of public opinion in conflicts. It is currently the subject of debate within NATO. Used to destabilize adversaries or make them "destroy themselves from the inside", it is becoming a major concern, and we need to learn how to detect it and protect ourselves against it. This paper aims to define cognitive warfare, other close concepts and its players, and to outline the issues at stake.
HAL (Le Centre pour la Communication Scientifique Directe), 2022
Cognitive warfare is now with us. The main challenge is that it is essentially invisible; all you see is its impact, and by then … it is often too late." Cognitive warfare is now seen as its own domain in modern warfare. Alongside the four military domains defined by their environment (land, maritime, air and space) and the cyber domain that connects them all, recent events upsetting the geopolitical balance of power have shown how this new warfare domain has emerged and been put to use. It operates on a global stage since humankind as a whole is now digitally connected. It uses information technology and the tools, machines, networks, and systems that come with it. Its target is clear: our individual intelligences, to be considered both individually and as a group. Attacks are defined, structured, and organized to alter or mislead the thoughts of leaders and operators, of members of entire social or professional classes, of the men and women in an army, or on a larger scale, of an entire population in a given region, country or group of countries. It can have a variety of objectives and will adapt itself to the strategy being used: territorial conquest (a bordering region, peninsula, or group of islands for instance), influence (elections, stirring up popular unrest), service interruptions (national or local administrations, hospitals, emergency services, and sanitation, water, or energy supplies) or transportation (airspaces, maritime chokepoints…), information theft (through involuntary disclosure or the sharing of passwords…) etc. Cognitive warfare is the art of using technology to alter the cognition of human targets, who are often unaware of any such attempt, as are those entrusted with countering, minimizing, or managing its results, whose reaction is too slow or inadequate. 2.1 A FEW DEFINITIONS Cognitive warfare is thus an unconventional form of warfare that uses cyber tools to alter enemy cognitive processes, exploit mental biases or reflexive thinking, and provoke thought distortions, influence decision making and hinder action, with negative effects, both at the individual and collective levels.
New Wars and New Soldiers: Military Ethics in a Contemporary World, 2011
There has been considerable recent debate regarding the status of novel military technologies and how the use of these technologies meets the standards of the Just War tradition. These issues are especially problematic within the context of asymmetric warfare, warfare in which the relative military strength opposing forces is significantly different. This paper is an exploration of a particular type of novel military technology, in which soldiers can control military robots or vehicles via a direct neural connection. This emerging field has been labelled neurowarfare (White, 2008, 177), and forms part of a larger discussion regarding how technological advances in the military will shape the ways in which wars are conducted.
2016
This is a study of the tone system of the Mường dialect of Kim Thượng (province of Phu Thọ, Vietnam). Distributional analysis – a classical procedure in linguistic fieldwork – brings out five tones on smooth syllables, and two tones on stopped syllables. These tones form the topic of an experimental phonetic study. Special attention is devoted to one of the tones of smooth syllables (labelled Tone 4), which is glottalized near the beginning of the rhyme. Audio and electroglottographic recordings allow for the measurement of fundamental frequency and for an estimation of the glottal open quotient, a parameter that offers indications on phonation type. The study addresses challenges linked to the quantitative study of glottalization, in order to propose a detailed picture of how tones pattern in terms of fundamental frequency, duration, and phonation types.
2019
This Report summarizes the proceedings of the 2019 Les Houches workshop on Physics at TeV Colliders. Session 1 dealt with (I) new developments for high precision Standard Model calculations, (II) the sensitivity of parton distribution functions to the experimental inputs, (III) new developments in jet substructure techniques and a detailed examination of gluon fragmentation at the LHC, (IV) issues in the theoretical description of the production of Standard Model Higgs bosons and how to relate experimental measurements, and (V) Monte Carlo event generator studies relating to PDF evolution and comparisons of important processes at the LHC. i arXiv:2003.01700v1 [hep-ph]
1989
Benzannulated and a series of constrained derivatives of the essential amino acids tyrosine and tryptophan were synthesized. The synthesis of the two benzannulated tyrosine analogs followed traditional synthetic protocols tha t basically consisted of obtaining key oxazolones and further elaboration to the target amino acids; the la tter compounds were obtained as racemic m ixtures. All the reaction in te rm ed ia tes were fully characterized spectroscopically, and when possible, structure proof was established by X-ray crystallographic determinations. Asym m etric hydrogenation studies on the in te rm ed ia te (Z)-2benzoylaminoacrylic acids were undertaken in an effort to obtain enantiomerically pure m aterials. The products were, in fact, chiral upon hydrogenation in the presence of Rh(BINAP) catalyst. Evidence of chirality was established by the determ ination of the optical activity. NMR experiments with a europium chiral shift reagent indicated th a t in the case of the monosubs...
It is of clinical interest to decompose a three material mixture into its constituted substances using dual-energy CT. In radiation therapy, for example material decomposition can be used to determine tissue properties for the calculation of dose in treatment planning. Due to use of polychromatic spectrum in CT, beam hardening artifacts prevent to achieve fully satisfactory results. Here an iterative reconstruction algorithm proposed by A. Malusek, M. Magnusson, M. Sandborg, and G. Alm Carlsson in 2008 is implemented to achieve this goal. The iterative algorithm can be implemented with both single-and dual-energy CT. The material decomposition process is based on mass conservation and volume conservation assumptions. The implementation and evaluation of iterative reconstruction algorithm is done by using simulation studies of analyzing mixtures of water, protein and adipose tissue. The results demonstrated that beam hardening artifacts are effectively removed and accurate estimation of mass fractions of each base material can be achieved with the proposed method. We also compared our novel iterative reconstruction algorithm to the commonly used water pre-correction method. Experimental results show that our novel iterative algorithm is more accurate.
Synesis a Journal of Science Technology Ethics and Policy, 2011
Advances in neuroscience and neurotechnology have necessitated discussions on the ways that such developments could be used as weapons in contexts of national security, intelligence, and defense. This paper defi nes the concept of neuroweapons, and elucidates operational issues associated with their use to aid informational and strategic intelligence, such as brain-machine interfaces to improve effi ciency in data analysis. As well, exploration of neuropharmacologic, neuromicrobiological, and neurotoxic agents are discussed relevant to their utility in combat scenarios. The limitations of emerging neurotechnologies as weapons are addressed, as both regards practical and operational frameworks, and implications relevant to formulation of ethico-legal guidelines and governance of research, development and potential use.
Intelligence Info, 2023
How intelligence analysis needs to adapt to deal with a brand-new concept: cognitive warfare? Intelligence analysts need to put much more effort into understanding and appreciating the dangers that such a concept entails. This additional dimension must be taken into account in any risk assessment in the area of security studies. The target of the operations of this type of war is human rationality itself. In a study developed by Johns Hopkins University pentryu NATO, researchers (Kathy Cao, Sean Glaister, Adriana Pena, Danbi Rhee, William Rong, Alexander Rovalino) best defined the nature of cognitive warfare: ”In cognitive warfare, the human mind becomes the field of battle. The goal is to change not only what people think, but also how they think and act.” (Cao & Glaister, 2021) In keeping with the ratios of comparison, the duration and severity of the impacts of long-term cognitive warfare are fairly comparable to those of a nuclear attack. Just as scientists achieve atomic fission by shattering/breaking the nucleus of an atom into two or more nuclei, successful operations of cognitive warfare can force human groups in a society or even society itself to think against itself. The goal of cognitive warfare is to get a human collective to enter a schizoid condition where it misunderstands reality and existential situations, denies its guiding principles, or cultivates indifference to them. The tactical or strategic goals of an attacker are facilitated by each of these cognitive warfare-induced events. Non-kinetic or non-conventional military methods can be used to subdue a civilization. Cognitive warfare occurs in the liminal space where military and civilian life collide, where alternative realities are implanted into an enemy's mind through disinformation, where psychological and informational warfare overlap, and where traditional combat and hybrid operations coexist. The topic that modern intelligence analysis must appropriately address is: What are the right instruments and what is the analytical viewpoint required to deal with cognitive warfare?
Advances in Neurotechnology: Ethical, Legal, and Social Issues, 2014
2014
This white volume focuses on possible ways that insights from the neurosciences may be incorporated into, and used within the United States Government's (USG) approaches and ability to conduct optimized influence and deterrence operations for the purpose of maintaining global stability. In this context, neuroscientific techniques, technologies and information are viewed as viable means to build upon and enhance tactical approaches from other disciplines such as the social sciences. Understanding the neurobiology of human behavior can provide an added dimension to formulating deterrence and influence strategies in the context of a security environment that has become more complex and far more fluid over last few decades. In this white paper, the term "neurodeterrence" refers to the consideration and application of evolutionary neurobiological information about, and understanding of cognition and social behaviors that are important to deterrence theory in contexts of conflict.
This is a rough galley proof of the article before final printing.
2013
Biotechnology is an effective and environmental friendly method of waste utilization and poor refractory ores exploitation, well known since 1949 and successfully developed in many countries: Spain, Bulgaria, USA, and Sweden. Biotechnology opens the possibility to obtain uranium as by-product in rare element recovery process (eg. Co, Au, Re, Rh, Pt) and positively affects the economic efficiency of technology. The research program of biological exploitation of waste and poor ores in Poland is presented. Microbial consortia able to oxidize iron under neutral and acidic conditions (Fe concentration in ore is 1.8-3.4%) are isolated and developed during project realization.
The urgent need to rehabilitate or replace ageing deteriorated buried potable water pipeline networks is one of the many critical service utility provision challenges faced within the municipalities in South Africa. The majority of these unreliable deteriorated pipeline networks consist of un-dipped (not coated with bitumen) AC piping which have long passed their planned economic and technical lifespan. Traditionally, the open trenching method has been utilised for the replacement of aged and deteriorated piping. However, this traditional open trenching method has shown to be expensive and difficult to implement, particularly in congested high traffic use urban areas. The need to rehabilitate or replace the ageing deteriorated buried potable water pipelines in South Africa, taking into account the above mentioned expensive factors has a solution. This solution is termed ‘trenchless technology’ and sometimes also termed ‘no dig’. Recent advancements in trenchless technologies now inc...
2017
At preliminary design stage, the global mechanical behavior of large marine vessels such as container ships has previously been analyzed idealizing them as a classical beam. These structures are complex and a classical beam idealization significantly compromises important structural behavior associated with cross section warping or in-plane displacements. On the other hand, 3D Finite Element (FE) models have been utilized which are accurate in capturing these details but pose high computational cost. In present work, structural analyses of marine vessels with realistic boundary conditions have been presented using well-known Carrera Unified Formulation (CUF). Using CUF, higher order theories can be implemented without the need of ad-hoc formulations. The finite element arrays are written in terms of fundamental nuclei for 1D beam elements that are independent of problem characteristics and the approximation order. Thus, refined models can be developed in an automatic manner. In the ...
E. Kaiser y W. Schier (ed.): Time and Materiality: Periodization and Regional Chronologies at the Transition from Bronze to Iron Age in Eurasia (1200-600 BCE) (Berlin, 2018), 2021
In the last two decades, there have been some significant changes in the chronology of the Iberian Peninsula. For the Atlantic Late Bronze Age, the chronology of the Baiões group has been consolidated until 1250 BC, although the metal hoard of Baiões is more recent. On the other hand, the end of the Cogotas I group has been carried back to 1150-1100 BC, although its continuity until 800 BC has also been defended. A better definition of an intermediate phase until the beginning of Soto de Medinilla, c. 925 BC, in the Northern Plateau is therefore required. Another very significant advance has been the documentation of cemeteries in the Southern Plateau with the practice of cremation without deposition in urns, in Herrería (Guadalajara) marked with stelae, between 1325 and 1300 BC-much older than the urnfields in Aragon and Catalonia starting around 1000 BC. In the Guadalquivir Valley, cremation was also practised in burial mound A at Setefilla (Seville) from 1150 BC onwards. Finally, an older phase of the Phoenician presence in the Iberian Peninsula has been identified, although it has not yet reached the beginning of the 11 th century BC as indicated by classical sources. Two sanctuaries with annexed workshops stand out in La Rebanadilla phase IV (Malaga), 971-917 BC, and in Méndez Núñez street 7-13/Plaza de las Monjas 12 (Huelva), 968-804 BC, with Phoenician colonies settling at the mouth of the Tagus River from 825 to 800 BC.
2000
The designations employed in ILO publications, which are in conformity with United Nations practice, and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the International Labour Office concerning the legal status of any country, area or territory or of its authorities, or concerning the delimitation of its frontiers. The responsibility for opinions expressed in signed articles, studies and other contributions rests solely with their authors, and publication does not constitute an endorsement by the International Labour Office of the opinions expressed in them. Reference to names of firms and commercial products and processes does not imply their endorsement by the International Labour Office, and any failure to mention a particular firm, commercial product or process is not a sign of disapproval.