58 resultados para Submarine warfare


Relevância:

10.00% 10.00%

Publicador:

Resumo:

IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. It causes serious security problem in the cyber world, and is currently exploited widely in the information warfare. This paper at first introduces the IP spoofing attack through examples, technical issues and attacking types. Later its countermeasures are analysed in detail, which include authentication and encription, filtering and IP traceback. In particular, an IP traceback mechanism, Flexible Deterministic Packet Marking (FDPM) is presented. Since the IP spoofing problem can not be solved only by technology, but it also needs social regulation, the legal issues and economic impact are discussed in the later part.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sensor Networks have applications in diverse fields. They can be deployed for habitat modeling, temperature monitoring and industrial sensing. They also find application in battlefield awareness to sense chemicals and other gases used in chemical and biological warfare. An application that has become increasingly attractive in the post 9/11 era is the use of wireless sensor networks for emergency (first) response in mass casualty incidents. Reliability of data and event transfer is of critical importance to emergency response applications. In this work we propose a reliable event transfer mechanism making use of an overlay network of relay nodes. The overlay network removes the burden of data relaying from the sensor nodes and results in increasing the lifetime of the network. Simulation results prove the benefits of such an architecture. Reliability is increased 10-30% with reduction in event traffic of 60-80%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on further research undertaken regarding systems modelling as applied to critical infrastructure systems and networks and builds upon the initial modelling research of Pye and Warren (2006a). We discuss system characteristics, inter-relationships, dynamics and modelling of similar systems and why modelling of a critical infrastructure is important. In overview we compare four modelling methods and techniques previously
used to model similar systems and discuss their potential transference to model critical infrastructure systems, before selecting the most promising and suitable for modelling critical infrastructure systems for further research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Late Caledonian to Early Hercynian North Qilian orogenic belt in northwestern China is an elongate tectonic unit situated between the North China plate in the north and the Qaidam plate in the south. North Qilian started in the latest Proterozoic to Cambrian as a rift basin on the southern margin of North China, and evolved later to an archipelagic ocean and active continental margin during the Ordovician and a foreland basin from Silurian to the Early and Middle Devonian. The Early Silurian flysch and submarine alluvial fan, the Middle to Late Silurian shallow marine to tidal flat deposits and the Early and Middle Devonian terrestrial molasse are developed along the corridor Nanshan. The shallowing-upward succession from subabyssal flysch, shallow marine, tidal flat to terrestrial molasse and its gradually narrowed regional distribution demonstrate that the foreland basin experienced the transition from flysch stage to molasse stage during the Silurian and Devonian time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Typical contourite deposits associated with submarine turbidite fan deposits are recognized for the first time from the Lower Devonian Liptrap Formation at Cape Liatrap, Victoria in southeast Australia. The contourites are well integrated within the turbidite fan deposits and are characterized by thin (5–8 cm), lenticular, well-sorted coarse-grained siltstones to fine-grained sandstones with current-ripples and cross beddings. The palaeocurrent directions of the turbidite fan and contourites are perpendicular to each other, with the former directed generally westward while the latter varying from 165° to 190° southward. In view of the facies types and architecture, we suggest that the turbidite fan was developed at the base of a westward inclined palaeo-slope, at the front of which the contourites were deposited as a result of southward flowing deep-sea contour (geostrophic) currents. The depositional setting interpreted for the Liptrap Formation thus may provide a provisional model for the Lower Devonian continental slope and abyssal basin environment in the southeastern part of the Melbourne Trough.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background There has been a Human Volunteer Programme at the British chemical weapons research facility at Porton Down since the First World War, in which some of the participants were exposed to chemical warfare agents.

Aim To identify any striking specific morbidity patterns in members of the Porton Down Veterans Support Group (PDVSG).

Methods A self-completed postal questionnaire was prepared including health immediately after the visits to Porton Down, subsequent diagnoses and hospital admissions, symptoms in, and after, the first 5 years after the visits, fatigue symptoms and current quality of life, measured using the SF-36.

Results Responses were received from 289 of 436 (66%). Results reported here relate to 269 male respondents of mean age 66.8 years. Sixty-six per cent reported their first visit to Porton Down in the 1950s. The most common diagnoses or hospital admissions reported were diseases of the circulatory system. In the first 5 years after their visits the most common symptoms were headache, irritability or outbursts of anger and feeling un-refreshed after sleep. In the later period, most common symptoms were fatigue, feeling un-refreshed after sleep and sleeping difficulties. Sixty-five per cent met the definition for a case of ‘fatigue’. Current quality of life dimensions were consistently lower than age-specific estimates from general population samples.

Conclusions Members of the PDVSG responding to this survey reported poorer quality of life than the general population. Despite there being no clear pattern of specific morbidities, we cannot rule out ill-health being potentially associated with past experience at Porton Down

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is an investigation of the relevance of ‘people's war’ to contemporary Chinese defence policy. This loose concept has been eroded by 'modernity’, but a guerilla-based defence remains the essential theme. Prior to China's acquisition of nuclear weapons, people's war was the sole element of the state's deterrent policy, aiming to swamp an invader with China's numerical strength. In the 1980s and beyond people's war finds effectiveness through a combination of materiel of middle range technology and the traditional usage of massive manpower. People's war under modern conditions remains essentially defensive, but now incorporates 'active defence’ with accent on greater mobility. However, the central thesis of this work relates to how the traditional strategy may influence nuclear doctrine. This thesis proposes that China could abandon long-range ballistic missiles and adopt a new concept in nuclear strategy: that of, Guerilla Nuclear Warfare. Trained in guerilla tactics and equipped with battlefield nuclear weapons, this would represent the logical extension of China's people's war strategy to the new nuclear conditions associated with superpower research into space-based ballistic missile defences and which, in full deployment, could nullify a Chinese nuclear deterrent based only on 'mid-tech' delivery systems. Guerilla Nuclear Warfare, as a strategy, would involve the irregular use of locally held and controlled tactical nuclear weapons, but it would also be a method of circumventing the proposed Soviet missile defence shield by not challenging it. Guerilla Nuclear Warfare does not exist in the late 1980s, but evidence exists to suggest its development. It cannot yet be proven as the new direction but China's strategic circumstances add weight to available indications: unless the Strategic Defence programs of the established superpowers are arrested then it appears the sole option available to the Chinese for the maintenance of a nuclear deterrent in the early part of the 21st Century.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis traces the interaction of the Goroka Valley people with European and coastal New Guinean intruders during the pacification stage of contact and change. In this 15 year period the people moved from a traditional subsistence culture to the threshold of a modern, European-influenced technological society. The contact experiences of the inhabitants of the Valley and the outsiders who influenced them are examined, using both oral and documentary sources. A central theme of this study is the attempts by Europeans and their coastal New Guinean collaborators to achieve the pacification of a people for whom warfare has been described as 'the dominant orientation'. The newcomers saw pacification as being inextricably linked with social, economic and religious transformation, and consequently it was pursued by patrol officers, missionaries and soldiers alike. Following an introductory chapter outlining the pre-contact and early-contact history of the Goroka Valley people, there is a discussion of the causes of tribal fighting in Highlands communities and two case studies of violent events which, although occurring beyond the Goroka Valley, had important consequences for those who lived within its bounds. The focus then shifts to the first permanent settlement of the agents of change -initially these were coastal New Guinean evangelists and policemen - and their impact on the local people. A period of consolidation is then described, as both government and missions established a permanent 'European presence in the Valley'. This period was characterised by vigorous pacification coupled with the introduction of innovations in health and education, agriculture, technology, law and religion. The gradual transformation of Goroka Valley society as a result of the people's interaction with the newcomers was abruptly accelerated in 1943, when many hundreds of Allied soldiers occupied the Valley in anticipation of a threatened Japanese invasion. Village life was disrupted as men were conscripted as carriers and labourers and whole communities were obliged to grow food to assist the Allied war effort. Those living close to military airfields-and camps were subject to Japanese aerial attacks and the entire population was exposed to an epidemic of bacillary dysentery introduced by the combatants. However the War also brought some positive effects, including paradoxically, the almost total cessation of tribal fighting, the construction of an ail-weather airstrip at Goroka which ensured its future as a town and administrative and commercial centre, and the compulsory growing of vegetables, coffee, etc, which laid the foundations for a cash economy and material prosperity. The final chapter examines the aftermath of military occupation, the return of civil administration and the implementation of social and economic policies which brought the Goroka Valley people into the rapid-development phase of contact. By 1949 Gorokans were ready to channel their aggressive energies into commercial competitiveness and adopt a cash-crop economy, to accept the European rule of law, to take advantage of Western innovations in medicine, education, transport and communications, to seek employment opportunities at home and in other parts of the country and to modify their primal world view with European religious and secular values. A Stone Age people was in process of being transformed into a modern society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly, but this increased expenditure has not really made an attack more difficult. The opposite seems to be true, information security attacks have become easier to perpetrate and appear more like information warfare tactics. At the same time, the damage caused by a successful attack has increased significantly and may sometimes become critical to an organization. In this paper we evaluate one particular extremely asymmetric risk where a strongly motivated attacker unleashes a prolonged attack on an organization with the aim to do maximum damage, and suggest that the probability of such an attack is increasing. We discuss how preventive controls are unlikely to ever be effective against such an attack and propose more advanced strategies that aim to limit the damage when such an attack occurs. One crucial lesson to be learned for those organizations that are dependant on their information security, such as critical infrastructure organizations, is the need to deny motivated attackers access to any information about the success of their attack. Successful deception in this area is likely to significantly reduce any potential escalation of the incident.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An ichnoassemblage of 10 ichnospecies is described for the first time from the Late Silurian Melbourne Formation at Studley Park, Victoria, southeastern Australia. The ichnofauna is preserved in a typical deep-water turbidite succession of alternating thin- to thick-bedded sandstone and thin- to medium-bedded mudrocks. Trace fossils observed within the study site have been assigned to three main ichnofacies. Ichnofacies 1 is best developed on the linguoid-rippled upper surface of thin sandstone beds and includes Laevicyclus, Aulichnites, Nereites, Helminthoidichnites, small Chondrites and possible Zoophycos. Ichnofacies 2 is very similar to Ichnofacies 1 in ichnospecies composition but instead contains large forms of Chondrites together with other thin burrow types usually poorly preserved and in very low abundance compared with Ichnofacies 1. Ichnofacies 3 is preserved mainly as casts on the underside of medium- to thick-bedded turbiditic sandstones, and has a very low diversity, with Planolites being the most common trace. A detailed analysis of the ichnofabrics and tiering structures of these ichnofacies suggest that Ichnofacies 1 and 3 represent "simple tiering’, in contrast to Ichnofacies 2, which is more characteristic of 'complex tiering’. Despite the differences in ichnospecies composition and ichnofabrics between the three recognized ichnofacies, the collective ichnoassemblage from the study site can be assigned confidently to the Nereites ichnofacies and is, therefore, interpreted to have formed in a distal submarine fan environment of lower bathyal to abyssal depth. Further, it is possible to recognize two main subenvironments within this deep-sea setting to account for the differences between the ichnofacies. Ichnofacies 1 and 2 are interpreted to represent a typical Nereites ichnofacies located on a level basin floor subenvironment of relatively low energy conditions at the distal end of a submarine fan deposit. In comparison, Ichnofacies 3 is dominated by Planolites with rare other facies-crossing trace fossil forms, and lacks Nereites. It is, therefore, best interpreted as representing a relatively high-energy environment, possibly a distributary channel near the distal end of the submarine fan system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper continues the prior research undertaken by Warren and Leitch (2009), in which a series of initial research findings were presented. These findings identified that in Australia, Supply Chain Management (SCM) systems were the weak link of Australian critical infrastructure. This paper focuses upon the security and risk issues associated with SCM systems and puts forward a new SCM Security Risk Management method, continuing the research presented at the European Conference of Information Warfare in 2009.This paper proposes a new Security Risk Analysis model that deals with the complexity of protecting SCM critical infrastructure systems and also introduces a new approach that organisations can apply to protect their SCM systems. The paper describes the importance of SCM systems from a critical infrastructure protection perspective. The paper then discusses the importance of SCM systems in relation to supporting centres of populations and gives examples of the impact of failure. The paper proposes a new SCM security risk analysis method that deals with the security issues related to SCM security and the security issues associated with Information Security. The paper will also discuss a risk framework that can be used to protect against high and low level associated security risks using a new SCM security risk analysis method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The intended outcome of Information Operations appears to be a favourable change (to the instigator) in attitudes or belief systems of the target, however, the relationship between attitude and behaviour is tenuous. Propaganda and other methods of ‘influence’ are difficult to assess as the cause and effect relationship is complicated. The short term effects of psychological warfare where force is used in conjunction with influence techniques can be easily assessed; at least at a superficial level. Even in the latter case, the actual causes and effects could be solely the force used or some other factors rather than the psychological techniques per se. Influence Operations attempt to win the hearts and minds of the target audience but, even if successful, the lasting effects of a campaign are problematic. It is further complicated because if a person has a particular view, it does not mean that the ensuing behaviours will reflect that view. Also, there is evidence that the use of force on one set of people produces attitudes and behaviours that instigate radical beliefs and behaviours in another set. So psychological warfare techniques on one group that may or may not produce compliant behaviour stimulates another group to empathise with the victims thus producing an overall practical negative influence. Influence campaigns cannot be separated from the physical environment in which they are executed. If good politics requires good influence campaigns then good influence campaigns require good politics to back them up. This paper will examine the relationships between short term influence campaigns and compare them with the more long term socialising effects such as early education, family and physical attributes that have on attitudes and beliefs which result in the development of such behaviours as terrorism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From diagnosis of life-threatening diseases to detection of biological agents in warfare or terrorist attacks, biosensors are becoming a critical part of modern life. Many recent biosensors have incorporated carbon nanotubes as sensing elements, while a growing body of work has begun to do the same with the emergent nanomaterial graphene, which is effectively an unrolled nanotube. With this widespread use of carbon nanomaterials in biosensors, it is timely to assess how this trend is contributing to the science and applications of biosensors. This Review explores these issues by presenting the latest advances in electrochemical, electrical, and optical biosensors that use carbon nanotubes and graphene, and critically compares the performance of the two carbon allotropes in this application. Ultimately, carbon nanomaterials, although still to meet key challenges in fabrication and handling, have a bright future as biosensors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. This paper will discuss some of the common security risks that face Australia and how their government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper will discuss the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.