Query Result Set
Skip Navigation Links
   ActiveUsers:2369Hits:21296119Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
SURVEILLANCE (10) answer(s).
 
SrlItem
1
ID:   136396


Augmenting virtual reality / Adam, Rick; Merklinghuas, Dennis-P   Article
Adam, Rick Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The article discusses computer simulation technologies augmented reality (AR) and virtual reality (VR) along with information on several products used in military based on those technologies. Topics discussed include the first AR helmet-mounted display (HMD) called Sword of Damocles by computer scientist Ivan Sutherland, several AR and VR products including Google Glass, Oculus Rift and BT-200 MOVERIO smartglasses and the challenges with VR such as development of better tracking systems.
        Export Export
2
ID:   137017


Constructing resilience through security and surveillance: the politics, practices and tensions of security-driven resilience / Coaffee, Jon; Fussey, Pete   Article
Coaffee, Jon Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article illuminates how, since 9/11, security policy has gradually become more central to a range of resilience discourses and practices. As this process draws a wider range of security infrastructures, organizations and approaches into the enactment of resilience, security practices are enabled through more palatable and legitimizing discourses of resilience. This article charts the emergence and proliferation of security-driven resilience logics, deployed at different spatial scales, which exist in tension with each other. We exemplify such tensions in practice through a detailed case study from Birmingham, UK: ‘Project Champion’ an attempt to install over 200 high-resolution surveillance cameras, often invisibly, around neighbourhoods with a predominantly Muslim population. Here, practices of security-driven resilience came into conflict with other policy priorities focused upon community-centred social cohesion, posing a series of questions about social control, surveillance and the ability of national agencies to construct community resilience in local areas amidst state attempts to label the same spaces as ‘dangerous’. It is argued that security-driven logics of resilience generate conflicts in how resilience is operationalized, and produce and reproduce new hierarchical arrangements which, in turn, may work to subvert some of the founding aspirations and principles of resilience logic itself.
        Export Export
3
ID:   136872


Counter-terrorism, security and intelligence in the EU: governance challenges for collection, exchange and analysis / Boer, Monica Den   Article
Boer, Monica den Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In this article we seek to address the emerging role of the European Union (EU) as a security and intelligence actor from the perspective of counter-terrorism. Intelligence as a process and product has been strongly promoted by the EU as a useful and necessary tool in the fight against terrorism, radicalization, organized crime and public order problems. A range of agencies has been established that collect, analyze and operationalize intelligence in view of strategically defined security threats. Examples are Europol and Frontex. This article makes an inventory of their roles and competences in the field of intelligence and looks at the list of instruments that encourage the sharing of intelligence between different law enforcement and security agencies. Moreover, it is argued in this article that as intelligence becomes more hybrid and as the EU only holds light powers of oversight on ownership and integrity of data, considerable governance challenges lurk around the corner. As ‘intelligence’ is usually a complex and sensitive product, it often travels outside formal bureaucratic channels, which undermines accountability and transparency of where, how and for what purpose the intelligence was gathered.
        Export Export
4
ID:   136894


Cutting down: illegal deforestation surges in Brazilian Amazon / Caicedo, Carlos   Article
Caicedo, Carlos Article
0 Rating(s) & 0 Review(s)
Summary/Abstract After nearly 10 years of continuous decline, deforestation in the Amazon region has risen considerably since 2013, Carlos Caicedo examines the reasons for this increase, the security risk, and the efforts made by the Brazilian government to contain the problem.
        Export Export
5
ID:   135903


Drones for good: technological innovations, social movement and the state / Choi-Fitzpatrick, Austin   Article
Choi-Fitzpatrick, Austin Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The increased use of and attention to drones, or Unmanned Aerial Vehicles (UAVs), have led to a widespread debate about their application. Much of this debate has centered on their use by governments, often for the purpose of surveillance and warfare. This focus on the state’s use obscures the opportunity for civil society actors, including social movements, to make use of these technologies. This article briefly reviews the technological innovation before proceeding to a typology of civil society uses, ranging from art to digital disruption. This typology emphasizes the dual-use nature of this technology and, in the process, highlights the need for a best-practices framework to guide such use. Drone usage for the public good, it is argued, should prioritize 1) subsidiarity; 2) physical and material security; 3) the “do no harm” principle; 4) the public good; and respect for 5) privacy, and 6) data. These factors are introduced and discussed.
        Export Export
6
ID:   136871


From convergence to deep integration: evaluating the impact of EU counter-terrorism strategies on domestic arenas / Boer, Monica Den; Wiegand, Irina   Article
Boer, Monica den Article
0 Rating(s) & 0 Review(s)
Summary/Abstract With the 2001 EU Action Plan and the 2005 EU Counterterrorism Strategy, the European Union has unfolded a roadmap for counter-terrorism measures and an itinerary of actions to be undertaken by the Member States. In some respects, the EU strategies, flanked by the Action Plans in the Area of Freedom, Security and Justice, as well as more concrete forms of cooperation such as the adoption of the EU Arrest Warrant, the Member States have been encouraged to use the same conceptual apparatus, to adopt the precautionary logic (pre-terrorism), and to adopt similar organizational models (multi-disciplinary cooperation) and tools (surveillance, public-private cooperation, etc.). This may have led to a level of convergence between the national counter-terrorism approaches, in line with what the Action Plan on Organized Crime in 1997 sought to achieve by demanding from Member States that they would adapt their national structures. The number of policy-impulses that has emanated from the EU Counterterrorism strategy and ensuing policy documents has been rather numerous. Moreover, this article seeks to take stock of whether all proposals have led to the full adoption and implementation of instruments. The article assesses whether the EU strategies have encouraged ‘deep integration’ between the Member States in terms of a common threat assessment, pooling resources, sharing intelligence, mutual legal assistance in anti-terrorist investigations, creating joint investigation teams and transferring suspects between Member States. The primary focus of this article will be on levels of legal convergence between six Member States.
        Export Export
7
ID:   136433


Microblogging and grassroots surveillance in China / Jia, Lu; Fanxu, Zeng   Article
Jia, Lu Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Taking the approach of surveillance studies, this research aims to advance a balanced and context-rich understanding of how microblogging affords a variety of surveillance practices over Chinese society and of its impact. The study identifies the distinct features of grassroots surveillance, including anti-authoritarism, decentralisation and poor organisation, as well as rumour, entertainment and violence. Grassroots surveillance, enabled by microblogging, poses challenges to state surveillance, which seeks rationality, efficiency, social stability and solidarity. Grassroots surveillance creates huge impacts on Chinese society, including truth, morality, trust and power. The surveillance structure is experiencing a paradigmatic shift from panopticon to post-panopticon. Consequently, this study identifies a bankruptcy of disciplinary society that is based on panopticon surveillance, but without a possible formation of a controlled society that is based on post-panopticon. Instead, the social change enabled by microblogging-based surveillance falls into what Scott Lash called “disorganization”.
        Export Export
8
ID:   134726


Rise of the humanitarian drone: giving content to an emerging concept / Sandvik, Kristin Bergtora; Lohne, Kjersti   Article
Sandvik, Kristin Bergtora Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article explores and attempts to define the emerging concept of the humanitarian drone by critically examining actual and anticipated transfers of unmanned aerial vehicles (UAVs), or drones, from the global battlespace to the humanitarian emergency zone. Focusing on the relationship between the diffusion of new technology and institutional power, we explore the humanitarian drone as a ‘war dividend’ arising from the transfer of surveillance UAVs, cargo-carrying UAVs and weaponised UAVs. We then reflect on the ways in which military practices and rationales guiding drone deployment may also shape humanitarian use, giving particular attention to the concept of surgical precision, the implications of targeting logic, and the ambiguous role of distance. Next, we consider the broader implications for humanitarian action, including the promise of global justice and improved aid delivery. Finally, we analyse the most difficult aspect of the humanitarian drone: namely, its political currency as a ‘humanitarian weapon’ in conflict scenarios.
        Export Export
9
ID:   136635


Sources of Chinese conduct: explaining Beijing’s assertiveness / Friedberg, Aaron L   Article
Friedberg, Aaron L Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Starting in 2009, an increasing number of foreign observers (and many Chinese as well) began to note a shift towards more forceful or “assertive” behavior on the part of Beijing.1 Among the most frequently cited indications of this trend were: An internal debate among Chinese elites in which some participants advocated edging away from Deng Xiaoping's “hiding and biding” strategy and replacing it with something bolder and more self-confident;2 A “newly forceful, ‘triumphalist,’ or brash tone in foreign policy pronouncements,”3 including the more open acknowledgement—and even celebration—of China's increasing power and influence; Stronger reactions, including the threatened use of sanctions and FINANCIAL leverage, to recurrent irritations in U.S.–China relations such as arms sales to Taiwan and presidential visits with the Dalai Lama; More open and frequent displays of China's growing military capabilities including larger, long-range air and naval exercises, and demonstrating or deploying new weapons systems; A markedly increased willingness to use threats and displays of force on issues relating to the control of the waters, air space, surface features, and resources off China's coasts. These include ongoing disputes with the Philippines and Vietnam (among others) in the South China Sea, with Japan in the East China Sea, and with the United States regarding its conduct of surveillance and military exercises in areas from the Yellow Sea to the vicinity of Hainan Island.
        Export Export
10
ID:   134301


Taking to the skies – China and India's quest for UAVs / Malhotra, Aditi; Viswesh, Rammohan   Article
Malhotra, Aditi Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Unmanned Aerial Vehicles (UAVs), or drones, have undoubtedly attained a prominent position in contemporary and future defence technologies. Likewise, Asian militaries have continued to realise the operational value of such vehicles, whether for Intelligence, Surveillance, and Reconnaissance (ISR) or combat purpose. In the current times, wherein UAVs are proliferating globally, it remains pivotal to understand their relevance, uses and implications, particularly with regard to emerging powers. It is in this context that the paper seeks to explore and compare the cases of the two rising Asian giants, India and China. The paper explores their UAV programmes, possible defence-oriented employments, and current technological capabilities to produce UAVs. The relevance of UAVs is assessed in terms of India and China's present military doctrines, security requirements (current and future) and how the UAVs fit into their security landscape. Finally, the article delves into the strategic implications of the greater proliferation and rampant employment of UAVs in the region.
        Export Export