Realized Applications of Positioning Technologies in Defense Intelligence

Realized Applications of Positioning Technologies in Defense Intelligence

Katina Michael (University of Wollongong, Australia) and Amelia Masters (University of Wollongong, Australia)
DOI: 10.4018/978-1-59140-640-2.ch007
OnDemand PDF Download:
$37.50

Abstract

Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland security has been drawn into the spotlight. The challenge, at both national and global levels, of managing information in order to offensively resist attack or defensively keep citizens safe from further harm has never been greater. In meeting this challenge, the tools and strategies used by relevant defensive powers are a key factor in the success or failure of all activities, ranging from small-scale, homeland security administration through to large-scale, all-inclusive war. In all areas within this wide scope, the adoption of positioning technologies has played an important role. Of special significance are the global positioning system (GPS), second-generation (2G) and beyond mobile telephone networks (includingwireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). Since most positioning technology has been developed or released for use within the commercial sector, however, concerns beyond technological feasibility are raised when applications are harnessed solely for defense. The integration between commercial and military sectors and public and private needs must be considered and, primarily, this involves ensuring that the enforcement of homeland security does not compromise citizen rights.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Hussein A. Abbass, Daryl Essam
Chapter 1
Daryl Essam, Hussein A. Abbass
With the increase in the complexity of terrorism’s networks and activities, the advances in chemical and biological warfare, and the use of... Sample PDF
All Hazards Analysis: A Complexity Perspective
$37.50
Chapter 2
Michael Barlow, Robert Cox
This chapter discusses the use of abstract multi-agent models of conflict — ABDs (Agent-Based Distillation) — for security and defense purposes. The... Sample PDF
Small & Simple: Application-Specific Multi-Agent Systems
$37.50
Chapter 3
Ang Yang, Hussein A. Abbass, Ruhul Sarker
Red teaming is the process of studying a problem by anticipating adversary behaviors. When done in simulations, the behavior space is divided into... Sample PDF
How Hard Is It To Red Team?
$37.50
Chapter 4
Anthony H. Dekker, Bernard Colbert
Events of the past few years have shown how today’s modern technological society is critically dependent on critical infrastructure networks such as... Sample PDF
Network Robustness for Critical Infrastructure Networks
$37.50
Chapter 5
Ajith Abraham, Johnson Thomas
Computer security is defined as the protection of computing systems against threats to confidentiality, integrity and availability. An intrusion is... Sample PDF
Distributed Intrusion Detection Systems: A Computational Intelligence Approach
$37.50
Chapter 6
Michael Barlow
This chapter covers the emerging area of the use of commercial off-the-shelf (COTS) computer games for military, defense and security purposes. A... Sample PDF
The Game of Defense and Security
$37.50
Chapter 7
Katina Michael, Amelia Masters
Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland... Sample PDF
Realized Applications of Positioning Technologies in Defense Intelligence
$37.50
Chapter 8
Katina Michael, Amelia Masters
The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted... Sample PDF
The Advancement of Positioning Technologies in Defense Intelligence
$37.50
Chapter 9
Cecilia Andrews, Edward Lewis
“Counter-terrorism refers to the practices, tactics and strategies that governments, militaries and other groups adopt in order to fight terrorism.”... Sample PDF
Simulating Complexity-Based Ethics for Crucial Decision Making in Counter Terrorism
$37.50
About the Authors