3,171 research outputs found

    Girt by sea: understanding Australia’s maritime domains in a networked world

    Get PDF
    This study aims to provide the background, language and context necessary for an informed understanding of the challenges and dilemmas faced by those responsible for the efficacy of Australia’s maritime domain awareness system. Abstract Against a rapidly changing region dominated by the rise of China, India and, closer to home, Indonesia, Australia’s approaches to understanding its maritime domains will be influenced by strategic factors and diplomatic judgements as well as operational imperatives.  Australia’s alliance relationship with the United States and its relationships with regional neighbours may be expected to have a profound impact on the strength of the information sharing and interoperability regimes on which so much of Australia’s maritime domain awareness depends. The purpose of this paper is twofold.  First, it seeks to explain in plain English some of the principles, concepts and terms that maritime domain awareness practitioners grapple with on a daily basis.  Second, it points to a series of challenges that governments face in deciding how to spend scarce tax dollars to deliver a maritime domain awareness system that is necessary and sufficient for the protection and promotion of Australia’s national interests

    Crisis Analytics: Big Data Driven Crisis Response

    Get PDF
    Disasters have long been a scourge for humanity. With the advances in technology (in terms of computing, communications, and the ability to process and analyze big data), our ability to respond to disasters is at an inflection point. There is great optimism that big data tools can be leveraged to process the large amounts of crisis-related data (in the form of user generated data in addition to the traditional humanitarian data) to provide an insight into the fast-changing situation and help drive an effective disaster response. This article introduces the history and the future of big crisis data analytics, along with a discussion on its promise, challenges, and pitfalls

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    TAS: Risk Analysis & Clustered Sensors

    Get PDF
    This paper briefly introduces a general view on tomorrow’s border control system and EU inter-BCP real time information sharing, exploring and proposing new operational methods and solutions for border control procedures to increase the efficacy and efficiency of the whole security screening system at the same time reducing the efforts (costs/resources). The general description of the system logic and architecture introduces the core of the solution, the Trust Assessment System. A “black box” based on risk analysis and advanced machine learning algorithms aimed to assign a Traveller Trust Score to each single individual intentioned to cross the border. Main benefits are: improved checkpoint throughput, improved situational awareness and level of security, better traveller experience, optimisation of resources. The concept is that the traveller risk evaluation starts as soon as she/he applies for a visa, a passport or books a trip by whatever means of transport

    Traffic incident management: A common operational picture to support situational awareness of sustainable mobility

    Get PDF
    Successful traffic incident management presupposes a multi-disciplinary approach. To meet appropriately the safety and mobility needs of all affected parties, traffic incidents call for a high level of collaboration and coordination of involved agencies. Effective traffic incident management activities rely in particular on flexible communications and information systems. Based on experiences from the military domain it is possible to develop strategic concepts that are related to the improvement of information sharing and collaboration. Such concepts can also be applied to enhanced traffic incident management information systems. The present paper aims to offer a review of the state of the art in this field and to illustrate the empirical usefulness and benefits of traffic incident management

    Australia and Cyberwarfare

    Get PDF
    This book explores Australia’s prospective cyber-warfare requirements and challenges. It describes the current state of planning and thinking within the Australian Defence Force with respect to Network Centric Warfare, and discusses the vulnerabilities that accompany the use by Defence of the National Information Infrastructure (NII), as well as Defence’s responsibility for the protection of the NII. It notes the multitude of agencies concerned in various ways with information security, and argues that mechanisms are required to enhance coordination between them. It also argues that Australia has been laggard with respect to the development of offensive cyber-warfare plans and capabilities. Finally, it proposes the establishment of an Australian Cyber-warfare Centre responsible for the planning and conduct of both the defensive and offensive dimensions of cyber-warfare, for developing doctrine and operational concepts, and for identifying new capability requirements. It argues that the matter is urgent in order to ensure that Australia will have the necessary capabilities for conducting technically and strategically sophisticated cyber-warfare activities by the 2020s. The Foreword has been contributed by Professor Kim C. Beazley, former Minister for Defence (1984–90), who describes it as ‘a timely book which transcends old debates on priorities for the defence of Australia or forward commitments, [and] debates about globalism and regionalism’, and as ‘an invaluable compendium’ to the current process of refining the strategic guidance for Australia’s future defence policies and capabilities

    A review of cyber threats and defence approaches in emergency management

    Get PDF
    Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature

    Vision and transterritory:the borders of Europe

    Get PDF
    This essay is about the role of visual surveillance technologies in the policing of the external borders of the European Union. Based on an analysis of documents published by EU institutions and independent organizations I argue that these technological innovations fundamentally alter the nature of national borders. I discuss how new technologies of vision are deployed to transcend the physical limits of territories. In the last twenty years EU member states and institutions have increasingly relied on various forms of remote tracking, including the use of drones for the purposes of monitoring frontier zones. In combination with other facets of the EU border management regime (such as transnational databases and biometrics) these technologies coalesce into a system of governance that has enabled intervention into neighboring territories and territorial waters of other states to track and target migrants for interception in the “prefrontier.” For jurisdictional reasons, this practice effectively precludes the enforcement of legal human rights obligations, which European states might otherwise have with regard to these persons. This article argues that this technologically mediated expansion of vision has become a key feature of post-Cold War governance of borders in Europe. The concept of transterritory is proposed to capture its effects

    How the internet of things technology enhances emergency response operations

    Get PDF
    The Internet of Things (IoT) is a novel paradigm that connects the pervasive presence around us of a variety of things or objects to the Internet by using wireless/wired technologies to reach desired goals. Since the concept of the IoT was introduced in 2005, we see the deployment of a new generation of networked smart objects with communication, sensory and action capabilities for numerous applications, mainly in global supply chain management, environment monitoring and other non-stress environments. This paper introduces the IoT technology for use in the emergency management community. Considering the information required for supporting three sequential and distinct rhythms in emergency response operations: mobilization rhythm, preliminary situation assessment rhythm, and intervention rhythm, the paper proposes a modified task-technology fit approach that is used to investigate how the IoT technology can be incorporated into the three rhythms and enhance emergency response operations. The findings from our research support our two hypotheses: H1: IoT technology fits the identified information requirements; and H2: IoT technology provides added value to emergency response operations in terms of obtaining efficient cooperation, accurate situational awareness, and complete visibility of resources. © 2012 Elsevier Inc
    corecore