33 research outputs found

    Test and evaluation of a prototyped sensor-camera network for persistent intelligence, surveillance, and reconnaissance in support of tactical coalition networking environments

    Get PDF
    This thesis investigated the feasibility of deploying an integrated sensor-camera network in military and law enforcement applications. The system was built using entirely commercial-off-the-shelf technologies. The prototype used the unattended ground sensors combined with digital video surveillance cameras to provide accurate real-time situational awareness, persistent intelligence and remote security. A robust testing and evaluation plan was created to measure the system's performance based on specific metrics. The tests focused primarily on the capabilities of the sensor aspect of the network. Tests were conducted to determine the maximum detection range, probabilities of detection, maximum communications range, and battery life. Mathematical models were created to assist network planners. Additionally, the prototyped system was tested through field exercises as part of the Naval Postgraduate School's Coalition Operating Area Surveillance and Targeting System field demonstrations in California and northern Thailand. Although the sensing capabilities exceeded the minimum metrics, the system was not suitable for use in military applications. However, the prototyped network would work well in less demanding law enforcement environments. Additionally, the feasibility and the need to develop an integrated sensor-camera network were demonstrated.http://archive.org/details/testndevaluation109452780US Navy (USN) author.Approved for public release; distribution is unlimited

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies

    Low Intensity Conflict: Contemporary Approaches and Strategic Thinking

    Get PDF
    Low Intensity Conflict (LIC) is a significant feature of the contemporary world and it is a particular challenge to the armed forces of many states which are involved is such conflict, or are likely to become so. This thesis is not concerned with how such difficult conflict situations arise. Rather it is concerned with how, from the point of view of the state, they may be contained and ultimately brought to a satisfactory resolution. The work is thus concerned with the practicalities of ending LIC. More specifically, the purpose of this research is to establish a framework of doctrinal and military principles applicable to the prevention and resolution of LIC. The principles of this thesis are based in numerous historical examples of LIC and six in depth case studies. These distilled principles are analysed in two central chapters, and are then applied in two latter defence force chapters so as to ensure there practicality and resilience. Numerous defence academics and military practitioners have been consulted in the production of this thesis; their contribution has further reinforced the functionality of the principles examined in this research. The research illustrates the criticality of a holistic approach to LIC. The function of this approach is to guarantee the stability of the sovereign state, by unifying civil, police, intelligence and military services. The effectiveness of the military elements must also be ensured, as military force is central to the suppression of LIC. Consequently, the research makes strategic and operational prescriptions, so as to improve the capability of defence forces that are concerned with preventing or resolving LIC

    Economics of Electricity Battery Storage

    Get PDF
    This chapter deals with the challenges and opportunities of energy storage, with a specific focus on the economics of batteries for storing electricity in the framework of the current energy transition. Storage technologies include a variety of solutions that have been used for different grid services, including frequency control, load following, and uninterrupted power supply. A recent interest is being triggered by the increasing grid balance requirements to integrate variable renewable sources and distributed generation. In parallel, lithium-ion batteries are experiencing a strong market expansion driven by an uptake of electric vehicles worldwide, which is leading to a strong decrease of production costs, making Li-ion batteries an attractive solution also for stationary storage applications

    The Palgrave Handbook of International Energy Economics

    Get PDF
    This open access handbook is distinguished by its emphasis on international energy, rather than domestic energy policies or international geopolitic aspects. Addressing key topics such as energy production and distribution, renewables and corporate energy structures, alongside global energy trends, regional case studies and emerging areas such as the digitalization of energy and energy transition, this handbook provides a major new contribution to the field of international energy economics. Written by academics, practitioners and policy-makers, this handbook is a valuable and timely addition to the literature on international energy economics. This book was published open access with the support of Eni

    Information technology and military performance

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 519-544).Militaries have long been eager to adopt the latest technology (IT) in a quest to improve knowledge of and control over the battlefield. At the same time, uncertainty and confusion have remained prominent in actual experience of war. IT usage sometimes improves knowledge, but it sometimes contributes to tactical blunders and misplaced hubris. As militaries invest intensively in IT, they also tend to develop larger headquarters staffs, depend more heavily on planning and intelligence, and employ a larger percentage of personnel in knowledge work rather than physical combat. Both optimists and pessimists about the so-called "revolution in military affairs" have tended to overlook the ways in which IT is profoundly and ambiguously embedded in everyday organizational life. Technocrats embrace IT to "lift the fog of war," but IT often becomes a source of breakdowns, misperception, and politicization. To describe the conditions under which IT usage improves or degrades organizational performance, this dissertation develops the notion of information friction, an aggregate measure of the intensity of organizational struggle to coordinate IT with the operational environment. It articulates hypotheses about how the structure of the external battlefield, internal bureaucratic politics, and patterns of human-computer interaction can either exacerbate or relieve friction, which thus degrades or improves performance. Technological determinism alone cannot account for the increasing complexity and variable performances of information phenomena. Information friction theory is empirically grounded in a participant-observation study of U.S. special operations in Iraq from 2007 to 2008. To test the external validity of insights gained through fieldwork in Iraq, an historical study of the 1940 Battle of Britain examines IT usage in a totally different structural, organizational, and technological context.(cont.) These paired cases show that high information friction, and thus degraded performance, can arise with sophisticated IT, while lower friction and impressive performance can occur with far less sophisticated networks. The social context, not just the quality of technology, makes all the difference. Many shorter examples from recent military history are included to illustrate concepts. This project should be of broad interest to students of organizational knowledge, IT, and military effectiveness.by Jon Randall Lindsay.Ph.D
    corecore