Sample records for national industrial security

  1. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  2. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  3. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  4. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  5. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  6. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  7. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...

  8. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...

  9. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  10. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  11. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...

  12. Multinational corporate penetration, industrialism, region, and social security expenditures: a cross-national analysis.

    PubMed

    Clark, R; Filinson, R

    1991-01-01

    This study examines the determinants of spending on social security programs. We draw predictions from industrialism and dependency theories for the explanation of social security programs. The explanations are tested with data on seventy-five nations, representative of core, semipheripheral and peripheral nations. Industrialization variables such as the percentage of older adults and economic productivity have strong effects in models involving all nations, as does multinational corporate (MNC) penetration in extraction, particularly when region is controlled; such penetration is negatively associated with spending on social security. We then look at industrialism and dependency effects for peripheral and non-core nations alone. The effects of all industrialization variables, except economic productivity, appear insignificant for peripheral nations, while the effects of region and multinational corporate penetration in extractive and agricultural industries appears significant. Models involving all non-core nations (peripheral and semi-peripheral) look more like models for all nations than for peripheral nations alone.

  13. 49 CFR 8.31 - Industrial security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...

  14. 49 CFR 8.31 - Industrial security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... classified pursuant to Executive Order 12356 of April 2, 1982, National Security Information, or its...

  15. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating Manual (NISPOM) [201(a)]. 2004.20 Section 2004.20 National Defense Other Regulations Relating to National... that surface from industry, Executive Branch departments and agencies, or the NISPPAC. When consensus...

  16. Multinational Corporate Penetration, Industrialism, Region, and Social Security Expenditures: A Cross-National Analysis.

    ERIC Educational Resources Information Center

    Clark, Roger; Filinson, Rachel

    1991-01-01

    Examined determinants of spending on social security programs, using data from 75 nations representative of core, semiperipheral, and peripheral nations. Industrialization variables had strong effects in models involving all nations, as did multinational corporate penetration in extraction, particularly when region was controlled; such penetration…

  17. Nevada National Security Site Industrial Sites Project Closeout - 12498

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cabble, Kevin; Krauss, Mark; Matthews, Pat

    The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office is responsible for environmental restoration (ER) at the Nevada National Security Site (NNSS). This includes remediation at Industrial Sites where past nuclear testing activities and activities that supported nuclear testing may have or are known to have resulted in the release of contaminants into the environment. Industrial Sites at the NNSS have included nuclear facilities that supported the nuclear rocket/missile development programs, gas stations, landfills, spill sites, ordnance sites, and numerous other waste disposal and release sites. The NNSS Industrial Sites activities neared completion at the endmore » of fiscal year 2011 while other activities required under the Federal Facility Agreement and Consent Order (FFACO) and part of the same NNSS ER Project are forecasted to extend to 2027 or beyond. With the majority of Industrial Sites corrective action units (CAUs) completed (more than 250 CAUs and over 1,800 corrective action sites), it was determined that an activity closeout process should be implemented to ensure that the work completed over the past 15 years is well documented in a comprehensive and concise summary. While the process used to close each individual CAU is described in approved documents, no single document describes in summary fashion the work completed to close the many individual Industrial Sites. The activity closeout process will be used to develop an Industrial Sites closeout document that describes these years of work. This document will summarize the number of Industrial Sites closed under the FFACO and provide general descriptions of projects, contaminants removed, and sites closed in place with corresponding Use Restrictions. Other pertinent information related to Industrial Sites work such as the project history, closure decisions, historical declarations, remediation strategies, and final CAU status will be included in the

  18. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false National security... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... associated with such activities, with direct national security significance. (b) In order to ensure that all...

  19. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...

  20. 49 CFR 8.31 - Industrial security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... regulation is DOD 5220.22-M, National Industrial Security Program Operating Manual. This regulation is effective within the Department of Transportation, which functions as a User Agency as prescribed in the...

  1. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part...: Information Security Oversight Office, NARA. ACTION: Proposed rule; correction. SUMMARY: This document... Management System (FDMS) number to the proposed rule for Information Security Oversight Office (ISOO...

  2. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Technology Partnerships Business, Industry, & Non-Profits Government Universities Center for Development Agreement (CRADA) Strategic Partnership Projects, Non-Federal Entity (SPP/NFE) Agreements New leadership for the national security community by delivering cutting-edge experimental and operational sensor

  3. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  4. National Security Management Correspondence Course.

    ERIC Educational Resources Information Center

    Industrial Coll. of the Armed Forces (DOD), Washington, DC.

    A course of study on the fundamental aspects of the areas of knowledge which are essential to effective management of national security is presented. The course presents the substance of the Industrial College resident curriculum adapted to the correspondence method of study. The subject matter is designed to impart knowledge and understanding of…

  5. 48 CFR 225.870-8 - Industrial security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...

  6. 48 CFR 225.870-8 - Industrial security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...

  7. 48 CFR 225.870-8 - Industrial security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...

  8. 48 CFR 225.870-8 - Industrial security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...

  9. 48 CFR 225.870-8 - Industrial security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...

  10. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...

  11. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... impact of foreign competition on the economic welfare of individual domestic industries. In determining whether such impact may impair the national security, any substantial unemployment, decrease in revenues... Secretary shall also consider other relevant factors in determining whether the national security is...

  12. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau... Federal agencies, conducts assessments of U.S. industrial base sectors deemed critical to U.S. national... needs of these critical market segments in order to maintain a strong U.S. industrial base. II. Method...

  13. National ITS architecture security

    DOT National Transportation Integrated Search

    2003-10-01

    This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...

  14. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  15. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  16. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  17. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...

  18. [Organization and management of nationalized pharmaceutical industry in Slovakia from 1945 to 1948].

    PubMed

    Senček, Richard R

    2013-02-01

    The paper discusses a short but important period in the history of pharmaceutical industry with regard to Slovakia. The complicated post-war situation required peremptory interventions from the state, which attempted to secure the operation of strategic firms by means of National Administration Boards and nationalization. The firms which were nationalized by this measure were managed by the Ministry of Industry. They included also the pharmaceutical firms nationalized in Slovakia. The situation which produced contradictory responses in society and political scene culminated in the communist coup detat and nationalization of virtually all industries.Key words: nationalization pharmaceutical industry Ministry of Industry.

  19. MEMS and MOEMS for national security applications

    NASA Astrophysics Data System (ADS)

    Scott, Marion W.

    2003-01-01

    Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

  20. Security enhancement study for the U.S. motorcoach industry : executive summary

    DOT National Transportation Integrated Search

    2003-05-01

    The Security Enhancement Study for the U.S. Motorcoach Industry was commissioned by the Federal Motor Carrier Safety Administration (FMCSA) and conducted by the John A. Volpe National Transportation Systems Center (Volpe Center). It was prepared to i...

  1. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...

  2. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  3. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less

  4. Sandia National Laboratories: National Security Missions: Nuclear Weapons:

    Science.gov Websites

    Safety & Security Sandia National Laboratories Exceptional service in the national interest & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Twitter YouTube Flickr RSS Top Nuclear Weapons About Nuclear Weapons at Sandia Safety & Security

  5. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  6. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  7. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  8. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  9. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  10. 31 CFR 500.325 - National securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  11. National Strategy for Aviation Security

    DTIC Science & Technology

    2007-03-26

    for Aviation Security (hereafter referred to as the Strategy) to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort

  12. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  13. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  14. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  15. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  16. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  17. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  18. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...

  19. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...

  20. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...

  1. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...

  2. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities...

  3. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... materials. (iv) Production equipment and facilities. (v) Other supplies and services essential to the... requirements. (5) The economic welfare of the Nation as it is related to our national security, including the impact of foreign competition on the economic welfare of individual domestic industries. In determining...

  4. Cyber security best practices for the nuclear industry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  5. 14 CFR § 1260.31 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate security...

  6. 48 CFR 225.872-7 - Industrial security for qualifying countries.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security for... Agreements and Coordination 225.872-7 Industrial security for qualifying countries. The required procedures... qualifying country sources are in the DoD Industrial Security Regulation DoD 5220.22-R (implemented for the...

  7. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  8. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  9. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  10. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  11. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... National Security Contracts require contractor employees to gain access to national security information in.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... same manner as assessment of those functions performed by government employees. The Contracting Officer...

  12. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    DTIC Science & Technology

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  13. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  14. National Security Technology Incubator Evaluation Process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less

  15. National Security Technology Incubator Business Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less

  16. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI. ...

  17. Student Experiential Opportunities in National Security Careers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less

  18. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... economic welfare of any domestic industry essential to our national security; (2) The displacement of any..., products, raw materials, production equipment and facilities, and other supplies and services essential to...

  19. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  20. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  1. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  2. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  3. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  4. Safety and security of radioactive sources in industrial radiography in Bangladesh

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mollah, A. S.; Nazrul, M. Abdullah

    2013-07-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less

  5. 32 CFR 156.5 - National security positions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... of Existing Personnel Security Clearances” dated December 12, 2005 (Copies available on the Internet... 32 National Defense 1 2014-07-01 2014-07-01 false National security positions. 156.5 Section 156.5 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE...

  6. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must be...

  7. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  8. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  9. A Policy and Program for Invigorating Science and Technology for National Security

    DTIC Science & Technology

    2014-04-01

    technical support – academia competes against industry often appearing as cheap labour but then without generating commercially viable or sustainable...have new technology approved too bureaucratic keeping SME’s out of the market DSTO provide greater transparency of S&T goals to enable industry to...national security S&T. In endeavouring to meet the Government’s desire to reduce red tape and cognisant of the tight financial environment, consideration

  10. National Security Technology Incubation Strategic Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company

  11. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...

  12. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...

  13. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the agency...

  14. Seller Beware: US International Technology Transfer and Its Impact on National Security (Maxwell Paper, Number 16)

    DTIC Science & Technology

    1998-12-01

    be adjusted to fix it? Inside the Defense Department, the Defense Technology Security Agency ( DTSA ) handles export policy. For the past several years... DTSA has been working with the State, Commerce, and Defense Departments to strike a balance between national security and the economic needs of the...nation’s defense industry to export.46 DTSA reviews the export application (received from either from State or Com- merce) and forwards it to the

  15. Administrator, National Security Education Program

    DTIC Science & Technology

    1993-01-19

    1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993

  16. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  17. Protecting Commercial Space Systems: A Critical National Security Issue

    DTIC Science & Technology

    1999-04-01

    The Influence of Sea Power on World History: 1660-1783” (excerpt). Air Command and Staff College War Theory Coursebook (Academic Year 1999), 87- 88. 6...Publications. State of the Space Industry, 1998, 42, 49; and (2) US Census Bureau, Statistical Abstract of the United States: 1998, 1 Oct 1998, 578...College War Theory Coursebook (Academic Year 1999), 109. 2 Stubbs, Captain Bruce B., “The Coast Guard’s National Security Role in the 21st Century.” Air

  18. 77 FR 1710 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0975] National Maritime Security Advisory... notice announcing a National Maritime Security Advisory Committee (NMSAC) public meeting on January 18-19... and forward progress regarding multiple maritime security initiatives. If you have been adversely...

  19. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National Security...

  20. Challenges of the Global Century: Report of the Project on Globalization and National Security

    DTIC Science & Technology

    2001-01-01

    military and civilian leaders for service at the highest levels of national defense and security. The major components of NDU include the Industrial ...academic programs. In addition, it produces Joint Force Quarterly, a professional military journal published for the Chairman of the Joint Chiefs of...shocks become contagious. In these circumstances, it can both arouse anger at industrial democracies and facili- tate the growth of international crime

  1. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    ERIC Educational Resources Information Center

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  2. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  3. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Licensing & Technology Transfer Browse Technology Portfolios Technology Partnerships Business, Industry

  4. International Competitiveness: A National Security Perspective

    DTIC Science & Technology

    1989-06-01

    Maxwell AFB AL 36112-5532. International Competitiveness A National Security Perspective 0 C 0 Thank you for your assistance / , ’I RELSEARCJ RhINORT NO...AU-ARI-88-11 International Competitiveness A National Security Perspective RONALD H. DABROWSKI, Maj, USAF Research Fellow Airpower Research Institute...26 International Competition ......................... 26 Identification of Firms Involved ..................... 26 Continued Leadership in

  5. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION 36 CFR Part 1260 [FDMS NARA-11-0001] RIN 3095-AB64 Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule...

  6. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0022] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... notice of a May 22, 2013, meeting of the President's National Security Telecommunications Advisory...

  7. 37 CFR 5.1 - Applications and correspondence involving national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... correspondence involving national security. 5.1 Section 5.1 Patents, Trademarks, and Copyrights UNITED STATES... involving national security. (a) All correspondence in connection with this part, including petitions... national security classified (see § 1.9(i) of this chapter) and contain authorized national security...

  8. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  9. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  10. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    NASA Astrophysics Data System (ADS)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  11. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency... security exemption shall be void ab initio with respect to each new product, originally intended for a...

  12. National Security and Global Climate Change

    DTIC Science & Technology

    2008-01-01

    The uncertainty, confusion, and speculation about the causes, effects, and implications of global climate change (GCC) often paralyze serious...against scientific indications of global climate change , but to consider how it would pose challenges to national security, explore options for facing...generals and admirals, released a report concluding that projected climate change poses a serious threat to America’s national security. This article

  13. Leveraging multi-channel x-ray detector technology to improve quality metrics for industrial and security applications

    NASA Astrophysics Data System (ADS)

    Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.

    2017-09-01

    Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.

  14. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization...

  15. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...

  16. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... prompt decision on the appeal. (b) [Reserved] Sec. 1260.82 What actions must NARA take with information... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... related to declassification of classified national security information in records transferred to NARA's...

  17. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  18. 75 FR 37253 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ..., Intelligence, National defense, National security information, Presidential documents, Security information... reveal the identity of a confidential human source or a human intelligence source or key design concepts... or a human intelligence source, the duration shall be up to 75 years and shall be designated with the...

  19. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  20. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  1. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 39 Postal Service 1 2012-07-01 2012-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...

  2. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...

  3. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 39 Postal Service 1 2014-07-01 2014-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...

  4. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 39 Postal Service 1 2013-07-01 2013-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...

  5. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 39 Postal Service 1 2011-07-01 2011-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide...

  6. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false National security cases. 501.2 Section 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the...

  7. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false National security cases. 501.2 Section 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the...

  8. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false National security cases. 501.2 Section 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the...

  9. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false National security cases. 501.2 Section 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the...

  10. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the...

  11. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erickson, Michael Charles

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  12. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Exclusion and Exemption of Marine SI Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... request a national security exemption for any marine SI engine, otherwise subject to this part, which does...

  13. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  14. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  15. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  16. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  17. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...

  18. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 4 2011-07-01 2011-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...

  19. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 4 2012-07-01 2012-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...

  20. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 4 2014-07-01 2014-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...

  1. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 4 2013-07-01 2013-07-01 false The national security exception. 1606.3 Section 1606.3 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION GUIDELINES ON DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful...

  2. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...

  3. Transboundary natural area protection: Broadening the definition of national security

    Treesearch

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  4. Port Security: A National Planning Guide

    DOT National Transportation Integrated Search

    1997-01-01

    Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...

  5. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  6. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...

  7. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...

  8. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Organization of the Bureau of Industry... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL INFORMATION § 730.9 Organization of the Bureau of Industry and Security. The head of the...

  9. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  10. The Growth of the Japanese Economy: Challenges to American National Security

    DTIC Science & Technology

    1991-09-01

    the flexibility to make decisions and the ability to fend for oneself , which are indispensable parts of anN country’s national security---would indeed...Europe, but American industry in Europe.ඪ As far as Japan was concerned, Servan-Schreiber admitted that it "...will manage to keep up to the... managing its economic machine in a manner that the United States found more acceptable. It is a simple assumption, yet it has been the cornerstone of the

  11. A National Climate Change Adaptation Network for Protecting Water Security

    NASA Astrophysics Data System (ADS)

    Weaver, A.; Sauchyn, D.; Byrne, J. M.

    2009-12-01

    Water security and resource-dependent community-survival are being increasingly challenged as a consequence of climate change, and it is urgent that we plan now for the security of our water supplies which support our lives and livelihoods. However, the range of impacts of climate change on water availability, and the consequent environmental and human adaptations that are required, is so complex and serious that it will take the combined work of natural, health and social scientists working with industries and communities to solve them. Networks are needed that will identify crucial water issues under climate change at a range of scales in order to provide regionally-sensitive, solutions-oriented research and adaptation. We suggest national and supra-national water availability and community sustainability issues must be addressed by multidisciplinary research and adaptation networks. The work must be driven by a bottom-up research paradigm — science in the service of community and governance. We suggest that interdisciplinary teams of researchers, in partnership with community decision makers and local industries, are the best means to develop solutions as communities attempt to address future water demands, protect their homes from infrastructure damage, and meet their food, drinking water, and other essential resource requirements. The intention is to cover: the impact of climate change on Canadian natural resources, both marine and terrestrial; issues of long-term sustainability and resilience in human communities and the environments in which they are embedded; the making and moving of knowledge, be that between members of Indigenous and non-Indigenous communities, researchers of different disciplines, communities, industry, policymakers and the academy and the crucial involvement of the various orders of government in the response to water problems, under conditions of heightened uncertainty. Such an adaptation network must include a national

  12. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. [[Page 45256... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Tuesday, August 20... related to national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The...

  13. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will be open to the... implementing national security and emergency preparedness telecommunications policy. Notice of this meeting is...

  14. The Exon-Florio National Security Test for Foreign Investment

    DTIC Science & Technology

    2010-02-04

    CRS Report for Congress Prepared for Members and Committees of Congress The Exon- Florio National Security Test for Foreign Investment...04 FEB 2010 2. REPORT TYPE 3. DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE The Exon- Florio National Security Test for Foreign...ANSI Std Z39-18 The Exon- Florio National Security Test for Foreign Investment Congressional Research Service Summary The Exon- Florio provision

  15. 77 FR 49439 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    .... ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite 1210... National Security Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209...

  16. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  17. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    PubMed

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. © London School of Economics and Political Science 2011.

  18. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...

  19. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...

  20. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... stores and industrial supplies. (a) General. The OCS facility owner or operator must ensure that security...). These additional security measures may include: (1) Intensifying inspection of the stores or industrial... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for delivery of...

  1. Impacts of Climate Change on Colombia’s National and Regional Security

    DTIC Science & Technology

    2009-10-01

    Peru, and Chile have relatively diverse, industrialized economies and greater domestic resources and state capaci- ties for adaptation. Bolivia...Change on Colombia’s National and Regional Security References 1 Colombia, Sistema de Informacion sobre el Uso del Agua en la Agricultura y el Medio...Jul 2009. "El cambio climatico en Colombia." Unpublished report shared with authors. IDEAM. 26 "El agua para 40 millones de personas esta en riesgo

  2. Policy Analysis in National Security Affairs: New Methods for a New Era

    DTIC Science & Technology

    2006-01-01

    make it hard to keep talented staffs in all three areas. Such firms draw most of their money from external sponsorship of research projects, often by... field of national security policy, the process of employing analytical methods to develop and enhance thought-derived knowledge begins by creating new...flow to poor regions from banks and lending agencies. Multinational firms add to the total with funds to develop industrial plants and other facilities

  3. A Call for National Security System Transformation

    DTIC Science & Technology

    2012-06-01

    Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Fox News Corporation. “Last American Troops Leave Iraq...by Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Stewart, Douglas. “Constructing the Iron Cage: The...1947 National Security Act.” In Affairs of State: The Interagency and National Security. Edited by Gabriel Marcella . Carlisle, PA: Strategic

  4. 77 FR 9214 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... Security Education Act, Title VII of Public Law 102- 183, as amended. DATES: March 15, 2012, from 9 a.m.-2...

  5. A National Security Staff for the 21st Century

    DTIC Science & Technology

    2012-12-01

    President to respond to the Con - gress with a detailed organizational plan for imple- menting the National Security Strategy. vi vii While many of the...the new National Security Staff and was a major con - tributor to key PNSR study efforts, including Forging a New Shield (November 2008), Turning...foundations for a strategic partnership with Con - gress for transforming our national security system to meet the rigors of the 21st century. Part 1 of

  6. U.S. Space Policy and Space Industry Strangulation

    DTIC Science & Technology

    2010-03-01

    protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry. 14...still protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry...security, and creating and sustaining a globally competitive space industry. These realms are not mutually exclusive. If technologies are overly guarded

  7. Neuroscience, ethics, and national security: the state of the art.

    PubMed

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  8. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  9. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  10. Marketing Plan for the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubatormore » program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.« less

  11. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... exemptions. (a) A new product which is produced to conform with specifications developed by a national security agency, and so labeled or marked on the outside of the container and on the product itself, shall... national security exemption shall be void ab initio with respect to each new product, originally intended...

  12. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Clearance and Safeguarding of National Security Information and Restricted Data AGENCY: Nuclear Regulatory... Executive Order 13526, Classified National Security Information. In addition, this direct final rule allowed... licensees (or their designees) to conduct classified [[Page 69287

  13. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  14. Nevada National Security Site Environmental Report 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less

  15. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ...The National Maritime Security Advisory Committee (NMSAC) will meet on January 18-19, 2012 in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public.

  16. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  17. The Strategic Measures for the Industrial Security of Small and Medium Business

    PubMed Central

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  18. The Industrial Age Versus The Information Age: Rethinking National Security in the 21st Century

    DTIC Science & Technology

    2001-02-01

    new Gobalization /Post-Cold War Environment. The distinctions also help in conceiving new factors of merit that might provide more relevant insight...distinction relates to the national security and military sphere would be the ability of a military to win battles. Within Western culture , at least, the... cultures , the cultural willingness to accept large numbers of casualties over a long period can have the same war-winning effect as winning battles

  19. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ... Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS. ACTION: Committee... Security Telecommunications Advisory Committee (NSTAC) will meet on Friday, January 11, 2013, via... related to national security and emergency preparedness telecommunications policy. Agenda: The NSTAC...

  20. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  1. 78 FR 24161 - Bureau of Industry and Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ... of Industry and Security senior management. 4. Discussion on General Technology Note as it applies to.... Report of Composite Working Group and other working groups. 7. Report on regime-based activities. 8...

  2. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...

  3. Environmental Degradation: Implications for National Security

    DTIC Science & Technology

    1990-03-30

    national interests, one can readily determine the points of confluencP. When the major security implications have been identified. realistic security...planning can be accomplished effectivelv. The major potential threat of East-West confrontation. characterized by massive conventional and nuclear arsenals...degradation. Economic infrastructures, the relative scarcity of resources, and surging population qrowth can combine to create a world not far removed from

  4. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  5. Arms Control and National Security: Revealed through Two Case Studies

    DTIC Science & Technology

    1988-03-01

    national security. Those in the service, while charged to carry out the orders of those appointed over them, possess a potential to influence national...the sixth point , of the stated six major national security goals of the present Administration. Not everyone would [ agree with such a placement...the other side concede some point at the bargaining table. 0 A defense bargain is a relative term relating to how much security or strength a

  6. 76 FR 28960 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  7. 77 FR 27739 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  8. Internet Governance and National Security

    DTIC Science & Technology

    2012-01-01

    the conflict created by headline- grabbing exploits of ad hoc hacker networks or nation-state-inspired cor­ porate espionage.5 Malicious actors add...governance of critical Internet re­ sources and their impact on US national security are often overlooked. Foreign efforts to alter the technical...crime, espio­ nage, and other forms of cyber conflict rather than on the issues related to governance of critical Internet resources, development of

  9. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    DTIC Science & Technology

    2014-09-01

    Security (DHS). This research explores how the determination, and more importantly, the urgency of the nation’s leaders to show resiliency , has created...2002 represented the blueprint for a nation of resiliency that unified the government and its community citizenry while deploying measures of...nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS

  10. Input from Key Stakeholders in the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  11. The Impact of Migration Processes on the National Security of Kazakhstan

    ERIC Educational Resources Information Center

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  12. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  13. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  14. Risk assessment of climate systems for national security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  15. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  16. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  17. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0004] National Security Division: Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...

  18. U.S. Army War College Guide to National Security Issues. Volume 2. National Security Policy and Strategy

    DTIC Science & Technology

    2012-06-01

    1998 National War College paper entitled “U.S. National Se- curity Structure: A New Model for the 21st Century” defines the national security community ...fueled by revolu- tions in communications and information management, the emergence of a truly global market and world economy, the primacy of economic...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions , searching existing data sources

  19. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  20. Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security

    NASA Astrophysics Data System (ADS)

    Kuloğlu, Gökhan; Gül, Zakir; Erçetin, Şefika Şule

    In today's rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.

  1. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  2. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  3. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  4. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  5. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  6. 76 FR 25702 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0310] National Maritime Security Advisory... Maritime Security Advisory Committee (NMSAC) will meet by teleconference to discuss the results of the... Maritime Organization (IMO). Agenda (1) Results of Seafarer Access Working Group's review and...

  7. Jimmy Carter's National Security Policy: A World Order Critique.

    ERIC Educational Resources Information Center

    Johansen, Robert C.

    This essay evaluates the Carter administration's behavior on national security questions and appraises the extent to which it meets Carter's initial professed national security goals. These goals include the intention to reduce military expenditures, to halt the nuclear arms buildup of the United States and U.S.S.R., to prevent the spread of…

  8. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information Collection Activities: Proposed Collection; Comments Requested ACTION: 60-Day Notice of Information...), National Security Division (NSD), will be submitting the following information collection request to the...

  9. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States and...

  10. 76 FR 62433 - Delegation of Authority to the Office of Disaster Management and National Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... the Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION... Disaster and National Security Officer, Office of Disaster Management and National Security. DATES... and National Security Officer, Office of Disaster Management and National Security, Department of...

  11. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-02-26

    climate change ;  ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and  increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen

  12. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  13. Mongolia’s Economic Security: How can Economic Development Further Support Mongolian National Security through Developing its Mining Sector

    DTIC Science & Technology

    2017-06-09

    MONGOLIA’S ECONOMIC SECURITY: HOW CAN ECONOMIC DEVELOPMENT FURTHER SUPPORT MONGOLIAN NATIONAL SECURITY THROUGH DEVELOPING ITS MINING SECTOR... Economic Security: How can Economic Development Further Support Mongolian National Security through Developing its Mining Sector? 5a. CONTRACT NUMBER...geographic position between two political and economic powers (China and Russia) provides both opportunities and disadvantages for Mongolia’s economy

  14. Development of national standards related to the integrated safety and security of high-rise buildings

    NASA Astrophysics Data System (ADS)

    Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov

    2018-03-01

    The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  15. Aviation security : terrorist acts demonstrate urgent need to improve security at the nation's airports

    DOT National Transportation Integrated Search

    2001-09-20

    A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...

  16. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Trade (Continued) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND... Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... proposed. Secretarial review of national security issues shall be aided by information submitted by the...

  17. Space industrialization: A national perspective

    NASA Technical Reports Server (NTRS)

    Reis, V. H.

    1984-01-01

    Space industrialization (or commercialization) has the potential to be a major player in America's space program. If this potential is to be realized, however, industrialization efforts must be considered within the context of the other major portions of the space program: shuttle, space station, and civil remote sensing. Further, development efforts must be based upon a sound scientific and technical understanding of the products and processes, and there must be a trained cadre of dedicated individuals willing to devote time and effort to this effort. There remain considerable risks and uncertainties. Given all this, the best path to follow would seem to be a long term, balanced commitment, emphasizing government, industry, and academia partnerships. Several points are addressed: (1) the place of space industrialization in the overall national space program; (2) the meaning of space industrialization with respect to the historic, national aims of space; and (3) specifically what is being industrialized.

  18. Nevada National Security Site Environmental Report 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its

  19. Public offerings of securities by petroleum industry: methods and costs of raising capital

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Siemon, D.

    1978-01-01

    This study examines public securities offerings by the petroleum industry and the flotation costs associated with raising capital through offerings to the public. Descriptive material is presented on an aggregate basis for the industry and also by selected company characteristics. Data were obtained from the Securities and Exchange Commission's records of registration statements for public offerings and include all public offerings registered with the SEC during the period January 1970 through October 1975. The petroleum industry issued 101 debt offerings and 1058 equity offerings during the time period. The total number of offerings for all industries was estimated to bemore » 20,000, so the petroleum industry accounted for roughly 5% of the total volume.« less

  20. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    DOT National Transportation Integrated Search

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  1. 33 CFR 165.1121 - Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Center Industrial Pier, San Diego, CA. 165.1121 Section 165.1121 Navigation and Navigable Waters COAST... Guard District § 165.1121 Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. (a) Location. The following area is a security zone: the waters of San Diego Bay extending approximately 100...

  2. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  3. Diversity Intersects with National Security.

    ERIC Educational Resources Information Center

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  4. Programs That Support Safety and Security for the Transit Industry

    DOT National Transportation Integrated Search

    2001-03-01

    FTA's Office of Safety and Security (Office) directly supports the U.S. Department of Transportation's safety goals through a series of programs designed to maintain continuous improvement in the safety and security of our nation's transit systems. T...

  5. Congress and National Security: Interest, Influence and Speed

    DTIC Science & Technology

    2010-03-01

    impact of these variables in two case studies of security agency organizational reform. The Intelligence Reform and Terrorism Prevention Act of 2004...all the stars in order to move fast on an issue of national security. Instead the positive impact of one or two variables combined with the... impact of these variables in two case studies of security agency organizational reform. The Intelligence Reform and Terrorism Prevention Act of 2004 and

  6. Updated United Nations Framework Classification for reserves and resources of extractive industries

    USGS Publications Warehouse

    Ahlbrandt, T.S.; Blaise, J.R.; Blystad, P.; Kelter, D.; Gabrielyants, G.; Heiberg, S.; Martinez, A.; Ross, J.G.; Slavov, S.; Subelj, A.; Young, E.D.

    2004-01-01

    The United Nations have studied how the oil and gas resource classification developed jointly by the SPE, the World Petroleum Congress (WPC) and the American Association of Petroleum Geologists (AAPG) could be harmonized with the United Nations Framework Classification (UNFC) for Solid Fuel and Mineral Resources (1). The United Nations has continued to build on this and other works, with support from many relevant international organizations, with the objective of updating the UNFC to apply to the extractive industries. The result is the United Nations Framework Classification for Energy and Mineral Resources (2) that this paper will present. Reserves and resources are categorized with respect to three sets of criteria: ??? Economic and commercial viability ??? Field project status and feasibility ??? The level of geologic knowledge The field project status criteria are readily recognized as the ones highlighted in the SPE/WPC/AAPG classification system of 2000. The geologic criteria absorb the rich traditions that form the primary basis for the Russian classification system, and the ones used to delimit, in part, proved reserves. Economic and commercial criteria facilitate the use of the classification in general, and reflect the commercial considerations used to delimit proved reserves in particular. The classification system will help to develop a common understanding of reserves and resources for all the extractive industries and will assist: ??? International and national resources management to secure supplies; ??? Industries' management of business processes to achieve efficiency in exploration and production; and ??? An appropriate basis for documenting the value of reserves and resources in financial statements.

  7. Sandia National Laboratories: National Security Missions: Global Security

    Science.gov Websites

    Involvement News News Releases Media Contacts & Resources Lab News Image Gallery Publications Annual Library Events Careers View All Jobs Students & Postdocs Internships & Co-ops Fellowships Security Image Cyber and Infrastructure Security Advanced analyses and technologies for securing the

  8. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...

  9. Nevada National Security Site Environmental Report Summary 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, Cathy

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS andmore » offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities

  10. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  11. 78 FR 54349 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70263; File No. SR-NSCC-2013-09] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change.... On July 2, 2013, the National Securities Clearing Corporation filed with the Securities and Exchange...

  12. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  13. Nevada National Security Site Environmental Report 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  14. Measuring Transnational Organized Crime Threats to US National Security

    DTIC Science & Technology

    2016-05-26

    typology is not designed to score TOC networks, so it is not an obvious choice, but it could be easily modified by the TMWG to rank-order TOC networks...States Strategy to Combat Transnational Organized Crime (SCTOC). The strategy identified Transnational Organized Crime ( TOC ) as a national security...identify the TOC groups that present the national security threat defined in the SCTOC? A literature review of existing organized crime assessments

  15. US National Economic Security in a Global Market

    DTIC Science & Technology

    1990-01-01

    13 (D) the Secretary of Commerce , 14 ( E ) the Secretary of Treasury, 15 (F) the United States Trade Representative, 16 and _ 17 (G) the Director of...OTe F!LE COPY --- National Security Program 00 N US NATIONAL ECONOMIC SECURITY IN A GLOBAL MARKET :I . DTIC ELECTE JAN14 1991 m S E D HARVARD...importantly, will become 5 I I ,,!"C is merica _ _ _ _ 44% 5AlAN leact rustwrthv __ 29% ’,’EST (E7,1RM.’y ,a ]i,- :. . 8 %FFR ANC E - 5% BRITAIN Does Jaan

  16. The Intersection of National Security and Climate Change

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  17. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  18. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  19. Wildlife on the Nevada National Security Site

    USGS Publications Warehouse

    Longshore, Kathleen M.; Wessells, Stephen M.

    2017-09-05

    Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.

  20. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2...

  1. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2...

  2. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2...

  3. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2...

  4. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2...

  5. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2018-01-16

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  6. The National Ignition Facility and Industry

    NASA Astrophysics Data System (ADS)

    Harri, J. G.; Paisner, J. A.; Lowdermilk, W. H.; Boyes, J. D.; Kumpan, S. A.; Sorem, M. S.

    1994-09-01

    The mission of the National Ignition Facility is to achieve ignition and gain in inertial confinement fusion targets in the laboratory. The facility will be used for defense applications such as weapons physics and weapons effects testing, and for civilian applications such as fusion energy development and fundamental studies of matter at high temperatures and densities. The National Ignition Facility construction project will require the best of our construction industries and its success will depend on the best products offered by hundreds of the nation's high technology companies. Three-fourths of the construction costs will be invested in industry. This article reviews the design, cost and schedule, and required industrial involvement associated with the construction project.

  7. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  8. United States national security policy making and Vietnam

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to groundmore » combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.« less

  9. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...

  10. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...

  11. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...

  12. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...

  13. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...

  14. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  15. 76 FR 1521 - Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0423] RIN 1625-AA87 Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: The Coast Guard is removing a security zone on the navigable waters of San Diego...

  16. The Exon-Florio National Security Test for Foreign Investment

    DTIC Science & Technology

    2006-03-15

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL33312 The Exon- Florio ...number. 1. REPORT DATE 15 MAR 2006 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE The Exon- Florio National Security Test for...Z39-18 The Exon- Florio National Security Test for Foreign Investment Summary The proposed acquisitions of major operations in six major U.S. ports by

  17. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    .... to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite..., Defense Language and National Security Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210...

  18. Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry

    ERIC Educational Resources Information Center

    Willey, Lorrie; White, Barbara Jo

    2013-01-01

    Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…

  19. Public perspectives on nuclear security. US national security surveys, 1993--1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, K.G.; Jenkins-Smith, H.C.

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between USmore » and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.« less

  20. The Department of Homeland Security’s Role in Protecting the National Economy

    DTIC Science & Technology

    2017-09-01

    national influence, power, and security. However, new characteristics of the modern trade environment have the potential to undermine U.S. economic ...prosperity. The Department of Homeland Security (DHS) claims that homeland security is inseparable from economic security and, as such, that the...department has a role to play in supporting national economic security goals. However, DHS has yet to fully reconcile the tension between its trade

  1. Climate Change and Risks to National Security

    NASA Astrophysics Data System (ADS)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  2. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...

  3. The Curious National Security Pendulum: Openness and/or Censorship.

    ERIC Educational Resources Information Center

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  4. 75 FR 15440 - Guidance for Industry on Standards for Securing the Drug Supply Chain-Standardized Numerical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ...] Guidance for Industry on Standards for Securing the Drug Supply Chain--Standardized Numerical... industry entitled ``Standards for Securing the Drug Supply Chain-Standardized Numerical Identification for... the Drug Supply Chain-Standardized Numerical Identification for Prescription Drug Packages.'' In the...

  5. American History and National Security: Supplementary Lessons for High School Courses.

    ERIC Educational Resources Information Center

    Patrick, John J., Ed.; And Others

    Effective citizen participation implies the acquisition of skills and knowledge necessary for discussing and deciding national security issues. This book was developed to provide teachers with resources to design and strengthen national security education. The 30 self-contained lessons supplement and enrich current textbook treatment of national…

  6. 75 FR 55836 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62849; File No. SR-NSCC-2010-07] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To... September 3, 2010. I. Introduction On July 1, 2010, National Securities Clearing Corporation (``NSCC...

  7. The Challenges of Seeking Security While Respecting Privacy

    NASA Astrophysics Data System (ADS)

    Kantor, Paul B.; Lesk, Michael E.

    Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.

  8. 7 CFR 1260.113 - Established national nonprofit industry-governed organizations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 10 2013-01-01 2013-01-01 false Established national nonprofit industry-governed... national nonprofit industry-governed organizations. Established national nonprofit industry-governed... directors representing the cattle or beef industry on a national basis; and (c) Have been active and ongoing...

  9. 7 CFR 1260.113 - Established national nonprofit industry-governed organizations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 10 2012-01-01 2012-01-01 false Established national nonprofit industry-governed... national nonprofit industry-governed organizations. Established national nonprofit industry-governed... directors representing the cattle or beef industry on a national basis; and (c) Were active and ongoing...

  10. 7 CFR 1260.113 - Established national nonprofit industry-governed organizations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 10 2014-01-01 2014-01-01 false Established national nonprofit industry-governed... national nonprofit industry-governed organizations. Established national nonprofit industry-governed... directors representing the cattle or beef industry on a national basis; and (c) Have been active and ongoing...

  11. 7 CFR 1260.113 - Established national nonprofit industry-governed organizations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Established national nonprofit industry-governed... national nonprofit industry-governed organizations. Established national nonprofit industry-governed... directors representing the cattle or beef industry on a national basis; and (c) Were active and ongoing...

  12. 7 CFR 1260.113 - Established national nonprofit industry-governed organizations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 10 2011-01-01 2011-01-01 false Established national nonprofit industry-governed... national nonprofit industry-governed organizations. Established national nonprofit industry-governed... directors representing the cattle or beef industry on a national basis; and (c) Were active and ongoing...

  13. 78 FR 61424 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-03

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70544; File No. SR-NSCC-2013-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change... September 16, 2013, National Securities Clearing Corporation (``NSCC'') filed with the Securities and...

  14. Neutron and Gamma Imaging for National Security Applications

    NASA Astrophysics Data System (ADS)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.

  15. 12 CFR 335.251 - Forms for notification of action taken by national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... national securities exchanges. 335.251 Section 335.251 Banks and Banking FEDERAL DEPOSIT INSURANCE... for notification of action taken by national securities exchanges. The applicable forms for notification of action taken by national securities exchanges are codified in subpart A of 17 CFR part 249. All...

  16. 17 CFR 249.10 - Form 1-N for notice registration as a national securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... registration as a national securities exchange. 249.10 Section 249.10 Commodity and Securities Exchanges... or Exemption of, and Notification of Action Taken by, National Securities Exchanges § 249.10 Form 1-N for notice registration as a national securities exchange. This form shall be used for notice, and...

  17. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Security Education Program Service Requirements Updates. 4:45 p.m.--Board Discussion. 5:30 p.m.--Adjourn... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the...

  18. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  19. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  20. AVIATION SECURITY: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation’s Airports

    DTIC Science & Technology

    2001-09-20

    what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.

  1. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  2. EMP Threats to US National Security: Congressional Responses

    NASA Astrophysics Data System (ADS)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  3. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture...

  4. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note, debenture...

  5. 78 FR 54305 - Joint Industry Plan; Notice of Filing of the Fifth Amendment to the National Market System Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70274; File No. 4-631] Joint Industry Plan; Notice of Filing of the Fifth Amendment to the National Market System Plan To Address Extraordinary Market Volatility by BATS Exchange, Inc., BATS Y-Exchange, Inc., Chicago Board Options Exchange, Incorporated, Chicago Stock Exchange, Inc., EDGA...

  6. Industrial Technologies Program - A Clean, Secure Energy Future via Industrial Energy Efficiency

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The Industrial Technologies Program (ITP) leads the national effort to save energy and reduce greenhouse gas emissions in the largest energy-using sector of the U.S. economy. ITP drives energy efficiency improvements and carbon dioxide reductions throughout the manufacturing supply chain, helping develop and deploy innovative technologies that transform the way industry uses energy.

  7. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  8. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less

  9. Water Security - National and Global Issues

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Campbell, A. A.; Moran, E. H.

    2010-12-01

    Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.

  10. NREL: News - New Energy Systems Enhance National Security

    Science.gov Websites

    resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy

  11. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  12. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  13. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  14. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  15. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth performance...

  16. Overview of Scientific Freedom and National Security

    NASA Astrophysics Data System (ADS)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  17. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  18. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Communications System... Telecommunications Advisory Committee (NSTAC) will hold its annual meeting on May 6, 2010. The meeting will be open... preparedness telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee...

  19. Medical countermeasures for national security: a new government role in the pharmaceuticalization of society.

    PubMed

    Elbe, Stefan; Roemer-Mahler, Anne; Long, Christopher

    2015-04-01

    How do governments contribute to the pharmaceuticalization of society? Whilst the pivotal role of industry is extensively documented, this article shows that governments too are accelerating, intensifying and opening up new trajectories of pharmaceuticalization in society. Governments are becoming more deeply invested in pharmaceuticals because their national security strategies now aspire to defend populations against health-based threats like bioterrorism and pandemics. To counter those threats, governments are acquiring and stockpiling a panoply of 'medical countermeasures' such as antivirals, next-generation vaccines, antibiotics and anti-toxins. More than that, governments are actively incentivizing the development of many new medical countermeasures--principally by marshaling the state's unique powers to introduce exceptional measures in the name of protecting national security. At least five extraordinary policy interventions have been introduced by governments with the aim of stimulating the commercial development of novel medical countermeasures: (1) allocating earmarked public funds, (2) granting comprehensive legal protections to pharmaceutical companies against injury compensation claims, (3) introducing bespoke pathways for regulatory approval, (4) instantiating extraordinary emergency use procedures allowing for the use of unapproved medicines, and (5) designing innovative logistical distribution systems for mass drug administration outside of clinical settings. Those combined efforts, the article argues, are spawning a new, government-led and quite exceptional medical countermeasure regime operating beyond the conventional boundaries of pharmaceutical development and regulation. In the first comprehensive analysis of the pharmaceuticalization dynamics at play in national security policy, this article unearths the detailed array of policy interventions through which governments too are becoming more deeply imbricated in the pharmaceuticalization of

  20. Modernizing Our Industrial Base: The National Security Challenge of Our Time

    DTIC Science & Technology

    2015-08-01

    situational awareness tools and applications, au- tonomy and robotics that we need to harness and fully develop for DoD missions . With this type of...to work for the DoD or its industrial base; rather they go to work in the commercial industry for companies such as Facebook, Google and Tesla . This...partnership with industry. The DoD continues talking to indus- try, communicating our vision for the future, to facilitate the best business decisions that

  1. 78 FR 71686 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-29

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70937; File No. SR-NSCC-2013-11] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Add a New Service to the National Securities Clearing Corporation's Obligation Warehouse (``OW...

  2. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...

  3. 17 CFR 240.19c-5 - Governing the multiple listing of options on national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of options on national securities exchanges. 240.19c-5 Section 240.19c-5 Commodity and Securities... of Exchange Members § 240.19c-5 Governing the multiple listing of options on national securities exchanges. (a) The rules of each national securities exchange that provides a trading market in standardized...

  4. Cyber Security and Resilient Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and

  5. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  6. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  7. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  8. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  9. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  10. 22 CFR 127.5 - Authority of the Defense Security Service.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ensure compliance with the Department of Defense National Industrial Security Program Operating Manual... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authority of the Defense Security Service. 127... VIOLATIONS AND PENALTIES § 127.5 Authority of the Defense Security Service. In the case of exports involving...

  11. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Other national security and emergency preparedness delegations; cross reference. 0.387 Section 0.387 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency...

  12. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch information...

  13. An Analysis of China's Fertilizer Policies: Impacts on the Industry, Food Security, and the Environment.

    PubMed

    Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia

    2013-07-01

    China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  14. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    DTIC Science & Technology

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  15. 15 CFR 730.9 - Organization of the Bureau of Industry and Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Department's organizational and administrative orders are available via Office of Management and Organization... Strategic Industries and Economic Security, and the Office of Technology Evaluation. The functions of the...

  16. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  17. Making the National Security Council Better In the Bahamas to Resolve Illegal Migration

    DTIC Science & Technology

    2015-12-01

    ABSTRACT (maximum 200 words) The Bahamas’ economy depends primarily on tourism . Unchecked crime and cross-border threats jeopardize the country’s economic... tourism , opportunistic maritime criminality, national security strategy, national insecurity, U.S.-Bahamian relations, Haitian migration, transnational...of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The Bahamas’ economy depends primarily on tourism . Unchecked

  18. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations; cross... 47 Telecommunication 1 2010-10-01 2010-10-01 false Other national security and emergency preparedness delegations; cross reference. 0.387 Section 0.387 Telecommunication FEDERAL COMMUNICATIONS...

  19. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  20. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  1. Analytical Chemistry for Homeland Defense and National Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    S.Randolph Long; Dan rock; Gary Eiceman

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  2. Afghan National Security Forces: Closing the Gap Before 2014

    DTIC Science & Technology

    2013-03-20

    To) 20-03-2013 Master of Military Studies Research Paper September 2012 - March 2013 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Afghan National...this paper , security force assistance (SFA) will be used as an umbrella term which incorporates training, advising, and mentoring. In the last ten...predominantly throughout this paper because according to the Joint Center for International Security Force Assistance, SFA “equates to those activities

  3. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... matters related to national security and emergency preparedness telecommunications policy. Agenda: The... and Emergency Preparedness Implications of a Nationwide Public Safety Broadband Network. The report...

  4. Limits of Military Power for National Security.

    ERIC Educational Resources Information Center

    Melman, Seymour

    1981-01-01

    Reviews the post World War II nuclear-military arms race and claims that it is possible to define significant limits of military power for national security. Topics discussed include public opinion regarding the arms race, constraints on military power, conventional forces, checkmating conventional strategy, and the seriousness of nuclear false…

  5. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following... dictate the use of air transportation; (3) The nature of the item to be shipped necessitates the use of air transportation in order to avoid possible damage which may be expected from other available...

  6. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Exemption for certain derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... Miscellaneous Exemptions § 240.3a12-7 Exemption for certain derivative securities traded otherwise than on a...

  7. 17 CFR 240.3a12-7 - Exemption for certain derivative securities traded otherwise than on a national securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for certain derivative securities traded otherwise than on a national securities exchange. 240.3a12-7 Section 240.3a12-7... Miscellaneous Exemptions § 240.3a12-7 Exemption for certain derivative securities traded otherwise than on a...

  8. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  9. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice the...

  10. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice the...

  11. Extreme Scale Computing to Secure the Nation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, D L; McGraw, J R; Johnson, J R

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national securitymore » requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of

  12. Economics of National Security: Unfunding Terror

    DTIC Science & Technology

    2011-07-01

    that it cost [al-Qa’ida] about $30 million per year to sustain its activities before 9/11, an amount raised almost entirely through donations .”27...connection between the two threats does imply that efforts to combat transnational criminal enterprises will have an ancillary dampening effect on terror...National Security Strategy 2010, (Washington, D.C.: The White House, May 2010), http://www.whitehouse.gov/ sites/ default /files/rss_viewer

  13. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted...

  14. Biologics industry challenges for developing diagnostic tests for the National Veterinary Stockpile.

    PubMed

    Hardham, J M; Lamichhane, C M

    2013-01-01

    Veterinary diagnostic products generated ~$3 billion US dollars in global sales in 2010. This industry is poised to undergo tremendous changes in the next decade as technological advances move diagnostic products from the traditional laboratory-based and handheld immunologic assays towards highly technical, point of care devices with increased sensitivity, specificity, and complexity. Despite these opportunities for advancing diagnostic products, the industry continues to face numerous challenges in developing diagnostic products for emerging and foreign animal diseases. Because of the need to deliver a return on the investment, research and development dollars continue to be focused on infectious diseases that have a negative impact on current domestic herd health, production systems, or companion animal health. Overcoming the administrative, legal, fiscal, and technological barriers to provide veterinary diagnostic products for the National Veterinary Stockpile will reduce the threat of natural or intentional spread of foreign diseases and increase the security of the food supply in the US.

  15. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...

  16. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    ERIC Educational Resources Information Center

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  17. 48 CFR 52.204-2 - Security Requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Agreement (DD Form 441), including the National Industrial Security Program Operating Manual (DOD 5220.22-M... architect-engineer contract, add the following paragraph (e) to the basic clause: (e) The Contractor shall...

  18. Photonics engineering: snapshot applications in healthcare, homeland security, agriculture, and industry

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun

    2015-01-01

    Throughout my experience in photonics engineering, this article shows that photonics is indeed a key technology enabler for enhancing our competitiveness. In particular, I snapshot the achievements of NECTEC research teams in implementing devices and systems suitable for healthcare, homeland security, agriculture, and industry.

  19. Utilizing Current Commercial-off-the-Shelf Facial Recognition and Public Live Video Streaming to Enhance National Security

    DTIC Science & Technology

    2014-09-01

    biometrics technologies. 14. SUBJECT TERMS Facial recognition, systems engineering, live video streaming, security cameras, national security ...national security by sharing biometric facial recognition data in real-time utilizing infrastructures currently in place. It should be noted that the...9/11),law enforcement (LE) and Intelligence community (IC)authorities responsible for protecting citizens from threats against national security

  20. National Security Education Act of 1991: Summary and Analysis. CRS Report for Congress.

    ERIC Educational Resources Information Center

    Riddle, Wayne Clifton

    This report analyzes and summarizes the National Security Education Act of 1991 (NSEA) which authorizes a new program of aid for foreign language and area studies. The report discusses the legislation's aim to increase future national security through enhanced foreign language abilities and knowledge of other countries, the NSEA's authorized…

  1. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  2. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  3. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1) Citations: 10 U.S.C. 2304(c)(6) or 41 U.S.C. 253(c)(6). (2) Full and open competition need not be provided... is permitted to limit the number of sources from which it solicits bids or proposals. (b) Application...

  4. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural.... Department of Agriculture, Forest Service, Cherokee National Forest Secure Rural Schools Resource Advisory... Schools Resource Advisory Committee (RAC) proposes projects and funding to the Secretary of Agriculture...

  5. 78 FR 28237 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-14

    ... publication, this NSTAC meeting must occur. The national security threat that Distributed Denial of Service... streamed via webcast at http://www.whitehouse.gov/live . For information on facilities or services for...

  6. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL... security? (a) An engine/equipment is exempt without a request if it will be used or owned by an agency of...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of...

  7. Analysis of Government Policies to Support Sustainable Domestic Defense Industries

    DTIC Science & Technology

    2015-06-01

    arms- industry. Syrian civil war . n.d. Retrieved June 10, 2015, from http://www.britannica.com/event/Syrian-Civil- War United Nations Commission on...perhaps the most significant variable is the government. Because governments are both buyers and suppliers of national security, government policies...are both buyers and suppliers of national security, government policies are often designed by governments to support and regulate their domestic

  8. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  9. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  10. Sandia National Laboratories proof-of-concept robotic security vehicle

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harrington, J.J.; Jones, D.P.; Klarer, P.R.

    1989-01-01

    Several years ago Sandia National Laboratories developed a prototype interior robot that could navigate autonomously inside a large complex building to air and test interior intrusion detection systems. Recently the Department of Energy Office of Safeguards and Security has supported the development of a vehicle that will perform limited security functions autonomously in a structured exterior environment. The goal of the first phase of this project was to demonstrate the feasibility of an exterior robotic vehicle for security applications by using converted interior robot technology, if applicable. An existing teleoperational test bed vehicle with remote driving controls was modified andmore » integrated with a newly developed command driving station and navigation system hardware and software to form the Robotic Security Vehicle (RSV) system. The RSV, also called the Sandia Mobile Autonomous Navigator (SANDMAN), has been successfully used to demonstrate that teleoperated security vehicles which can perform limited autonomous functions are viable and have the potential to decrease security manpower requirements and improve system capabilities. 2 refs., 3 figs.« less

  11. Homeland Security Vulnerabilities Of The US National Capital Region’s Bridges

    DTIC Science & Technology

    2016-06-10

    THE HOMELAND SECURITY VULNERABILITIES OF THE US NATIONAL CAPITAL REGION’S BRIDGES A thesis presented to the Faculty of the U.S...AUG 2015 – JUNE 2016 4. TITLE AND SUBTITLE The Homeland Security Vulnerabilities of the US National Capital Region’s Bridges 5a. CONTRACT...degradation as the rest of the United States. The ground transportation infrastructure, especially the bridges , in the NCR presents an interesting case

  12. COVERING THE SEAMS IN U.S. NATIONAL SECURITY BY APPLYING NETWORK AND TEAM ATTRIBUTES

    DTIC Science & Technology

    2017-04-06

    Today, one such weakness is the seams that exist in the system . Organizational criteria like geography , functions, and responsibilities often create...establishment by the National Security Act of 1947, the modern U.S. national security system has evolved as a result of legislation, presidential preference...and because of changes in the U.S. and international security environments. With each evolution, the system has found ways to function in dealing

  13. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less

  14. 17 CFR 240.19c-1 - Governing certain off-board agency transactions by members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity... members of national securities exchanges. The rules of each national securities exchange shall provide as...

  15. 77 FR 21123 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-09

    ... unsettled positions in classes of securities such as illiquid municipal or corporate bonds, whose volatility... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66731; File No. SR-NSCC-2012-02] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To...

  16. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7 Section 758.7 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY,...

  17. Spring 2006. Industry Study. Information Technology Industry

    DTIC Science & Technology

    2006-01-01

    unclassified c . THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 i Information Technology 2006 ABSTRACT...integration of processors, coprocessors, memory, storage, etc. into a user-programmable final product. C . Software (Apple, Oracle): These firms...able to support the U.S. national security interests. C . Manufacturing: The personal computer manufacturing industry has also changed considerably

  18. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  19. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security program...

  20. 76 FR 29019 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... SECURITIES AND EXCHANGE COMMISSION (Release No. 34-64487; File No. SR-NSCC-2011-02) Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Order Granting... Eligible Clearing Fund Securities May 13, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act...

  1. Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges

    DTIC Science & Technology

    2010-07-01

    the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity

  2. From School Militarization to School Securitization: National Security Finds Its Place in Schools

    ERIC Educational Resources Information Center

    Nguyen, Nicole

    2017-01-01

    This ethnography explores daily life at Milton High School, a US public school with its own specialized Homeland Security program. From "military grunts" serving in distant theaters of war to Transportation Security Administration (TSA) agents defending the US borderlands to National Security Administration (NSA) technicians monitoring…

  3. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, andmore » views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.« less

  4. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    DTIC Science & Technology

    2017-02-12

    group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research

  5. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Designation of senior official to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... COMMISSION Functions § 140.20 Designation of senior official to oversee Commission use of national security...

  6. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  7. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    DTIC Science & Technology

    2017-06-01

    processes. Rothkopf, David J. 2006. Running the World: The Inside Story of The National Security Council and The Architects of American Power . 1st ed...recognized Soviet aims. They aimed to gain power , spread communism, and counter the West. Eisenhower’s belief in American physical and ideological...The Architects of American Power . 1st ed. New York: Public Affairs: 322-324. 22 Burke, Honest Broker?, 341. 23 U.N. Ambassador Albright, Treasury

  8. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  9. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  10. Impacts of psychological science on national security agencies post-9/11.

    PubMed

    Brandon, Susan E

    2011-09-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of testing, human factors, perception, and the decision sciences. Although the nature of the attacks on 9/11 raised the level of perceived need for increased human-based intelligence, the impacts of psychologists on the policies and practices of national security agencies in the decade since have not increased significantly. © 2011 American Psychological Association

  11. Strategic planning for national security: Lessons from business experience. Interim report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bracken, P.

    1990-02-01

    United States defense planning is at a crossroads and it is therefore useful to review not only discrete issues, but even basic concepts of strategic planning. This Note reviews concepts used in the business world to build insights about how to view current and prospective problems, opportunities, and choices. The author draws upon the business literature for both ideas and metaphors. He observes that U.S. national security planning could profit greatly from an approach that distinguishes among core, environmental, and hedging strategies, and that considers security analogs to such business concepts as defining the business, dealing with new competitors, controllingmore » the intensity of competition, entry and exit barriers, and the need to redeploy assets and restructure the organization. He then relates these concepts to specific problems of national security interest.« less

  12. Academics and National-Security Experts Must Work Together

    ERIC Educational Resources Information Center

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  13. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  14. 2002 Industry Studies: Education

    DTIC Science & Technology

    2002-01-01

    1 EDUCATION ABSTRACT United States schools are better than ever, but they are not assuring competitive advantage . Unequal access to quality...competitive advantage , and promote national security. • Demand for education continues to grow as the US transitions from an industrial to a knowledge... international assessments, pose challenges. With human capital constituting our most critical national resource, a world-class education system is vital to

  15. National Security Implications of Transnational Economic Activity

    DTIC Science & Technology

    1993-04-01

    ABSTRACT SECURITY CLASSIFICATION rUNCLASSIFIED/UNLIMITED El SAME AS RPT. O DTIC USERS Unclassified 22a. NAME OF RESPONSIBLE INDIVIDUAL 22b. TELEPHONE...Activity This paper discusses the impact of regional trading arrangements (RTA’s), multinational corporations (MNC’s), and transnational financial activity...multinational corporation investment and taxation. o The U.S. must strengthen its national economy in order to be a world class player in transnational

  16. A brief history of Sandia's National security missions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  17. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less

  18. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ...-01] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health... the National Cybersecurity Center of Excellence (NCCoE) in the Secure Exchange of Electronic Health... accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE will bring...

  19. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  20. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...

  1. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...

  2. Components of a Course on National Security Policy.

    ERIC Educational Resources Information Center

    Quester, George H.

    1987-01-01

    Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…

  3. Advanced Approach to Information Security Management System Model for Industrial Control System

    PubMed Central

    2014-01-01

    Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS. PMID:25136659

  4. Advanced approach to information security management system model for industrial control system.

    PubMed

    Park, Sanghyun; Lee, Kyungho

    2014-01-01

    Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS.

  5. International Outreach and Coordination Strategy for the National Strategy for Maritime Security

    DTIC Science & Technology

    2005-11-01

    economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime

  6. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  7. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  8. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  9. 17 CFR 240.15a-4 - Forty-five day exemption from registration for certain members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Forty-five day exemption from registration for certain members of national securities exchanges. 240.15a-4 Section 240.15a-4 Commodity and... national securities exchanges. (a) A natural person who is a member of a national securities exchange shall...

  10. National Security and Information Technology: The New Regulatory Option?

    ERIC Educational Resources Information Center

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  11. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    PubMed

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  12. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  13. Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company)

    NASA Astrophysics Data System (ADS)

    Ali, Hatamirad; Hasan, Mehrjerdi

    Automotive industry and car production process is one of the most complex and large-scale production processes. Today, information technology (IT) and ERP systems incorporates a large portion of production processes. Without any integrated systems such as ERP, the production and supply chain processes will be tangled. The ERP systems, that are last generation of MRP systems, make produce and sale processes of these industries easier and this is the major factor of development of these industries anyhow. Today many of large-scale companies are developing and deploying the ERP systems. The ERP systems facilitate many of organization processes and make organization to increase efficiency. The security is a very important part of the ERP strategy at the organization, Security at the ERP systems, because of integrity and extensive, is more important of local and legacy systems. Disregarding of this point can play a giant role at success or failure of this kind of systems. The IRANKHODRO is the biggest automotive factory in the Middle East with an annual production over 600.000 cars. This paper presents ERP security deployment experience at the "IRANKHODRO Company". Recently, by launching ERP systems, it moved a big step toward more developments.

  14. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts

  15. Rural Development: The Industrialized Free-Enterprise Nations.

    ERIC Educational Resources Information Center

    Economic Research Service (USDA), Washington, DC.

    Most of the nations of the world have expressed concern for rural revitalization by providing a greater range of economic opportunities, social amenities, and cultural advantages. This report discussed rural development in the highly industrialized nations of the Federal Republic of Germany, Italy, Belgium, the Netherlands, France, Norway,…

  16. 75 FR 76512 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63417; File No. SR-NSCC-2010-17] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is hereby given that...

  17. EPA/ORD NATIONAL EXPOSURE RESEARCH LABORATORY MEASUREMENT SCIENCE SUPPORT FOR HOMELAND SECURITY

    EPA Science Inventory

    This product describes the National Exposure Research Laboratory research and development support for homeland security through the proposed National Exposure Measurements Center (NEMC). Key NEMC functional areas depicted in this poster are: standardized analytical method develo...

  18. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    PubMed

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  19. 77 FR 70865 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... industry standard for processing and settling mutual fund transactions. Through automated, standardized... trend in the mutual fund industry toward omnibus processing, a practice where distribution firms bundle... to Fund/SERV[supreg] Fees November 20, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange...

  20. 77 FR 70117 - Purchase of Certain Debt Securities by Business and Industrial Development Companies Relying on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-23

    ... investment grade by at least one NRSRO and securities issued by registered open-end investment companies that... Investment Company Act will also limit a BIDCO's investments in registered open-end funds to those funds that... 3235-AL02 Purchase of Certain Debt Securities by Business and Industrial Development Companies Relying...

  1. Reflective practices at the Security Council: Children and armed conflict and the three United Nations

    PubMed Central

    Bode, Ingvild

    2017-01-01

    The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586

  2. Reflective practices at the Security Council: Children and armed conflict and the three United Nations.

    PubMed

    Bode, Ingvild

    2018-06-01

    The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.

  3. 15 CFR 700.30 - Priorities and allocations in a national emergency.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Priorities and allocations in a national emergency. 700.30 Section 700.30 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY...

  4. Sandia National Laboratories: National Security Programs

    Science.gov Websites

    policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We

  5. 76 FR 39463 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64769; File No. SR-NSCC-2011-04] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder \\2...

  6. Best Practices for the Security of Radioactive Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  7. A Study on the Commercialization of Space-Based Remote Sensing in the Twenty-First Century and Its Implications to United States National Security

    DTIC Science & Technology

    2011-06-01

    Remote sensing from space provides critical data for many commercial space applications. Due to global market demand, it has undergone tremendous...commercial space imaging capability in the future, remote sensing policy makers, systems engineers, and industry analysts must be aware of the implications to United States National Security....available dissemination and accessibility. The analysis results, together with the findings from a review of commercial programs, initiatives, and remote

  8. Free Trade, A New National Security Policy for the 21st Century

    DTIC Science & Technology

    1990-03-30

    view had some validity prior to the industrial revolution as countries were basically self-sufficient. However, with the growth and spread of the...eliminated complete self-sufficiency. 3 As the Industrial Revolution expanded, communities and then regions within nations became interdependent and...prosperous national economies emerged. A significant by-product of the industrial revolution was the development and massive production of weapons that

  9. Coordinating UAV information for executing national security-oriented collaboration

    NASA Astrophysics Data System (ADS)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  10. Identifying the Enemy: Social Categorization and National Security Policy

    ERIC Educational Resources Information Center

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  11. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... dated February 14, 1984. (2) An established “need-to-know” for the matter (See Definitions, § 95.5). (3... 10 Energy 2 2013-01-01 2013-01-01 false Access to matter classified as National Security... Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...

  12. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... dated February 14, 1984. (2) An established “need-to-know” for the matter (See Definitions, § 95.5). (3... 10 Energy 2 2014-01-01 2014-01-01 false Access to matter classified as National Security... Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...

  13. 78 FR 21460 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69302; File No. SR-NSCC-2012-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To... customers, a more accurate reflection of risks in the calculation of Clearing Fund margin, however, could...

  14. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, Cathy A

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less

  15. Nevada National Security Site Environmental Report 2016, Attachment A: Site Description

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, Cathy

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current sitemore » operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less

  16. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, C.

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less

  17. 77 FR 55777 - Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... 1625-AA87 Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY AGENCY... a permanent security zone on the waters of the East River and Bronx Kill, in the vicinity of... security zone on the East River, New York; and clarify the enforcement times and locations of the security...

  18. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions, or...

  19. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3) Committees...

  20. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3) Committees...

  1. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions, or...

  2. Digital Dimension Disruption: A National Security Enterprise Response

    DTIC Science & Technology

    2017-12-21

    societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks...humans did calculations and searched for information. In the past quarter century, human use of computers has changed fundamentally , but com- mon...the nature of data is, itself, undergoing a fundamental change. The terms “bespoke data” (from the British term for cus- tom-tailored) and “by

  3. The Evolving Domestic Forum for National Security Debates

    DTIC Science & Technology

    1974-01-01

    of USAWC in March 1974, he was Director, Social Science Studies, Westinghouse Center for Advanced Studies and Analyses. He is the author of n umeIOUS...American social and cultural contex ts, which necessarily overlap the areas of politics, economics, foreign relations, and national security affairs. At...preserve its integrity if individual conscience is accorded a priority overriding all other considerations? - Which value, achievement or equality

  4. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 2 2012-10-01 2012-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  5. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 2 2014-10-01 2014-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  6. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  7. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 2 2013-10-01 2013-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  8. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 2 2011-10-01 2011-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security...

  9. 78 FR 69168 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... approve a proposed rule change of a self-regulatory organization if it finds that such proposed rule... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70848; File No. SR-NSCC-2013-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To...

  10. Illegal Immigration in the United States: Implications for Rule of Law and National Security

    DTIC Science & Technology

    2012-02-15

    AIR WAR COLLEGE AIR UNIVERSITY ILLEGAL IMMIGRATION IN THE UNITED STATES: IMPLICATIONS FOR RULE OF LAW AND NATIONAL SECURITY By Paul A...government’s failure to strictly enforce immigration laws presents national security vulnerabilities and is subversive to the rule of law . Without...the rule of law , serious social tensions will occur that impel states and localities to fill the void left by the lack of immigration enforcement. In

  11. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    DTIC Science & Technology

    2017-03-28

    connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in

  12. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  13. Human Security in the Asia-Pacific: In Australia’s National Interests?

    DTIC Science & Technology

    2011-12-16

    Australian doctrine does not clearly define instruments of national power, this research uses the U.S. military definition. In accordance with U.S. 9...military doctrine , the instruments of national power are diplomatic, informational, military, and economic.16 Australia has been a very secure...

  14. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  15. U.S. National Security and Strategy: A Selected Bibliography

    DTIC Science & Technology

    2007-10-01

    pdf Flournoy, Michele A., and Tammy S. Schultz . Shaping U.S. Ground Forces for the Future: Get- ting Expansion Right. Washington, D.C.: Center for a...Vandermolen, Thomas D. “Molecular Nanotechnology and National Security.” Air & Space Power Journal 20 (Fall 2006): 96-127. ProQuest Vego, Milan . “Searching for

  16. Ballistic Missile Defense: National Security and the High Frontier of Space.

    ERIC Educational Resources Information Center

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  17. Examining National Public Health Law to Realize the Global Health Security Agenda.

    PubMed

    Meier, Benjamin Mason; Tureski, Kara; Bockh, Emily; Carr, Derek; Ayala, Ana; Roberts, Anna; Cloud, Lindsay; Wilhelm, Nicolas; Burris, Scott

    2017-05-01

    Where the Global Health Security Agenda (GHSA) seeks to accelerate progress toward a world safe and secure from public health emergencies, the realization of GHSA 'Action Packages' will require national governments to establish necessary legal frameworks to prevent, detect, and respond to infectious disease. By analyzing the scope and content of existing national legislation in each of the GHSA Action Packages, this comparative cross-national research has developed a framework that disaggregates the legal domains necessary to meet each Action Package target. Based upon these legal domains, this study developed an assessment tool that can identify specific attributes of national legislation. This article applies this tool to assess the legal environment in twenty Sub-Saharan African countries, examining the content of laws across the GHSA Action Packages, analyzing the legal domains necessary to implement each Action Package, and highlighting specific national laws that reflect attributes of each legal domain. © The Author 2017. Published by Oxford University Press; all rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. 36 CFR 1202.90 - What NARA systems of records are exempt from release under the National Security Exemption of the...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...

  19. 36 CFR 1202.90 - What NARA systems of records are exempt from release under the National Security Exemption of the...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...

  20. 36 CFR 1202.90 - What NARA systems of records are exempt from release under the National Security Exemption of the...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...

  1. MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security

    DTIC Science & Technology

    2007-01-01

    technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region

  2. A Mature Maritime Strategy for Africa to Meet National Security Goals

    DTIC Science & Technology

    2011-06-17

    by corrupt governments, poverty, piracy, poaching in territorial waters, terrorist cells, militant youth activities, environmental violations, illegal...regions with maritime distress that are, or have the potential to impact vital U.S. national interests. Good national strategy that informs combatant and...environmental violations and many other debilitating maritime activities get conveyed ashore and directly impact the security and well-being of the

  3. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  4. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  5. Food security in South Africa: a review of national surveys.

    PubMed

    Labadarios, Demetre; McHiza, Zandile June-Rose; Steyn, Nelia Patricia; Gericke, Gerda; Maunder, Eleni Maria Winifred; Davids, Yul Derek; Parker, Whadi-ah

    2011-12-01

    To assess the status of food security--i.e., access to food, food availability and food utilization--in South Africa. A systematic search of national surveys that used the Community Childhood Hunger Identification Project (CCHIP) index to measure food security in South Africa over a period of 10 years (1999-2008) was conducted. Anthropometric data for children aged 1-9 years were used to assess food utilization, and household food inventory data were used to assess food availability. Only three national surveys had used the CCHIP index, namely, the 1999 and 2005 National Food Consumption Surveys (NFCS) and the 2008 South African Social Attitudes Survey. These surveys showed a relatively large decrease in food insecurity between 1999 and 2008. However, the consistent emerging trend indicated that in poorer households women were either feeding their children a poor diet or skipping meals so their children could eat. In terms of food access and availability, the 1999 NFCS showed that households that enjoyed food security consumed an average of 16 different food items over 24 hours, whereas poorer households spent less money on food and consumed fewer than 8 different food items. Moreover, children had low mean scores for dietary diversity (3.58; standard deviation, SD: ± 1.37) and dietary variety (5.52; SD: ± 2.54) scores. In terms of food utilization, the NFCS showed that stunting in children decreased from 21.6% in 1999 to 18% in 2005. The South African government must implement measures to improve the undesirably high level of food insecurity in poorer households.

  6. 75 FR 15479 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61762; File No. SR-NSCC-2010-02] Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Aggregate Obligations in Certain Securities Transactions Designated for Settlement on a Trade-for-Trade Basis Marc...

  7. Walk the Talk: Progress in Building a Supply Chain Security Culture

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hund, Gretchen

    Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology,more » and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.« less

  8. 78 FR 23515 - Regulated Navigation Areas, Security Zones: Dignitary Arrival/Departure and United Nations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-19

    ... security zones as RNAs. The Marine Air Terminal, United Nations, and United Nations West Channel Closure... United Nations General Assembly RNA Regulated Navigation Area UN United Nations A. Public Participation... comment, it will be considered as having been received by the Coast Guard when it is received at the...

  9. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    MedlinePlus

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  10. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ...This Request for Information (RFI) notice informs the public that the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is currently developing a National Critical Infrastructure Security and Resilience Research and Development Plan (NCISR R&D Plan) to conform to the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public comment on issues or language in the NCISR R&D Plan that need to be included. Critical infrastructure includes both cyber and physical components, systems, and networks for the sixteen established ``critical infrastructures''.

  11. Deterrence and National Security in the Face of an Amorphous Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Werne, R

    2001-01-05

    The National Security threats that we face today and, in turn, the National Security . requirements, are more diverse and complex than they were during the Cold-War from 1945-1990. During that period, and bolstered by the experiences of World Wars I and II, US National Security policy was focused on the stabilization of post WW II country boundaries and containment of the Soviet block and China. The result was the bipolar world in which the nuclear and conventional forces of the United States, the Soviet Union, and their respective allies ensured a measure of political stability through a military stalematemore » of world wide proportions. The practical result was that large scale changes in national borders were unlikely, but internal conflict within countries, and local conflicts between neighboring countries could still occur, albeit with participation from one or both of the Superpower camps. US National Security Policy was designed primarily for stabilization of the bipolar world on the military front and for competition with the Soviet Union and China on economic and political fronts. The collapse of the Soviet Union changed the global picture. The bipolar world and its military stalemate appear to be gone for the moment and the threat which was the foundation for US National Security policy has changed significantly. Some will argue that China has intentions of replacing the Soviet Union as a military superpower and thus recreate the bipolar world. Furthermore, Russia still has significant nuclear forces and has recently talked of lowering the nuclear threshold in an apparent attempt to make up for its weakened conventional forces. Clearly the threat of large scale nuclear war is much reduced, but not gone entirely. Having acknowledged the Chinese and Russian threats, what does the global picture look like today? The boundaries of most countries are secure but there are significant frictions, that have, or could lead, to armed conflict. Most of these are

  12. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... for national defense and security. (a) The exemptions allowing for the administration of lie detector... detector test by the Federal Government, in the performance of any counterintelligence function, to any... administration of any lie detector test by the Federal Government, in the performance of any intelligence or...

  13. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... for national defense and security. (a) The exemptions allowing for the administration of lie detector... detector test by the Federal Government, in the performance of any counterintelligence function, to any... administration of any lie detector test by the Federal Government, in the performance of any intelligence or...

  14. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... for national defense and security. (a) The exemptions allowing for the administration of lie detector... detector test by the Federal Government, in the performance of any counterintelligence function, to any... administration of any lie detector test by the Federal Government, in the performance of any intelligence or...

  15. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... for national defense and security. (a) The exemptions allowing for the administration of lie detector... detector test by the Federal Government, in the performance of any counterintelligence function, to any... administration of any lie detector test by the Federal Government, in the performance of any intelligence or...

  16. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... for national defense and security. (a) The exemptions allowing for the administration of lie detector... detector test by the Federal Government, in the performance of any counterintelligence function, to any... administration of any lie detector test by the Federal Government, in the performance of any intelligence or...

  17. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    DTIC Science & Technology

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  18. 77 FR 10589 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-22

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66398; File No. SR-NSCC-2012-02] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Enhance Its Margining Methodology as Applied to Municipal and Corporate Bonds February 15, 2012...

  19. Profiles of the National Industry Skills Standards Projects.

    ERIC Educational Resources Information Center

    Rahn, Mikala L., Comp.

    In an effort to develop a more uniform and comprehensive system of national skill standards, the U.S. Departments of Education and Labor have awarded grants to 22 technical committees, composed of representatives from business, labor, and education, in a variety of industries and occupations. These projects will begin proposing national standards…

  20. 36 CFR § 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? § 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3) Committees...

  1. 78 FR 40538 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69890; File No. SR-NSCC-2013-05] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To Require That All Locked-In Trade Data Submitted to It for Trade Recording Be Submitted in Real-time June 28, 2013. I. Introduction On April 30, 2013,...

  2. Nevada National Security Site Groundwater Program

    ScienceCinema

    None

    2018-01-16

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  3. Homeland Security and Capabilities-Based Planning: Improving National Preparedness

    DTIC Science & Technology

    2005-09-01

    Caudle 2004; NEMA 2004; ASTHO 2004). Their concerns emphasized proceeding with what one called a fatally flawed process following artificially... norm for a number of years, a systematic collection, evaluation, and dissemination of lessons learned and better practices has only recently picked...intergovernmental relations for homeland security. National Emergency Management Association ( NEMA ). (2004). Letter to Sue Mencer. Lexington, KY: October 29

  4. 78 FR 79028 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) By order... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71156; File No. SR-NSCC-2013-13] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change...

  5. Lawrence Livermore National Laboratory`s Computer Security Short Subjects Videos: Hidden Password, The Incident, Dangerous Games and The Mess; Computer Security Awareness Guide

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.

  6. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  7. Food security in South Africa: a review of national surveys

    PubMed Central

    Labadarios, Demetre; Steyn, Nelia Patricia; Gericke, Gerda; Maunder, Eleni Maria Winifred; Davids, Yul Derek; Parker, Whadi-ah

    2011-01-01

    Abstract Objective To assess the status of food security – i.e. access to food, food availability and food utilization – in South Africa. Methods A systematic search of national surveys that used the Community Childhood Hunger Identification Project (CCHIP) index to measure food security in South Africa over a period of 10 years (1999–2008) was conducted. Anthropometric data for children aged 1–9 years were used to assess food utilization, and household food inventory data were used to assess food availability. Findings Only three national surveys had used the CCHIP index, namely, the 1999 and 2005 National Food Consumption Surveys (NFCS) and the 2008 South African Social Attitudes Survey. These surveys showed a relatively large decrease in food insecurity between 1999 and 2008. However, the consistent emerging trend indicated that in poorer households women were either feeding their children a poor diet or skipping meals so their children could eat. In terms of food access and availability, the 1999 NFCS showed that households that enjoyed food security consumed an average of 16 different food items over 24 hours, whereas poorer households spent less money on food and consumed fewer than 8 different food items. Moreover, children had low mean scores for dietary diversity (3.58; standard deviation, SD: ± 1.37) and dietary variety (5.52; SD: ± 2.54) scores. In terms of food utilization, the NFCS showed that stunting in children decreased from 21.6% in 1999 to 18% in 2005. Conclusion The South African government must implement measures to improve the undesirably high level of food insecurity in poorer households. PMID:22271946

  8. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ... Education Program; 1101 Wilson Blvd., Suite 1210; Rosslyn, VA 22219. FOR FURTHER INFORMATION CONTACT: Dr. Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  9. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security

  10. 36 CFR § 1202.90 - What NARA systems of records are exempt from release under the National Security Exemption of the...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... are exempt from release under the National Security Exemption of the Privacy Act? § 1202.90 Section Â... from release under the National Security Exemption of the Privacy Act? (a) The Investigative Case Files... interfere with ongoing investigations and law enforcement or national security activities and impose an...

  11. Nevada National Security Site Radiation Protection Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statementsmore » that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.« less

  12. 75 FR 74117 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63368; File No. SR-NSCC-2010-15] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change Relating to Establishing an Automated Service for the Processing of Transfers, Replacements, and Exchanges of Insurance and Retirement Products...

  13. National Vulnerability Database (NVD)

    National Institute of Standards and Technology Data Gateway

    National Vulnerability Database (NVD) (Web, free access)   NVD is a comprehensive cyber security vulnerability database that integrates all publicly available U.S. Government vulnerability resources and provides references to industry resources. It is based on and synchronized with the CVE vulnerability naming standard.

  14. The future of the US Space Industrial Base

    NASA Astrophysics Data System (ADS)

    1992-11-01

    Our space industrial base has given the United States the capability to be the world's leading space-faring nation. We have exploited space to greatly advance our national security by using extraordinarily sophisticated reconnaissance space systems to guard against military surprise, and other spacecraft that support the pinpoint delivery of weapons. We have fulfilled the dreams of those visionary national leaders who enacted the first National Aeronautics and Space Act by advancing our scientific knowledge of the planet we occupy and the universe around us. And the advancements in technology engendered by the U.S. space program have had world-wide impact in fostering entire new industries. The industrial base is broad. It is not merely plant and equipment, but an entire infrastructure of skilled scientific and technical manpower backed up by superb government, private and academic facilities and institutions.

  15. 78 FR 31847 - Designation of National Security Positions in the Competitive Service, and Related Matters

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... Chapter IV OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 5 CFR Chapter IV RIN 3206-AM73 Designation of... Management; Office of the Director of National Intelligence. ACTION: Proposed rule and withdrawal of prior... National Intelligence (ODNI) are proposing to issue regulations regarding designation of national security...

  16. National Space Council Meeting

    NASA Image and Video Library

    2017-10-05

    Acting NASA Administrator Robert Lightfoot, center, along with Deputy Chief Technology Officer of the United States Michael Kratsios, left, and Director of National Intelligence Daniel Coats, right, listen to remarks by panelists during the National Space Council's first meeting, Thursday, Oct. 5, 2017 at the Smithsonian National Air and Space Museum's Steven F. Udvar-Hazy Center in Chantilly, Va. The National Space Council, chaired by Vice President Mike Pence heard testimony from representatives from civil space, commercial space, and national security space industry representatives. Photo Credit: (NASA/Joel Kowsky)

  17. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supportingmore » our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.« less

  18. Road Map for National Security: Imperative for Change The Phase III Report of the U.S. Commission on National Security/21st Century

    DTIC Science & Technology

    2001-01-31

    before the nation, and to produce organizational competence capable of addressing those problems creatively. The key to our vision is the need for...influence and critical leadership role. We offer recommendations for organizational change in five key areas: ● ensuring the security of the American...homeland; ● recapitalizing America’s strengths in science and education; ● redesigning key institutions of the Executive Branch; ● overhauling the

  19. 78 FR 16471 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...

  20. 78 FR 9751 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Designation of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68829; File No. SR-NSCC-2012-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Designation of a Longer Period for Commission Action on Proposed Rule Change To Eliminate the Offset of Its Obligations With Institutional Delivery Transactions That Settle at The...

  1. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  2. Security Implications Of Italian Nationalism

    DTIC Science & Technology

    2016-03-01

    NATO enlargement, and the ongoing immigration crisis. This thesis also examines Italy’s role in the major Euro-Atlantic security institutions and...immigration crisis. This thesis also examines Italy’s role in the major Euro- Atlantic security institutions and assesses how nationalist movements may...79 B. ITALY’S ROLE IN EU SECURITY COOPERATION ......................82 C. THE EFFECT OF EURO-ATLANTIC INSTITUTIONS ON ITALIAN

  3. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  4. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    ERIC Educational Resources Information Center

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  5. Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

    PubMed

    Huang, Jin; Kim, Youngmi; Barnidge, Ellen

    2016-11-20

    The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.

  6. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  7. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  8. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  9. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  10. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  11. Good Manufacturing Practices (GMP) / Good Laboratory Practices (GLP) Review and Applicability for Chemical Security Enhancements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Iveson, Steven W.

    Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards aremore » designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.« less

  12. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted trading...

  13. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted trading...

  14. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted trading...

  15. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted trading...

  16. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted trading...

  17. Notification: Follow-up Review of EPA’s Classification of National Security Information

    EPA Pesticide Factsheets

    Project #OPE-FY15-0057, July 20, 2015. The EPA OIG plans to begin preliminary research on the OARM actions taken to improve policies and procedures related to the classification of national security information.

  18. 77 FR 34068 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Secure Content...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Secure Content Storage Association, LLC Notice is hereby given that, on May 3, 2012, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq. (``the Act''), the Secure...

  19. Advantages and Disadvantages of the National Security Personnel System as Compared to the General Schedule Personnel System

    DTIC Science & Technology

    2005-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT Advantages and Disadvantages of the National Security...Applied Project 4. TITLE AND SUBTITLE: Advantages and Disadvantages of the National Security Personnel System as Compared to the General...compare and contrast the advantages and disadvantages of the new personnel system (NSPS) versus the General Schedule (GS) personnel system currently

  20. 76 FR 39410 - National Offshore Safety Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... energy industry; (d) One member representing enterprises specializing in offshore drilling; and, (e) One... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0539] National Offshore Safety... Coast Guard seeks applications for membership on the National Offshore Safety Advisory Committee. This...