Science.gov

Sample records for national security human

  1. Simulating human behavior for national security human interactions.

    SciTech Connect

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  2. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  3. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  4. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  5. National Security Series, User's Guide.

    ERIC Educational Resources Information Center

    Jones, Saundra L.

    This document is a guide to using the "National Security Series", which consists of seven books designed for teaching about national security issues in high school social studies classes. Five of the series books contain lessons designed to supplement specific courses by relating national security issues to U.S. government, U.S. history,…

  6. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  7. Congress and national security

    NASA Astrophysics Data System (ADS)

    Sharfman, Peter

    1983-10-01

    The starting point for any serious discussion of Congress role in matters of national security is the recognition that Congress does some kinds of things very effectively, but generally fails when it tries to do other kinds of things. Consequently, a citizen with a desire to shape national policy may find Congress to be the focal point of national decision, or largely irrelevant, depending almost, entirely on the nature of the issue. As a political scientist, I am tempted to relate this to the provisions of the U.S. Constitution and to the differing structures of the Executive and Legislative institutions; since I am addressing an audience of physicists, I will confine my explanation of causes to the observation that you cannot easily push on a string.

  8. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field. PMID:15301184

  9. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  10. 75 FR 705 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... Executive Order 13526--Classified National Security Information Memorandum of December 29, 2009--Implementation of the Executive Order ``Classified National Security Information'' Order of December 29, 2009... ] Executive Order 13526 of December 29, 2009 Classified National Security Information This order prescribes...

  11. Secure Distributed Human Computation

    NASA Astrophysics Data System (ADS)

    Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart

    In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.

  12. National Security Management Correspondence Course.

    ERIC Educational Resources Information Center

    Industrial Coll. of the Armed Forces (DOD), Washington, DC.

    A course of study on the fundamental aspects of the areas of knowledge which are essential to effective management of national security is presented. The course presents the substance of the Industrial College resident curriculum adapted to the correspondence method of study. The subject matter is designed to impart knowledge and understanding of…

  13. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  14. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  15. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  16. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  17. Gender Aspects of Human Security

    ERIC Educational Resources Information Center

    Moussa, Ghada

    2008-01-01

    The chapter deals with the gender dimensions in human security through focusing on the relationship between gender and human security, first manifested in international declarations and conventions, and subsequently evolving in world women conferences. It aims at analysing the various gender aspects in its relation to different human security…

  18. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  19. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GRANTS AND COOPERATIVE AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not...

  20. Nuclear Physics for National Security

    NASA Astrophysics Data System (ADS)

    Mayo, Douglass

    2006-10-01

    Being a nuclear physicist and working at a national laboratory provides many opportunities to ply one's skills in support of national security and the benefit of all mankind. Over the last 40 years, Los Alamos National Laboratory has been pioneering the field of Domestic and International Safeguards through the research and development of instrumentation and systems used to monitor nuclear materials and nuclear facilities. With a projected increase in the use of nuclear energy, effective systems must be designed to reduce the possibility that nuclear materials may be diverted for used in weapons. The recent focus has been the many applications of radiation detection used for safeguarding nuclear material and to support Homeland Security. There is a critical need for trained nuclear scientists who can understand and overcome measurement complexities, combinations of multiple sensor inputs, data reduction, and automated analysis for these applications. This talk will focus on the opportunities and experiences afforded physicists in the support of national security, beyond the weapons program and travel to interesting locales.

  1. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  2. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  3. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  4. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  5. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  6. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  7. Scientific communication and national security

    NASA Astrophysics Data System (ADS)

    Richman, Barbara T.

    The need for scientists to disseminate widely their research results often conflicts with the United States government's requirement that certain information be withheld from foreign adversaries. The Reagan administration has stepped up its campaign to clamp down on the transfer of scientific and technological information from the United States that might be used by foreign nations to gain military advantages. As a result, some scientists have become alarmed that they will be forced to forfeit essential rights to communicate freely. In light of the growing concern from both sides a panel of 18 senior policymakers and researchers has been assembled by the National Academy of Sciences to examine the relationship between university research and national security. The panel held its first meeting on April 16 and 17; an interim report is expected in September, followed by a final report in March 1983.

  8. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... . SUPPLEMENTARY INFORMATION: The National Health Security Strategy (2009) can be found at: http://www.phe.gov... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security...

  9. Next Generation National Security Leaders

    SciTech Connect

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  10. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  11. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  12. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  13. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  14. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  15. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... Department of Homeland Security's U.S. Immigration and Customs Enforcement (ICE) facility located at 500...

  16. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Security, 245 Murray Lane, Mail Stop 0615, Arlington, VA 20598-0615. Instructions: All submissions...

  17. 76 FR 52672 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Directorate, Department of Homeland Security, 245 Murray Lane, Mail Stop 0615, Arlington, VA...

  18. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... Management Branch, Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615....

  19. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail Stop 3016B, Arlington,...

  20. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Security, 245 Murray Lane, Mail Stop 0615, Arlington, VA 20598-0615. Instructions: All submissions...

  1. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be...), Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615; Fax:...

  2. Water Security - National and Global Issues

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Campbell, A. A.; Moran, E. H.

    2010-12-01

    Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.

  3. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS EPIDEMIOLOGY AND OTHER HEALTH STUDIES FINANCIAL ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health...

  4. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS EPIDEMIOLOGY AND OTHER HEALTH STUDIES FINANCIAL ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health...

  5. National Security Technology Incubator Business Plan

    SciTech Connect

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  6. National Security Technology Incubator Evaluation Process

    SciTech Connect

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  7. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  8. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  9. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee AGENCY: National Communications System, DHS. ACTION: Notice of Open Advisory Committee meeting. SUMMARY... Communications System (Government Industry Planning and Management Branch), Department of Homeland Security,...

  11. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will receive an update on progress made to date by the...

  12. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...) telecommunications policy. During the meeting, NSTAC members will receive feedback from the Department of...

  13. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  14. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  15. Counterproliferation: A National Security Priority. Speech text

    SciTech Connect

    Kaminski, P.G.

    1995-10-27

    Stemming the proliferation of weapons of mass destruction and their missile delivery systems - counterproliferation - is universally recognized as a significant national priority by all elements of the U.S. national security community. President Clinton, for example, emphasized in the National Security Strategy released in February of this year, that a key part of our strategy is to seek to stem the proliferation of such weapons and to develop an effective capability to deal with these threats. In May 1995, the National Military Strategy was issued by our nation`s senior military leader, General Shalikashvili, who described the threat of weapons of mass destruction as one of the ...four principal dangers which our military, in combination with other elements of national power must address.

  16. Cognitive models applied to human effectiveness in national security environments (ergonomics of augmented cognition system design and application).

    SciTech Connect

    Ntuen, Celestine; Winchester, Woodrow III

    2004-06-01

    In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisition from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.

  17. National Security Technology Incubation Strategic Plan

    SciTech Connect

    2007-01-01

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to

  18. National Security Technology Incubator Action Plan

    SciTech Connect

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  19. Nevada National Security Site Environmental Report 2013

    SciTech Connect

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  20. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  1. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  2. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  3. Sensor Science for National Security

    SciTech Connect

    Hardy, Jim E; Warmack, Robert J Bruce; Lavrik, Nickolay V; Datskos, Panos G; BRITTONJr., CHARLES L.

    2009-01-01

    Oak Ridge National Laboratory (ORNL) has over 200 professionals engaged in measurement science research and development. This work includes transduction techniques, advanced microelectronics, signal and image processing, modeling and simulation, material synthesis and characterization, and system engineering issues for packaging, miniaturization, integration, and communications (e.g. wireless networks). ORNL is applying this expertise to detecting, preventing, and reversing the proliferation of weapons of mass destruction, deploying integrated systems for incident awareness, detection, and response, providing technology for detection of explosives, and delivering enhanced protection and new capabilities to first responders and warfighters. Sensor systems include micro- and nano-arrays, optical, chemical, and biological technologies. Electronics research has focused on low-power, low-cost, and wireless functionality. Signal processing advancements encompass data flow with conversion to information and knowledge for intelligent decision making.

  4. National security in the 1990s

    SciTech Connect

    Rich, M.D.

    1991-02-01

    The Rand Paper contains the text of a speech given at a luncheon co-sponsored by Town Hall of California and the Los Angeles Council of Engineers and Scientists on national security affairs in the 1990s. The speech was given at the Biltmore Hotel, Los Angeles, California, on February 19, 1991.

  5. New rules revamp national security prosecutions

    NASA Astrophysics Data System (ADS)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying – rather than leaving decisions to local prosecutors.

  6. Alternate Energy for National Security.

    NASA Astrophysics Data System (ADS)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  7. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of meeting. SUMMARY: The National Maritime Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting...

  8. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of meeting. SUMMARY: The National Maritime Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting...

  9. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... regulation 41 CFR 101-6, announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security...

  10. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  11. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  12. National Center for Nuclear Security - NCNS

    SciTech Connect

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  13. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2015-01-09

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  14. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  15. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... met. The Office Director, Office of Information Security, Office of Security Infrastructure, Bureau...

  16. Nevada National Security Site Environmental Report 2011

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  17. Child rights, right to water and sanitation, and human security.

    PubMed

    Pink, Ross

    2012-01-01

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. PMID:22773100

  18. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  19. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  20. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  1. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false National Security Division. 0.72 Section 0.72 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE National Security Division § 0.72 National Security Division. The following functions are assigned to and shall be conducted, handled, or supervised by...

  2. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  3. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  4. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  5. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  6. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  7. 14 CFR § 1260.31 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate...

  8. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  9. 76 FR 50719 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... 92-463, notice is hereby given of a forthcoming meeting of the National Security Education Board. The... requirements established by the David L. Boren National Security Education Act, Title VII of Public Law...

  10. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  11. 77 FR 49439 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose ] of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102-183, as...

  12. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 39 Postal Service 1 2014-07-01 2014-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as...

  13. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as...

  14. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 39 Postal Service 1 2013-07-01 2013-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as...

  15. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 39 Postal Service 1 2012-07-01 2012-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as...

  16. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... further information. (4) The statement “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 89... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this...

  17. Computer Security: The Human Element.

    ERIC Educational Resources Information Center

    Guynes, Carl S.; Vanacek, Michael T.

    1981-01-01

    The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)

  18. Data security on the national fusion grid

    SciTech Connect

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  19. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  20. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  1. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  2. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  3. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  4. Nevada National Security Site Environmental Report 2012

    SciTech Connect

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  5. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  6. Overview of Scientific Freedom and National Security

    NASA Astrophysics Data System (ADS)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  7. Y-12 National Security Complex Water Assessment

    SciTech Connect

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  8. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ..., 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or presentations... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: United States Coast... published a notice of meeting for the National Maritime Security Advisory Committee (NMSAC) in the...

  9. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ... notice regarding our public dockets in the January 17, 2008 issue of the Federal Register (73 FR 3316... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  10. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-27

    ... the January 17, 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  11. 77 FR 1710 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of January 9, 2012, a notice announcing a National Maritime Security... Web site 13 calendar days prior to the meeting. Additionally, all known interested parties were...

  12. 77 FR 26024 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of May 1, 2012, a notice announcing a National Maritime Security Advisory... Federal Register Web site 13 calendar days prior to the meeting. Additionally, all known...

  13. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... our public dockets in the January 17, 2008 issue of the Federal Register (73 FR 3316) Docket: Any... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  14. 76 FR 66313 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... Act notice regarding our public dockets in the January 17, 2008 issue of the Federal Register (73 FR... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  15. 75 FR 77783 - Designation of National Security Positions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ...--Security Requirements for Government Employment (April 27, 1953), 18 FR 2489, 3 CFR 1949-1953 Comp., p. 936...; ] OFFICE OF PERSONNEL MANAGEMENT 5 CFR Part 732 RIN 3206-AM27 Designation of National Security Positions... Management (OPM) is proposing to revise its regulation regarding designation of national security...

  16. Extreme Scale Computing to Secure the Nation

    SciTech Connect

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear

  17. Environmental degradation: Implications for national security. Study report

    SciTech Connect

    Schlegel, J.D.

    1990-03-30

    As the United States prepares to move into the 21st century, the threat of armed conflict between the United States and the Soviet Union appears to have receded into the realm of the improbable. At the same time, however, a new and perhaps more ominous threat is emerging to challenge the security of nations: environmental degradation. Burgeoning world populations and the quest for industrial/economic development have begun seriously to erode the capability of the earth's environment to sustain itself. The phenomena of global warming, ozone depletion, deforestation, desertification and many forms of pollution are destroying the delicate life support systems upon which humanity depends for its very survival. National security, therefore, must be redefined and in this instance must be viewed in a context outside the traditional concept of military capability. This paper examines economic, social, political and military implications of environmental degradation as threats to the security of the United States and to world security. The paper concludes that a new level of international cooperation and technological innovation are required to reduce the negative impact of environmental degradation. An appendix provides additional data on specific forms of environmental degradation.

  18. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  19. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  20. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  1. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  2. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1),...

  3. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  4. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  5. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  6. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... information, please write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National...

  7. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  8. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  9. Nevada National Security Site Groundwater Program

    ScienceCinema

    None

    2014-10-28

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  10. Nevada National Security Site Radiological Control Manual

    SciTech Connect

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  11. Nevada National Security Site Radiation Protection Program

    SciTech Connect

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  12. Input from Key Stakeholders in the National Security Technology Incubator

    SciTech Connect

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  13. Status of Educational Efforts in National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  14. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  15. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... SECURITY National Protection and Programs Directorate; President's National Security Telecommunications... Telecommunications Advisory Committee (NSTAC) will meet on Wednesday, January 19, 2011, via a conference call. DATES... and emergency preparedness telecommunications policy. The new NSTAC Chair, James Crowe,...

  16. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... rule FR Doc. E9-28517, beginning on page 62531 in the issue of November 30, 2009, make the following... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA....

  17. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION AGENCY... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security......

  18. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION AGENCY... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security......

  19. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a)...

  20. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a)...

  1. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a)...

  2. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A...

  3. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a)...

  4. 76 FR 28960 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... amended. DATES: June 22, 2011 from 8 a.m.-2:30 p.m. ADDRESSES: National Security Education Program, 1101... Analyst, National Security Education Program, 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209... Education Program, 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209-2248; or e-mailed to...

  5. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... Order, Classified National Security Information, 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR part 2001... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3 CFR... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security...

  6. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  7. 77 FR 9214 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act,...

  8. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 89.908 Section 89.908 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM NEW AND IN-USE NONROAD COMPRESSION-IGNITION ENGINES Exemption Provisions § 89.908 National security exemption....

  9. Nevada National Security Site Environmental Report 2010

    SciTech Connect

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  10. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... National Security Information, which was published in the Federal Register on January 5, 2010 (75 FR 707... implementation of the Executive Order, issued a final rule (75 FR 37254; June 28, 2010) amending 32 CFR parts... Executive Order 13526, Classified National Security Information (75 FR 707; January 5, 2010) (the...

  11. International migration: security concerns and human rights standards.

    PubMed

    Crépeau, François; Nakache, Delphine; Atak, Idil

    2007-09-01

    Over the last two decades, the reinforcement of security-related migration policies has resulted in the perception of the foreigner, and especially the irregular migrant, as a category outside the circle of legality. The rights of foreigners in host countries have deteriorated due to the connection made between immigration and criminality. Restrictions imposed upon irregular migrants' basic political and civil rights have been accompanied by major obstacles to their access to economic and social rights, including the right to health. The events of 9/11 further contributed to this trend, which contradicts the basic premises of the human rights paradigm. Recent policy developments and ongoing international cooperation implementing systematic interception and interdiction mechanisms have led to the securitization of migration. The preventive and deterrent measures reinforce the security paradigm. By contrast, various national and international actors have been successful in defending irregular migrants' rights. At the domestic level, the involvement of the judiciary and civil society enhances the rights-based approach to foreigners. The role of judges is vital in holding policy-makers accountable for respecting the high national standards of human rights protection. This article elaborates on the dichotomy between the state's legitimate interest to ensure national security, and its domestic and international obligations to protect human rights for all, including irregular migrants. It focuses on the changing relationship between migration and security, on the one hand, and between state and individual, on the other hand. It affirms the necessity to recognize the pre-eminence of fundamental rights upon security concerns. PMID:17938150

  12. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts. PMID:24896305

  13. A deeper look at climate change and national security.

    SciTech Connect

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  14. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security... concerning national security information. (b) The Assistant Attorney General for National Security shall... 28 Judicial Administration 1 2013-07-01 2013-07-01 false National Security...

  15. Human factors of first-line security

    NASA Astrophysics Data System (ADS)

    van Renesse, Rudolf L.

    1998-04-01

    Human inspection of security features is based on a cycle of actions: the development and execution of a strategy, and the observation and evaluation of results. These actions aim at establishing the state of the object: genuine or fake. These actions require knowledge, which is either in the head (memorized) or in the world (provided by the object). It is argued that knowledge in the world is most suitable for adequate inspection of first line security features. In contrast, knowledge in the head cannot be relied on, unless standardization is consistently implemented. From the action cycle five pertinent questions ensue. How easily can the user: (1) determine and understand the function of the device? (2) tell what actions are possible? (3) execute the actions? (4) observe the results? (5) compare the observed results with the expected results? A set of generic design rules is derived, involving the function of the device, the execution of a strategy, and the evaluation of the result. A number of first line security features is evaluated from this human factors point of view. These comprise substrate embedded features (watermark, windowed thread), features added to the ink (iridescent pigment), printed features (intaglio, small lettering, see-throughs, latent images), and post-printed features (iridescent foils). It is concluded that many current security features do not meet basic ergonomic design rules. However, iridescent optically variable devices tend to have a potential to meet these requirements.

  16. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... national security of the imports of the article under investigation, the Department shall consider the quantity of the article in question or other circumstances related to its import. With regard for the... projected national defense requirements; (3) The existing and anticipated availabilities of human...

  17. External Service Providers to the National Security Technology Incubator

    SciTech Connect

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  18. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  20. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  1. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... committee meeting, to discuss National Industrial Security Program policy matters. DATES: The meeting...

  2. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be...

  3. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee..., Forest Service, Cherokee National Forest Secure Rural Schools Resource Advisory Committee will meet as indicated below. DATES: The Cherokee National Forest Secure Rural Schools Resource Advisory...

  4. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  5. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  6. The Curious National Security Pendulum: Openness and/or Censorship.

    ERIC Educational Resources Information Center

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  7. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    ERIC Educational Resources Information Center

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that describe: (1)…

  8. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. ... Section 1042.635 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  9. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... NATIONAL SECURITY UNDER 40 CFR 94.908.”. ... Section 94.908 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth...

  10. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. ... Section 1042.635 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  11. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... NATIONAL SECURITY UNDER 40 CFR 94.908.”. ... Section 94.908 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth...

  12. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... NATIONAL SECURITY UNDER 40 CFR 94.908.”. ... Section 94.908 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth...

  13. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. ... Section 1042.635 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  14. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. ... Section 1042.635 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  15. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. ... Section 1042.635 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  16. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... NATIONAL SECURITY UNDER 40 CFR 94.908.”. ... Section 94.908 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth...

  17. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NATIONAL SECURITY UNDER 40 CFR 94.908.”. ... Section 94.908 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... armor, permanently affixed weaponry, specialized electronic warfare systems, unique stealth...

  18. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  19. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... national security information at USPS Headquarters and to provide functional direction to the field. (v) In... USPS Headquarters and provide functional direction to each Regional Records Control Officer; (vii)...

  20. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  1. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI). PMID:23506403

  2. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National.... (c) Security procedures. Position sensitivity/risk assessments must be conducted on all functions... and Contracting Officer's Representative should determine the level of sensitivity or risk with...

  3. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National.... (c) Security Procedures. Position sensitivity/risk assessments must be conducted on all functions... and Contracting Officer's Representative should determine the level of sensitivity or risk with...

  4. Classified Component Disposal at the Nevada National Security Site

    SciTech Connect

    Poling, J.; Arnold, P.; Saad, M.; DiSanza, F.; Cabble, K.

    2012-11-05

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012.

  5. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  6. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  7. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  8. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  9. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  10. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  11. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  12. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  13. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect

    Wallace, Terry

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  14. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  15. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  16. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  17. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  18. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 18 2011-07-01 2011-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and Motor Vehicle Engines § 85.1708 National...

  19. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  20. Risk assessment of climate systems for national security.

    SciTech Connect

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  1. Marketing Plan for the National Security Technology Incubator

    SciTech Connect

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  2. A National Climate Change Adaptation Network for Protecting Water Security

    NASA Astrophysics Data System (ADS)

    Weaver, A.; Sauchyn, D.; Byrne, J. M.

    2009-12-01

    Water security and resource-dependent community-survival are being increasingly challenged as a consequence of climate change, and it is urgent that we plan now for the security of our water supplies which support our lives and livelihoods. However, the range of impacts of climate change on water availability, and the consequent environmental and human adaptations that are required, is so complex and serious that it will take the combined work of natural, health and social scientists working with industries and communities to solve them. Networks are needed that will identify crucial water issues under climate change at a range of scales in order to provide regionally-sensitive, solutions-oriented research and adaptation. We suggest national and supra-national water availability and community sustainability issues must be addressed by multidisciplinary research and adaptation networks. The work must be driven by a bottom-up research paradigm — science in the service of community and governance. We suggest that interdisciplinary teams of researchers, in partnership with community decision makers and local industries, are the best means to develop solutions as communities attempt to address future water demands, protect their homes from infrastructure damage, and meet their food, drinking water, and other essential resource requirements. The intention is to cover: the impact of climate change on Canadian natural resources, both marine and terrestrial; issues of long-term sustainability and resilience in human communities and the environments in which they are embedded; the making and moving of knowledge, be that between members of Indigenous and non-Indigenous communities, researchers of different disciplines, communities, industry, policymakers and the academy and the crucial involvement of the various orders of government in the response to water problems, under conditions of heightened uncertainty. Such an adaptation network must include a national

  3. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... ] Industrial Security Program policy matters. Dated: February 23, 2012. Mary Ann Hadyka, Committee...

  4. Neutron Detection Alternatives to 3He for National Security Applications

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

    2010-11-21

    One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

  5. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... issued on November 1, 2005 (70 FR 66116). The NSPS law was subsequently amended by section 1106 of Public... amendments resulted in revised DOD/OPM regulations, which were issued on September 26, 2008 (73 FR 56344) and January 16, 2009 (74 FR 2757). Section 1113 of the National Defense Authorization Act for Fiscal Year...

  6. The Intersection of National Security and Climate Change

    SciTech Connect

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  7. AIDS and international security in the United Nations System.

    PubMed

    Rushton, Simon

    2010-11-01

    Two assumptions underpin much of the literature that has examined the links between HIV/AIDS and security: (1) that HIV/AIDS is now firmly established as an international security issue; and (2) that Resolution 1308, adopted by the UN Security Council in July 2000, was the decisive moment in the securitization process. This article questions both of those assumptions. It argues that even within the Security Council, HIV/AIDS' status as a bona fide threat to international peace and security is not entirely secure. Despite the fact that the Resolution was adopted unanimously, there is considerable doubt over the extent to which the Council members were persuaded that HIV/AIDS is genuinely a threat to international peace and security. Furthermore, the Council's subsequent actions suggest a retreat from the issue. The article moves on to examine statements made in and by some of the other key UN System bodies grappling with HIV/AIDS. Focusing in particular on the General Assembly, the Economic and Social Council and UNAIDS, it is argued that the international security framing of HIV/AIDS has not generally achieved a great deal of traction within these bodies. Alternative framings, in particular international development and human rights, occur far more frequently. This raises issues for our understanding of both securitization theory and the global governance of HIV/AIDS. PMID:20961950

  8. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  9. Nevada National Security Site Environmental Report 2011 Summary

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  10. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  11. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  12. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  13. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  14. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  15. Energy supply interruptions and national security.

    PubMed

    Alm, A L

    1981-03-27

    Vulnerability to oil supply interruptions poses serious threats to the U.S. economy and the life-style of its citizens. The Iranian cutbacks in 1979 resulted in price increases of 120 percent in 1 year and gasoline lines across the country. Creation and use of ample public and private stocks could moderate price increases after another interruption and prevent disruption of supplies. Use of the marketplace to allocate shortages, coupled with rebates to cushion blows to the economy and hardship to individuals, would be eminently more efficient than government allocation programs. International cooperation, through coordination of stock buildup and withdrawal, could mitigate the damage from oil disruptions among all the Western nations. PMID:17731165

  16. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY... made for the following committee meeting. To discuss National Industrial Security Program...

  17. Components of a Course on National Security Policy.

    ERIC Educational Resources Information Center

    Quester, George H.

    1987-01-01

    Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…

  18. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  19. Identifying the Enemy: Social Categorization and National Security Policy

    ERIC Educational Resources Information Center

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  20. Academics and National-Security Experts Must Work Together

    ERIC Educational Resources Information Center

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  1. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... Order, Classified National Security Information,'' 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR Part...@nara.gov . ] SUPPLEMENTARY INFORMATION: On July 8, 2011, NARA published a proposed rule (76 FR 40296... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3...

  2. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  3. National Security and Information Technology: The New Regulatory Option?

    ERIC Educational Resources Information Center

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  4. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    ERIC Educational Resources Information Center

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  5. Recent Advances in Infrasound Science for National Security Applications

    NASA Astrophysics Data System (ADS)

    Arrowsmith, S.; Blom, P. S.; Marcillo, O. E.; Whitaker, R. W.

    2014-12-01

    Infrasound is sound below the frequency-threshold of human hearing, covering the frequency range from 0.01 - 20 Hz. Infrasound science studies the generation, propagation, measurement, and analysis of infrasound. Sources of infrasound include a wide variety of energetic natural and manmade phenomena that include chemical and nuclear explosions, rockets and missiles, and aircraft. The dominant factors influencing the propagation of infrasound are the spatial and temporal variations in temperature, wind speed, and wind direction. In recent years, Infrasound Science has experienced a renaissance due to the installation of an international monitoring system of 60 infrasound arrays for monitoring the Comprehensive Nuclear Test Ban Treaty, and to the demonstrated value of regional infrasound networks for both scientific and applied purposes. Furthermore, in the past decade, significant advances have been made on using measurements of infrasound to invert for these properties of the atmosphere at altitudes where alternative measurement techniques are extremely costly. This presentation provides a review of recent advances in infrasound science as relevant to National Security applications.

  6. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National...

  7. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July...

  8. 76 FR 62433 - Delegation of Authority to the Office of Disaster Management and National Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... URBAN DEVELOPMENT Delegation of Authority to the Office of Disaster Management and National Security...: Laura L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and... disaster management and national security; and to ensure that HUD's security and disaster...

  9. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.907 Notice of intent to introduce restricted data or national security... be impracticable for it to avoid the introduction of Restricted Data or National Security...

  10. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  11. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  12. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  13. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data or other National Security...

  14. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  15. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  16. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data or other National Security...

  17. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.907 Notice of intent to introduce restricted data or national security... be impracticable for it to avoid the introduction of Restricted Data or National Security...

  18. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    SciTech Connect

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  19. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National... Critical-Sensitive positions with Top Secret access, Critical-Sensitive positions with Secret access, and Non-Critical Sensitive positions with Secret or Confidential access, the following forms are...

  20. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  1. Coordinating UAV information for executing national security-oriented collaboration

    NASA Astrophysics Data System (ADS)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  2. 75 FR 71171 - Social Security Disability Program Demonstration Project: Benefit Offset National Demonstration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-22

    ... From the Federal Register Online via the Government Publishing Office ] SOCIAL SECURITY ADMINISTRATION Social Security Disability Program Demonstration Project: Benefit Offset National Demonstration (BOND) AGENCY: Social Security Administration. ACTION: Notice. SUMMARY: We are announcing the...

  3. United States national security policy making and Vietnam

    SciTech Connect

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to ground combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.

  4. Improved safeguards and security of a national resource

    SciTech Connect

    Zack, N.R.; Hunteman, W.J.; Rinard, P.M.; Metzler, J.F.; Jaeger, C.D.

    1994-07-01

    Initiatives by the President and the Secretary of Energy to reduce the quantity of nuclear materials in the nation`s strategic reserve are increasing the quantity of materials to be held in long-term storage until a final disposition option is imposed. These excess materials will be available for third-party inspection and verification to provide assurance that declared materials are not being diverted for weapons production. These protection systems must be capable of detecting unauthorized attempts to gain access to or control of the materials and information. Facility designs can incorporate new concepts and techniques that will minimize impact on operations and significantly reduce lifetime operational and infrastructure costs from safeguards and security requirements. The safeguards and security systems will be coupled with other facility systems such as safety, emergency preparedness, and process control to enhance public, worker, and environmental protection; protect nuclear materials, related information, and technology; and mitigate or prevent accidents and sabotage involving the nuclear materials. This paper will discuss the application of proven, state-of-the-art safeguards, physical security, computer/information security, and materials assay systems that can be combined to provide a cost-effective, efficient means for monitoring and protecting these materials.

  5. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level. PMID:25076773

  6. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  7. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  8. A brief history of Sandia's National security missions.

    SciTech Connect

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  9. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ....m. ADDRESSES: The meeting will be held at the National Security Education Program; 1101 Wilson Blvd..., National Security Education Program, 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209-2248;...

  10. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  11. Protecting National Security Information: An Overview of Federal Policy and Practice: A Symposium.

    ERIC Educational Resources Information Center

    Relyea, Harold C.; And Others

    1984-01-01

    A series of eight articles explores the impact of national security powers on government information policy and practice. Topics discussed include: the Freedom of Information Act; recommended standards for security classification; federal legislation dealing with national security; and national controls on scientific communication. (CLB)

  12. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false Criteria for determining effects of imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a)...

  13. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    ERIC Educational Resources Information Center

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  14. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  15. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  16. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or National Security Information in accordance with the applicable provisions of laws of the United States...

  17. Oil market power and United States national security.

    PubMed

    Stern, Roger

    2006-01-31

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt(2004) collections by Persian Gulf states approximately USD $132-178 x 10(9). We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  18. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  19. Public perspectives on nuclear security. US national security surveys, 1993--1997

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  20. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. PMID:22841592

  1. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  2. Rivers in the Anthropocene: Mapping Human Water Security

    NASA Astrophysics Data System (ADS)

    Vorosmarty, C. J.; Green, P.

    2014-12-01

    Fresh water underpins countless benefits to society and is pivotal to the success of the food and energy sectors, industry and commerce, and the expanding urban domain. It provides essential cultural, recreational, and aesthetic values and also plays a critical role in the maintenance of ecosystem services and biodiversity. Recent analyses of water systems across the planet, summarized using high resolution, geospatial indicator maps of rivers, demonstrate that a wide array of stressors combine to produce a pattern of worldwide threat to much of the freshwater resource base that sustains human water supply and aquatic biodiversity. A pervasive, globally-significant pattern of management is evident in the contemporary setting, through which impairment accumulates as a function of wealth, but is then remedied by costly, after-the-fact technological investments. This strategy of treating symptoms while leaving unabated the underlying causes is practiced widely across rich countries, but it strands poor nations and much of the world's aquatic lifeforms at high levels of vulnerability. The seeds of such an approach to water management are hardly new and are evident throughout human history. This talk will explore the implications of these global realities and will focus on the role of 21st century engineering as in both contributing to the growing water crisis and stimulating innovation for more effective stewardship of our water resource systems. It will also present a first global synthesis of the geography of freshwater provisioning source areas, evaluating jointly the quantity and condition of freshwater produced from these areas, and the downstream populations served by these resources. A geospatial indicator is derived, the freshwater provisioning index for humans (FPIh), which constitutes an objective measure of the state of the resource base and its role in supporting human water security.

  3. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  4. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  5. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  6. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter,...

  7. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00...

  8. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00...

  9. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on July 17, 2013 from 10:00...

  10. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00...

  11. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... National Security Information'' Memorandum for the Heads of Executive Departments and Agencies Today I have signed an executive order entitled, ``Classified National Security Information'' (the ``order''), which... Director of the Information Security Oversight Office (ISOO) a copy of the department or agency...

  12. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... of the Secretary National Security Education Board; Notice of Federal Advisory Committee Meeting... meeting of the National Security Education Board will take place. DATES: Monday, September 23, 2013, from... Security Education Board about its mission and functions. Written statements may be submitted at any...

  13. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a...

  14. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a...

  15. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted...

  16. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security Information § 2.903 Protection of restricted data and national security information. Nothing in... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security information. 2.903 Section 2.903 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND...

  17. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a...

  18. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted...

  19. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security Information § 2.903 Protection of restricted data and national security information. Nothing in... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security information. 2.903 Section 2.903 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND...

  20. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted...

  1. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    SciTech Connect

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  2. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    SciTech Connect

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  3. Toward modeling regionally specific human security using GIS: case study Cambodia.

    PubMed

    Owen, Taylor; Slaymaker, Olav

    2005-08-01

    A new methodology for measuring human security is presented. The three stages of the methodology are: i) threat assessment, ii) data collection and organization, and iii) data visualization and analysis, using Geographic Information Systems. Results from a Cambodia case study are highlighted. The United Nations Development Program's notion of human security, which gives equal weight to economic, health, food, political, personal, and environmental factors, is used. Country-specific threats in each category are determined, and local, spatially referenced data are collected. In this paper, poverty, dengue fever, and tuberculosis are used as examples of the analytic process. Regions of Cambodia exposed to all three of these threats ("hot spots") are located, and spatial correlation between poverty, dengue fever, and tuberculosis is calculated. The methodology i) advances a broad concept of human security, ii) will potentially assist policy and decision makers, and iii) identifies research questions that cannot be resolved using single-sector analysis. PMID:16201215

  4. Ares V: Game Changer for National Security Launch

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil; Morris, Bruce

    2009-01-01

    NASA is designing the Ares V cargo launch vehicle to vastly expand exploration of the Moon begun in the Apollo program and enable the exploration of Mars and beyond. As the largest launcher in history, Ares V also represents a national asset offering unprecedented opportunities for new science, national security, and commercial missions of unmatched size and scope. The Ares V is the heavy-lift component of NASA's dual-launch architecture that will replace the current space shuttle fleet, complete the International Space Station, and establish a permanent human presence on the Moon as a stepping-stone to destinations beyond. During extensive independent and internal architecture and vehicle trade studies as part of the Exploration Systems Architecture Study (ESAS), NASA selected the Ares I crew launch vehicle and the Ares V to support future exploration. The smaller Ares I will launch the Orion crew exploration vehicle with four to six astronauts into orbit. The Ares V is designed to carry the Altair lunar lander into orbit, rendezvous with Orion, and send the mated spacecraft toward lunar orbit. The Ares V will be the largest and most powerful launch vehicle in history, providing unprecedented payload mass and volume to establish a permanent lunar outpost and explore significantly more of the lunar surface than was done during the Apollo missions. The Ares V consists of a Core Stage, two Reusable Solid Rocket Boosters (RSRBs), Earth Departure Stage (EDS), and a payload shroud. For lunar missions, the shroud would cover the Lunar Surface Access Module (LSAM). The Ares V Core Stage is 33 feet in diameter and 212 feet in length, making it the largest rocket stage ever built. It is the same diameter as the Saturn V first stage, the S-IC. However, its length is about the same as the combined length of the Saturn V first and second stages. The Core Stage uses a cluster of five Pratt & Whitney Rocketdyne RS-68B rocket engines, each supplying about 700,000 pounds of thrust

  5. 75 FR 10542 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... Exchange Act Release No. 61415 (January 25, 2010), 75 FR 4896. II. Description NSCC's the Envelope... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving...

  6. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  7. A Novel Approach to Training on Human Errors Underlying Security Incidents

    SciTech Connect

    Greitzer, Frank L.; Pond, Daniel J.

    2005-09-14

    Abstract Human errors and their safety- or security- consequences often result from unsuitable systems- and personnel- characteristics. Only by identifying the conditions that make errors more likely can we develop effective strategies to eliminate errors and their adverse impacts. The US Department of Energy (DOE) initiated a program to determine if system-induced human errors could also be contributing factors to security incidents. As a foundation for this work, the Enhanced Security Through Human Error Reduction (ESTHER) program at Los Alamos National Laboratory (LANL) produced a contributing factors data set and systems categorization for security related incidents attributed to human error. This material supports the development and delivery of training for security incident inquiry officials. While LANL’s initial work focused on classroom training, a collaborative effort between LANL and Pacific Northwest National Laboratory (PNNL) has focused on delivering an interactive web-based training application that provides instruction on and practice in employing ESTHER principles. The ESTHER e-Learning application uses cognitive-based instructional design principles to engage the learner in interactive, realistic, problem-centered activity implemented within a guided-discovery framework. Through this novel approach to computer-based instruction, the DOE will enhance the ability of its inquiry officials to meet their performance and reporting responsibilities. Ultimately, it is hoped, this program will lead to areduction in the number of security incidents across the DOE complex. This paper reviews the human error background for this research program and describes the guided-discovery computer-based training approach.

  8. Swords into plowshares: Military geology and national security projects

    SciTech Connect

    Neal, J.T.

    1994-12-31

    Military geology and national security projects are often comparable, achieving their rai-son d`etre in support of national goals, military operations, and/or systems-all for vital national interests. The application of Geoscience to these ends, especially engineering geology, has occurred from pole to pole and included every conceivable environment and natural condition. In the conduct of such projects, the Geosciences have advanced, and vice versa. Desert trafficability, most notably regarding playa surfaces, is both temporary and variable and not a persistent condition as some early authors believed. Playas in Australia, Iran, and the US show that saline efflorescence is removed following surface water dissolution and subsequent deflation, resulting in very hard crusts. Magadiite, a hydrous sodium silicate and possible precursor of bedded chert, was first discovered in North America at Alkali Lake, OR, during a military project. Pleistocene Lake Trinity, a small and mostly buried evaporate basin in the northern Jornada del Muerto, NM, was discovered during exploratory drilling in support of a military test program.

  9. Magnetic imaging: a new tool for UK national nuclear security.

    PubMed

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  10. Magnetic Imaging: a New Tool for UK National Nuclear Security

    PubMed Central

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  11. Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries

    NASA Astrophysics Data System (ADS)

    Mitchell, Chris J.

    This paper explores ways in which Human Interactive Proofs (HIPs), i.e. problems which are easy for humans to solve but are intractable for computers, can be used to improve the security of human-machine interactions. The particular focus of this paper is the case where these interactions take place via an untrusted intermediary device, and where the use of HIPs can be used to establish a secure channel between the human and target machine. A number of application scenarios of this general type are considered, and in each case the possible use of HIPs to improve interaction security is explored.

  12. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    SciTech Connect

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  13. Adaptive optics center of excellence for national security

    NASA Astrophysics Data System (ADS)

    Agrawal, Brij

    2014-06-01

    This paper provides an overview of research at the Adaptive Optics Center of Excellence for national security (AOCoE) at the Naval Postgraduate School (NPS). The Center was established in 2011 with the sponsorship of the Office of Naval Research, National Reconnaissance Office, and Air Force research Laboratory. Research is in two areas: Segmented Mirror telescope (SMT) for imaging satellites and High Energy Laser Beam Control. SMT consists of a 3 meter diameter telescope with six segments and each segment has actuators for surface control and segment alignment. SMT research areas include developing improved techniques for surface control and segment alignment, and reduction in segment vibration by using tuned mass dampers. Research is also performed in adding a deformable mirror into the SMT optical path to correct for residual beam aberration not corrected by the primary mirror actuators. For high energy laser beam control the research areas are acquisition, tracking, and pointing, optical beam jitter control, and application of adaptive optics for correcting beam aberration due to air turbulence. The current focus is on adaptive optics for deep turbulence.

  14. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  15. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  16. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  17. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  18. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  19. Health and human security in West Papua.

    PubMed

    Rees, Susan J; van de Pas, Remco; Silove, Derrick; Kareth, Moses

    Recent publications have highlighted the impact of human rights violations, poverty and extraction of natural resources on the health status of the indigenous people of West Papua. However, the Australian medical literature has so far remained silent on this issue. Long-standing allegations of violence being perpetrated against Papuan civil society are supported by accounts given by West Papuan refugees involved in an Australian-based study. Health data collected by Médecins du Monde and other sources provide an insight into the poor health and lack of health care in the province, with high rates of infant mortality and morbidity, maternal mortality, and HIV/AIDS. Extraction of natural resources is causing major disruptions to the traditional livelihoods of indigenous Papuans, as a result of environmental degradation, mass displacement and an influx of migrant workers. Australian health professionals are urged to assist in remediating this dire situation, in keeping with our tradition of contributing to the health care of societies in our region. PMID:19061459

  20. National Security Science and Technology Initiative: Air Cargo Screening

    SciTech Connect

    Bingham, Philip R; White, Tim; Cespedes, Ernesto; Bowerman, Biays; Bush, John

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive

  1. Scenario-Based Training on Human Errors Contributing to Security Incidents

    SciTech Connect

    Greitzer, Frank L.; Pond, Daniel J.; Jannotta, Marjorie

    2004-12-06

    Error assessment studies reveal that ''human errors'' are often the consequence of unsuitable environmental factors, ineffective systems, inappropriate task conditions, and individual actions or failures to act. The US Department of Energy (DOE) initiated a program to determine if system-induced human errors could also be contributing factors to security incidents. As the seminal basis for this work, the Enhanced Security Through Human Error Reduction (ESTHER) program at Los Alamos National Laboratory (LANL) produced a contributing factors data set and systems categorization for security related incidents attributed to human error. This material supports the development and delivery of training for security incident inquiry officials. While LANL's initial work focused on classroom training, a collaborative effort between LANL and Pacific Northwest National Laboratory (PNNL) has focused on delivering interactive e-Learning training applications based on ESTHER principles. Through training, inquiry officials will understand and be capable of applying the underlying human error control concepts to new or novel situations. Their performance requires a high degree of analysis and judgment to accomplish the associated cognitive and procedural tasks. To meet this requirement, we employed cognitive principles of instructional design to engage the learner in interactive, realistic, problem-centered activity; we constructed scenarios within a guided-discovery framework; and we utilized learner-centered developmental sequences leading to field application. To enhance the relevance and realism of the training experience, we employed 3-D modeling technologies in constructing interactive scenarios. This paper describes the application of cognitive learning principles, use of varied media, and the implementation challenges in developing a technology-rich, interactive security incident training program that includes Web-based training.

  2. 75 FR 15479 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-29

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Aggregate Obligations in Certain Securities Transactions Designated for Settlement on...

  3. 75 FR 16214 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Expand the Eligibility of Securities Processed Through the ID Net Service March 25,...

  4. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    .... SUMMARY: On May 11, 2012 (77 FR 27739), Department of Defense announced a meeting of the National Security... and National Security Education Office, 1101 Wilson Boulevard, Suite 1210, Arlington, VA 22209... Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Arlington, Virginia 22209-2248; (703)...

  5. American History and National Security: Supplementary Lessons for High School Courses.

    ERIC Educational Resources Information Center

    Patrick, John J., Ed.; And Others

    Effective citizen participation implies the acquisition of skills and knowledge necessary for discussing and deciding national security issues. This book was developed to provide teachers with resources to design and strengthen national security education. The 30 self-contained lessons supplement and enrich current textbook treatment of national…

  6. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... provide the target of a surveillance or collection activity with the disclosure accounting records... the interests of national security, it is necessary to retain this information to aid in establishing... activity and compromise national security. For example, a target could, once made aware that...

  7. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... provide the target of a surveillance or collection activity with the disclosure accounting records... the interests of national security, it is necessary to retain this information to aid in establishing... activity and compromise national security. For example, a target could, once made aware that...

  8. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... provide the target of a surveillance or collection activity with the disclosure accounting records... the interests of national security, it is necessary to retain this information to aid in establishing... activity and compromise national security. For example, a target could, once made aware that...

  9. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE OF MATERIAL OR INFORMATION Exemption of Records Systems Under the Privacy Act § 16.74 Exemption of National Security...

  10. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  11. 3 CFR 13549 - Executive Order 13549 of August 18, 2010. Classified National Security Information Program for...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 3 The President 1 2011-01-01 2011-01-01 false Executive Order 13549 of August 18, 2010. Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities 13549 Order 13549 Presidential Documents Executive Orders Executive Order 13549 of August 18, 2010 EO 13549 Classified National Security Information...

  12. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon

    PubMed Central

    2014-01-01

    Background Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. Methods In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. Results While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. Conclusions These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women. PMID:24829613

  13. Health as human security in the occupied Palestinian territory.

    PubMed

    Batniji, Rajaie; Rabaia, Yoke; Nguyen-Gillham, Viet; Giacaman, Rita; Sarraj, Eyad; Punamaki, Raija-Leena; Saab, Hana; Boyce, Will

    2009-03-28

    We describe the threats to survival, development, and wellbeing in the occupied Palestinian territory using human security as a framework. Palestinian security has deteriorated rapidly since 2000. More than 6000 Palestinians have been killed by the Israeli military, with more than 1300 killed in the Gaza Strip during 22 days of aerial and ground attacks ending in January, 2009. Israeli destruction and control of infrastructure has severely restricted fuel supplies and access to water and sanitation. Palestinians are tortured in prisons and humiliated at Israeli checkpoints. The separation wall and the checkpoints prevent access to work, family, sites of worship, and health-care facilities. Poverty rates have risen sharply, and almost half of Palestinians are dependent on food aid. Social cohesion, which has kept Palestinian society intact, including the health-care system, is now strained. More than US$9 billion in international aid have not promoted development because Palestinians do not have basic security. International efforts focused on prevention of modifiable causes of insecurity, reinvigoration of international norms, support of Palestinian social resilience and institutions that protect them from threats, and a political solution are needed to improve human security in the occupied Palestinian territory. PMID:19268352

  14. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  15. National Human Genome Research Institute

    MedlinePlus

    ... for Patient Care Education All About the Human Genome Project Fact Sheets Genetic Education Resources for Teachers ... Education Kit Online Genetics Education Resources Smithsonian NHGRI Genome Exhibition Talking Glossary: English Talking Glossary: Español Issues ...

  16. The National Response Plan: a new framework for homeland security, public health, and bioterrorism response.

    PubMed

    Kamoie, Brian

    2005-01-01

    This Article provides a detailed overview of the new National Response Plan (NRP) with a focus on its applicability to bioterrorism and other public health emergencies. The Article highlights critical policy and legal issues left unresolved by the NRP, and offers recommendations for the resolution of those issues. The author concludes that, although the NRP is not perfect, it represents a major advance in domestic incident management and provides regular opportunities for review and revision as we learn how to best coordinate the national response to major incidents. A close working relationship between the Departments of Health and Human Services and Homeland Security should enable a unified response to bioterrorism and other public health emergencies in support of state and local efforts. PMID:16270671

  17. The science of human security: a response from political science.

    PubMed

    Roberts, David

    2008-01-01

    The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality. PMID:18456988

  18. 76 FR 18552 - Seeking Public Comment on Two Draft Chapters of the National Health Security Strategy Biennial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ...To help the Nation achieve national health security and to implement the first quadrennial National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America (2009) the U.S. Government has drafted a NHSS Biennial Implementation Plan (BIP). This document is......

  19. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... and/or National Security Information § 2.913 Review of Restricted Data or other National Security... review the record and shall direct that any Restricted Data or other National Security Information be... 10 Energy 1 2013-01-01 2013-01-01 false Review of Restricted Data or other National...

  20. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and/or National Security Information § 2.913 Review of Restricted Data or other National Security... review the record and shall direct that any Restricted Data or other National Security Information be... 10 Energy 1 2014-01-01 2014-01-01 false Review of Restricted Data or other National...

  1. Humanizing The CEDA National Tournament.

    ERIC Educational Resources Information Center

    Collier, Linda M.

    A survey of the participants explored the competing interests involved at a national debate tournament, including: (1) how the desire to maximize competitive prowess trades off against socialization among students; (2) how increasing the number of elimination rounds for reasons of judge equalization adds another round to an already crowded…

  2. Nevada National Security Site Industrial Sites Project Closeout - 12498

    SciTech Connect

    Cabble, Kevin; Krauss, Mark; Matthews, Pat

    2012-07-01

    The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office is responsible for environmental restoration (ER) at the Nevada National Security Site (NNSS). This includes remediation at Industrial Sites where past nuclear testing activities and activities that supported nuclear testing may have or are known to have resulted in the release of contaminants into the environment. Industrial Sites at the NNSS have included nuclear facilities that supported the nuclear rocket/missile development programs, gas stations, landfills, spill sites, ordnance sites, and numerous other waste disposal and release sites. The NNSS Industrial Sites activities neared completion at the end of fiscal year 2011 while other activities required under the Federal Facility Agreement and Consent Order (FFACO) and part of the same NNSS ER Project are forecasted to extend to 2027 or beyond. With the majority of Industrial Sites corrective action units (CAUs) completed (more than 250 CAUs and over 1,800 corrective action sites), it was determined that an activity closeout process should be implemented to ensure that the work completed over the past 15 years is well documented in a comprehensive and concise summary. While the process used to close each individual CAU is described in approved documents, no single document describes in summary fashion the work completed to close the many individual Industrial Sites. The activity closeout process will be used to develop an Industrial Sites closeout document that describes these years of work. This document will summarize the number of Industrial Sites closed under the FFACO and provide general descriptions of projects, contaminants removed, and sites closed in place with corresponding Use Restrictions. Other pertinent information related to Industrial Sites work such as the project history, closure decisions, historical declarations, remediation strategies, and final CAU status will be included in the closeout

  3. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    .... Accordingly, this portion of the meeting will be closed to the public. (2) Global Supply Chain Security... Supply Chain Security Initiative. The Committee will receive an update and provide further guidance....gov . Follow the instructions for submitting comments. Mail: Docket Management Facility (M-30),...

  4. Management of Security Services in Higher Education. National Report.

    ERIC Educational Resources Information Center

    Higher Education Funding Council for Wales, Cardiff.

    This report, the seventh in a series from the Value for Money Steering Group, identifies the key management issues for governors, senior managers, and heads of security services at institutions of higher education in the United Kingdom in developing and reviewing security services to ensure that they are effective and provide value for money.…

  5. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document... Alternate Designated Federal Officer, Department of Homeland Security, telephone (703) 235-5469. Correction In the Federal Register of May 14, 2013, in FR Doc. 2013-11324, on page 28238, in the first...

  6. National Nuclear Security Administration Knowledge Base Core Table Schema Document

    SciTech Connect

    CARR,DORTHE B.

    2002-09-01

    The National Nuclear Security Administration is creating a Knowledge Base to store technical information to support the United States nuclear explosion monitoring mission. This document defines the core database tables that are used in the Knowledge Base. The purpose of this document is to present the ORACLE database tables in the NNSA Knowledge Base that on modifications to the CSS3.0 Database Schema developed in 1990. (Anderson et al., 1990). These modifications include additional columns to the affiliation table, an increase in the internal ORACLE format from 8 integers to 9 integers for thirteen IDs, and new primary and unique key definitions for six tables. It is intended to be used as a reference by researchers inside and outside of NNSA/DOE as they compile information to submit to the NNSA Knowledge Base. These ''core'' tables are separated into two groups. The Primary tables are dynamic and consist of information that can be used in automatic and interactive processing (e.g. arrivals, locations). The Lookup tables change infrequently and are used for auxiliary information used by the processing. In general, the information stored in the core tables consists of: arrivals; events, origins, associations of arrivals; magnitude information; station information (networks, site descriptions, instrument responses); pointers to waveform data; and comments pertaining to the information. This document is divided into four sections, the first being this introduction. Section two defines the sixteen tables that make up the core tables of the NNSA Knowledge Base database. Both internal (ORACLE) and external formats for the attributes are defined, along with a short description of each attribute. In addition, the primary, unique and foreign keys are defined. Section three of the document shows the relationships between the different tables by using entity-relationship diagrams. The last section, defines the columns or attributes of the various tables. Information that is

  7. United Nations Conference on the Human Environment.

    ERIC Educational Resources Information Center

    United Nations General Assembly, New York, NY.

    Compiled in this document are several reports emanating from the United Nations Conference on the Human Environment, Stockholm, June 5-16, 1972. Included are (1) Provisional Agenda, (2) Annotations to the Provisional Agenda, (3) Provisional Rules of Procedure, (4) Draft Declaration on the Human Environment, (5) Planning and Management of Human…

  8. National Human Adipose Tissue Survey (Nhats)

    EPA Science Inventory

    Background:

    The U.S. Environmental Protection Agency (EPA)'s National Human Monitoring Program (NHMP), established by the U.S. Public Health Service in 1967, used an exposure-based approach to assess human exposure to toxic substances. Its primary component was the Natio...

  9. Y-12 National Security Complex's Sustainable Recovery and Transformation - 12420

    SciTech Connect

    Jackson, Jan; Widman, Jeannette

    2012-07-01

    American Recovery and Reinvestment Act (ARRA) funds were used at the Y-12 National Security Complex (Y-12) to remove legacy materials from large contaminated excess facilities in order to prepare the facilities for demolition, demolish five excess buildings, and clean up sources of environmental contamination. The legacy materials and buildings presented many challenges and the potential hazards included depleted uranium and other radiological contaminants, lead, polychlorinated biphenyls, Freon, mold, mildew, asbestos, beryllium and mercury. Y-12 project teams have integrated sustainable waste management practices into each of the seven ARRA projects. The ARRA clean up efforts have resulted in the reduction of potential environmental, health, and safety risks posed by the excess facilities and sources of environmental contamination. Y-12's ARRA project teams focused on completing the activities in a sustainable, timely and safe manner. The site utilized a systematic material disposition evaluation process to ensure that materials were not automatically dis-positioned as waste. ARRA projects have recycled or reused over 1.3 million pounds of materials while preventing over 3 million vehicle miles traveled for waste disposal. Y-12 ARRA projects have worked over 2 million safe work hours without a lost time injury. The site has already begun to beneficially reuse land cleared by ARRA project activities to support sustainable transformation efforts. The Y-12 ARRA project activities have demonstrated that large complex projects can be completed sustainably and safely while maintaining an aggressive schedule. Through careful planning and execution, ARRA projects at the site have sustainably reduced the potential environmental, health, and safety risks posed to site employees and the community by the excess facilities and sources of environmental contamination. Y-12's systematic material disposition process ensured that materials were not automatically assumed to be

  10. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    SciTech Connect

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  11. Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security

    NASA Astrophysics Data System (ADS)

    Kuloğlu, Gökhan; Gül, Zakir; Erçetin, Şefika Şule

    In today's rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.

  12. 17 CFR 240.19c-1 - Governing certain off-board agency transactions by members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules...

  13. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... Information (75 FR 707; January 5, 2010), before derivatively classifying information and at least once every... standardize the frequency of required security education training for employees of NRC licensees possessing... uniformity in the frequency of licensee security education and training programs and enhances the...

  14. The Evolving Risk of Climate Change and National Security: People not Polar Bears

    NASA Astrophysics Data System (ADS)

    Titley, D.

    2014-12-01

    This talk will provide a general overview of climate change and discuss why this is a national security issue. Climate change is about people, about water, and about change itself. Understanding the rate of climate change, relative to the abilities of both humans and ecosystems to adapt is critical. I will briefly describe the multiple, independent lines of evidence that the climate is changing, and that the primary cause of this change is a change in atmospheric composition caused by the burning of fossil fuels. I will cover the history of climate change as seen within the U.S. Department of Defense and U.S. Navy, how this challenge is being addressed from budgetary, policy, and political angles, and what are the greatest challenges to national security that arise from climate change and in particular, the associated changes in the Arctic. I will conclude with an assessment of future challenges and opportunities regarding climate change, from science, policy, and political perspectives, and why we know enough to take significant action now, even if we don't know every detail about the future. In addition, this talk will address how to effectively talk about climate change through the use of analogies, plain, non-jargon English, and even a little humor.

  15. EMP Threats to US National Security: Congressional Responses

    NASA Astrophysics Data System (ADS)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  16. National Security Agency Data Collection Review Act of 2014

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. A review of physical security robotics at Sandia National Laboratories

    SciTech Connect

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capable of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.

  18. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  19. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  20. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  1. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  2. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice...

  3. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is...

  4. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is...

  5. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION AGENCY... Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the obligation of all parties in a proceeding...

  6. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... national security information. (a) The Executive Director is hereby designated to oversee the Commission's program to ensure the safeguarding of national security information received by the Commission from...

  7. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a)...

  8. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a)...

  9. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION AGENCY... Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the obligation of all parties in a proceeding...

  10. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is...

  11. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice...

  12. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a)...

  13. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A party who intends to...

  14. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... National Security Information be expunged from the record where such expunction would not prejudice...

  15. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A party who intends to...

  16. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS EQUIPMENT HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment...

  17. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS EQUIPMENT HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment...

  18. National Summit on Campus Public Safety. Strategies for Colleges and Universities in a Homeland Security Environment

    ERIC Educational Resources Information Center

    US Department of Justice, 2005

    2005-01-01

    The aftermath of September 11, 2001 prompted the reexamination of the nation's defenses and vulnerabilities in light of new realities. Every sector of society, particularly those who protect the well being of communities, required change. Safety and security operations on the nation's college and university campuses are no exception. The nation's…

  19. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national defense. (3) The requirement of growth of such industries and such supplies and services including... requirements. (5) The economic welfare of the Nation as it is related to our national security, including the impact of foreign competition on the economic welfare of individual domestic industries. In...

  20. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... the national defense; (4) The growth requirements of domestic industries to meet national defense... assure such growth; and (5) Any other relevant factors. (b) In recognition of the close relation between... economic welfare of any domestic industry essential to our national security; (2) The displacement of...

  1. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the national defense; (4) The growth requirements of domestic industries to meet national defense... assure such growth; and (5) Any other relevant factors. (b) In recognition of the close relation between... economic welfare of any domestic industry essential to our national security; (2) The displacement of...

  2. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the strength of our national economy and the capacity of the United States to meet national security... relevant factors that are causing or will cause a weakening of our national economy. ... requirements and the supplies and services including the investment, exploration and development necessary...

  3. 76 FR 72741 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-25

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Amend Rules Relating to the Creation of a Service To Provide Post-Trade Information November 18, 2011. Pursuant to Section...

  4. 77 FR 528 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Order Granting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-05

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; The National Securities Clearing Corporation; Order Granting Approval of a Proposed Rule Change To Amend Rules Relating To the Creation of a Service To Provide Post-Trade Information December 29, 2011....

  5. 78 FR 69168 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... FR 61424 (Oct. 3, 2013) (SR-NSCC-2013-10). II. Description The proposed rule change consists of... NSCC Important Notice. \\4\\ See Securities Exchange Act Release No. 66068 (Dec. 29, 2011), 77 FR 528... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving...

  6. 78 FR 79028 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of... finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) By...

  7. 78 FR 3960 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-17

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Advance Notice To Eliminate the Offset of Its Obligations With Institutional Delivery Transactions That Settle at The Depository Trust Company for...

  8. The Concept of "National Security" and Its Effect on Information Transfer

    ERIC Educational Resources Information Center

    Klempner, I. M.

    1973-01-01

    Examined is the evolving definition and interpretation of national security as it is applied to the control of security-classified documents and as manifested by Federal employee attitudes toward dissemination of nonsecurity classified documents. The role of the special librarian or information scientist in the transfer process is also examined.…

  9. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau of Industry and Security... of U.S. industrial base sectors deemed critical to U.S. national security. The information gathered... market segments in order to maintain a strong U.S. industrial base. II. Method of Collection...

  10. 75 FR 4896 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Eliminate Guarantee of Payment in Connection With the Envelope Settlement Service January 25, 2010. Pursuant to Section...

  11. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... emphasized in other United States study abroad programs, such as countries in which few United States students are studying and countries which are of importance to the national security interests of...

  12. Ballistic Missile Defense: National Security and the High Frontier of Space.

    ERIC Educational Resources Information Center

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  13. Potential Emissions of Tritium in Air from Wells on the Nevada National Security Site

    SciTech Connect

    Warren, R.

    2012-10-08

    This slide-show discusses the Nevada National Security Site (NNSS) and tritium in the groundwater. It describes the wells and boreholes and potential airflow from these sources. Monitoring of selected wells is discussed and preliminary results are presented.

  14. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  15. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    MedlinePlus

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  16. Post-Closure Inspection Letter Report for Corrective Action Units on the Nevada National Security Site

    SciTech Connect

    NSTec Environmental Restoration

    2011-05-26

    This letter serves as the post-closure inspection letter report for corrective action units on the Nevada National Security Site for calendar year 2011. Copies of completed inspection checklists are included in this report.

  17. Domestic Fuel for Enhancing National Security Act of 2011

    THOMAS, 112th Congress

    Sen. Murray, Patty [D-WA

    2011-05-25

    05/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S3345) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  19. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... Advisory Committee Meeting; correction. SUMMARY: The Department of Homeland Security published a document.... Correction In the Federal Register of April 25, 2012, in FR Doc 2012-9979, on page 24728, in the third column... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF...

  20. The environmental dimension of national security: A test of systems analysis methods

    NASA Astrophysics Data System (ADS)

    Porfiriev, Boris N.

    1992-11-01

    The systems approach permits us to analyze national security as a cluster of interconnected elements, in which the environmental dimension appears to be the most important one. The environmental problem is divided into two main aspects: environmental security per se and the impact of environment on the overall status of a nation's security. It is argued here that the quality of life and health serve as both the main objective and the principal criterion of environmental security in a social system. Indices of these two factors are used in this article as indicators of the state of this type of security. They confirm that vast areas of Russia, the Ukraine, and Central Asia (especially the Aral Sea region) should be considered as presenting a substantial risk to local people and even producing global impacts on both natural and man-made systems. Environmental factors that destabilize national security are also divided into two groups: those that impact social systems directly and negatively (mainly natural disasters) and technological and sociopolitical agents that cause indirect impacts, in both war and peace time, as well as in the civil and military sectors of the economy. Developments in the former Soviet Union (the Commonwealth of Independent States) are used as an illustration of the consequences that such impacts may have on the status of national security.

  1. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    SciTech Connect

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  2. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    SciTech Connect

    S. Bragg-Sitton; J. Bess; J. Werner

    2011-09-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  3. United States Responses to Japanese Wartime Inhuman Experimentation after World War II: National Security and Wartime Exigency

    PubMed Central

    Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul

    2015-01-01

    In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743

  4. 32 CFR 156.5 - National security positions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... are set forth in E.O. 12968, as amended; E.O. 10865, 32 CFR parts 154-155; ICD 704; and DoD Regulation... security criteria and adjudicative standards are described in E.O. 12968, as amended; 32 CFR parts 147, 154... determinations in accordance with the procedures set forth in E.O. 12968, as amended; parts 154 and 155 of 32...

  5. Towards a policy for human security: psychosocial contributions.

    PubMed

    Tullio, Francesco

    2007-01-01

    Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW). PMID:17987980

  6. Religious Conflicts and Education in Nigeria: Implications for National Security

    ERIC Educational Resources Information Center

    Ushe, Ushe Mike

    2015-01-01

    The persistent religious conflicts and insecurity in Nigeria has given meaningful Nigerians a cause for deep concern in recent times. Many of them wonder why religion which used to be the cohesive factor and core of national unity, peaceful co-existence and national development has become a tool for political manipulation, violence, destruction of…

  7. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    SciTech Connect

    Scott A. Wade; Kathryn S. Knapp; Cathy A. Wills

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  8. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    SciTech Connect

    Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.

    2013-07-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  9. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security...

  10. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security...

  11. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... safeguarding of national security information received by the Commission from other agencies, to chair a... suggestions and complaints with respect to the Commission administration of its information security...

  12. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... that the Secretary of Defense and the Director of National Intelligence each support research to assist... Security and Counterterrorism The Director of National Drug Control Policy The Director, Office of Science... measurable progress toward greater openness and transparency, I hereby direct the following actions....

  13. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ... cybersecurity in securing physical assets. \\2\\ EO 13636 can be found at: http://www.gpo.gov/fdsys/pkg/FR-2013-02...) Research and Development (R&D) Plan Outline and Specific Questions Regarding the Content AGENCY: National... contribute highly relevant content for consideration in the development the National Critical...

  14. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  15. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    ERIC Educational Resources Information Center

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  16. Lawrence Livermore National Security Cost Model Functional Management Assessment

    SciTech Connect

    Tevis, J; Hirahara, J; Thomas, B; Mendez, M

    2008-06-12

    is to make it easier to analyze the true cost of overhead so the costs can be effectively managed. For the current year, the overall the goal of keeping the total cost of an FTE to FY07 levels. This approach reflects the past practice of managing to rates rather than focusing on costs, although streamlined with the more simplified rate structure. Given all the challenges being faced with the contract transition, this was a reasonable interim tactic for dealing with the known cost increases such as fees and taxes. Nonetheless, in order to take full advantage of the opportunities that exist for making sound decisions for further reducing the rates themselves, the Laboratory needs to implement an ongoing and disciplined approach to understanding and managing overhead cost. ISSUE 2: The NIF has a significantly different rate structure than other Laboratory work. Because of its significant size and unique organizational structure as a major construction project, the National Ignition Facility (NIF) has indirect charges that vary from the norm. These variations were reviewed and approved by and disclosed to the NNSA in the Laboratory's past annual Disclosure Statements. In mid-FY 09, NIF will begin transition from a construction line item to an operational center. The reallocation of costs when this occurs could significantly impact the Laboratory's rates and rate structure planning for that transition from a cost- and rate- impact standpoint should begin soon. ISSUE 3: The new rate model must be finalized shortly in order to implement the model beginning in FY 09. As noted in Issue No.1, a Working Group has developed a simplified rate structure for the Lab to use for FY09. The Working Group has evaluated the cost impacts of the simplified rate structure at the major program level and identified a disparate impact in the Safeguards and Security area where a substantial increase in overhead cost allocation may need to be mitigated. The simplified rate structure will need to

  17. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  18. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... for Cybersecurity and Communications, an update on the Cloud Computing Subcommittee from Mr. Mark McLaughlin, Chair of the Cloud Computing Subcommittee, and an update on the National Public Safety...

  19. National Incorporation of Global Human Rights: Worldwide Expansion of National Human Rights Institutions, 1966-2004

    ERIC Educational Resources Information Center

    Koo, Jeong-Woo; Ramirez, Francisco O.

    2009-01-01

    Using an event history framework we analyze the adoption rate of national human rights institutions. Neo-realist perspective predicts adoption rates to be positively influenced by favorable national profiles that lower the costs and make it more reasonable to establish these institutions. From a world polity perspective adoption rates will be…

  20. [Street food in the national agenda of food and nutrition security: an essay for sanitary qualification in Brazil].

    PubMed

    Bezerra, Aída Couto Dinucci; Mancuso, Ana Maria Cervato; Heitz, Sarah Jeanne Jorge

    2014-05-01

    In 2014, the World Cup will be staged in Brazil. Is Brazil able to ensure safe street food is on offer? This paper seeks to elicit reflection on some problems relating to the sale of street food, thereby contributing to highlight this theme in the food security agenda in Brazil. The scope of this study is exclusively street food. Care is taken not to reduce the broader concepts of food security and the importance of sanitary and hygienic handling is stressed as one of the core components of food and nutrition security. In this context the following aspects are discussed: the credibility of the official data on insanitary outbreaks related to street food; street food security compared to that in other eating environments; and the training of people to modify inadequate food handling practices. Thus, in the discussion about problems in the street food market it is essential to improve the quantity and quality of the training of food handlers in order to implement food and nutrition security as promoting the human right to adequate food and ensure that the topic is urgently included on the national calendar of public health debates. PMID:24897213

  1. 77 FR 36292 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Border Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ... Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Border...''), Border Security Technology Consortium (``BSTC'') has filed written notifications simultaneously with the... various border security-related monitoring, surveillance, communications, fencing and infrastructure,...

  2. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    SciTech Connect

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  3. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    SciTech Connect

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the ''next-generation'' in

  4. Secrecy and Physicists: Intersections of Science and National Security

    NASA Astrophysics Data System (ADS)

    Aftergood, Steven

    2010-02-01

    Physicists have been proponents as well as critics of government secrecy affecting their work. Enrico Fermi once wrote (in Physics Today) that ``Contrary to perhaps what is the most common belief about secrecy, secrecy was not started by generals, was not started by security officers, but was started by physicists.'' Yet Edward Teller, Frederick Seitz and others argued that secrecy in science and technology could profitably be reduced by 90% or more. Secrecy in physics is of course most pronounced in research related to nuclear weapons development. Though this is a longstanding concern it is still not a settled one. Disputes over nuclear weapons-related secrecy continue to resonate today as researchers and authors challenge the boundaries of official disclosure regarding the nuclear weapons enterprise. This paper will survey the current landscape of secrecy in science, and will discuss recent controversies involving publication of nuclear weapons physics, the infrastructure of nuclear research, and the prospects for secrecy reform. )

  5. REGULATION OF AUSTRALIAN MEDICAL PROFESSIONALS AND NATIONAL SECURITY: LESSONS FROM THREE CASE STUDIES.

    PubMed

    Faunce, Thomas; McKenna, Michael; Rayner, Johanna; Hawes, Jazmin

    2016-03-01

    In recent times, Australia's national security concerns have had controversial impacts on regulation of Australian medical practitioners in areas related to immigration detention. This column explores three recent case studies relevant to this issue. The first involves the enactment of the Australian Border Force Act 2015 (Cth), which has a significant impact on the regulation of medical professionals who work with people in immigration detention. The second involves the decision of the High Court of Australia in Plaintiff M68/2015 v Minister for Immigration and Border Protection [2016] HCA 1 that an amendment to Australian federal legislation justified sending children back to immigration detention centres in Papua New Guinea and Nauru. This legislation was previously heavily criticised by the Australian Human Rights Commissioner. The third concerns the deregistration of Tareq Kamleh, an Australian doctor of German-Palestinian heritage who came to public attention on ANZAC Day 2015 with his appearance online in a propaganda video for the Islamic State terrorist organisation al-Dawla al-Islamyia fil Iraq wa'al Sham, also known as Islamic State of Iraq and Syria (ISIS) or Daesh. Australia's professional regulatory system should presumptively respect professional virtues, such as loyalty to the relief of individual patient suffering, when dealing with doctors (whether in Australia or ISIS-occupied Syria) working under regimes whose principles appear inconsistent with those of ethics and human rights. PMID:27323633

  6. Environmental Problems: A Global Security Threat. Report of the United Nations of the Next Decade Conference (24th, Hamilton Parish, Bermuda, June 18-23, 1989).

    ERIC Educational Resources Information Center

    Stanley Foundation, Muscatine, IA.

    The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…

  7. Governmental Control of the Internet in addressing Law Enforcement and National Security

    NASA Astrophysics Data System (ADS)

    Watney, Murdoch

    Some people contended that governmental regulation of the Internet would not be possible due to its inherent characteristics. This paper relates how governments, in addressing law enforcement and national security, have taken control of the Internet by means of legislation. Consideration is given to the influence and impact of powerful governments on the legal regulation of the Internet. It is pointed out that when addressing law enforcement and national security the borderless nature of the Internet is in reality bordered. It is concluded that in striving towards law enforcement and national security, enforcement of governmental control of the Internet is not easily achieved without the assistance of the Internet Service Provider (ISP) as well as international assistance and co-operation.

  8. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22 Section 1260.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.22 Who is...

  9. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA? 1260.20 Section 1260.20 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20...

  10. Lawrence Livermore National Laboratory`s Computer Security Short Subjects Videos: Hidden Password, The Incident, Dangerous Games and The Mess; Computer Security Awareness Guide

    SciTech Connect

    1993-12-31

    A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.

  11. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    PubMed

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes. PMID:24841103

  12. The United Nations Human Space Technology Initiative

    NASA Astrophysics Data System (ADS)

    Balogh, Werner; Miyoshi, Takanori

    2016-07-01

    The United Nations Office for Outer Space Affairs (OOSA) launched the Human Space Technology Initiative (HSTI) in 2010 within the United Nations Programme on Space Applications, based on relevant recommendations of the Third United Nations Conference on the Exploration and Peaceful Uses of Outer Space (UNISPACE III). The activities of HSTI are characterized by the following "Three Pillars": International Cooperation, Outreach, and Capacity-building. For International Cooperation, OOSA and the Japan Aerospace Exploration Agency (JAXA) jointly launched a new programme entitled "KiboCUBE". KiboCUBE aims to provide educational or research institutions located in developing countries with opportunities to deploy cube satellites of their own design and manufacture from Japanese Experiment Module "Kibo" on-board the International Space Station (ISS). The Announcement of Opportunity was released on 8 September 2015 and the selected institution is to be announced by 1 August 2016. OOSA is also collaborating with WHO and with the COPUOS Expert Group on Space and Global Health to promote space technologies and ground- and space-based research activities that can contribute to improving global health. For Outreach, OOSA and the government of Costa Rica are jointly organising the United Nations/Costa Rica Workshop on Human Space Technology from 7 to 11 March 2016. Participants will exchange information on achievements in human space programmes and discuss how to promote international cooperation by further facilitating the participation of developing countries in human space exploration-related activities. Also, it will address the role of space industries in human space exploration and its related activities, considering that they have become significant stakeholders in this field. For Capacity-building, OOSA has been carrying out two activities: the Zero-Gravity Instrument Project (ZGIP) and the Drop Tower Experiment Series (DropTES). In ZGIP, OOSA has annually distributed

  13. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    ERIC Educational Resources Information Center

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  14. United Nations Human Space Technology Initiative (HSTI)

    NASA Astrophysics Data System (ADS)

    Ochiai, Mika; Niu, Aimin; Steffens, Heike; Balogh, Werner; Haubold, Hans; Othman, Mazlan; Doi, Takao

    2014-11-01

    The Human Space Technology Initiative was launched in 2010 within the framework of the United Nations Programme on Space Applications implemented by the Office for Outer Space Affairs of the United Nations. It aims to involve more countries in activities related to human spaceflight and space exploration and to increase the benefits from the outcome of such activities through international cooperation, to make space exploration a truly international effort. The role of the Initiative in these efforts is to provide a platform to exchange information, foster collaboration between partners from spacefaring and non-spacefaring countries, and encourage emerging and developing countries to take part in space research and benefit from space applications. The Initiative organizes expert meetings and workshops annually to raise awareness of the current status of space exploration activities as well as of the benefits of utilizing human space technology and its applications. The Initiative is also carrying out primary science activities including the Zero-Gravity Instrument Project and the Drop Tower Experiment Series aimed at promoting capacity-building activities in microgravity science and education, particularly in developing countries.

  15. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  16. 77 FR 65587 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-29

    ... ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: National Endowment for the Humanities. ACTION: Notice of Meeting. SUMMARY: Pursuant to section 10(a)(2) of the Federal Advisory Committee Act (5 U.S.C. App.), notice is hereby given that the National Council on the...

  17. The role of aerospace technologies and the military factor for national security

    NASA Astrophysics Data System (ADS)

    Getsov, Petar; Penev, Pavel

    In the paper, the current state of using aerospace data in the Bulgarian Army is discussed. The potential application areas of aerospace images in military affairs are outlined. Peacetime, pre-war and wartime tasks are identified and classified. A National Centre for Aerospace Data and a Unit at the Bulgarian Army are suggsted to be established to enhance the preventive factor in national security.

  18. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted...

  19. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Designation of senior official to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.20 Designation...

  20. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... COMMISSION Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the Securities Exchange Act of 1934 March 1, 2013. On July 3, 2012, Topaz Exchange, LLC (``Topaz Exchange'' or ``Applicant'') submitted to the Securities and Exchange...

  1. 75 FR 68007 - Meeting of National Council on the Humanities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ... THE ARTS AND THE HUMANITIES Meeting of National Council on the Humanities AGENCY: The National Endowment for the Humanities. ACTION: Notice of meeting. Pursuant to the provisions of the Federal Advisory... Humanities will meet in Washington, DC on November 18- 19, 2010. The purpose of the meeting is to advise...

  2. 78 FR 54349 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ... securities executed on national stock exchanges and in the OTC market, as provided in Rule 7 and Procedure II..., 2013), 78 FR 42989 (July 18, 2013) (SR-NSCC-2013-09) (``Notice''). I. Description NSCC is amending its... deleting a provision relating to potential announcement via Important Notice of the availability of...

  3. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...Under the provisions of the Federal Advisory Committee Act of 1972 (5 U.S.C., Appendix, as amended), the Government in the Sunshine Act of 1976 (5 U.S.C. 552b, as amended), and 41 CFR 102-3.150, the Department of Defense announces that the following Federal advisory committee meeting of the National Security Education Board will take...

  4. ENVIRONMENTAL RISK ASSESSMENTS OF OIL AND GAS ACTIVITIES USING NATIONAL SECURITY AND CIVILIAN DATA SOURCES

    EPA Science Inventory

    The national security systems (NSS) of Russia and the United States have been used for more than three decades to monitor each other's military and economic infrastructure. These high-resolution imaging systems can provide unique data for assessing a wide range of environmental i...

  5. 10 CFR 784.6 - National security considerations for waiver of certain sensitive inventions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... sensitive inventions. 784.6 Section 784.6 Energy DEPARTMENT OF ENERGY PATENT WAIVER REGULATION § 784.6 National security considerations for waiver of certain sensitive inventions. (a) Whenever, in the course of... contractor makes an invention or discovery to which title vests in the Department of Energy pursuant...

  6. Education Policy and National Security in Brazil in the Post-1964 Context

    ERIC Educational Resources Information Center

    Silveira, Rene Trentin

    2013-01-01

    The aim of this article is to analyse and show in detail the influence of the National Security and Development Doctrine, the main ideological prop of the 1964 civilian-military coup, on the education policy implemented by the regime. Special attention is given to the MEC-USAID agreements, the setting up of the Meira Matos Commission and the…

  7. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ..., August 18, 2010. [FR Doc. 2010-21016 Filed 8-20-10; 8:45 am] Billing code 3195-W0-P ... Documents#0;#0; #0; #0;Title 3-- #0;The President ] Executive Order 13549 of August 18, 2010 Classified... with Executive Order 13526 of December 29, 2009 (``Classified National Security...

  8. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Commission unless a carrier is advised by the U.S. Government that disclosure of a quotation or tender of...

  9. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Commission unless a carrier is advised by the U.S. Government that disclosure of a quotation or tender of...

  10. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Commission unless a carrier is advised by the U.S. Government that disclosure of a quotation or tender of...

  11. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Commission unless a carrier is advised by the U.S. Government that disclosure of a quotation or tender of...

  12. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Commission unless a carrier is advised by the U.S. Government that disclosure of a quotation or tender of...

  13. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Exemption for national defense and security. 801.11 Section 801.11 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS APPLICATION OF THE EMPLOYEE POLYGRAPH PROTECTION ACT OF 1988 Exemptions § 801.11...

  14. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Exemption for national defense and security. 801.11 Section 801.11 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS APPLICATION OF THE EMPLOYEE POLYGRAPH PROTECTION ACT OF 1988 Exemptions § 801.11...

  15. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... URBAN DEVELOPMENT Order of Succession for the Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice of order of succession. SUMMARY: In this notice, the Secretary of HUD designates the Order of Succession for the Office of Disaster Management and...

  16. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  17. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    ERIC Educational Resources Information Center

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  18. Impacts of Psychological Science on National Security Agencies Post-9/11

    ERIC Educational Resources Information Center

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  19. 37 CFR 5.1 - Applications and correspondence involving national security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... markings (e.g., “Confidential,” “Secret” or “Top Secret”) are accepted by the Office. National security... which a U.S. Government defense agency has a property interest will not be made available to...

  20. 37 CFR 5.1 - Applications and correspondence involving national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... markings (e.g., “Confidential,” “Secret” or “Top Secret”) are accepted by the Office. National security... which a U.S. Government defense agency has a property interest will not be made available to...

  1. 77 FR 60706 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed.... Name of Committee: National Human Genome Research Institute Special Emphasis Panel; Special Emphasis... Officer, Scientific Review Branch, National Human Genome Research Institute, National Institutes of...

  2. 75 FR 8374 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel, Revolutionary..., National Human Genome Research Institute, National Institutes of Health, 5635 Fishers Lane, Suite 4076,...

  3. 78 FR 68856 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... Review Officer, Scientific Review Branch, National Human Genome Research Institute, National Institutes... of Federal Domestic Assistance Program Nos. 93.172, Human Genome Research, National Institutes...

  4. 76 FR 28056 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group, Genome Research Review... Scientific Review, National Human Genome Research Institute, National Institutes of Health, Bethesda,...

  5. 76 FR 58023 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-19

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group; Genome Research Review... Review, National Human Genome Research Institute, National Institutes of Health, Bethesda, MD 20892,...

  6. The Arctic as a test case for an assessment of climate impacts on national security.

    SciTech Connect

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01

    organizations. Because changes in the Arctic environment are happening so rapidly, a successful program will be one that can adapt very quickly to new information as it becomes available, and can provide decision makers with projections on the 1-5 year time scale over which the most disruptive, high-consequence changes are likely to occur. The greatest short-term impact would be to initiate exploratory simulations to discover new emergent and robust phenomena associated with one or more of the following changing systems: Arctic hydrological cycle, sea ice extent, ocean and atmospheric circulation, permafrost deterioration, carbon mobilization, Greenland ice sheet stability, and coastal erosion. Sandia can also contribute to new technology solutions for improved observations in the Arctic, which is currently a data-sparse region. Sensitivity analyses have the potential to identify thresholds which would enable the collaborative development of 'early warning' sensor systems to seek predicted phenomena that might be precursory to major, high-consequence changes. Much of this work will require improved regional climate models and advanced computing capabilities. Socio-economic modeling tools can help define human and national security consequences. Formal uncertainty quantification must be an integral part of any results that emerge from this work.

  7. 76 FR 44751 - Suspension of Entry of Aliens Subject to United Nations Security Council Travel Bans and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-27

    ... ] TD27JY11.021 ] TD27JY11.022 [FR Doc. 2011-19155 Filed 7-26-11; 8:45 am] Billing code 4710-10-C #0; #0; ... of Aliens Subject to United Nations Security Council Travel Bans and International Emergency Economic... Nations Security Council travel bans as of the date of this proclamation. I have further determined...

  8. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions,...

  9. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  10. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  11. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  12. CDZNTE ROOM-TEMPERATURE SEMICONDUCTOR GAMMA-RAY DETECTOR FOR NATIONAL-SECURITY APPLICATIONS.

    SciTech Connect

    CAMARDA,G.S.; BOLOTNIKOV, A.E.; CUI, Y.; HOSSAIN, A.; KOHMAN, K.T.; JAMES, R.B.

    2007-05-04

    One important mission of the Department of Energy's National Nuclear Security Administration is to develop reliable gamma-ray detectors to meet the widespread needs of users for effective techniques to detect and identify special nuclear- and radioactive-materials. Accordingly, the Nonproliferation and National Security Department at Brookhaven National Laboratory was tasked to evaluate existing technology and to develop improved room-temperature detectors based on semiconductors, such as CdZnTe (CZT). Our research covers two important areas: Improving the quality of CZT material, and exploring new CZT-based gamma-ray detectors. In this paper, we report on our recent findings from the material characterization and tests of actual CZT devices fabricated in our laboratory and from materials/detectors supplied by different commercial vendors. In particular, we emphasize the critical role of secondary phases in the current CZT material and issues in fabricating the CZT detectors, both of which affect their performance.

  13. Lawrence Livermore National Security CFO Processes Functional Management Assessment

    SciTech Connect

    Sparks, A; Sampson, D; Thomas, B; Mendez, M

    2008-06-12

    The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing

  14. Evolving perceptions of security - US National Security surveys 1993--1995. Progress report, September 30, 1995--November 14, 1995

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1996-06-01

    This study analyzes findings from a national survey of 2,490 randomly selected members of the US public conducted between September 30 and November 14, 1995. It provides an over time comparison of public perceptions about nuclear weapons risks and benefits and key nuclear policy issues between 1993 and 1995. Other areas of investigation include policy preferences regarding nuclear proliferation, terrorism, US/Russian nuclear cooperation, and personal security. Public perceptions of post-cold war security were found to be evolving in unexpected ways. The perceived threat of nuclear conflict involving the US had not declined, and the threat of nuclear conflict between other countries and fears of nuclear proliferation and terrorism had increased. Perceived risks associated with managing the US nuclear arsenal were also higher. Perceptions of external and domestic benefits from US nuclear weapons were not declining. Support was found for increasing funding for nuclear weapons safety, training, and maintenance, but most respondents favored decreasing funding for developing and testing new nuclear weapons. Strong support was evident for programs and funding to prevent nuclear proliferation and terrorism. Though skeptical that nuclear weapons can be eliminated, most respondents supported reducing the US nuclear arsenal, banning nuclear test explosions, and ending production of fissile materials to make nuclear weapons. Statistically significant relationships were found between perceptions of nuclear weapons risks and benefits and policy and spending preferences. Demographic variables and basic social and political beliefs were systematically related both to risk and benefit perceptions and policy and spending options.

  15. Proposed Methodology for Developing a National Strategy for Human Resource Development: Lessons Learned from a NNSA Workshop

    SciTech Connect

    Elkhamri, Oksana O.; Frazar, Sarah L.; Essner, Jonathan; Vergino, Eileen; Bissani, Mo; Apt, Kenneth E.; McClelland-Kerr, John; Mininni, Margot; VanSickle, Matthew; Kovacic, Donald

    2009-10-07

    This paper describes a recent National Nuclear Security Administration (NNSA) workshop on Human Resource Development, which was focused on the potential methodology for developing a National Human Resource strategy for nuclear power in emerging nuclear states. The need for indigenous human resource development (HRD) has been singled out as a key milestone by the International Atomic Energy Agency (IAEA) in its 2007 Milestones document. A number of countries considering nuclear energy have reiterated this need for experts and specialists to support a national nuclear program that is sustainable and secure. Many have expressed concern over how best to assure the long-term availability of crucial human resource, how to approach the workforce planning process, and how to determine the key elements of developing a national strategy.

  16. Education and Human Survival: The Relevance of the Global Security Framework to International Education.

    ERIC Educational Resources Information Center

    Williams, Christopher

    2000-01-01

    Provides an assessment of international education as a discipline, and outlines the global security framework. Examines how this framework is reflected in the forms of analysis used by international educationists. Suggests how the central purpose of global security, namely ensuring human survival, could be adopted within international education to…

  17. The future of infrastructure security : a workshop held at Sandia National Laboratories.

    SciTech Connect

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included ininfrastructure' problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions ofsecure and resilient' infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  18. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  19. Technology transfer in a changing national security environment. Final report May-Nov 90

    SciTech Connect

    Finkler, R.A.; Boezer, G.L.; Foss, E.J.; Jorstad, N.D.; Ramsbotham, A.J.

    1990-12-01

    This paper examines U.S. export control, with particular emphasis on technology transfer as it affects our relationship with Japan. It describes the evolution of export control in the United States, including the Bucy Report, the impact of Afghanistan, and policy changes regarding the People's Republic of China. U.S. control mechanisms for critical technology currently in place are described; these include the Export Administration Regulations, the International Traffic in Arms Regulations (ITAR), and the Militarily Critical Technologies List (MCTL). The evolution of Japan's technology base and export control mechanisms are discussed, as well as its military capabilities. Japan and the United States have had different philosophies regarding export control, with the United States more likely to use controls as part of its foreign policy. However, U.S. export control policy is increasingly seen as having an important economic security aspect in addition to its national security objectives. Changes in Eastern Europe and the Soviet Union have placed the issue of export control in a new perspective. Therefore, the paper also examines in some detail the major developments in the European community which will affect the future technology environment and its relationship to national security. This paper was originally presented at a workshop of the Japan-U.S. Joint Study Group on Trade, Finance and Technology in East-West Economic Relations. A primary purpose of the paper was to enhance mutual understanding between the United States and Japan, and to facilitate the resolution of differences in the technology security arena.

  20. Update on Y-12 national security complex activities to recover enriched uranium in 2007

    SciTech Connect

    Eddy, Becky; Andes, Trent; Dunavant, Randy

    2008-07-15

    During Calendar Year 2007, the Y-12 National Security Complex (Y-12) has completed recovery missions that resulted in the return of highly enriched uranium from Canada and several locations within the United States. These missions were performed in support of the National Nuclear Security Administration's Global Threat Reduction Initiative (GTRI) and the Department of Energy (DOE) Central Scrap Management Office for Uranium (U-CSMO). Additionally, Y-12 completed safety basis revisions for the ES-3100 shipping package which resulted in the issuance of a Certificate of Compliance (CoC) from the United States Nuclear Regulatory Commission and a Competent Authority Certificate (CAC) from the United States Department of Transportation for air transport of highly enriched uranium in the form of un- irradiated TRIGA pellets. This certification of the ES-3100 will now allow GTRI to perform recoveries of limited quantities of fresh HEU TRIGA that have been identified at several locations. (author)

  1. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  2. 78 FR 61851 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-04

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel Extramural Gene... review and evaluate grant applications. Place: National Human Genome Research Institute, 4076...

  3. 75 FR 52538 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-26

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel. Date: November 19-20..., Scientific Review Officer, Scientific Review Branch, National Human Genome Research Institute,...

  4. 77 FR 28888 - National Human Genome Research Institute Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group; Genome Research Review... applications. Place: National Human Genome Research Institute, 3635 Fishers Lane, Suite 4076, ] Rockville,...

  5. 78 FR 20933 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-08

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel Loan Repayment Program... applications. Place: National Human Genome Research Institute, Room 3055, 5635 Fishers Lane, Rockville,...

  6. 77 FR 61770 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel; Genomic Medicine RFAs..., Human Genome Research, National Institutes of Health, HHS) ] Dated: October 4, 2012. David...

  7. 76 FR 65204 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-20

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel; Genomic Resource...: Rudy O. Pozzatti, Ph.D., Scientific Review Officer, Scientific Review Branch, National Human...

  8. 78 FR 14806 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel: Clinically Relevant... grant applications. Place: National Human Genome Research Institute, 4th Floor Conference Room,...

  9. 76 FR 35223 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel, Sequencing Centers...D, Scientific Review Officer, Scientific Review Branch, National Human Genome Research...

  10. 78 FR 64222 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Initial Review Group; Genome Research Review..., Ph.D., Scientific Review Officer, Office of Scientific Review, National Human Genome...

  11. Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)

    SciTech Connect

    Arnold, P.

    2012-10-31

    This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

  12. Some potentialities for using aerospace information in the field of national security and defence

    NASA Astrophysics Data System (ADS)

    Getsov, Petar; Penev, Pavel

    The modern tendencies in using remote sensing techniques and systems for studying the Earth from space are formulated. The potentialities to use dual-destination space monitoring commercial satellites on the territory of the Republic of Bulgaria are outlined. General formulation of the tasks in the field of defence and security resolved through the space segment is given. A structure for a sovereign National Space Information Centre is suggested.

  13. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    SciTech Connect

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  14. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    SciTech Connect

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  15. Impact on the PACOM regional command strategy of the evolving national security strategy. Final report

    SciTech Connect

    Riddle, M.H.

    1994-02-08

    This paper deals with the conclusions and recommendations of the impact the evolving United States national security strategy may have on the PACOM regional command strategy. The conclusions and recommendations are based on a survey of the January 1993 National Security Strategy of the United States presented by the outgoing Administration and the impact that the evolving strategy of the Clinton Administration is having. These conclusions and recommendations are also influenced by current events surrounding the activities and policy debate centered on the Peoples Democratic Republic of Korea. The conclusions drawn are that the objectives of national security are timeless and consistent from Administration to Administration, even when the party changes. The divergence occurs in emphasis and priority. Several impacts on the PACOM regional command strategy are identified as a result. To break the reliance on the strategy of deterrence requires refocusing of the priority from the global-international level to the regional level. The recommendation is made that the Administration should de-link the military considerations on the Korean peninsula from the international debate over the DPRK nuclear program.

  16. The Role of the DOE Weapons Laboratories in a Changing National Security Environment: CNSS Papers No. 8, April 1988

    DOE R&D Accomplishments Database

    Hecker, S. S.

    1988-04-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.

  17. The role of the DOE weapons laboratories in a changing national security environment: CNSS papers No. 8, April 1988

    SciTech Connect

    Hecker, S.S.

    1988-01-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security. 9 refs.

  18. Timely integration of safeguards and security with projects at Los Alamos National Laboratory

    SciTech Connect

    Price, R.; Blount, P. M.; Garcia, S. W.; Gonzales, R. L.; Salazar, J. B.; Campbell, C. H.

    2004-01-01

    The Safeguards and Security (S&S) Requirements Integration Team at Los Alamos National Laboratory (LANL) has developed and implemented an innovative management process that will be described in detail. This process systematically integrates S&S planning into construction, facility modifications or upgrades, mission changes, and operational projects. It extends and expands the opportunities provided by the DOE project management manual, DOE M 413.3-1. Through a series of LANL documents, a process is defined and implemented that formally identifies an S&S professional to oversee, coordinate, facilitate, and communicate among the identified S&S organizations and the project organizations over the life cycle of the project. The derived benefits, namely (1) elimination/reduction of re-work or costly retrofitting, (2) overall project cost savings because of timely and improved planning, (3) formal documentation, and (4) support of Integrated Safeguards and Security Management at LANL, will be discussed. How many times, during the construction of a new facility or the modification of an existing facility, have the persons responsible for the project waited until the last possible minute or until after construction is completed to approach the security organizations for their help in safeguarding and securing the facility? It's almost like, 'Oh, by the way, do we need access control and a fence around this building and just what are we going to do with our classified anyway?' Not only is it usually difficult; it's also typically expensive to retrofit or plan for safeguards and security after the fact. Safeguards and security organizations are often blamed for budget overruns and delays in facility occupancy and program startup, but these problems are usually due to poor front-end planning. In an effort to help projects engage safeguards and security in the pre-conceptual or conceptual stages, we implemented a high level formality of operations. We established institutional

  19. Research Universities and the Future of America: Ten Breakthrough Actions Vital to Our Nation's Prosperity and Security

    ERIC Educational Resources Information Center

    National Academies Press, 2012

    2012-01-01

    "Research Universities and the Future of America" presents critically important strategies for ensuring that our nation's research universities contribute strongly to America's prosperity, security, and national goals. Widely considered the best in the world, our nation's research universities today confront significant financial pressures,…

  20. The Security of Russia's Nuclear Arsenal: The Human Factor

    SciTech Connect

    Ball, D.Y.

    1999-10-12

    Assertions by the Russian military that all of their nuclear weapons are secure against theft and that nuclear units within the military are somehow insulated from the problems plaguing the Russian military should not be accepted uncritically. Accordingly, we should not give unwarranted credence to the pronouncements of military figures like Cal.-Gen. Igor Valynkin, Chief of the Defense Ministry's 12th Main Directorate, which oversees the country's nuclear arsenal. He contends that ''Russian nuclear weapons are under reliable supervision'' and that ''talk about the unreliability of our control over nuclear weapons has only one pragmatic goal--to convince international society that the country is incapable of maintaining nuclear safety and to introduce international oversight over those weapons, as it is done, for example, in Iraq.'' While the comparison to Iraq is preposterous, many analysts might agree with Valynkin's sanguine appraisal of the security of Russia's nuclear weapons. In contrast, I argue that the numerous difficulties confronting the military as a whole should cause concern in the West over the security of the Russian nuclear arsenal.

  1. Closure Report for Corrective Action Unit 566: EMAD Compound, Nevada National Security Site, Nevada with ROTC-1, Revision 0

    SciTech Connect

    Mark Krauss

    2011-06-01

    This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 566: EMAD Compound, Nevada National Security Site, Nevada. Corrective Action Unit 566 comprises Corrective Action Site (CAS) 25-99-20, EMAD Compound, located within Area 25 of the Nevada National Security Site. The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CAU 566 were met. To achieve this, the following actions were performed: • Review the current site conditions, including the concentration and extent of contamination. • Implement any corrective actions necessary to protect human health and the environment. • Properly dispose of corrective action and investigation wastes. • Document Notice of Completion and closure of CAU 566 issued by the Nevada Division of Environmental Protection. From October 2010 through May 2011, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 566: EMAD Compound, Nevada National Security Site, Nevada. The purposes of the activities as defined during the data quality objectives process were as follows: • Determine whether contaminants of concern (COCs) are present. • If COCs are present, determine their nature and extent, implement appropriate corrective actions, and properly dispose of wastes. Analytes detected during the closure activities were evaluated against final action levels (FALs) to determine COCs for CAU 566. Assessment of the data from collected soil samples, and from radiological and visual surveys of the site, indicates the FALs were exceeded for polychlorinated biphenyls (PCBs), semivolatile organic compounds (SVOCs), and radioactivity. Corrective actions were implemented to remove the following: • Radiologically contaminated soil assumed greater than FAL at two locations • Radiologically contaminated soil assumed greater than FAL with

  2. NATIONAL HUMAN EXPOSURE ASSESSMENT SURVEY (NHEXAS): OPPORTUNITIES AND LESSONS LEARNED

    EPA Science Inventory

    The National Human Exposure Assessment Survey (NHEXAS) in its fullest sense is a conceptual design, which upon implementation, will have long-term implications to exposure research and assessment. The ultimate goal is to document national distribution of human exposure to pote...

  3. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    SciTech Connect

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  4. Is The Obesity Epidemic A National Security Issue Around The Globe?

    PubMed Central

    Popkin, Barry M.

    2013-01-01

    Purpose of review To understand how obesity affects national security by focusing on three case study countries—the United States, China, and Mexico. Recent findings While in the United States and Mexico, over two-thirds of adults are overweight and obese compared to about 29% of Chinese, large increases in the prevalence of overweight and obesity have occurred in all three countries in the past two decades. National security is affected in the US ranges both from an economic perspective-- increasing health care problems and costs to the point where our labor costs have reached uncompetitive cost levels, and from a military preparedness perspective, namely our overweight soldiers are unable to perform normal activities and functions required of soldiers. In both Mexico and China, it is the economic and health system costs that are dominant concerns, both the costs of obesity-related medical care and the productivity of the work force are creating potential long-term effects on economic competitiveness. Summary Obesity is adversely affecting the welfare, economic, and in some cases military security of these three countries. PMID:21543976

  5. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  6. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  7. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  8. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  9. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  10. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ... COMMISSION BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities... Y-Exchange, Inc. (``BATS Y Exchange'') submitted to the Securities and Exchange Commission... publishing this notice to solicit comments on BATS Y Exchange's Form 1. The Commission will take...

  11. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency...'s Order to CMRS providers and users to comply with policies and procedures establishing the...

  12. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency...'s Order to CMRS providers and users to comply with policies and procedures establishing the...

  13. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    ERIC Educational Resources Information Center

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  14. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    SciTech Connect

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  15. Why do nations matter? The struggle for belonging and security in an uncertain world.

    PubMed

    Skey, Michael

    2013-03-01

    This paper explores the reasons why national forms of identification and organization (might) matter in the contemporary era. In contrast to the majority of macro-sociological work dealing with this topic, I develop an analytical framework that draws together recent research on everyday nationalism with micro-sociological and psychological studies pointing to the importance of routine practices, institutional arrangements and symbolic systems in contributing to a relatively settled sense of identity, place and community. The second part of the paper focuses on the hierarchies of belonging that operate within a given national setting. Of particular interest is the largely taken-for-granted status of the ethnic majority and the degree to which it underpins claims to belonging and entitlement that are used to secure key allocative and authoritative resources. PMID:23488702

  16. International and national security applications of cryogenic detectors - mostly nuclear safeguards

    SciTech Connect

    Rabin, Michael W

    2009-01-01

    As with science, so with security - in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma ray, neutron, and alpha particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invi sible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  17. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  18. 76 FR 63932 - National Human Genome Research Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-14

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel, ENCODE Technology RFA... Genome Research, National Institutes of Health, HHS) Dated: October 7, 2011 . Jennifer S....

  19. 77 FR 5035 - National Human Genome Research Institute; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-01

    ... HUMAN SERVICES National Institutes of Health National Human Genome Research Institute; Notice of Closed... of Committee: National Human Genome Research Institute Special Emphasis Panel Sequencing Technology... Genome Research Institute, National Institutes of Health, 5635 Fishers Lane, Suite 4076, MSC...

  20. The mechanisms of human recognition as a guideline for security feature development

    NASA Astrophysics Data System (ADS)

    Schaede, Johannes; Lohweg, Volker

    2006-02-01

    Security features for automated processing and / or forensic identification of bank notes have proven to reliably recognize and select counterfeit bank notes in circulation. As a result of this development the decisive first line of defense is the public, where either the criminal fraternities or opportunity counterfeiters try to place their antisocial products. Therefore those security features, which fit into the range of subconscious recognition and habitual knowledge, are those of major importance in application and development. This paper tries to answer some questions how the human recognition, its well-developed functionality and how these through evolution-acquired capabilities may considerably influence the improvement of public security features in bank notes.