831 resultados para Surveillance and Reconnaissance


Relevância:

100.00% 100.00%

Publicador:

Resumo:

O século XXI introduziu profundas mudanças no espaço onde a atuação militar se desenvolve. Esta mutação, que agora inclui o domínio físico e cognitivo na ação militar, impõe a adoção de novos conceitos de operação e estruturas organizacionais mais ágeis, de forma a fazerem face a um ambiente altamente volátil, imprevisível e complexo. Tal contexto torna as organizações, hoje mais do que nunca, dependentes de informação (e dos sistemas que as geram), e no âmbito das organizações militares, uma capacidade em particular assume, na atualidade, uma preponderância fulcral para o sucesso destas, que se designa por Intelligence, Surveillance & Reconnaissance (ISR). Considerando a complexidade de sistemas, processos e pessoas que envolvem toda esta capacidade, torna-se relevante estudar como a Força Aérea Portuguesa (FAP) está a acomodar este conceito no interior da sua estrutura, uma vez que a sua adaptação requer uma organização da era da informação, onde o trabalho em rede assume particular destaque. A presente investigação analisa formas de estruturas organizacionais contemporâneas e cruza-as com as recomendações da Organização do Tratado do Atlântico Norte (também designada por Aliança), comparando-as posteriormente com a atualidade da FAP. No final, são efetuadas propostas tangíveis, que podem potenciar as capacidades existentes, de onde se destaca a criação de uma matriz de análise quanto à eficiência organizacional, uma nova forma de organização das capacidades residentes no que ao ISR concerne, bem como o modo de potenciar o trabalho em rede com base nos meios existentes. Abstract: The 21st century has caused profound changes in the areas where military action takes place. This mutation, which now includes the physical and cognitive domain in military action, requires the adoption of new concepts of operation and more agile organizational structures in order to cope with a highly volatile, unpredictable and complex environment. Thus, more than ever, this makes the present organizations dependent of information (and the systems that generate them), in the case of military organizations, a particular capability undertakes today a strong impact on the success of military organizations. It is known as Intelligence, Surveillance& Reconnaissance (ISR). Taking into account the complexity of systems, processes and people involving all this capability, it is relevant to study how the Portuguese Air Force (PAF) is accommodating this concept within its structure, since the adaptation requires an organization adapted to the information era, where networking is particularly prominent. This research aims to analyze contemporary forms of organizational structures and cross them with the recommendations of the North Atlantic Treaty Organization (also known as Alliance), later comparing them with today's PAF. At the end of this investigation, some tangible proposals are made which can enhance existing capabilities: we can highlight the creation of an analysis matrix for organizational efficiency, a new form of organization of the resident capabilities in the ISR concerns, as well as the way of enhancing networking, based on existing means.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes the gaps in monitoring and surveillance identified while conducting Community Food Security assessments in three geographical areas located in south-east Queensland, Australia

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A recent advance in biosecurity surveillance design aims to benefit island conservation through early and improved detection of incursions by non-indigenous species. The novel aspects of the design are that it achieves a specified power of detection in a cost-managed system, while acknowledging heterogeneity of risk in the study area and stratifying the area to target surveillance deployment. The design also utilises a variety of surveillance system components, such as formal scientific surveys, trapping methods, and incidental sightings by non-biologist observers. These advances in design were applied to black rats (Rattus rattus) representing the group of invasive rats including R. norvegicus, and R. exulans, which are potential threats to Barrow Island, Australia, a high value conservation nature reserve where a proposed liquefied natural gas development is a potential source of incursions. Rats are important to consider as they are prevalent invaders worldwide, difficult to detect early when present in low numbers, and able to spread and establish relatively quickly after arrival. The ‘exemplar’ design for the black rat is then applied in a manner that enables the detection of a range of non-indigenous species of rat that could potentially be introduced. Many of the design decisions were based on expert opinion as data gaps exist in empirical data. The surveillance system was able to take into account factors such as collateral effects on native species, the availability of limited resources on an offshore island, financial costs, demands on expertise and other logistical constraints. We demonstrate the flexibility and robustness of the surveillance system and discuss how it could be updated as empirical data are collected to supplement expert opinion and provide a basis for adaptive management. Overall, the surveillance system promotes an efficient use of resources while providing defined power to detect early rat incursions, translating to reduced environmental, resourcing and financial costs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Examines the effects of national surveillance and local right-wing intimidation on the literary works of author Eleanor Dark during the 1940s and 1950s in Australia. Reason Dark was subjected to national surveillance and right-wing intimidation; Relationship of Dark with local and national security forces; Accusations against the Dark family; Censorship faced by writers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses the situation of welfare claimants, often constructed as faulty citizens and flawed welfare subjects. Many are on the receiving end of complex, multi-layered forms of surveillance aimed at securing socially responsible and compliant behaviours. In Australia, as in other Western countries, neoliberal economic regimes with their harsh and often repressive treatment of welfare recipients operate in tandem with a burgeoning and costly arsenal of CCTV and other surveillance and governance assemblages. The Australian Government’s Centrelink BasicsCard is but one example of welfare surveillance, whereby a percentage of a welfare claimant’s allowances must be spent on ‘approved’ items. The BasicsCard which has perhaps slipped under the radar of public discussion and is expanding nationally, raises significant questions about whether it is possible to encourage people to take responsibility for themselves if they no longer have real control over the most important aspects of their lives. Resistance and critical feedback, particularly from Indigenous people, points to a loss of dignity around the imposition of income management, operational complexity and denial of individual agency in using the BasicsCard, alongside the contradiction of apparently becoming ‘self-reliant’ through being income managed by the welfare state. This paper highlights the lack of solid evidence for the implementation/imposition of the BasicsCard and points to the importance of developing critically based research to inform the enactment of evidence based policy, also acting as a touchstone for governmental accountability. In highlighting issues around the BasicsCard this paper makes a contribution to the largely under discussed area of income management and the growth of welfare surveillance in Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Keeping exotic plant pests out of our country relies on good border control or quarantine. However with increasing globalization and mobilization some things slip through. Then the back up systems become important. This can include an expensive form of surveillance that purposively targets particular pests. A much wider net is provided by general surveillance, which is assimilated into everyday activities, like farmers checking the health of their crops. In fact farmers and even home gardeners have provided a front line warning system for some pests (eg European wasp) that could otherwise have wreaked havoc. Mathematics is used to model how surveillance works in various situations. Within this virtual world we can play with various surveillance and management strategies to "see" how they would work, or how to make them work better. One of our greatest challenges is estimating some of the input parameters : because the pest hasn't been here before, it's hard to predict how well it might behave: establishing, spreading, and what types of symptoms it might express. So we rely on experts to help us with this. This talk will look at the mathematical, psychological and logical challenges of helping experts to quantify what they think. We show how the subjective Bayesian approach is useful for capturing expert uncertainty, ultimately providing a more complete picture of what they think... And what they don't!

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since the revisions to the International Health Regulations (IHR) in 2005, much attention has turned to two concerns relating to infectious disease control. The first is how to assist states to strengthen their capacity to identify and verify public health emergencies of international concern (PHEIC). The second is the question of how the World Health Organization (WHO) will operate its expanded mandate under the revised IHR. Very little attention has been paid to the potential individual power that has been afforded under the IHR revisions – primarily through the first inclusion of human rights principles into the instrument and the allowance for the WHO to receive non-state surveillance intelligence and informal reports of health emergencies. These inclusions mark the individual as a powerful actor, but also recognise the vulnerability of the individual to the whim of the state in outbreak response and containment. In this paper we examine why these changes to the IHR occurred and explore the consequence of expanding the sovereignty-as-responsibility concept to disease outbreak response. To this end our paper considers both the strengths and weaknesses of incorporating reports from non-official sources and including human rights principles in the IHR framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since the revisions to the International Health Regulations (IHR) in 2005, much attention has been turned to how states, particularly developing states, will address core capacity requirements. The question often examined is how states with poor health systems can strengthen their capacity to identify and verify public health emergencies of international concern. A core capacity requirement is that by 2012 states will have a surveillance and response network that operates from the local community to the national level. Much emphasis has turned to the health system capacity required for this task. In this article, I seek to understand the political capacity to perform this task. This article considers how the world's two most populous states,1 1. For the purposes of this paper, I use the word ‘state’ as a shorthand for the nation-state of China and India, or member state as used by the United Nations. View all notes China and India, have sought to communicate outbreak events in times of crisis and calm. I consider what this reporting performance tells us of their capacity to meet their IHR obligations given the two countries differing political institutions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ability of new information and communication technologies to pierce previously impenetrable physical, personal, and social boundaries has particular relevance to contemporary society and young people as there is now more information that can be collected, accessed, and distributed about individuals and groups. The ability to know about each other has become a central feature of many young people’s lives. The need to know is further complicated by other questions – Who knows? What do they know? What are the implications of this knowledge?. These questions are a consequence of society having become more mobile and networked enabling increased surveillance, tracking, and spreading of dis/information. With the acceleration of new pervasive and immersive technologies, these questions have taken on a new urgency and significance that go beyond an Orwellian Big Brother scenario. This chapter extends Foucault’s notion of the panopticon to take account of the challenges of an AmI environment of smart networked devices. By drawing on examples of recent young adult fiction, I examine some of the ways in which these texts invite their readers to reflect and speculate on the uneasy relationship between surveillance and democracy and what this means for individual rights and freedom, and a sense of place and belonging.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

- Objective To explore the potential for using a basic text search of routine emergency department data to identify product-related injury in infants and to compare the patterns from routine ED data and specialised injury surveillance data. - Methods Data was sourced from the Emergency Department Information System (EDIS) and the Queensland Injury Surveillance Unit (QISU) for all injured infants between 2009 and 2011. A basic text search was developed to identify the top five infant products in QISU. Sensitivity, specificity, and positive predictive value were calculated and a refined search was used with EDIS. Results were manually reviewed to assess validity. Descriptive analysis was conducted to examine patterns between datasets. - Results The basic text search for all products showed high sensitivity and specificity, and most searches showed high positive predictive value. EDIS patterns were similar to QISU patterns with strikingly similar month-of-age injury peaks, admission proportions and types of injuries. - Conclusions This study demonstrated a capacity to identify a sample of valid cases of product-related injuries for specified products using simple text searching of routine ED data. - Implications As the capacity for large datasets grows and the capability to reliably mine text improves, opportunities for expanded sources of injury surveillance data increase. This will ultimately assist stakeholders such as consumer product safety regulators and child safety advocates to appropriately target prevention initiatives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aims of this project will provide capacity in virology expertise to help protect Australian cotton from virus diseases including both existing and those that pose significant biosecurity threats. This project will also provide continued capacity in virology to support the cotton industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The capacity to conduct international disease outbreak surveillance and share information about outbreaks quickly has empowered both State and Non-State Actors to take an active role in stopping the spread of disease by generating new technical means to identify potential pandemics through the creation of shared reporting platforms. Despite all the rhetoric about the importance of infectious disease surveillance, the concept itself has received relatively little critical attention from academics, practitioners, and policymakers. This book asks leading contributors in the field to engage with five key issues attached to international disease outbreak surveillance - transparency, local engagement, practical needs, integration, and appeal - to illuminate the political effect of these technologies on those who use surveillance, those who respond to surveillance, and those being monitored.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols to control national infrastructure. The move from point-to-point serial connections to Ethernet-based network architectures, allowing for large and complex critical infrastructure networks. However, networks and con- figurations change, thus auditing tools are needed to aid in critical infrastructure network discovery. In this paper we present a series of intrusive techniques used for reconnaissance on DNP3 critical infrastructure. Our algorithms will discover DNP3 outstation slaves along with their DNP3 addresses, their corresponding master, and class object configurations. To validate our presented DNP3 reconnaissance algorithms and demonstrate it’s practicality, we present an implementation of a software tool using a DNP3 plug-in for Scapy. Our implementation validates the utility of our DNP3 reconnaissance technique. Our presented techniques will be useful for penetration testing, vulnerability assessments and DNP3 network discovery.