Science.gov

Sample records for affecting national security

  1. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  2. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  3. Congress and national security

    NASA Astrophysics Data System (ADS)

    Sharfman, Peter

    1983-10-01

    The starting point for any serious discussion of Congress role in matters of national security is the recognition that Congress does some kinds of things very effectively, but generally fails when it tries to do other kinds of things. Consequently, a citizen with a desire to shape national policy may find Congress to be the focal point of national decision, or largely irrelevant, depending almost, entirely on the nature of the issue. As a political scientist, I am tempted to relate this to the provisions of the U.S. Constitution and to the differing structures of the Executive and Legislative institutions; since I am addressing an audience of physicists, I will confine my explanation of causes to the observation that you cannot easily push on a string.

  4. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  5. 77 FR 26024 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of May 1, 2012, a notice announcing a National Maritime Security Advisory... progress regarding multiple maritime security initiatives. If you have been adversely affected by the...

  6. 77 FR 1710 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of January 9, 2012, a notice announcing a National Maritime Security... regarding multiple maritime security initiatives. If you have been adversely affected by the delay...

  7. Factors affecting distributed system security

    SciTech Connect

    Nessett, D.M.

    1985-11-13

    Recent work examining distributed system security requirements is critiqued. A notion of trust based on distributed system topology and distributed system node evaluation levels proposed in that work is shown to be deficient. The notion fails to make allowances for the distributed system physical security environment, security factors related to the management of distributed systems by more than one jurisdictive authority and interactions that can occur between nodes supporting different mandatory and discretionary security mechanisms.

  8. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the security... 49 Transportation 9 2013-10-01 2013-10-01 false Changed conditions affecting security....

  9. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the security... 49 Transportation 9 2014-10-01 2014-10-01 false Changed conditions affecting security....

  10. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  11. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  12. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  13. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  14. Diversity Intersects with National Security.

    ERIC Educational Resources Information Center

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  15. National Security Management Correspondence Course.

    ERIC Educational Resources Information Center

    Industrial Coll. of the Armed Forces (DOD), Washington, DC.

    A course of study on the fundamental aspects of the areas of knowledge which are essential to effective management of national security is presented. The course presents the substance of the Industrial College resident curriculum adapted to the correspondence method of study. The subject matter is designed to impart knowledge and understanding of…

  16. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  17. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  18. Nuclear Physics for National Security

    NASA Astrophysics Data System (ADS)

    Mayo, Douglass

    2006-10-01

    Being a nuclear physicist and working at a national laboratory provides many opportunities to ply one's skills in support of national security and the benefit of all mankind. Over the last 40 years, Los Alamos National Laboratory has been pioneering the field of Domestic and International Safeguards through the research and development of instrumentation and systems used to monitor nuclear materials and nuclear facilities. With a projected increase in the use of nuclear energy, effective systems must be designed to reduce the possibility that nuclear materials may be diverted for used in weapons. The recent focus has been the many applications of radiation detection used for safeguarding nuclear material and to support Homeland Security. There is a critical need for trained nuclear scientists who can understand and overcome measurement complexities, combinations of multiple sensor inputs, data reduction, and automated analysis for these applications. This talk will focus on the opportunities and experiences afforded physicists in the support of national security, beyond the weapons program and travel to interesting locales.

  19. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  20. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  1. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  2. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  3. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  4. [System approach to national health security problems].

    PubMed

    Venediktov, D D

    1998-01-01

    P. K. Anokhin's basic works on functional systems, on space-time continuum and advanced reflection of the reality, on the physiological structure of a behavior act, as well as his fundamental philosophical and scientific postulated are most fruitful for analyzing and solving a number of biomedical, societal, and political problems, among them there are problems of national security in general and its demographic and health aspects. Individual and public health as a measure of balance between the organism (population) and its biosocial environment depends on the efficiency of relevant physiological and societal functional systems is one of the basic prerequisites of national security and timely recognition, avoiding and overcoming numerous challenges, dangers, and threats to the nation. General political and socioeconomic crisis in Russia adversely affects the population's dynamics and public health and it is manifested by depopulatory processes, low birth and high mortality and morbidity rates, growing violence and crime, psychoemotional stress, decreased immunity level of vast majority of population, especially that of children, elderly and other vulnerable groups. Environmental pollution and degradation have reached dangerous proportions. The national health system is unable to meet basic needs of the population. To overcome the crisis, systemic measures should be in the foundation of all health reform concepts and strategies. Monitoring national health, including modelling its future status, as well as progress in health system reforms should be another basic condition for overcoming the national health crisis. PMID:9567717

  5. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC...

  6. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... related to national security and emergency preparedness (NS/EP) telecommunications policy. During...

  7. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field.

  8. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  9. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... Management Branch, Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615....

  10. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Security, 245 Murray Lane, Mail Stop 0615, Arlington, VA 20598-0615. Instructions: All submissions...

  11. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be...), Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615; Fax:...

  12. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail Stop 3016B, Arlington,...

  13. The Political Economy of National Security.

    ERIC Educational Resources Information Center

    Kapstein, Ethan B.

    1990-01-01

    Describes a course offered on the political economy of national security. Discusses the objective of the course as the introduction of major economic issues associated with national security. Outlines lecture topics, course readings, and class format. Evaluates course weaknesses and strengths. Includes course assignments and requirements. (RW)

  14. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  15. National Security Technology Incubator Evaluation Process

    SciTech Connect

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  16. National Security Technology Incubator Business Plan

    SciTech Connect

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  17. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  18. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  19. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will receive an update on progress made to date by the...

  1. 76 FR 52672 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. During the conference call, the NSTAC members will receive an update regarding...

  2. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee AGENCY: National Communications System, DHS. ACTION: Notice of Open Advisory Committee meeting. SUMMARY... Communications System (Government Industry Planning and Management Branch), Department of Homeland Security,...

  3. Risk assessment of climate systems for national security.

    SciTech Connect

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  4. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  5. Counterproliferation: A National Security Priority. Speech text

    SciTech Connect

    Kaminski, P.G.

    1995-10-27

    Stemming the proliferation of weapons of mass destruction and their missile delivery systems - counterproliferation - is universally recognized as a significant national priority by all elements of the U.S. national security community. President Clinton, for example, emphasized in the National Security Strategy released in February of this year, that a key part of our strategy is to seek to stem the proliferation of such weapons and to develop an effective capability to deal with these threats. In May 1995, the National Military Strategy was issued by our nation`s senior military leader, General Shalikashvili, who described the threat of weapons of mass destruction as one of the ...four principal dangers which our military, in combination with other elements of national power must address.

  6. National Security Technology Incubation Strategic Plan

    SciTech Connect

    2007-01-01

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to

  7. It's a national security policy, stupid

    SciTech Connect

    Isaacs, J.

    1993-09-01

    This article discusses the first few national security decisions of the Clinton administration. The first decision was to have the United States continue to honor the nuclear testing moratorium through September, 1994 (or until another nation tested first). The second decision of the Clinton administration was the independence of the Arms Control and Disarmament Agency (ACDA) from the State Department. The third decision was to formally denounce the Reagan Administration's interpretation of the US/Soviet Anti-Ballistic Missile Treaty. The issue of the financing of United States involvement in Somalia was also addressed. The implications of these policy decisions as related to national security are evaluated in this article.

  8. National Security Technology Incubator Action Plan

    SciTech Connect

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  9. Next Generation National Security Leaders

    SciTech Connect

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  10. Nevada National Security Site Environmental Report 2013

    SciTech Connect

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  11. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  12. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  13. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ...) Port Security Grants. (2) Global Supply Chain Security Policy Efforts. (3) Update to the Maritime... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of meeting. SUMMARY: The National Maritime Security Advisory Committee (NMSAC) will...

  14. Sensor Science for National Security

    SciTech Connect

    Hardy, Jim E; Warmack, Robert J Bruce; Lavrik, Nickolay V; Datskos, Panos G; BRITTONJr., CHARLES L.

    2009-01-01

    Oak Ridge National Laboratory (ORNL) has over 200 professionals engaged in measurement science research and development. This work includes transduction techniques, advanced microelectronics, signal and image processing, modeling and simulation, material synthesis and characterization, and system engineering issues for packaging, miniaturization, integration, and communications (e.g. wireless networks). ORNL is applying this expertise to detecting, preventing, and reversing the proliferation of weapons of mass destruction, deploying integrated systems for incident awareness, detection, and response, providing technology for detection of explosives, and delivering enhanced protection and new capabilities to first responders and warfighters. Sensor systems include micro- and nano-arrays, optical, chemical, and biological technologies. Electronics research has focused on low-power, low-cost, and wireless functionality. Signal processing advancements encompass data flow with conversion to information and knowledge for intelligent decision making.

  15. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  16. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS THE OFFICE OF ENERGY RESEARCH FINANCIAL ASSISTANCE.... Correspondence which includes the specific information in question shall be sent by registered mail to...

  17. New rules revamp national security prosecutions

    NASA Astrophysics Data System (ADS)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying - rather than leaving decisions to local prosecutors.

  18. National security in the 1990s

    SciTech Connect

    Rich, M.D.

    1991-02-01

    The Rand Paper contains the text of a speech given at a luncheon co-sponsored by Town Hall of California and the Los Angeles Council of Engineers and Scientists on national security affairs in the 1990s. The speech was given at the Biltmore Hotel, Los Angeles, California, on February 19, 1991.

  19. 75 FR 705 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... information relating to defense against transnational terrorism. Our democratic principles require that the... national security, which includes defense against transnational terrorism, and the original classification...- art technology within a U.S. weapon system; (5) reveal formally named or numbered U.S. military...

  20. Alternate Energy for National Security.

    NASA Astrophysics Data System (ADS)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  1. How Homeland Security Affects Spatial Information

    ERIC Educational Resources Information Center

    Zellmer, Linda

    2004-01-01

    A recent article in Security-Focus described the fact that several U.S. government buildings in Washington DC could no longer be clearly seen by people using MapQuest's aerial photo database. In addition, the photos of these buildings were altered at the Web sites wherein they are posted at the request of the U.S. Secret Service. This is an…

  2. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  3. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  4. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2016-07-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  5. National Center for Nuclear Security - NCNS

    SciTech Connect

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  6. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  7. Nevada National Security Site Environmental Report 2011

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  8. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... Division, Counterespionage Section/Registration Unit, Bond Building--Room 9300, Washington, DC 20530....

  9. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  10. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  11. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...: (1) Form SF-86, Questionnaire for National Security Positions, marked “CON” in Block 1,...

  12. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions....

  13. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  14. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  15. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  16. 76 FR 50719 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... 92-463, notice is hereby given of a forthcoming meeting of the National Security Education Board. The... requirements established by the David L. Boren National Security Education Act, Title VII of Public Law...

  17. 77 FR 27739 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  18. 77 FR 49439 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose ] of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102-183, as...

  19. 76 FR 28960 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  20. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  1. 14 CFR § 1260.31 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate...

  2. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  3. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  4. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  5. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  6. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  7. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  8. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  9. Data security on the national fusion grid

    SciTech Connect

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  10. Nevada National Security Site Environmental Report 2012

    SciTech Connect

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  11. United States national security policy making and Vietnam

    SciTech Connect

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to ground combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.

  12. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  13. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... article which is the subject of the investigation, the Secretary is required to take into consideration... Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of... affected by imports of the article....

  14. Overview of Scientific Freedom and National Security

    NASA Astrophysics Data System (ADS)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  15. Y-12 National Security Complex Water Assessment

    SciTech Connect

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  16. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... our public dockets in the January 17, 2008 issue of the Federal Register (73 FR 3316) Docket: Any... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  17. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-27

    ... the January 17, 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security...

  18. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ..., 2008 issue of the Federal Register (73 FR 3316). Docket: Any background information or presentations... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: United States Coast... published a notice of meeting for the National Maritime Security Advisory Committee (NMSAC) in the...

  19. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and other groups dealing with national security, intelligence, or counterintelligence matters; (4... components of the Department as appropriate, with regard to intelligence, counterintelligence, or national... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national...

  20. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and other groups dealing with national security, intelligence, or counterintelligence matters; (4... components of the Department as appropriate, with regard to intelligence, counterintelligence, or national... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national...

  1. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on March 24, 2010 from 10 a.m. to 12 p.m....

  2. Extreme Scale Computing to Secure the Nation

    SciTech Connect

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear

  3. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  4. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  5. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  6. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  7. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  8. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  9. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  10. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... national security. (c)(1) The Chief, Controls Division, Office of Intelligence Liaison, Directorate for... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National...

  11. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  12. Nevada National Security Site Groundwater Program

    ScienceCinema

    None

    2016-07-12

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  13. Nevada National Security Site Groundwater Program

    SciTech Connect

    2010-03-25

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  14. Nevada National Security Site Radiation Protection Program

    SciTech Connect

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  15. Nevada National Security Site Radiological Control Manual

    SciTech Connect

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  16. Input from Key Stakeholders in the National Security Technology Incubator

    SciTech Connect

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  17. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security.

  18. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. PMID:22841592

  19. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  20. Status of Educational Efforts in National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  1. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... rule FR Doc. E9-28517, beginning on page 62531 in the issue of November 30, 2009, make the following... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA....

  2. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... required security education training for employees of NRC licensees possessing security clearances so that... National Security Information, which was published in the Federal Register on January 5, 2010 (75 FR 707... implementation of the Executive Order, issued a final rule (75 FR 37254; June 28, 2010) amending 32 CFR...

  3. Jimmy Carter's National Security Policy: A World Order Critique.

    ERIC Educational Resources Information Center

    Johansen, Robert C.

    This essay evaluates the Carter administration's behavior on national security questions and appraises the extent to which it meets Carter's initial professed national security goals. These goals include the intention to reduce military expenditures, to halt the nuclear arms buildup of the United States and U.S.S.R., to prevent the spread of…

  4. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    .... Correction In the Federal Register of April 25, 2012, in FR Doc 2012-9979, on page 24728, in the third column... SECURITY President's National Security Telecommunications Advisory Committee; Correction AGENCY: National... Telecommunications Advisory Committee (NSTAC) meeting. The document contained incorrect information regarding...

  5. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Exclusion and Exemption of Marine SI Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... request a national security exemption for any marine SI engine, otherwise subject to this part, which...

  6. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  7. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 501.2 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND... unauthorized disclosure of such information would pose a threat to the national security and that there is a... information would pose a threat to the national security. The authority of the Director under this...

  8. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... Order, Classified National Security Information, 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR part 2001... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3 CFR... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security...

  9. 77 FR 9214 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act,...

  10. Nevada National Security Site Environmental Report 2010

    SciTech Connect

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  11. US national security policy. Revision. Final report

    SciTech Connect

    Not Available

    1986-03-01

    This essay is intended to survey the basic framework within which the United States will make national security decisions in the year 2010, focusing especially on American orientation toward the Atlantic (Europe) or the Pacific (Asia). Such a task for projecting the international environment some 30 years into the future is an intrinsically speculative intellectual exercise. The idea of this essay is that the existing international environment will more likely than not continue to be the pattern in 2010 -- primarily because of the constraints established by the existence of nuclear weapons and the probable continuance of the U.S.-Soviet rivalry as the central factor in world politics. This suggests that the relative importance the United States has given to the Atlantic/Europe and the Pacific/Asia since 1945 will not shift dramatically. Section III then examines circumstances that might bring about a significant change or revolution in world politics by 2010, and the impact that this situation might have on the Atlantic-Pacific equation. This situation has two important implications for the US Navy and the associated U.S. power-projection forces. First, in terms of their contribution to the central U.S. alliance system, they should develop the followthrough for the defeat of the Red Fleet that will remain their overriding objective. Second, in terms of its contribution to the peripheral U.S. alliance system, the USN should refine its ability to fight and win limited conflicts.

  12. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... System DEPARTMENT OF COMMERCE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of... prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National... favorable results. No national security material or documents shall be removed from a Department of...

  13. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  14. A deeper look at climate change and national security.

    SciTech Connect

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  15. ED security: a national telephone survey.

    PubMed

    Ellis, G L; Dehart, D A; Black, C; Gula, M J; Owens, A

    1994-03-01

    To determine current practices regarding security measures in the emergency department (ED), a random sample of 250 hospitals with EDs was surveyed by telephone. Security issues addressed included personnel (in-house security, contract guards, or police), hours of staffing in the ED, how security is armed, whether ED doors are locked at off-hours, and whether alarm buttons, direct phone lines, a paging code, closed circuit surveillance, metal detectors, and seclusion rooms are used. This information was stratified according to hospital size, ED census, rural/suburban/urban setting, teaching/nonteaching status, and region. Generally, on-site security presence increases with increasing hospital size and ED census, suburban and urban locations, and teaching status. Small, rural hospitals are more likely to lock the ED doors at off-hours, whereas the use of security codes does not clearly follow demographic trends. Larger hospitals in suburban and urban settings and having a teaching status are more likely to have secure/detention rooms and closed circuit surveillance. The use of alarm buttons and/or direct telephone lines varies widely, but is generally more common in larger, teaching hospitals, located in urban and suburban settings.

  16. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security information introduced into proceedings. Except as...

  17. External Service Providers to the National Security Technology Incubator

    SciTech Connect

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  18. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. How 21st century droughts affect food and environmental security

    NASA Astrophysics Data System (ADS)

    Kogan, Felix

    The first 13th years of the 21st century has begun with a series of widespread, long and intensive droughts around the world. Extreme and severe-to-extreme intensity droughts covered 2-6% and 7-16% of the world land, respectively, affecting environment, economies and humans. These droughts reduced agricultural production, leading to food shortages, human health deterioration, poverty, regional disturbances, population migration and death. This presentation is a travelogue of the 21st century global and regional droughts during the warmest years of the past 100 years. These droughts were identified and monitored with the NOAA operational space technology, called Vegetation Health (VH), which has the longest period of observation and provide good data quality. The VH method was used for assessment of vegetation condition or health, including drought early detection and monitoring. The VH method is based on operational satellites data estimating both land surface greenness (NDVI) and thermal conditions. The 21st century droughts in the USA, Russia, Australia Argentina, Brazil, China, India and other principal grain producing countries were intensive, long, covered large areas and caused huge losses in agricultural production, which affected food and environmental security and led to food riots in some countries. This presentation investigate how droughts affect food and environmental security, if they can be detected earlier, how to monitor their area, intensity, duration and impacts and also their dynamics during the climate warming era with satellite-based vegetation health technology.

  20. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  1. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  2. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be...

  3. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  4. The Curious National Security Pendulum: Openness and/or Censorship.

    ERIC Educational Resources Information Center

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  5. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    ....homeport.uscg.mil under Missions>Maritime Security>National Maritime Security Advisory Committee>Member... serve an additional term of office but must re-apply in accordance with this notice. Applicants with... the mission of the Coast Guard. If you are selected as a non-representative member, or as a member...

  6. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  7. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  8. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    ERIC Educational Resources Information Center

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that describe: (1)…

  9. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... statement “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”. [73 FR 37243, June 30..., specialized electronic warfare systems, unique stealth performance requirements, and/or unique...

  10. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  11. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  12. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... segregation and marking of such securities and investments may be accomplished by putting them in separate... of the examination, shall be attached to a completed Form N-17f-1 (17 CFR 274.219) and transmitted to... a member of a national securities exchange of any obligation under existing law or under the...

  13. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI). PMID:23506403

  14. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  15. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  16. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  17. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  18. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  19. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program Operating...

  20. Classified Component Disposal at the Nevada National Security Site

    SciTech Connect

    Poling, J.; Arnold, P.; Saad, M.; DiSanza, F.; Cabble, K.

    2012-11-05

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012.

  1. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect

    Wallace, Terry

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  2. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  3. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  4. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  5. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  6. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  7. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS AND DONATED HISTORICAL MATERIALS...

  8. Marketing Plan for the National Security Technology Incubator

    SciTech Connect

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  9. Materials @ LANL: Solutions for National Security Challenges

    NASA Astrophysics Data System (ADS)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  10. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... ] Industrial Security Program policy matters. Dated: February 23, 2012. Mary Ann Hadyka, Committee Management... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  11. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... committee meeting, to discuss National Industrial Security Program policy matters. DATES: The meeting will... Management Officer. BILLING CODE 7515-01-P...

  12. 77 FR 19970 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-03

    ... Convention as a National Special Security Event. National Special Security Events are significant events... Republican National Convention as a National Special Security Event. The security zones are necessary to..., 2008, issue of the Federal Register (73 FR 3316). Public Meeting We do not anticipate convening...

  13. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security Strategy... the National Health Security Strategy of the United States of America (2009) the U.S. Government...

  14. Neutron Detection Alternatives to 3He for National Security Applications

    SciTech Connect

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

    2010-11-21

    One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

  15. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... issued on November 1, 2005 (70 FR 66116). The NSPS law was subsequently amended by section 1106 of Public... amendments resulted in revised DOD/OPM regulations, which were issued on September 26, 2008 (73 FR 56344) and January 16, 2009 (74 FR 2757). Section 1113 of the National Defense Authorization Act for Fiscal Year...

  16. The Intersection of National Security and Climate Change

    SciTech Connect

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  17. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  18. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  19. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  20. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR Sections... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or...

  1. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  2. Nevada National Security Site Environmental Report 2011 Summary

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  3. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  4. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  5. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  6. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  7. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  8. 17 CFR 240.11a1-4(T) - Bond transactions on national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Bond transactions on national securities exchanges. 240.11a1-4(T) Section 240.11a1-4(T) Commodity and Securities Exchanges SECURITIES AND....11a1-4(T) Bond transactions on national securities exchanges. A transaction in a bond, note,...

  9. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY... made for the following committee meeting. To discuss National Industrial Security Program...

  10. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July...

  11. 77 FR 41688 - Security Zones; 2012 Republican National Convention, Captain of the Port St. Petersburg Zone...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... National Special Security Event. National Special Security Events are significant events, which, due to... Convention as a National Special Security Event. The security zones are necessary to protect convention..., FL in the Federal Register (77 FR 64). We received one comment on the proposed rule. Public...

  12. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 19 2013-07-01 2013-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  13. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 18 2011-07-01 2011-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  14. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 19 2014-07-01 2014-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  15. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708 Section 85.1708 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and...

  16. Identifying the Enemy: Social Categorization and National Security Policy

    ERIC Educational Resources Information Center

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  17. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... effectively coordinated; (2) Develop, enforce, and supervise the application of all federal criminal laws... as appropriate, to Government agencies on matters of national security law and policy; (6) Administer... and law; (11) Formulate policy alternatives and recommend action by the Department and other...

  18. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... maneuverability requirements. This applies to both remanufactured and freshly manufactured marine engines. Gas turbine engines are also exempt without a request if they will be owned by an agency of the Federal... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1042.635.”....

  19. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  20. Academics and National-Security Experts Must Work Together

    ERIC Educational Resources Information Center

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  1. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  2. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  3. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  4. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  5. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America. ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United...

  6. National Security and Information Technology: The New Regulatory Option?

    ERIC Educational Resources Information Center

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  7. Components of a Course on National Security Policy.

    ERIC Educational Resources Information Center

    Quester, George H.

    1987-01-01

    Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…

  8. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    ERIC Educational Resources Information Center

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  9. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... Order, Classified National Security Information,'' 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR Part...@nara.gov . ] SUPPLEMENTARY INFORMATION: On July 8, 2011, NARA published a proposed rule (76 FR 40296... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3...

  10. 75 FR 77783 - Designation of National Security Positions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... classified information. For example, positions involving protection from terrorism have the potential to... include ``protecting the nation, its citizens and residents from acts of terrorism, espionage, or foreign...--Security Requirements for Government Employment (April 27, 1953), 18 FR 2489, 3 CFR 1949-1953 Comp., p....

  11. Security Design Flaws That Affect Usability in Online Banking

    ERIC Educational Resources Information Center

    Gurlen, Stephanie

    2013-01-01

    As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…

  12. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    SciTech Connect

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  13. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... National Security Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Proposed... INFORMATION AND RESTRICTED DATA 0 1. The authority citation for part 95 continues to read as follows... Information (75 FR 707; January 5, 2010), before derivatively classifying information and at least once...

  14. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Direct final rule; confirmation...; telephone: 301-415-3501; email: Daniel.Lenehan@nrc.gov . SUPPLEMENTARY INFORMATION: On August 7, 2013 (78 FR..., Classified National Security Information. In addition, this direct final rule allowed licensees...

  15. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  16. 26 CFR 1.6045B-1 - Returns relating to actions affecting basis of securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... securities. 1.6045B-1 Section 1.6045B-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY... to actions affecting basis of securities. (a) In general—(1) Information required. An issuer of a specified security (within the meaning of § 1.6045-1(a)(14)) that takes an organizational action...

  17. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  18. National Security Science and Technology Initiative: Air Cargo Screening

    SciTech Connect

    Bingham, Philip R; White, Tim; Cespedes, Ernesto; Bowerman, Biays; Bush, John

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive

  19. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level. PMID:25076773

  20. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  1. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.25 Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... Information and/or Restricted Data depending upon the matter authorized to be stored in the security...

  2. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-10

    ....m. ADDRESSES: The meeting will be held at the National Security Education Program; 1101 Wilson Blvd..., National Security Education Program, 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209-2248;...

  3. A brief history of Sandia's National security missions.

    SciTech Connect

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  4. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  5. CDZNTE ROOM-TEMPERATURE SEMICONDUCTOR GAMMA-RAY DETECTOR FOR NATIONAL-SECURITY APPLICATIONS.

    SciTech Connect

    CAMARDA,G.S.; BOLOTNIKOV, A.E.; CUI, Y.; HOSSAIN, A.; KOHMAN, K.T.; JAMES, R.B.

    2007-05-04

    One important mission of the Department of Energy's National Nuclear Security Administration is to develop reliable gamma-ray detectors to meet the widespread needs of users for effective techniques to detect and identify special nuclear- and radioactive-materials. Accordingly, the Nonproliferation and National Security Department at Brookhaven National Laboratory was tasked to evaluate existing technology and to develop improved room-temperature detectors based on semiconductors, such as CdZnTe (CZT). Our research covers two important areas: Improving the quality of CZT material, and exploring new CZT-based gamma-ray detectors. In this paper, we report on our recent findings from the material characterization and tests of actual CZT devices fabricated in our laboratory and from materials/detectors supplied by different commercial vendors. In particular, we emphasize the critical role of secondary phases in the current CZT material and issues in fabricating the CZT detectors, both of which affect their performance.

  6. An assessment of various household food security measures in Hawaiì has implications for national food security research and monitoring.

    PubMed

    Derrickson, J P; Fisher, A G; Anderson, J E; Brown, A C

    2001-03-01

    The Core Food Security Module (CFSM), the national food security monitoring tool, requires three affirmative responses to categorize households as food insecure. If this tool is unreliable or inaccurate, vulnerable segments of our population may be adversely affected. The objectives of the present study were to assess the credibility of applying the CFSM categorical measure to a population sample from Hawaiì and to assess the concurrent validity of the CFSM, the new face-valid measure and measures adapted from the Radimer/Cornell (RC) measure and Community Childhood Hunger Identification Project. The sample included 1469 respondents gathered through a statewide telephone sample and 144 food pantry recipients. Responses to the 18 CFSM questions were used to create all four measures. The credibility of the CFSM categorical measure was also assessed via comparisons with individual items and with the 1995 national modal CFSM response pattern. Categorical measures were compared across food security prevalence estimates and indices of income and vegetable intake and with the CFSM scale measure. Differences in the modal response pattern between samples affected CFSM categorization. Only 36% of households followed the Hawaiì modal response pattern, and categorization was not consistent with the content of key items. Although 85% of the households were classified as food secure by the CFSM, only 78% were classified as food secure with each of the other food security measures. Concurrent validity of all measures was confirmed. A reassessment of the national CFSM categorical measure appears warranted.

  7. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  8. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., area descriptions, or staffing, described in the security program; (2) Operations of an aircraft... § 1542.103; or (3) Layout or physical structure of any area under the control of the airport operator... information required in paragraph (b) of this section in writing to TSA within 72 hours of the...

  9. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the strength of our national economy and the capacity of the United States to meet national security... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  10. 15 CFR 705.4 - Criteria for determining effect of imports on the national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the strength of our national economy and the capacity of the United States to meet national security... imports on the national security. 705.4 Section 705.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  11. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data... Restricted Data or other National Security Information to the issues in the preceeding, and its...

  12. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice... Restricted Data or National Security Information into the proceeding, it will file a notice of intent...

  13. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  14. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Protection of restricted data and national security... Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing...

  15. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Protection of restricted data and national security... Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing...

  16. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  17. The Impact of Migration Processes on the National Security of Kazakhstan

    ERIC Educational Resources Information Center

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  18. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... of the Secretary National Security Education Board; Notice of Federal Advisory Committee Meeting AGENCY: Under Secretary of Defense for Personnel and Readiness, Defense Language and National Security... following Federal advisory committee meeting of the National Security Education Board will take place....

  19. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    ERIC Educational Resources Information Center

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  20. Public perspectives on nuclear security. US national security surveys, 1993--1997

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  1. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  2. Technology transfer in a changing national security environment. Final report May-Nov 90

    SciTech Connect

    Finkler, R.A.; Boezer, G.L.; Foss, E.J.; Jorstad, N.D.; Ramsbotham, A.J.

    1990-12-01

    This paper examines U.S. export control, with particular emphasis on technology transfer as it affects our relationship with Japan. It describes the evolution of export control in the United States, including the Bucy Report, the impact of Afghanistan, and policy changes regarding the People's Republic of China. U.S. control mechanisms for critical technology currently in place are described; these include the Export Administration Regulations, the International Traffic in Arms Regulations (ITAR), and the Militarily Critical Technologies List (MCTL). The evolution of Japan's technology base and export control mechanisms are discussed, as well as its military capabilities. Japan and the United States have had different philosophies regarding export control, with the United States more likely to use controls as part of its foreign policy. However, U.S. export control policy is increasingly seen as having an important economic security aspect in addition to its national security objectives. Changes in Eastern Europe and the Soviet Union have placed the issue of export control in a new perspective. Therefore, the paper also examines in some detail the major developments in the European community which will affect the future technology environment and its relationship to national security. This paper was originally presented at a workshop of the Japan-U.S. Joint Study Group on Trade, Finance and Technology in East-West Economic Relations. A primary purpose of the paper was to enhance mutual understanding between the United States and Japan, and to facilitate the resolution of differences in the technology security arena.

  3. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  4. Is The Obesity Epidemic A National Security Issue Around The Globe?

    PubMed Central

    Popkin, Barry M.

    2013-01-01

    Purpose of review To understand how obesity affects national security by focusing on three case study countries—the United States, China, and Mexico. Recent findings While in the United States and Mexico, over two-thirds of adults are overweight and obese compared to about 29% of Chinese, large increases in the prevalence of overweight and obesity have occurred in all three countries in the past two decades. National security is affected in the US ranges both from an economic perspective-- increasing health care problems and costs to the point where our labor costs have reached uncompetitive cost levels, and from a military preparedness perspective, namely our overweight soldiers are unable to perform normal activities and functions required of soldiers. In both Mexico and China, it is the economic and health system costs that are dominant concerns, both the costs of obesity-related medical care and the productivity of the work force are creating potential long-term effects on economic competitiveness. Summary Obesity is adversely affecting the welfare, economic, and in some cases military security of these three countries. PMID:21543976

  5. SDI (Strategic Defense Initiative) and national security policy. Research report

    SciTech Connect

    Davis, R.W.

    1988-04-01

    The paper attempts to answer the fundamental question of Can SDI make a significant contribution to US national security. It uses as its evaluation criteria historical arms-control measurements of stability, reduction in the probability of war, reduction in the consequences of war, economic benefits, and political benefits. A historical discussion of US nuclear strategy development along with Soviet thinking is provided as a backdrop to set the stage for an analysis of the reasons for President Reagan's March 1983 speech. The objectives of SDI are discussed along with the major concerns expressed by the program critics. Using the evaluation criteria defined above, the author analyzes SDI potential position in a long-term integrated national strategy that includes arms control and competitive strategies.

  6. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00...

  7. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... From the Federal Register Online via the Government Publishing Office ] NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00...

  8. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  9. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    SciTech Connect

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  10. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    SciTech Connect

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  11. 75 FR 76512 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Discontinue the Cost Basis Reporting Service December...

  12. 26 CFR 1.6045B-1 - Returns relating to actions affecting basis of securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 13 2012-04-01 2012-04-01 false Returns relating to actions affecting basis of securities. 1.6045B-1 Section 1.6045B-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Information Returns § 1.6045B-1 Returns relating to actions affecting basis...

  13. 26 CFR 1.6045B-1 - Returns relating to actions affecting basis of securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 13 2014-04-01 2014-04-01 false Returns relating to actions affecting basis of securities. 1.6045B-1 Section 1.6045B-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Information Returns § 1.6045B-1 Returns relating to actions affecting basis...

  14. Swords into plowshares: Military geology and national security projects

    SciTech Connect

    Neal, J.T.

    1994-12-31

    Military geology and national security projects are often comparable, achieving their rai-son d`etre in support of national goals, military operations, and/or systems-all for vital national interests. The application of Geoscience to these ends, especially engineering geology, has occurred from pole to pole and included every conceivable environment and natural condition. In the conduct of such projects, the Geosciences have advanced, and vice versa. Desert trafficability, most notably regarding playa surfaces, is both temporary and variable and not a persistent condition as some early authors believed. Playas in Australia, Iran, and the US show that saline efflorescence is removed following surface water dissolution and subsequent deflation, resulting in very hard crusts. Magadiite, a hydrous sodium silicate and possible precursor of bedded chert, was first discovered in North America at Alkali Lake, OR, during a military project. Pleistocene Lake Trinity, a small and mostly buried evaporate basin in the northern Jornada del Muerto, NM, was discovered during exploratory drilling in support of a military test program.

  15. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national...

  16. Magnetic Imaging: a New Tool for UK National Nuclear Security

    PubMed Central

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  17. Magnetic imaging: a new tool for UK national nuclear security.

    PubMed

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  18. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    SciTech Connect

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  19. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    SciTech Connect

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  20. 17 CFR 249.803 - Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Form X-15AJ-2, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-15AJ-2, for annual....803 Form X-15AJ-2, for annual consolidated supplement of a national securities association or...

  1. 17 CFR 249.803 - Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Form X-15AJ-2, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-15AJ-2, for annual....803 Form X-15AJ-2, for annual consolidated supplement of a national securities association or...

  2. 17 CFR 249.803 - Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Form X-15AJ-2, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-15AJ-2, for annual....803 Form X-15AJ-2, for annual consolidated supplement of a national securities association or...

  3. 17 CFR 249.803 - Form X-15AJ-2, for annual consolidated supplement of a national securities association or an...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Form X-15AJ-2, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-15AJ-2, for annual....803 Form X-15AJ-2, for annual consolidated supplement of a national securities association or...

  4. Secrecy and Physicists: Intersections of Science and National Security

    NASA Astrophysics Data System (ADS)

    Aftergood, Steven

    2010-02-01

    Physicists have been proponents as well as critics of government secrecy affecting their work. Enrico Fermi once wrote (in Physics Today) that ``Contrary to perhaps what is the most common belief about secrecy, secrecy was not started by generals, was not started by security officers, but was started by physicists.'' Yet Edward Teller, Frederick Seitz and others argued that secrecy in science and technology could profitably be reduced by 90% or more. Secrecy in physics is of course most pronounced in research related to nuclear weapons development. Though this is a longstanding concern it is still not a settled one. Disputes over nuclear weapons-related secrecy continue to resonate today as researchers and authors challenge the boundaries of official disclosure regarding the nuclear weapons enterprise. This paper will survey the current landscape of secrecy in science, and will discuss recent controversies involving publication of nuclear weapons physics, the infrastructure of nuclear research, and the prospects for secrecy reform. )

  5. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  6. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  7. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  8. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5...

  9. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... association promptly files a report on Form X-17A-19 including therewith, inter alia, information sufficient... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges...

  10. Simulating human behavior for national security human interactions.

    SciTech Connect

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  11. A National Climate Change Adaptation Network for Protecting Water Security

    NASA Astrophysics Data System (ADS)

    Weaver, A.; Sauchyn, D.; Byrne, J. M.

    2009-12-01

    Water security and resource-dependent community-survival are being increasingly challenged as a consequence of climate change, and it is urgent that we plan now for the security of our water supplies which support our lives and livelihoods. However, the range of impacts of climate change on water availability, and the consequent environmental and human adaptations that are required, is so complex and serious that it will take the combined work of natural, health and social scientists working with industries and communities to solve them. Networks are needed that will identify crucial water issues under climate change at a range of scales in order to provide regionally-sensitive, solutions-oriented research and adaptation. We suggest national and supra-national water availability and community sustainability issues must be addressed by multidisciplinary research and adaptation networks. The work must be driven by a bottom-up research paradigm — science in the service of community and governance. We suggest that interdisciplinary teams of researchers, in partnership with community decision makers and local industries, are the best means to develop solutions as communities attempt to address future water demands, protect their homes from infrastructure damage, and meet their food, drinking water, and other essential resource requirements. The intention is to cover: the impact of climate change on Canadian natural resources, both marine and terrestrial; issues of long-term sustainability and resilience in human communities and the environments in which they are embedded; the making and moving of knowledge, be that between members of Indigenous and non-Indigenous communities, researchers of different disciplines, communities, industry, policymakers and the academy and the crucial involvement of the various orders of government in the response to water problems, under conditions of heightened uncertainty. Such an adaptation network must include a national

  12. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00 a... NISPPAC@nara.gov . Dated: October 21, 2013. Patrice Little Murray, Acting Committee Management...

  13. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on July 17, 2013 from 10:00 a.m... NISPPAC@nara.gov . Dated: June 19, 2013. Patrice Little Murray, Acting Committee Management...

  14. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document... Alternate Designated Federal Officer, Department of Homeland Security, telephone (703) 235-5469. Correction... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF...

  15. Challenges in researching violence affecting health service delivery in complex security environments.

    PubMed

    Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel

    2016-08-01

    Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research

  16. Challenges in researching violence affecting health service delivery in complex security environments.

    PubMed

    Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel

    2016-08-01

    Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research

  17. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...) Sub-Committee. (3) DHS Global Supply Chain Security Strategy initiative. (4) Maritime Transportation Security Act update. (5) Update from CDC Strategy Working Group. (6) Update on the Small Vessel Security Strategy. Procedural This meeting is open to the public for the morning session and will also be...

  18. American History and National Security: Supplementary Lessons for High School Courses.

    ERIC Educational Resources Information Center

    Patrick, John J., Ed.; And Others

    Effective citizen participation implies the acquisition of skills and knowledge necessary for discussing and deciding national security issues. This book was developed to provide teachers with resources to design and strengthen national security education. The 30 self-contained lessons supplement and enrich current textbook treatment of national…

  19. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    .... SUMMARY: On May 11, 2012 (77 FR 27739), Department of Defense announced a meeting of the National Security... and National Security Education Office, 1101 Wilson Boulevard, Suite 1210, Arlington, VA 22209... Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Arlington, Virginia 22209-2248; (703)...

  20. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  1. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  2. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  3. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  4. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  5. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division; interpretation of Executive Orders. 17.13 Section 17.13 Judicial Administration DEPARTMENT OF JUSTICE CLASSIFIED... Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  6. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... National Security Division Systems—limited access. (a) The following system of records is exempted...

  7. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... of the Secretary Federal Advisory Committee; National Security Education Board; Charter Renewal... notice that it is renewing the charter for the National Security Education Board (hereafter referred to... desiring scholarships or fellowships, and institutions of higher education desiring grants under chapter...

  8. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    ERIC Educational Resources Information Center

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  9. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  10. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  11. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    .... Accordingly, this portion of the meeting will be closed to the public. (2) Global Supply Chain Security... Supply Chain Security Initiative. The Committee will receive an update and provide further guidance.... Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue...

  12. Y-12 National Security Complex's Sustainable Recovery and Transformation - 12420

    SciTech Connect

    Jackson, Jan; Widman, Jeannette

    2012-07-01

    American Recovery and Reinvestment Act (ARRA) funds were used at the Y-12 National Security Complex (Y-12) to remove legacy materials from large contaminated excess facilities in order to prepare the facilities for demolition, demolish five excess buildings, and clean up sources of environmental contamination. The legacy materials and buildings presented many challenges and the potential hazards included depleted uranium and other radiological contaminants, lead, polychlorinated biphenyls, Freon, mold, mildew, asbestos, beryllium and mercury. Y-12 project teams have integrated sustainable waste management practices into each of the seven ARRA projects. The ARRA clean up efforts have resulted in the reduction of potential environmental, health, and safety risks posed by the excess facilities and sources of environmental contamination. Y-12's ARRA project teams focused on completing the activities in a sustainable, timely and safe manner. The site utilized a systematic material disposition evaluation process to ensure that materials were not automatically dis-positioned as waste. ARRA projects have recycled or reused over 1.3 million pounds of materials while preventing over 3 million vehicle miles traveled for waste disposal. Y-12 ARRA projects have worked over 2 million safe work hours without a lost time injury. The site has already begun to beneficially reuse land cleared by ARRA project activities to support sustainable transformation efforts. The Y-12 ARRA project activities have demonstrated that large complex projects can be completed sustainably and safely while maintaining an aggressive schedule. Through careful planning and execution, ARRA projects at the site have sustainably reduced the potential environmental, health, and safety risks posed to site employees and the community by the excess facilities and sources of environmental contamination. Y-12's systematic material disposition process ensured that materials were not automatically assumed to be

  13. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    SciTech Connect

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  14. Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security

    NASA Astrophysics Data System (ADS)

    Kuloğlu, Gökhan; Gül, Zakir; Erçetin, Şefika Şule

    In today's rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.

  15. Deterrence and National Security in the Face of an Amorphous Threat

    SciTech Connect

    Werne, R

    2001-01-05

    The National Security threats that we face today and, in turn, the National Security . requirements, are more diverse and complex than they were during the Cold-War from 1945-1990. During that period, and bolstered by the experiences of World Wars I and II, US National Security policy was focused on the stabilization of post WW II country boundaries and containment of the Soviet block and China. The result was the bipolar world in which the nuclear and conventional forces of the United States, the Soviet Union, and their respective allies ensured a measure of political stability through a military stalemate of world wide proportions. The practical result was that large scale changes in national borders were unlikely, but internal conflict within countries, and local conflicts between neighboring countries could still occur, albeit with participation from one or both of the Superpower camps. US National Security Policy was designed primarily for stabilization of the bipolar world on the military front and for competition with the Soviet Union and China on economic and political fronts. The collapse of the Soviet Union changed the global picture. The bipolar world and its military stalemate appear to be gone for the moment and the threat which was the foundation for US National Security policy has changed significantly. Some will argue that China has intentions of replacing the Soviet Union as a military superpower and thus recreate the bipolar world. Furthermore, Russia still has significant nuclear forces and has recently talked of lowering the nuclear threshold in an apparent attempt to make up for its weakened conventional forces. Clearly the threat of large scale nuclear war is much reduced, but not gone entirely. Having acknowledged the Chinese and Russian threats, what does the global picture look like today? The boundaries of most countries are secure but there are significant frictions, that have, or could lead, to armed conflict. Most of these are today

  16. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ... notice regarding our public dockets in the January 17, 2008 issue of the Federal Register (73 FR 3316.... 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security...

  17. National Security Agency Data Collection Review Act of 2014

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. EMP Threats to US National Security: Congressional Responses

    NASA Astrophysics Data System (ADS)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  19. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    PubMed

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  20. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is...

  1. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A party who intends to introduce Restricted Data or other National Security Information shall file...

  2. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  3. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  4. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  5. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  6. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited...

  7. A review of physical security robotics at Sandia National Laboratories

    SciTech Connect

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capable of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.

  8. Ares V: Game Changer for National Security Launch

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil; Morris, Bruce

    2009-01-01

    NASA is designing the Ares V cargo launch vehicle to vastly expand exploration of the Moon begun in the Apollo program and enable the exploration of Mars and beyond. As the largest launcher in history, Ares V also represents a national asset offering unprecedented opportunities for new science, national security, and commercial missions of unmatched size and scope. The Ares V is the heavy-lift component of NASA's dual-launch architecture that will replace the current space shuttle fleet, complete the International Space Station, and establish a permanent human presence on the Moon as a stepping-stone to destinations beyond. During extensive independent and internal architecture and vehicle trade studies as part of the Exploration Systems Architecture Study (ESAS), NASA selected the Ares I crew launch vehicle and the Ares V to support future exploration. The smaller Ares I will launch the Orion crew exploration vehicle with four to six astronauts into orbit. The Ares V is designed to carry the Altair lunar lander into orbit, rendezvous with Orion, and send the mated spacecraft toward lunar orbit. The Ares V will be the largest and most powerful launch vehicle in history, providing unprecedented payload mass and volume to establish a permanent lunar outpost and explore significantly more of the lunar surface than was done during the Apollo missions. The Ares V consists of a Core Stage, two Reusable Solid Rocket Boosters (RSRBs), Earth Departure Stage (EDS), and a payload shroud. For lunar missions, the shroud would cover the Lunar Surface Access Module (LSAM). The Ares V Core Stage is 33 feet in diameter and 212 feet in length, making it the largest rocket stage ever built. It is the same diameter as the Saturn V first stage, the S-IC. However, its length is about the same as the combined length of the Saturn V first and second stages. The Core Stage uses a cluster of five Pratt & Whitney Rocketdyne RS-68B rocket engines, each supplying about 700,000 pounds of thrust

  9. National Summit on Campus Public Safety. Strategies for Colleges and Universities in a Homeland Security Environment

    ERIC Educational Resources Information Center

    US Department of Justice, 2005

    2005-01-01

    The aftermath of September 11, 2001 prompted the reexamination of the nation's defenses and vulnerabilities in light of new realities. Every sector of society, particularly those who protect the well being of communities, required change. Safety and security operations on the nation's college and university campuses are no exception. The nation's…

  10. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ... Agreement (CRADA) with NIST. NIST published a notice in the Federal Register on October 19, 2012 (77 FR... National Institute of Standards and Technology National Cybersecurity Center of Excellence (NCCoE) Secure.... This notice is the initial step for the National Cybersecurity Center of Excellence (NCCoE) in...

  11. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau of Industry and Security... of U.S. industrial base sectors deemed critical to U.S. national security. The information gathered... market segments in order to maintain a strong U.S. industrial base. II. Method of Collection...

  12. 77 FR 18283 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-27

    ... designate another AIP Member as a ``good control location.'' \\4\\ 17 CFR 240.15c3-3(b)(1). II. Self... COMMISSION Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...-Dealer Members Meet Their Good Control Location Obligations for Uncertificated Securities March 21,...

  13. 77 FR 67410 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-09

    ... Structure) of NSCC's Rules. II. Self-Regulatory Organization's Statement of the Purpose of, and Statutory... COMMISSION Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and... (NSCC's Fee Structure) November 5, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act...

  14. 75 FR 4896 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Eliminate Guarantee of Payment in Connection With the Envelope Settlement Service January 25, 2010. Pursuant to Section...

  15. Post-Closure Inspection Letter Report for Corrective Action Units on the Nevada National Security Site

    SciTech Connect

    NSTec Environmental Restoration

    2011-05-26

    This letter serves as the post-closure inspection letter report for corrective action units on the Nevada National Security Site for calendar year 2011. Copies of completed inspection checklists are included in this report.

  16. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  17. Ballistic Missile Defense: National Security and the High Frontier of Space.

    ERIC Educational Resources Information Center

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  18. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... COASTAL RESOURCE MANAGEMENT FEDERAL CONSISTENCY WITH APPROVED COASTAL MANAGEMENT PROGRAMS Appeal to the Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... objectives....

  19. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... Acting Director of the National Communications System no later than January 8, 2012, and must be... message. Fax: (703) 235-4981 Mail: Acting Director, National Communications System, National Protection... Priority Services for Next Generation Networks, a Cyber Code of Conduct and current NS/EP...

  20. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    PubMed

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  1. Domestic Fuel for Enhancing National Security Act of 2011

    THOMAS, 112th Congress

    Sen. Murray, Patty [D-WA

    2011-05-25

    05/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S3345) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  3. 78 FR 55089 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... speaker. FOR FURTHER INFORMATION CONTACT: Mr. Ryan Owens, ADFO of NMSAC, 2703 Martin Luther King Jr..., 2013. ADDRESSES: This meeting will be held at the new Coast Guard Headquarters, 2703 Martin Luther King Jr. Avenue SE., Washington, DC 20593, Room 6i10-01-b-17. Due to security at the new...

  4. The environmental dimension of national security: A test of systems analysis methods

    NASA Astrophysics Data System (ADS)

    Porfiriev, Boris N.

    1992-11-01

    The systems approach permits us to analyze national security as a cluster of interconnected elements, in which the environmental dimension appears to be the most important one. The environmental problem is divided into two main aspects: environmental security per se and the impact of environment on the overall status of a nation's security. It is argued here that the quality of life and health serve as both the main objective and the principal criterion of environmental security in a social system. Indices of these two factors are used in this article as indicators of the state of this type of security. They confirm that vast areas of Russia, the Ukraine, and Central Asia (especially the Aral Sea region) should be considered as presenting a substantial risk to local people and even producing global impacts on both natural and man-made systems. Environmental factors that destabilize national security are also divided into two groups: those that impact social systems directly and negatively (mainly natural disasters) and technological and sociopolitical agents that cause indirect impacts, in both war and peace time, as well as in the civil and military sectors of the economy. Developments in the former Soviet Union (the Commonwealth of Independent States) are used as an illustration of the consequences that such impacts may have on the status of national security.

  5. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    SciTech Connect

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  6. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds. PMID:18388616

  7. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... Designated Federal Officer, Stakeholder Engagement and Critical Infrastructure Resilience Division, National... Broadband Network. The report recommends the President advance a set of organizational streamlining,...

  8. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    SciTech Connect

    S. Bragg-Sitton; J. Bess; J. Werner

    2011-09-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  9. 32 CFR 156.5 - National security positions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... are set forth in E.O. 12968, as amended; E.O. 10865, 32 CFR parts 154-155; ICD 704; and DoD Regulation... security criteria and adjudicative standards are described in E.O. 12968, as amended; 32 CFR parts 147, 154... determinations in accordance with the procedures set forth in E.O. 12968, as amended; parts 154 and 155 of 32...

  10. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  11. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  12. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  13. Education in Conflict and Crisis for National Security.

    ERIC Educational Resources Information Center

    McClelland, Charles A.

    A basic assumption is that the level of conflict within and between nations will escalate over the next 50 years. Trying to "muddle through" using the tools and techniques of organized violence may yield national suicide. Therefore, complex conflict resolution skills need to be developed and used by some part of society to quell disorder before it…

  14. Religious Conflicts and Education in Nigeria: Implications for National Security

    ERIC Educational Resources Information Center

    Ushe, Ushe Mike

    2015-01-01

    The persistent religious conflicts and insecurity in Nigeria has given meaningful Nigerians a cause for deep concern in recent times. Many of them wonder why religion which used to be the cohesive factor and core of national unity, peaceful co-existence and national development has become a tool for political manipulation, violence, destruction of…

  15. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    ERIC Educational Resources Information Center

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  16. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ... cybersecurity in securing physical assets. \\2\\ EO 13636 can be found at: http://www.gpo.gov/fdsys/pkg/FR-2013-02...) Research and Development (R&D) Plan Outline and Specific Questions Regarding the Content AGENCY: National... contribute highly relevant content for consideration in the development the National Critical...

  17. 77 FR 40779 - Assignment of National Security and Emergency Preparedness Communications Functions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-11

    ... Directive-1 of February 13, 2009 (Organization of the National Security Council System) (PPD-1). Sec. 2.2... President, Vice President, and senior national leadership, including: communications with or among ] the... leadership; Continuity of Government communications; and communications among the executive, judicial,...

  18. 78 FR 35076 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-11

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of... are submitted on a locked-in basis by self-regulatory organizations (``SROs'') (including national and... data for multiple trades to the point where the identity of the party actually responsible for...

  19. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  20. Lawrence Livermore National Security Cost Model Functional Management Assessment

    SciTech Connect

    Tevis, J; Hirahara, J; Thomas, B; Mendez, M

    2008-06-12

    is to make it easier to analyze the true cost of overhead so the costs can be effectively managed. For the current year, the overall the goal of keeping the total cost of an FTE to FY07 levels. This approach reflects the past practice of managing to rates rather than focusing on costs, although streamlined with the more simplified rate structure. Given all the challenges being faced with the contract transition, this was a reasonable interim tactic for dealing with the known cost increases such as fees and taxes. Nonetheless, in order to take full advantage of the opportunities that exist for making sound decisions for further reducing the rates themselves, the Laboratory needs to implement an ongoing and disciplined approach to understanding and managing overhead cost. ISSUE 2: The NIF has a significantly different rate structure than other Laboratory work. Because of its significant size and unique organizational structure as a major construction project, the National Ignition Facility (NIF) has indirect charges that vary from the norm. These variations were reviewed and approved by and disclosed to the NNSA in the Laboratory's past annual Disclosure Statements. In mid-FY 09, NIF will begin transition from a construction line item to an operational center. The reallocation of costs when this occurs could significantly impact the Laboratory's rates and rate structure planning for that transition from a cost- and rate- impact standpoint should begin soon. ISSUE 3: The new rate model must be finalized shortly in order to implement the model beginning in FY 09. As noted in Issue No.1, a Working Group has developed a simplified rate structure for the Lab to use for FY09. The Working Group has evaluated the cost impacts of the simplified rate structure at the major program level and identified a disparate impact in the Safeguards and Security area where a substantial increase in overhead cost allocation may need to be mitigated. The simplified rate structure will need to

  1. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... for Cybersecurity and Communications, an update on the Cloud Computing Subcommittee from Mr. Mark McLaughlin, Chair of the Cloud Computing Subcommittee, and an update on the National Public Safety...

  2. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... issued under the Trading With the Enemy Act (31 CFR 500.101 et seq.); criminal prosecutions under the... authority of the Office of Legal Counsel as established by 28 CFR 0.25. .... 1203); terrorist acts abroad, including murder, against United States nationals (18 U.S.C. 2332);...

  3. Lawrence Livermore National Laboratory`s Computer Security Short Subjects Videos: Hidden Password, The Incident, Dangerous Games and The Mess; Computer Security Awareness Guide

    SciTech Connect

    1993-12-31

    A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.

  4. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception of... 10 Energy 1 2010-01-01 2010-01-01 false Review of Restricted Data or other National...

  5. The Social Structure of a National Securities Market.

    ERIC Educational Resources Information Center

    Baker, Wayne E.

    1984-01-01

    Behavior by traders in the stock options market is not governed strictly by economic criteria. Trading among participants exhibited distinct social structural patterns that dramatically affected the direction and magnitude of price changes. Findings are discussed in relationship to microeconomic theory, and implications for public policy are…

  6. Energy policies for resilience and national security. Final report

    SciTech Connect

    Lovins, A.B.; Lovins, L.H.

    1981-10-01

    The vulnerabilities of the U.S. energy system to accidental or deliberate disruptions are analyzed generically and specifically and shown to be disturbingly large. Since they arise from reliance on highly centralized technologies, increasing such reliance is likely to increase national energy vulnerability. A more efficient, diverse, dispersed, renewable energy system is shown to be inherently more resilient, to make major failures impossible, and to be compatible with consistent adherence to free-market principles.

  7. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  8. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing off-board trading by... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of... in any reported security listed and registered on this exchange or as to which unlisted...

  9. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Designation of senior official to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.20 Designation...

  10. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... COMMISSION Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the Securities Exchange Act of 1934 March 1, 2013. On July 3, 2012, Topaz Exchange, LLC (``Topaz Exchange'' or ``Applicant'') submitted to the Securities and Exchange...

  11. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    SciTech Connect

    Farnham, Irene; Krenzien, Susan

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  12. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    SciTech Connect

    Krenzien, Susan; Farnham, Irene

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  13. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Exemption for national defense and security. 801.11 Section 801.11 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS APPLICATION OF THE EMPLOYEE POLYGRAPH PROTECTION ACT OF 1988 Exemptions § 801.11...

  14. 29 CFR 801.11 - Exemption for national defense and security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Exemption for national defense and security. 801.11 Section 801.11 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR OTHER LAWS APPLICATION OF THE EMPLOYEE POLYGRAPH PROTECTION ACT OF 1988 Exemptions § 801.11...

  15. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT...

  16. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Negotiations involving national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT...

  17. 77 FR 70865 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Modify Addendum A (Fee Structure) of Its Rules and...)(ii). \\4\\ 17 CFR 240.19b-4(f)(2). I. Self-Regulatory Organization's Statement of the Terms...

  18. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  19. Education Policy and National Security in Brazil in the Post-1964 Context

    ERIC Educational Resources Information Center

    Silveira, Rene Trentin

    2013-01-01

    The aim of this article is to analyse and show in detail the influence of the National Security and Development Doctrine, the main ideological prop of the 1964 civilian-military coup, on the education policy implemented by the regime. Special attention is given to the MEC-USAID agreements, the setting up of the Meira Matos Commission and the…

  20. 78 FR 42140 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...), 78 FR 25496 (May 1, 2013). On May 20, 2013, the Commission extended the period of review of the Advance Notice, as modified by Amendment No. 1. Release No. 34-69605 (May 20, 2013), 78 FR 31616 (May...

  1. 78 FR 42127 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing.... Release No. 34-69313 (Apr. 4, 2013), 78 FR 21487 (Apr. 10, 2013). On April 19, 2013, NSCC filed Amendment... Amendment No. 1. Release No. 34-69620 (May 22, 2013), 78 FR 32292 (May 29, 2013). On June 11, 2013,...

  2. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... URBAN DEVELOPMENT Order of Succession for the Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice of order of succession. SUMMARY: In this notice, the Secretary of HUD designates the Order of Succession for the Office of Disaster Management and...

  3. Impacts of Psychological Science on National Security Agencies Post-9/11

    ERIC Educational Resources Information Center

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  4. 10 CFR 784.6 - National security considerations for waiver of certain sensitive inventions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security considerations for waiver of certain sensitive inventions. 784.6 Section 784.6 Energy DEPARTMENT OF ENERGY PATENT WAIVER REGULATION § 784.6... nuclear weapons programs or other atomic energy defense activities of the Department of Energy,...

  5. 10 CFR 784.6 - National security considerations for waiver of certain sensitive inventions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security considerations for waiver of certain sensitive inventions. 784.6 Section 784.6 Energy DEPARTMENT OF ENERGY PATENT WAIVER REGULATION § 784.6... nuclear weapons programs or other atomic energy defense activities of the Department of Energy,...

  6. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    ERIC Educational Resources Information Center

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  7. Position of the academy of nutrition and dietetics: nutrition security in developing nations: sustainable food, water, and health.

    PubMed

    Nordin, Stacia M; Boyle, Marie; Kemmer, Teresa M

    2013-04-01

    It is the position of the Academy of Nutrition and Dietetics that all people should have consistent access to an appropriately nutritious diet of food and water, coupled with a sanitary environment, adequate health services, and care that ensure a healthy and active life for all household members. The Academy supports policies, systems, programs, and practices that work with developing nations to achieve nutrition security and self-sufficiency while being environmentally and economically sustainable. For nations to achieve nutrition security, all people must have access to a variety of nutritious foods and potable drinking water; knowledge, resources, and skills for healthy living; prevention, treatment, and care for diseases affecting nutrition status; and safety-net systems during crisis situations, such as natural disasters or deleterious social and political systems. More than 2 billion people are micronutrient deficient; 1.5 billion people are overweight or obese; 870 million people have inadequate food energy intake; and 783 million people lack potable drinking water. Adequate nutrient intake is a concern, independent of weight status. Although this article focuses on nutritional deficiencies in developing nations, global solutions for excesses and deficiencies need to be addressed. In an effort to achieve nutrition security, lifestyles, policies, and systems (eg, food, water, health, energy, education/knowledge, and economic) contributing to sustainable resource use, environmental management, health promotion, economic stability, and positive social environments are required. Food and nutrition practitioners can get involved in promoting and implementing effective and sustainable policies, systems, programs, and practices that support individual, community, and national efforts.

  8. The Arctic as a test case for an assessment of climate impacts on national security.

    SciTech Connect

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01

    The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with outside

  9. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... through an automated inter-dealer quotation system (“authorization”), or the continuance of...

  10. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... through an automated inter-dealer quotation system (“authorization”), or the continuance of...

  11. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... through an automated inter-dealer quotation system (“authorization”), or the continuance of...

  12. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions,...

  13. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  14. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  15. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President and Vice President; (2) The White House staff; (3)...

  16. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions,...

  17. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS... Preparedness (NSEP) 1. Authority This appendix is issued pursuant to sections 1, 4(i), 201 through 205 and 303...; (d) National Coordinating Center; (e) National Security Emergency Preparedness...

  18. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS... Preparedness (NSEP) 1. Authority This appendix is issued pursuant to sections 1, 4(i), 201 through 205 and 303...; (d) National Coordinating Center; (e) National Security Emergency Preparedness...

  19. Teaching about National Security: Instructional Strategies and Lessons for High School Courses in History, Government, Geography, Economics.

    ERIC Educational Resources Information Center

    Remy, Richard C.; And Others

    The instructional techniques illustrated in this book present a method of infusing national security issues into the five principal social studies courses of U.S. history, world history, U.S. government, economics, and geography. Chapter 1 discusses the meaning and evolution of the term national security in its general and educational contexts.…

  20. [The national food and nutrition policy and its dialogue with the national food and nutrition security policy].

    PubMed

    Alves, Kelly Poliany de Souza; Jaime, Patricia Constante

    2014-11-01

    Food is one of the determinants and conditions of health and an inherent right of all people. The consequences of food and nutrition insecurity in the population, such as obesity, malnutrition and specific nutritional deficiencies, impact the health sector and have historically meant that it has assumed the responsibility for food and nutrition programs and policies in Brazil. However, ensuring food and nutrition security requires a combination of public policies, among which the National Food and Nutrition Policy of the Unified Health System (SUS) plays a fundamental role. This paper seeks to contribute to the debate on intersectoriality and health promotion based on presenting the National Food and Nutrition Policy and discussing its role as interface between the SUS and the National Food and Nutrition Security Policy and System. This perspective strongly suggests the combination of efforts to promote health and food and nutrition security in order to optimize initiatives developed in different sectors and accompanied by different policy councils that are not interrelated, enabling enhanced government and civil society action on the determinants of health and nutrition.

  1. Tensions in collaborative cyber security and how they affect incident detection and response

    SciTech Connect

    Fink, Glenn A.; McKinnon, Archibald D.; Clements, Samuel L.; Frincke, Deborah A.

    2009-12-01

    Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In today’s increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, we address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. We present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. We suggest possible solutions, and present lessons learned from conflicts. Finally, we compare collaborative solutions from other domains and apply them to cyber security collaboration. Although we concentrate our analysis on collaborations whose purpose is to achieve cyber security, we believe that this work applies readily to security tensions found in collaborations of a general nature as well.

  2. [General practitioners' commitment to treating excessive alcohol consumption: A question of role security in treating affected patients?].

    PubMed

    Fankhänel, Thomas; Rascher, Anja; Thiel, Carolin; Schulz, Katrin; Klement, Andreas

    2016-01-01

    Only a few general practitioners (GPs) are committed to screen their patients for alcohol consumption and, in case of excessive alcohol consumption conduct by a brief intervention according to WHO recommendations. Apart from inadequate compensation and work load, another barrier identified by the GPs was their uncertainty about how to deal with affected patients. Most German universities presently spend no more than 90minutes lecture time on addiction medicine teaching. Our research aims to investigate the question whether medical studies and advanced medical education increases the role security of medical students and physicians and their commitment to implementing alcohol screening and brief intervention. Moreover, we will explore whether lack of therapeutic commitment can be related to lack of role security. Questionnaires were administered to pre-clinical and clinical medical students as well as senior house officers. Role security and therapeutic commitment of students and senior house officers were assessed using the Alcohol and Alcohol Problems Questionnaire (SAAPPQ) subscales "Role Security" and "Therapeutic Commitment". Analysis was based on 367 questionnaires. As expected, senior house officers reported more Role Security than clinical medical students who showed a higher level of Role Security than pre-clinical medical students. No differences could be found for Therapeutic Commitment. An association between Role Security and Therapeutic Commitment was only revealed for clinical medical students. Medical studies and advanced medical education can increase students' and senior house officers' Role Security to treat patients with excessive alcohol consumption, but not Therapeutic Commitment. Moreover, no association between Role Security and Therapeutic Commitment could be found for senior house officers. Hence, it may be assumed that educational activities aiming to increase Role Security do not promote the development of motivational aspects such as

  3. [General practitioners' commitment to treating excessive alcohol consumption: A question of role security in treating affected patients?].

    PubMed

    Fankhänel, Thomas; Rascher, Anja; Thiel, Carolin; Schulz, Katrin; Klement, Andreas

    2016-01-01

    Only a few general practitioners (GPs) are committed to screen their patients for alcohol consumption and, in case of excessive alcohol consumption conduct by a brief intervention according to WHO recommendations. Apart from inadequate compensation and work load, another barrier identified by the GPs was their uncertainty about how to deal with affected patients. Most German universities presently spend no more than 90minutes lecture time on addiction medicine teaching. Our research aims to investigate the question whether medical studies and advanced medical education increases the role security of medical students and physicians and their commitment to implementing alcohol screening and brief intervention. Moreover, we will explore whether lack of therapeutic commitment can be related to lack of role security. Questionnaires were administered to pre-clinical and clinical medical students as well as senior house officers. Role security and therapeutic commitment of students and senior house officers were assessed using the Alcohol and Alcohol Problems Questionnaire (SAAPPQ) subscales "Role Security" and "Therapeutic Commitment". Analysis was based on 367 questionnaires. As expected, senior house officers reported more Role Security than clinical medical students who showed a higher level of Role Security than pre-clinical medical students. No differences could be found for Therapeutic Commitment. An association between Role Security and Therapeutic Commitment was only revealed for clinical medical students. Medical studies and advanced medical education can increase students' and senior house officers' Role Security to treat patients with excessive alcohol consumption, but not Therapeutic Commitment. Moreover, no association between Role Security and Therapeutic Commitment could be found for senior house officers. Hence, it may be assumed that educational activities aiming to increase Role Security do not promote the development of motivational aspects such as

  4. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    .... January 13, 2011. Written comments may be sent to the Deputy Manager, National Communications System...-mail message. Fax: (703) 235-4981. Mail: Deputy Manager, National Communications System, National... Executive Officer (CEO), Level 3 Communications, will call the meeting to order and provide opening...

  5. Evolving perceptions of security - US National Security surveys 1993--1995. Progress report, September 30, 1995--November 14, 1995

    SciTech Connect

    Herron, K.G.; Jenkins-Smith, H.C.

    1996-06-01

    This study analyzes findings from a national survey of 2,490 randomly selected members of the US public conducted between September 30 and November 14, 1995. It provides an over time comparison of public perceptions about nuclear weapons risks and benefits and key nuclear policy issues between 1993 and 1995. Other areas of investigation include policy preferences regarding nuclear proliferation, terrorism, US/Russian nuclear cooperation, and personal security. Public perceptions of post-cold war security were found to be evolving in unexpected ways. The perceived threat of nuclear conflict involving the US had not declined, and the threat of nuclear conflict between other countries and fears of nuclear proliferation and terrorism had increased. Perceived risks associated with managing the US nuclear arsenal were also higher. Perceptions of external and domestic benefits from US nuclear weapons were not declining. Support was found for increasing funding for nuclear weapons safety, training, and maintenance, but most respondents favored decreasing funding for developing and testing new nuclear weapons. Strong support was evident for programs and funding to prevent nuclear proliferation and terrorism. Though skeptical that nuclear weapons can be eliminated, most respondents supported reducing the US nuclear arsenal, banning nuclear test explosions, and ending production of fissile materials to make nuclear weapons. Statistically significant relationships were found between perceptions of nuclear weapons risks and benefits and policy and spending preferences. Demographic variables and basic social and political beliefs were systematically related both to risk and benefit perceptions and policy and spending options.

  6. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  7. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  8. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  9. Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)

    SciTech Connect

    Arnold, P.

    2012-10-31

    This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

  10. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    SciTech Connect

    Bingham, Philip; Bush, John; Bowerman, Biays; Cespedes, Ernesto; White, Timothy

    2004-12-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.

  11. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    SciTech Connect

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  12. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    SciTech Connect

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  13. The Role of the DOE Weapons Laboratories in a Changing National Security Environment: CNSS Papers No. 8, April 1988

    DOE R&D Accomplishments Database

    Hecker, S. S.

    1988-04-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.

  14. The role of the DOE weapons laboratories in a changing national security environment: CNSS papers No. 8, April 1988

    SciTech Connect

    Hecker, S.S.

    1988-01-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security. 9 refs.

  15. Underground Test Area Fiscal Year 2014 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    SciTech Connect

    Krenzien, Susan

    2015-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities from October 1, 2013, through September 30, 2014 (fiscal year [FY] 2014). All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); National Security Technologies, LLC (NSTec); Navarro-Intera, LLC (N-I); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2014. The activities included conducting oversight assessments for QAP compliance, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. UGTA Activity participants conducted 25 assessments on topics including safe operations, QAP compliance, activity planning, and sampling. These assessments are summarized in Section 2.0. Corrective actions tracked in FY 2014 are presented in Appendix A. Laboratory performance was evaluated based on three approaches: (1) established performance evaluation programs (PEPs), (2) interlaboratory comparisons, or (3) data review. The results of the laboratory performance evaluations, and interlaboratory comparison results are summarized in Section 4.0. The UGTA Activity published three public documents and a variety of other publications in FY 2014. The titles, dates, and main authors are identified in Section 5.0. The Contract Managers, Corrective Action Unit (CAU) Leads, Preemptive Review (PER) Committee members, and Topical Committee members are listed by name and organization in Section 6.0. Other activities that affected UGTA quality are discussed in Section 7.0. Section 8.0 provides the FY 2014 UGTA QA program conclusions, and Section 9.0 lists the references not identified in Section 5.0.

  16. Timely integration of safeguards and security with projects at Los Alamos National Laboratory

    SciTech Connect

    Price, R.; Blount, P. M.; Garcia, S. W.; Gonzales, R. L.; Salazar, J. B.; Campbell, C. H.

    2004-01-01

    The Safeguards and Security (S&S) Requirements Integration Team at Los Alamos National Laboratory (LANL) has developed and implemented an innovative management process that will be described in detail. This process systematically integrates S&S planning into construction, facility modifications or upgrades, mission changes, and operational projects. It extends and expands the opportunities provided by the DOE project management manual, DOE M 413.3-1. Through a series of LANL documents, a process is defined and implemented that formally identifies an S&S professional to oversee, coordinate, facilitate, and communicate among the identified S&S organizations and the project organizations over the life cycle of the project. The derived benefits, namely (1) elimination/reduction of re-work or costly retrofitting, (2) overall project cost savings because of timely and improved planning, (3) formal documentation, and (4) support of Integrated Safeguards and Security Management at LANL, will be discussed. How many times, during the construction of a new facility or the modification of an existing facility, have the persons responsible for the project waited until the last possible minute or until after construction is completed to approach the security organizations for their help in safeguarding and securing the facility? It's almost like, 'Oh, by the way, do we need access control and a fence around this building and just what are we going to do with our classified anyway?' Not only is it usually difficult; it's also typically expensive to retrofit or plan for safeguards and security after the fact. Safeguards and security organizations are often blamed for budget overruns and delays in facility occupancy and program startup, but these problems are usually due to poor front-end planning. In an effort to help projects engage safeguards and security in the pre-conceptual or conceptual stages, we implemented a high level formality of operations. We established institutional

  17. Research Universities and the Future of America: Ten Breakthrough Actions Vital to Our Nation's Prosperity and Security

    ERIC Educational Resources Information Center

    National Academies Press, 2012

    2012-01-01

    "Research Universities and the Future of America" presents critically important strategies for ensuring that our nation's research universities contribute strongly to America's prosperity, security, and national goals. Widely considered the best in the world, our nation's research universities today confront significant financial pressures,…

  18. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 3 2013-10-01 2013-10-01 false Priority Access Service (PAS) for National.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency... meaning as in Appendix A to Part 64: (a) Assignment; (b) Government; (c) National Communications...

  19. Preliminary Findings on the Health of the Nation Outcome Scales for Children and Adolescents in an Inpatient Secure Adolescent Unit

    ERIC Educational Resources Information Center

    Hunt, Jenny; Wheatley, Malcolm

    2009-01-01

    To date there is limited research examining the use of the Health of the Nation Outcome Scales for Children and Adolescents (HoNOSCA) with adolescents in secure care. The aim of this article is to examine the inter-rater reliability, concurrent validity and clinical utility of HoNOSCA in an adolescent secure psychiatric unit. Twenty-four…

  20. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ... COMMISSION BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities... Y-Exchange, Inc. (``BATS Y Exchange'') submitted to the Securities and Exchange Commission... publishing this notice to solicit comments on BATS Y Exchange's Form 1. The Commission will take...

  1. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    SciTech Connect

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  2. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    ERIC Educational Resources Information Center

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  3. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    SciTech Connect

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  4. Why do nations matter? The struggle for belonging and security in an uncertain world.

    PubMed

    Skey, Michael

    2013-03-01

    This paper explores the reasons why national forms of identification and organization (might) matter in the contemporary era. In contrast to the majority of macro-sociological work dealing with this topic, I develop an analytical framework that draws together recent research on everyday nationalism with micro-sociological and psychological studies pointing to the importance of routine practices, institutional arrangements and symbolic systems in contributing to a relatively settled sense of identity, place and community. The second part of the paper focuses on the hierarchies of belonging that operate within a given national setting. Of particular interest is the largely taken-for-granted status of the ethnic majority and the degree to which it underpins claims to belonging and entitlement that are used to secure key allocative and authoritative resources. PMID:23488702

  5. International and national security applications of cryogenic detectors - mostly nuclear safeguards

    SciTech Connect

    Rabin, Michael W

    2009-01-01

    As with science, so with security - in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma ray, neutron, and alpha particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invi sible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  6. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  7. How does poaching affect the size of national parks?

    PubMed

    Dobson, Andy; Lynes, Laura

    2008-04-01

    A variety of human activities have detrimental impacts on populations of species the park is designed to protect. These impacts range from direct hunting for trophy or subsistence needs, through vehicular collisions, to the direct loss of habitat due to forestry and agricultural activity. These impacts reduce the effective size of the parks and require changes in management policy that deal both with the direct cause of the problem and the underlying social conflicts that the presence of parks can place on humans in the surrounding communities. Recent studies from the Serengeti illustrate that increases in anti-poaching patrols increase the risk of poacher detection and lead to dramatic declines in levels of poaching. The economic arguments that support investment in anti-poaching patrols, rather than increased sentences for poachers who are caught, can be generalized to examine the costs and benefits of other changes in natural resource management that arise when attempting to manage the impact of anthropogenic activities in and around national parks.

  8. How does poaching affect the size of national parks?

    PubMed

    Dobson, Andy; Lynes, Laura

    2008-04-01

    A variety of human activities have detrimental impacts on populations of species the park is designed to protect. These impacts range from direct hunting for trophy or subsistence needs, through vehicular collisions, to the direct loss of habitat due to forestry and agricultural activity. These impacts reduce the effective size of the parks and require changes in management policy that deal both with the direct cause of the problem and the underlying social conflicts that the presence of parks can place on humans in the surrounding communities. Recent studies from the Serengeti illustrate that increases in anti-poaching patrols increase the risk of poacher detection and lead to dramatic declines in levels of poaching. The economic arguments that support investment in anti-poaching patrols, rather than increased sentences for poachers who are caught, can be generalized to examine the costs and benefits of other changes in natural resource management that arise when attempting to manage the impact of anthropogenic activities in and around national parks. PMID:18313793

  9. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., SECURITIES EXCHANGE ACT OF 1934 Forms for Self-Regulatory Organization Rule Changes and Forms for...). Editorial Note: For Federal Register citations affecting Form X-15AA-1, see the List of CFR...

  10. Medical countermeasures for national security: a new government role in the pharmaceuticalization of society.

    PubMed

    Elbe, Stefan; Roemer-Mahler, Anne; Long, Christopher

    2015-04-01

    How do governments contribute to the pharmaceuticalization of society? Whilst the pivotal role of industry is extensively documented, this article shows that governments too are accelerating, intensifying and opening up new trajectories of pharmaceuticalization in society. Governments are becoming more deeply invested in pharmaceuticals because their national security strategies now aspire to defend populations against health-based threats like bioterrorism and pandemics. To counter those threats, governments are acquiring and stockpiling a panoply of 'medical countermeasures' such as antivirals, next-generation vaccines, antibiotics and anti-toxins. More than that, governments are actively incentivizing the development of many new medical countermeasures--principally by marshaling the state's unique powers to introduce exceptional measures in the name of protecting national security. At least five extraordinary policy interventions have been introduced by governments with the aim of stimulating the commercial development of novel medical countermeasures: (1) allocating earmarked public funds, (2) granting comprehensive legal protections to pharmaceutical companies against injury compensation claims, (3) introducing bespoke pathways for regulatory approval, (4) instantiating extraordinary emergency use procedures allowing for the use of unapproved medicines, and (5) designing innovative logistical distribution systems for mass drug administration outside of clinical settings. Those combined efforts, the article argues, are spawning a new, government-led and quite exceptional medical countermeasure regime operating beyond the conventional boundaries of pharmaceutical development and regulation. In the first comprehensive analysis of the pharmaceuticalization dynamics at play in national security policy, this article unearths the detailed array of policy interventions through which governments too are becoming more deeply imbricated in the pharmaceuticalization of

  11. What Price Security?

    ERIC Educational Resources Information Center

    Corson, Dale

    1983-01-01

    A National Academy panel evaluates trade-offs between dangers to national security that arise from technology transfers and threats to the openness of scientific communication that are caused by too much secrecy. Major conclusions/suggestions are discussed. A list of acquisitions from the West affecting Soviet military technology is included.…

  12. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  13. Post-Closure Inspection Letter Report for Corrective Action Units on the Nevada National Security Site

    SciTech Connect

    Boehleke, R. F.

    2014-05-06

    This letter serves as the post-closure inspection letter report for Corrective Action Units (CAUs) on the Nevada National Security Site for calendar year 2013. The inspections identified maintenance and repair is required at the following sites: sign and/or fence repair is necessary at CAUs 113, 137, 139, 140, 143, 262, 370, 371, 372, 374, 476, 478, 529, 542, and 560; animal burrows were identified at CAU 547; and erosion was identified at CAUs 366, 367, 383, 551, and 574. In addition, the following use restrictions were removed during 2013 and will no longer be inspected in 2014: 165, 357, and 528.

  14. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    Hudson, David B

    2014-02-13

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  15. Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573

    SciTech Connect

    Carilli, Jhon T.; Krenzien, Susan K.

    2013-07-01

    The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)

  16. National Center for Nuclear Security: The Nuclear Forensics Project (F2012)

    SciTech Connect

    Klingensmith, A. L.

    2012-03-21

    These presentation visuals introduce the National Center for Nuclear Security. Its chartered mission is to enhance the Nation’s verification and detection capabilities in support of nuclear arms control and nonproliferation through R&D activities at the NNSS. It has three focus areas: Treaty Verification Technologies, Nonproliferation Technologies, and Technical Nuclear Forensics. The objectives of nuclear forensics are to reduce uncertainty in the nuclear forensics process & improve the scientific defensibility of nuclear forensics conclusions when applied to nearsurface nuclear detonations. Research is in four key areas: Nuclear Physics, Debris collection and analysis, Prompt diagnostics, and Radiochemistry.

  17. 26 CFR 1.6045B-1 - Returns relating to actions affecting basis of securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Information Returns § 1.6045B-1 Returns relating... § 601.601(d)(2) of this chapter), classification of the security (such as stock), account number, serial... organizational action on a timely filed Schedule K-1 (Form 1120S), “Shareholder's Share of Income,...

  18. 41 CFR 105-62.101 - Security classification categories.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... vitally affecting the national security, intelligence sources and methods, and the compromise of vital... revelation of significant military plans or intelligence operations. This classification shall be...

  19. 41 CFR 105-62.101 - Security classification categories.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... vitally affecting the national security, intelligence sources and methods, and the compromise of vital... revelation of significant military plans or intelligence operations. This classification shall be...

  20. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    SciTech Connect

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-29

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  1. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  2. 29 CFR 1952.8 - Variations, tolerances, and exemptions affecting the national defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) APPROVED STATE PLANS FOR ENFORCEMENT OF... affecting the national defense. (a) The power of the Secretary of Labor under section 16 of the Act...

  3. Security challenges in integration of a PHR-S into a standards based national EHR.

    PubMed

    Mense, Alexander; Hoheiser Pförtner, Franz; Sauermann, Stefan

    2014-01-01

    Health related data provided by patients themselves is expected to play a major role in future healthcare. Data from personal health devices, vaccination records, health diaries or observations of daily living, for instance, is stored in personal health records (PHR) which are maintained by personal health record systems (PHR-S). Combining this information with medical records provided by healthcare providers in electronic health records (EHR) is one of the next steps towards "personal care". Austria currently sets up a nationwide EHR system that incorporates all healthcare providers and is technically based on international standards (IHE, HL7, OASIS, ...). Looking at the expected potential of merging PHR and EHR data it is worth to analyse integration approaches. Although knowing that an integration requires the coordination of processes, information models and technical architectures, this paper specifically focuses on security issues by evaluating general security requirements for a PHR-S (based on HL7 PHR-S FM), comparing them with the information security specifications for the Austrian's national EHR (based on ISO/IES 27000 series) and identifying the main challenges as well as possible approaches.

  4. The people's role in U.S. national health security: past, present, and future.

    PubMed

    Schoch-Spana, Monica

    2012-03-01

    Over the past decade, assumptions have been made and unmade about what officials can expect of average people confronting a bioterrorist attack or other major health incident. The reframing of the public in national discourse and doctrine from a panic-stricken mob to a band of hearty survivors is a positive development and more realistic in terms of the empirical record. So, too, is the realization that citizen contributions to national health security encompass not only individual preparedness and volunteerism but also mutual aid and collective deliberation of the tough choices posed by health disasters. In projecting what needs to occur over the next 10 years in biosecurity, 2 priority challenges emerge: retaining the lesson that a public prone to panic, social disorder, and civil unrest is a myth, and building an infrastructure to bolster the public's full contributions to health emergency management.

  5. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    PubMed Central

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  6. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    SciTech Connect

    Cathy Wills, ed.

    2012-09-12

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  7. The Evolving Risk of Climate Change and National Security: People not Polar Bears

    NASA Astrophysics Data System (ADS)

    Titley, D.

    2014-12-01

    This talk will provide a general overview of climate change and discuss why this is a national security issue. Climate change is about people, about water, and about change itself. Understanding the rate of climate change, relative to the abilities of both humans and ecosystems to adapt is critical. I will briefly describe the multiple, independent lines of evidence that the climate is changing, and that the primary cause of this change is a change in atmospheric composition caused by the burning of fossil fuels. I will cover the history of climate change as seen within the U.S. Department of Defense and U.S. Navy, how this challenge is being addressed from budgetary, policy, and political angles, and what are the greatest challenges to national security that arise from climate change and in particular, the associated changes in the Arctic. I will conclude with an assessment of future challenges and opportunities regarding climate change, from science, policy, and political perspectives, and why we know enough to take significant action now, even if we don't know every detail about the future. In addition, this talk will address how to effectively talk about climate change through the use of analogies, plain, non-jargon English, and even a little humor.

  8. Emergency medical consequence planning and management for national special security events after September 11: Boston 2004.

    PubMed

    Kade, Kristy A; Brinsfield, Kathryn H; Serino, Richard A; Savoia, Elena; Koh, Howard K

    2008-10-01

    The post-September 11 era has prompted unprecedented attention to medical preparations for national special security events (NSSE), requiring extraordinary planning and coordination among federal, state, and local agencies. For an NSSE, the US Secret Service (USSS) serves as the lead agency for all security operations and coordinates with relevant partners to provide for the safety and welfare of participants. For the 2004 Democratic National Convention (DNC), designated an NSSE, the USSS tasked the Boston Emergency Medical Services (BEMS) of the Boston Public Health Commission with the design and implementation of health services related to the Convention. In this article, we describe the planning and development of BEMS' robust 2004 DNC Medical Consequence Management Plan, addressing the following activities: public health surveillance, on-site medical care, surge capacity in the event of a mass casualty incident, and management of federal response assets. Lessons learned from enhanced medical planning for the 2004 DNC may serve as an effective model for future mass gathering events. PMID:18688202

  9. Chemical and Biological National Security Program (CBNP) Annual Report FY2002 Overview Local Integration of NARAC With Cities (LINC)

    SciTech Connect

    Ermak, D L; Nasstrom, J S; Tull, J E; Baskett, R L; Pobanz, B; Mosley-Rovi, R

    2002-11-18

    The objective of the Local Integration of NARAC With Cities (LINC) project is to demonstrate the capability for providing local government agencies with advanced, CBNP-developed operational atmospheric plume prediction capabilities that can be seamlessly integrated with appropriate federal agency support for homeland security. LINC's approach is to integrate Lawrence Livermore National Laboratory's (LLNL) National Atmospheric Release Advisory Center (NARAC) tools and services with local emergency management and response centers. In the event of an airborne chemical or biological agent release in an urban area, large portions of the city and even the surrounding suburbs may be affected by the airborne plume, depending on the type of agent, size of release, dissemination mechanism and ambient meteorological conditions. The goal of LINC is to provide real-time predictions that would be used by emergency managers and responders (fire, police, hazmat, etc.) to map the extent and effects of hazardous airborne material. Prompt predictions are provided to guide first responders in determining protective actions to be taken (use of personal protective equipment, evacuation, sheltering in place, etc.), safe locations for incident command posts, and critical facilities that may be at risk (hospitals, schools, etc.). LINC also provides response teams from multiple jurisdictions (local, state, and federal) with tools to effectively share information regarding the areas and populations at risk. The ultimate goal of LINC is a seamless and coordinated nationwide system that integrates NARAC prediction and situation awareness resources with the appropriate local, state and federal agencies for homeland security applications ranging from planning to emergency response to consequence assessment and attribution.

  10. 33 CFR 165.164 - Security Zones: Dignitary Arrival/Departure and United Nations Meetings, New York, NY.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .../Departure and United Nations Meetings, New York, NY. 165.164 Section 165.164 Navigation and Navigable Waters... Guard District § 165.164 Security Zones: Dignitary Arrival/Departure and United Nations Meetings, New... information broadcasts. (b) Regulations. (1) The general regulations contained in 33 CFR 165.33 apply. (2)...

  11. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    SciTech Connect

    Erickson, Michael Charles

    2015-11-10

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  12. Factors affecting food security and contribution of modern technologies in food sustainability.

    PubMed

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels.

  13. Securing America’s Future. Realizing the Potential of the Department of Energy’s National Laboratories

    SciTech Connect

    Glauthier, T. J.; Cohon, Jared L.; Augustine, Norman R.; Austin, Wanda M.; Elachi, Charles; Fleury, Paul A.; Hockfield, Susan J.; Meserve, Richard A.; Murray, Cherry A.

    2015-10-23

    The Department of Energy (DOE) laboratories are national assets that have contributed profoundly to the Nation’s security, scientific leadership, and economic competitiveness. In recognition of the continuing and evolving threats to our security and the dramatic increase in global economic and scientific competition, the laboratories are and will continue to be vitally important. Yet, the contributions of the National Laboratories are not inevitable, nor have they realized their full potential. This final report of the Commission to Review the Effectiveness of the National Energy Laboratories recommends ways the laboratories could overcome challenges to more efficiently and effectively accomplish the work for which they are uniquely suited.

  14. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  15. Associations between positive and negative affect and 12-month physical disorders in a national sample.

    PubMed

    Weiser, Eric B

    2012-06-01

    Associations between positive and negative affect and a range of 12-month physical disorders were investigated in the Midlife Development in the United States Survey, a nationally representative sample of 3,032 adults ages 25-74. These associations were examined, controlling for relevant sociodemographic and psychiatric covariates. High positive affect was associated with decreased risk of physical disorders, whereas high negative affect was associated with increased risk. However, associations between positive affect and physical disorders were partially attenuated following adjustment for concurrent negative affect. Additionally, high affect balance was associated with decreased risk of physical disorders before and after adjustments. These findings underscore the relevance of affective disposition in health status, suggesting that both positive and negative affect may serve as viable health risk parameters.

  16. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  17. From Reef to Table: Social and Ecological Factors Affecting Coral Reef Fisheries, Artisanal Seafood Supply Chains, and Seafood Security.

    PubMed

    Kittinger, John N; Teneva, Lida T; Koike, Haruko; Stamoulis, Kostantinos A; Kittinger, Daniela S; Oleson, Kirsten L L; Conklin, Eric; Gomes, Mahana; Wilcox, Bart; Friedlander, Alan M

    2015-01-01

    Ocean and coastal ecosystems provide critical fisheries, coastal protection, and cultural benefits to communities worldwide, but these services are diminishing due to local and global threats. In response, place-based strategies involve communities and resource users in management have proliferated. Here, we present a transferable community-based approach to assess the social and ecological factors affecting resource sustainability and food security in a small-scale, coral reef fishery. Our results show that this small-scale fishery provides large-scale benefits to communities, including 7,353 ± 1547 kg yr(-1) (mean ± SE) of seafood per year, equating to >30,000 meals with an economic value of $78,432. The vast majority of the catch is used for subsistence, contributing to community food security: 58% is kept, 33.5% is given away, and 8.5% is sold. Our spatial analysis assesses the geographic distribution of community beneficiaries from the fishery (the "food shed" for the fishery), and we document that 20% of seafood procured from the fishery is used for sociocultural events that are important for social cohesion. This approach provides a method for assessing social, economic, and cultural values provided by small-scale food systems, as well as important contributions to food security, with significant implications for conservation and management. This interdisciplinary effort aims to demonstrate a transferable participatory research approach useful for resource-dependent communities as they cope with socioeconomic, cultural, and environmental change. PMID:26244910

  18. From Reef to Table: Social and Ecological Factors Affecting Coral Reef Fisheries, Artisanal Seafood Supply Chains, and Seafood Security

    PubMed Central

    Kittinger, John N.; Teneva, Lida T.; Koike, Haruko; Stamoulis, Kostantinos A.; Kittinger, Daniela S.; Oleson, Kirsten L. L.; Conklin, Eric; Gomes, Mahana; Wilcox, Bart; Friedlander, Alan M.

    2015-01-01

    Ocean and coastal ecosystems provide critical fisheries, coastal protection, and cultural benefits to communities worldwide, but these services are diminishing due to local and global threats. In response, place-based strategies involve communities and resource users in management have proliferated. Here, we present a transferable community-based approach to assess the social and ecological factors affecting resource sustainability and food security in a small-scale, coral reef fishery. Our results show that this small-scale fishery provides large-scale benefits to communities, including 7,353 ± 1547 kg yr-1 (mean ± SE) of seafood per year, equating to >30,000 meals with an economic value of $78,432. The vast majority of the catch is used for subsistence, contributing to community food security: 58% is kept, 33.5% is given away, and 8.5% is sold. Our spatial analysis assesses the geographic distribution of community beneficiaries from the fishery (the “food shed” for the fishery), and we document that 20% of seafood procured from the fishery is used for sociocultural events that are important for social cohesion. This approach provides a method for assessing social, economic, and cultural values provided by small-scale food systems, as well as important contributions to food security, with significant implications for conservation and management. This interdisciplinary effort aims to demonstrate a transferable participatory research approach useful for resource-dependent communities as they cope with socioeconomic, cultural, and environmental change. PMID:26244910

  19. From Reef to Table: Social and Ecological Factors Affecting Coral Reef Fisheries, Artisanal Seafood Supply Chains, and Seafood Security.

    PubMed

    Kittinger, John N; Teneva, Lida T; Koike, Haruko; Stamoulis, Kostantinos A; Kittinger, Daniela S; Oleson, Kirsten L L; Conklin, Eric; Gomes, Mahana; Wilcox, Bart; Friedlander, Alan M

    2015-01-01

    Ocean and coastal ecosystems provide critical fisheries, coastal protection, and cultural benefits to communities worldwide, but these services are diminishing due to local and global threats. In response, place-based strategies involve communities and resource users in management have proliferated. Here, we present a transferable community-based approach to assess the social and ecological factors affecting resource sustainability and food security in a small-scale, coral reef fishery. Our results show that this small-scale fishery provides large-scale benefits to communities, including 7,353 ± 1547 kg yr(-1) (mean ± SE) of seafood per year, equating to >30,000 meals with an economic value of $78,432. The vast majority of the catch is used for subsistence, contributing to community food security: 58% is kept, 33.5% is given away, and 8.5% is sold. Our spatial analysis assesses the geographic distribution of community beneficiaries from the fishery (the "food shed" for the fishery), and we document that 20% of seafood procured from the fishery is used for sociocultural events that are important for social cohesion. This approach provides a method for assessing social, economic, and cultural values provided by small-scale food systems, as well as important contributions to food security, with significant implications for conservation and management. This interdisciplinary effort aims to demonstrate a transferable participatory research approach useful for resource-dependent communities as they cope with socioeconomic, cultural, and environmental change.

  20. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report to the Department of Energy Office of Safeguards and Security

    SciTech Connect

    Ruhter, W.D.; Al-Ayat, R.; Cole, C.E.; Thomas, L.L.

    1991-01-01

    The Safeguards Technology Program (STP) at Livermore supports the Technology Development Program of the Office of Safeguards and Security (OSS) in three subprogram areas (tasks): 1. Science and Technology Base Development Intelligent Actinide Analysis System Deterioration of Pu Isotopic Analysis with Neutron Damage to HPGe Detectors 2. Onsite Test and Evaluation and Facility Support Isotopic Analysis of Plutonium Samples Enriched in {sup 238}Pu Actinide Isotopic Analysis System for Los Alamos Plutonium-Handling Facility 3. International Safeguards MGA Workshop Transportable X-Ray Fluorescence Analysis System. The report describes the activities in Safeguards Technology and Systems studies, computer security and Advanced Laser Isotope Systems safeguards. 3 refs., 3 figs. (JF)

  1. Computer Security Awareness Guide for Department of Energy Laboratories, Government Agencies, and others for use with Lawrence Livermore National Laboratory`s (LLNL): Computer security short subjects videos

    SciTech Connect

    Not Available

    1993-12-31

    Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talking about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.

  2. Toward sustainable management of national parks in Japan: securing local community and stakeholder participation.

    PubMed

    Hiwasaki, Lisa

    2005-06-01

    Japan's national park system constitutes a potentially viable mechanism for securing local community participation and building stakeholder consensus for sustainable park management, although the potential of this system is yet to be fully maximized. This article gives an overview of the system of protecting natural resources in Japan, focusing on the national park system. Parks are managed by zoning and regulation, which is unique in that land is not "set aside" for nature conservation, but designated as national park wherever the need to preserve "scenic beauty" has been recognized, regardless of land ownership or land use. Although resource conservation under this system has been problematic, it has advantages, especially in terms of community participation. This article demonstrates that in order to reach the system's potential, the park authority must act as coordinator of stakeholders and facilitator of bottom-up approaches to decision-making. In order to do this, steps that must be taken include the following: identifying the various stakeholders in park management and defining the "local community"; clarifying the roles and responsibilities of each stakeholder; and supporting consensus-building among stakeholders regarding the objectives and long-term vision of each park. By taking these steps, it would be possible to build a park management system that overrides government boundaries and involves local communities. This will enable the park authority to address the challenges facing Japan's complex system of conserving natural resources, and move towards sustainable management of natural resources in Japan.

  3. Ballistic missile proliferation a national security focus for the 21st century. Research report

    SciTech Connect

    Peterson, J.F.

    1994-04-21

    The global proliferation of ballistic missiles and weapons of mass destruction (WMD) has become one of the most immediate and dangerous threats to U.S. national security. Ballistic missiles were used in four of the last six major wars. Some 190 missiles were fired by Iraqis over a six week period at Iranian cities in 1988, during the 'War of the Cities'. Iraq's firing of Scuds against coalition forces and Israel during the Gulf War provided a vivid reminder of the threat these weapons can present to the world community. During the 1980's, many Third World countries assigned a high priority to the acquisition of ballistic missiles. By 1991, more than 20 of these nations either possessed ballistic missiles or were attempting to obtain them. Today 43 nations possess ballistic missiles. Seventeen of these probably have a nuclear weapon capability, with 20 of them possessing also a chemical or biological capability. This paper seeks to: define the military challenge ballistic missiles represent; review current U.S. counter-proliferation and nonproliferation initiatives and, finally make recommendations on other potential methods or considerations to reduce ballistic missile proliferation.

  4. Development of Secure and Sustainable Nuclear Infrastructure in Emerging Nuclear Nations Such as Vietnam

    SciTech Connect

    Shipwash, Jacqueline L; Kovacic, Donald N

    2008-01-01

    Infrastructure Preparedness and Vietnam Jacqueline L. Shipwash and Donald N. Kovacic (shipwashjl@ornl.gov, 865-241-9129, and kovacicdn@ornl.gov, 865-576-1459) Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831 The global expansion of nuclear energy will require international cooperation to ensure that nuclear materials, facilities, and sensitive technologies are not diverted to non-peaceful uses. Developing countries will require assistance to ensure the effective regulation, management, and operation of their nuclear programs to achieve best practices in nuclear nonproliferation. A developing nation has many hurdles to pass before it can give assurances to the international community that it is capable of implementing a sustainable nuclear energy program. In August of this year, the U.S. Department of Energy and the Ministry of Science and Technology of the Socialist Republic of Vietnam signed an arrangement for Information Exchange and Cooperation on the Peaceful Uses of Nuclear Energy. This event signals an era of cooperation between the U.S. and Vietnam in the area of nuclear nonproliferation. This paper will address how DOE is supporting the development of secure and sustainable infrastructures in emerging nuclear nations such as Vietnam.

  5. Predicting the Impact of Climate Change on U.S. Power Grids and Its Wider Implications on National Security

    SciTech Connect

    Wong, Pak C.; Leung, Lai-Yung R.; Lu, Ning; Paget, Maria L.; Correia, James; Jiang, Wei; Mackey, Patrick S.; Taylor, Zachary T.; Xie, YuLong; Xu, Jianhua; Unwin, Stephen D.; Sanfilippo, Antonio P.

    2009-03-23

    We discuss our technosocial analytics research and devel-opment on predicting and assessing the impact of climate change on U.S. power-grids and the wider implications for national security. The ongoing efforts extend cutting-edge modeling theories derived from climate, energy, social sciences, and national security domains to form a unified system coupled with an interactive visual interface for technosocial analysis. The goal of the system is to create viable future scenarios that address both technical and social factors involved in the model domains. These scenarios enable policy makers to formulate a coherent, unified strategy towards building a safe and secure society. The paper gives an executive summary of our efforts in the past fiscal year and provides a glimpse of our work planned for the second year of the three-year project being conducted at the Pacific Northwest National Laboratory.

  6. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  7. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    SciTech Connect

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  8. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  9. Dr. Inside and Dr. Outside: Physicists Involved With National Security and Foreign Policy

    NASA Astrophysics Data System (ADS)

    Zimmerman, Peter D.

    2009-05-01

    Physicists have had a special interest in American national security and arms control since at least the Manhattan Project. They have served our country in uniform and in the career civil service. Some have left academic careers for brief periods to work as political appointees, consultants, or resident scholars and then returned to an academic life, but often with changed goals. Some have tried government life and left nearly immediately, while others dipped a toe in and decided to stay. I will look at real-life examples, mostly using real names, drawn from my career and circle of colleagues to try to explain why some physicists have been extremely successful, why others have not, and what happens to a physicist who moved to Washington and decides to stay. I will also discuss routes into public service for those interesting in giving it a try.

  10. Analysis of physical training of security inspectors at Los Alamos National Laboratory: A preliminary report

    SciTech Connect

    Burkhalter, H.E.; Tietjen, G.L.; Sessions, J.C.; Hook, T.R.

    1989-11-01

    One-half and one-mile runs and 40-yard dash times were analyzed for security inspectors (SIs) at Los Alamos National Laboratory. The effectiveness of grip-strength conditioning was also determined. Both males and females met running sprint standards well within the limits established by the Department of Energy, and there were no adverse effects among any age decades or either gender. Reducing training from three to two days per week resulted in a statistically significant decrease in qualification performance. Increase in grip strength was noted in the left hand only when SIs trained two days per week for nine weeks. Further analysis should determine the appropriate training frequency for this population. These results suggest that no significant improvement is derived from aerobic training occurring less than three days per week. 7 refs., 19 figs.

  11. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  12. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    SciTech Connect

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  13. Annual Storm Water Report for the Y-12 National Security Complex

    SciTech Connect

    Beck, G.S.

    2007-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex consists of two primary elements: sampling and analysis of storm water run-off and routine inspections. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the State of Tennessee. The latest set of inspection results revealed the Y-12 Complex has decreased the potential for storm water pollution by reducing the amount of raw materials, scrap metal and miscellaneous debris exposed to storm water. Future sampling/analysis and inspections are expected to have a continuing positive impact on storm water at the Y-12 Complex.

  14. The Source Physics Experiments (SPE) at the Nevada National Security Site (NNSS): An Overview

    NASA Astrophysics Data System (ADS)

    Snelson, C. M.; Chipman, V.; White, R. L.; Emmitt, R.; Townsend, M.; Barker, D.; Lee, P.

    2012-12-01

    Understanding the changes in seismic energy as it travels from the near field to the far field is the ultimate goal in monitoring for explosive events of interest. This requires a clear understanding of explosion phenomenology as it relates to seismic, infrasound, and acoustic signals. Although there has been much progress in modeling these phenomena, this has been primarily based in the empirical realm. As a result, the logical next step in advancing the seismic monitoring capability of the United States is to conduct field tests that can expand the predictive capability of the physics-based modeling currently under development. The Source Physics Experiment at the Nevada National Security Site (SPE) is the first step in this endeavor to link the empirically based with the physics-based modeling. This is a collaborative project between National Security Technologies (NSTec), Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory (LANL), Sandia National Laboratories (SNL), the Defense Threat Reduction Agency (DTRA), and the Air Force Technical Applications Center (AFTAC). The test series require both the simple and complex cases to fully characterize the problem, which is to understand the transition of seismic energy from the near field to the far field; to understand the development of S-waves in explosives sources; and how anisotropy controls seismic energy transmission and partitioning. The current series is being conducted in a granite body called the Climax Stock. This location was chosen for several reasons, including the fairly homogenous granite; the location of previous nuclear tests in the same rock body; and generally the geology has been well characterized. The simple geology series is planned for 7 shots using conventional explosives in the same shot hole surrounded by Continuous Reflectometry for Radius vs. Time Experiment (CORRTEX), Time of Arrival (TOA), Velocity of Detonation (VOD), down-hole accelerometers, surface

  15. Nevada National Security Site Environmental Remediation Progress Toward Closure of Contaminated Sites

    SciTech Connect

    Patrick Matthews and Robert Boehlecke

    2011-03-03

    The Environmental Restoration activities at the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office assess the environmental impacts that resulted from atmospheric and underground nuclear tests conducted from 1951 to 1992 on the Nevada National Security Site and Nevada Test and Training Range (which includes the Tonopah Test Range). The goal is to protect public health and the environment through investigations and corrective actions. The Federal Facility Agreement and Consent Order (FFACO), established in 1996 between the State of Nevada Division of Environmental Protection (NDEP), DOE, and the U.S. Department of Defense, serves as the cleanup agreement for the Environmental Restoration activities and provides the framework for identifying, prioritizing, investigating, remediating, and monitoring contaminated sites. This agreement satisfies the corrective action requirements of the Resource Conservation and Recovery Act. To ensure efficiency in managing these corrective actions, the sites are grouped according to location, physical and geological characteristics, and/or contaminants. These groups, called corrective action units, are prioritized based on potential risk to workers and the public, available technology, future land use, agency and stakeholder concerns, and other criteria. Environmental Restoration activities include: Industrial Sites, Soils, and Underground Test Area. Nearly 15 years have passed since the FFACO was established, and during this time, more than 3,000 sites have been identified as requiring investigation or corrective actions. To date, approximately 1,945 sites have been investigated and closed through no further action, clean closure, or closure in place. Another 985 sites are currently being investigated or are in the remediation phase, leaving approximately 80 contaminated sites yet to be addressed.

  16. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report ending March 31, 1996

    SciTech Connect

    Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-04-01

    LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.

  17. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    SciTech Connect

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the ''next-generation'' in

  18. MAINTAINING HIGH RESOLUTION MASS SPECTROMETRY CAPABILITIES FOR NATIONAL NUCLEAR SECURITY ADMINISTRATION APPLICATIONS

    SciTech Connect

    Wyrick, S.; Cordaro, J.; Reeves, G.; Mcintosh, J.; Mauldin, C.; Tietze, K.; Varble, D.

    2011-06-06

    The Department of Energy (DOE) National Nuclear Security Administration (NNSA) has a specialized need for analyzing low mass gas species at very high resolutions. The currently preferred analytical method is electromagnetic sector mass spectrometry. This method allows the NNSA Nuclear Security Enterprise (NSE) to resolve species of similar masses down to acceptable minimum detection limits (MDLs). Some examples of these similar masses are helium-4/deuterium and carbon monoxide/nitrogen. Through the 1980s and 1990s, there were two vendors who supplied and supported these instruments. However, with declining procurements and down turns in the economy, the supply of instruments, service and spare parts from these vendors has become less available, and in some cases, nonexistent. The largest NSE user of this capability is the Savannah River Site (SRS), located near Aiken, South Carolina. The Research and Development Engineering (R&DE) Group in the Savannah River National Laboratory (SRNL) investigated the areas of instrument support that were needed to extend the life cycle of these aging instruments. Their conclusions, as to the focus areas of electromagnetic sector mass spectrometers to address, in order of priority, were electronics, software and hardware. Over the past 3-5 years, the R&DE Group has designed state of the art electronics and software that will allow high resolution legacy mass spectrometers, critical to the NNSA mission, to be operated for the foreseeable future. The funding support for this effort has been from several sources, including the SRS Defense Programs, NNSA Readiness Campaign, Pantex Plant and Sandia National Laboratory. To date, electronics systems have been upgraded on one development system at SRNL, two production systems at Pantex and one production system at Sandia National Laboratory. An NSE working group meets periodically to review strategies going forward. The R&DE Group has also applied their work to the electronics for a

  19. 4th Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    SciTech Connect

    Gregory, Louis

    2014-12-02

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014.

  20. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    SciTech Connect

    Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.

    2013-07-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  1. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    SciTech Connect

    Scott A. Wade; Kathryn S. Knapp; Cathy A. Wills

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  2. Agroecology and sustainable food systems: Participatory research to improve food security among HIV-affected households in northern Malawi.

    PubMed

    Nyantakyi-Frimpong, Hanson; Mambulu, Faith Nankasa; Bezner Kerr, Rachel; Luginaah, Isaac; Lupafya, Esther

    2016-09-01

    This article shares results from a long-term participatory agroecological research project in northern Malawi. Drawing upon a political ecology of health conceptual framework, the paper explores whether and how participatory agroecological farming can improve food security and nutrition among HIV-affected households. In-depth interviews were conducted with 27 farmers in HIV-affected households in the area near Ekwendeni Trading Centre in northern Malawi. The results show that participatory agroecological farming has a strong potential to meet the food, dietary, labour and income needs of HIV-affected households, whilst helping them to manage natural resources sustainably. As well, the findings reveal that place-based politics, especially gendered power imbalances, are imperative for understanding the human impacts of the HIV/AIDS epidemic. Overall, the study adds valuable insights into the literature on the human-environment dimensions of health. It demonstrates that the onset of disease can radically transform the social relations governing access to and control over resources (e.g., land, labour, and capital), and that these altered social relations in turn affect sustainable disease management. The conclusion highlights how the promotion of sustainable agroecology could help to partly address the socio-ecological challenges associated with HIV/AIDS.

  3. Agroecology and sustainable food systems: Participatory research to improve food security among HIV-affected households in northern Malawi.

    PubMed

    Nyantakyi-Frimpong, Hanson; Mambulu, Faith Nankasa; Bezner Kerr, Rachel; Luginaah, Isaac; Lupafya, Esther

    2016-09-01

    This article shares results from a long-term participatory agroecological research project in northern Malawi. Drawing upon a political ecology of health conceptual framework, the paper explores whether and how participatory agroecological farming can improve food security and nutrition among HIV-affected households. In-depth interviews were conducted with 27 farmers in HIV-affected households in the area near Ekwendeni Trading Centre in northern Malawi. The results show that participatory agroecological farming has a strong potential to meet the food, dietary, labour and income needs of HIV-affected households, whilst helping them to manage natural resources sustainably. As well, the findings reveal that place-based politics, especially gendered power imbalances, are imperative for understanding the human impacts of the HIV/AIDS epidemic. Overall, the study adds valuable insights into the literature on the human-environment dimensions of health. It demonstrates that the onset of disease can radically transform the social relations governing access to and control over resources (e.g., land, labour, and capital), and that these altered social relations in turn affect sustainable disease management. The conclusion highlights how the promotion of sustainable agroecology could help to partly address the socio-ecological challenges associated with HIV/AIDS. PMID:27475055

  4. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect

    2013-12-01

    This is the second annual storm water report prepared in accordance with the National Pollutant Discharge Elimination System (NPDES) permit issued to the Y-12 National Security Complex (Y-12 Complex) on December 1, 2011, and the corresponding Y-12 Storm Water Pollution Prevention Plan (SWP3) which became effective on September 7, 2012. However, Appendix A does contain some analytical data gathered under the previous NPDES permit and SWP3 for comparison purposes. The quality of storm water exiting the Y-12 Complex via East Fork Poplar Creek remained relatively stable from 2012 to 2013. However, there was one largely unexpected high concentration of mercury noted in an area that is not known to have previously been a mercury use area. This was noted in Sector AA, Outfall 014. This outfall is normally sampled on a rotating basis but, due this elevated concentration, will be sampled again in 2014. The Y-12 Complex will continue to implement appropriate BMPs and reduce outside material storage ares where possible. Emphasis will continue to be placed on site inspections and timely implementation of proper storm water control measures.

  5. Marking the enemy, marking the other : the intersection of national security and diversity.

    SciTech Connect

    Wilson, G. D.

    2001-01-01

    In recent years, Los Alamos National Laboratory (LANL) has alternately been criticized for being too cozy with foreign scientists and too quick to scapegoat or profile workers with foreign ancestries. In the wake of the investigation of alleged espionage that focused on Taiwanese-born American nuclear scientist Wen Ho Lee, political leaders and the news media questioned the Lab's commitment to security and the wisdom of its close collaborations with foreign scientists. Wen Ho Lee was of course an American citizen and not a foreign scientist, and many of his supporters felt that his Asian ancestry made him too convenient of a target in a case focused on Chinese espionage. Thus, charges of racial profiling and scapegoating were also aimed at the Lab, the Department of Energy, and the Federal Bureau of Investigation. In the wake of the controversy some Asian American groups have been encouraging a boycott of the national laboratories run by the Department of Energy, and at Los Alamos, the number of Asian Americans applying for jobs, post docs, and student positions is substantially down.

  6. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  7. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    SciTech Connect

    Farnham, Irene; Marutzky, Sam

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  8. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    SciTech Connect

    Krenzien, Susan; Marutzky, Sam

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  9. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    SciTech Connect

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  10. National, State, and Local Trends: Environmental Scan of Trends and Key Issues Affecting Planning.

    ERIC Educational Resources Information Center

    Kangas, Jon; Budros, Kathleen; Yoshioka, Joyce

    This document is a collection of one-page summaries, or "Trends Newsletters" (Numbers 50, 54-7, 59-60, 67-71, and 73-91), that analyze the national, state, and local trends affecting planning for the San Jose/Evergreen Community College District in California. The document is divided into two sections: External Scan and Internal Scan. Topics…

  11. The Command of Space: A National Vision for American Prosperity and Security

    NASA Astrophysics Data System (ADS)

    2000-03-01

    This paper develops a compelling case for a national space vision to advance the American vital interests of prosperity and security. The first half of paper focuses on laying the background for the vision that follows in the second half. In the title, prosperity is listed before security since it is the reason for exploration and eventually requires protection. The paper begins with the premise that space is becoming an information center of gravity that is increasingly important to the commercial sector as well as the military. However, a major stumbling block in this transition is the lack of the means to protect on-orbit space systems. Without this capability, true command of space is not possible. The paper then transitions to a discourse on the current dependence on space in America. Next, the quest for wealth and information by the European powers in the second millennium is discussed. Each of these examples demonstrates a recurring cycle in their quest: knowledge, exploitation, investment, consumption and protection. This same cycle is seen in the early days of space where the focus was almost exclusively on knowledge and exploration. Several who possessed a vision to advance space were Jules Verne, Wernher von Braun and Arthur C. Clark. From the early days of space, the transition is made to reviewing a current focus on investment and consumption.To make the case for protecting space assets, the role of the U.S. Navy in protecting maritime commerce is examined as well as the current threat to the space sector.

  12. The FBI's Library Awareness Program: National Security vs Government Intrusion into American Libraries [and] The KGB and the Library Target.

    ERIC Educational Resources Information Center

    Information Reports and Bibliographies, 1988

    1988-01-01

    Presents statements made to the House Judiciary Subcommittee on Civil and Constitutional Rights by representatives of the Federal Bureau of Investigation and the library community concerning the surveillance of library users' reading habits as a national security measure. An FBI study on the extent of Soviet intelligence service's utilization of…

  13. 76 FR 43319 - Record of Decision for the Continued Operation of the Y-12 National Security Complex

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-20

    ... (NOI) in the Federal Register (70 FR 71270), announcing its intent to prepare this Y-12 SWEIS. NNSA... Federal Register (74 FR 56189). That notice invited public comment on the Draft Y-12 SWEIS through January... the 2002 ROD (67 FR 11296), which was based on the Final SWEIS for the Y-12 National Security...

  14. National Defense Education and Innovation Initiative: Meeting America's Economic and Security Challenges in the 21st Century

    ERIC Educational Resources Information Center

    Association of American Universities, 2006

    2006-01-01

    The Association of American Universities (AAU) calls on the Administration, Congress, and academia, with the help of the business sector, to implement a 21st Century National Defense Education and Innovation Initiative aimed at meeting the economic and security challenges we will face over the next half-century. Government and America's…

  15. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROTECTION AGENCY (CONTINUED) AIR POLLUTION CONTROLS GENERAL COMPLIANCE PROVISIONS FOR ENGINE PROGRAMS... following items: (1) The label heading “EMISSION CONTROL INFORMATION”. (2) Your corporate name and trademark... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS EQUIPMENT HAS...

  16. In Pursuit of the American Degree: Internationalization, National Security, and the Making of South Asian Foreign Students

    ERIC Educational Resources Information Center

    Thomas, Susan

    2013-01-01

    My dissertation examines how global neoliberal forces intersect with racialized state security practices to shape the transnational subjectivities of South Asian overseas students studying in the U.S. in the post-9/11 moment. These students' movement across national borders to pursue higher education in the United States positions them as ideal…

  17. Distance Learning for Food Security and Rural Development: A Perspective from the United Nations Food and Agriculture Organization.

    ERIC Educational Resources Information Center

    McLean, Scott; Gasperini, Lavinia; Rudgard, Stephen

    2002-01-01

    The distance learning experiences of the United Nations Food and Agriculture Organization led to the following suggestions for applying distance learning strategies to the challenges of food security and rural development: use distance learning for the right reasons, be sensitive to context, use existing infrastructure, engage stakeholders, and…

  18. 76 FR 44751 - Suspension of Entry of Aliens Subject to United Nations Security Council Travel Bans and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-27

    ... ] TD27JY11.021 ] TD27JY11.022 [FR Doc. 2011-19155 Filed 7-26-11; 8:45 am] Billing code 4710-10-C #0; #0; ... of Aliens Subject to United Nations Security Council Travel Bans and International Emergency Economic... the entry into the United States, as immigrants or nonimmigrants, of aliens who are subject to...

  19. Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges

    NASA Astrophysics Data System (ADS)

    Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor

    Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.

  20. Mothers' attachment styles and their children's self-reported security, as related to maternal socialization of children's positive affect regulation.

    PubMed

    Gentzler, Amy L; Ramsey, Meagan A; Black, Katelyn R

    2015-01-01

    This study investigated how mothers' attachment was related to their responses to their own and their children's positive events and positive affect (PA). Ninety-seven mothers reported on their attachment and their responses to their own and their 7-12-year-old children's positive events and emotions. Children reported on their mothers' responses to the children's positive events and their attachment security with their mothers. The results indicated that more avoidant mothers reported less intense PA in response to their own and their children's positive events. More avoidant mothers also were less likely to encourage their children to savor positive events (through expressing PA, reflecting on PA or themselves, giving rewards, and affectionate responses). Mothers higher on anxiety reported greater likelihood of dampening (e.g., minimizing the event's importance) their own positive events and reported being more likely to feel discomfort and to reprimand their children for expressing PA. Children's security was predicted by mothers' lower likelihood of encouraging children's dampening and of reprimanding children for PA displays. This study advances the literature on how mothers' attachment is related to the ways in which they regulate their own and their children's PA, which may have implications for children's attachment and developing PA regulation.

  1. 36 CFR 1202.90 - What NARA systems of records are exempt from release under the National Security Exemption of the...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... the national defense or disrupt foreign policy. Amendment of either of these series of records would interfere with ongoing investigations and law enforcement or national security activities and impose...

  2. An Overview of the Source Physics Experiment at the Nevada National Security Site (SPE-N)

    SciTech Connect

    Snelson, C. M., Chipman, V. D., White, R. L., Emmitt, R. F., Townsend, M. J., Barker, D., Lee, P.

    2012-07-11

    Understanding the changes in seismic energy as it travels from the near field to the far field is the ultimate goal in monitoring for explosive events of interest. This requires a clear understanding of explosion phenomenology as it relates to seismic, infrasound, and acoustic signals. Although there has been much progress in modeling these phenomena, this has been primarily based in the empirical realm. As a result, the logical next step in advancing the seismic monitoring capability of the United States is to conduct field tests that can expand the predictive capability of the physics-based modeling currently under development. The Source Physics Experiment at the Nevada National Security Site (SPE-N) is the first step in this endeavor to link the empirically based with the physics-based modeling. This is a collaborative project between National Security Technologies (NSTec), Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory (LANL), Sandia National Laboratories (SNL), the Defense Threat Reduction Agency (DTRA), and the Air Force Technical Applications Center (AFTAC). The test series require both the simple and complex cases to fully characterize the problem, which is to understand the transition of seismic energy from the near field to the far field; to understand the development of S-waves in explosives sources; and how anisotropy controls seismic energy transmission and partitioning. The current series is being conducted in a granite body called the Climax Stock. This location was chosen for several reasons, including the fairly homogenous granite; the location of previous nuclear tests in the same rock body; and generally the geology has been well characterized. The simple geology series is planned for 7 shots using conventional explosives in the same shot hole surrounded by Continuous Reflectometry for Radius vs. Time Experiment (CORRTEX), Time of Arrival (TOA), Velocity of Detonation (VOD), down-hole accelerometers, surface

  3. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    SciTech Connect

    1995-11-30

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met.

  4. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  5. Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    SciTech Connect

    NSTec Environmental Restoration

    2012-08-15

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

  6. Closure Report for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada

    SciTech Connect

    NSTec Environmental Restoration

    2012-07-17

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 547, Miscellaneous Contaminated Waste Sites, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 547 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 547 consists of the following three Corrective Action Sites (CASs), located in Areas 2, 3, and 9 of the Nevada National Security Site: (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; AND (3) CAS 09-99-06, Gas Sampling Assembly Closure activities began in August 2011 and were completed in June 2012. Activities were conducted according to the Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) for CAU 547 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The recommended corrective action for the three CASs in CAU 547 was closure in place with administrative controls. The following closure activities were performed: (1) Open holes were filled with concrete; (2) Steel casings were placed over vertical expansion joints and filled with cement; (3) Engineered soil covers were constructed over piping and exposed sections of the gas sampling system components; (4) Fencing, monuments, Jersey barriers, radiological postings, and use restriction (UR) warning signs were installed around the perimeters of the sites; (5) Housekeeping debris was picked up from around the sites and disposed; and (6) Radiological surveys were performed to confirm final radiological postings. UR documentation is included in Appendix D. The post-closure plan was presented in detail in the CADD/CAP for CAU 547 and is included as

  7. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy quarter ending September 30, 1994

    SciTech Connect

    Davis, G.; Mansur, D.L.; Ruhter, W.D.; Steele, E.; Strait, R.S.

    1994-10-01

    This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.

  8. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    SciTech Connect

    evelo, stacie; Miller, Mark L.

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  9. 78 FR 66803 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-06

    ... Fiscal Service Bureau of the Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System AGENCY: Bureau of the Fiscal Service, Fiscal Service... schedule applicable to transfers of U.S. Treasury book-entry securities maintained on the National...

  10. 75 FR 67807 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-03

    ... Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System Authority: 31 CFR 357.45. AGENCY: Bureau of the Public Debt, Fiscal Service, Treasury... applicable to transfers of U.S. Treasury book-entry securities maintained on the National Book-Entry...

  11. 76 FR 68523 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ... Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System AGENCY: Bureau of the Public Debt, Fiscal Service, Treasury. ACTION: Notice. SUMMARY... U.S. Treasury book-entry securities maintained on the National Book-Entry System (NBES) that...

  12. 77 FR 67062 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-08

    ... Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System AGENCY: Bureau of the Public Debt, Fiscal Service, Treasury. ACTION: Notice. SUMMARY... U.S. Treasury book-entry securities maintained on the National Book-Entry System (NBES) that...

  13. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  14. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    SciTech Connect

    Drollinger, Harold; Holz, Barbara A; Bullard, Thomas F; Goldenberg, Nancy G; Ashbaugh, Laurence J; Griffin, Wayne R

    2014-01-09

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  15. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  16. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA. PMID:24457326

  17. National Nuclear Security Administration Service Center Environmental Programs Long-Term Environmental Stewardship Baseline Handbook

    SciTech Connect

    Griswold, D. D.; Rohde, K.

    2003-02-26

    As environmental restoration (ER) projects move toward completion, the planning, integration, and documentation of long-term environmental stewardship (LTES) activities is increasingly important for ensuring smooth transition to LTES. The Long-Term Environmental Stewardship Baseline Handbook (Handbook) prepared by the National Nuclear Security Administration (NNSA) Service Center Environmental Programs Department (EPD) outlines approaches for integrating site-specific LTES planning and implementation into site ER baseline documentation. Since LTES will vary greatly from site to site, the Handbook also provides for flexibility in addressing LTES in ER Project life-cycle baselines, while clearly identifying Environmental Management (EM) requirements. It provides suggestions for enacting LTES principles and objectives through operational activities described in site-specific LTES plans and life cycle ER Project baseline scope, cost, and schedule documentation and tools for more thorough planning, better quantification, broader understanding of risk and risk management factors, and more comprehensive documentation. LTES planning applied to baselines in a phased approach will facilitate seamlessly integrating LTES into site operational activities, thereby minimizing the use of resources.

  18. REGULATION OF AUSTRALIAN MEDICAL PROFESSIONALS AND NATIONAL SECURITY: LESSONS FROM THREE CASE STUDIES.

    PubMed

    Faunce, Thomas; McKenna, Michael; Rayner, Johanna; Hawes, Jazmin

    2016-03-01

    In recent times, Australia's national security concerns have had controversial impacts on regulation of Australian medical practitioners in areas related to immigration detention. This column explores three recent case studies relevant to this issue. The first involves the enactment of the Australian Border Force Act 2015 (Cth), which has a significant impact on the regulation of medical professionals who work with people in immigration detention. The second involves the decision of the High Court of Australia in Plaintiff M68/2015 v Minister for Immigration and Border Protection [2016] HCA 1 that an amendment to Australian federal legislation justified sending children back to immigration detention centres in Papua New Guinea and Nauru. This legislation was previously heavily criticised by the Australian Human Rights Commissioner. The third concerns the deregistration of Tareq Kamleh, an Australian doctor of German-Palestinian heritage who came to public attention on ANZAC Day 2015 with his appearance online in a propaganda video for the Islamic State terrorist organisation al-Dawla al-Islamyia fil Iraq wa'al Sham, also known as Islamic State of Iraq and Syria (ISIS) or Daesh. Australia's professional regulatory system should presumptively respect professional virtues, such as loyalty to the relief of individual patient suffering, when dealing with doctors (whether in Australia or ISIS-occupied Syria) working under regimes whose principles appear inconsistent with those of ethics and human rights.

  19. Radionuclides in bats using a contaminated pond on the Nevada National Security Site, USA

    DOE PAGES

    Warren, Ronald W.; Hall, Derek B.; Greger, Paul D.

    2014-01-03

    In this study, perched groundwater percolating through radionuclide contamination in the E Tunnel Complex on the Nevada National Security Site, formerly the Nevada Test Site, emerges and is stored in a series of ponds making it available to wildlife, including bats. Since many bat species using the ponds are considered sensitive or protected/regulated and little information is available on dose to bats from radioactive water sources, bats were sampled to determine if the dose they were receiving exceeded the United States Department of Energy dose limit of 1.0E-3 Gy/day. Radionuclide concentrations in water, sediment, and flying insects were also measuredmore » as input parameters to the dose rate model and to examine trophic level relationships. The RESRAD-Biota model was used to calculate dose rates to bats using different screening levels. Efficacy of RESRAD-Biota and suggested improvements are discussed. Finally, dose to bats foraging and drinking at these ponds is well below the dose limit set to protect terrestrial biota populations.« less

  20. Radionuclides in bats using a contaminated pond on the Nevada National Security Site, USA

    SciTech Connect

    Warren, Ronald W.; Hall, Derek B.; Greger, Paul D.

    2014-01-03

    In this study, perched groundwater percolating through radionuclide contamination in the E Tunnel Complex on the Nevada National Security Site, formerly the Nevada Test Site, emerges and is stored in a series of ponds making it available to wildlife, including bats. Since many bat species using the ponds are considered sensitive or protected/regulated and little information is available on dose to bats from radioactive water sources, bats were sampled to determine if the dose they were receiving exceeded the United States Department of Energy dose limit of 1.0E-3 Gy/day. Radionuclide concentrations in water, sediment, and flying insects were also measured as input parameters to the dose rate model and to examine trophic level relationships. The RESRAD-Biota model was used to calculate dose rates to bats using different screening levels. Efficacy of RESRAD-Biota and suggested improvements are discussed. Finally, dose to bats foraging and drinking at these ponds is well below the dose limit set to protect terrestrial biota populations.