2,048 research outputs found

    Countering crime in hostile environments: securing vulnerable humanitarian aid workers in Paua New Guinea

    Get PDF
    Crime is a core issue for companies and more recently for NGOs working in Papua New Guinea (PNG). The nation is facing major challenges as crime levels rise exponentially across the country. Erstwhile un-affected humanitarian operations were often seen as immune from criminality, but now have become just as likely to be targeted as any other organisation. Consequently, there is a need to adopt security measures, but maybe not necessarily as draconian as those used hitherto by major companies. People-centered, locally-owned is a concept whereby the local population is encouraged to protect the delivery of health services and aid from humanitarian providers. The inclusive approach challenges previous concepts of what is required to protect workers in intimidating and dangerous areas. A mind-set change is required. The proposed multi-layered approach stems from defence-in-depth strategies. Although such a strategy is still primarily based upon the security risk assessment process, at the core of all operational security required in challenging environments, it also requires a proactive approach combined with engagement with the local population based around the Aid-security-triangle. The methodology used interpretative analysis of relevant literature underpinned by personal interviews with selected stake holders in the PNG during 2014

    The VTRE Program: An overview

    Get PDF
    The Vented Tank Resupply Experiment (VTRE) Program is a NASA In-Space Technology Experiments Program (IN-STEP) that will develop, and fly a small, low cost space experiment to investigate, develop, and acquire needed data to extend and advance the technology of capillary vane fluid management devices to applications requiring direct venting of gas from tanks in low-gravity. GAS venting may be required for control of pressure, or to allow low-g fill of a tank with liquid while holding a constant tank back pressure by gas venting. Future space applications requiring these fluid management capabilities include both cryogenic and Earth storable fluid systems. The experiment is planned as a Shuttle Hitchhiker payload, and will be developed around two transparent tanks equipped with capillary vane devices between which a test liquid can be transferred. Experiments will be conducted for vented transfer, direct venting, stability of liquid positioning to accelerations within and significantly above the design values, and fluid reorientation by capillary wicking of liquid into the vane device following intentional liquid upset

    Creating a Counter-Insurgency Plan: Elements Required Based upon a Comparative Analysis of Research Findings

    Get PDF
    The development of a counter-insurgency doctrine is an evolutionary process: no two insurgencies are the same. However, certain fundamental principals remain consistent and these can be applied to meet the required circumstances. The creation of an overarching plan encompassing a combination of military, political and social actions under the strong control of a single authority is central. Therefore, understanding the basics allows for the development of a tactical strategy based upon a structured plan. Compiling the ‘Plan’ should be based upon the lessons learnt from the past. To this end, the methodology used is supported by a literature review and interviews from participants in a limited assessment of the two historical conflicts: Malaya and Kenya. Based upon the findings, a condensed table is presented to aid analysis, using a French doctrinal approach as a tool for interpretation. In addition, this is supported by quotes from the respondents involved in the research process. These findings are the preliminary results of a research study looking at what was effective during the prosecution of the selected insurgencies. Outcomes indicate that the fundamental principals are pertinent today and are therefore generally applicable

    Countering crime in hostile environments: Securing vulnerable humanitarian aid workers in Papua New Guinea

    Get PDF
    Crime is a core issue for companies and more recently for NGOs working in Papua New Guinea (PNG). The nation is facing major challenges as crime levels rise exponentially across the country. Erstwhile un-affected humanitarian operations were often seen as immune from criminality, but now have become just as likely to be targeted as any other organisation. Consequently, there is a need to adopt security measures, but maybe not necessarily as draconian as those used hitherto by major companies. People-centered, locally-owned is a concept whereby the local population is encouraged to protect the delivery of health services and aid from humanitarian providers. The inclusive approach challenges previous concepts of what is required to protect workers in intimidating and dangerous areas. A mind-set change is required. The proposed multi-layered approach stems from defence-in-depth strategies. Although such a strategy is still primarily based upon the security risk assessment process, at the core of all operational security required in challenging environments, it also requires a proactive approach combined with engagement with the local population based around the Aid-security-triangle. The methodology used interpretative analysis of relevant literature underpinned by personal interviews with selected stake holders in the PNG during 2014

    Creating an operational security management structure for inimical environments: Papua New Guinea as a case study

    Get PDF
    Security is a necessary cost for businesses wishing to operate in the developing economy of Papua New Guinea. The country continues to face levels of crime and violence out of proportion to other East Asian countries; which deters many would be investors. However, the potential in PNG is vast and eagerly sought after despite the high costs required to operate without harm, therefore, it is necessary manage the security situation. Experience from similar countries has shown by using optimal security management systems and structures it is possible to work safely, securely and effectively, but this requires a comprehensive security, threat and risk assessment to be conducted first . Based upon this assessment, a security management plan can be created .The predominant threat comes from criminality, which is endemic in parts of PNG. The police force is struggling to address the issue, but due to lack of resources and manpower is often seen as part of the problem An inimical model is therefore proposed that incorporates the local community and actively seeks their support to gather greater intelligence to thwart would be criminals. In addition, empowering more local security managers, with their vital local knowledge, will improve the overall intelligence flow

    Countering-insurgency : a comparative analysis of campaigns in Malaya (1948-1960), Kenya (1952-1960) and Rhodesia (1964-1980)

    Get PDF
    History has lessons for the present; could this be the case for modern counterinsurgency operations in countries resembling Iraq and Afghanistan? This research set out to study three historical counter-insurgencies campaigns in, Malaya (1947-1960), Kenya (1952- 1960) and Rhodesia (1964-1980), with a view to establishing whether or not the Colonial authorities had a substantial advantage over modern forces when combating insurgencies. If this was the case, are these advantages transferable to aid forces involved in modern counterinsurgencies? The research questions focussed on how important the role of the Colonial Forces was to the eventual outcome, examining the principal factors that contributed to their effectiveness? Included in this examination were aspects of strategy, together with an appreciation of the concept of ‘hearts and minds’, tactics and the evolution of counterinsurgency doctrine. A qualitative research design was adopted, using a case study methodology based upon comparative analysis of the data collected. Case studies were constructed for the three conflicts, based around the narratives obtained from a series of semi-structured interviews, with surviving members of the security forces; predominately police and Special Branch. The primary data was coded, using a thematic framework developed from the Literature Review. These themes were then synthesised, analysed and interpreted in response to the research questions related to the perceived problem. Lastly, the findings were compared and contrasted to provide theoretical recommendations and conclusions. The study indicated the significant role played by the Colonial Police Forces, especially Special Branch, which appears to have been instrumental in dominating initiatives against the rebels. Supporting the police, were Colonial army units together with locally recruited indigenous militias in a combined approach to prosecuting an effective counterinsurgency campaign. In addition, this was reinforced by the Colonial Government’s ability to apply draconian legislation in support of the strategic plan, to reinforce the rule of law by the police, coupled with its ability to garner popular support through civil projects, such as schools, clinics and housing. Evolving counter-insurgency doctrine advocated the need to cut off the insurgents from their supplies, by separating them from the general population. Separation was achieved by the forced movement of the population into ‘Protected Villages’ backed up by food control, harsh collective punishments, detention and curfews. Further key beneficial factors for the Colonial Forces included their knowledge of religious customs, culture and language, which enhanced their ability to gather vital intelligence direct from the population; rather than second hand. Analysing the concept of ‘hearts and minds’ since 1947, indicated it was evolving as a strategy and was not operationally as well accepted as it is today. Although often considered a benevolent approach to gaining the support of the population, the research also demonstrated the antithesis of this approach occurred by the insurgents applying power over ‘minds’ of the population though intimidation, terrorism, and physiological control. This psychological control was achieved through sorcery, spirit mediums and the taking of oaths. Ultimately, political solutions not military ones ended the insurgencies. The theoretical recommendations indicated that greater attention needs to be expended in training counter-insurgency forces to empathise with the local population when conducting overseas operations; especially improved knowledge of religious customs, culture and language. The outcome would enhance their capabilities through better population support resulting in superior intelligence

    Thermal barrier coatings for gas turbine and diesel engines

    Get PDF
    The present state of development of thin thermal barrier coatings for aircraft gas turbine engines and thick thermal barrier coatings for truck diesel engines is assessed. Although current thermal barrier coatings are flying in certain gas turbine engines, additional advances will be needed for future engines. Thick thermal barrier coatings for truck diesel engines have advanced to the point where they are being seriously considered for the next generation of engine. Since coatings for truck engines is a young field of inquiry, continued research and development efforts will be required to help bring this technology to commercialization

    Breaking the theft-chain-cycle: Property marking as a defensive tool

    No full text
    Any viable method of protecting property, dissuading the theft of property or ensuring the swift recovery of stolen property could be considered essential to general society. A number of crime preventive measures have been used in an attempt to achieve this objective. One such measure is property marking, employing various techniques to make property more readily identifiable. The study assesses technology to investigate effectiveness, both for dissuasion and for tracing once stolen. Mechanism for the disposal of stolen property forms an important part of this study, commencing with the mapping of the theft‐supply‐chain. Using a mixed methods approach, the research project has set out to identify if security technology could be used to break what is termed the ‘theft‐chain‐cycle’, whereby articles are stolen, stolen to order or for barter. The theft‐supply‐chain is not a single linear model; rather property passes through a number of formal and informal chains prior to reaching its “new” illegal owner. A significant factor is the ease of disposal linked to ease of detection using property marking to aid conviction. Based upon the findings, potential strategies and changes in legislation that better direct limited resources can be developed to assist in curbing the growing level of burglaries

    Breaking the Theft-Chain-Cycle: Property Marking as a Defensive Tool

    Get PDF
    Any viable method of protecting property, dissuading the theft of property or ensuring the swift recovery of stolen property could be considered essential to general society. A number of crime preventive measures have been used in an attempt to achieve this objective. One such measure is property marking, employing various techniques to make property more readily identifiable. The study assesses technology to investigate effectiveness, both for dissuasion and for tracing once stolen. Mechanism for the disposal of stolen property forms an important part of this study, commencing with the mapping of the theft‐supply‐chain. Using a mixed methods approach, the research project has set out to identify if security technology could be used to break what is termed the ‘theft‐chain‐cycle’, whereby articles are stolen, stolen to order or for barter. The theft‐supply‐chain is not a single linear model; rather property passes through a number of formal and informal chains prior to reaching its “new” illegal owner. A significant factor is the ease of disposal linked to ease of detection using property marking to aid conviction. Based upon the findings, potential strategies and changes in legislation that better direct limited resources can be developed to assist in curbing the growing level of burglaries

    Crime and Deterrence: Correlation Analysis

    Get PDF
    A correlation analysis of the severity and certainty of punish ment and offense rates for the major index crimes produces results consistent with the predictions of deterrence theory. Certainty of punishment proves to be the chief deterrent for most crimes. Homicide, however, is influenced by severity, pos sibly reflecting the differences between homicide and other of fenses. Little evidence of interaction is found between certainty and severity in effects on crime rate. A powerfunction proves to better describe the relationship between the punishment varia bles and crime rates than a rectilinear equation-a conclusion which, even apart from the date, appears more reasonable than the reverse
    • 

    corecore