scholarly journals Terrorism vulnerability assessment in Java Island: a spatial multi-criteria analysis approach

2020 ◽  
Vol 52 (2) ◽  
pp. 163
Author(s):  
Asep Adang Supriyadi ◽  
Masita Dwi Mandini Manessa

Terrorism is one of the Indonesia’s national security threat. The attack mostly happens in Java Island, attracted by the dense population, also because the island is a center for economic and governance. The spatial pattern of terrorism attack shows correlations with the spatial density of the targeted attack. Therefore, this study assesses the spatial vulnerability of Java Island using a spatial multi-criteria analysis (SMCA). The main attributes analyzed were the density of the past terrorist attack, arrested area, police/military facility, government facility, business center, densely populated area, and church, determine that in the case of a terrorist attack is strongly affected by the attraction of the area. 

2020 ◽  
pp. 65-80
Author(s):  
Magdalena Strąk

The work aims to show a peculiar perspective of looking at photographs taken on the eve of the broadly understood disaster, which is specified in a slightly different way in each of the literary texts (Stefan Chwin’s autobiographical novel Krótka historia pewnego żartu [The brief history of a certain joke], a poem by Ryszard Kapuściński Na wystawie „Fotografia chłopów polskich do 1944 r.” [At an exhibition “The Polish peasants in photographs to 1944”] and Wisława Szymborska’s Fotografia z 11 września [Photograph from September 11]) – as death in a concentration camp, a general concept of the First World War or a terrorist attack. Upcoming tragic events – of which the photographed people are not yet aware – become for the subsequent recipient an inseparable element of reality contained in the frame. For the later observers, privileged with time perspective, the characters captured in the photograph are already victims of the catastrophe, which in reality was not yet recorded by the camera. It is a work about coexistence of the past and future in the field of photography.


2020 ◽  
Vol 20 (3) ◽  
pp. 7-52
Author(s):  
Miroslav Tuđman

The author gives an overview of the history of National Security and the Future (NSF). The first editorial board accepted a clear vision and mission of the NSF. That is why the NSF had to react to the political circumstances in which the journal has operated for 20 years. In the first period, international circumstances and the policy of detuđmanization directly influenced the choice of topics and papers published in the journal. For the past five years, the NSF has paid particular attention to the security of national and European critical infrastructure. A total of 257 texts were published on more than 8,000 pages and authored by 134 authors from 25 countries. The NSF has published studies on historical forgery, information operations, production of "fake news" and contributions to the theory and methodology of intelligence activities.


2022 ◽  
Vol 1 ◽  
Author(s):  
Kirsten Nettles ◽  
Cameron Ford ◽  
Paola A. Prada-Tiedemann

The early detection and location of firearm threats is critical to the success of any law enforcement operation to prevent a mass shooting event or illegal transport of weapons. Prevention tactics such as firearm detection canines have been at the front line of security tools to combat this national security threat. Firearm detection canines go through rigorous training regimens to achieve reliability in the detection of firearms as their target odor source. Currently, there is no scientific foundation as to the chemical odor signature emitted from the actual firearm device that could aid in increased and more efficient canine training and performance protocols or a better understanding of the chemistry of firearm-related odorants for better source identification. This study provides a novel method application of solid phase microextraction-gas chromatography-mass spectrometry (SPME-GC-MS) as a rapid system for the evaluation of odor profiles from firearm devices (loaded and unloaded). Samples included magazines (n = 30) and firearms (n = 15) acquired from the local law enforcement shooting range. Headspace analysis depicted five frequently occurring compounds across sample matrices including aldehydes such as nonanal, decanal, octanal and hydrocarbons tetradecane and tridecane. Statistical analysis via principal component analysis (PCA) highlighted a preliminary clustering differentiating unloaded firearms from both loaded/unloaded magazines and loaded firearm devices. These results highlight potential odor signature differences associated with different firearm components. The understanding of key odorants above a firearm will have an impact on national security efforts, thereby enhancing training regimens to better prepare canine teams for current threats in our communities.


2012 ◽  
Vol 71 (1) ◽  
pp. 121-125
Author(s):  
John Whittier Treat

I begin my rejoinder to Timothy Brook and Michael Shin by reiterating the important question with which Brook ends his piece. “[W]hen Hamid Karzai's government falls in Afghanistan, or Nouri al-Maliki's does in Iraq, who then will be the nation's heroes and who the collaborators?” Questions such as this and other present-day conundrums (including the choices I make living in a national security state) were certainly on my mind when I began thinking about collaboration during the Second World War and particularly within the Japanese empire. The line between then and now is direct and short for me. Timothy Brook himself has been the target of an internet smear campaign assailing his work on Chinese collaboration for purportedly preparing an alibi for American mischief in Iraq and Afghanistan. Paramount among my own thoughts was always: what would I do, were I faced with the choices a Yi Kwang-su, a Liang Hongzhi or a Wang Jingwei was? It seems an irresistible reflex to me that we place ourselves in the position of those in the past who wagered and lost, and rehearse their calculations as our own: judgment of their decisions is as inevitable as it is necessary. The question is not if we will judge—to refuse risks our claims to moral agency—it is how. Timothy Brook, whether he once declined or now hesitates, indeed does make ethical judgments (he is on the record, for example, against advocating “collaboration as a morally positive or politically advisable course” [2008]), and indeed he should. That we have not come to similar conclusions only points to our missing consensus on a moral calculus, and not to the lack of an imperative to possess one.


Author(s):  
Jameel Jaffer

The legal, political, and technological developments of the past twenty years have rendered us more reliant on whistleblowers even as the developments have made whistleblowing more difficult and more hazardous. To promote informed public debate about national security and to preserve the connection between democratic consent and government policy in this sphere, we should extend legal protection, in some circumstances, to government insiders who responsibly disclose official secrets without authorization. Affording leakers a “public value” defense against prosecution would have benefits beyond those usually cited. It would, among other things, reduce the disincentive to socially beneficial leaks, lend legitimacy to Espionage Act prosecutions, more closely align our legal regime with widely shared intuitions about moral responsibility, and restore the courts to an appropriately central role in protecting the public’s access to an essential channel of information.


Author(s):  
Binghui Peng ◽  
Weiran Shen ◽  
Pingzhong Tang ◽  
Song Zuo

Over the past decades, various theories and algorithms have been developed under the framework of Stackelberg games and part of these innovations have been fielded under the scenarios of national security defenses and wildlife protections. However, one of the remaining difficulties in the literature is that most of theoretical works assume full information of the payoff matrices, while in applications, the leader often has no prior knowledge about the follower’s payoff matrix, but may gain information about the follower’s utility function through repeated interactions. In this paper, we study the problem of learning the optimal leader strategy in Stackelberg (security) games and develop novel algorithms as well as new hardness results.


Author(s):  
Liz Campbell

This article problematizes the growing tendency to characterize organized crime as a national security threat, referring primarily to the situation in the United Kingdom but also drawing on international and comparative examples. Three distinct arguments are presented contesting this comparison. First, it is questionable whether either concept is sufficiently clear in a definitional sense for the comparison to be meaningful analytically. The second empirical argument suggests that organized crime, as it is defined and encountered usually in the United Kingdom, does not yet constitute such a threat. Third, and regardless of the validity of the preceding arguments, it is argued in a normative sense that such a comparison should be resisted to the greatest extent possible, given the extraordinary legal consequences it entails. These claims indicate how caution must be exercized in making such a connection.


2001 ◽  
Vol 47 (157) ◽  
pp. 303-313 ◽  
Author(s):  
N. A. Nereson ◽  
C. F. Raymond

AbstractMeasurements of the surface and internal layer geometry from ice-penetrating radar and global positioning system surveys on three inter-ice-stream ridges in West Antarctica (Siple Dome, ridge DE and ridge BC) are examined with ice-flow models to infer (1) the history of the divide position at each site and (2) the spatial pattern of accumulation across the ridges. We find that the divide position is most steady at Siple Dome, somewhat steady at ridge DE and highly variable at ridge BC. Data from Siple Dome and ridge DE show evidence for steady northward motion of the ice divide for the past few thousand years. The layers beneath ridge BC suggest a 5 km northward shift of the divide position within the past several hundred years. Assuming the divide shifts are all due to changing elevation of the bounding ice streams, we infer the relative elevation history for segments of Ice Streams B–E. The northward displacement of the divide for all ridges implies a progressive relative thinning of the ice streams from E to B, with most dramatic recent thinning (100 m in <103 years) of Ice Stream B relative to Ice Stream C. Analysis of the internal layer pattern across the ridges indicates a south–north accumulation gradient with higher accumulation rates on the northern flanks of the ridges in all three cases. The inferred accumulation distribution is nearly uniform on the northern flanks, decreases sharply within a few ice thicknesses across the divides, and then decreases gradually farther to the south. The north/south decrease is strongest for ridge DE and weakest for ridge BC. This spatial pattern and the reduction in gradient strength with distance from the Amundsen Sea is consistent with the hypothesis that storms from the Amundsen Sea carry moisture first south then west over West Antarctica and deposit more snow on the windward side of ridges due to orographic lifting. This pattern has been stable for at least the past several thousand years.


Sign in / Sign up

Export Citation Format

Share Document