Wednesday, 9 July 2014

Security within the Pacific

The USA has currently signed four major treaties with Pacific nations. One amongst these is that the written agreement of peace between forty eight Allied Powers and Japan. The remaining three are security treaties, one with the Philippines, and another with Australia and New island and therefore the third with Japan.

The written agreement of Peace with Japan has 2 nice functions. It’s 1st of all designed to shut associate degree previous war on terms which is able to not provoke another war. They wanted, each within the manner of their negotiation and within the substance of their terms, to avoid the humiliations and therefore the discriminations that victors typically impose upon the van-quished either as a result of passion supplants their reason or as a result of they assume that's the thanks to discourage a defeated nation from getting to war once more. History shows that such a course in truth spurs the vanquished to hunt revenge.

The written agreement of Peace with Japan is meant to interrupt the regeneration of war, victory, peace and war. Whether or not it'll do thus nobody will say for certain, as a result of no single act of itself is spare to ensure future peace. One will prophesy confidently, however, that nothing within the peacemaking can cause Japan to show against the victors, as FRG did once the primary war.


It is one thing to own created a peace that avoids grievous blunders. There was, however, a second and even harder task. That was to translate Japan from a defeated enemy into a positive contributor to peace within the Pacific as against the new menace of aggression that had arisen even before the previous war was formally all over.

Wednesday, 6 February 2013

Food Security on the Pacific

In 2009, countries at the World Food Summit agreed that: ‘Food security exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy lifestyle.’

Globally, climate change, population pressure and recent increases in food prices, fuel price upheavals and unstable economic conditions are affecting the availability and access to sufficient, safe, and nutritious food.

Pacific Island countries and Territories (PICTs) in particular are being adversely affected. These global influences are increasing food prices, exacerbating an already heavy reliance on imported and processed foods.

They also contribute to the loss of local harvesting, production and cultural knowledge and create uncertainty around food supply. As such, Pacific populations are at greater risk of malnutrition, foodborne diseases and non-communicable disease (NCD).

Our vision is that all people in the Pacific have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life.

Friday, 17 August 2012

Security

Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3 defines security as "a form of protection where a separation is created between the assets and the threat". This includes but is not limited to the elimination of either the asset or the threat. Security as a national condition was defined in a United Nations study (1986), so that countries can develop and progress safely.

Thursday, 10 November 2011

HISTORY: WORLD WAR II


During World War II, the Security Service played a key role in combating enemy espionage, intercepting German communications and feeding misinformation back to Germany.

The Service achieved great success in uncovering enemy agents in Britain, some of whom were "turned" by the Service and became double agents who fed false information to the Germans concerning military strategy throughout the war. This was the famous "Double Cross" system, a highly effective deception that contributed to the success of the Allied Forces landing in Normandy on D-Day in June 1944 (see also Agent GARBO).

When captured German intelligence records were studied after 1945, it was found that almost all of the further 115 or so agents targeted against Britain during the course of the war had been successfully identified and caught. The only exception was an agent who committed suicide before capture.

For the first time, the Service also confronted the issue of loyalty of British Communists in sensitive government positions, in the certain knowledge that Party members were under instructions to "share" their information with Communist Party HQ. This was to have important repercussions following the war (see The Cold War).

Wartime turmoil
The Service's success only came after an initial period of great confusion. The Service was inadequately prepared for the massive increase in work that came with the onset of war. It had far too few staff to deal with its new responsibilities. At the end of 1938, the Service had only 30 officers and another 103 secretaries and registry staff.

These problems meant that, when war was declared, a flood of reports, vetting requests and enquiries overwhelmed the Security Service. During the second quarter of 1940, the Service received an average of 8,200 vetting requests each week. The Service also had to contend with fears of a "Fifth Column" of Nazi sympathizers in Britain working to prepare the ground for a German invasion. This resulted in thousands of reports of suspected enemy activity, each of which had to be investigated.

The problem rapidly worsened with the introduction of internment (imprisonment without trial). Within the first six months of the war, 64,000 citizens of Germany, Austria and Italy resident in the UK had to undergo security interviews to confirm that they were "friendly aliens". In addition, suspected British Nazi sympathisers such as Sir Oswald Mosley were imprisoned to guard against the threat of domestic subversion.

In May 1940 the Service's chief Sir Vernon Kell was retired on the orders of the newly-appointed Prime Minister, Winston Churchill . He was replaced by Brigadier Oswald "Jasper" Harker, who was himself replaced by Sir David Petrie in April 1941.

Under Sir David, the Service underwent major reforms that greatly improved its ability to deal with the demands of wartime, and its major successes against German espionage followed. Some accounts of notable cases from this period are provided on pages linked below.

Wartime records in the National Archives
Collections of the surviving records from this period have been released to The National Archives , and further tranches of historical records continue to be released twice yearly (see The Security Service at The National Archives). More recent releases concerning the war have included personal files for German intelligence officers and agents, and files concerning "renegades" (British subjects in enemy or enemy-occupied territory who assisted the enemy in various ways, notably by broadcasting on behalf of Germany).

Included in the latter category were the personal files for the writer P.G. Wodehouse, and William Joyce (better known as Lord Haw-Haw). Many of the personal files contain details of the interrogations of German agents and officers carried out at Camp 020, the Service's wartime interrogation centre at Ham in Surrey.

There is also a range of associated material, including photographs, censored letters and recorded conversations. Also recently released are files on British Fascists, including Sir Oswald Mosely and Lady Diana Mosely.

Stories from World War II
The battle for the Rock of Gibraltar (1942-45)
How the Security Service defended Gibraltar from German and Spanish spies and saboteurs.

Agent GARBO (1941-44)
The story of Jean Pujol Garcia, codenamed GARBO, one of the most successful double agents in the history of espionage.

Hitler's last days (1945)
Eyewitness accounts of the last days of Adolf Hitler, gathered by Security Service interrogators following the end of the war.

https://www.mi5.gov.uk/output/world-war-2.html

Friday, 30 September 2011

Embassy of the United States, London


The first American Embassy in London was situated in Great Cumberland Place, later moving to Piccadilly, Portland Place and Grosvenor Gardens. In 1938, the embassy was moved to 1 Grosvenor Square (which now hosts part of the Canadian High Commission). During this time, Grosvenor Square began to accommodate many U.S. government offices, including the headquarters of General Dwight D. Eisenhower and the European headquarters of the United States Navy. Following World War II, the Duke of Westminster donated land for a memorial to wartime President Franklin D. Roosevelt.

The American Embassy London Chancery Building was constructed in the late 1950s, opening in 1960. It was designed by Finnish American modernist architect Eero Saarinen. The building has nine stories, three of which are below ground. A large gilded aluminum Bald Eagle by Theodore Roszak, with a wingspan of over 11 metres (35 feet) is situated on the roof of the Chancery Building, making it a recognizable London landmark. In October 2009, the building was granted Grade II listed status.

This embassy, as with many U.S. embassies in the world, is situated on land that is not owned by the U.S. government. The land is leased from the Duke of Westminster who, when asked if he would sell the land outright, responded that he would if the U.S. Government would return the land that belonged to his family in the U.S. before it was confiscated during the Revolutionary War. The Duke refused to grant a freehold because, from the Duke's perspective, the U.S. Government had stolen some of his ancestor's estates in Virginia.

Monday, 8 August 2011

Network security

In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done.

Tuesday, 12 July 2011

Security

Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3 defines security as "a form of protection where a separation is created between the assets and the threat". This includes but is not limited to the elimination of either the asset or the threat. Security as a national condition was defined in a United Nations study (1986)[citation needed], so that countries can develop and progress safely.